How can you assign a vlan to a switch port?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
What is the default switching method for the Cisco 5000 series? A.) Cut-through B.) Store-and-splice C.) Latency D.) Store-and-forward
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
let threr are three router 1 is cionected to two and two is conected to three that is 1----2----3 now we can ping 2 from 3 and 1 to two but we are not able to ping 1 to 3 let router 1 is local and rest of two are remote what should be urs troubleshoot steps
When ospf protocol advertise its routing table?
How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain
Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
Identify the 2 characteristics that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications
As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.
What is the maximum request timer?
What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet