网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two of these are recommended practices with trunks?()
A

use ISL encapsulation

B

use 802.1q encapsulation

C

set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation

D

use VTP server mode to support dynamic propagation of VLAN information across the network

E

set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two of these are recommended practices with trunks?()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation” 相关考题
考题 She recommended two books to me, but () of them was interesting. A、eitherB、bothC、noneD、neither

考题 Which of the following is NOT a recommended safe practice?A.Securing equipment against slipping or driftingB.Operating machinery at its recommended speedC.Repairing loose handles on tools before usingD.Using tools for purposes for which they are not designed

考题 Which two reflect best practices for client peering sessions in a BGP route reflection network? ()(Choose two.) A. peer with route-reflectors within the clusterB. peer with route-reflectors outside the clusterC. peer with route-reflector-clients within the clusterD. peer with route-reflector-clients outside the cluste

考题 Which two of these are recommended practices with trunks? () A. use ISL encapsulationB. use 802.1q encapsulationC. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD. use VTP server mode to support dynamic propagation of VLAN information across the networkE. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

考题 Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

考题 Which three of these statements regarding 802.1Q trunking are correct? () A.802.1Q native VLAN frames are untagged by default.B.802.1Q trunking ports can also be secure ports.C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.D.802.1Q trunks require full-duplex, point-to-point connectivity.E.802.1Q trunks should have native VLANs that are the same at both ends.

考题 Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()A、the number of computer blades in the systemB、the number of interfaces sharing the uplinksC、the driver version on the OS running on the computer bladeD、the number of uplinks between I/O Module and Fabric Interconnect

考题 Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

考题 Which two of these are recommended practices with trunks? ()A、 use ISL encapsulationB、 use 802.1q encapsulationC、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、 use VTP server mode to support dynamic propagation of VLAN information across the network E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

考题 Which two statements correctly describe UDLD? ()A、Unidirectional link detection is achieved through monitoring STP BPDUs.B、It is recommended that it be enabled globally rather than on an individual port.C、When an error is detected, normal mode will disable a port.D、It is recommended that it be enabled in normal mode.E、It is recommended that it be used with the loop guard feature.

考题 Which three of these statements regarding 802.1Q trunking are correct?()A、802.1Q native VLAN frames are untagged by default.B、802.1Q trunking ports can also be secure ports.C、802.1Q trunks can use 10 Mb/s Ethernet interfaces.D、802.1Q trunks require full-duplex, point-to-point connectivity.E、802.1Q trunks should have native VLANs that are the same at both ends.

考题 Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()A、VTP updates are ignored and forwarded out all ports.B、VTP updates are ignored and forwarded out trunks only.C、VTP updates are made to the VLAN database and are forwarded out trunks only.D、VTP updates are ignored and are not forwarded.

考题 Which two of these are recommended practices with trunks?()A、use ISL encapsulationB、use 802.1q encapsulationC、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、use VTP server mode to support dynamic propagation of VLAN information across the networkE、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

考题 Which of the following is the recommended disposal method for used computers?()A、Trash canB、BurialC、Recycling centerD、Storage shed

考题 Which of the following WAN technologies has the GREATEST latency and is not recommended for VoIP?()A、ISDNB、DSLC、SatelliteD、Cable

考题 A manufacturing customer has a requirement to add 12 additional dual-attached servers to theirexisting two Brocade 16 port SAN switches that have no more ports available. Which of thefollowing should be recommended to accommodate the current capacity requirements, allow forfuture growth and provide 8 and 4 Gb support?()A、two SAN16B B、two SAN80B-4 C、two SAN24B-4 D、two SAN04B-R

考题 Which two statements are true about a bitmap index? ()A、It is recommended for the columns that have unique values.B、It can be converted to a B-tree index by using the ALTER INDEX command.C、It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.D、Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

考题 In a two-tier configuration, it is recommended to put which of the following components on different nodes?()A、Database client and database serverB、WebSphere Application Server and Database ServerC、WebSphere Commerce Server and WebSphere Application ServerD、Web server and WebSphere Application Server

考题 多选题Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()Athe number of computer blades in the systemBthe number of interfaces sharing the uplinksCthe driver version on the OS running on the computer bladeDthe number of uplinks between I/O Module and Fabric Interconnect

考题 多选题Which two reflect best practices for client peering sessions in a BGP route reflection network? ()(Choose two.)Apeer with route-reflectors within the clusterBpeer with route-reflectors outside the clusterCpeer with route-reflector-clients within the clusterDpeer with route-reflector-clients outside the cluste

考题 多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.

考题 单选题You need to connect two Company core switches via an ISL trunk.  Which statement is true  regarding the configuration of ISL trunks? ()A  A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.B  All Catalyst switches support ISL trunking.C  A Catalyst switch will report giants if one side is configured for ISL while the other side is not.D  ISL trunking requires that native VLANs match.E  None of the other alternatives apply

考题 多选题Which two statements describe good practices for an application developer to reduce lockingconflicts in Oracle database()AAvoid coding unnecessary long-running transactions.BAllow the database to handle locks in default locking mode.CAlways explicitly code the locks as per the requirement of the application.DAllow escalation of row locks to block locks if too many row locks cause problem.

考题 单选题Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"?()A VTP updates are ignored and forwarded out all portsB VTP updates are ignored and forwarded out trunks onlyC VTP updates are made to the VLAN database and are forwarded out trunks onlyD VTP updates are ignored and are not forwarded

考题 多选题Which two of these are recommended practices with trunks?()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

考题 多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering

考题 单选题Which one is the most important based on the following common elements of a network design?()A Business needsB Risk analysisC Security policyD Best practices

考题 单选题Which of the following is not a recommended safe practice?()A Securing equipment against slipping or driftingB Operating machinery at its recommended speedC Repairing loose handles on tools before usingD Using tools for purpose for which they are not designed