What must be true in an SVI configuration to bring the VLAN and line protocol up?
You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an "up/up" state. What must be true in an SVI configuration to bring the VLAN and line protocol up? *
What is true of standard access control lists when applied to an interface to control inbound or outbound traf
What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?
which of these is a required configuration task that you must perform to enable that port to function as a rou
When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port?
What benefit results from implementation of Layer 3 switching versus Layer 2 switching in a fully meshed campu
What benefit results from implementation of Layer 3 switching versus Layer 2 switching in a fully meshed campus network?
Which statement best describes implementing a Layer 3 EtherChannel?
Which statement best describes implementing a Layer 3 EtherChannel?
Which of these is true regarding the configuration and application of port access control lists?
Which of these is true regarding the configuration and application of port access control lists?
which configuration task must you do first?
When configuring private VLANs, which configuration task must you do first?
which three of these port types?
Private VLANS can be configured as which three of these port types? (Choose three.)
What are three results of issuing the “switchport host” command?
What are three results of issuing the "switchport host" command? (Choose three.) *
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?