多項(xiàng)選擇題Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

A.show inventory
B.show flash:filesys
C.dirflash:include chassis
D.show diag
E.show controllers


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements are characteristics of a distance vector routing protocol?()

A. RIP is an example of distance vector routing protocols.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks.
E. Convergence is usually faster than with link state protocols
F. Each router has its own view of the topology

2.多項(xiàng)選擇題The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160

3.多項(xiàng)選擇題A network administrator needs to configure port security on a switch.which two statements are true?()

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

4.多項(xiàng)選擇題Which two statements apply to dynamic access lists?()

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.

5.多項(xiàng)選擇題Which two of these are characteristics of the 802.1Q protocol?()

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.

最新試題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項(xiàng)選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項(xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項(xiàng)選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項(xiàng)選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項(xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項(xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項(xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項(xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:單項(xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項(xiàng)選擇題