Which command displays the encapsulation type
|
|
---|
• • |
|
---|
3. A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?
|
Page 1 |
---|
|
---|
|
---|
• |
|
8. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
|
---|
|
---|
|
||
---|---|---|
• |
|
|
• |
14. Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)
|
---|
• | ||
• |
|
|
• |
|
17. What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
18. In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
|
|
|
---|---|---|
• | ||
• |
20. Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
• |
|
---|
21. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
22. Fill in the blank
Use the full command syntax.
Page 7 |
---|
|
||
---|---|---|
|
||
|
||
|
||
Page 8 |