單項(xiàng)選擇題

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

A.switchport priority extend trust
B.switchport priority extend cos 2
C.switchport priority extend cos 11
D.mls qos cos 2
E.mls qos cos 2 override


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements about voice VLANs are correct?()

A.Voice VLANs eliminate the need for QoS configuration
B.Voice VLANs are used on trunk links to eliminate the need for QoS CoS markings
C.Voice VLANs are mainly used to reduce the number of access switch ports that are used in the network
D.Voice VLANs can be configured to forward existing CoS priorities or override them
E.Voice VLANs are mainly used between access layer switches and distribution layer switches
F.Voice VLANs can be configured on Layer 2 ports only

2.多項(xiàng)選擇題Which two statements are true about voice VLANs?()

A.Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
B.Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
C.Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
D.Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
E.Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
F.Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

3.單項(xiàng)選擇題A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()

A.probe request/response, authentication request/response, association request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, association request/response, authentication request/response
D.association request/response, probe request/response, authentication request/response

4.單項(xiàng)選擇題

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()

A.It indicates that the radio of the client adapter is disabled
B.It indicates that the client adapter is not associated to an access point or another client
C.It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated
D.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good
E.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair
F.It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor

5.單項(xiàng)選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

A.Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1
B.No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0
C.No. Traffic will loop back and forth between switch S5 and S2
D.Yes. Traffic will pass from switch S6 to S3 to S2 to S1
E.No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end

最新試題

Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about network voice traffic? (Choose two.)()

題型:多項(xiàng)選擇題

What are two rules for compacting IPv6 addresses?()

題型:多項(xiàng)選擇題

Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which two statements are correct?()

題型:多項(xiàng)選擇題

Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

題型:多項(xiàng)選擇題