A.127.0.0.1 B.172.16.0.1 C.192.168.0.5 D.223.0.0.1 E.224.0.0.5 F.254.255.255.255
多项选择题Which of the following IP addresses can be assigned to host devices?()
A.205.7.8.32/27 B.191.168.10.2/23 C.127.0.0.1 D.224.0.0.10 E.203.123.45.47/28 F.10.10.0.0/13
多项选择题Which of the following are VLAN frame encapsulation types that may be configured on a Catalyst switch?()
A. VTP B. ISL C. CDP D. 802.1Q E. 802.1p F. LLC
单项选择题Which statement describes a spanning-tree network that has converged?()
A. All switch and bridge ports are in the forwarding state. B. All switch and bridge ports are assigned as either root or designated ports. C. All switch and bridge ports are in either the forwarding or blocking state. D. All switch and bridge ports are either blocking or looping.
多项选择题What are three valid reasons to assign ports on VLANs on a switch?()
A. to make VTP easier to implement B. to isolate broadcast traffic C. to increase the size of the collision domain D. to allow more devices to connect to the network E. to logically group hosts according to function F. to increase network security
单项选择题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()
A. Install anti-virus software on the student computers. B. Put the faculty computers in a separate VLAN. C. Power down the switches that connect to faculty computers when they are not in use. D. Remove the student computers from the network and put them on a peer-to-peer network. E. Create an access list that blocks the students from the Internet where the hacking tolls are located.