多项选择题
A.Classification and markingoccur using 802.1ab QoS bits before reaching the trust boundary.
B.A device is trusted if it correctly declassifies packets.
C.A device is trusted if it correctly classifies packets.
D.Network trust boundaries are automatically configured in IOS version 12.3 and later.
E.The outermost trusted devices represent the trust boundary.
F.For scalability, classification should be done as close to the edge as possible.
多项选择题 Refer to the exhibit. Which two statements are true about the required switch configurations to support a voice VLAN?()
单项选择题 You have been tasked with setting a trust boundary on the Company network. What is the basic function of this trust boundary?()
单项选择题 Refer to the exhibit. On basis of the configuration that is provided, where will the trust boundary be established in this network? ()