When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

When configuring private VLANs, which configuration task must you do first?()

  • A、Configure the private VLAN port parameters.
  • B、Configure and map the secondary VLAN to the primary VLAN.
  • C、Disable IGMP snooping.
  • D、Set the VTP mode to transparent.

相关考题:

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?() A. HostnameB. fully qualified domain nameC. IP addressD. address book entry

When configuring OSPF on the ERX, what is the default auto-cost reference-bandwidth value?() A.AB.BC.CD.D

When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()A、Any matching state condition will result with the state being triggeredB、 Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to triggerC、 All specified state conditions are used as part of the requirements tobe met to for the state to triggerD、 Once the state conditions are met, they become persistent and can only be removed using the Reset feature

When configuring a scheduler map, which two are referenced?()A、Forwarding ClassB、SchedulerC、Rewrite RulesD、Priority

When configuring QoS on a wireless controller, the per-user, real-time bandwidth contract isenforced for which of the following protocols?()A、IPXB、IPC、UDPD、TCP

When configuring IPCC Express Enhanced, what is the maximum number of skills that an agent can be associated with? ()A、15  B、20  C、25  D、30  E、40  F、50

What must be set correctly when configuring a serial interface so that higher-level protocols calculate the best route?()A、bandwidthB、delayC、loadD、reliability

When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()A、 Database serverB、 NTP serverC、 DHCP serverD、 SQL serverE、 DNS serverF、 Domain name

When configuring surround sound systems, speaker delay is used to compensate for speaker().A、distanceB、powerC、sizeD、efficiency

When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.

多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost

单选题When configuring a serial interface on a router, what is the default encapsulation?()Aatm-dxiBframe-relayChdlcDlapbEppp

单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()AHostnameBfully qualified domain nameCIP addressDaddress book entry

单选题What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()ATCP/IP  BMultiprotocol  CNamed Pipes  DNWLink IPX/SPX