网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are conducting a cdp-based discovery using an edge switch for the seed.  there is a router between the switch and the wlse.  none of the access points are discovered, and the discovery log shows the switch is snmp unreachable. What is the problem?()
A

the snmp communities on the switch do not match the wlse.

B

the snmp communities on the access points do not match the wlse.

C

the snmp communities on the access points do not match the switch.

D

the snmp communities on the router do not match the wlse.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are conducting a cdp-based discovery using an edge switch for the seed.  there is a router between the switch and the wlse.  none of the access points are discovered, and the discovery log shows the switch is snmp unreachable. What is the problem?()A the snmp communities on the switch do not match the wlse.B the snmp communities on the access points do not match the wlse.C the snmp communities on the access points do not match the switch.D the snmp communities on the router do not match the wlse.” 相关考题
考题 You create a service and deploy it on a network in a building named Building1. You will deploy the service to Building2.The service in Building1 is configured using the following discovery scopes.The service in Building2 will be configured using the following discovery scopes.You need to ensure that the client application can discover the service in Building1 or the service in Building2.Which scopes should you add to the client configuration file? ()A.B.C.D.

考题 网管员对一台Cisco Catalyst 2950交换机进行了配置,要保存当前配置需要使用( )命令。 A、switc# configB、switc# config nvramC、switc# copy running-config startup-configD、switc# copy startup-config running-config

考题 The ERX Edge Router responds toa received PPP over Ethernet Active Discovery Initiation(PADI) with which message type?() A.PPPoE Active Discovery OfferB.PPPoE Active Discovery InitiationC.PPPoE Active Session ConfirmationD.PPPoE Active Session Acknowledgment

考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A. using DHCP snoopingB. snooping the incoming 802.1Q VLAN tagC. using CDPD. snooping the CoS marking on the incoming frames

考题 ( ):a strip at the edge of a computer screen that you use to scroll through a file with, using a mouseA.Title bar B.Tool bar C.Status bar D.Scroll bar

考题 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.You create a new inbound rule by using Windows Firewall with Advanced Security.You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()A、Edge traversalB、Authorized computersC、Interface typesD、Remote IP address

考题 When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

考题 When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network,how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port?()A、by snooping the CoS marking on the incoming framesB、by using RTP hello messages between the switch port and the Cisco IP PhoneC、by using CDPD、by using DHCP snoopingE、by snooping the incoming 802.1Q VLAN tag

考题 Which type of domains is interconnected using Multicast Source Discovery Protocol?()A、PIM-SMB、PIM-DMC、PIM-SSMD、DVMRP

考题 You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

考题 You are conducting a cdp-based discovery using an edge switch for the seed.  there is a router between the switch and the wlse.  none of the access points are discovered, and the discovery log shows the switch is snmp unreachable. What is the problem?()A、the snmp communities on the switch do not match the wlse.B、the snmp communities on the access points do not match the wlse.C、the snmp communities on the access points do not match the switch.D、the snmp communities on the router do not match the wlse.

考题 You want to implement router redundancy in the Company network using the best method  available.  Which protocol specified by RFC 2281 provides network redundancy for IP networks,  ensuring that user traffic immediately and transparently recovers from first-hop failures in network  edge devices or access circuits?()A、 ICMPB、 IRDPC、 HSRPD、 STPE、 None of the other alternatives apply

考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A、using DHCP snoopingB、snooping the incoming 802.1Q VLAN tagC、using CDPD、snooping the CoS marking on the incoming frames

考题 When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()A、It encompasses the validate and solve stepsB、It encompasses the Discovery, Validate and Solve stepsC、It encompasses the Discover, Validate, Solve and Present StepsD、It encompasses the Discovery, Solve and Close stepsE、It encompasses the Discovery, Validate and Present Steps

考题 You are configuring services to be discoverable. The services must be discoverable without relying on a central server. Client applications that consume the services are on a network segment that is separate from the network segment that the services are located on.A firewall blocks all TCP ports between the two network segments, but allows other protocols to pass through.You need to ensure that the client applications can discover the services. What should you do?()A、Use ad-hoc discovery mode over HTTP.B、Use ad-hoc discovery mode over UDP.C、Use managed discovery mode over HTTP.D、Use managed discovery mode over UDP.

