Identify the 3 key features of the Cisco Discovery Protocol?
A.) Off by default
B.) Will allow for the discovery of layer 3 addresses on
neighbor routers
C.) Verify connectivity
D.) Open standard
E.) Does not require any layer 3 protocols to be configured
Answer / guest
Answer: B C E
CDP is used for 2 basic reasons; neighbor connectivity and
layer 3
discovery if configured. It is proprietary and is on by default.
Is This Answer Correct ? | 2 Yes | 0 No |
What is subnetting? Why is it used?
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol
Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?
the term which used for describe physical alyout of network mine answer-topology
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering