An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two)A. The switch must be reachable through a port connected to its management VLAN.B. The switch console port must be connected to the Ethernet LAN.C. The switch must be fully configured as an SNMP agent.D. The switch must be configured with an IP address, subnet mask, and default gateway.E. The switch management VLAN must be created and have a membership of at least one switch port.F. The switch must be connected to a router over a VLAN trunk.

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two)

A. The switch must be reachable through a port connected to its management VLAN.

B. The switch console port must be connected to the Ethernet LAN.

C. The switch must be fully configured as an SNMP agent.

D. The switch must be configured with an IP address, subnet mask, and default gateway.

E. The switch management VLAN must be created and have a membership of at least one switch port.

F. The switch must be connected to a router over a VLAN trunk.


相关考题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

Why would the Ezonexam administrator change the value of the spanning-tree priority of a switch?A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP serverF. None of the above

As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A. isolated modeB. modular modeC. community modeD. promiscuous modeE. non-isolatedF. permanent

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A. The switch name must match the workgroup name of the local network.B. The switch must be configured with an IP address and default gateway.C. The remote workstations must have access to the management VLAN of the switch.D. CDP must be enabled on the switch so that it can be located by other devices on the network.

Why would an administrator change the value of the spanning-tree priority of a switch?() A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP server

Why would a network administrator configure port security on a switch?() A. To prevent unauthorized Telnet access to a switch port.B. To limit the number of Layer 2 broadcasts on a particular switch port.C. To prevent unauthorized hosts from accessing the LAN.D. To protect the IP and MAC address of the switch and associated ports.E. To block unauthorized access to the switch management interfaces over common TCP ports.

A system administrator installed a new switch using a script to configure it. IP connectivity was tested using pings to SwitchB. Later attempts to access NewSwitch using Telnet from SwitchA failed. Which statement is true?()A. Executing password recovery is required.B. The virtual terminal lines are misconfigured.C. Use Telnet to connect to RouterA and then to NewSwitch to correct the error.D. Power cycle of NewSwitch will return it to a default configuration.

Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

Why would an administrator change the value of the spanning-tree priority of a switch?()A、in order to optimize the path that frames take from source to destinationB、to increase the priority so a designated port will become a root portC、to increase the BID, so the switch is more likely to become root bridgeD、in order to allow VLANs to be sent from one switch to another across a single linkE、to force a given switch to become an STP server

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address,subnet mask,and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch port.F、The switch must be fully configured as an SNMP agent.

As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A、isolated modeB、modular modeC、community modeD、promiscuous modeE、non-isolatedF、permanent

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address, subnet mask, and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()A、Reverse ARPB、Full duplex on the fiber linkC、PoED、802.1q trunking

Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

An administrator is looking for the "Open Restricted Shell Terminal" option on the HMC GUI. Under which panel is this option available?() A、HMC Management, but only from a local connectionB、Service Management, but only from a local connection.C、Systems Management, but only from a local connection.D、Systems Management, but only from a remote connection.

An administrator is looking for the "Open RestrictedShell Terminal" option on the HMC GUI. Under which panel is this option available?()A、HMC Management, but only from a local connection.B、Service Management, but only from a local connection.C、Systems Management, but only from a local connection.D、Systems Management, but only from a remote connection.

多选题You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()AThe switch name must match the workgroup name of the local network.BThe switch must be configured with an IP address and default gateway.CThe remote workstations must have access to the management VLAN of the switch.DCDP must be enabled on the switch so that it can be located by other devices on the network.

单选题Why would a network administrator configure port security on a switch?()Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports

多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address, subnet mask, and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch

单选题Why would an administrator change the value of the spanning-tree priority of a switch?()Ain order to optimize the path that frames take from source to destinationBto increase the priority so a designated port will become a root portCto increase the BID, so the switch is more likely to become root bridgeDin order to allow VLANs to be sent from one switch to another across a single linkEto force a given switch to become an STP server

多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address,subnet mask,and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch port.FThe switch must be fully configured as an SNMP agent.

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.

多选题As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)Aisolated modeBmodular modeCcommunity modeDpromiscuous modeEnon-isolatedFpermanent

单选题Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()AReverse ARPBFull duplex on the fiber linkCPoED802.1q trunking