CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)

A. To determine the status of network services on a remote device

B. To obtain the IP Address of a connected device in order to telnet to the device

C. To verify the type of cable interconnecting two devices

D. To verify Layer 2 connectivity between two devices when Layer 3 fails

E. To obtain VLAN information from directly connected swticehs

F. To determine the status of the routing protocols between directly connected routers

G. To support automatic network failover during outages


相关考题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)A.It enables equipment from different vendors to use the same electronic components, thus saving research and development fundsB.It encourages industry standardization by defining what functions occur at each layer of the modelC.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshootingD.It provides a means by which changes in functionality in one layer require changes in other layersE.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers

The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)A. Routers generally cost less than switchesB. Filtering can occur based on Layer 3 informationC. Broadcasts are not forwarded across the routerD. Broadcasts are eliminatedE. Adding a router to the network decreases latencyF. Routers can generally support more LAN ports than switches

Ezonexam is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two)A. VLANB. SubinterfaceC. STPD. HubE. SwitchF. RouterG. Wireless Access PointH. VTP

The Ezonexam network administrator has issued the "VTP password ezonexam" command on a Cisco device. What is the purpose of this command?A.It allows two VTP servers to exists in the same domain, each configured with different passwordsB.It is the password required when promoting a switch from VTP client mode to VTP server modeC.It is used to access the VTP server to make changes to the VTP configurationD.It is used to validate the sources of VTP advertisements sent between switchesE.None of the above

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

VE1 is a switch in the Ezonexam network. Why will VE1 never learn the broadcast address?A. Broadcast frames are never sent to switchesB. A broadcast frame. is never forwarded by a switchC. Broadcasts only use network layer addressingD. A broadcast address will never be the source address of a frameE. Broadcast addresses use an incorrect format for the switching tableF. None of the above

You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

A Ezonexam technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the show cdp neighbors command.In which OSI layer is the problem most likely occurring?A.PhysicalB.Data linkC.Network layerD.Transport layerE.Application layer

The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)A.ARPB.CDPC.DHCPD.DNSE.ICMP

The network security policy for Ezonexam requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should be automatically disabled. Which two commands must the Ezonexam network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)A.SWEzonexam1(config-if)# switchport port-security maximum 1B.SWEzonexam1(config)# mac-address-table secureC.SWEzonexam1(config)# access-list 10 permit ip hostD.SWEzonexam1(config-if)# switchport port-security violation shutdownE.SWEzonexam1(config-if)# ip access-group 10

What are two reasons a network administrator would use CDP?() A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routers

Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()A.The Manchester serial address is 10.1.1.1B.The Manchester serial address is 10.1.1.2C.这个Manchester路由器串口地址为:10.1.12D.The London router is a Cisco 2610.E.The Manchester router is a Cisco 2610.F.The CDP information was received on port Serial0/0 of the Manchester router.G.The CDP information was sent by port Serial0/0 of the London Router.

The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command (Choose two.)()。A.The command establishes a static route.B.The command invokes a dynamic routing protocol for 192.168.12.0.C.Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.D.Traffic for all networks is forwarded to 172.16.12.1.E.This route is automatically propagated throughout the entire network.F.Trafficfor network 172.16.12.0 is forwarded to the 192.168.12.0 network.

What are two reasons a network administrator would use CDP? () A.to verify the type of cable interconnecting two devicesB.to determine the status of network services on a remote deviceC.to obtain VLAN information from directly connected switchesD.to verify Layer 2 connectivity between two devices when Layer 3 failsE.to obtain the IP address of a connected device in order to telnet to the deviceF.to determine the status of the routing protocols between directly connected routers

What are two reasons a network administrator would use CDP (Choose two.)()。 A.to verify the type of cable interconnecting two devicesB.to determine the status of network services on a remote deviceC.to obtain VLAN information from directly connected switchesD.to verify Layer 2 connectivity between two devices when Layer 3 failsE.to obtain the IP address of a connected device in order to telnet to the deviceF.to determine the status of the routing protocols between directly connected routers

What are two reasons that a network administrator would use access lists (Choose two.)()。 A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network. You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.  What should you do?()A、On the network adapter that is connected to the LAN, enable TCP/IP filtering.B、On the network adapter that is connected to the Internet, enable TCP/IP filtering.C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service.D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()A、PIM sparse mode is being used.B、PIM dense mode is being used.C、The BGP multicast address family has not been configured.D、IGMP version 3 is being used.E、IP PIM neighbor filters have not been applied.

What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process

What are two reasons why a device will fail to register to a community? ()(Choose two.)A、The community name is not configured.B、The registration server password is incorrect.C、The registration server IP address is incorrect.D、The backup registration server IP address is missing.

多选题What are two reasons a network administrator would use CDP? ()Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers

多选题What are two reasons why a device will fail to register to a community? ()(Choose two.)AThe community name is not configured.BThe registration server password is incorrect.CThe registration server IP address is incorrect.DThe backup registration server IP address is missing.