多項選擇題Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

A.show inventory
B.show flash:filesys
C.dirflash:include chassis
D.show diag
E.show controllers


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements are characteristics of a distance vector routing protocol?()

A. RIP is an example of distance vector routing protocols.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks.
E. Convergence is usually faster than with link state protocols
F. Each router has its own view of the topology

2.多項選擇題The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160

3.多項選擇題A network administrator needs to configure port security on a switch.which two statements are true?()

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

4.多項選擇題Which two statements apply to dynamic access lists?()

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.

5.多項選擇題Which two of these are characteristics of the 802.1Q protocol?()

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.

最新試題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題