單項(xiàng)選擇題

Refer to the exhibit. Host A and Host B are connected to the Catalyst 3550 switch and have been  assigned to their respective VLANs. The rest of the 3550 configuration is the default configuration.  Host A is able to ping its default gateway, 10.10.10.1, but is unable to ping Host B. Given the  output displayed in the exhibit, 
which statement is true? ()

A. A separate router is required to support interVLAN routing.
B. VTP must be configured to support interVLAN routing.
C. VLANs 10 and 15 must be created in the VLAN database mode.
D. The global config command ip routing must be configured on the SW1 switch.
E. HSRP must be configured on SW1.
F. Interface VLAN 10 must be configured on the SW1 switch.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. Dynamic ARP inspection (DAI) is enabled on switch SW_A only. Both Host_A  and Host_B acquire their IP addresses from the DHCP server connected to switch SW_A. 
What  would the outcome be if Host_B initiated an ARP spoof attack toward Host_A ? ()

A. The spoof packets will be inspected at the ingress port of switch SW_A and will be permitted.
B. The spoof packets will not be inspected at the ingress port of switch SW_A and will be  permitted.
C. The spoof packets will not be inspected at the ingress port of switch SW_A and will be dropped.
D. The spoof packets will be inspected at the ingress port of switch SW_A and will be dropped.

2.單項(xiàng)選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of 172.16.10.5? ()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

3.多項(xiàng)選擇題

A hacker on the Company network is attempting to hop onto a different VLAN. 
Which two  statements about VLAN hopping are true? ()

A. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
B. Configuring an interface with the "switchport mode dynamic" command will prevent VLAN  hopping.
C. Attacks are prevented by utilizing the port-security feature.
D. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.
E. An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.

4.多項(xiàng)選擇題

The Company security administrator wants to prevent VLAN hopping on the network. 
What is one  method that can be used to do this?  ()

A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

5.多項(xiàng)選擇題

The Company security administrator is concerned with VLAN hopping based attacks.
Which two  statements about these attacks are true? ()

A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

最新試題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:?jiǎn)雾?xiàng)選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

Which statement is correct about RSTP port roles?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題

Which two statements are true about BPDU port-guard and BPDU filtering?()

題型:多項(xiàng)選擇題

Which three statements about STP timers are true?()

題型:多項(xiàng)選擇題