考题 You need to copy the configuration of an Edge Transport Server.You run the Export-edgeconfig.ps1 script.What other action should you perform?()A、Export-exchange certificateB、Export-transport rule connectionC、Backup system stateD、You must log on by using an account that is a member of the local Administrators group on that computer

考题 You have an Exchange Server 2010 Edge Transport server named Edge1.A partner organization has another Exchange Server 2010 Edge Transport server named Edge2.You need to encrypt all SMTP communication between Edge1 and Edge2.The solution must ensure that both servers use a trusted certificate.What should you do?()A、Create a new Edge Subscription file on Edge1.Copy the file to Edge2.B、From Edge1 and Edge2, enable Exchange Server authentication.C、From Edge1 and Edge2, configure mutual Transport Layer Security (TLS).D、From Edge1, run the ExportEdgeConfig.ps1 script.From Edge2, run the ImportEdgeConfig.ps1 script.

考题 单选题You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The Exchange environment has two Edge Transport servers and two Hub servers.The CTO wants you to filter a list of IP addresses and requests that you add these IP addresses to the block list. You log into one of the Edge Transport servers and add the list of IPs to the block list.The next day the CTO informs you that the IP addresses he gave you are still able to send messages into the Exchange environment. What changes should you make to ensure these IP addresses are blocked?()A Restart the SMTP service.B Reboot the Edge Transport server.C Add the list to the second Edge Transport server.D Restart IIS.

考题 单选题You have an Exchange Server 2003 organization.You install an Exchange Server 2010 Edge Transport server on the network.You need to ensure that the Edge Transport server can send and receive e-mail messages from the Internet for the organization.You configure the Exchange Server 2003 servers to send all e-mails for external recipients to the Edge Transport servers. What should you do next?()A Create and configure a sharing policy.B Install the Exchange Server 2010 schema extensions.C Create an Edge Subscription file.Copy the file to the Exchange Server 2003 servers.D Create and configure a Send connector on the Edge Transport server.Create and configure a Receive connector on the Edge Transport server.

考题 单选题You have an Exchange Server 2003 organization. You install an Exchange Server 2010 Service Pack 1 (SP1) Edge Transport server on the network. You need to ensure that the Edge Transport server can send and receive e-mail messages from the Internet for the organization. You configure the Exchange Server 2003 servers to send all e-mail for external recipients to the Edge Transport servers. What should you do on the Edge Transport servers?()A Create and configure a Send connector.Create and configure a Receive connector.Create and configure an Accepted domain.B Create an Edge Subscription file. Create and configure a Send connector.Create and configure a Receive connector.C Create an Edge Subscription file. Create and configure a Send connector.Create and configure an Accepted domain.D Create and configure a Send connector.Create and configure an Accepted domain.install the Exchange Server 2010 schema extensions.

考题 单选题The ERX Edge Router responds to a received PPP over Ethernet Active Discovery Initiation (PADI) with which message type?()A PPPoE Active Discovery OfferB PPPoE Active Discovery InitiationC PPPoE Active Session ConfirmationD PPPoE Active Session Acknowledgment

考题 单选题You need to copy the configuration of an Edge Transport Server.You run the Export-edgeconfig.ps1 script.What other action should you perform?()A Export-exchange certificateB Export-transport rule connectionC Backup system stateD You must log on by using an account that is a member of the local Administrators group on that computer

考题 单选题Which type of domains is interconnected using Multicast Source Discovery Protocol?()A PIM-SMB PIM-DMC PIM-SSMD DVMRP

考题 单选题The ERX Edge Router responds toa received PPP over Ethernet Active Discovery Initiation(PADI) with which message type?()A PPPoE Active Discovery OfferB PPPoE Active Discovery InitiationC PPPoE Active Session ConfirmationD PPPoE Active Session Acknowledgment

考题 单选题When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network, how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port? ()A by snooping the CoS marking on the incoming framesB by using RTP hello messages between the switch port and the Cisco IP PhoneC by using CDPD by using DHCP snoopingE by snooping the incoming 802.1Q VLAN tag

考题 单选题When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()A It encompasses the validate and solve stepsB It encompasses the Discovery, Validate and Solve stepsC It encompasses the Discover, Validate, Solve and Present StepsD It encompasses the Discovery, Solve and Close stepsE It encompasses the Discovery, Validate and Present Steps

考题 单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required