Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "GB0-320" Exam

Constructing Enterprise-level Switching Networks

 Question 1.
Which of the following configurations on Quidway S3026 is true?( )

A. The user privilege level command is used to set the command level that can be accessed after 
     the user log in from a certain interface and to execute the command within this level.
B. In default, the command level that can be accessed after AUX login is level 0.
C. In default, the command level that can be accessed after VTY login is level 3.

Answer: A

Question 2.
Which command is used to set the maximum learned addresses by the port?

A. mac-address max_mac_count
B. mac-address max-mac-count max_mac_count
C. max-mac-count max_mac_count

Answer: A

Question 3.
Which command is used to set the login password in the user interface on the Quidway S3026 switch?

A. password { simple | cipher } password
B. set authentication password { simple | cipher } password
C. enable password { simple | cipher } password
D. password enable password

Answer: B

Question 4.
On Quidway S3026 switch, the address learning function of the port is enabled by defaultA.

A. True
B. False

Answer: A

Question 5.
If executing the [Quidway-ui-vty0]user privilege level 3 command to configure the user priority, which of the following descriptions is true?

A. The user is not affected and can see all the commands
B. The user is affected and can only see the commands of level 3.
C. The user is affected and can only see the commands below level 3.

Answer: C

Question 6.
If executing the display users all command on the console terminal, the result is as. 
[Quidway]display users all
UI Delay IPaddress Username
I 0 AUX 0 00.00.00
* 1 VTY 0 00.00.23 10.110.34.125
2 VTY 1
3 VTY 2
4 VTY 3
5 VTY 4

Which of the following descriptions is true?

A. *. Terminal that are being used
B. I. Terminal that are being used works in the asynchronous interaction status
C. Username. This stands for the user names of the users using this user-interface, also the login 
    username.
D. Delay. The time interval from the login till now with minute as the unit

Answer: C

Question 7.
For the resource exhaustion of the switch address table caused by the attack by the frames with different source addresses, which of the following security measures can be adopted?

A. Configure the user priority
B. Set the maximum learned address by the port
C. Set whether the port continues to learn addresses
D. Set the timeout disconnection function of EXEC users.

Answer: B, C

Question 8.
As shown in the following figure, the corresponding links of Port 1 ~ Port 4 are the trunk links allowing all the VLANs to pass and the GVRP protocol is activated. The GVRP registration mode of Port 4-switch 3 is set to be Forbidden and the GVRP registration modes of the ports on other switches are set to be Normal. VLAN5 and VLAN6 are configured on the switch 1 and VLAN 6 and VLAN 7 are configured on the switch 3. The following are the VLAN configuration situations of the ports of the switch except the default VLAN. 

Which of the items are true?

 

A. VLAN 5 and VLAN 6 are configured over port 1.
B. VLAN 5~VLAN 6 are configured over port 2.
C. VLAN 6 and VLAN 7 are configured over port 3.
D. VLAN 6 and VLAN 7 are configured over port 4.

Answer: A, B

Question 9.
The layer 2 switch supporting VLAN has solved the following problem.

A. Security
B. High efficiency
C. Flexible management
D. All the above items are false.

Answer: A, B, C

Question 10.
Which of the following descriptions of the transparent bridge is false?( )

A. The transparent bridge can learn the MAC address by itselB.
B. The transparent bridge can expand LAN.
C. The transparent bridge needs to modify the IP packet first, and then forward iA.
D. The transparent bridge is the equipment working on the layer 2.

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.