Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()

  • A、Configure a dynamic routing protocol.
  • B、Configure SVI interfaces with IP addresses and subnet masks.
  • C、Configure switch ports with network addresses.
  • D、Configure switch ports with the autostate exclude command.
  • E、Document the MAC addresses of the switch ports.

相关考题:

Which of the following steps are necessary in order to add a new VLAN to the Ezonexam switched network? (Select all that apply)A.Create the VLAN.B.Name the VLAN.C.Configure an IP address for the VLAN.D.Add the desired ports to the new VLAN.E.Add the VLAN to the VTP domain.

Users are unable to access resources in the 172.23.14.0/24 subnet.Referring to the exhibit, which two actions would solve this problem?() A. Configure a separate routing instance.B. Configure a default static route.C. Configure a static route to 172.23.14.0/24.D. Configure the existing routes to resolve the indirect next hop.

Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation,which three of the following steps are necessary to take?()A. Start LDP.B. Enable CEF switching.C. Configure conditional label advertising.D. Enable label switching on frame mode interfaces.E. disable IP TTL propagationF. configure conditional label advertising

Refer to the network of Layer 3 switches in the exhibit. The RPI Multi cast Server only multicasts to hosts connected to multilayer switches 5 and 6. The CMU Multicast Server multicasts to hosts on multilayer switches 1 - 6. Given the number of configuration steps involved, what is the most efficient way to configure the net work while meeting the requirements for multicast data flow? ()A. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Specify switch 1 as the root for the RPI Multicast Server. Specify switch 2 as the root for the CMU Multicast Server.B. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode. Leave each multicast server as the root of its own multicast tree.C. Configure each switch with PIM sparse - dense mode. Configure switch 3 as a ren dezvous point for the RPI multicast stream.D. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Allow the switches to elect their own root for each multicast tree.E. Configure each switch with PIM sparse mode.F. Configure each switch with PIM dense mode.

Which of the following steps are necessary in order to add a new VLAN to a switched network?() A. Create the VLAN.B. Name the VLAN.C. Configure an IP address for the VLAN.D. Add the desired ports to the new VLAN.E. Add the VLAN to the VTP domain.

How should arouter that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?() A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interfaceB.Configure each Frame Relay circuit as apoint-to-point line to support multicast and broadcast trafficC.Configure many sub-interfaces on the same subnetD.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces

It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit.Which of the following processes are required to accomplish this task?() A. configure static frame relay map entries for each subinterface network.B. remove the ip address from the physical interfaceC. create the virtual interfaces with the interface commandD. configure each subinterface with its own IP addressE. disable split horizon to prevent routing loops between the subinterface networksF. encapsulate the physical interface with multipoint PPP

A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems (Choose two.)()。 A.Configure the gateway on Host A as 10.1.1.1B.Configure the gateway on Host B as 10.1.2.254C.Configure the IP address of Host A as 10.1.2.2D.Configure the IP address of Host B as 10.1.2.2E.Configure the masks on both hosts to be 255.255.255.224F.Configure the masks on both hosts to be 255.255.255.240

Which of the following steps are necessary in order to add a new VLAN to a switched network?()A、Create the VLAN.B、Name the VLAN.C、Configure an IP address for the VLAN.D、Add the desired ports to the new VLAN.E、Add the VLAN to the VTP domain.

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

Your network contains two DHCP servers. The DHCP servers are named DHCP1 and DHCP2. The   internal network contains 1,000 DHCP client computers that are located on a single subnet. A routerseparates the internal network from the Internet. The router has a single IP address on the internal  interface. DHCP1 has the following scope information. èStarting IP address: 172.16.0.1  èEnding IP address: 172.16.7.255  èSubnet mask: 255.255.240.0   You need to provide a fault-tolerant DHCP infrastructure that supports the client computers on the internal  network. In the event that a DHCP server fails, all client computers must be able to obtain a valid IP  address. How should you configure DHCP2?() A、Create a scope for the subnet 172.16.0.0/20. Configure the scope to use a starting IP address of  172.16.8.1 and an ending IP address of 172.16.15.254.B、Create a scope for the subnet 172.16.0.0/21. Configure the scope to use a starting IP address of  172.16.0.1 and an ending IP address of 172.16.15.254.C、Create a scope for the subnet 172.16.8.0/21. Configure the scope to use a starting IP address of  172.16.8.1 and an ending IP address of 172.16.10.254.D、Create a scope for the subnet 172.17.0.0/16. Configure the scope to use a starting IP address of  172.17.0.1 and an ending IP address of 172.17.255.254.

Which three steps are used to configure IPv6 in JUNOS software?()A、Assign 128-bit router IDB、Enable a routing instance.C、Assign IPv6 addresses to interfaces.D、Add IPv6 family support to interfaces

Which two of these steps are minimum requirements to configure OSPFv3 under IPv6?()A、Configure a routing process using the command ipv6 router ospf [process-id].B、Add the network statement for the interfaces on which OSPF will run.C、Configure OSPF on the interface that it will run on.D、Use the passive-interface command on the interfaces on which OSPF should not run.E、Enable routing.

It has become necessary to configure an existing serial interface to accept a second Frame Relay virtualcircuit.Which of the following processes are required to accomplish this task?()A、configure static frame relay map entries for each subinterface network.B、remove the ip address from the physical interfaceC、create the virtual interfaces with the interface commandD、configure each subinterface with its own IP addressE、disable split horizon to prevent routing loops between the subinterface networksF、encapsulate the physical interface with multipoint PPP

How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()A、Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.B、Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.C、Configure many sub-interfaces on the same subnet.D、Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

You need to configure connectors between each routing group. What are two possible ways to achieve this goal?()A、Create and configure SMTP connectors between the routing groups. Do not create additional connectors between the routing groupsB、Create and configure routing group connectors between the routing groups. Do not create additional connectors between routing groupsC、Create and configure low-cost group connectors and high-cost SMTP connectors between the routing groupsD、Create and configure high-cost routing group connectors and low-cost SMTP connectors between the routing groups

Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()A、From the Static Routes node, configure a static route.B、From the server properties, configure SSL Certificate Binding.C、From the NAT interface, add an address pool and a reservation.D、From the NAT interface, configure the Secure Web Server (HTTPS) service.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

多选题It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit.Which of the following processes are required to accomplish this task?()Aconfigure static frame relay map entries for each subinterface network.Bremove the ip address from the physical interfaceCcreate the virtual interfaces with the interface commandDconfigure each subinterface with its own IP addressEdisable splithorizon to prevent routing loops between the subinterface networksFencapsulate the physical interface with multipoint PPP

多选题Which three steps are used to configure IPv6 in JUNOS software?()AAssign 128-bit router id.BEnable a routing instance.CAssign IPv6 addresses to interfaces.DAdd IPv6 family support to interfaces.EEnable IPv6-capable routing protocol.

多选题Which two of these steps are minimum requirements to configure OSPFv3 under IPv6?()AConfigure a routing process using the command ipv6 router ospf [process-id].BAdd the network statement for the interfaces on which OSPF will run.CConfigure OSPF on the interface that it will run on.DUse the passive-interface command on the interfaces on which OSPF should not run.EEnable routing.

多选题Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()AConfigure a dynamic routing protocol.BConfigure SVI interfaces with IP addresses and subnet masks.CConfigure switch ports with network addresses.DConfigure switch ports with the autostate exclude command.EDocument the MAC addresses of the switch ports.