Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()A.The Manchester serial address is 10.1.1.1B.The Manchester serial address is 10.1.1.2C.这个Manchester路由器串口地址为:10.1.12D.The London router is a Cisco 2610.E.The Manchester router is a Cisco 2610.F.The CDP information was received on port Serial0/0 of the Manchester router.G.The CDP information was sent by port Serial0/0 of the London Router.

Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()

A.The Manchester serial address is 10.1.1.1

B.The Manchester serial address is 10.1.1.2

C.这个Manchester路由器串口地址为:10.1.12

D.The London router is a Cisco 2610.

E.The Manchester router is a Cisco 2610.

F.The CDP information was received on port Serial0/0 of the Manchester router.

G.The CDP information was sent by port Serial0/0 of the London Router.


相关考题:

Click the Exhibit button.In the exhibit, two physical routers are configured for VRRP in the network with WXC devices.How should you define the default gateway address on each WXC device?() A. Define the virtual router IP address on both WXC devices.B. Add a static route for the virtual router IP address on both WXC devices.C. Define the physical IP address of each router on each respective WXC device.D. Leave the default gateway field in the WXC device blank; it will automatically detect the active gateway address.

Refer to the exhibit. You want to minimize the downtime that results from supervisor engine switchovers on Cisco 6500 Series Switches and Cisco 7600 Series Routers. To achieve this, you are considering deploying a Cisco Nonstop Forwarding with Stateful Switchover solution using OSPF.In the exhibit you can see the output of the show ip ospf neighbor detail command.Which trait of systems using Cisco Nonstop Forwarding with Stateful Switchover and OSPF is shown in the exhibit output and will impact your plan?()A. Stateful Switchover for Cisco Nonstop Forwarding only works with BGP.B. Stateful Switchover for Cisco Nonstop Forwarding must be configured on all adjacent routers.C. Cisco Nonstop Forwarding with Stateful Switchover helper mode is not supported on the adjacent router.D. Cisco Nonstop Forwarding with Stateful Switchover helper mode for OSPF has been promiscuousstandardized and is supported on the adjacent router.

Refer to the exhibit. You have a non-Cisco switch that is not communicating properly while connected to the distribution-layer Cisco switching fabric.Which two best-practice actions can you take to overcome this problem? ()(Choose two.)A. Turn off MST (802.1s) on all switches.B. Turn on MST (802.1s) on all switches.C. Turn on RSTP (802.1w) on all switches.D. Turn off RSTP (802.1w) on all switches.

Refer to the exhibit. On the basis of the partial configuration, which two statements are correct? () A. Only routes 10.0.1.0/24 will be sent out all interfaces.B. Only routes matching 10.0.0.0/8 will be advertised out interfaces other than Ethernet 0.C. Only routes matching 10.0.0.0/8 will be advertised out Ethernet 0.D. Only routes matching 10.0.1.0/24 will be advertised out Ethernet 0.E. Only routes 10.0.1.0/24 will be allowed in the routing table.F. All rout es will be advertised out interfaces other than Ethernet 0.

Refer to the exhibit. Which two Cisco IOS commands on R2 would verify its OSPF neighbor relationships?() A.show ip ospfB.show ip ospf interfaceC.show ip ospf neighborD.show ip ospf databaseE.show ip ospf statisticsF.show running - config begin router ospf

Refer to the exhibit. OSPF is running throughout the network. You want to minimize the propagation of LSAs into and out of A rea 1. Which OSPF feature would best achieve this goal? () A. stubB. totally stubbyC. NSSAD. totally NSSA

Refer to the exhibit. Which statement is true? () A. Only traffic with a destination from 10.10.0.0/19 will be permitted.B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.C. Only traffic going to 10.10.0.0/19 will be permitted.D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.

Refer to the exhibit. Which two statements are true about the partial configuration that is provided.() A. The peer group shortens the EBGP configurationB. The peer group shortens the IBGP configurationC. All the configured neighbors are in autonomous system 100D. Three AS - path filters are applied to each BGP neighborE. Only the outgoing filters are applied to BGP updates

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()A、As numbers must be changed to match on all the routers.B、Loopback interface must be configured so a DR is elected.C、The no auto-summary command is needed on Router A and Router C.D、Router B needs to have two network statements, one for each connected network.

Which two statements about NPIV are true? ()A、 After enabling NPIV, switch interfaces can only be placed into NP, F, or SD modes of operation.B、 NPV devices log in to NPIV devices.C、 NPIV requires the Enterprise License Package.D、 NPIV is supported on the Cisco MDS, N7K, and N5K families of switches.E、 A director class switch should not be placed into NPIV mode.

Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?()A、Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.B、Ensure that cables A and B are straight-through cables.C、Ensure cable A is plugged into a trunk port.D、Ensure the switch has power.E、Reboot all of the devices.F、Reseat all cables.

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()A、MPLS is enabled on the core, distribution, and edge devices.B、A triple stack is enabled on PE devices.C、The network has at least six PE devices.D、A dual stack is enabled on all the P and PE devices in a network.

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.

Which two statements are true regarding high-availability chassis clustering?()A、A chassis cluster consists of two devices.B、A chassis cluster consists of two or more devices.C、Devices participating in a chassis cluster can be different models.D、Devices participating in a chassis cluster must be the same models

多选题Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()AMPLS is enabled on the core, distribution, and edge devices.BA triple stack is enabled on PE devices.CThe network has at least six PE devices.DA dual stack is enabled on all the P and PE devices in a network.

单选题Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()AAs numbers must be changed to match on all the routers.BLoopback interface must be configured so a DR is elected.CThe no auto-summary command is needed on Router A and Router C.DRouter B needs to have two network statements, one for each connected network.

多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

多选题Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()Auses Netflow data for anomaly detectionsBbuilds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackCaccept events inputs from different network devicesvia syslog, SDEE and SNMPDdynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityEpushes ACLs to network devices to only block the malicious trafficFusing topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location

多选题Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?()AEnsure that the Ethernet encapsulations match on the interconnected router and switch ports.BEnsure that cables A and B are straight-through cables.CEnsure cable A is plugged into a trunk port.DEnsure the switch has power.EReboot all of the devices.FReseat all cables.

多选题Which two statements about Cisco Security Management Suite are correct? ()AIt should be implemented in a management VLAN.BIts connection to managed devices should be over a data VLAN.CIt is made up of Cisco Security MARS and Clean Access software.DIt should be deployed as close to the edge of the network as possible.EIt delivers policy administration and enforcement for the Cisco Self-Defending Network.

多选题Which two options are benefits of the Cisco Software Support?()ASupports your risk mitigation planBIncrease the performance of the current featuresCExpedites the delivery of replacement hardwareDExtends the life of Cisco Devices with Software Updates

多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()AIGPBEIGRPCEGPDBGP