网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What are three valid reasons to assign ports to VLANs on a switch?()
A

to make VTP easier to implement

B

to isolate broadcast traffic

C

to increase the size of the collision domain

D

to allow more devices to connect to the network

E

to logically group hosts according to function

F

to increase network security


参考答案

参考解析
解析: 暂无解析
更多 “多选题What are three valid reasons to assign ports to VLANs on a switch?()Ato make VTP easier to implementBto isolate broadcast trafficCto increase the size of the collision domainDto allow more devices to connect to the networkEto logically group hosts according to functionFto increase network security” 相关考题
考题 What are three valid Juniper Networks IPS attack object types?() (Choose three.) A. signatureB. anomalyC. trojanD. virusE. chain

考题 What are three valid LDP message types? ()(Choose three.) A. peer discoveryB. label distributionC. path initializationD. session managementE. connection establishment

考题 The Ezonexam network Topology is displayed in the exhibit below:A switch has been configured for three different VLANs: VLAN 2, VLAN 3, and VLAN 4. For the purposes of communication between VLANs a router is to be added. Host from one VLAN should be able to reach the hosts in the other VLANs.Based on this requirement, what type of connection is acceptable between the router and switch?(Select all valid answers)A.10 Mbps EthernetB.56 kbps serialC.100 Mbps EthernetD.1,544 Mbps serialE.1000 Mbps Ethernet

考题 What are three valid reasons to assign ports on VLANs on a switch?() A. to make VTP easier to implementB. to isolate broadcast trafficC. to increase the size of the collision domainD. to allow more devices to connect to the networkE. to logically group hosts according to functionF. to increase network security

考题 What is the purpose of the cisco Vlan Trunking protocol?() A. to provide a mechanism to dynamically assign vlan membership to switch portsB. to allow traffic to be carried from multiple vlans over a single link between switchesC. to allow native vlan information to be carried over a trunk linkD. to provide a mechanism to manually assign vlan membership to switch portsE. to allow for managing the additions,deletions,and changes of vlans between switchs

考题 Which three of these statements regarding 802.1Q trunking are correct? () A.802.1Q native VLAN frames are untagged by default.B.802.1Q trunking ports can also be secure ports.C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.D.802.1Q trunks require full-duplex, point-to-point connectivity.E.802.1Q trunks should have native VLANs that are the same at both ends.

考题 Which two statements about voice VLANs are correct?()A、Voice VLANs eliminate the need for QoS configurationB、Voice VLANs are used on trunk links to eliminate the need for QoS CoS markingsC、Voice VLANs are mainly used to reduce the number of access switch ports that are used in the networkD、Voice VLANs can be configured to forward existing CoS priorities or override themE、Voice VLANs are mainly used between access layer switches and distribution layer switchesF、Voice VLANs can be configured on Layer 2 ports only

考题 Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()A、All ports will be in a state of discarding, learning, or forwarding.B、Thirty VLANs have been configured on this switch.C、The bridge priority is lower than the default value for spanning tree.D、All interfaces that are shown are on shared media.E、All designated ports are in a forwarding state.F、The switch must be the root bridge for all VLANs on this switch.

考题 What are three valid LDP message types? ()(Choose three.)A、peer discoveryB、label distributionC、path initializationD、session managementE、connection establishment

考题 What are three valid Juniper Networks IPS attack object types?() (Choose three.)A、signatureB、anomalyC、trojanD、virusE、chain

考题 What are three advantages of VLANs?()A、VLANs establish broadcast domains in switched networks.B、VLANs utilize packet filtering to enhance network security.C、VLANs provide a method of conserving IP addresses in large networks.D、VLANs provide a low-latency internetworking alternative to routed networks.E、VLANs allow access to network services based on department, not physical location.F、VLANs can greatly simplify adding, moving, or changing hosts on the network.

考题 Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.

考题 In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()A、The names of the VLANs used by the SmartPorts are case insensitiveB、The ports may belong to a configurable data VLANC、The names of the VLANs used by the Smartports are not relevantD、The ports may belong to many VLANs, depending on how many PCs are connected to each port.E、The names of the VLANs used by the Smartports are case sensitive

考题 Which three mechanisms are used to secure management traffic from outside IPS sensors?()A、secure tunnelsB、a separate management VLANC、secure VLANs to isolate sensorsD、an out-of-band path around the firewallE、asymmetric traffic flows to isolate sensorsF、private VLANs to put all sensors on isolated ports

考题 What are three valid reasons to assign ports to VLANs on a switch? ()A、to make VTP easier to implementB、to isolate broadcast trafficC、to increase the size of the collision domainD、to allow more devices to connect to the networkE、to logically group hosts according to functionF、to increase network security

考题 What is the purpose of the cisco Vlan Trunking protocol?()A、to provide a mechanism to dynamically assign vlan membership to switch portsB、to allow traffic to be carried from multiple vlans over a single link between switchesC、to allow native vlan information to be carried over a trunk linkD、to provide a mechanism to manually assign vlan membership to switch portsE、to allow for managing the additions,deletions,and changes of vlans between switchs

考题 What are three valid LDP message types?()A、PathB、SessionC、discoveryD、establishmentE、Advertisement

考题 多选题What are three valid Juniper Networks IPS attack object types?() (Choose three.)AsignatureBanomalyCtrojanDvirusEchain

考题 单选题You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned tothe default VLAN?()A VLAN 1003B VLAN 1C VLAN OND VLAN AE VLAN 0

考题 多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE

考题 多选题What are three valid LDP message types? ()(Choose three.)Apeer discoveryBlabel distributionCpath initializationDsession managementEconnection establishment

考题 多选题What are three valid LDP message types?()APathBSessionCdiscoveryDestablishmentEAdvertisement

考题 多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

考题 多选题In the output of show isis adjacency, what are three valid items that can be displayed under the attributes header?()AIS typeBattachedCoverloadDarea addresses

考题 多选题What are three valid reasons to assign ports to VLANs on a switch?()Ato make VTP easier to implementBto isolate broadcast trafficCto increase the size of the collision domainDto allow more devices to connect to the networkEto logically group hosts according to functionFto increase network security

考题 多选题In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()AThe names of the VLANs used by the SmartPorts are case insensitiveBThe ports may belong to a configurable data VLANCThe names of the VLANs used by the Smartports are not relevantDThe ports may belong to many VLANs, depending on how many PCs are connected to each port.EThe names of the VLANs used by the Smartports are case sensitive

考题 单选题What is the purpose of the cisco Vlan Trunking protocol?()A to provide a mechanism to dynamically assign vlan membership to switch portsB to allow traffic to be carried from multiple vlans over a single link between switchesC to allow native vlan information to be carried over a trunk linkD to provide a mechanism to manually assign vlan membership to switch portsE to allow for managing the additions,deletions,and changes of vlans between switchs

考题 单选题Three access ports have been installed and configured to a small office.What term defines the wireless topology?()A IBSSB BSSC ESSD SSID