Which bridging mechanism is used to obtain the MAC addresses of nodes on the network?
Which bridging mechanism is used to obtain the MAC addresses of nodes on the network?
What are two characteristics of a shared LAN?
What are two characteristics of a shared LAN? (Choose two.)
What are two characteristics of a switched LAN?
What are two characteristics of a switched LAN? (Choose two.)
Which three mechanisms build or maintain bridge tables in a switched LAN?
Which three mechanisms build or maintain bridge tables in a switched LAN? (Choose three.)
Which statement describes the flooding bridging mechanism when it receives traffic destined to an unknown MAC
Which statement describes the flooding bridging mechanism when it receives traffic destined to an
unknown MAC address?
which three elements must be configured to allow communication between Host A and Host B, and between Host C a
Which feature must be used?
You must ensure that the user connected to ge-0/0/0 can send traffic from their computer as well
as their IP phone using the same physical port. The traffic coming from the computer will not
contain a VLAN tag, and traffic from the IP phone will be tagged using the . This traffic must
remain separated throughout the Layer 2 network.
Which feature must be used?
which two elements must be configured to pass both tagged voice and untagged data traffic?
what will happen to the traffic?
Which statement is correct?
You are asked to ensure that your trunk port transmits both tagged and untagged traffic.
Which statement is correct?