Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()A、Pings are allowed only to specific devices.B、CDP information is not exchanged.C、Port scans can no longer be run.D、Some network diagnostic data is lost.E、Wireless devices need to be physically connected to the edge device.F、OSPF routing needs the command ip ospf network non-broadcast enabled.

Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()

  • A、Pings are allowed only to specific devices.
  • B、CDP information is not exchanged.
  • C、Port scans can no longer be run.
  • D、Some network diagnostic data is lost.
  • E、Wireless devices need to be physically connected to the edge device.
  • F、OSPF routing needs the command ip ospf network non-broadcast enabled.

相关考题:

Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.) A. The ADR base keeps all diagnostic information in binary formatB. SQL*Plus provides the ADRI script, which can be used to work with ADRC. The ADR can be used for problem diagnosis only when the database is openD. The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullE. The ADR can be used for problem diagnosis even when the database instance is downF. The ADR base is shared across multiple instances

Which statement describes transit traffic?() A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C. Any traffic that requires the generation of an ICMP message.D. Traffic that requires some form of special attention and does not pass through the device.

Which two statements regarding traceroute on JUNOS devices are correct?() A.Traceroute transmits ICMP echo-request packets.B.Traceroute transmits UDP packets.C.Traceroute receives ICMP echo-reply packets.D.Traceroute receives ICMP port-unreachable packets.

With regard to Ethernet media access methods, which of the following are true?(Choose all that apply.)A.A device waits for an electronic signal before transmitting.B.A device listens and waits until the media is not busy before transmitting.C.All devices on an Ethernet segment see data that passes on the network medium.D.Only the sender and the receiver devices see data that passes on the network medium.E.Ethernet networks allow you to configured devises with higher transmission priority.

Which statement about CiscoWorks 2000 Inventory Manager is true?() A. It uses SNMP v1.B. It scans devices for hardware information.C. It scans and records the operational status of devices.D. When the configuration of a device changes, the inventory is automatically updated.

Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()A.The Manchester serial address is 10.1.1.1B.The Manchester serial address is 10.1.1.2C.这个Manchester路由器串口地址为:10.1.12D.The London router is a Cisco 2610.E.The Manchester router is a Cisco 2610.F.The CDP information was received on port Serial0/0 of the Manchester router.G.The CDP information was sent by port Serial0/0 of the London Router.

Which two statements about the Wireless Location Appliance are true? ()A、 A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.B、 Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).C、 The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.D、 The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).E、 The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.

ISL is being configured on a Company switch.  Which of the following choices are true regarding  the ISL protocol? ()A、 It can be used between Cisco and non-Cisco switch devices.B、 It calculates a new CRC field on top of the existing CRC field.C、 It adds 4 bytes of protocol-specific information to the original Ethernet frame.D、 It adds 30 bytes of protocol-specific information to the original Ethernet frame.

The proper safety guidelines for handling any device specific consumables can be found in which of the following documentation?()A、Material Safety Data SheetsB、Installation GuidesC、Consumer ReportsD、Devices Parts Catalog

Which statement is true regarding proxy ARP?()A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.B、Proxy ARP is enabled by default on chassis clusters.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

Which statement is true regarding NAT?()A、NAT is not supported on SRX Series devices.B、NAT requires special hardware on SRX Series devices.C、NAT is processed in the control plane.D、NAT is processed in the data plane.

Which statement describes transit traffic?()A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C、Any traffic that requires the generation of an ICMP message.D、Traffic that requires some form of special attention and does not pass through the device.

Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

Which statement about CiscoWorks 2000 Inventory Manager is true?()A、 It uses SNMP v1.B、 It scans devices for hardware information.C、 It scans and records the operational status of devices.D、 When the configuration of a device changes, the inventory is automatically updated.

With regard to Ethernet media access methods, which of the following are true?()A、A device waits for an electronic signal before transmitting.B、A device listens and waits until the media is not busy before transmitting.C、All devices on an Ethernet segment see data that passes on the network medium.D、Only the sender and the receiver devices see data that passes on the network medium.E、Ethernet networks allow you to configured devises with higher transmission priority.

Which two statements about the Wireless Location Appliance are true?()A、a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllersB、before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)C、the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.D、the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)E、the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.

CDP is running between two TestKing devices. What information is supplied by CDP?()A、Device identifiersB、Capabilities listC、PlatformD、Route identifierE、Neighbor traffic data

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

Which statement is true regarding syslog on Junos devices?()A、No logging is enabled by defaultB、By default the information is stored in all file named eventsC、Only the message severity level must be configuredD、You can configure the router to send log messages to the console

Which two statements are true about the Automatic Diagnostic Repository (ADR)?() A、 The ADR base keeps all diagnostic information in binary formatB、 SQL*Plus provides the ADRI script, which can be used to work with ADRC、 The ADR can be used for problem diagnosis only when the database is openD、 The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullE、 The ADR can be used for problem diagnosis even when the database instance is downF、 The ADR base is shared across multiple instances

Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)A、The ADR base keeps all diagnostic information in binary formatB、SQL*Plus provides the ADRI script, which can be used to work with ADRC、The ADR can be used for problem diagnosis only when the database is openD、The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullE、The ADR can be used for problem diagnosis even when the database instance is downF、The ADR base is shared across multiple instances

问答题Practice 4  Bluetooth is the newest kid on the technology block, and it holds a lot of promise for the assistive technology industry. Named for a 10th Century King of Denmark who unified the kingdoms of Denmark and Norway, Bluetooth is a shot-range wireless communication specification that promises to improve and increase electronic access to a number of environments by overcoming some of the obstacles typical of current technology. Bluetooth technology will enable devices to communicate and transfer data wirelessly and without the line-of-site issues of infra red technology.  So how does it work?  Bluetooth devices search each other out within their given operational range. Unlike devices that are wired together, Bluetooth devices do not have to be aware of the capabilities or properties of the devices to which they will connect beforehand. Bluetooth devices have a built-in mechanism that lets each device identify itself as well as its capabilities as it connects into this new Bluetooth network. This dynamic network does have a controlling device that designates itself as the master for the connection. Its programming and the capabilities necessary for the given task determine whether or not a device can be a master. For example, a cell phone may act as a master device when connecting to a headset, an ATM, or an information kiosk. However, the same cell phone or headset may act as a slave device to the information kiosk, now acting as the master device, broadcasting emergency evacuation information. The cell phone and kiosk can function in either capacity depending on the required function and their programming.

单选题Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()APings are allowed only to specific devices.BCDP information is not exchanged.CPort scans can no longer be run.DSome network diagnostic data is lost.EWireless devices need to be physically connected to the edge device.FOSPF routing needs the command ip ospf network non-broadcast enabled.

单选题Which statement about CiscoWorks 2000 Inventory Manager is true?()AIt uses SNMP v1.BIt scans devices for hardware information.CIt scans and records the operational status of devices.DWhen the configuration of a device changes, the inventory is automatically updated.

多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

单选题Which statement about CiscoWorks 2000 Inventory Manager is true?()A It uses SNMP v1.B It scans devices for hardware information.C It scans and records the operational status of devices.D When the configuration of a device changes, the inventory is automatically updated.

单选题Which statement is true regarding proxy ARP?()AProxy ARP is enabled by default on stand-alone JUNOS security devices.BProxy ARP is enabled by default on chassis clusters.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled