Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()A.VTPB.802.1QC.RSTPD.STP

题目
Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()

A.VTP

B.802.1Q

C.RSTP

D.STP


相似考题
参考答案和解析
参考答案:A
更多“Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?() ”相关问题
  • 第1题:

    You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()

    • A、The link is using IEEE 802.1Q protocol
    • B、The link is using IEEE 802.1E protocol
    • C、Spanning tree is disabled
    • D、Not enough information to determine
    • E、The native VLAN information is identical at each end of the link
    • F、The native VLAN information is different at each end of the link

    正确答案:A,F

  • 第2题:

    Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)

    • A、Features such as UplinkFast and BackboneFast are compatible with RSTP.
    • B、An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.
    • C、Cisco proprietary enhancements are not transparent.
    • D、Information about port roles is sent to all switches.
    • E、RSTPs that are based on Cisco products require no additional configuration.

    正确答案:B,E

  • 第3题:

    Which statements describe two of the benefits of VLAN Trunking Protocol?()

    • A、VTP allows routing between VLANs.
    • B、VTP allows a single switch port to carry information to more than one VLAN.
    • C、VTP allows physically redundant links while preventing switching loops.
    • D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
    • E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
    • F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

    正确答案:D,E

  • 第4题:

    Which protocol provides a method of sharing VLAN configuration information between switches?()

    • A、VTP
    • B、STP
    • C、ISL
    • D、802.1Q
    • E、VLSM

    正确答案:A

  • 第5题:

    Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()

    • A、VTP
    • B、802.1Q
    • C、RSTP
    • D、STP

    正确答案:A

  • 第6题:

    Which three things are the building blocks of the Cisco VPLS architecture?()

    • A、VLAN Trunk Protocol (VTP)
    • B、State Synchronization Protocol (SSP)
    • C、L2VPN
    • D、Ethernet Virtual Switch Interface (VSI)
    • E、Label Distribution Protocol (LDP)

    正确答案:C,D,E

  • 第7题:

    By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()

    • A、Create an additional ACL to block the access to VLAN 1.
    • B、Move the management VLAN to something other than default.
    • C、Move all ports to another VLAN and deactivate the default VLAN.
    • D、Limit the access in the switch using port security configuration.
    • E、Use static VLAN in trunks and access ports to restrict connections.
    • F、Shutdown all unused ports in the Catalyst switch.

    正确答案:B,F

  • 第8题:

    多选题
    Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()
    A

    traceroute

    B

    ipconfig

    C

    ifconfig

    D

    route

    E

    hostname


    正确答案: E,A
    解析: 暂无解析

  • 第9题:

    多选题
    By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()
    A

    Create an additional ACL to block the access to VLAN 1.

    B

    Move the management VLAN to something other than default.

    C

    Move all ports to another VLAN and deactivate the default VLAN.

    D

    Limit the access in the switch using port security configuration.

    E

    Use static VLAN in trunks and access ports to restrict connections.

    F

    Shutdown all unused ports in the Catalyst switch.


    正确答案: B,F
    解析: 暂无解析

  • 第10题:

    单选题
    Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()
    A

     reduction of processing in wireless controllers

    B

     distributed approach to authentication, encryption, and policy enforcement

    C

     provides security by blocking communication between access points and wireless clients

    D

     access point discovery, information exchange, and configuration


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    What network information do you need when you plan to implement a VLAN-based solution?()
    A

    default VLAN information for all unused switch ports

    B

    802.1x configuration parameters 

    C

    number of IP subnets needed

    D

    IP routing protocol information


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    What is the purpose of the cisco Vlan Trunking protocol?()
    A

    to provide a mechanism to dynamically assign vlan membership to switch ports

    B

    to allow traffic to be carried from multiple vlans over a single link between switches

    C

    to allow native vlan information to be carried over a trunk link

    D

    to provide a mechanism to manually assign vlan membership to switch ports

    E

    to allow for managing the additions,deletions,and changes of vlans between switchs


    正确答案: A
    解析: 暂无解析

  • 第13题:

    ISL is being configured on a Company switch.  Which of the following choices are true regarding  the ISL protocol? ()

    • A、 It can be used between Cisco and non-Cisco switch devices.
    • B、 It calculates a new CRC field on top of the existing CRC field.
    • C、 It adds 4 bytes of protocol-specific information to the original Ethernet frame.
    • D、 It adds 30 bytes of protocol-specific information to the original Ethernet frame.

