Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which three trust states and boundary design principles are correct? ( Choose three. ) The trust boundary should be close to the destination of the

Which three trust states and boundary design principles are correct? (Choose three.)
The trust boundary should be close to the destination of the traffic.
The trust boundary should be close to the source of the traffic.
When a switch port is configured in the untrusted state, the port discards any Layer 2 and Layer 3 markings and sets a DSCP value of 0 for the packet.
When a switch port is configured in the untrusted state, the port accepts any Layer 2 and Layer 3 markings and sets a DSCP value according to the predefined CoS-to-DSCP mapping.
When a switch port is configured to trust the CoS state, the port accepts CoS markings and calculates an internal DSCP value according to the predefined CoS-to-DSCP mapping.
When a switch port is configured to trust the DSCP state, the port accepts the DSCP marking and sets the DSCP value of 0 for the IP packet.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David J. Auer David M. Kroenke

13th Edition

B01366W6DS, 978-0133058352

More Books

Students also viewed these Databases questions

Question

3. Define the roles individuals play in a group

Answered: 1 week ago