niusouti.com

多选题Which two of these are recommended practices with trunks? ()Ause ISL encapsulationBuse 802.1q encapsulationCset ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationDuse VTP server mode to support dynamic propagatio

题目
多选题
Which two of these are recommended practices with trunks? ()
A

use ISL encapsulation

B

use 802.1q encapsulation

C

set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation

D

use VTP server mode to support dynamic propagation of VLAN information across the network

E

set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.


相似考题
更多“Which two of these are recommended practices with trunks? ()”相关问题
  • 第1题:

    Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()

    A. use a Layer 2 link between distribution switches

    B. use a Layer 3 link between distribution switches

    C. use a redundant link to the core

    D. use a Layer 3 link between distribution switches with route summarization


    参考答案:C, D

  • 第2题:

    Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()

    • A、the number of computer blades in the system
    • B、the number of interfaces sharing the uplinks
    • C、the driver version on the OS running on the computer blade
    • D、the number of uplinks between I/O Module and Fabric Interconnect

    正确答案:B,D

  • 第3题:

    Which two of these are recommended practices with trunks? ()

    • A、 use ISL encapsulation
    • B、 use 802.1q encapsulation
    • C、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
    • D、 use VTP server mode to support dynamic propagation of VLAN information across the network 
    • E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

    正确答案:B,E

  • 第4题:

    Which three of these statements regarding 802.1Q trunking are correct?()

    • A、802.1Q native VLAN frames are untagged by default.
    • B、802.1Q trunking ports can also be secure ports.
    • C、802.1Q trunks can use 10 Mb/s Ethernet interfaces.
    • D、802.1Q trunks require full-duplex, point-to-point connectivity.
    • E、802.1Q trunks should have native VLANs that are the same at both ends.

    正确答案:A,C,E

  • 第5题:

    Which two of these are recommended practices with trunks?()

    • A、use ISL encapsulation
    • B、use 802.1q encapsulation
    • C、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
    • D、use VTP server mode to support dynamic propagation of VLAN information across the network
    • E、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

    正确答案:B,E

  • 第6题:

    Which of the following WAN technologies has the GREATEST latency and is not recommended for VoIP?()

    • A、ISDN
    • B、DSL
    • C、Satellite
    • D、Cable

    正确答案:C

  • 第7题:

    Which two statements are true about a bitmap index? ()

    • A、It is recommended for the columns that have unique values.
    • B、It can be converted to a B-tree index by using the ALTER INDEX command.
    • C、It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.
    • D、Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

    正确答案:C,D

  • 第8题:

    多选题
    Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()
    A

    the number of computer blades in the system

    B

    the number of interfaces sharing the uplinks

    C

    the driver version on the OS running on the computer blade

    D

    the number of uplinks between I/O Module and Fabric Interconnect


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements correctly describe UDLD? ()
    A

    Unidirectional link detection is achieved through monitoring STP BPDUs.

    B

    It is recommended that it be enabled globally rather than on an individual port.

    C

    When an error is detected, normal mode will disable a port.

    D

    It is recommended that it be enabled in normal mode.

    E

    It is recommended that it be used with the loop guard feature.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements describe good practices for an application developer to reduce lockingconflicts in Oracle database()
    A

    Avoid coding unnecessary long-running transactions.

    B

    Allow the database to handle locks in default locking mode.

    C

    Always explicitly code the locks as per the requirement of the application.

    D

    Allow escalation of row locks to block locks if too many row locks cause problem.


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two of these are recommended practices with trunks?()
    A

    use ISL encapsulation

    B

    use 802.1q encapsulation

    C

    set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation

    D

    use VTP server mode to support dynamic propagation of VLAN information across the network

    E

    set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    单选题
    Which one is the most important based on the following common elements of a network design?()
    A

    Business needs

    B

    Risk analysis

    C

    Security policy

    D

    Best practices


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which three of these statements regarding 802.1Q trunking are correct? ()

    A.802.1Q native VLAN frames are untagged by default.

    B.802.1Q trunking ports can also be secure ports.

    C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.

    D.802.1Q trunks require full-duplex, point-to-point connectivity.

    E.802.1Q trunks should have native VLANs that are the same at both ends.


    参考答案:A, C, E

  • 第14题:

    Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

    • A、assigning a private IP address to the AP
    • B、changing the default SSID value
    • C、configuring a new administrator password
    • D、changing the mixed mode setting to single mode
    • E、configuring traffic filtering

    正确答案:B,C

  • 第15题:

    Which two statements correctly describe UDLD? ()

    • A、Unidirectional link detection is achieved through monitoring STP BPDUs.
    • B、It is recommended that it be enabled globally rather than on an individual port.
    • C、When an error is detected, normal mode will disable a port.
    • D、It is recommended that it be enabled in normal mode.
    • E、It is recommended that it be used with the loop guard feature.

    正确答案:B,E

  • 第16题:

    Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

    • A、VTP updates are ignored and forwarded out all ports.
    • B、VTP updates are ignored and forwarded out trunks only.
    • C、VTP updates are made to the VLAN database and are forwarded out trunks only.
    • D、VTP updates are ignored and are not forwarded.

    正确答案:B

  • 第17题:

    Which of the following is the recommended disposal method for used computers?()

    • A、Trash can
    • B、Burial
    • C、Recycling center
    • D、Storage shed

    正确答案:C

  • 第18题:

    A manufacturing customer has a requirement to add 12 additional dual-attached servers to theirexisting two Brocade 16 port SAN switches that have no more ports available. Which of thefollowing should be recommended to accommodate the current capacity requirements, allow forfuture growth and provide 8 and 4 Gb support?()

    • A、two SAN16B 
    • B、two SAN80B-4 
    • C、two SAN24B-4 
    • D、two SAN04B-R

    正确答案:B

  • 第19题:

    In a two-tier configuration, it is recommended to put which of the following components on different nodes?()

    • A、Database client and database server
    • B、WebSphere Application Server and Database Server
    • C、WebSphere Commerce Server and WebSphere Application Server
    • D、Web server and WebSphere Application Server

    正确答案:A,B

  • 第20题:

    多选题
    Which two reflect best practices for client peering sessions in a BGP route reflection network? ()(Choose two.)
    A

    peer with route-reflectors within the cluster

    B

    peer with route-reflectors outside the cluster

    C

    peer with route-reflector-clients within the cluster

    D

    peer with route-reflector-clients outside the cluste


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    单选题
    You need to connect two Company core switches via an ISL trunk.  Which statement is true  regarding the configuration of ISL trunks? ()
    A

     A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.

    B

     All Catalyst switches support ISL trunking.

    C

     A Catalyst switch will report giants if one side is configured for ISL while the other side is not.

    D

     ISL trunking requires that native VLANs match.

    E

     None of the other alternatives apply


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"?()
    A

    VTP updates are ignored and forwarded out all ports

    B

    VTP updates are ignored and forwarded out trunks only

    C

    VTP updates are made to the VLAN database and are forwarded out trunks only

    D

    VTP updates are ignored and are not forwarded


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
    A

    assigning a private IP address to the AP

    B

    changing the default SSID value

    C

    configuring a new administrator password

    D

    changing the mixed mode setting to single mode

    E

    configuring traffic filtering


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following is not a recommended safe practice?()
    A

    Securing equipment against slipping or drifting

    B

    Operating machinery at its recommended speed

    C

    Repairing loose handles on tools before using

    D

    Using tools for purpose for which they are not designed


    正确答案: C
    解析: 暂无解析