多项选择题
A. validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
B. intercepts all ARP requests and responses on untrusted ports
C. builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
D. uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
E. limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
单项选择题 A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv. Interface fastethernet 1/10 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface fastethernet 1/11 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface port-channel 10 Switchport mode trunk Switchport allowed vlan all No shut Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
多项选择题 WhatarethefourvPathpacketflowsteps?()
单项选择题 Given the following configuration, what command can be used to determine the physical path that traffic will be sent out upon?() Port-profile type Ethernet name vm-data Switchport mode trunk Switchport trunk allowed vlan 200-210 Channel-group auto mode on mac-pinning State enabled Vmware port-group No shut Port-profile type vethernet name vlan-200 Switchport mode access Switchport vlan 200 State enabled Vmware port-group No shut