niusouti.com

VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()A、 Implicit deny feature at end of list.B、 Implicit deny feature at start of list.C、 Implicit forward feature a

题目

VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()

  • A、 Implicit deny feature at end of list.
  • B、 Implicit deny feature at start of list.
  • C、 Implicit forward feature at end of list
  • D、 Implicit forward feature at start of list.

相似考题
更多“VLAN maps have b”相关问题
  • 第1题:

    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 
    • D、Verify that the VLAN virtual interface has been correctly created and enabled.

    正确答案:B

  • 第2题:

    Which statement is most correct regarding vNICs and VLANs?()

    • A、only the default vlan has traffic that is tagged
    • B、All vNICs have to be associated with one or more VLANs except for the default vlan
    • C、vlan must be configured before configuring them into a vNIC
    • D、Tagging is done by the operating system NIC if the flag is set to tag traffic

    正确答案:C

  • 第3题:

    You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the VLAN was added on all switches with the use of the show vlan command. 
    • C、Verify that the switch is configured to allow for trunking on the switch ports.
    • D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

    正确答案:B

  • 第4题:

    The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()

    • A、 Information will be carried in the RSTP BPDUs.
    • B、 It will be propagated in VTP updates.
    • C、 Information stored in the Forwarding Information Base and the switch will reply on query.  
    • D、 Multiple Spanning Tree must be manually configured on the appropriate switches.

    正确答案:D

  • 第5题:

    Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?()

    • A、802.1Q giants frames could saturate the link
    • B、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames
    • C、A native VLAN mismatch error message will appear
    • D、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

    正确答案:C

  • 第6题:

    You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()

    • A、routing issue
    • B、denial-of-service attack
    • C、MAC flooding
    • D、spanning-tree recalculation
    • E、Layer 2 loop
    • F、ARP spoofing attack

    正确答案:F

  • 第7题:

    What is true about access control on bridged and routed VLAN traffic?()

    • A、Router ACLs can be applied to the input and output directions of a VLAN interface
    • B、Bridged ACLs can be applied to the input and output directions of a VLAN interface
    • C、Only router ACLs can be applied to a VLAN interface
    • D、VLAN maps and router ACLs can be used in combination
    • E、VLAN maps can be applied to a VLAN interfac

    正确答案:A,B,D

  • 第8题:

    Which of the following allows the user to have two separate Ethernet networks share the same network adapter?()

    • A、VLAN tags
    • B、EtherChannel
    • C、Virtual Ethernet
    • D、Shared Ethernet Adapter

    正确答案:A

  • 第9题:

    多选题
    What is true about access control on bridged and routed VLAN traffic?()
    A

    Router ACLs can be applied to the input and output directions of a VLAN interface

    B

    Bridged ACLs can be applied to the input and output directions of a VLAN interface

    C

    Only router ACLs can be applied to a VLAN interface

    D

    VLAN maps and router ACLs can be used in combination

    E

    VLAN maps can be applied to a VLAN interfac


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()
    A

    Verify that trunked links are configured to allow the VLAN traffic.

    B

    Verify that the switch is configured to allow for trunking on the switch ports.

    C

    Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

    D

    Verify that different native VLANs exist between two switches for security purposes.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()
    A

    Verify that different native VLANs exist between two switches for security purposes.

    B

    Verify that the VLAN was added on all switches with the use of the show vlan command. 

    C

    Verify that the switch is configured to allow for trunking on the switch ports.

    D

    Verify that each switch port has the correct IP address space assigned to it for the new VLAN.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    What is true about access control on bridged and routed VLAN traffic? ()
    A

    Router ACLs can be applied to the input and output directions of a VLAN interface.

    B

    Bridged ACLs can be applied to the input and output directions of a VLAN interface.

    C

    Only router ACLs can be applied to a VLAN interface.

    D

    VLAN maps and router ACLs can be used in combination.

    E

    VLAN maps can be applied to a VLAN interface


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?()

    • A、802.1Q giants frames could saturate the link.
    • B、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.
    • C、A native VLAN mismatch error message will appear.
    • D、VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

    正确答案:C

  • 第14题:

    You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have  assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an "up/up" state.  What must be true in an SVI configuration to bring the VLAN and line protocol up?()

    • A、The port must be physically connected to another Layer 3 device.
    • B、At least one port in VLAN 20 must be active.
    • C、The Layer 3 routing protocol must be operational and receiving routing updates from neighboring peer devices.
    • D、Because this is a virtual interface, the operational status will always be in an "up/up" state.

    正确答案:B

  • 第15题:

    MAPs


    正确答案: 微管相关蛋白(microtubule-associatedproteins,MAPs),在细胞中存在一些蛋白质,可以与微管结合,增加微管的稳定性,促进微管的组装,并调节微管与其他细胞成分之间的关系,这些蛋白质称为微管相关蛋白,是维持微管结构和功能必需的成分。

  • 第16题:

    While logged into a Company switch you issue the following command:   CompanySwitch(config-mst)# instance 10 vlan 11-12   What does this command accomplish?()

    • A、 It enables a PVST+ instance of 10 for vlan 11 and vlan 12
    • B、 It enables vlan 11 and vlan 12 to be part of the MST region 10
    • C、 It maps vlan 11 and vlan 12 to the MST instance of 10.
    • D、 It creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12  
    • E、 It create a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12
    • F、 It starts two instances of MST, one instance for vlan 11 and another instance for vlan 12.

    正确答案:C

  • 第17题:

    You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()

    • A、Verify that trunked links are configured to allow the VLAN traffic.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
    • D、Verify that different native VLANs exist between two switches for security purposes.

    正确答案:A

  • 第18题:

    What is true about access control on bridged and routed VLAN traffic? ()

    • A、 Router ACLs can be applied to the input and output directions of a VLAN interface.
    • B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.
    • C、 Only router ACLs can be applied to a VLAN interface.
    • D、 VLAN maps and router ACLs can be used in combination.
    • E、 VLAN maps can be applied to a VLAN interface

    正确答案:A,B,D

  • 第19题:

    An 802.1X client cannot authenticate to an autonomous access point configured for multiple VLANs. The native VLAN does not have an SSID configured. Which one of the following links being down would prevent the clients from authenticating?()

    • A、between the RADIUS and the access point
    • B、between the client’s VLAN and the WLSE
    • C、between the native VLAN and the WLSE
    • D、between the client’s VLAN and the RADIUS

    正确答案:A

  • 第20题:

    多选题
    What are two methods of mitigating MAC address flooding attacks?()
    A

    Place unused ports in a common VLAN.

    B

    Implement private VLANs.

    C

    Implement DHCP snooping.

    D

    Implement port security.

    E

    Implement VLAN access maps.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    单选题
    VLAN maps have been configured on switch R1.  Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()
    A

     Implicit deny feature at end of list.

    B

     Implicit deny feature at start of list.

    C

     Implicit forward feature at end of list

    D

     Implicit forward feature at start of list.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()
    A

    Verify that different native VLANs exist between two switches for security purposes.

    B

    Verify that the switch is configured to allow for trunking on the switch ports.

    C

    Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 

    D

    Verify that the VLAN virtual interface has been correctly created and enabled.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()
    A

     Information will be carried in the RSTP BPDUs.

    B

     It will be propagated in VTP updates.

    C

     Information stored in the Forwarding Information Base and the switch will reply on query.  

    D

     Multiple Spanning Tree must be manually configured on the appropriate switches.


    正确答案: D
    解析: 暂无解析