网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Where is the IS-IS Network Entity Title configured?()

  • A、per IP interface
  • B、per virtual router
  • C、only on LAN interfaces
  • D、only on WAN interfaces

参考答案

更多 “Where is the IS-IS Network Entity Title configured?()A、per IP interfaceB、per virtual routerC、only on LAN interfacesD、only on WAN interfaces” 相关考题
考题 You would like to operate IS-IS on interface atm 6/0.33 with an IP address of 192.168.1.1/24.Which set of commands accomplishes this?() A. router isis network 192.168.1.0 0.0.0.255B. router isis network 192.168.1.0 255.255.255.0C. interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 router isisD. interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 ip router isis

考题 Where is the IS-IS Network Entity Title configured?() A.per IP interfaceB. per virtual routerC. only on LAN interfacesD. only on WAN interfaces

考题 When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?() A.RingB.MeshC.StarD.Hybrid

考题 A technician would use a physical network diagram to determine:() A. the cause of routing errors.B. the number of switches on the network.C. the number of users on the network.D. where network latency will occur.

考题 DR (Designated Router) is for environments where many routers on the same network such as Ethernet. In the following presented network, all routers are reloaded simultaneously, and DR is selected as expected. What is the RTC status?()A. 2WAY/DRB. FULL/DRC. FULL/DROTHERD. FULL/BDR

考题 What are three factors a network administrator must consider before implementing Netflow in the network?() A.CPU utilizationB.where Netflow data will be sentC.number of devices exporting Netflow dataD.port availabilityE.SNMP versionF.WAN encapsulation

考题 What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation

考题 You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A、 Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B、 Trust boundaries are a point in the network where QoS functionality begins and ends.C、 Trust boundaries determine whether certain types of traffic can pass.D、 Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E、 None of the other alternatives apply

考题 A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A、Install anti-virus software on the student computers.B、Put the faculty computers in a separate VLAN.C、Power down the switches that connect to faculty computers when they are not in use.D、Remove the student computers from the network and put them on a peer-to-peer network.E、Create an access list that blocks the students from the Internet where the hacking tolls are located.

考题 In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 Which three components are part of the Network Entity Title (NET) on an IS-IS router?()A、AFIB、MACC、areaD、N-SelectorE、IP address

考题 Which statement describes OTV configuration on the Cisco Nexus 7000 Series Switches? ()A、 The OTV control-plane protocol uses the IS-IS protocol to establish adjacencies and exchange MAC reachability across the overlay network. You must enable IS-IS with the feature isis command before OTV adjacencies can be established.B、 OTV uses an SSM group range for neighbor discovery and to exchange MAC reachability with other OTV edge peers.C、 The OTV join interface is a routed uplink interface on the edge device used to physically join the overlay network.D、 The OTV internal interface encapsulates the site Layer 2 frames in IP unicast or multicast packets that are then sent to the other sites.

考题 As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()A、ISSU,OSPF,IS-ISB、IETF,OSPF,ISSUC、IS-IS,EIGRP,SSO,BGPD、EIGRP,BGP,OSPF,IS-IS

考题 You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

考题 After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?()A、Upgrade the firmware on all routers and switchesB、Reboot the entire network one device at a timeC、Conduct a network traffic analysisD、Rerun the baseline to ensure the results were correct

考题 In Windows 2000, where should you go to join a workgroup or domain?()A、Device ManagerB、System PropertiesC、Membership ManagerD、Network and Dial Up Connections

考题 Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

考题 A technician would use a physical network diagram to determine:()A、the cause of routing errors.B、the number of switches on the network.C、the number of users on the network.D、where network latency will occur.

考题 Which four components make up the Network Entity Title (NET) of an IS-IS router?()A、AFB、AFIC、MACD、AreaE、SysIDF、A-SelectorG、N-SelectorH、IP-address

考题 You would like to operate IS-IS on interface atm 6/0.33 with an IP address of 192.168.1.1/24. Which set of commands accomplishes this?()A、router isis network 192.168.1.0 0.0.0.255B、router isis network 192.168.1.0 255.255.255.0C、interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 router isisD、interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 ip router isis

考题 单选题As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()A ISSU,OSPF,IS-ISB IETF,OSPF,ISSUC IS-IS,EIGRP,SSO,BGPD EIGRP,BGP,OSPF,IS-IS

考题 多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch

考题 单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A Install anti-virus software on the student computers.B Put the faculty computers in a separate VLAN.C Power down the switches that connect to faculty computers when they are not in use.D Remove the student computers from the network and put them on a peer-to-peer network.E Create an access list that blocks the students from the Internet where the hacking tolls are located.

考题 多选题Which three components are part of the Network Entity Title (NET) on an IS-IS router?()AAFIBMACCareaDN-SelectorEIP address

考题 单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 单选题You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A  Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B  Trust boundaries are a point in the network where QoS functionality begins and ends.C  Trust boundaries determine whether certain types of traffic can pass.D  Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E  None of the other alternatives apply

考题 多选题Which four components make up the Network Entity Title (NET) of an IS-IS router?()AAFBAFICMACDAreaESysIDFA-SelectorGN-SelectorHIP-address

考题 单选题Where is the IS-IS Network Entity Title configured?()A per IP interfaceB per virtual routerC only on LAN interfacesD only on WAN interfaces