Identify the 3 key features of the Cisco Discovery Protocol?

A.) Off by default

B.) Will allow for the discovery of layer 3 addresses on
neighbor routers

C.) Verify connectivity

D.) Open standard

E.) Does not require any layer 3 protocols to be configured



Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow..

Answer / guest

Answer: B C E

CDP is used for 2 basic reasons; neighbor connectivity and
layer 3

discovery if configured. It is proprietary and is on by default.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is subnetting? Why is it used?

0 Answers  


Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config

2 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.

2 Answers  






What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?

1 Answers   HP,


the term which used for describe physical alyout of network mine answer-topology

1 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table

1 Answers  


Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address

1 Answers  


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

2 Answers  


Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering

1 Answers  


Categories