A.to verify the type of cable interconnecting two devices
B.to determine the status of network services on a remote device
C.to obtain VLAN information from directly connected switches
D.to verify Layer 2 connectivity between two devices when Layer 3 fails
E.to obtain the IP address of a connected device in order to telnet to the device
F.to determine the status of the routing protocols between directly connected routers
第1题:
A. to verify the type of cable interconnecting two devices
B. to determine the status of network services on a remote device
C. to obtain VLAN information from directly connected switches
D. to verify Layer 2 connectivity between two devices when Layer 3 fails
E. to obtain the IP address of a connected device in order to telnet to the device
F. to determine the status of the routing protocols between directly connected routers
第2题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第3题:
What functions do routers perform in a network (Choose two.)()。
第4题:
What are two reasons why a device will fail to register to a community? ()(Choose two.)
第5题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第6题:
What are two reasons a network administrator would use CDP (Choose two.)()。
第7题:
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
第8题:
What are two ways to view the system log files on a WX device? ()(Choose two.)
第9题:
to verify the type of cable interconnecting two devices
to determine the status of network services on a remote device
to obtain VLAN information from directly connected switches
to verify Layer 2 connectivity between two devices when Layer 3 fails
to obtain the IP address of a connected device in order to telnet to the device
to determine the status of the routing protocols between directly connected routers
第10题:
Allow unrestricted access to the console or VTY ports.
Use a firewall to restrict access from the outside to the network devices.
Always use Telnet to access the device command line because its data is automatically encrypted.
Use SSH or another encrypted and authenticated transport to access device configurations.
Prevent the loss of passwords by disabling password encryption.
第11题:
packet switching
access layer security
path selection
VLAN membership assignment
bridging between LAN segments
microsegmentation of broadcast domains
第12题:
Use the custom application feature.
Configure static NAT for the host.
Use port address translation (PAT).
Use the address-persistent option.
第13题:
A.ATM
B.IDS
C.IOS
D.IOX
E.IPS
F.SDM
第14题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第15题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第16题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第17题:
What are two security appliances that can be installed in a network? (Choose two.)()
第18题:
What are two reasons a network administrator would use CDP?()
第19题:
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
第20题:
The community name is not configured.
The registration server password is incorrect.
The registration server IP address is incorrect.
The backup registration server IP address is missing.
第21题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第22题:
no single point of failure
trading database server location
redundant application servers location
deterministic response to all failures
determine which protocol to use
第23题:
to verify the type of cable interconnecting two devices
to determine the status of network services on a remote device
to obtain VLAN information from directly connected switches
to verify Layer 2 connectivity between two devices when Layer 3 fails
to obtain the IP address of a connected device in order to telnet to the device
to determine the status of the routing protocols between directly connected routers
第24题:
ATM
IDS
IOS
IOX
IPS
SDM