A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
您可能感興趣的試卷
你可能感興趣的試題
A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
A.Easy VPN
B.GRE tunneling
C.Virtual Tunnel Interfaces
D.Dynamic Multipoint VPN
E.Group Encrypted Transport VPN
A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology
最新試題
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Which technology allows centralized storage services to be shared across different VSANs?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
Which of the following is the primary consideration to scale VPNs?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()