You have been hired by a small company to assist the network administrator in troubleshooting some performance issues with its network. When you arrive at the site, you ask to see the network diagrams for the network in question. The administrator informs you that he just started working at this site last month and has not been able to locate any documentation for the network. Which of the

following protocols would be useful in your efforts to re-create a network diagram?

A) ISL
B) ARP
C) CDP
D) HTTP


C
Explanation: C) The Cisco Discovery Protocol (CDP) is used to help network engineers determine the remote devices that are connected off a local device's interfaces. This can be a useful asset when attempting to troubleshoot networking issues, especially when the network is not well documented.

Computer Science & Information Technology

You might also like to view...

A hospital employs surgeons who operate on patients. Patients and surgeons are described by (unique) id's (integers), names and addresses. Each patient undergoes a single operation that is scheduled on a particular day (of type DATE) and performed by a single surgeon. A surgeon can only perform one operation a day.

i. Give an ER diagram that describes this enterprise. ii. Translate your diagram into a schema using SQL. Include all primary and foreign key constraints.

Computer Science & Information Technology

Constraints can extend the overall time to complete a project because they minimize or eliminate some of Project 2010's ability to freely move the scheduled Start and Finish dates of individual tasks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If the DNS Server is hosting Active Directory ________ DNS Zones, you mustinstall the AD DS role service on the server

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is a rule that Solver must enforce to reach the objective value.

A. binding constraint B. non-binding constraint C. objective D. solving method

Computer Science & Information Technology