You work as a network engineer for . You study the exhibit carefully.
What happens when the switch 2 is connected to the rest of the network in the VTP domain Lab_Network?()
Exhibit:
A.The recently introduced switch 2 removes all configured VLANs throughout the VTP domain.
B.The recently introduced switch 2 creates a STP loop in the VTP domain.
C.The recently introduced switch 2 switches over to VTP transparent mode in order to be included into the VTP domain.
D.A trunk should be configured between the two switches in order to integrate 2 into the VTP domain.
E.The recently introduced switch 2 adds one more VLAN to the VLAN database in the VTP domain.
您可能感興趣的試卷
你可能感興趣的試題
Exhibit:
You work as a network administrator at.You study the exhibit carefully. Three different wireless groups of users (support, staff, guests) are permitted to access the wireless LAN.
Which security policy should be implemented for the users in the guests group? ()
A.LEAP authentication
B.Primary SSID with open or no WEP authentication
C.Static WEP and authentication
D.Open authentication with WEP plus MAC authentication
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.
What supported authentication server should be chosen?()
A.TACACS with LEAP extensions
B.RADIUS with EAP extensions
C.TACACS+
D.LDAP
You work as a network engineer for . You study the switch exhibit carefully.
Which two statements are true? ()
Exhibit:
A.The trust boundary is not on this switch.
B.It is displaying the AutoQos configuration that was initially applied.
C.Interface Fa0/3 trusts allCoS values.
D.The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E.The show auto qos command shows the user-defined QoS settings.
F.The show auto qos command does not display user configuration changes currently in effect.
A.DAI intercept all ARP packets on untrusted ports
B.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
C.DAI is used to prevent against a DHCP Snooping attack.
D.DAI forwards all ARP packets received on a trusted interface without any checks.
E.DAI forwards all ARP packets on untrusted ports.
F.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
A.Classifying and marking traffic should be done as close to the traffic source as possible.
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.
最新試題
Which statement is correct about the use of the virtual interface on a WLC ?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()
Which three statements about STP timers are true?()
Refer to the exhibit. Which statement is true about the output?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()