多項選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

A. A device is trusted if it correctly classifies packets.
B. A device is trusted if it correctly declassifies packets.
C. The outermost trusted devices represent the trust boundary.
D. Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.  
E. Network trust boundaries are automatically configured in IOS version 12.3 and later.
F. For scalability, classification should be done as close to the edge as possible.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?()


 

A. Endpoint 1 is the only acceptable place to establish a trust boundary.
B. Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.
C. Endpoint 2 is the only acceptable place to establish a trust boundary.
D. Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.
E. Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.
F. Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to  establish a trust boundary.

3.單項選擇題Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration

4.單項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

A. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of  master virtual router.
B. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, it will regain the master virtual  router role.
C. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of  master virtual router.
D. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, it will regain the master virtual  router role.

5.多項選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG

6.單項選擇題Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()

A. LWAPP encrypts control traffic between the AP and the controller.
B. LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
C. LWAPP encrypts both control traffic and user data.
D. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

7.單項選擇題Which statement is true about IP telephony calls?()

A. A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.
B. The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.
C. Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.
D. The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

8.多項選擇題Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  

A. The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B. The voice VLAN feature is disabled by default.
C. The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
E. PortFast is automatically disabled when a voice VLAN is configured.
F. The default CoS value for incoming traffic is set to 0.

9.多項選擇題Which three WLAN statements are true? (Choose three.) () 

A. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C. A dhoc mode allows mobile clients to connect directly without an intermediate AP
D. Another term for infrastructure mode is independent service set (IBSS)
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight  access point.
F. WLANs are designed to share the medium and can easily handle an increased demand of channel  contention.

10.單項選擇題

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust  cos on the switch port that is connected to the IP phone?()

A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary. 
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.  
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set theCoS
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.

最新試題

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

題型:單項選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology?()

題型:多項選擇題

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?() 

題型:單項選擇題

A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()

題型:單項選擇題

A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

題型:單項選擇題

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()

題型:單項選擇題

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

題型:多項選擇題

What is the difference between the IPv6 addresses ::/0 and ::/128?()

題型:單項選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

題型:單項選擇題

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

題型:單項選擇題