网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()
A

The additions will create more collision domains.

B

IP address utilization will be more efficient.

C

More bandwidth will be required than was needed previously.

D

An additional broadcast domain will be created.

E

The possibility that switching loops will occur will increase dramatically.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()A The additions will create more collision domains.B IP address utilization will be more efficient.C More bandwidth will be required than was needed previously.D An additional broadcast domain will be created.E The possibility that switching loops will occur will increase dramatically.” 相关考题
考题 A Ezonexam switch is configured with all ports assigned to VLAN 2. In addition, all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?A.The additions will create more collisions domains.B.IP address utilization will be more efficient.C.More bandwidth will be required than was needed previously.D.An additional broadcast domain will be created.E.The possibility that switching loops will occur will increase dramatically.

考题 Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? () A.Switch A - Fa0/0B.Switch A - Fa0/1C.Switch B - Fa0/0D.Switch B - Fa0/1E.Switch C - Fa0/0F.Switch C - Fa0/1

考题 A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()A、More collision domains will be created.B、IP address utilization will be more efficient.C、More bandwidth will be required than was needed previously.D、An additional broadcast domain will be created.

考题 f a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP advertisements?()A、They are discardedB、The contents are altered to reflect the switch’s own VTP database and then they are forward out  all trunking portsC、The changes within the advertisements are made to the switch’s VTP database.D、The contents are ignored and they are forwarded out all trunking ports.

考题 Which statement describes a spanning-tree network that has converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are assigned as either root or designated ports.C、All switch and bridge ports are in either the forwarding or blocking state.D、All switch and bridge ports are either blocking or looping.

考题 The DAI feature has been implemented in the Company switched LAN.  Which three statements  are true about the dynamic ARP inspection (DAI) feature? ()A、 DAI can be performed on ingress ports only.B、 DAI can be performed on both ingress and egress ports.C、 DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.  D、 DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP  caches of hosts in the domain.E、 DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.F、 DAI is supported on access and trunk ports only.

考题 Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?()A、Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.B、Ensure that cables A and B are straight-through cables.C、Ensure cable A is plugged into a trunk port.D、Ensure the switch has power.E、Reboot all of the devices.F、Reseat all cables.

考题 Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()A、All ports will be in a state of discarding, learning, or forwarding.B、Thirty VLANs have been configured on this switch.C、The bridge priority is lower than the default value for spanning tree.D、All interfaces that are shown are on shared media.E、All designated ports are in a forwarding state.F、The switch must be the root bridge for all VLANs on this switch.

考题 What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are in the stand-by state.C、All switch and bridge ports are assigned as either root or designated ports.D、All switch and bridge ports are in either the forwarding or blocking state.E、All switch and bridge are either blocking or looping.

考题 The following was configured on a switch:  Switch(config) # spanning-tree portfast bpdufilter default  What is the effect of this configuration command?()A、If BPDUs are received by a port configured for PortFast, they are ignored and none are sent.B、The command will enable BPDU filtering on all ports regardless of whether they are configured for BPDU filtering at the interface level.C、If BPDUs are received by a port configured for Portfast, the port will transition to forwarding state.D、If BPDUs are received by a port configured for PortFast, then PortFast is disabled and the BPDUs are processed normally.E、None of the other alternatives apply.

考题 You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

考题 When configuring unified ports on a 5548 switch, which port ordering must be respected?()A、 Fibre Channel ports must be configured from the first port in the module.B、 Ethernet ports must be configured from the last port in the module.C、 Fibre Channel ports must be configured from the last port in the module.D、 Ethernet ports must be configured from the first port in the module.

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

考题 多选题Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()AAll ports will be in a state of discarding, learning, or forwarding.BThirty VLANs have been configured on this switch.CThe bridge priority is lower than the default value for spanning tree.DAll interfaces that are shown are on shared media.EAll designated ports are in a forwarding state.FThe switch must be the root bridge for all VLANs on this switch.

考题 单选题f a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP advertisements?()A They are discardedB The contents are altered to reflect the switch’s own VTP database and then they are forward out  all trunking portsC The changes within the advertisements are made to the switch’s VTP database.D The contents are ignored and they are forwarded out all trunking ports.

考题 单选题Refer to the exhibit.All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?()A The access link needs to be configured in multiple VLANs.B The link between the switches is configured in the wrong VLAN.C The link between the switches needs to be configured as a trunk.D VTP is not configured to carry VLAN information between the switches.E Switch IP addresses must be configured in order for traffic to be forwarded between the switches

考题 多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

考题 单选题Which statement describes a spanning-tree network that has converged?()A All switch and bridge ports are in the forwarding state.B All switch and bridge ports are assigned as either root or designated ports.C All switch and bridge ports are in either the forwarding or blocking state.D All switch and bridge ports are either blocking or looping.

考题 多选题The DAI feature has been implemented in the Company switched LAN.  Which three statements  are true about the dynamic ARP inspection (DAI) feature? ()ADAI can be performed on ingress ports only.BDAI can be performed on both ingress and egress ports.CDAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.DDAI should be enabled on the root switch for particular VLANs only in order to secure the ARP  caches of hosts in the domain.EDAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.FDAI is supported on access and trunk ports only.

考题 多选题Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?()AEnsure that the Ethernet encapsulations match on the interconnected router and switch ports.BEnsure that cables A and B are straight-through cables.CEnsure cable A is plugged into a trunk port.DEnsure the switch has power.EReboot all of the devices.FReseat all cables.

考题 单选题What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()A All switch and bridge ports are in the forwarding state.B All switch and bridge ports are in the stand-by state.C All switch and bridge ports are assigned as either root or designated ports.D All switch and bridge ports are in either the forwarding or blocking state.E All switch and bridge are either blocking or looping.

考题 单选题You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()A Make all ports private VLAN ports.B Place all unused ports in native VLAN 1 until needed.C Proactively configure unused switch ports as access ports.D Disable Cisco Discovery Protocol globally.

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the switch is configured to allow for trunking on the switch ports.C Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D Verify that the VLAN virtual interface has been correctly created and enabled.

考题 单选题You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the VLAN was added on all switches with the use of the show vlan command. C Verify that the switch is configured to allow for trunking on the switch ports.D Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

考题 单选题A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()A More collision domains will be created.B IP address utilization will be more efficient.C More bandwidth will be required than was needed previously.D An additional broadcast domain will be created.