What are two reasons a network administrator would use CDP? 

题目
多选题
What are two reasons a network administrator would use CDP? (Choose two.)()
A

to verify the type of cable interconnecting two devices

B

to determine the status of network services on a remote device

C

to obtain VLAN information from directly connected switches

D

to verify Layer 2 connectivity between two devices when Layer 3 fails

E

to obtain the IP address of a connected device in order to telnet to the device

F

to determine the status of the routing protocols between directly connected routers

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user in the accounting department reports that their office is able to connect to the network, butthey are unable to connect to the Internet.Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).

A. Physical network diagram

B. Job log

C. Acceptable use policy

D. Baseline documentation

E. Wiring schematic


参考答案:A, E

第2题:

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()

A.NAT

B.Dynamic

C.Subnetting

D.Static


参考答案:D

第3题:

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)

A. To determine the status of network services on a remote device

B. To obtain the IP Address of a connected device in order to telnet to the device

C. To verify the type of cable interconnecting two devices

D. To verify Layer 2 connectivity between two devices when Layer 3 fails

E. To obtain VLAN information from directly connected swticehs

F. To determine the status of the routing protocols between directly connected routers

G. To support automatic network failover during outages


正确答案:BD
B,D

第4题:

The network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two validreasons for adopting ipv6 over ipv4?()

  • A、telnet access does not require a password
  • B、nat
  • C、no broadcast
  • D、chanage of destination address in the ipv6 header
  • E、chanage of source address in the ipv6 header
  • F、autoconfiguration

正确答案:C,F

第5题:

What are two reasons a network administrator would use CDP?()

A. to verify the type of cable interconnecting two devices

B. to determine the status of network services on a remote device

C. to obtain VLAN information from directly connected switches

D. to verify Layer 2 connectivity between two devices when Layer 3 fails

E. to obtain the IP address of a connected device in order to telnet to the device

F. to determine the status of the routing protocols between directly connected routers


参考答案:D, E

第6题:

Which of the following tools would an administrator BEST use to trace a network cable?()

A.Toner

B.Cable tester

C.Butt set

D.Multimeter


参考答案:A

第7题:

the network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two valid reasons for adopting ipv6 over ipv4?()

A. telnet access does not require a password

B. nat

C. no broadcast

D. chanage of destination address in the ipv6 header

E. chanage of source address in the ipv6 header

F. autoconfiguration


参考答案:C, F

第8题:

Churchill Ice Cream has to date made two unsuccessful attempts to become an international company.

(d) What reasons would you suggest to explain this failure of Churchill Ice Cream to become an international

company? (5 marks)


正确答案:
(d) The two international strategies pursued to date are through organic growth (the stores in North America) and acquisition (the
companies in Germany and Italy). Neither seems to have worked. Here there seem to be some contradictions while global
tastes and lifestyles are argued to have developed – convergence of consumer tastes lies at the heart of this – but this does
not seem to have benefited Churchill. One questions the learning that these two unfortunate experiences have created. Of the
three core methods of achieving growth, namely organic, acquisition and joint venture, only joint venture remains to be tried.
The reasons for the international failures are clearly complex but one could argue that the strategy has been curiously na?ve.
Certainly, it has pursued a high-risk strategy. Exporting, perhaps through identifying a suitable partner, might create the
learning to lead to a more significant market entry. There is a need to understand local tastes; indeed the whole of the
marketing mix in the chosen market(s), and decide on appropriate strategy. A strategy based upon the acquisition of
companies and their consequent development represents a large investment of capital and requires considerable managerial
attention and expertise. Equally, the attempt to use the Churchill domestic format of opening its own stores creates both a
major financial commitment and the need to manage a radically different operation. One must seriously question whether
Churchill has these capabilities within a family-owned business. Clearly there are differences between the ice cream markets
in various countries, though the emergence of global brands suggests some convergence of tastes. Such differences reflect
differing cultures, tastes and competitive behaviour in each country. The lesson from Churchill’s international initiatives is that
national differences need to be carefully understood. There is little evidence that Churchill has understood these differencesor indeed learnt from them.

第9题:

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

  • A、Allow unrestricted access to the console or VTY ports
  • B、Use a firewall to restrict access from the outside to the network devices
  • C、Always use Telnet to access the device command line because its data is automatically encrypted
  • D、Use SSH or another encrypted and authenticated transport to access device configurations
  • E、Prevent the loss of passwords by disabling password encryption

正确答案:B,D

第10题:

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

  • A、The network was originated via redistribution of an interior gateway protocol into BGP
  • B、The network was defined by a static route
  • C、The network was originated via a network or aggregate command
  • D、The network was learned via EBGP
  • E、The network was learned via IBGP

正确答案:A,C

更多相关问题