-
Which statements describe two of the benefits of VLAN Trunking Protocol?()
A . VTP allows routing between VLANs.
B . VTP allows a single switch port to carry information to more than one VLAN.
C . VTP allows physically redundant links while preventing switching loops.
D . VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
E . VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
F . VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
-
Which statement about vlan operation on cisco catalyst switches is true?()
A . when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table
B . unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C . ports between switches should be configured in access mode so that vlans can span across the ports
D . broadcast and multicast frames are retransmitted to ports that are configured on different vla
-
Which statements describe two of the benefits of VLAN Trunking Protocol?()
A . VTP allows routing between VLANs.
B . VTP allows a single switch port to carry information to more than one VLAN.
C . VTP allows physically redundant links while preventing switching loops.
D . VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
E . VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
F . VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
-
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
A . Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B . Routing should always be performed at the distribution layer.
C . VLANs should be localized to a switch.
D . VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
E . Routing should not be performed between VLANs located on separate switches.
-
The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()
A . Attacks are prevented by utilizing the port-security feature.
B . An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C . Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D . An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E . Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
-
You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. Which three statements are true about the voice VLAN feature on this switch?()
A . The default CoS value for incoming traffic is set up to 0.
B . The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C . PortFast is automatically disabled when a voice VLAN is configured.
D . The voice VLAN feature is disabled by default.
E . The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F . When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port
-
Which statement is false?()
A . custom URL categories cannot contain IP addresses
B . custom URL categories cannot override predefined URL categories
C . custom URL categories can contain domain names
D . custom URL categories can use regular expressio
-
Which four statements are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
-
Based on the show spanning-tree vlan 200 output shown in the exhibit,
which two statements about the STP process for VLAN 200 are true? ()
https://assets.asklib.com/images/image2/2018073109163766061.jpg
A . BPDUs will be sent out every two seconds.
B . The time spent in the listening state will be 30 seconds.
C . The time spent in the learning state will be 15 seconds.
D . The maximum length of time that the BPDU information will be saved is 30 seconds.
E . This switch is the root bridge for VLAN 200.
F . BPDUs will be sent out every 10 seconds.
-
Which three statements are typical characteristics of VLAN arrangements?()
A . A new switch has no VLANs configured.
B . Connectivity between VLANs requires a Layer 3 device.
C . VLANs typically decrease the number of collision domains.
D . Each VLAN uses a separate address space.
E . A switch maintains a separate bridging table for each VLAN.
F . VLANs cannot span multiple switches.
-
Refer to the exhibit.
Which three statements are true about the voice VLAN configuration of the Catalyst switch? ()
https://assets.asklib.com/images/image2/2018073014461894379.jpg
A . The packet priority received from a device that is connected to the phone will be unmodified.
B . The packet priority received from a device that is connected to the phone will be overridden.
C . Incoming CoS values in packets from the connected phone will be left unmodified.
D . Packets without aCoS value that is set by the phone will be set to a value of 5.
E . Incoming CoS values in packets from the connected phone will be reset to a value of 5.
F . Packets without aCoS value that is set by the phone will be set to the default CoS value.
-
Which statement is true?()
A . the L4TM allow list overrides the block list
B . the overlap of the L4TM allow list and block list is the L4TM grey list
C . the L4TM block lists override the allow lists
D . L4TM allow list and block list overlaps are not permitted
-
Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose three.)()
A . The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B . The voice VLAN feature is disabled by default.
C . The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D . When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
E . PortFast is automatically disabled when a voice VLAN is configured.
F . The default CoS value for incoming traffic is set to 0.
-
Refer to the exhibit. Which statement is true about a voice VLAN?()https://assets.asklib.com/images/image2/2018072610051691343.jpg
A . Physically the voice network and the data network are separate
B . The voice traffic will normally be on a different IP subnet than will the data traffic
C . End user intervention is necessary to place the phone into the proper VLAN
D . The same security policy should be implemented for both voice and data traffic
E . The data VLAN must be configured as the native VLAN
-
Refer to the exhibit. Which two statements are true about the output from the show standby vlan50 command?()https://assets.asklib.com/images/image2/2018072614270865427.jpg
A . The command standby 1 preempt was added to Catalyst_A
B . Catalyst_A is load sharing traffic in VLAN 50
C . Hosts using the default gateway address of 192.168.1.1 will have their traffic sent to192.168.1.11 even after Catalyst_A becomes available again
D . Hosts using the default gateway address of 192.168.1.2 will have their traffic sent toCatalyst_A
-
Given the above partial configuration, which two statements are true about VLAN traffic?()https://assets.asklib.com/images/image2/2018072410275363766.jpg
A . VLANs 1-5 will use fa0/10 as a backup only.
B . VLANs 6-10 will use fa0/10 as a backup only.
C . VLANs 1-5 will be blocked if fa0/10 goes down.
D . VLANs 1-10 are configured to load share between fa0/10 and fa0/12.
E . VLANs 6-10 have a port priority of 128 on fa0/10.
-
Refer to the exhibit.
Which statement is true when voice traffic is forwarded on the same VLAN used by the data traffic? ()
https://assets.asklib.com/images/image2/2018073014372698425.jpg
A . The voice traffic cannot be forwarded to the distribution layer.
B . The voice traffic cannot use 802.1p priority tagging.
C . Port security cannot be enabled on the switch that is attached to the IP phone.
D . Quality of service cannot be applied for the voice traffic.
-
Which statement about vlan operation on cisco catalyst switches is true?()
A . when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
B . unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C . ports between switches should be configured in access mode so that vlans can span across the ports
D . broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
-
A hacker on the Company network is attempting to hop onto a different VLAN. Which two statements about VLAN hopping are true? ()
A . An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
B . Configuring an interface with the "switchport mode dynamic" command will prevent VLAN hopping.
C . Attacks are prevented by utilizing the port-security feature.
D . Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
E . An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.
-
A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()
A . For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.
B . For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.
C . Direct inter-vlan communication does not require OSPF
D . OSPF cannot be used if router-on-a-stick is configured on the router
-
Refer to the exhibit. Which statement is true about a voice VLAN?()https://assets.asklib.com/images/image2/2018072410435948132.jpg
A . Physically the voice network and the data network are separate.
B . The voice traffic will normally be on a different IP subnet than will the data traffic.
C . End user intervention is necessary to place the phone into the proper VLAN.
D . The same security policy should be implemented for both voice and data traffic.
E . The data VLAN must be configured as the native VLAN.
-
Which statement describes the WLCv5.2 delivery of a multicast packet from a wired PC source on VLAN_X to a respective wireless client using SSID_X, using a WLAN controller enabled for multicast?()
A . A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, and finally to all wireless clients of that Cisco WLC, via wireless multicast.
B . A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, and finally to all wireless clients of that Cisco WLC, via wireless unicast.
C . A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joinedwireless clients via wireless multicast.
D . A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joined wireless clients via wireless multicast.
E . A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joinedwireless clients via wireless unicast.
F . A packet is delivered to Cisco WLC and forwarded via unicast to all of its associated APs, discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X joined wireless clients via wireless unicast.
-
Read the following statements. Judge which statements are true and which statements are false.1 Confucius took non-action as the principal doctrine.
-
Which statement is the main idea of the second paragraph?Which statement is the main idea of paragraph 2?