1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
4 years ago
6

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. Which two mandatory options are used to configure a VLA

N interface? (Choose two.)
Computers and Technology
1 answer:
Allushta [10]4 years ago
6 0

Incomplete question. Here's the full question:

Which two mandatory options are used to configure a VLAN interface?  

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.

Which two mandatory options are used to configure a VLAN interface? (Choose two.)

A. Virtual router

B. Security zone

C. ARP entries

D. Netflow Profile

Answer:

<u>A. Virtual router</u>

<u>B. Security zone</u>

<u>Explanation:</u>

According to the networking protocol to create a virtual local area network (VLAN) you must:

1.  Have a configured Virtual router

2.  Create or configure a Layer 2 Security Zones.

Although there are other network requirements to successfully create VLAN but this are the basic ones needed.

You might be interested in
Capstone Project part 11 quiz
kobusy [5.1K]
It is checking if the response is not yet yes
4 0
2 years ago
Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
Zina [86]

Answer:

The answer is: antispyware.

Explanation:

Let me translate your question first:

Software that searches for, detects, and removes spyware-type malware; it can be installed on the computer in isolation or in conjunction with a security package.

And the answer to your question is anti-spyware. An anti-spyware is a program that protects your computer from any type of spyware malware which tries to get private information from you and disturb your privacy. There are many different anti-spyware programs, some of which include Windows Defender, Spybot - Search and Destroy, and many others.

5 0
4 years ago
Marissa bought 2 and 1/2 gallons of orange juice to make punch how many quarts of orange juice did Marissa Buy
Vladimir [108]
1 gallon = 4 quarts
using this information, you can then use simple proportion.
if 1 gallon = 4 quarts 
then to find the amount of quarts in 2 and 1/2 gallons, you multiply 2 and 1/2 by 4 which should give you 10 gallons
5 0
3 years ago
Read 2 more answers
If you've finished working with a data file but intend to work on it again during your work session, which button would you use
mariarad [96]
Hey there! Hello!

So, not sure if there's actually a button to "close out" a window to where you're able to reopen it again without having to go to where the file is located or go to recents in your application. Keep in mind that I'm on a MacBook, but I have worked on a Windows computer before. 

One thing you can do is minimize the window. Your program will remain open, but your window will remain out of your way until you decide to expand it again. This seems to be the closest thing possible to your description, but if you had something else in mind, I'd love to hear more details.

This won't be a good solution if you're looking to cut down on the energy that certain programs may be taking up while open, even if you're not using them. But in terms of getting the windows off your desktop, minimizing is the way to go. It also allows you to have documents/windows out of the way while still being able to work on other documents/windows in the program (i.e. Microsoft Word, Google Chrome, Pages, etc.)

Hope this helped you out! Feel free to ask me any additional questions you may have. :-)
5 0
3 years ago
Read 2 more answers
You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
qwelly [4]
Go here this should help bunches!
http://www.microsoft.com/security/online-privacy/safely-dispose-computers-and-devices.aspx
Hope this website helps!
5 0
3 years ago
Other questions:
  • )1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
    11·1 answer
  • For selection purposes, it is critical that application items have a proven relationship between a selection device and some rel
    5·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • Why does my Office Computer send packet #1? What device responds by sending back packet #2? What information does my Office Comp
    15·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • I nees the meaning of these words even just one of them would help out ( pixel megapixel colour depth bit and byte)
    15·2 answers
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
  • What is the output of this program? age=4 if age &gt;5: print (“more”) else: print (“less”)
    7·1 answer
  • A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
    9·1 answer
  • Help please match them if you just put a link or say “I don’t know but thanks for the points” I’ll report your answer and you wo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!