多选题What are two key characteristics of VTP? ()AVTP messages are sent out all switch-switch connections.BVTP L2 messages are communicated to neighbors using CDP.CVTP manages addition, deletion, and renaming of VLANs 1 to 4094.DVTP pruning restricts flooded traffic, increasing available bandwidth.EVTP V2 can only be used in a domain consisting of V2 capable switches.FVTP V2 performs consistency checks on all sources of VLAN information.

多选题
What are two key characteristics of VTP? ()
A

VTP messages are sent out all switch-switch connections.

B

VTP L2 messages are communicated to neighbors using CDP.

C

VTP manages addition, deletion, and renaming of VLANs 1 to 4094.

D

VTP pruning restricts flooded traffic, increasing available bandwidth.

E

VTP V2 can only be used in a domain consisting of V2 capable switches.

F

VTP V2 performs consistency checks on all sources of VLAN information.


参考解析

解析: 暂无解析

相关考题:

What must the Ezonexam network administrator do in order to successfully configure a VLAN trunk between two switches named VE1 and VE2? (Select two answer choices)A. Set each end of the trunk line to IEEE 802.1Q encapsulation.B. Set the same VTP management domain name on both switches.C. Set all ports on the two switched as access ports.D. Configure one of the two switches as a VTP server.E. Connect the two switches using a rollover cable.F. Use a router to forward VTP traffic between the VLANs.

The Ezonexam network administrator has issued the "VTP password ezonexam" command on a Cisco device. What is the purpose of this command?A.It allows two VTP servers to exists in the same domain, each configured with different passwordsB.It is the password required when promoting a switch from VTP client mode to VTP server modeC.It is used to access the VTP server to make changes to the VTP configurationD.It is used to validate the sources of VTP advertisements sent between switchesE.None of the above

What must an administrator do in order to successfully configure a VLAN trunk between two switches?() A. Set each end of the trunk line to IEEE 802.1Q encapsulation.B. Set the same VTP management domain name on both switches.C. Set all ports on the two switched as access ports.D. Configure one of the two switches as a VTP server.E. Connect the two switches using a rollover cable.F. Use a router to forward VTP traffic between the VLANs.

What are two characteristics of a switch that is configured as a VTP client?() A.if a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.B.The local vlan configuration is updated only when an update that has a higher configuration revision number is received.C.Vtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.D.When switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.E.Vtp client is the default vtp modeF.On switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally

What are two characteristics of Telnet (Choose two.)()。 A.Itsendsdataincleartextformat.B.ItisnolongersupportedonCisconetworkdevices.C.ItismoresecurethanSSHD.Itrequiresanenterpriselicenseinordertobeimplemented.E.ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.(1)处应选________. A. streamB.symmetricC. asymmetricD.advanced

What are two characteristics of Telnet (Choose two.)()。A、Itsendsdataincleartextformat.B、ItisnolongersupportedonCisconetworkdevices.C、ItismoresecurethanSSHD、Itrequiresanenterpriselicenseinordertobeimplemented.E、ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

What is the purpose of the command shown below?vtp password Fl0r1da()A、It is used to validate the sources of VTP advertisements sent between switches.B、It is used to access the VTP server to make changes to the VTP configuration.C、It allows two VTP servers to exist in the same domain, each configured with different passwords.D、It is the password required when promoting a switch from VTP client mode to VTP server mode.E、It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

You need to investigate a VTP problem between two Company switches. The lack of which two  prevents VTP information from propagating between switches?()A、A root VTP serverB、A trunk portC、VTP priorityD、VLAN 1E、None of the other alternatives apply

What are two characteristics of the Cisco Validated Design program? ()(Choose two.)A、facilitates customer deployments that are less reliableB、facilitates customer deployments that are more predictableC、separates products and technologies into individual portfoliosD、incorporates products and technologies into a broad portfolioE、strives to protect access to design documentation

What are two characteristics of a switch that is configured as a VTP client?()A、if a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.B、The local vlan configuration is updated only when an update that has a higher configuration revision number is received.C、Vtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.D、When switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.E、Vtp client is the default vtp modeF、On switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally

What are two key characteristics of VTP? ()A、VTP messages are sent out all switch-switch connections.B、VTP L2 messages are communicated to neighbors using CDP.C、VTP manages addition, deletion, and renaming of VLANs 1 to 4094.D、VTP pruning restricts flooded traffic, increasing available bandwidth.E、VTP V2 can only be used in a domain consisting of V2 capable switches.F、VTP V2 performs consistency checks on all sources of VLAN information.

