网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()

  • A、 Implicit deny feature at end of list.
  • B、 Implicit deny feature at start of list.
  • C、 Implicit forward feature at end of list
  • D、 Implicit forward feature at start of list.

参考答案

更多 “ VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()A、 Implicit deny feature at end of list.B、 Implicit deny feature at start of list.C、 Implicit forward feature at end of listD、 Implicit forward feature at start of list.” 相关考题
考题 Those maps are on the wall.(改为否定句)Those maps_________ on the wall.

考题 The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()A. The servers have not had VLAN tagging enabled on their NICs.B. Speed and duplex have not been set.C. VLAN tagging was not set on the trunk.D. The servers have been connected with CAT5 cable.

考题 What are two methods of mitigating MAC address flooding attacks?()A、Place unused ports in a common VLAN.B、Implement private VLANs.C、Implement DHCP snooping.D、Implement port security.E、Implement VLAN access maps.

考题 如果要建立多人在线的服务器,以下代码正确的是()A、createServer("SinglePlayer","control/data/maps/book_ch4.mis");B、createServer("MultiPlayer","control/data/maps/book_ch4.mis");C、createServer("MultiPlayer",control/data/maps/book_ch4.mis);D、createServer("SinglePlayer",control/data/maps/book_ch4.mis);

考题 You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D、Verify that the VLAN virtual interface has been correctly created and enabled.

考题 Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?()A、802.1Q giants frames could saturate the link.B、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.C、A native VLAN mismatch error message will appear.D、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

考题 Which statement is most correct regarding vNICs and VLANs?()A、only the default vlan has traffic that is taggedB、All vNICs have to be associated with one or more VLANs except for the default vlanC、vlan must be configured before configuring them into a vNICD、Tagging is done by the operating system NIC if the flag is set to tag traffic

考题 You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have  assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an "up/up" state.  What must be true in an SVI configuration to bring the VLAN and line protocol up?()A、The port must be physically connected to another Layer 3 device.B、At least one port in VLAN 20 must be active.C、The Layer 3 routing protocol must be operational and receiving routing updates from neighboring peer devices.D、Because this is a virtual interface, the operational status will always be in an "up/up" state.

考题 You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the VLAN was added on all switches with the use of the show vlan command. C、Verify that the switch is configured to allow for trunking on the switch ports.D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

考题 MAPs

考题 The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A、 Information will be carried in the RSTP BPDUs.B、 It will be propagated in VTP updates.C、 Information stored in the Forwarding Information Base and the switch will reply on query.  D、 Multiple Spanning Tree must be manually configured on the appropriate switches.

考题 While logged into a Company switch you issue the following command:   CompanySwitch(config-mst)# instance 10 vlan 11-12   What does this command accomplish?()A、 It enables a PVST+ instance of 10 for vlan 11 and vlan 12B、 It enables vlan 11 and vlan 12 to be part of the MST region 10C、 It maps vlan 11 and vlan 12 to the MST instance of 10.D、 It creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12  E、 It create a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12F、 It starts two instances of MST, one instance for vlan 11 and another instance for vlan 12.

考题 Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?()A、802.1Q giants frames could saturate the linkB、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged framesC、A native VLAN mismatch error message will appearD、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

考题 You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

考题 You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack

考题 What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface

考题 What is true about access control on bridged and routed VLAN traffic?()A、Router ACLs can be applied to the input and output directions of a VLAN interfaceB、Bridged ACLs can be applied to the input and output directions of a VLAN interfaceC、Only router ACLs can be applied to a VLAN interfaceD、VLAN maps and router ACLs can be used in combinationE、VLAN maps can be applied to a VLAN interfac

考题 An 802.1X client cannot authenticate to an autonomous access point configured for multiple VLANs. The native VLAN does not have an SSID configured. Which one of the following links being down would prevent the clients from authenticating?()A、between the RADIUS and the access pointB、between the client’s VLAN and the WLSEC、between the native VLAN and the WLSED、between the client’s VLAN and the RADIUS

考题 Which of the following allows the user to have two separate Ethernet networks share the same network adapter?()A、VLAN tagsB、EtherChannelC、Virtual EthernetD、Shared Ethernet Adapter

考题 多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.

考题 多选题What is true about access control on bridged and routed VLAN traffic?()ARouter ACLs can be applied to the input and output directions of a VLAN interfaceBBridged ACLs can be applied to the input and output directions of a VLAN interfaceCOnly router ACLs can be applied to a VLAN interfaceDVLAN maps and router ACLs can be used in combinationEVLAN maps can be applied to a VLAN interfac

考题 单选题VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()A  Implicit deny feature at end of list.B  Implicit deny feature at start of list.C  Implicit forward feature at end of listD  Implicit forward feature at start of list.

考题 单选题You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A Verify that trunked links are configured to allow the VLAN traffic.B Verify that the switch is configured to allow for trunking on the switch ports.C Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D Verify that different native VLANs exist between two switches for security purposes.

考题 单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the switch is configured to allow for trunking on the switch ports.C Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D Verify that the VLAN virtual interface has been correctly created and enabled.

考题 单选题You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the VLAN was added on all switches with the use of the show vlan command. C Verify that the switch is configured to allow for trunking on the switch ports.D Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

考题 单选题The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A  Information will be carried in the RSTP BPDUs.B  It will be propagated in VTP updates.C  Information stored in the Forwarding Information Base and the switch will reply on query.  D  Multiple Spanning Tree must be manually configured on the appropriate switches.

考题 多选题What is true about access control on bridged and routed VLAN traffic? ()ARouter ACLs can be applied to the input and output directions of a VLAN interface.BBridged ACLs can be applied to the input and output directions of a VLAN interface.COnly router ACLs can be applied to a VLAN interface.DVLAN maps and router ACLs can be used in combination.EVLAN maps can be applied to a VLAN interface