You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames? ()
第1题:
A、Switch(config-if)#switchport mode access
B、Switch(config-if)#switchport dynamic auto
C、Switch(config-if)#switchport mode trunk
D、Switch(config-if)#switchport mode dynamic
第2题:
A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
第3题:
You need to configure an 802.1Q link on a Ezonexam switch. Which commands, when used together, would do this? (Select two answer choices)
A. Switch(vlan) mode trunk
B. Switch(config) switchport access mode trunk
C. Switch(config-if) switchport mode trunk
D. Switch(config-if) switchport trunk encapsulation dot1q
E. Switch(config) switchport access mode 1
F. Switch(vlan) trunk encapsulation dot1q
第4题:
You are configuring a Cisco multilayer switch for the Company network. Which command would you use to configure a port to act as a routed interface?()
第5题:
Which set of commands is recommended to prevent the use of a hub in the access layer?()
第6题:
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
第7题:
Which commands, when used together, would create an 802.1Q link?()
第8题:
A、switchport mode access
B、switchport mode dynamic desirable
C、switchport mode auto
D、switchport nonegotiate
第9题:
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
第10题:
Which two of these are recommended practices with trunks? ()