网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()
A

More collision domains will be created.

B

IP address utilization will be more efficient.

C

More bandwidth will be required than was needed previously.

D

An additional broadcast domain will be created.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()A More collision domains will be created.B IP address utilization will be more efficient.C More bandwidth will be required than was needed previously.D An additional broadcast domain will be created.” 相关考题
考题 There are 2 switches in the Ezonexam LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers)A.Host 1 on VLAN 1 can ping Host 2 on VLAN 1B.Host 1 on VLAN 1 can ping Host 4 on VLAN 2C.Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D.Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E.Host 4 on VLAN 2 can ping Host 2 on VLAN 2

考题 A Ezonexam switch is configured with all ports assigned to VLAN 2. In addition, all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?A.The additions will create more collisions domains.B.IP address utilization will be more efficient.C.More bandwidth will be required than was needed previously.D.An additional broadcast domain will be created.E.The possibility that switching loops will occur will increase dramatically.

考题 A new switch is installed in the Ezonexam network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.Which of the conditions below have to be met in order for this to occur? (Choose all that apply).A. The switch that will share the VLAN information must be in the VTP Server mode.B. The switches must be in the same VTP domain.C. The switch that will share the VLAN information must be configured as the root bridge.D. The switches must be configured to use the same VTP version.E. The switches must be configured to use the same STP version.F. The switches must be configured to use the same type of ID tagging.G. The switches must be connected over VLAN trunks.

考题 You need to create a new VLAN on your Catalyst switch. This VLAN is to be named EZONEXAM. Which of the following need to be completed for the creation of this new VLAN? (Select all that apply)A. The EZONEXAM VLAN must be created.B. The desired ports must be added to the new EZONEXAM VLAN.C. The EZONEXAM VLAN must be added to all of the domains.D. The EZONEXAM VLAN must be named.E. An IP address must be configured for the EZONEXAM VLAN.F. None of the above. VLAN creations are automatic.

考题 A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()A、More collision domains will be created.B、IP address utilization will be more efficient.C、More bandwidth will be required than was needed previously.D、An additional broadcast domain will be created.

考题 You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned tothe default VLAN?()A、VLAN 1003B、VLAN 1C、VLAN OND、VLAN AE、VLAN 0

考题 Which statement describes a spanning-tree network that has converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are assigned as either root or designated ports.C、All switch and bridge ports are in either the forwarding or blocking state.D、All switch and bridge ports are either blocking or looping.

考题 Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

考题 The DAI feature has been implemented in the Company switched LAN.  Which three statements  are true about the dynamic ARP inspection (DAI) feature? ()A、 DAI can be performed on ingress ports only.B、 DAI can be performed on both ingress and egress ports.C、 DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.  D、 DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP  caches of hosts in the domain.E、 DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.F、 DAI is supported on access and trunk ports only.

考题 Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()A、All ports will be in a state of discarding, learning, or forwarding.B、Thirty VLANs have been configured on this switch.C、The bridge priority is lower than the default value for spanning tree.D、All interfaces that are shown are on shared media.E、All designated ports are in a forwarding state.F、The switch must be the root bridge for all VLANs on this switch.

考题 What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are in the stand-by state.C、All switch and bridge ports are assigned as either root or designated ports.D、All switch and bridge ports are in either the forwarding or blocking state.E、All switch and bridge are either blocking or looping.

考题 The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()A、MAC spoofingB、VLAN hoppingC、MAC address floodingD、DHCP floodingE、Session hijacking

考题 You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

考题 You need to create a new VLAN on your Catalyst switch. This VLAN is to be named TESTKING. Which of the following need to be completed for the creation of this new VLAN?()A、The TESTKING VLAN must be created.B、The desired ports must be added to the new TESTKING VLAN.C、The TESTKING VLAN must be added to all of the domains.D、The TESTKING VLAN must be named.E、An IP address must be configured for the TESTKING VLAN.F、None of the above. VLAN creations are automatic.

考题 A new switch is installed in the Testking network. This switch is to be configured sothat VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in order for this to occur?()A、The switch that will share the VLAN information must be in the VTP Server mode.B、The switches must be in the same VTP domain.C、The switch that will share the VLAN information must be configured as the root bridge.D、The switches must be configured to use the same VTP version.E、The switches must be configured to use the same STP version.F、The switches must be configured to use the same type of ID tagging.G、The switches must be connected over VLAN trunks.

考题 By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

考题 Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()A、Reverse ARPB、Full duplex on the fiber linkC、PoED、802.1q trunking

考题 单选题You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned tothe default VLAN?()A VLAN 1003B VLAN 1C VLAN OND VLAN AE VLAN 0

考题 单选题Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()A Reverse ARPB Full duplex on the fiber linkC PoED 802.1q trunking

考题 单选题Refer to the exhibit.All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?()A The access link needs to be configured in multiple VLANs.B The link between the switches is configured in the wrong VLAN.C The link between the switches needs to be configured as a trunk.D VTP is not configured to carry VLAN information between the switches.E Switch IP addresses must be configured in order for traffic to be forwarded between the switches

考题 多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

考题 多选题The DAI feature has been implemented in the Company switched LAN.  Which three statements  are true about the dynamic ARP inspection (DAI) feature? ()ADAI can be performed on ingress ports only.BDAI can be performed on both ingress and egress ports.CDAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.DDAI should be enabled on the root switch for particular VLANs only in order to secure the ARP  caches of hosts in the domain.EDAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.FDAI is supported on access and trunk ports only.

考题 单选题You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()A Make all ports private VLAN ports.B Place all unused ports in native VLAN 1 until needed.C Proactively configure unused switch ports as access ports.D Disable Cisco Discovery Protocol globally.

考题 单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the switch is configured to allow for trunking on the switch ports.C Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D Verify that the VLAN virtual interface has been correctly created and enabled.

考题 单选题You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the VLAN was added on all switches with the use of the show vlan command. C Verify that the switch is configured to allow for trunking on the switch ports.D Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

考题 多选题There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation?()AHost 1 on VLAN 1 can ping Host 2 on VLAN 1BHost 1 on VLAN 1 can ping Host 4 on VLAN 2CHost 1 on VLAN 1 can not ping Host 2 on VLAN 1DHost 4 on VLAN 2 can not ping Host 1 on VLAN 1EHost 4 on VLAN 2 can ping Host 2 on VLAN 2

考题 多选题Which two statements are true about voice VLANs?()AVoice VLANs are only used when connecting an IP phone and a host to distinct switch portsBAccess ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesCAccess ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneDVoice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandEVoice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portFEnabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings