單項(xiàng)選擇題

Refer to the exhibit. On basis of the configuration that is provided,
 where will the trust boundary be  established in this network? ()

A.at the PC
B.at the access switch
C.at the IP phone
D.at the distribution switch


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

You need to determine where the trust boundaries will be in a new Company VOIP design. 
Which  two statements are true about these trust boundaries?()

A.Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,
B.Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.
C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  
D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  
E.Trust boundaries define the firewall rules for QoS admission into a network.

2.單項(xiàng)選擇題

Refer to the exhibit. Based upon the information that is given, 
how will voice traffic from the phone  and data traffic from the PC be handled by SW_1? ()

A.The switch port will perform marking for the ingress voice and data traffic by using the  defaultCoS value at the switch port.
B.The switch port will trust theCoS value of the ingress voice and data traffic that comes into the  switch port.
C.The switch port will trust theCoS value of the ingress voice traffic. Data traffic will be marked at  the switch port with the default CoS value.
D.The switch port will trust theCoS value of the ingress data traffic. Voice traffic will be marked at  the switch port with the default CoS value.

3.單項(xiàng)選擇題

The voice VLAN feature has been enabled on a new Company Catalyst switch port. 
What is the  effect of this? ()

A.The CoS is trusted for 802.1P or 802.1Q tagged traffic.
B.PortFast is disabled on the port.
C.Port Security is automatically enabled on a voice VLAN port.
D.Untagged traffic is sent according to the default CoS priority of the port.
E.None of the other alternatives apply

4.單項(xiàng)選擇題

Refer to the exhibit. 
Which statement is true about where trust boundaries should be established  in a network?()


A.Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable  place to establish a trust boundary.
B.Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable  places to establish a trust boundary.
C.Endpoint 2 is the only acceptable place to establish a trust boundary.  
D.Endpoint 1 is the only acceptable place to establish a trust boundary.
E.Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable  place to establish a trust boundary.
F.Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable  places to establish a trust boundary.

5.多項(xiàng)選擇題

You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. 
Which  three statements are true about the voice VLAN feature on this switch?()

A.The default CoS value for incoming traffic is set up to 0.
B.The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C.PortFast is automatically disabled when a voice VLAN is configured.
D.The voice VLAN feature is disabled by default.
E.The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F.When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

最新試題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:?jiǎn)雾?xiàng)選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half  duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項(xiàng)選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:?jiǎn)雾?xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:?jiǎn)雾?xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:?jiǎn)雾?xiàng)選擇題