Where is the IS-IS Network Entity Title configured?()A、per IP interfaceB、per virtual routerC、only on LAN interfacesD、only on WAN interfaces

Where is the IS-IS Network Entity Title configured?()

  • A、per IP interface
  • B、per virtual router
  • C、only on LAN interfaces
  • D、only on WAN interfaces

相关考题:

You would like to operate IS-IS on interface atm 6/0.33 with an IP address of 192.168.1.1/24.Which set of commands accomplishes this?() A. router isis network 192.168.1.0 0.0.0.255B. router isis network 192.168.1.0 255.255.255.0C. interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 router isisD. interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 ip router isis

Where is the IS-IS Network Entity Title configured?() A.per IP interfaceB. per virtual routerC. only on LAN interfacesD. only on WAN interfaces

When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?() A.RingB.MeshC.StarD.Hybrid

A technician would use a physical network diagram to determine:() A. the cause of routing errors.B. the number of switches on the network.C. the number of users on the network.D. where network latency will occur.

DR (Designated Router) is for environments where many routers on the same network such as Ethernet. In the following presented network, all routers are reloaded simultaneously, and DR is selected as expected. What is the RTC status?()A. 2WAY/DRB. FULL/DRC. FULL/DROTHERD. FULL/BDR

What are three factors a network administrator must consider before implementing Netflow in the network?() A.CPU utilizationB.where Netflow data will be sentC.number of devices exporting Netflow dataD.port availabilityE.SNMP versionF.WAN encapsulation

What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation

You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A、 Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B、 Trust boundaries are a point in the network where QoS functionality begins and ends.C、 Trust boundaries determine whether certain types of traffic can pass.D、 Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E、 None of the other alternatives apply

A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A、Install anti-virus software on the student computers.B、Put the faculty computers in a separate VLAN.C、Power down the switches that connect to faculty computers when they are not in use.D、Remove the student computers from the network and put them on a peer-to-peer network.E、Create an access list that blocks the students from the Internet where the hacking tolls are located.

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

Which three components are part of the Network Entity Title (NET) on an IS-IS router?()A、AFIB、MACC、areaD、N-SelectorE、IP address

Which statement describes OTV configuration on the Cisco Nexus 7000 Series Switches? ()A、 The OTV control-plane protocol uses the IS-IS protocol to establish adjacencies and exchange MAC reachability across the overlay network. You must enable IS-IS with the feature isis command before OTV adjacencies can be established.B、 OTV uses an SSM group range for neighbor discovery and to exchange MAC reachability with other OTV edge peers.C、 The OTV join interface is a routed uplink interface on the edge device used to physically join the overlay network.D、 The OTV internal interface encapsulates the site Layer 2 frames in IP unicast or multicast packets that are then sent to the other sites.

As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()A、ISSU,OSPF,IS-ISB、IETF,OSPF,ISSUC、IS-IS,EIGRP,SSO,BGPD、EIGRP,BGP,OSPF,IS-IS

You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?()A、Upgrade the firmware on all routers and switchesB、Reboot the entire network one device at a timeC、Conduct a network traffic analysisD、Rerun the baseline to ensure the results were correct

In Windows 2000, where should you go to join a workgroup or domain?()A、Device ManagerB、System PropertiesC、Membership ManagerD、Network and Dial Up Connections

Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

A technician would use a physical network diagram to determine:()A、the cause of routing errors.B、the number of switches on the network.C、the number of users on the network.D、where network latency will occur.

Which four components make up the Network Entity Title (NET) of an IS-IS router?()A、AFB、AFIC、MACD、AreaE、SysIDF、A-SelectorG、N-SelectorH、IP-address

You would like to operate IS-IS on interface atm 6/0.33 with an IP address of 192.168.1.1/24. Which set of commands accomplishes this?()A、router isis network 192.168.1.0 0.0.0.255B、router isis network 192.168.1.0 255.255.255.0C、interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 router isisD、interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 ip router isis

单选题As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()AISSU,OSPF,IS-ISBIETF,OSPF,ISSUCIS-IS,EIGRP,SSO,BGPDEIGRP,BGP,OSPF,IS-IS

多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch

单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()AInstall anti-virus software on the student computers.BPut the faculty computers in a separate VLAN.CPower down the switches that connect to faculty computers when they are not in use.DRemove the student computers from the network and put them on a peer-to-peer network.ECreate an access list that blocks the students from the Internet where the hacking tolls are located.

多选题Which three components are part of the Network Entity Title (NET) on an IS-IS router?()AAFIBMACCareaDN-SelectorEIP address

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

单选题You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B Trust boundaries are a point in the network where QoS functionality begins and ends.C Trust boundaries determine whether certain types of traffic can pass.D Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E None of the other alternatives apply

多选题Which four components make up the Network Entity Title (NET) of an IS-IS router?()AAFBAFICMACDAreaESysIDFA-SelectorGN-SelectorHIP-address

单选题Where is the IS-IS Network Entity Title configured?()Aper IP interfaceBper virtual routerConly on LAN interfacesDonly on WAN interfaces