Which of the following connectivity hardware is used to create a VLAN? |
Switch. |
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? |
VLAN |
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. |
Port authentication. |
You manage a network that uses a single switch. All ports within your building connect through the single switch. |
VLANs. |
Which type of device is required to implement port authentication throughout a switch? |
RADIUS server. |
Which of the following best describes the concept of virtual LAN? |
Devices on the same network logically grouped as if they were on separate networks. |
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. |
Trunking. |
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. |
Trunking. |
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. |
VLAN. |
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. |
Routing. |
When configuring VLANs on a switch, what is used to identify VLAN membership of a device? |
Switch port. |
Which switch features are typically used with VoIP |
VLAN. PoE. |
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? |
Trunk ports. |
Which of the following do switches and wireless access points use to control access through the device? |
MAC filtering. |
Switch Security
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price