多选题When configuring unified ports on a 5548 switch, which port ordering must be respected?()AFibre Channel ports must be configured from the first port in the module.BEthernet ports must be configured from the last port in the module.CFibre Channel ports must be configured from the last port in the module.DEthernet ports must be configured from the first port in the module.

多选题
When configuring unified ports on a 5548 switch, which port ordering must be respected?()
A

Fibre Channel ports must be configured from the first port in the module.

B

Ethernet ports must be configured from the last port in the module.

C

Fibre Channel ports must be configured from the last port in the module.

D

Ethernet ports must be configured from the first port in the module.


参考解析

解析: 暂无解析

相关考题:

Which three connection options are available when configuring a switch port to be part of a privateVLAN? ()(Choose three.) A. isolated modeB. switchport modeC. modular modeD. community modeE. promiscuous modeF. global mode

Which three connection options are available when configuring a switch port to be part of aprivate VLAN? ()(Choose three.) A. is olated modeB. switchport modeC. modular modeD. community modeE. promiscuous modeF. global mode

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。 A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

Which two of the following statements describe a routed switch port on a multilayer switch?()A、Layer 2 switching and Layer 3 routing are mutually supported.B、The port will not be associated with any VLAN.C、The routed switch port supports VLAN subinterfaces.D、The routed switch port is used when a switch has only one port per VLAN or subnet.E、The routed switch port ensures that STP remains in the forwarding state.

Which switch port error is an indication of duplex mismatches on 10/100/1000 IEEE 802.3u  Gigabit Ethernet ports?()A、FCS errorsB、RuntsC、Multiple collisionsD、Alignment errors

Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

How are CTI ports in a CTI Port Group added on the CRS Server?()A、They must be created in Cisco Unified CallManager in ascending order (i.e., 1001, 1002, and 1003) with no gaps or missing numbers in the group.  B、They can be assigned as a range of ports in CRS Application Administration.  C、They are the same as the CTI Route Points in the Cisco Unified CallManager and automatically built in CRS when they are associated with the JTAPI user.  D、They are the same as the CTI Route Points in the Cisco Unified CallManager and automatically built in CRS when they are associated with the RM JTAPI user.

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.

Which three connection options are available when configuring a switch port to be part of a privateVLAN? ()(Choose three.)A、isolated modeB、switchport modeC、modular modeD、community modeE、promiscuous modeF、global mode

In a high-availability deployment, when the Cisco CRS Administrator adds a JTAPI Call Control Group with 100 CTI ports, how many device records will be added to the Cisco Unified CallManager database?()A、CTI Ports are not added by the creation of a Call Control Group.  B、CTI ports are no longer required to be added to the Cisco Unified CallManager database.  C、100 devices will be added to the Cisco Unified CallManager database.  D、200 devices will be added to the Cisco Unified CallManager database.  E、It depends upon how many port groups these ports will be split into.  F、It depends upon the number of server nodes within the Cisco Unified CallManager cluster.

Which three connection options are available when configuring a switch port to be part of aprivate VLAN? ()(Choose three.)A、is olated modeB、switchport modeC、modular modeD、community modeE、promiscuous modeF、global mode

When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()A、BlockingB、AutoC、DesirableD、OnE、TransparentF、Learning

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

When configuring unified ports on a 5548 switch, which port ordering must be respected?()A、 Fibre Channel ports must be configured from the first port in the module.B、 Ethernet ports must be configured from the last port in the module.C、 Fibre Channel ports must be configured from the last port in the module.D、 Ethernet ports must be configured from the first port in the module.

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

单选题When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()AEnable the switch to participate in routing updates from external devices with the router command in global configuration mode.BEnter the no switchport command to disable Layer 2 functionality at the interface level.CEach port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.DRouting is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.

多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

多选题When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()ABlockingBAutoCDesirableDOnETransparentFLearning

多选题Which three connection options are available when configuring a switch port to be part of a privateVLAN? ()(Choose three.)Aisolated modeBswitchport modeCmodular modeDcommunity modeEpromiscuous modeFglobal mode

单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。AThe switch will not forward unicast frames.BThe switch will forward the frame to a specific port.CThe switch will return a copy of the frame out the source port.DThe switch will remove the destination MAC from the switch table.EThe switch will forward the frame to all ports except the port on which it was received.

多选题Which two statements are true about voice VLANs?()AVoice VLANs are only used when connecting an IP phone and a host to distinct switch portsBAccess ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesCAccess ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneDVoice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandEVoice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portFEnabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

单选题How are CTI ports in a CTI Port Group added on the CRS Server?()AThey must be created in Cisco Unified CallManager in ascending order (i.e., 1001, 1002, and 1003) with no gaps or missing numbers in the group.  BThey can be assigned as a range of ports in CRS Application Administration.  CThey are the same as the CTI Route Points in the Cisco Unified CallManager and automatically built in CRS when they are associated with the JTAPI user.  DThey are the same as the CTI Route Points in the Cisco Unified CallManager and automatically built in CRS when they are associated with the RM JTAPI user.

多选题Which of the following characteristics describe the BPDU Guard feature()AABPDU Guard port should only be configured on ports with PortFast enabled.BBPDU Guard and PortFast should not be enabled on the same port.CBPDU Guard is used to ensure that superior BPDUs are not received on a switch port.DABPDU Guard port receiving a BPDU will go into err-disablestate.EABPDU Guard port receiving a BPDU will be disabled.FBPDU Guard can be enabled on any switch port.

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.

单选题In a high-availability deployment, when the Cisco CRS Administrator adds a JTAPI Call Control Group with 100 CTI ports, how many device records will be added to the Cisco Unified CallManager database?()ACTI Ports are not added by the creation of a Call Control Group.  BCTI ports are no longer required to be added to the Cisco Unified CallManager database.  C100 devices will be added to the Cisco Unified CallManager database.  D200 devices will be added to the Cisco Unified CallManager database.  EIt depends upon how many port groups these ports will be split into.  FIt depends upon the number of server nodes within the Cisco Unified CallManager cluster.

多选题Which two of the following statements describe a routed switch port on a multilayer switch?()ALayer 2 switching and Layer 3 routing are mutually supported.BThe port will not be associated with any VLAN.CThe routed switch port supports VLAN subinterfaces.DThe routed switch port is used when a switch has only one port per VLAN or subnet.EThe routed switch port ensures that STP remains in the forwarding state.