What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()A. Adjust the default hello timers to three seconds for aggressive mode.B. Enable it in global mode and on every interface you need to support.C. Enable it

题目
What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()

A. Adjust the default hello timers to three seconds for aggressive mode.

B. Enable it in global mode and on every interface you need to support.

C. Enable it in global mode to support every individual fiber-optic interface.

D. Enable it to create channels containing up to eight parallel links between switches.

E. Enable it in global mode to support every individual fiber optic and Ethernet interface.


相似考题
参考答案和解析
参考答案:C
更多“What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?() ”相关问题
  • 第1题:

    On switch R1 you issue the "udld enable" global command.  What does this command accomplish? ()

    • A、 Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)
    • B、 Enables all copper media LAN ports Unidirectional Link Detection (UDLD)
    • C、 Overrides the default UDLS setting for all ports
    • D、 Globally enables all ports on the device for Unidirectional Link Detection (UDLS)
    • E、 None of the other alternatives apply

    正确答案:A

  • 第2题:

    What happens when the CRS Engine fails in a High-Availability CRS deployment? ()

    • A、All activities fail over without any loss of data or dropping any calls. 
    • B、All current agent calls are dropped. 
    • C、All callers on active CTI ports are dropped. 
    • D、The standby CRS Engine starts, processing new calls immediately.

    正确答案:C

  • 第3题:

    What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()

    • A、All switch and bridge ports are in the forwarding state.
    • B、All switch and bridge ports are in the stand-by state.
    • C、All switch and bridge ports are assigned as either root or designated ports.
    • D、All switch and bridge ports are in either the forwarding or blocking state.
    • E、All switch and bridge are either blocking or looping.

    正确答案:D

  • 第4题:

    What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()

    • A、 Adjust the default hello timers to three seconds for aggressive mode
    • B、 Enable it in global mode and on every interface you need to support
    • C、 Enable it in global mode to support every individual fiber-optic interface
    • D、 Enable it to create channels containing up to eight parallel links between switches

    正确答案:C

  • 第5题:

    A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()

    • A、 a minimum of one Cisco 4100 Series WLAN Controller
    • B、 one WDS per subnet
    • C、 a minimum of one Wireless LAN Services Module
    • D、 all clients using Cisco Aironet Wireless LAN Adapters

    正确答案:B

  • 第6题:

    he Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS Software operating system. Together with the VMware ESX hypervisor, the Nexus 1000V supports Cisco VN-Link server virtualization technology, which provides mobile virtual machine security and network policy for VMware View components, including the DHCP snooping feature. DHCP snooping is disabled on the Nexus 1000V by default. When the DHCP snooping feature is enabled on the Nexus 1000V, what are the default trust settings for the vEthernet and uplink ports?() 

    • A、 All vEthernet ports are trusted, and all Ethernet ports such as uplinks and port channels are trusted.
    • B、 All vEthernet ports are not trusted, and all Ethernet ports such as uplinks and port channels are not trusted.
    • C、 All vEthernet ports are trusted and all Ethernet ports such as uplinks and port channels are not trusted.
    • D、 All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.

    正确答案:D

  • 第7题:

    单选题
    On switch R1 you issue the "udld enable" global command.  What does this command accomplish? ()
    A

     Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)

    B

     Enables all copper media LAN ports Unidirectional Link Detection (UDLD)

    C

     Overrides the default UDLS setting for all ports

    D

     Globally enables all ports on the device for Unidirectional Link Detection (UDLS)

    E

     None of the other alternatives apply


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()
    A

     determine types of protocols to be supported

    B

     determine the environment in which the router will be used

    C

     select the number of WAN ports required

    D

     select the number of LAN ports required


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()
    A

    Adjust the default hello timers to three seconds for aggressive mode.

    B

    Enable it in global mode and on every interface you need to support.

    C

    Enable it in global mode to support every individual fiber-optic interface.

    D

    Enable it to create channels containing up to eight parallel links between switches.

    E

    Enable it in global mode to support every individual fiber optic and Ethernet interface.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    问答题
    Practice 4  A: What is important when...?  Choosing a conference center  ●Facilities  ●Accommodations  ●Location  B: What is important when...?  Selecting an employee  ●Qualification  ●Personality  ● Creativity

    正确答案: 【参考范例】
    If you choose A:
    When choosing a conference center, it is of vital importance to consider the facilities, since facility available is the hardware component of a conference center. If the facility is in condition,, our work won’t be held up.
    Moreover, accommodation is another important matter. As a complex building, a conference center should cater to daily necessities, providing the guests with satisfactory food and bedrooms, which would leave them a pleasant recollection.
    At the same time, location is a decisive factor for business. For a conference center, company-intensive downtown area would be an ideal choice. However, there’s also a trend of moving towards tranquil suburbs.
    If you choose B:
    When selecting an employee, we should check on his or her qualification first. Certificates and diplomas can be referred to, since they reflect the extent to which the candidate receives education. However, they do not necessarily stand for a candidate’s qualification. We’ve met with too many incompetent holders of advanced degrees in real life. It is unrealistic to depend on them to make a profit for the company. On the contrary, interviewees with practical experience would bring in more benefits for the company.
    The second factor is the personality of the candidate. Everyone has a unique personality, which is a welcome phenomenon. However, a group of staff with similar personalities will meet with far less internal conflicts. Yet, there’s also a problem to worry about, since this unit might become a stagnantworking place where there is no room for vitality in the long run. Therefore, what is needed is a balance.
    Moreover, we should attach great importance to an employee’s creativity. Mediocreyesmanwho is accustomed to echoing the views of others clearly belongs to redundantlabourer. The employee is expected to have innovative ideas and be creative.
    解析: 暂无解析

  • 第11题:

    单选题
    What is recommended for a wireless LAN infrastructure configuration when using SVP-version SpectraLink phones?()
    A

    Disable DTPC on the radio.

    B

    Disable higher data rates on the radio.

    C

    Disable WMM policy on the WLAN.

    D

    Disable multicast on the WLAN.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    AutoQoS takes the interface type and bandwidth into consideration when implementing what three QoS features?()
    A

    FECN

    B

    LLQ

    C

    WRED

    D

    LFI

    E

    CRTP

    F

    CBWFQ


    正确答案: A,F
    解析: 暂无解析

  • 第13题:

    Which two statements correctly describe UDLD? ()

    • A、Unidirectional link detection is achieved through monitoring STP BPDUs.
    • B、It is recommended that it be enabled globally rather than on an individual port.
    • C、When an error is detected, normal mode will disable a port.
    • D、It is recommended that it be enabled in normal mode.
    • E、It is recommended that it be used with the loop guard feature.

    正确答案:B,E

  • 第14题:

    What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()

    • A、Adjust the default hello timers to three seconds for aggressive mode.
    • B、Enable it in global mode and on every interface you need to support.
    • C、Enable it in global mode to support every individual fiber-optic interface.
    • D、Enable it to create channels containing up to eight parallel links between switches.
    • E、Enable it in global mode to support every individual fiber optic and Ethernet interface.

    正确答案:C

  • 第15题:

    The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do  to help a network with many multicasts and broadcasts?()

    • A、Creating smaller broadcast domains by implementing VLANs.
    • B、Separate nodes into different hubs.
    • C、Creating larger broadcast domains by implementing VLANs.
    • D、Separate nodes into different switches.
    • E、All of the above.

    正确答案:A

  • 第16题:

    What is the recommended practice when considering VPN termination and firewall placement?()

    • A、 have the firewall and VPN appliance deployed in parallel
    • B、 place the VPN in line with the firewall, with the VPN terminating inside the firewall
    • C、 place the public side of the VPN termination device in the DMZ behind a firewall
    • D、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

    正确答案:C

  • 第17题:

    As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

    • A、Disable post scan
    • B、Use SSH or SSL
    • C、Enable trust levels
    • D、Deny echo replies on all edge routers

    正确答案:B

  • 第18题:

    A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()

    • A、All maintenance personnel have full access to all records.
    • B、All maintenance personnel have read-only access to all data. 
    • C、Only a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.
    • D、Maintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

    正确答案:C

  • 第19题:

    单选题
    A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()
    A

    All maintenance personnel have full access to all records.

    B

    All maintenance personnel have read-only access to all data. 

    C

    Only a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.

    D

    Maintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()
    A

    determine types of protocols to be supported

    B

    determine the environment in which the router will be used

    C

    select the number of WAN ports required

    D

    select the number of LAN ports required


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
    A

    Make all ports private VLAN ports.

    B

    Place all unused ports in native VLAN 1 until needed.

    C

    Proactively configure unused switch ports as access ports.

    D

    Disable Cisco Discovery Protocol globally.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()
    A

     Adjust the default hello timers to three seconds for aggressive mode

    B

     Enable it in global mode and on every interface you need to support

    C

     Enable it in global mode to support every individual fiber-optic interface

    D

     Enable it to create channels containing up to eight parallel links between switches


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    When troubleshooting the issue, you notice the election of a new root bridge with an unknown MAC address. Knowing that all access ports have the PortFast feature enabled, what would be the easiest way to resolve the issue without losing redundant links?()
    A

    Enable bpduguard globally.

    B

    Enable rootguard.

    C

    Enable loopguard.

    D

    Enable spanning tree.

    E

    Enable UDLD


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    What is the recommended practice when considering VPN termination and firewall placement?()
    A

     have the firewall and VPN appliance deployed in parallel

    B

     place the VPN in line with the firewall, with the VPN terminating inside the firewall

    C

     place the public side of the VPN termination device in the DMZ behind a firewall

    D

     place the VPN in line with the firewall, with the VPN terminating outside the firewall


    正确答案: A
    解析: 暂无解析