多項(xiàng)選擇題Which three of these statements regarding 802.1Q trunking are correct? ()

A.802.1Q native VLAN frames are untagged by default.
B.802.1Q trunking ports can also be secure ports.
C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D.802.1Q trunks require full-duplex, point-to-point connectivity.
E.802.1Q trunks should have native VLANs that are the same at both ends.


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題Which are valid modes for a switch port used as a VLAN trunk? ()

A.transparent
B.auto
C.on
D.desirable

3.單項(xiàng)選擇題What is one benefit of PVST+?()

A.PVST+reduces the CPU cycles for all the switches in the network
B.PVST+automatically selects the root bridge location,to provide optimized bandwidth usage.
C.PVST+allow the root switch location to be optimized per vlan.
D.PVST+supports Layer 3 load balancing without loops.

5.單項(xiàng)選擇題

Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()
 

A.Host B and the switch need to be in the same subnet.
B.The switch needs and appropriate default gateway assigned.
C.The switch interface connected to the router is down.
D.Host B need to be assigned an IP address in vlan 1.
E.The switch interfaces need the appropriate IP addresses assigned.

6.多項(xiàng)選擇題Which two of these are characteristics of the 802.1Q protocol?()

A.it is a layer 2 messaging protocol which maintains vlan configurations across network.
B.it includes an 8-bit field which specifies the priority of a frame.
C.it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D.it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E.it is a trunking protocol capable of carring untagged frames.

7.單項(xiàng)選擇題

Based on the network shown in the graphic which option contains the potential networking problem and protocol or setting that can to prevent the problem?()

A.Routing loops, hold down timers
B.Switching loops, split horizon
C.Routing loops, split horizon
D.Switching loops, VTP
E.Routing loops, STP
F.Switching loops, STP

8.單項(xiàng)選擇題Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()

A.ping address
B.tracert address
C.traceroute address
D.arp address

9.多項(xiàng)選擇題Which two benefits are provided by creating VLANs? ()

A.added security
B.dedicated bandwidth
C.provides segmentation
D.allows switches to route traffic between subinterfaces
E.contains collisions

10.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true?()

A.The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.
B.VLAN 20 is running the Per VLAN Spanning Tree Protocol.
C.The MAC address of the root bridge is 0017.596d.1580.
D.SwitchA is not the root bridge, because not all of the interface roles are designated.