Refer to the exhibit.
Which two statements are true about the required switch configurations to support a voice VLAN?()
A.CDP must be disabled on the switch port to prevent interference between CDP messages and voice traffic.
B.Port security cannot be configured on a port that is configured for a voice vlan.
C.Static secure MAC addresses should be configured on voice vlan ports to prevent access by devices other than IP phones.
D.CDP must be enabled on the switch port to allow configuration information to be passed to the IP phone.
E.Portfast must be enabled on the switch port.
F.802.1x authentication cannot be configured on a port configured for a voice vlan.
您可能感興趣的試卷
你可能感興趣的試題
You have been tasked with setting a trust boundary on the Company network.
What is the basic function of this trust boundary?()
A. Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer 3 DSCP or IP precedence markings.
B. Trust boundaries are a point in the network where QoS functionality begins and ends.
C. Trust boundaries determine whether certain types of traffic can pass.
D. Trust boundaries are a point in the network where decisions about CoS markings on incoming packets are made.
E. None of the other alternatives apply
Refer to the exhibit. On basis of the configuration that is provided,
where will the trust boundary be established in this network? ()
A.at the PC
B.at the access switch
C.at the IP phone
D.at the distribution switch
You need to determine where the trust boundaries will be in a new Company VOIP design.
Which two statements are true about these trust boundaries?()
A.Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings,
B.Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.
C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.
D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network.
E.Trust boundaries define the firewall rules for QoS admission into a network.
Refer to the exhibit. Based upon the information that is given,
how will voice traffic from the phone and data traffic from the PC be handled by SW_1? ()
A.The switch port will perform marking for the ingress voice and data traffic by using the defaultCoS value at the switch port.
B.The switch port will trust theCoS value of the ingress voice and data traffic that comes into the switch port.
C.The switch port will trust theCoS value of the ingress voice traffic. Data traffic will be marked at the switch port with the default CoS value.
D.The switch port will trust theCoS value of the ingress data traffic. Voice traffic will be marked at the switch port with the default CoS value.
The voice VLAN feature has been enabled on a new Company Catalyst switch port.
What is the effect of this? ()
A.The CoS is trusted for 802.1P or 802.1Q tagged traffic.
B.PortFast is disabled on the port.
C.Port Security is automatically enabled on a voice VLAN port.
D.Untagged traffic is sent according to the default CoS priority of the port.
E.None of the other alternatives apply
最新試題
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Which two statements about the various implementations of STP are true?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
What is the configured priority value of the Vlan105’s group on DS2 ?()
DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()