Configure the private VLAN port parameters.
Configure and map the secondary VLAN to the primary VLAN.
Disable IGMP snooping.
Set the VTP mode to transparent.
第1题:
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
第2题:
Which of the following resources would best help you when configuring IBM System x and BladeCenter together in rack cabinets? ()
第3题:
A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.
B. It allows multiple users to edit private copies of the configuration concurrently.
C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.
D. It excludes other users from editing the configuration.
第4题:
Which two statements are true about the configuration of voice VLANs?()
第5题:
Which two statements apply when a user has entered private configuration mode by typing configure private?()
第6题:
When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()
第7题:
Which two statements are true when using the configure exclusive CLI command?()
第8题:
A.no VLANs
B.all VLANs
C.only VLANs 1 - 64
D.only the VLANs that are specified when creating the trunk
第9题:
Private VLANS can be configured as which three of these port types?()
第10题:
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link()。