A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B. The VTP management domain name of both switches must be set the same.
C. All ports on both the switches must be set as access ports.
D. One of the two switches must be configured as a VTP server.
E. A rollover cable is required to connect the two switches together.
F. A router must be used to forward VTP traffic between VLANs.
您可能感興趣的試卷
你可能感興趣的試題
A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.
D. Router C will send a Destination Unreachable message type.
E. Router C will send a Router Selection message type.
F. Router C will send a Source Quench message type.
A. network or subnetwork IP address
B. broadcast address on the network
C. IP address leased to the LAN
D. IP address used by the interfaces
E. manually assigned address to the clients
F. designated IP address to the DHCP server
A. VLANs increase the size of collision domains.
B. VLANs allow logical grouping of users by function.
C. VLANs simplify switch administration.
D. VLANs enhance network security.
A.802.1d
B.VTP
C.802.1q
D.STP
E.SAP
A.VTP
B.802.1q
C.IGP
D.ISL
E.802.3u
最新試題
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which IPsec security protocol should be used when confidentiality is required?()
At which layer of the OSI model is RSTP used to prevent loops?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which pairing reflects a correct protocol-and-metric relationship?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Which command encrypts all plaintext passwords?()
On which options are standard access list based?()