Which three elements must be used when you configure a router interface for vlan trunking?() A. one IP network or subnetwork for each subinterfaceB. subinterface numbering that matches vlan tagesC. subinterface encapsulation identifiers that match vlan tagsD. a management domain for each subinterfaceE. one physical interface for each subinterfaceF. one subinterface per vlan

Which three elements must be used when you configure a router interface for vlan trunking?()

A. one IP network or subnetwork for each subinterface

B. subinterface numbering that matches vlan tages

C. subinterface encapsulation identifiers that match vlan tags

D. a management domain for each subinterface

E. one physical interface for each subinterface

F. one subinterface per vlan


相关考题:

A new switch is being installed in the Ezonexam network and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply).A.You must set each end of the trunk line to IEEE 802.1e encapsulation.B.You must set the same VTP management domain name on both switches.C.You must set all ports on the two switches as access ports.D.You must configure one of the switches as a VTP server.E.You must use a rollover cable to connect the two switches.

You wish to configure IPv6 support on a router which does not have any current IPv4 configuration.Which three steps are used to configure IPv6 with an accompanying IGP in JUNOS software? () A. set protocols isis inet6B. set routing-options router-id router-idC. set protocols ospf3 area 0 interface allD. set interface fe-0/0/1 unit 0 family inet6E. set routing-options ipv6-router-id router-id

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? () A. Configure a non-unique address on the loopback interface for use by the PIM RP.B. Configure MSDP with the unique address (router ID) as the local address of the peer.C. Configure MSDP with the non-unique address (router ID) as the local address of the peer.D. Configure a unique address on the loopback interface, used as the PIM RP.

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

You are about to configure PPP n the interface of a Cisco router. Which authentication methods could you use?() A.SSLB.SLIPC.PAPD.LAPBE.CHAPF.VNP

Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()A、The Cisco Control VLAN carries only Layer 2 control trafficB、802.1Q trunking is used between the access switch and the routerC、There is no 802.1Q trunking used in these designsD、When 802.1Q trunks are configured, they are also called Native VLANsE、Trunking Ensures that traffic from only one VLAN is carried on that trunk

When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface

Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()A、Source interface where encrypted traffic originatesB、IP address for the remote peerC、Transform set for the IPsec tunnelD、Interface for the VPN connection

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()A、Configure a non-unique address on the loopback interface for use by the PIM RP.B、Configure MSDP with the unique address (router ID) as the local address of the peer.C、Configure MSDP with the non-unique address (router ID) as the local address of the peer.D、Configure a unique address on the loopback interface, used as the PIM RP.

Which three elements must be used when you configure a router interface for vlan trunking?()A、one IP network or subnetwork for each subinterfaceB、subinterface numbering that matches vlan tagesC、subinterface encapsulation identifiers that match vlan tagsD、a management domain for each subinterfaceE、one physical interface for each subinterfaceF、one subinterface per vlan

Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.

What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface

You are about to configure PPP n the interface of a Cisco router. Which authentication methods could you use?()A、SSLB、SLIPC、PAPD、LAPBE、CHAPF、VNP

You need to configure a new Cisco router to be installed in the Company VOIP network.  Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()A、switchport voice vlan vlan-idB、mls qos trust device cisco-phoneC、switchport priority extend cos_valueD、mls qos trust cosE、mls qos trust override cos

A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()A、You must set each end of the trunk line to IEEE 802.1e encapsulation.B、You must set the same VTP management domain name on both switches.C、You must set all ports on the two switches as access ports.D、You must configure one of the switches as a VTP server.E、You must use a rollover cable to connect the two switches.

Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

多选题You wish to configure IPv6 support on a router which does not have any current IPv4 configuration.Which three steps are used to configure IPv6 with an accompanying IGP in JUNOS software? ()Aset protocols isis inet6Bset routing-options router-id router-idCset protocols ospf3 area 0 interface allDset interface fe-0/0/1 unit 0 family inet6Eset routing-options ipv6-router-id router-id

多选题You are about to configure PPP n the interface of a Cisco router. Which authentication methods could you use?()ASSLBSLIPCPAPDLAPBECHAPFVNP

多选题You need to configure a new Cisco router to be installed in the Company VOIP network.  Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()Aswitchport voice vlan vlan-idBmls qos trust device cisco-phoneCswitchport priority extend cos_valueDmls qos trust cosEmls qos trust override cos

多选题To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?()AEach end of the trunk line must be set to IEEE 802.1E encapsulation.BThe VTP management domain name of both switches must be set the same.CAll ports on both the switches must be set as access ports.DOne of the two switches must be configured as a VTP server.EA rollover cable is required to connect the two switches together.FA router must be used to forward VTP traffic between VLANs.

多选题You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()AThe crypto ACL numberBThe IPSEC mode (tunnel or transport)CThe GRE tunnel interface IP addressDThe GRE tunnel source interface or IP address, and tunnel destination IP addressEThe MTU size of the GRE tunnel interface

多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.

多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface

多选题Which two statements are true about voice VLANs?()AVoice VLANs are only used when connecting an IP phone and a host to distinct switch portsBAccess ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesCAccess ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneDVoice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandEVoice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portFEnabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

多选题Which three elements must be used when you configure a router interface for vlan trunking?()Aone IP network or subnetwork for each subinterfaceBsubinterface numbering that matches vlan tagesCsubinterface encapsulation identifiers that match vlan tagsDa management domain for each subinterfaceEone physical interface for each subinterfaceFone subinterface per vlan