单选题You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one? ()A Both support normal and extended VLAN ranges.B ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.C ISL encapsulates the original frame.D Both support native VLANs.E 802.1Q does not encapsulate the original frame.

单选题
You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one? ()
A

 Both support normal and extended VLAN ranges.

B

 ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.

C

 ISL encapsulates the original frame.

D

 Both support native VLANs.

E

 802.1Q does not encapsulate the original frame.


参考解析

解析: 暂无解析

相关考题:

A new switch is being installed in the Ezonexam network and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply).A.You must set each end of the trunk line to IEEE 802.1e encapsulation.B.You must set the same VTP management domain name on both switches.C.You must set all ports on the two switches as access ports.D.You must configure one of the switches as a VTP server.E.You must use a rollover cable to connect the two switches.

Which two statements about the use of SCREEN options are correct? ()(Choose two.) A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()A.GLBPB.RSTPC.BPDU guardD.root guard

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A. It provides reliable input for verifying network consistency.B. It requires a network audit to support some upgrade decisions.C. It requires a network audit to support any network restructuring.D. It begins with gathering organizational input that may be inaccurate.

A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches.Which of the following must you do to accomplish this?()A. You must set each end of the trunk line to IEEE 802.1e encapsulation.B. You must set the same VTP management domain name on both switches.C. You must set all ports on the two switches as access ports.D. You must configure one of the switches as a VTP server.E. You must use a rollover cable to connect the two switches.

Which two of these are recommended practices with trunks? () A. use ISL encapsulationB. use 802.1q encapsulationC. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD. use VTP server mode to support dynamic propagation of VLAN information across the networkE. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A、 The VSS switch must be the root bridge for all VLANs and is automatically designatedB、 The VSS switch is defined in RFC 4318 as a managed objectC、 The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD、 A VSS interoperates with a virtual port channelE、 The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF、 A VSS increases the size of the spanning-tree domain

Which two of these are recommended practices with trunks? ()A、 use ISL encapsulationB、 use 802.1q encapsulationC、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、 use VTP server mode to support dynamic propagation of VLAN information across the network E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、Two network adapters that support 802.1p, and one iSCSI host bus adapterB、Two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyC、Two network adapters that support 802.lq, and one network adapter that supports Jumbo framesD、Three network adapters that support 802. 1p

Which two statements about the use of SCREEN options are correct? ()(Choose two.)A、SCREEN options offer protection against various attacksB、SCREEN options are deployed prior to route and policy processing in first path packet processingC、SCREEN options are deployed at the ingress and egress sides of a packet flowD、SCREEN options, you must take special care to protect OSPF

You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one?()A、Both support normal and extended VLAN ranges.B、ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.C、ISL encapsulates the original frame.D、Both support native VLANs.E、802.1Q does not encapsulate the original frame.

Which two of these are recommended practices with trunks?()A、use ISL encapsulationB、use 802.1q encapsulationC、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、use VTP server mode to support dynamic propagation of VLAN information across the networkE、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()A、Both switches must be in the same VTP domain.B、The encapsulation type of both ends of the trunk does not have to match.C、The native VLAN on both ends of the trunk must be VLAN 1.D、802.1Q trunking can only be configured on a Layer 2 port.E、In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?() A、Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.B、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.C、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.D、Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()A、Use Accessibility Options in Control Panel to reconfigure accessibility idle time settingsB、Use Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingC、Use Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsD、Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.

多选题Which two of these are recommended practices with trunks?()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

单选题You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one?()ABoth support normal and extended VLAN ranges.BISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.CISL encapsulates the original frame.DBoth support native VLANs.E802.1Q does not encapsulate the original frame.

单选题Which of the following Frame-Relay encapsulation commands would you use, if you had to connect your Cisco router to a non-Cisco router?()ATestKRouter(config-if)# Encapsulation frame-relay dot1qBTestKRouter(config-if)# Encapsulation frame-relay aal5snapCTestKRouter(config-if)# Encapsulation frame-relay ietfDTestKRouter(config-if)# Encapsulation frame-relay islENone of the above

单选题You are preparing to create a point to point WAN by connecting a Cisco router with a Juniper router by way of their serial links. Which one of the following commands would you use?()ATK1(config-if)# encapsulation hdlc ansiBTK1(config-if)# encapsulation pppCTK1(config-if)# encapsulation LAPDDTK1(config-if)# encapsulation frame-relay ietfETK1(config)#encapsulation ppp

多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.

单选题As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()AGLBPBRSTPCBPDU guardDroot guard

多选题Which two of these are recommended practices with trunks? ()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagation of VLAN information across the networkEset DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

单选题A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()ABoth switches must be in the same VTP domain.BThe encapsulation type of both ends of the trunk does not have to match.CThe native VLAN on both ends of the trunk must be VLAN 1.D802.1Q trunking can only be configured on a Layer 2 port.EIn 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

单选题Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?()ADeploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.BDeploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.CDeploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.DDeploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

单选题You need to connect two Company core switches via an ISL trunk.  Which statement is true  regarding the configuration of ISL trunks? ()A A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.B All Catalyst switches support ISL trunking.C A Catalyst switch will report giants if one side is configured for ISL while the other side is not.D ISL trunking requires that native VLANs match.E None of the other alternatives apply

单选题You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()Athree network adapters that support 802.1pBtwo network adapters that support 802.1q, and one iSCSI host bus adapterCtwo network adapters that support 802.1p, and one network adapter that supports TCP ChimneyDtwo network adapters that support 802.1q, and one network adapter that supports Jumbo frames

单选题You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one? ()A Both support normal and extended VLAN ranges.B ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.C ISL encapsulates the original frame.D Both support native VLANs.E 802.1Q does not encapsulate the original frame.