單項(xiàng)選擇題

You are configuring a Cisco multilayer switch for the Company network.
 Which command would  you use to configure a port to act as a routed interface?()

A. ip routing
B. switchport mode trunk
C. no switchport
D. switchport trunk native vlan 1
E. None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

Which of the following could be used to provide a Layer 3 data path between separate VLANs?()

A. VLAN trunking
B. An external router
C. An internal route processor
D. VLAN capable bridge
E. EtherChannel

2.多項(xiàng)選擇題

Inter-VLAN routing has been implemented in the Company network. In VLAN routing, 
what are  some of the disadvantages of designing a router-on-stick configuration? ()

A. InterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for InterVLAN accounting.

3.單項(xiàng)選擇題

The Company network needs to pass traffic between VLANs. 
Which device should be used to  accomplish this? ()

A. Hub
B. Switch
C. Router
D. Bridge
E. None of the other alternatives apply

4.單項(xiàng)選擇題

pany has implemented numerous multilayer switches that utilize FIB tables. 
Which statement  is true about the Forward Information Base (FIB) table?()

A. The FIB is derived from the IP routing table and is optimized for maximum lookup throughput.  
B. The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2  rewrite (MAC) information for the next hop.
C. When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine.
D. The FIB lookup is based on the Layer 2 destination MAC address.
E. None of the other alternatives apply

5.單項(xiàng)選擇題

Refer to the exhibit. 
What type of attack is being defended against? ()

A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack

最新試題

During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half  duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()

題型:?jiǎn)雾?xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題