单选题When configuring private VLANs, which configuration task must you do first?()AConfigure the private VLAN port parameters.BConfigure and map the secondary VLAN to the primary VLAN.CDisable IGMP snooping.DSet the VTP mode to transparent.
单选题
When configuring private VLANs, which configuration task must you do first?()
A
Configure the private VLAN port parameters.
B
Configure and map the secondary VLAN to the primary VLAN.
C
Disable IGMP snooping.
D
Set the VTP mode to transparent.
参考解析
解析:
暂无解析
相关考题:
Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link()。 A.no VLANsB.all VLANsC.only VLANs 1 - 64D.only the VLANs that are specified when creating the trunk
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering
When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A、 tunnel sourceB、 tunnel destinationC、 tunnel keyD、 ip addressE、 tunnelvrf
Which of the following resources would best help you when configuring IBM System x and BladeCenter together in rack cabinets? ()A、IBM System x and BladeCenter Competitive Sales ToolB、Linux Cluster Sales Assistant - (LCSA)C、Configuration Options Guide - (COG)D、Standalone Solutions Configuration Tool (SSCT)
Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.
Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.
Private VLANS can be configured as which three of these port types?()A、isolatedB、protectedC、privateD、associatedE、promiscuousF、munity
Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link()。A、no VLANsB、all VLANsC、only VLANs 1 - 64D、only the VLANs that are specified when creating the trunk
When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()A、 A startB、 A ringC、 A target mode fcD、 A target mode scsi
When configuring an interface using SMIT and Further Configuration with an IP address and netmask, which of the following outcomes indicates how the routing tables will be affected?()A、A subnet route is automatically addedB、A default route is automatically addedC、All other routes are automatically addedD、The routing table is not affected
Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited
单选题When configuring an interface using SMIT and Further Configuration with an IP address and netmask, which of the following outcomes indicates how the routing tables will be affected?()AA subnet route is automatically addedBA default route is automatically addedCAll other routes are automatically addedDThe routing table is not affected
多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.
单选题When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()AEnable the switch to participate in routing updates from external devices with the router command in global configuration mode.BEnter the no switchport command to disable Layer 2 functionality at the interface level.CEach port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.DRouting is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.
单选题When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()A802.1q trunkingBVTP trunkingCISL trunkingDDPT trunking
多选题Private VLANS can be configured as which three of these port types?()AisolatedBprotectedCprivateDassociatedEpromiscuousFmunity
单选题When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()Arouter(config)#Brouter(config-if)#Crouter(config-vrf)#Drouter(config-router)#Erouter(config-router-af)#
单选题When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?()Ano VLANsBall VLANsConly VLANs 1 - 64Donly the VLANs that are specified when creating the trunk
单选题When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()A802.1q trunkingBvtp trunkingCisl trunkingDdpt trunking
多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.
单选题When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()A A startB A ringC A target mode fcD A target mode scsi
多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited
多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.
单选题When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A tunnel sourceB tunnel destinationC tunnel keyD ip addressE tunnelvrf
多选题Which two statements are true about voice VLANs?()AVoice VLANs are only used when connecting an IP phone and a host to distinct switch portsBAccess ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesCAccess ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneDVoice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandEVoice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portFEnabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings