Information Technology Reference
In-Depth Information
c.
access-list 200 deny 00c0.00a0.0010 ffff.ffff.ffff
access-list 200 permit 0000.0000.0000 ffff.ffff.ffff
d.
access-list 200 deny 00c0.00a0.0010 0000.0000.0000
access-list 200 permit 0000.0000.0000 ffff.ffff.ffff
Which trunking method places an internal tag to identify the VLAN number?
a. ISL
8
b. 802.1q
c. 802.1p
d. VTP pruning
Which answer best describes the VTP client?
a. Stores VLAN information in NVRAM
9
b. Adds and deletes VLANs in the VTP domain
c. Maintains a full list of VLANs
d. Does not participate in VTP
What is the BID?
a. BLAN ID number
10
b. Bridge identifier in STP
c. Border identifier in SRB
d. Bridged identifier in VTP
What is the transparent bridge port state sequence from a disabled port to a forwarding port?
a. Disabled, listening, learning, forwarding, blocked
11
b. Disabled, enabled, listening, learning, forwarding
c. Disabled, blocking, listening, learning, forwarding
d. Disabled, blocking, learning, listening, forwarding
What is a BVI?
a. Bridged VLAN identifier
12
b. Bridge virtual interface, used in IRB
c. Bridge ID, in RIFs
d. When set, indicates to use SRB
Search WWH ::




Custom Search