网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which three of these statements regarding 802.1Q trunking are correct? ()

A.802.1Q native VLAN frames are untagged by default.

B.802.1Q trunking ports can also be secure ports.

C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.

D.802.1Q trunks require full-duplex, point-to-point connectivity.

E.802.1Q trunks should have native VLANs that are the same at both ends.


参考答案

更多 “ Which three of these statements regarding 802.1Q trunking are correct? () A.802.1Q native VLAN frames are untagged by default.B.802.1Q trunking ports can also be secure ports.C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.D.802.1Q trunks require full-duplex, point-to-point connectivity.E.802.1Q trunks should have native VLANs that are the same at both ends. ” 相关考题
考题 15 Which of the following statements about intangible assets are correct?1 If certain criteria are met, research expenditure must be recognised as an intangible asset.2 Goodwill may not be revalued upwards.3 Internally generated goodwill should not be capitalised.A 2 and 3 onlyB 1 and 3 onlyC 1 and 2 onlyD All three statements are correct

考题 19 Which of the following statements about intangible assets in company financial statements are correct accordingto international accounting standards?1 Internally generated goodwill should not be capitalised.2 Purchased goodwill should normally be amortised through the income statement.3 Development expenditure must be capitalised if certain conditions are met.A 1 and 3 onlyB 1 and 2 onlyC 2 and 3 onlyD All three statements are correct

考题 Identify three correct statements regarding Oracle E-Business Suite.() (Choose three.) A.It can run entirely on the Internet.B.A minimum of two modules needs to be implemented for an organization.C.It is engineered to work as an integrated system on a single IT infrastructure.D.It supports multi-directional flows of business information within an organization.

考题 Which three statements are correct about Rate Limiters? ()(Choose three.) A. one-rate rate limitersB. two-rate rate limitersC. two-rate rate limiters is the defaultD. one-rate rate limiters is the defaultE. there is no default it must be configured

考题 Which two statements regarding JUNOS architecture are correct?() A.The Routing Engine handles all exception traffic.B.The Routing Engine synchronizes the route table with the PFEC.The Routing Engine is hot-pluggable.D.The Routing Engine controls the PFE

考题 Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()A、The Cisco Control VLAN carries only Layer 2 control trafficB、802.1Q trunking is used between the access switch and the routerC、There is no 802.1Q trunking used in these designsD、When 802.1Q trunks are configured, they are also called Native VLANsE、Trunking Ensures that traffic from only one VLAN is carried on that trunk

考题 The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()A、 The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameB、 The packet is encapsulated with a 26 byte header and a 4 byte FCSC、 The protocol uses point-to-multipoint connectivityD、 The protocol uses point-to-point connectivityE、 The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00F、 The IEEE 802.1Q frame retains the original MAC destination address

考题 Which three of these statements regarding 802.1Q trunking are correct?()A、802.1Q native VLAN frames are untagged by default.B、802.1Q trunking ports can also be secure ports.C、802.1Q trunks can use 10 Mb/s Ethernet interfaces.D、802.1Q trunks require full-duplex, point-to-point connectivity.E、802.1Q trunks should have native VLANs that are the same at both ends.

考题 Which of the following statements is correct regarding a hybridcrypto system?()A、 uses symmetric crypto for keys distributionB、 uses symmetric crypto for proof of originC、 uses symmetric crypto for fast encrypted/decryptionD、 uses asymmetric crypto for message confidentialityE、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

考题 Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.

考题 Which of these statements is correct regarding SSO and Cisco NSF?()A、 Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.B、 Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.C、 Distribution switches are single points of failure causing outages for the end devices.D、 Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.E、 NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.

考题 A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()A、Both switches must be in the same VTP domain.B、The encapsulation type of both ends of the trunk does not have to match.C、The native VLAN on both ends of the trunk must be VLAN 1.D、802.1Q trunking can only be configured on a Layer 2 port.E、In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

考题 Which of these statements is correct regarding SSO and Cisco NSF?()A、Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.B、Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.C、Distribution switches are single points of failure causing outages for the end devices.D、Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than one second.E、NSF and SSO with redundant supervisors have the most impact on outages at the access layer.

考题 Which two statements regarding SNMP monitoring of a UCS system are correct?()A、SNMP v3 is supportedB、includes same MIBs as the Cisco Nexus7000C、does not provides MIBs downstream of the fabric interconnectD、includes same MIBs as the Cisco Nexus2000

考题 Which two statements regarding JUNOS architecture are correct?()A、The Routing Engine handles all exception traffic.B、The Routing Engine synchronizes the route table with the PFEC、The Routing Engine is hot-pluggable.D、The Routing Engine controls the PFE

考题 多选题The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()AThe IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameBThe packet is encapsulated with a 26 byte header and a 4 byte FCSCThe protocol uses point-to-multipoint connectivityDThe protocol uses point-to-point connectivityEThe IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00FThe IEEE 802.1Q frame retains the original MAC destination address

考题 多选题Which three statements are correct about Rate Limiters? ()(Choose three.)Aone-rate rate limitersBtwo-rate rate limitersCtwo-rate rate limiters is the defaultDone-rate rate limiters is the defaultEthere is no default it must be configured

考题 多选题Which three statements are correct regarding the CLI command, 12tp destination profile to-NewYork virtual-router vr1 ip address 1.1.1.1 ? ()(Choose three.)ALNS IP address is defined.BLAC IP address is defined.CVirtual-router vr1 sends and receives L2TP traffic.DVirtual-router vr1 is the authenticating virtual-router.EThis command is performed on the LNS.

考题 单选题You need to connect two Company core switches via an ISL trunk.  Which statement is true  regarding the configuration of ISL trunks? ()A  A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.B  All Catalyst switches support ISL trunking.C  A Catalyst switch will report giants if one side is configured for ISL while the other side is not.D  ISL trunking requires that native VLANs match.E  None of the other alternatives apply

考题 多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

考题 多选题Identify three correct statements regarding Oracle E-Business Suite.() (Choose three.)AIt can run entirely on the Internet.BA minimum of two modules needs to be implemented for an organization.CIt is engineered to work as an integrated system on a single IT infrastructure.DIt supports multi-directional flows of business information within an organization.

考题 多选题Which three statements about classification marking of traffic at Layer 2 are true? ()Aa Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)Ban ATM header includes a 1-bit DE field to provide the CoSCan MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoSDthe CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is usedEin the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoSFin the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS

考题 单选题Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()A The Cisco Control VLAN carries only Layer 2 control trafficB 802.1Q trunking is used between the access switch and the routerC There is no 802.1Q trunking used in these designsD When 802.1Q trunks are configured, they are also called Native VLANsE Trunking Ensures that traffic from only one VLAN is carried on that trunk

考题 多选题Which three of these statements regarding 802.1Q trunking are correct? ()A802.1Q native VLAN frames are untagged by default.B802.1Q trunking ports can also be secure ports.C802.1Q trunks can use 10 Mb/s Ethernet interfaces.D802.1Q trunks require full-duplex, point-to-point connectivity.E802.1Q trunks should have native VLANs that are the same at both ends.

考题 多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.

考题 单选题Which of the following statements is correct regarding an oil with a high viscosity index?()A A large change of viscosity occurs with a minor change in temperatureB No change in viscosity occurs with any change in temperatureC Very little change in viscosity occurs with a significant change in temperatureD The viscosity of the oil increases with an increase in temperature

考题 单选题A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()A Both switches must be in the same VTP domain.B The encapsulation type of both ends of the trunk does not have to match.C The native VLAN on both ends of the trunk must be VLAN 1.D 802.1Q trunking can only be configured on a Layer 2 port.E In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.