多选题Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()ASpanning Tree ProtocolBCablingCFrame forwardingDPacket forwardingEEtherChannelFRouting protocols

多选题
Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()
A

Spanning Tree Protocol

B

Cabling

C

Frame forwarding

D

Packet forwarding

E

EtherChannel

F

Routing protocols


参考解析

解析: 暂无解析

相关考题:

Which of the following risks are generally considered unpredictable:A business riskB financial riskC inflationD natural hazardsE taxes

Which of the following activities can be considered as part of risk mitigationA risk identificationB purchasing insuranceC assessment of outcomesD assessment of probabilitiesE C and D only

A technician is troubleshooting a network connectivity issue. Given the following abbreviated traceroute output:Which of the following is MOST likely occurring?() A. Switching loopB. Broadcast stormC. IP conflictD. Routing loop

Which of the following database objects is considered executable using SQL?() A.ViewB.TableC.RoutineD.Package

Which of the following objects contains control structures that are considered the bound form of SQL statements?()A、UDTB、TriggerC、PackageD、Access plan

Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()A、Spanning Tree ProtocolB、CablingC、Frame forwardingD、Packet forwardingE、EtherChannelF、Routing protocols

Which of the following is not considered a common approach to narrow the field of potential problem causes()A、Following the traffic pathB、Top-downC、Comparing configurationsD、Bottom-upE、Divide and conquerF、ExamineS LAs

Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()A、Use the Cisco Auto Configuration toolB、Use the Cisco Rollback featureC、Automate documentationD、Schedule documentation checksE、Use the Cisco Configuration Archive toolF、Require documentation prior to a ticket being closed out

Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance

Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()A、Routing loopsB、Misconfiguration of VPN end pointsC、Overiapping IP address spaceD、DMVPNE、User profilesF、MTU

Which of the following is the NEXT step in the troubleshooting theory after identifying the problem?()A、Establish a theory of probable causeB、Test the theoryC、Implement preventative measuresD、Establish a plan of action

Which of the following is unsafe for a technician to use when troubleshooting or repairing a CRT monitor?()A、Anti-static padB、Anti-static wrist strapC、Rubber glovesD、Multimeter

An administrator is troubleshooting a power supply that is believed to have failed. Which of the following tools will BEST help test the power supply?()A、ESD EquipmentB、MultimeterC、POST CardD、Toner Probe

Which of the following components should be removed prior to troubleshooting any server hardware failure?()A、Memory in RAIDB、Hard drivesC、Third party memoryD、Airflow baffles

Which of the following are considered plug and play technologies in a laptop?()A、SATAB、RAIDC、USBD、EIDE

Which of the following is NOT a phase of the troubleshooting process?()A、confirm the repairB、define the problemC、document the resultsD、simplify the problem

Which of the following are considered link state protocols?()A、RIPv2 and EIGRPB、EGP and IGPC、OSPF and IS-ISD、RIP and BGP

Which of the following should be considered when upgrading memory? ()A、speed of memoryB、memory slot colorC、type of memoryD、CPU speedE、BIOS version

Which of the following database objects is considered executable using SQL?()A、ViewB、TableC、RoutineD、Package

单选题Which of the following is not a typical wireless troubleshooting target?()AQuality of ServiceBTrunk configurationCAccess listsDRouting protocol configurationEPower over EthernetFDHCP configuration

单选题When using a buoy as an aid to navigation which of the following should be considered?()AThe buoy should be considered to always be in the charted locationBIf the light is flashing,the buoy should be considered to be in the charted locationCThe buoy may not be in the charted positionDThe buoy should be considered to be in the charted position if it has been freshly painted

多选题Which of the following would be considered a routing protocol?()AOSPFBDHCPCSMTPDSNMPERIP

多选题Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()ARouting loopsBMisconfiguration of VPN end pointsCOveriapping IP address spaceDDMVPNEUser profilesFMTU