What are two reasons a network administrator would use CDP (Choose two.)()。A.to verify the type of cable interconnecting two devicesB.to determine the status of network services on a remote deviceC.to obtain VLAN information from directly connected switch

题目
What are two reasons a network administrator would use CDP (Choose two.)()。

A.to verify the type of cable interconnecting two devices

B.to determine the status of network services on a remote device

C.to obtain VLAN information from directly connected switches

D.to verify Layer 2 connectivity between two devices when Layer 3 fails

E.to obtain the IP address of a connected device in order to telnet to the device

F.to determine the status of the routing protocols between directly connected routers


相似考题
更多“What are two reasons a network administrator would use CDP (Choose two.)()。 ”相关问题
  • 第1题:

    What are two reasons a network administrator would use CDP?()

    A. to verify the type of cable interconnecting two devices

    B. to determine the status of network services on a remote device

    C. to obtain VLAN information from directly connected switches

    D. to verify Layer 2 connectivity between two devices when Layer 3 fails

    E. to obtain the IP address of a connected device in order to telnet to the device

    F. to determine the status of the routing protocols between directly connected routers


    参考答案:D, E

  • 第2题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第3题:

    What functions do routers perform in a network (Choose two.)()。

    • A、packet switching
    • B、access layer security
    • C、path selection
    • D、VLAN membership assignment
    • E、bridging between LAN segments
    • F、microsegmentation of broadcast domai

    正确答案:A,C

  • 第4题:

    What are two reasons why a device will fail to register to a community? ()(Choose two.)

    • A、The community name is not configured.
    • B、The registration server password is incorrect.
    • C、The registration server IP address is incorrect.
    • D、The backup registration server IP address is missing.

    正确答案:B,C

  • 第5题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第6题:

    What are two reasons a network administrator would use CDP (Choose two.)()。

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第7题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第8题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    • A、Use the CLI and enter show log.
    • B、Use the CLI and enter show all.
    • C、Use the CLI and enter show logging.
    • D、In WebView, choose Admin > Tools > Display System Log.

    正确答案:A,D

  • 第9题:

    多选题
    What are two reasons a network administrator would use CDP? ()
    A

    to verify the type of cable interconnecting two devices

    B

    to determine the status of network services on a remote device

    C

    to obtain VLAN information from directly connected switches

    D

    to verify Layer 2 connectivity between two devices when Layer 3 fails

    E

    to obtain the IP address of a connected device in order to telnet to the device

    F

    to determine the status of the routing protocols between directly connected routers


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
    A

    Allow unrestricted access to the console or VTY ports.

    B

    Use a firewall to restrict access from the outside to the network devices.

    C

    Always use Telnet to access the device command line because its data is automatically encrypted.

    D

    Use SSH or another encrypted and authenticated transport to access device configurations.

    E

    Prevent the loss of passwords by disabling password encryption.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    What functions do routers perform in a network? (Choose two.)()
    A

    packet switching

    B

    access layer security

    C

    path selection

    D

    VLAN membership assignment

    E

    bridging between LAN segments

    F

    microsegmentation of broadcast domains


    正确答案: F,C
    解析: 暂无解析

  • 第12题:

    多选题
    A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
    A

    Use the custom application feature.

    B

    Configure static NAT for the host.

    C

    Use port address translation (PAT).

    D

    Use the address-persistent option.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    What are two security appliances that can be installed in a network (Choose two.)()。

    A.ATM

    B.IDS

    C.IOS

    D.IOX

    E.IPS

    F.SDM


    参考答案:B, E

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第15题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第16题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第17题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第18题:

    What are two reasons a network administrator would use CDP?()

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第19题:

    A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)

    • A、Use the custom application feature.
    • B、Configure static NAT for the host.
    • C、Use port address translation (PAT).
    • D、Use the address-persistent option.

    正确答案:B,D

  • 第20题:

    多选题
    What are two reasons why a device will fail to register to a community? ()(Choose two.)
    A

    The community name is not configured.

    B

    The registration server password is incorrect.

    C

    The registration server IP address is incorrect.

    D

    The backup registration server IP address is missing.


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)
    A

    no single point of failure

    B

    trading database server location

    C

    redundant application servers location

    D

    deterministic response to all failures

    E

    determine which protocol to use


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two reasons a network administrator would use CDP (Choose two.)()。
    A

    to verify the type of cable interconnecting two devices

    B

    to determine the status of network services on a remote device

    C

    to obtain VLAN information from directly connected switches

    D

    to verify Layer 2 connectivity between two devices when Layer 3 fails

    E

    to obtain the IP address of a connected device in order to telnet to the device

    F

    to determine the status of the routing protocols between directly connected routers


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: A,E
    解析: 暂无解析