网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()
A

Service Ethertype

B

ISL

C

PseudoLAN TAG

D

802.1q VLAN TAG

E

Control Word

F

Tunnel Label


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label” 相关考题
考题 Which of the following are VLAN frame. encapsulation types that may be configured on a Catalyst switch? (Choose two.)A. VTPB. ISLC. CDPD. 802.1QE. 802.1pF. LLC

考题 You need to configure two Ezonexam switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?A. STPB. 802.1QC. VLSMD. ISLE. VTPF. HSRPG. None of the above

考题 Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

考题 Which two of these are characteristics of the 802.1Q protocol?() A. it is a layer 2 messaging protocol which maintains vlan configurations across network.B. it includes an 8-bit field which specifies the priority of a frame.C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E. it is a trunking protocol capable of carring untagged frames.

考题 Refer to the exhibit. Which statement is true?() A.The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.B.VLAN 20 is running the Per VLAN Spanning Tree Protocol.C.The MAC address of the root bridge is 0017.596d.1580.D.SwitchA is not the root bridge, because not all of the interface roles are designated.

考题 Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?() A.VTPB.802.1QC.RSTPD.STP

考题 Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree  Protocol IEEE 802.1D? ()A、Designated Root CostB、bridge ID priorityC、max ageD、bridge ID MAC addressE、Designated Root PriorityF、forward delay

考题 Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()A、Designated Root CostB、bridge ID priorityC、max ageD、bridge ID MAC addressE、Designated Root PriorityF、forward delay

考题 Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

考题 Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()A、Service EthertypeB、ISLC、PseudoLAN TAGD、802.1q VLAN TAGE、Control WordF、Tunnel Label

考题 Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true

考题 For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()A、root portB、backup portC、designated portD、alternate port

考题 Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.

考题 n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()A、port tunneling on the Ethernet subinterfaceB、VLAN tunneling on the Ethernet trunkC、port tunneling on the Ethernet interfaceD、VLAN tunneling on the Ethernet VLAN subinterfaceE、port tunneling on the Ethernet trunk

考题 Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.

考题 Which two statements are true about AH?() (Choose two.)A、AH provides data integrity.B、AH is identified by IP protocol 50.C、AH is identified by IP protocol 51.D、AH cannot work in conjunction with ESP

考题 多选题Which two of these are recommended practices with trunks?()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

考题 多选题Which of the following are VLAN frame encapsulation types that may be configured on a Catalyst switch?()AVTPBISLCCDPD802.1QE802.1pFLLC

考题 单选题Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()A VTPB 802.1QC RSTPD STP

考题 多选题n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()Aport tunneling on the Ethernet subinterfaceBVLAN tunneling on the Ethernet trunkCport tunneling on the Ethernet interfaceDVLAN tunneling on the Ethernet VLAN subinterfaceEport tunneling on the Ethernet trunk

考题 多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.

考题 多选题Which two of these are recommended practices with trunks? ()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

考题 多选题Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree Protocol IEEE 802.1D?()ADesignated Root CostBbridge ID priorityCmax ageDbridge ID MAC addressEDesignated Root PriorityFforward delay

考题 多选题Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()AConfigure a dynamic routing protocol.BConfigure SVI interfaces with IP addresses and subnet masks.CConfigure switch ports with network addresses.DConfigure switch ports with the autostate exclude command.EDocument the MAC addresses of the switch ports.

考题 单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()A It is a label distribution protocol for MPLSB It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC Tag distribution Protocol (TDP) was the basis for LDPD All of the above are true

考题 多选题Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A802.1XBCisco Temporal Key Integrity Protocol (CKIP)CExtensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)DCisco Message Integrity Check (CMIC)EOne-Time Passwords (OTP)FAdvanced Encryption Standard (AES)

考题 多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label

考题 多选题Which two of these are characteristics of the 802.1Q protocol?()Ait is a layer 2 messaging protocol which maintains vlan configurations across network.Bit includes an 8-bit field which specifies the priority of a frame.Cit is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.Dit modifies the 802.3 frame header,and thus requires that the FCS be recomputed.Eit is a trunking protocol capable of carring untagged frames.