What are two characteristics of the DiffServ model?()A、service guaranteeB、traffic that is divided into classesC、not scalable to large implementationsD、QoS mechanisms that are used without prior signalingE、applications that signal their particular QoS and bandwidth requirements

What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()A、The switch will ignore VTP summary advertisements.B、The switch will forward VTP summary advertisements.C、The switch will process VTP summary advertisements.D、The switch will originate VTP summary advertisements.E、The switch will create, modify and delete VLANs for the entire VTP domain.

What are two characteristics of RIPv2? ()A、classful routing protocolB、variable-length subnet masksC、broadcast addressingD、manual route summarizationE、uses SPF algorithm to compute path

An 802.1Q trunk is not coming up between two switches. The ports on both switches are configured as "switchport mode desirable." Assuming that there is no physical issue, choose two possible causes.()A、Incorrect VTP domainB、Incorrect VTP passwordC、Incorrect VTP modeD、Incorrect VTP configuration revision

What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()A、The switch will ignore VTP summary advertisementsB、The switch will forward VTP summary advertisementsC、The switch will process VTP summary advertisementsD、The switch will originate VTP summary advertisementsE、The switch will create, modify and delete VLANs for the entire VTP domain

The Company switches have all been upgraded to use VTP version 2. What are two benefits  provided in VTP Version 2 that are not available in VTP Version 1?()A、VTP version 2 supports Token Ring VLANsB、VTP version 2 allows VLAN consistency checksC、VTP version 2 allows active redundant links when used with spanning treeD、VTP version 2 reduces the amount of configuration necessaryE、VTP version 2 saves VLAN configuration memory

多选题What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()AThe switch will ignore VTP summary advertisementsBThe switch will forward VTP summary advertisementsCThe switch will process VTP summary advertisementsDThe switch will originate VTP summary advertisementsEThe switch will create, modify and delete VLANs for the entire VTP domain

多选题What must an administrator do in order to successfully configure a VLAN trunk between two switches?()ASet each end of the trunk line to IEEE 802.1Q encapsulation.BSet the same VTP management domain name on both switches.CSet all ports on the two switched as access ports.DConfigure one of the two switches as a VTP server.EConnect the two switches using a rollover cable.FUse a router to forward VTP traffic between the VLANs.

多选题What are two characteristics of a switch that is configured as a VTP client?()Aif a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.BThe local vlan configuration is updated only when an update that has a higher configuration revision number is received.CVtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.DWhen switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.EVtp client is the default vtp modeFOn switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally

多选题What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?()AThe switch will ignore VTP summary advertisements.BThe switch will forward VTP summary advertisements.CThe switch will process VTP summary advertisements.DThe switch will originate VTP summary advertisements.EThe switch will create, modify and delete VLANs for the entire VTP domain.

多选题What are two characteristics of the Cisco Validated Design program? ()(Choose two.)Afacilitates customer deployments that are less reliableBfacilitates customer deployments that are more predictableCseparates products and technologies into individual portfoliosDincorporates products and technologies into a broad portfolioEstrives to protect access to design documentation

多选题To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?()AEach end of the trunk line must be set to IEEE 802.1E encapsulation.BThe VTP management domain name of both switches must be set the same.CAll ports on both the switches must be set as access ports.DOne of the two switches must be configured as a VTP server.EA rollover cable is required to connect the two switches together.FA router must be used to forward VTP traffic between VLANs.

单选题What is the purpose of the command shown below vtp password Fl0r1da()。AIt is used to validate the sources of VTP advertisements sent between switches.BIt is used to access the VTP server to make changes to the VTP configuration.CIt allows two VTP servers to exist in the same domain, each configured with different passwords.DIt is the password required when promoting a switch from VTP client mode to VTP server mode.EIt is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

多选题What are two characteristics of RIPv2?()Aclassful routing protocolBvariable-length subnet masksCbroadcast addressingDmanual route summarizationEuses SPF algorithm to compute path

多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.