Hľadaj Zobraz: Univerzity Kategórie Rozšírené vyhľadávanie

45 077   projektov
0 nových

Cisco ccna3 final test

«»
Prípona
.pdf
Typ
testy
Stiahnuté
0 x
Veľkosť
0,8 MB
Jazyk
anglický
ID projektu
13196
Posledná úprava
02.11.2020
Zobrazené
3 166 x
Autor:
speedy258
Facebook icon Zdieľaj na Facebooku
Detaily projektu
Popis:
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
All VLANs will be allowed across the trunk.
Only VLAN 1 will be allowed across the trunk.
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.

Which parameter is used to uniquely identify one wireless network from another?
SSID
OFDM
WEP
DSSS

What happens when the crypto key zeroize rsa command is entered on a switch configured with the
transport input ssh command on the vty lines?

A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
The switch allows remote connections only after a new RSA key pair is generated.
...

Kľúčové slová:

cisco

exam

network

interface

vlan

ip

ip address

ethernet

switch

sieť

komunikácia

computer

router



Obsah:
  • 1. What additional commands need to be applied to the switch?
    2. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?
    3. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
    4. Which parameter is used to uniquely identify one wireless network from another?
    5. Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?
    6. Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN on switch Y?
    ...
    47. Which identifier is used to keep track of frames that are destined for a particular wireless client?
    48. Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?
    49. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?
    50. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless point?
    51. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
    52. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)

Zdroje:
O súboroch cookie na tejto stránke

Súbory cookie používame na funkčné účely, na zhromažďovanie a analýzu informácií o výkone a používaní stránky.

Nastavenia Povoliť všetko