Completar Frases ACLs and Discovery ProtocolsVersión en línea Fill in key terms from networking topics. por Hadeer Al-Bttal 1 Extended ACLs can control traffic based on the field in the IP header . 2 Standard ACLs are recommended to be placed close to the of the traffic flow . 3 Extended ACLs can filter based on and IP addresses . 4 is The protocol used for network time synchronization , essential for network time consistency and log accuracy . 5 is a command in CDP allows network administrators to quickly gather hardware and protocol information about neighboring devices . 6 isCisco proprietary protocol that discovers information about directly connected Cisco devices . 7 NTP uses a to describe how many NTP hops away a machine is from an authoritative time source . 8 CDP and LLDP operates in layer . 9 The information which can be displayed by the Router# show cdp neighbors command are , address , , and the . 10 Routers use the memory to store IOS image files . 11 Taking backup of the current ( or existing ) IOS image file to a TFTP server , use : : Command . 12 is The most common system of accessing system messages that networking devices provide . 13 uses UDP port and does not provide authentication or encryption . 14 protocol uses TCP ports 20 and 21 for file transfer s 15 A device wait s before removing a neighbor from its CDP neighbor table if no new CDP messages are received . 16 In LLDP messages are sent every s seconds and are received only by directly connected devices . 17 CDP uses a multicast MAC address . . 18 LLDP uses the multicast MAC address . . 19 The reference IP address 127 . 127 . 1 . 1 represents the device ? s cloc k 20 Syslog severity level is 0 isthe most serious , meaning the system is completely down and needs immediate attention .