CCNA系列认证

多选题Which two statements describe the Cisco implementation of VLANs?()AVLAN 1 is the default Ethernet VLAN.BCDP advertisements are only sent on VLAN 1002.CBy default, the management VLAN is VLAN 1005.DBy default, the switch IP address is in VLAN 1005.EVLAN

题目
多选题
Which two statements describe the Cisco implementation of VLANs?()
A

VLAN 1 is the default Ethernet VLAN.

B

CDP advertisements are only sent on VLAN 1002.

C

By default, the management VLAN is VLAN 1005.

D

By default, the switch IP address is in VLAN 1005.

E

VLAN 1002 through 1005 are automatically created and cannot be deleted.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following statements describe(s)the properties of a purely segmented memory system?(73).

Ⅰ. It suffers from internal fragmentation

Ⅱ. It permits implementation of virtual memory

Ⅲ. It divides memory into units of equal size

A.Ⅰ only

B.Ⅲ only

C.Ⅱ only

D.Ⅰand Ⅲ


正确答案:C

第2题:

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

  • A、 SSID broadcast prevention
  • B、 man-in-the-middle attack protection
  • C、 cost reduction through software upgrades in all existing hardware
  • D、 dynamic key generation
  • E、 RF jamming prevention

正确答案:B,D

第3题:

●Which of the following statements describe(s)the properties of a purely segmented memory system? (73) .

Ⅰ.It suffers from internal fragmentation

Ⅱ.It permits implementation of virtual memory

Ⅲ.It divides memory into units of equal size

(73) A.Ⅰ only

B.Ⅲ only

C.Ⅱ only

D.Ⅰ andⅢ


正确答案:C
【解析】略。

第4题:

Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.)  ()

  • A、 AirDefense for wireless IDS is required by autonomous APs.
  • B、 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
  • C、 APs only monitor the RF channels that are servicing the clients.
  • D、 Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
  • E、 Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.

正确答案:B,D

第5题:

Which two statements correctly describe a Cisco WLC configuration of Wireless > QoS > Profiles >Wired_QoS_Profiles for an implementation of DSCP or CoS deployment?()

  • A、It must always be set on all QoS profile types because this sets the type of markings as either CoS or DSCP.
  • B、It is optional if the Cisco WLC attached switch operates on a trust DSCP model.
  • C、It must be set if the Cisco WLC attached switch operates on a trust CoS model.
  • D、It sets the EDCF queue used for the radio-transmitted frames.

正确答案:B,C

第6题:

Which two statements about Network Attached Storage are correct?()

A. Data is accessed using NFS or CIFS.

B. Data is accessed at the block level.

C. NAS is referred to as captive storage.

D. Storage devices can be shared between users.

E. A NAS implementation is not as fast as a DAS implementation.


参考答案:C, D

第7题:

During voice implementation,  which two required items are configured at an access layer switch connected to an IP phone to provide VoIP communication?()

  • A、allowed codecs
  • B、native VLAN
  • C、auxiliary VLAN
  • D、Cisco Unified Communications Manager IP address
  • E、RSTP

正确答案:B,C

第8题:

Which of the following statements describe(s) the properties of a purely segmented memory system?

Ⅰ.It divides memory into units of equal size

Ⅱ.It permits implementation of virtual memory

Ⅲ.It suffers from internal fragmentation

A.Ⅰ only

B.Ⅱ only

C.Ⅲ only

D.Ⅰand Ⅲ


正确答案:B

第9题:

Which two statements best describe Cisco IOS IP SLA?()

  • A、only implemented between Cisco source and destination-capable devices
  • B、statistics provided by syslog, CLI, and SNMP
  • C、measures delay, jitter, packet loss, and voice quality
  • D、only monitors VoIP traffic flows
  • E、provides active monitoring
  • F、provides passive monitoring

正确答案:C,E

第10题:

Which two of these statements best describe the benefits of WPAv1? ()

  • A、 SSID broadcast prevention
  • B、 Improved mutual authentication
  • C、 Improved encryption through AES
  • D、 Improved protection against sniffing initialization vectors
  • E、 RF jamming prevention

正确答案:B,D

更多相关问题