Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?() A.VTPB.802.1QC.RSTPD.STP

Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()

A.VTP

B.802.1Q

C.RSTP

D.STP


相关考题:

You need to configure two Ezonexam switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?A. STPB. 802.1QC. VLSMD. ISLE. VTPF. HSRPG. None of the above

What is the purpose of the cisco Vlan Trunking protocol?() A. to provide a mechanism to dynamically assign vlan membership to switch portsB. to allow traffic to be carried from multiple vlans over a single link between switchesC. to allow native vlan information to be carried over a trunk linkD. to provide a mechanism to manually assign vlan membership to switch portsE. to allow for managing the additions,deletions,and changes of vlans between switchs

Which two commands can be used to verify a trunk link configuration status on a given cisco switch?() A.show interfaces interfaceB.show interfaces trunkC.show interfaces switchportD.show ip interface briefE.show interfaces vlan

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()A、The link is using IEEE 802.1Q protocolB、The link is using IEEE 802.1E protocolC、Spanning tree is disabledD、Not enough information to determineE、The native VLAN information is identical at each end of the linkF、The native VLAN information is different at each end of the link

ISL is being configured on a Company switch.  Which of the following choices are true regarding  the ISL protocol? ()A、 It can be used between Cisco and non-Cisco switch devices.B、 It calculates a new CRC field on top of the existing CRC field.C、 It adds 4 bytes of protocol-specific information to the original Ethernet frame.D、 It adds 30 bytes of protocol-specific information to the original Ethernet frame.

Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)A、Features such as UplinkFast and BackboneFast are compatible with RSTP.B、An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.C、Cisco proprietary enhancements are not transparent.D、Information about port roles is sent to all switches.E、RSTPs that are based on Cisco products require no additional configuration.

Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A、 reduction of processing in wireless controllersB、 distributed approach to authentication, encryption, and policy enforcementC、 provides security by blocking communication between access points and wireless clientsD、 access point discovery, information exchange, and configuration

Which statements describe two of the benefits of VLAN Trunking Protocol?()A、VTP allows routing between VLANs.B、VTP allows a single switch port to carry information to more than one VLAN.C、VTP allows physically redundant links while preventing switching loops.D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()A、show interfaces interfaceB、show interfaces trunkC、show interfaces switchportD、show ip interface briefE、show interfaces vlan

Which protocol provides a method of sharing VLAN configuration information between switches?()A、VTPB、STPC、ISLD、802.1QE、VLSM

What network information do you need when you plan to implement a VLAN-based solution?()A、default VLAN information for all unused switch portsB、802.1x configuration parameters C、number of IP subnets neededD、IP routing protocol information

Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()A、VTPB、802.1QC、RSTPD、STP

Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

Which three things are the building blocks of the Cisco VPLS architecture?()A、VLAN Trunk Protocol (VTP)B、State Synchronization Protocol (SSP)C、L2VPND、Ethernet Virtual Switch Interface (VSI)E、Label Distribution Protocol (LDP)

What is the purpose of the cisco Vlan Trunking protocol?()A、to provide a mechanism to dynamically assign vlan membership to switch portsB、to allow traffic to be carried from multiple vlans over a single link between switchesC、to allow native vlan information to be carried over a trunk linkD、to provide a mechanism to manually assign vlan membership to switch portsE、to allow for managing the additions,deletions,and changes of vlans between switchs

By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()A、tracerouteB、ipconfigC、ifconfigD、routeE、hostname

多选题Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()AtracerouteBipconfigCifconfigDrouteEhostname

多选题Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()Ashow interfaces interfaceBshow interfaces trunkCshow interfaces switchportDshow ip interface briefEshow interfaces vlan

多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

多选题ISL is being configured on a Company switch.  Which of the following choices are true regarding  the ISL protocol? ()AIt can be used between Cisco and non-Cisco switch devices.BIt calculates a new CRC field on top of the existing CRC field.CIt adds 4 bytes of protocol-specific information to the original Ethernet frame.DIt adds 30 bytes of protocol-specific information to the original Ethernet frame.

单选题Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A reduction of processing in wireless controllersB distributed approach to authentication, encryption, and policy enforcementC provides security by blocking communication between access points and wireless clientsD access point discovery, information exchange, and configuration

多选题Which statements describe two of the benefits of VLAN Trunking Protocol?()AVTP allows routing between VLANs.BVTP allows a single switch port to carry information to more than one VLAN.CVTP allows physically redundant links while preventing switching loops.DVTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.EVTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.FVTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

单选题What network information do you need when you plan to implement a VLAN-based solution?()Adefault VLAN information for all unused switch portsB802.1x configuration parameters Cnumber of IP subnets neededDIP routing protocol information

单选题Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()AVTPB802.1QCRSTPDSTP

单选题What is the purpose of the cisco Vlan Trunking protocol?()Ato provide a mechanism to dynamically assign vlan membership to switch portsBto allow traffic to be carried from multiple vlans over a single link between switchesCto allow native vlan information to be carried over a trunk linkDto provide a mechanism to manually assign vlan membership to switch portsEto allow for managing the additions,deletions,and changes of vlans between switchs

多选题You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()AThe link is using IEEE 802.1Q protocolBThe link is using IEEE 802.1E protocolCSpanning tree is disabledDNot enough information to determineEThe native VLAN information is identical at each end of the linkFThe native VLAN information is different at each end of the link