网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are two reasons a network administrator would use CDP? (Choose two.)()
A
to verify the type of cable interconnecting two devices
B
to determine the status of network services on a remote device
C
to obtain VLAN information from directly connected switches
D
to verify Layer 2 connectivity between two devices when Layer 3 fails
E
to obtain the IP address of a connected device in order to telnet to the device
F
to determine the status of the routing protocols between directly connected routers
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are two reasons a network administrator would use CDP? (Choose two.)()Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers” 相关考题
考题
CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages
考题
A new switch is installed in the Ezonexam network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.Which of the conditions below have to be met in order for this to occur? (Choose all that apply).A. The switch that will share the VLAN information must be in the VTP Server mode.B. The switches must be in the same VTP domain.C. The switch that will share the VLAN information must be configured as the root bridge.D. The switches must be configured to use the same VTP version.E. The switches must be configured to use the same STP version.F. The switches must be configured to use the same type of ID tagging.G. The switches must be connected over VLAN trunks.
考题
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two)A. The switch must be reachable through a port connected to its management VLAN.B. The switch console port must be connected to the Ethernet LAN.C. The switch must be fully configured as an SNMP agent.D. The switch must be configured with an IP address, subnet mask, and default gateway.E. The switch management VLAN must be created and have a membership of at least one switch port.F. The switch must be connected to a router over a VLAN trunk.
考题
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()A. The servers have not had VLAN tagging enabled on their NICs.B. Speed and duplex have not been set.C. VLAN tagging was not set on the trunk.D. The servers have been connected with CAT5 cable.
考题
An administrator has an existing HMC and POWER6 570 connected to a network switch. The administrator is planning to install two POWER6 570s with a dedicated HMC.Which infrastructure is required for the new HMC?()A.An additional switch for the new HMCB.Asynchronous adapters on the new HMCC.The two 570 servers are directly connected to the new HMCD.One 570 is directly connected to the new HMC and the other is directly connected to the existing HMC
考题
What are two reasons a network administrator would use CDP?()
A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routers
考题
What are two reasons a network administrator would use CDP (Choose two.)()。
A.to verify the type of cable interconnecting two devicesB.to determine the status of network services on a remote deviceC.to obtain VLAN information from directly connected switchesD.to verify Layer 2 connectivity between two devices when Layer 3 failsE.to obtain the IP address of a connected device in order to telnet to the deviceF.to determine the status of the routing protocols between directly connected routers
考题
What are two security appliances that can be installed in a network (Choose two.)()。
A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM
考题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。
A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions
考题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
考题
You have just created a new VLAN on your network. What is one step that you should include in your VLAN based implementation and verification plan? ()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the VLAN was added on all switches with the use of the show vlan command. C、Verify that the switch is configured to allow for trunking on the switch ports.D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
考题
An administrator has an existing HMC and POWER6 570 connected to a network switch. The administrator is planning to install two POWER6 570s with a dedicated HMC. Which infrastructure is required for the new HMC?()A、An additional switch for the new HMc B、Asynchronous adapters on the new HMcC、The two 570 servers are directly connected to the new HMc D、One 570 is directly connected to the new HMC and the other is directly connected to the existing HMc
考题
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.
考题
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN
考题
What are two security appliances that can be installed in a network? (Choose two.)() A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM
考题
What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable
考题
多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption
考题
单选题Refer to the exhibit。A problem with network connectivity has been observed.It is suspected that the cable connected to switch port Fa0/9 on Switch 1 disconnected.What would be an effect of tis cable being disconnected?()A
Host B would not be able to access the server in VLAN9 until the cable is reconnectedB
For less than a minute ,Host B would not be able to access the server in VLAN9.Then normal network function would resume.C
Communication between VLAN3 and the other VLANs would be disabledD
The transfer of files from Host B to the server in VLAN9 would be significantly slower.
考题
多选题What are two reasons a network administrator would use CDP? ()Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers
考题
多选题What are two purposes of the RSVP signaling protocol when configuring MPLS Label-Switched Paths (LSPs)? ()(Choose two.)Ato perform a label push operationBto track the status of signaled LSPsCto perform longest-match route lookupsDto reserve resources, such as labels and path information
考题
多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM
考题
多选题What are two reasons that a network administrator would use access lists (Choose two.)()。Ato control vty access into a routerBto control broadcast traffic through a routerCto filter traffic as it passes through a routerDto filter traffic that originates from the routerEto replace passwords as a line of defense against security incursions
考题
多选题As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)Acost savingsBproduct varietyCwell-tested interoperabilityDregular upgrade process
热门标签
最新试卷