设为首页收藏本站language 语言切换
查看: 3423|回复: 21
收起左侧

[其他] 2017.2.15 CCNP路由有錯,請更正

[复制链接]
发表于 2017-2-20 17:06:55 | 显示全部楼层 |阅读模式
題庫有錯,191答案應該是A,C+ Y1 C. U" Q1 i; x
IPSLA.PNG 9 g* s8 t+ A2 d* M: K' f  u4 `, C
Refer to the exhibit. Which tworeasons for IP SLA tracking failure are likely true? (Choose two.)
A. A route back to the R1 LANnetwork is missing in R2
B. The default route has wrongnext hop IP address
C. The destination must be 172.30.30.2for icmp-echo
D. The threshold value is wrong
E. The source-interface isconfigured incorrectly
Answer: A, E
Explanation: If “source-interfaceFastEthernet0/0” is used, the routing table of R2 should have a route back toR1 LAN network in order to solve the IP SLA tracking failure.
If the routing table of R2 doesnot have a route back to R1 LAN network, the “source-interface FastEthernet0/0”is configured incorrectly. Remove the portion “source-interfaceFastEthernet0/0” or use “source-interface FastEthernet1/0” instead would solvethe IP SLA tracking failure.
The setting of the defaultroute has no effect on the IP SLA tracking for “icmp-echo 172.20.20.2” since R1routing table has a directly connected routing entry of 172.20.20.0/30.

  N% l# L+ h4 u% B" _* i% z7 Z

8 X4 r- G0 V: T/ b" u3 S
A network engineer enables OSPFon a Frame Relay WAN connection to various remote sites, but no OSPF adjacenciescome up. Which two actions are possible solutions for this issue? (Choose two.)
A. Ensure that the OSPF processnumber matches among all remote sites
B. Configure the neighborcommand under OSPF process for each remote site
C. Change the network type tononbroadcast multipoint access
D. Change the network type topoint-to-multipoint under WAN interface
E. Enable virtual links
Answer: B, D
Explanation: Since OSPF usesRFC NBMA mode on Frame Relay WAN interface by default, the “neighbor” commandis required under the OSPF process for each remote site.

! P! @8 s9 ^. z/ ?0 b# Z- l
On the other hand, you couldalso change the network type to point-to-multipoint mode by typing the command “ip ospf network point-to-multipoint” under theFrame Relay WAN interface. For RFC point-to-multipoint mode, no “neighbor”command is required.
6 w7 ]6 [8 G' {, M7 {6 t3 @

( {+ d% i/ ^* ~6 Z+ a

评分

参与人数 1鸿鹄币 +60 收起 理由
小乔 + 60 感谢提出意见,最好能给出正确答案论据

查看全部评分

发表于 2017-2-20 17:43:18 | 显示全部楼层
明天就要考了!!!!!
沙发 2017-2-20 17:43:18 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-20 19:30:36 | 显示全部楼层
标记一下   
板凳 2017-2-20 19:30:36 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-2-20 19:49:53 | 显示全部楼层
題庫117 又錯了, 正確ans 如下
& w; i& k% X* e- c3 U' HThe enterprise network WAN link has been receiving denial of service attacks from% [- r. E- S* ^- [+ T$ T: }
both IPv4 and IPv6 sources. Which three elements can you use to identify an IPv6# P  {! T! E) X; A# j* m' Q; r/ X
packet via its header, in order to filter future attacks? (Choose three.)
$ ~1 A7 Q) V, p  i. a5 g+ {8 HA. Traffic Class
$ r) R9 _3 A, A5 s% I% G8 dB. Source address
$ ^% ], Z; e; C1 _* v! G0 hC. Hop Limit' A. F3 I1 f; u: _; J$ f
D. Fragment Offset* ~$ A  E5 M# s+ W# U
E. Destination Address
8 R; F. U6 ]  x( s7 P, DF. Flow Label
) y$ N: G: b" D% {! m3 ^Answer: B, E, F
" P. M$ K8 S" O/ X
% k5 J# u2 b3 M  n
地板 2017-2-20 19:49:53 回复 收起回复
回复 支持 0 反对 1

