Information Technology Reference
In-Depth Information
What does the following command do?
5
source-bridge transparent 10 5 1 6
a. Configures DLSw
b. Configures transparent bridging
c. Configures source-route bridging
d. Configures translational bridging from an Ethernet bridge group
6
What is the RIF in hexadecimal for a source route frame if it is to route from Token Ring
4, through bridge 12, ending on Token Ring 15?
a. 0630.004c.0015
b. 0630.0412.0015
c. 0630.040c.0150
d. 0630.004c.00f0
7
Which access list denies 00c0.00a0.0010 but permits other MAC addresses?
a.
access-list 700 deny 00c0.00a0.0010 ffff.ffff.ffff
access-list 700 permit 0000.0000.0000 ffff.ffff.ffff
b.
access-list 700 deny 00c0.00a0.0010 0000.0000.0000
access-list 700 permit 0000.0000.0000 ffff.ffff.ffff
c.
access-list 200 deny 00c0.00a0.0010 ffff.ffff.ffff
access-list 200 permit 0000.0000.0000 ffff.ffff.ffff
d.
access-list 200 deny 00c0.00a0.0010 0000.0000.0000
access-list 200 permit 0000.0000.0000 ffff.ffff.ffff
8
Which trunking method places an internal tag to identify the VLAN number?
a. ISL
b. 802.1q
c. 802.1p
d. VTP pruning
Search WWH ::




Custom Search