多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label

多选题
Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()
A

Service Ethertype

B

ISL

C

PseudoLAN TAG

D

802.1q VLAN TAG

E

Control Word

F

Tunnel Label


参考解析

解析: 暂无解析

相关考题:

Which of the following are VLAN frame. encapsulation types that may be configured on a Catalyst switch? (Choose two.)A. VTPB. ISLC. CDPD. 802.1QE. 802.1pF. LLC

You need to configure two Ezonexam switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?A. STPB. 802.1QC. VLSMD. ISLE. VTPF. HSRPG. None of the above

Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

Which two of these are characteristics of the 802.1Q protocol?() A. it is a layer 2 messaging protocol which maintains vlan configurations across network.B. it includes an 8-bit field which specifies the priority of a frame.C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E. it is a trunking protocol capable of carring untagged frames.

Refer to the exhibit. Which statement is true?() A.The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.B.VLAN 20 is running the Per VLAN Spanning Tree Protocol.C.The MAC address of the root bridge is 0017.596d.1580.D.SwitchA is not the root bridge, because not all of the interface roles are designated.

Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?() A.VTPB.802.1QC.RSTPD.STP

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree  Protocol IEEE 802.1D? ()A、Designated Root CostB、bridge ID priorityC、max ageD、bridge ID MAC addressE、Designated Root PriorityF、forward delay

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()A、Designated Root CostB、bridge ID priorityC、max ageD、bridge ID MAC addressE、Designated Root PriorityF、forward delay

Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()A、Service EthertypeB、ISLC、PseudoLAN TAGD、802.1q VLAN TAGE、Control WordF、Tunnel Label

Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true

For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()A、root portB、backup portC、designated portD、alternate port

Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.

n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()A、port tunneling on the Ethernet subinterfaceB、VLAN tunneling on the Ethernet trunkC、port tunneling on the Ethernet interfaceD、VLAN tunneling on the Ethernet VLAN subinterfaceE、port tunneling on the Ethernet trunk

Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.

Which two statements are true about AH?() (Choose two.)A、AH provides data integrity.B、AH is identified by IP protocol 50.C、AH is identified by IP protocol 51.D、AH cannot work in conjunction with ESP

多选题Which two of these are recommended practices with trunks?()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

多选题Which of the following are VLAN frame encapsulation types that may be configured on a Catalyst switch?()AVTPBISLCCDPD802.1QE802.1pFLLC

单选题Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()AVTPB802.1QCRSTPDSTP

多选题n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()Aport tunneling on the Ethernet subinterfaceBVLAN tunneling on the Ethernet trunkCport tunneling on the Ethernet interfaceDVLAN tunneling on the Ethernet VLAN subinterfaceEport tunneling on the Ethernet trunk

多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.

多选题Which two of these are recommended practices with trunks? ()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

多选题Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree Protocol IEEE 802.1D?()ADesignated Root CostBbridge ID priorityCmax ageDbridge ID MAC addressEDesignated Root PriorityFforward delay

多选题Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()AConfigure a dynamic routing protocol.BConfigure SVI interfaces with IP addresses and subnet masks.CConfigure switch ports with network addresses.DConfigure switch ports with the autostate exclude command.EDocument the MAC addresses of the switch ports.

单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()AIt is a label distribution protocol for MPLSBIt is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkCTag distribution Protocol (TDP) was the basis for LDPDAll of the above are true

多选题Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A802.1XBCisco Temporal Key Integrity Protocol (CKIP)CExtensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)DCisco Message Integrity Check (CMIC)EOne-Time Passwords (OTP)FAdvanced Encryption Standard (AES)

多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label

多选题Which two of these are characteristics of the 802.1Q protocol?()Ait is a layer 2 messaging protocol which maintains vlan configurations across network.Bit includes an 8-bit field which specifies the priority of a frame.Cit is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.Dit modifies the 802.3 frame header,and thus requires that the FCS be recomputed.Eit is a trunking protocol capable of carring untagged frames.