What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?() A. Adjust the default hello timers to three seconds for aggressive mode.B. Enable it in global mode and on every interface you need to support.C. Enable it in global mode to support every individual fiber-optic interface.D. Enable it to create channels containing up to eight parallel links between switches.E. Enable it in global mode to support every individual fiber optic and Ethernet interface.

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()

A. Adjust the default hello timers to three seconds for aggressive mode.

B. Enable it in global mode and on every interface you need to support.

C. Enable it in global mode to support every individual fiber-optic interface.

D. Enable it to create channels containing up to eight parallel links between switches.

E. Enable it in global mode to support every individual fiber optic and Ethernet interface.


相关考题:

What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?() A. determine types of protocols to be supportedB. determine the environment in which the router will be usedC. select the number of WAN ports requiredD. select the number of LAN ports required

What does the command udld reset accomplish?()A、allows an UDLD port to automatically reset when it has been shutdownB、resets all UDLD enabled ports that have been shutdownC、removes all UDLD configurations from interfaces that were globally enabledD、removes all UDLD configurations from interfaces that were enabled per-port

What are two important guidelines to follow when implementing VTP?()A、 CDPmust be enabled on all switches in theVTP management domain.B、 All switches in the VTPdomain must run the same version of VTP.C、 When using secure mode VTP, only configure management domain passwords onVTP servers.D、 EnablingVTP pruning on a server willenable the feature for the entire management domain.E、 Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

On switch R1 you issue the "udld enable" global command.  What does this command accomplish? ()A、 Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)B、 Enables all copper media LAN ports Unidirectional Link Detection (UDLD)C、 Overrides the default UDLS setting for all portsD、 Globally enables all ports on the device for Unidirectional Link Detection (UDLS)E、 None of the other alternatives apply

Which two statements correctly describe UDLD? ()A、Unidirectional link detection is achieved through monitoring STP BPDUs.B、It is recommended that it be enabled globally rather than on an individual port.C、When an error is detected, normal mode will disable a port.D、It is recommended that it be enabled in normal mode.E、It is recommended that it be used with the loop guard feature.

What happens when the CRS Engine fails in a High-Availability CRS deployment? ()A、All activities fail over without any loss of data or dropping any calls. B、All current agent calls are dropped. C、All callers on active CTI ports are dropped. D、The standby CRS Engine starts, processing new calls immediately.

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()A、Adjust the default hello timers to three seconds for aggressive mode.B、Enable it in global mode and on every interface you need to support.C、Enable it in global mode to support every individual fiber-optic interface.D、Enable it to create channels containing up to eight parallel links between switches.E、Enable it in global mode to support every individual fiber optic and Ethernet interface.

What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?()A、All switch and bridge ports are in the forwarding state.B、All switch and bridge ports are in the stand-by state.C、All switch and bridge ports are assigned as either root or designated ports.D、All switch and bridge ports are in either the forwarding or blocking state.E、All switch and bridge are either blocking or looping.

The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do  to help a network with many multicasts and broadcasts?()A、Creating smaller broadcast domains by implementing VLANs.B、Separate nodes into different hubs.C、Creating larger broadcast domains by implementing VLANs.D、Separate nodes into different switches.E、All of the above.

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()A、 Adjust the default hello timers to three seconds for aggressive modeB、 Enable it in global mode and on every interface you need to supportC、 Enable it in global mode to support every individual fiber-optic interfaceD、 Enable it to create channels containing up to eight parallel links between switches

What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

A customer is deploying a wireless core feature set using autonomous access points and requires Layer 2 roaming. What is a requirement when deploying this solution?()A、 a minimum of one Cisco 4100 Series WLAN ControllerB、 one WDS per subnetC、 a minimum of one Wireless LAN Services ModuleD、 all clients using Cisco Aironet Wireless LAN Adapters

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

he Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS Software operating system. Together with the VMware ESX hypervisor, the Nexus 1000V supports Cisco VN-Link server virtualization technology, which provides mobile virtual machine security and network policy for VMware View components, including the DHCP snooping feature. DHCP snooping is disabled on the Nexus 1000V by default. When the DHCP snooping feature is enabled on the Nexus 1000V, what are the default trust settings for the vEthernet and uplink ports?() A、 All vEthernet ports are trusted, and all Ethernet ports such as uplinks and port channels are trusted.B、 All vEthernet ports are not trusted, and all Ethernet ports such as uplinks and port channels are not trusted.C、 All vEthernet ports are trusted and all Ethernet ports such as uplinks and port channels are not trusted.D、 All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.

A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()A、All maintenance personnel have full access to all records.B、All maintenance personnel have read-only access to all data. C、Only a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.D、Maintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

单选题On switch R1 you issue the "udld enable" global command.  What does this command accomplish? ()A Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)B Enables all copper media LAN ports Unidirectional Link Detection (UDLD)C Overrides the default UDLS setting for all portsD Globally enables all ports on the device for Unidirectional Link Detection (UDLS)E None of the other alternatives apply

单选题A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()AAll maintenance personnel have full access to all records.BAll maintenance personnel have read-only access to all data. COnly a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.DMaintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()A determine types of protocols to be supportedB determine the environment in which the router will be usedC select the number of WAN ports requiredD select the number of LAN ports required

单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()Adetermine types of protocols to be supportedBdetermine the environment in which the router will be usedCselect the number of WAN ports requiredDselect the number of LAN ports required

单选题What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()AAdjust the default hello timers to three seconds for aggressive mode.BEnable it in global mode and on every interface you need to support.CEnable it in global mode to support every individual fiber-optic interface.DEnable it to create channels containing up to eight parallel links between switches.EEnable it in global mode to support every individual fiber optic and Ethernet interface.

单选题You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()AMake all ports private VLAN ports.BPlace all unused ports in native VLAN 1 until needed.CProactively configure unused switch ports as access ports.DDisable Cisco Discovery Protocol globally.

问答题Practice 4  A: What is important when...?  Choosing a conference center  ●Facilities  ●Accommodations  ●Location  B: What is important when...?  Selecting an employee  ●Qualification  ●Personality  ● Creativity

单选题What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()A Adjust the default hello timers to three seconds for aggressive modeB Enable it in global mode and on every interface you need to supportC Enable it in global mode to support every individual fiber-optic interfaceD Enable it to create channels containing up to eight parallel links between switches

单选题What is recommended for a wireless LAN infrastructure configuration when using SVP-version SpectraLink phones?()ADisable DTPC on the radio.BDisable higher data rates on the radio.CDisable WMM policy on the WLAN.DDisable multicast on the WLAN.

单选题When troubleshooting the issue, you notice the election of a new root bridge with an unknown MAC address. Knowing that all access ports have the PortFast feature enabled, what would be the easiest way to resolve the issue without losing redundant links?()AEnable bpduguard globally.BEnable rootguard.CEnable loopguard.DEnable spanning tree.EEnable UDLD

多选题AutoQoS takes the interface type and bandwidth into consideration when implementing what three QoS features?()AFECNBLLQCWREDDLFIECRTPFCBWFQ

单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall