itgle.com

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in

题目

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)

A. To determine the status of network services on a remote device

B. To obtain the IP Address of a connected device in order to telnet to the device

C. To verify the type of cable interconnecting two devices

D. To verify Layer 2 connectivity between two devices when Layer 3 fails

E. To obtain VLAN information from directly connected swticehs

F. To determine the status of the routing protocols between directly connected routers

G. To support automatic network failover during outages


相似考题
更多“CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in”相关问题
  • 第1题:

    The Ezonexam network administrator has issued the "VTP password ezonexam" command on a Cisco device. What is the purpose of this command?

    A.It allows two VTP servers to exists in the same domain, each configured with different passwords

    B.It is the password required when promoting a switch from VTP client mode to VTP server mode

    C.It is used to access the VTP server to make changes to the VTP configuration

    D.It is used to validate the sources of VTP advertisements sent between switches

    E.None of the above


    正确答案:D

  • 第2题:

    VE1 is a switch in the Ezonexam network. Why will VE1 never learn the broadcast address?

    A. Broadcast frames are never sent to switches

    B. A broadcast frame. is never forwarded by a switch

    C. Broadcasts only use network layer addressing

    D. A broadcast address will never be the source address of a frame

    E. Broadcast addresses use an incorrect format for the switching table

    F. None of the above


    正确答案:D
    D

  • 第3题:

    A Ezonexam technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the show cdp neighbors command.

    In which OSI layer is the problem most likely occurring?

    A.Physical

    B.Data link

    C.Network layer

    D.Transport layer

    E.Application layer


    正确答案:B
    解析:Explanation:Asthequestionstatesthatseriallineisup,itmeanstheproblemisnotontheNetworklayer.Theadministratorcannotseeanyoutputbyissuingtheshowcdpneighborscommand.ItmeansthatCDPisdisabledandCDPisaprotocolthatrunsoverLayer2(thedatalinklayer)onallCiscorouters,bridges,accessservers,andswitches.

  • 第4题:

    The network security policy for Ezonexam requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should be automatically disabled. Which two commands must the Ezonexam network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)

    A.SWEzonexam1(config-if)# switchport port-security maximum 1

    B.SWEzonexam1(config)# mac-address-table secure

    C.SWEzonexam1(config)# access-list 10 permit ip host

    D.SWEzonexam1(config-if)# switchport port-security violation shutdown

    E.SWEzonexam1(config-if)# ip access-group 10


    正确答案:AD
    解析:ExplanationCatalystswitchesoffertheportsecurityfeaturetocontrolportaccessbasedonMACaddresses.Toconfigureportsecurityonanaccesslayerswitchport,beginbyenablingitwiththefollowinginterfaceconfigurationcommand:Switch(config-if)#switchportport-securityNext,youmustidentifyasetofallowedMACaddressessothattheportcangrantthemaccess.Youcanexplicitlyconfigureaddressesortheycanbedynamicallylearnedfromporttraffic.Oneachinterfacethatusesportsecurity,specifythemaximumnumberofMACaddressesthatwillbeallowedaccessusingthefollowinginterfaceconfigurationcommand:Switch(config-if)#switchportport-securitymaximummax-addrFinally,youmustdefinehoweachinterfaceusingportsecurityshouldreactifaMACaddressisinviolationbyusingthefollowinginterfaceconfigurationcommand:Switch(config-if)#switchportport-securityviolation{shutdown|restrict|protect}AviolationoccursifmorethanthemaximumnumberofMACaddressesarelearned,orifanunknown(notstaticallydefined)MACaddressattemptstotransmitontheport.Theswitchporttakesoneofthefollowingconfiguredactionswhenaviolationisdetected:shutdown-Theportisimmediatelyputintotheerrdisablestate,whicheffectivelyshutsitdown.Itmustbere-enabledmanuallyorthrougherrdisablerecoverytobeusedagain.restrict-Theportisallowedtostayup,butallpacketsfromviolatingMACaddressesaredropped.TheswitchkeepsarunningcountofthenumberofviolatingpacketsandcansendanSNMPtrapandasyslogmessageasanalertoftheviolation.protect-Theportisallowedtostayup,asintherestrictmode.Althoughpacketsfromviolatingaddressesaredropped,norecordoftheviolationiskept.

  • 第5题:

    Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()

    A.The Manchester serial address is 10.1.1.1

    B.The Manchester serial address is 10.1.1.2

    C.这个Manchester路由器串口地址为:10.1.12

    D.The London router is a Cisco 2610.

    E.The Manchester router is a Cisco 2610.

    F.The CDP information was received on port Serial0/0 of the Manchester router.

    G.The CDP information was sent by port Serial0/0 of the London Router.


    参考答案:A, D, F

  • 第6题:

    What are two reasons a network administrator would use CDP? ()

    A.to verify the type of cable interconnecting two devices

    B.to determine the status of network services on a remote device

    C.to obtain VLAN information from directly connected switches

    D.to verify Layer 2 connectivity between two devices when Layer 3 fails

    E.to obtain the IP address of a connected device in order to telnet to the device

    F.to determine the status of the routing protocols between directly connected routers


    参考答案:D, E

  • 第7题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    A.to control vty access into a router

    B.to control broadcast traffic through a router

    C.to filter traffic as it passes through a router

    D.to filter traffic that originates from the router

    E.to replace passwords as a line of defense against security incursions


    参考答案:A, C

  • 第8题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第9题:

    Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()

    • A、PIM sparse mode is being used.
    • B、PIM dense mode is being used.
    • C、The BGP multicast address family has not been configured.
    • D、IGMP version 3 is being used.
    • E、IP PIM neighbor filters have not been applied.

    正确答案:B

  • 第10题:

    What are two reasons a network administrator would use CDP?()

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第11题:

    What are two reasons why a device will fail to register to a community? ()(Choose two.)

    • A、The community name is not configured.
    • B、The registration server password is incorrect.
    • C、The registration server IP address is incorrect.
    • D、The backup registration server IP address is missing.

    正确答案:B,C

  • 第12题:

    多选题
    What are two reasons why a device will fail to register to a community? ()(Choose two.)
    A

    The community name is not configured.

    B

    The registration server password is incorrect.

    C

    The registration server IP address is incorrect.

    D

    The backup registration server IP address is missing.


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

    A.To prevent unauthorized hosts from getting access to the LAN

    B.To limit the number of Layer 2 broadcasts on a particular switch port

    C.To prevent unauthorized Telnet or SSH access to a switch port

    D.To prevent the IP and MAC address of the switch and associated ports

    E.None of the above


    正确答案:A
    解析:Explanation:
    You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

    If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

  • 第14题:

    You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.

    A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.

    Type of permission Account Permission

    Share Users Change

    NTFS Users Full Control

    You discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.

    What two actions should you take? (Choose Two)

    A.Modify the NTFS permissions for the 10 files.

    B.Modify the NTFS permissions for the Data folder.

    C.Modify the shared permissions for the Data folder.

    D.Log off the users from the network.

    E.Disconnect the users from the Data folder.


    正确答案:AE
    解析:Explanation: In this scenario our guideline would be to cause the network users as little disruption as possible. We would do this by only modifying the NTFS permissions on the 10 specific files. Then all users must be disconnected from the Data folder.

    Incorrect answers:
    B: Permissions only need to be changed on the files, not on the whole folder.

    C: Permissions only need to be changed on the files, not on the whole folder.

    D: It is not necessary to log off the users from the network. They only have to be disconnected from the folder.

  • 第15题:

    The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)

    A.ARP

    B.CDP

    C.DHCP

    D.DNS

    E.ICMP


    正确答案:AE
    解析:Explanation:ARPfindsthehardwareaddressofahostfromaknownIPaddress.Here'showitworks:whenIPhasadatagramtosend,itmustinform.aNetworkAccessprotocol,suchasEthernetorTokenRing,ofthedestination'shardwareaddressonthelocalnetwork.(Ithasalreadybeeninformedbyupper-layerprotocolsofthedestination'sIPaddress.)IfIPdoesn'tfindthedestinationhost'shardwareaddressintheARPcache,itusesARPtofindthisinformation.ICMPworksattheNetworklayerandisusedbyIPformanydifferentservices.ICMPisamanagementprotocolandmessagingserviceproviderforIP.ItsmessagesarecarriedasIPdatagrams.RFC1256isanannextoICMP,whichaffordshosts'extendedcapabilityindiscoveringroutestogateways.Periodically,routeradvertisementsareannouncedoverthenetwork,reportingIPaddressesfortherouter'snetworkinterfaces.Hostslistenforthesenetworkinfomercialstoacquirerouteinformation.Aroutersolicitationisarequestforimmediateadvertisementsandmaybesentbyahostwhenitstartsup.

  • 第16题:

    What are two reasons a network administrator would use CDP?()

    A. to verify the type of cable interconnecting two devices

    B. to determine the status of network services on a remote device

    C. to obtain VLAN information from directly connected switches

    D. to verify Layer 2 connectivity between two devices when Layer 3 fails

    E. to obtain the IP address of a connected device in order to telnet to the device

    F. to determine the status of the routing protocols between directly connected routers


    参考答案:D, E

  • 第17题:

    The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command (Choose two.)()。

    A.The command establishes a static route.

    B.The command invokes a dynamic routing protocol for 192.168.12.0.

    C.Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.

    D.Traffic for all networks is forwarded to 172.16.12.1.

    E.This route is automatically propagated throughout the entire network.

    F.Trafficfor network 172.16.12.0 is forwarded to the 192.168.12.0 network.


    参考答案:A, C

  • 第18题:

    What are two reasons a network administrator would use CDP (Choose two.)()。

    A.to verify the type of cable interconnecting two devices

    B.to determine the status of network services on a remote device

    C.to obtain VLAN information from directly connected switches

    D.to verify Layer 2 connectivity between two devices when Layer 3 fails

    E.to obtain the IP address of a connected device in order to telnet to the device

    F.to determine the status of the routing protocols between directly connected routers


    参考答案:D, E

  • 第19题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第20题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network. You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.  What should you do?()

    • A、On the network adapter that is connected to the LAN, enable TCP/IP filtering.
    • B、On the network adapter that is connected to the Internet, enable TCP/IP filtering.
    • C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service.
    • D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

    正确答案:D

  • 第21题:

    What are two reasons a network administrator would use CDP (Choose two.)()。

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第22题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第23题:

    多选题
    What are two reasons a network administrator would use CDP? ()
    A

    to verify the type of cable interconnecting two devices

    B

    to determine the status of network services on a remote device

    C

    to obtain VLAN information from directly connected switches

    D

    to verify Layer 2 connectivity between two devices when Layer 3 fails

    E

    to obtain the IP address of a connected device in order to telnet to the device

    F

    to determine the status of the routing protocols between directly connected routers


    正确答案: B,A
    解析: 暂无解析