    正确答案:B,D

  • 第14题:

    Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

    • A、 reduction of processing in wireless controllers
    • B、 distributed approach to authentication, encryption, and policy enforcement
    • C、 provides security by blocking communication between access points and wireless clients
    • D、 access point discovery, information exchange, and configuration

    正确答案:D

  • 第15题:

    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()

    • A、show interfaces interface
    • B、show interfaces trunk
    • C、show interfaces switchport
    • D、show ip interface brief
    • E、show interfaces vlan

    正确答案:B,C

  • 第16题:

    What network information do you need when you plan to implement a VLAN-based solution?()

    • A、default VLAN information for all unused switch ports
    • B、802.1x configuration parameters 
    • C、number of IP subnets needed
    • D、IP routing protocol information

    正确答案:C

  • 第17题:

    Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()

    • A、Configure a dynamic routing protocol.
    • B、Configure SVI interfaces with IP addresses and subnet masks.
    • C、Configure switch ports with network addresses.
    • D、Configure switch ports with the autostate exclude command.
    • E、Document the MAC addresses of the switch ports.

    正确答案:A,B

  • 第18题:

    What is the purpose of the cisco Vlan Trunking protocol?()

    • A、to provide a mechanism to dynamically assign vlan membership to switch ports
    • B、to allow traffic to be carried from multiple vlans over a single link between switches
    • C、to allow native vlan information to be carried over a trunk link
    • D、to provide a mechanism to manually assign vlan membership to switch ports
    • E、to allow for managing the additions,deletions,and changes of vlans between switchs

    正确答案:E

  • 第19题:

    Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()

    • A、traceroute
    • B、ipconfig
    • C、ifconfig
    • D、route
    • E、hostname

    正确答案:B,C

  • 第20题:

    多选题
    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()
    A

    show interfaces interface

    B

    show interfaces trunk

    C

    show interfaces switchport

    D

    show ip interface brief

    E

    show interfaces vlan


    正确答案: A,E
    解析: 暂无解析

  • 第21题:

    多选题
    ISL is being configured on a Company switch.  Which of the following choices are true regarding  the ISL protocol? ()
    A

    It can be used between Cisco and non-Cisco switch devices.

    B

    It calculates a new CRC field on top of the existing CRC field.

    C

    It adds 4 bytes of protocol-specific information to the original Ethernet frame.

    D

    It adds 30 bytes of protocol-specific information to the original Ethernet frame.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which statements describe two of the benefits of VLAN Trunking Protocol?()
    A

    VTP allows routing between VLANs.

    B

    VTP allows a single switch port to carry information to more than one VLAN.

    C

    VTP allows physically redundant links while preventing switching loops.

    D

    VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.

    E

    VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.

    F

    VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.


    正确答案: F,A
    解析: 暂无解析

  • 第23题:

    单选题
    Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()
    A

    VTP

    B

    802.1Q

    C

    RSTP

    D

    STP


    正确答案: B
    解析: 暂无解析

  • 第24题:

    多选题
    You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()
    A

    The link is using IEEE 802.1Q protocol

    B

    The link is using IEEE 802.1E protocol

    C

    Spanning tree is disabled

    D

    Not enough information to determine

    E

    The native VLAN information is identical at each end of the link

    F

    The native VLAN information is different at each end of the link


    正确答案: D,C
    解析: 暂无解析