Language:EN
Pages: 8
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
which command displays the encapsulation type

Which command displays the encapsulation type

CCNA 2 Chapter 3 v5.0 Exam Answers 2015 (100%)

WWW.CCNA-v5.Net

Voice VLANs are used to support user phone and e-mail traffic on a network. VLAN 1 is always used as the management VLAN.

3. A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?

CCNA 5

Page 1

A VLAN tag is added when the frame leaves PC-A.

A VLAN tag is added when the frame is accepted by the switch.

Port Fa0/11 will be shutdown.

An error message would be displayed. Port Fa0/11 will be returned to VLAN 1. VLAN 30 will be deleted.

no switchport access vlan 20

8. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

Enter the no vlan 2 and the vlan 3 commands in global configuration mode.

Enter the switchport access vlan 3 command in interface configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode.

switchport trunk allowed vlan 30
command on Fa0/5?

It allows VLANs 1 to 30 on Fa0/5.

WWW.CCNA-v5.Net

Only the native VLAN will be allowed across the trunk.

14. Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)





The trunk has been configured with the switchport nonegotiate command.

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

17. What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?

18. In a basic VLAN hopping attack, which switch feature do attackers take advantage of?

CCNA 2 Chapter 3 v5.0 Exam Answers 2015 (100%)

WWW.CCNA-v5.Net

20. Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)

Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.

21. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?

22. Fill in the blank
Use the full command syntax.

Page 7

PC-A, PC-B

PC-A, PC-B, PC-D, PC-E

Page 8

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Susan Dawson

PageId: ELI8890C0F