Icon Crear Crear

ACLs and Discovery Protocols

Completar Frases

Fill in key terms from networking topics.

Descarga la versión para jugar en papel

0 veces realizada

Creada por

Egipto

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Completar Frases

ACLs and Discovery ProtocolsVersión en línea

Fill in key terms from networking topics.

por Hadeer Al-Bttal
1

Extended ACLs can control traffic based on the
field in the IP header .

2

Standard ACLs are recommended to be placed close to the of the traffic flow .

3

Extended ACLs can filter based on and IP addresses .

4

is The protocol used for network time synchronization , essential for network time
consistency and log accuracy .

5

is a command in CDP allows network administrators to quickly gather hardware and protocol information about neighboring devices .

6

isCisco proprietary protocol that discovers information about directly connected Cisco devices .

7

NTP uses a to describe how many NTP hops away a machine is from an authoritative time
source .

8

CDP and LLDP operates in layer .

9

The information which can be displayed by the Router# show cdp neighbors command are , address , , and the .

10

Routers use the memory to store IOS image files .

11

Taking backup of the current ( or existing ) IOS image file to a TFTP server , use : : Command .

12

is The most common system of accessing system messages that networking devices provide .

13

uses UDP port and does not provide authentication or encryption .

14

protocol uses TCP ports 20 and 21 for file transfer s

15

A device wait s before removing a neighbor from its CDP neighbor table if no new CDP messages are received .

16

In LLDP messages are sent every s seconds and are received only by directly connected devices .

17

CDP uses a multicast MAC address . .

18

LLDP uses the multicast MAC address . .

19

The reference IP address 127 . 127 . 1 . 1 represents the device ? s cloc k

20

Syslog severity level is 0 isthe most serious , meaning the system is completely down and needs immediate attention .