A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering
您可能感興趣的試卷
你可能感興趣的試題
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.
A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.
A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable
最新試題
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
Which of the following correctly describe steps in the OSI data encapsulation process?()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()