网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()
A

Spanning Tree Protocol

B

Cabling

C

Frame forwarding

D

Packet forwarding

E

EtherChannel

F

Routing protocols


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()ASpanning Tree ProtocolBCablingCFrame forwardingDPacket forwardingEEtherChannelFRouting protocols” 相关考题
考题 Which of the following risks are generally considered unpredictable:A business riskB financial riskC inflationD natural hazardsE taxes

考题 Which of the following activities can be considered as part of risk mitigationA risk identificationB purchasing insuranceC assessment of outcomesD assessment of probabilitiesE C and D only

考题 A technician is troubleshooting a network connectivity issue. Given the following abbreviated traceroute output:Which of the following is MOST likely occurring?() A. Switching loopB. Broadcast stormC. IP conflictD. Routing loop

考题 Which of the following database objects is considered executable using SQL?() A.ViewB.TableC.RoutineD.Package

考题 Which of the following objects contains control structures that are considered the bound form of SQL statements?()A、UDTB、TriggerC、PackageD、Access plan

考题 Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()A、Spanning Tree ProtocolB、CablingC、Frame forwardingD、Packet forwardingE、EtherChannelF、Routing protocols

考题 Which of the following is not considered a common approach to narrow the field of potential problem causes()A、Following the traffic pathB、Top-downC、Comparing configurationsD、Bottom-upE、Divide and conquerF、ExamineS LAs

考题 Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()A、Use the Cisco Auto Configuration toolB、Use the Cisco Rollback featureC、Automate documentationD、Schedule documentation checksE、Use the Cisco Configuration Archive toolF、Require documentation prior to a ticket being closed out

考题 Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance

考题 Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()A、Routing loopsB、Misconfiguration of VPN end pointsC、Overiapping IP address spaceD、DMVPNE、User profilesF、MTU

考题 Which of the following is the NEXT step in the troubleshooting theory after identifying the problem?()A、Establish a theory of probable causeB、Test the theoryC、Implement preventative measuresD、Establish a plan of action

考题 Which of the following is unsafe for a technician to use when troubleshooting or repairing a CRT monitor?()A、Anti-static padB、Anti-static wrist strapC、Rubber glovesD、Multimeter

考题 An administrator is troubleshooting a power supply that is believed to have failed. Which of the following tools will BEST help test the power supply?()A、ESD EquipmentB、MultimeterC、POST CardD、Toner Probe

考题 Which of the following components should be removed prior to troubleshooting any server hardware failure?()A、Memory in RAIDB、Hard drivesC、Third party memoryD、Airflow baffles

考题 Which of the following are considered plug and play technologies in a laptop?()A、SATAB、RAIDC、USBD、EIDE

考题 Which of the following is NOT a phase of the troubleshooting process?()A、confirm the repairB、define the problemC、document the resultsD、simplify the problem

考题 Which of the following are considered link state protocols?()A、RIPv2 and EIGRPB、EGP and IGPC、OSPF and IS-ISD、RIP and BGP

考题 Which of the following should be considered when upgrading memory? ()A、speed of memoryB、memory slot colorC、type of memoryD、CPU speedE、BIOS version

考题 Which of the following database objects is considered executable using SQL?()A、ViewB、TableC、RoutineD、Package

考题 单选题Which of the following is not a typical wireless troubleshooting target?()A Quality of ServiceB Trunk configurationC Access listsD Routing protocol configurationE Power over EthernetF DHCP configuration

考题 单选题When using a buoy as an aid to navigation which of the following should be considered?()A The buoy should be considered to always be in the charted locationB If the light is flashing,the buoy should be considered to be in the charted locationC The buoy may not be in the charted positionD The buoy should be considered to be in the charted position if it has been freshly painted

考题 多选题Which of the following would be considered a routing protocol?()AOSPFBDHCPCSMTPDSNMPERIP

考题 多选题Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()ARouting loopsBMisconfiguration of VPN end pointsCOveriapping IP address spaceDDMVPNEUser profilesFMTU