A. Defines the network topology
B. Access to network resources
C. Routing and switching functions
D. Content Filtering
E. Intrusion Detection
您可能感興趣的試卷
你可能感興趣的試題
A. show boot
B. show flash
C. show register
D. show version
E. show config
You are the administrator of the Testking network and you have forgotten the password to one of your routers. After completing the password recovery procedure the router returned to its normal operation. The config-register was set back to the initial default value.
What is this value?()
A. 0x2112
B. 0x2104
C. 0x2102
D. 0x2142
E. 0x2100
A new switch is installed in the Testking network. This switch is to be configured sothat VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.
Which of the conditions below have to be met in order for this to occur?()
A. The switch that will share the VLAN information must be in the VTP Server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be configured to use the same VTP version.
E. The switches must be configured to use the same STP version.
F. The switches must be configured to use the same type of ID tagging.
G. The switches must be connected over VLAN trunks.
A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
最新試題
Which of the following describe router functions?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
Which statement describes the rule of split horizon?()
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()