使用道具 举报

 楼主| 发表于 2017-2-20 20:06:52 | 显示全部楼层
題庫138 又錯了, 正確ans 如下
( w3 F. b% ?9 C- W( }8 A0 nOther than a working EIGRP configuration, which option must be the same on all routers for EIGRP authentication key role over to work correctly?2 }; L- i3 [0 R
A. SMTP
. P8 J0 Q1 i; K% F- dB. SNMP+ v2 |/ B4 `0 E7 L
C. passwords1 ?& v% A% E$ b" G* z
D. time
/ b7 {6 g- c3 P2 p4 J3 @9 f
6 @2 G" q7 h! y9 D6 o Answer: C
5# 2017-2-20 20:06:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-20 20:08:37 | 显示全部楼层
谁来确定答案的对错
6# 2017-2-20 20:08:37 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-20 21:34:22 | 显示全部楼层
thank you for sharing
7# 2017-2-20 21:34:22 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-20 22:20:19 来自手机 | 显示全部楼层
gumdun 发表于 2017-2-20 19:49
" n# t, [( q7 x% h! `" [$ L題庫117 又錯了, 正確ans 如下$ C! Q+ S1 o4 g- L+ Z0 l
The enterprise network WAN link has been receiving denial of service a ...

, K# K2 t" {7 p4 V# C能不能不要根据你自己的主观臆测就说答案错了
8# 2017-2-20 22:20:19 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-21 08:32:37 | 显示全部楼层
小乔,出来解释一下,这是怎么回事?
9# 2017-2-21 08:32:37 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-21 11:01:47 | 显示全部楼层
准备考试了   能确认下标准的嘛
11# 2017-2-21 11:01:47 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-2-21 17:06:28 | 显示全部楼层
QUESTION 183 圖錯
; i' e$ v# f, z1 m: s
& Z9 y2 }! C9 V# C# X應該是這張- s4 l8 n/ A5 R; }# F& r
來源3 ?/ i, Z+ i+ ?0 i# z  N- k
http://www.digitaltut.com/route-eigrp-questions
% c1 Q( p2 ~) R* D$ }+ V6 Z! S
12# 2017-2-21 17:06:28 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-2-22 00:39:23 | 显示全部楼层
准备考试了   能确认下吗?
13# 2017-2-22 00:39:23 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-2-22 11:19:33 | 显示全部楼层
Q183 圖有錯,正確是這張
1 h% o# Y# W# x" Z- t* v
14# 2017-2-22 11:19:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-2-22 12:16:12 | 显示全部楼层
本帖最后由 小乔 于 2017-3-27 13:55 编辑
# A+ D" o& `1 o! M4 z
. S$ X3 |' ]5 m  t& j% j: n! W$ H" J  h( ?QUESTION 188 ( `# i: F# c+ a
( m% x2 o5 }1 w( ]1 Q
A. In a 6to4 tunnel, the first two bytes of the IPv6 address will be 0x2002 and the next four bytes will be the hexadecimal equivalent of the IPv4 address.
. |, w4 i$ W5 t; j. t  q( m
( v: ^! q% |/ _QUESTION 202 題目應是這樣
* F/ A) B2 A/ w) d& \3 oWhen unicast reverse path forwarding is configured on an interface, which action! ~3 V, J* D3 k
does the interface take first when it receives a packet?- B$ R7 F2 O( L( ^% `9 q9 ^
A. It checks the egress access lists+ q/ i1 L) _, J9 m/ m. b
B. It checks the ingress access lists
1 q7 n1 B  X% V- p9 a$ v1 Y) YC. It verifies that the source has a valid CEF adjacency
" Q% f  {5 V1 B7 h' d0 }" J. T8 QD. It verifies a reverse path via the FIB to the source2 G  f" v1 _8 E/ ]' ~* o
Answer: B
& \& I! o/ U) }/ S+ AExplanation: When a packet is received at the interface where Unicast RPF and ACLs
' k7 W# U# h+ K5 chave been configured, the following actions occur:
3 M0 P9 u# @. r% T4 YStep 1: Input ACLs configured on the inbound interface are checked.( d' W6 [2 T  k/ U% c
Step 2: Unicast RPF checks to see if the packet has arrived on the best return path to
* Z* |+ q* W8 L- [, z( y6 Rthe source, which it does by doing a reverse lookup in the FIB table# K' a( E# c5 D2 q$ j% l' j
: M) {5 O- F6 x  A
15# 2017-2-22 12:16:12 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-28 20:22 , Processed in 0.078545 second(s), 27 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表