多項(xiàng)選擇題How could a large corporation with many specialized divisions benefit from using VLANs on their networks?()

A. VLANs allow access to network services based on department, not physical location.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a low-latency, high bandwidth internetworking alternative.
D. VLANs provide a method of communication between IP addresses in large networks.
E. VLANs establish segmented broadcast domains in switched networks.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following can be an expected outcome of a VLAN?()

A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
B. Trunk links can carry traffic for multiple VLANs.
C. VLAN implementation significantly increases traffic due to added trunking information.
D. VLANs can span multiple switches.
E. VLANs typically decrease the number of switches needed

2.多項(xiàng)選擇題What must an administrator do in order to successfully configure a VLAN trunk between two switches?()

A. Set each end of the trunk line to IEEE 802.1Q encapsulation.
B. Set the same VTP management domain name on both switches.
C. Set all ports on the two switched as access ports.
D. Configure one of the two switches as a VTP server.
E. Connect the two switches using a rollover cable.
F. Use a router to forward VTP traffic between the VLANs.

4.多項(xiàng)選擇題Which of following VLAN frame encapsulation types are configurable on a Cisco switch?()

A.VTP
B.802.1Q
C.LLC
D.ISL
E.CDP
F.PAP

5.多項(xiàng)選擇題When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()

A. Blocking
B. Auto
C. Desirable
D. On
E. Transparent
F. Learning

最新試題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:?jiǎn)雾?xiàng)選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:?jiǎn)雾?xiàng)選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:?jiǎn)雾?xiàng)選擇題

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

題型:多項(xiàng)選擇題

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項(xiàng)選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項(xiàng)選擇題