what is vlan and how will you configure vlan on 3650
switch and how many valn can you create on that switch
Answers were Sorted based on User's Feedback
Answer / shahin
Virtual Local Area Network (VLAN) is the process of building
a logical topology over physical network for the purpose of
security, performance & efficient usages of bandwisth.
1. VLAN technology function by logically segmenting the
network into different broadcast domain.
We can create vlan upto 4096.
Switch(config)#vlan (VLAN ID)
Switch(Config-vlan)#name (VLAN Name)
| Is This Answer Correct ? | 10 Yes | 4 No |
Answer / jitendera sinha
switch#vlan database
switch(Vlan)#vlan 2 name jitendra
switch(vlan)#vlan 3 name shain
switch(vlan)#vlan 4 name harish
switch(vlan)#exit
donot wory therer is router that is all interview.com which
is used for intervlan communication
is that correct
| Is This Answer Correct ? | 5 Yes | 1 No |
Answer / harish kumar
Vlan is a logical segmented LAN on an physical device.
switch(config)#vlan (vlan ID)
switch(config-vlan)#name (vlan name)
we can create upto 1005 VLAN'S.
and assign VLAN ID upto 4096.
| Is This Answer Correct ? | 4 Yes | 3 No |
Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
Which protocol comes under hybrid dynamic type?
Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network
Which command we give on privilege mode for coming back to user execution mode?
What is a switch and why we are using switches?
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Why Clock rate command is not configured on ethernet interface of a router?
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any
On which interface we always apply access-list?