What is the effect of adding switch ports to a new VLAN on the switch?
A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?
Which three of these statements regarding 802.1Q trunking are correct?
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
What are two benefits of using VTP in a switching environment?
What are two benefits of using VTP in a switching environment? (Choose two.)
which to directly connect the phones and computers, and what technology should be implemented on this device?
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)
What should the network administrator tell the new technician about VTP configuration?
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration? (Choose three.)
Which two methods are examples of implementing Layer 2 security on a Cisco switch?
You are a network administrator. In order to improve the security of your company’s switching network, refer to the following options. Which two methods are examples of implementing Layer 2 security on a Cisco switch? (Choose two.)
which user hosts can access the network based on their MAC address. What will prevent workstations with unauth
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Why would a network administrator configure port security on a switch?
Why would a network administrator configure port security on a switch?
what will affect on selection of one of switches in the VLAN as root-bridge?
When PVST+ in work on VLAN1 of the switch, what will affect on selection of one of switches in the VLAN as root-bridge?
Which two states are the port states when RSTP has converged?
Which two states are the port states when RSTP has converged? (Choose two)