题目内容

班级管理目标设定管理思想依据是()。

A. 为了组织的生存和发展
B. 为了学生的全面发展
C. 为了学校的发展
D. 为了教师集体的发展

查看答案
更多问题

Refer to the exhibit. Which statement is true about a voice VLAN?()

A. Physically the voice network and the data network are separate.
B. The voice traffic will normally be on a different IP subnet than will the data traffic.
C. End user intervention is necessary to place the phone into the proper VLA
D. The same security policy should be implemented for both voice and data traffic.
E. The data VLAN must be configured as the native VLA

Given the following configuration: port-profile type ethernet DATA-UPLINK vmware port-group switchport trunk allowed vlan 1-3967,4048-4093 channel-group auto mode on no shutdown state enabled port-profile type ethernet MGMT-UPLINK vmware port-group switchport trunk allowed vlan 10-12 channel-group auto mode on no shutdown state enabled VEMs are seen to be joining and then are lost from the Cisco VSM. How would you resolve this issue?()

A. Remove second NIC from each port profile
B. Remove VEM from VSM (no vem X), remove NICs, and reinsert
C. Ensure that VLANs on uplink profiles are not overlapping
D. Reinstall VEM
E. Issue the command "module vem X execute vemcmd set pinning module vsm 1"

Which two statements are true about RPF checks in MSDP(Multicast Source Discovery Protocol)?()

A. It prevents message looping,Session Advertisement(SA)messages must be RPF checked
B. RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SMdomain,which originated the SA
C. RPF checking Session Advertisement(SA)messages will cause message looping
D. RPF check should be done against the route to the source S of the corresponding PIM-SM domain

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()

A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary.
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set theCoS
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.

答案查题题库