Which of the following are benefits of VLANs?
Which of the following are benefits of VLANs? (Choose three.)
What is needed to allow communication between the VLANs?
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?
Which two statements about the use of VLANs to segment a network are true?
Which two statements about the use of VLANs to segment a network are true? (Choose two.)
What is the effect of adding switch ports to a new VLAN on the switch?
A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?
Which three of these statements regarding 802.1Q trunking are correct?
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
What are two benefits of using VTP in a switching environment?
What are two benefits of using VTP in a switching environment? (Choose two.)
which to directly connect the phones and computers, and what technology should be implemented on this device?
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)
What should the network administrator tell the new technician about VTP configuration?
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration? (Choose three.)
Which two methods are examples of implementing Layer 2 security on a Cisco switch?
You are a network administrator. In order to improve the security of your company’s switching network, refer to the following options. Which two methods are examples of implementing Layer 2 security on a Cisco switch? (Choose two.)
which user hosts can access the network based on their MAC address. What will prevent workstations with unauth
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?