设为首页收藏本站language→→ 语言切换

鸿鹄论坛

 找回密码
 论坛注册

QQ登录

先注册再绑定QQ

查看: 3984|回复: 32
收起左侧

[考试战报] 3/23 台灣 839 PASS

[复制链接]
发表于 2017-3-23 23:24:33 | 显示全部楼层 |阅读模式
總共64題(新題33%約佔25題  12/12+3/6題庫66%約佔40題)# C( x; P( E/ O( F2 X* |# `- q
實驗題考了ACL3(s口沒錯不用更改  ip地址有變  host一樣是C ##跟題庫一樣沒變)  EIGRP TS 2 ##跟題庫一樣沒變
* X3 j. F2 Z+ N/ G拖圖題考了 verify URL NIC 這題
, @, n" B9 Q! r- e##個人建議新題一定要讀熟再去考新題約佔25題
# |1 T0 _; ?/ ?$ q* L# e##以下題目今天考試100%出現 但還有10題左右的新題沒在以下題目出現
+ e6 \# T! F# J8 d
! W' f/ ~' e. _  q注意(以下題目答案非100%正確##僅供參考  個人感覺6-7成左右是對的)! Y" u% g" K- e  ^$ \  w
Q1-which port security mode can assist with troubleshooting by keeping count of violations?# r$ U9 Q- q' T$ S: Y
A. access* i1 P# z: N% M- J  W
B. protect
& I4 x/ K" X# @9 Z1 o) X, r# b! Z- fC. restrict. z9 `+ w' B4 g
D. shutdown( F  U- g6 Q( d
=> ANSWER: C
% ]- e; ?1 n5 x! L7 n3 J+ b
8 D" s0 e2 |  H! b+ @3 N4 m0 A- jQ2 which two components are requirements for configuring rIPv2 for IPv4?  
: z3 R8 {4 q/ S5 GA. enabling RIP authentication
1 O# R* t( ^) v1 I, `) v# v( K: NB. connecting RIP to a WAN Interface
& Y2 N" a- t, g) s+ u4 B' ]C. enabling auto route sumamrization# w" G" i  u4 I+ }! \- o+ D0 h* H& ]
D. allowing unicast updates for RIP. e. C( L. ]' C: G' _
E. enabling RIP on the router
4 k; ~/ k8 [  g' r" Z" k# i6 Y' d=> ANSWER: A,E
/ Y' l9 k* v% d8 Y8 ~7 q8 r2 N
, A: j" a) X; [8 Y0 O( V) m' ^# \0 nQ3 which configuration command can u apply to a hsrp router so that its local interface becomes active if all other routers in the group fail?
+ V9 q  D9 O- \5 Z# h/ h$ }$ p9 GA. no additional config is required
$ K6 z* w4 u' \% o  I. AB. standby 1 track ethernet" d5 D3 B& g0 P  I) S% c1 ^" w1 F1 Y
C. standby 1 preempt" j" A6 i+ q, D2 {. L* L0 ?' @
D. standby 1 priority 250( A2 L5 `- F6 @3 X
=> ANSWER: A
' k/ D" }* l5 H# x- t2 ^5 Q
  L1 T) }, @9 t& {. P" ^- U7 x3 ~2 cQ4 which two options describe benefits of aggregated chassis technology?   % X* \' c7 `7 [0 k
A. it reduces management overhead- P$ v4 P1 ^4 m- p+ f4 Q9 _
B. switches can be located anywhere regardless of there physical location8 ^  E' t; Z! t8 n
C. it require only 1 ip address per VLAN
3 F+ i7 U+ R" z' VD. it requires only 3 ip address per VLAN
6 A; w5 h0 ~! E4 _E. it supports HSRP VRRP GLBP
' A& b0 {, a# G' t7 R% O" NF. it support redundant configuration files
+ ?2 V( }4 F% o% W=> ANSWER: C,F" O* r& k5 D9 s$ }
% ~8 ?$ G3 D/ |: V; D. E
Q5 which function does IP SLA ICMP ECHO operation perform to assist with troubleshooting?7 F2 o( c9 c$ M" U
A. one way jitter measurement& J& q" y2 v, @: a: a
B. packet-loss detection$ ^4 Q7 d0 x  _! X* g0 W6 \( c
C. hop-by-hop response time% ~" l: p& X' f( E2 T$ K6 V) K
D. congestion detection5 x' U2 `5 n$ K
=> ANSWER: B* t, W+ N$ t& x! `# G
' ?2 ~4 O; ^8 ^4 V1 H  S4 o* N9 x
Q6 which 2 statements about extende traceroute command is true?  
9 N% P% o) B" S9 d, DA. it can send packets from specified interface or ip address
& l/ y. @7 e! [* o6 X* c9 ?B. it can use a specified TTL value
7 Q. P0 p; n( IC. it can validate the reply data0 i1 T. N( L5 b) ^" w( \
D. it can use a specificed TOS4 R7 X* f$ e/ f$ I  q
E. it can repeated automatically to a specified interval
2 Q! m0 _" ^$ `+ F, s, n* q=> ANSWER: A,B5 ^: m' |& {  T: ]* D* V

: d! L& k4 `5 @* I  o$ [6 E7 JQ7 Which utility can you use to identify the cause of a traffic flow blockage between two?! w8 \0 Q# A8 s1 l: z1 {' H! ^( w3 |3 K& Q
A. devices in a network
  [. A* z. A4 H) d( x' ~B. ACL analysis tool in APIC-EM
  i4 j, W. X7 ^  F2 H% U9 K/ E1 mC. ACL path analysis tool in APIC-EM
! ~* Z' x8 J1 D/ D. Q* CD. APIC-EM automation Schedular: M: T, B2 B- N( E( h
E. iWAN application
# L0 E7 Y: L4 n* N=> ANSWER: C$ R4 I+ S( r' S. ]* R
3 w: H2 g1 I2 f' y: @( }
Q8 which statement about EIGRP on IPv6 device is true?  _' Q* I1 i& i7 U
A. the configuration uses secondary ip add( I3 L4 a  t6 M7 Z
B. the config uses process number" T1 v  Y5 r) ?! u+ E
C. the nei of each device are directly configured
" I! N3 l4 c! ?( T$ `6 qD. it is configured directly on the interface# z( s* E* B, P- `+ v% O
=> ANSWER: D
, {4 v! R9 ]; w0 @
% a7 Z: t' k" RQ9 which command can you enter to troubleshoot the failure of address assignment?+ C) u- \( e5 V% v$ d/ A
A. sh ip dhcp database, p1 Q- M8 U1 J" m2 N& ?
B. sh ip dhcp pool7 c; q. q! Q, O; R) m8 _1 z
C. sh ip dhcp import
$ c* v$ Z+ Q) O+ ^1 w1 S, w; ~3 gD. sh ip dhcp server statistics9 i$ @2 _4 B+ b+ y
=> ANSWER: B
- n7 i6 g  |6 G% N! f3 |3 U# e! y% D; x; d6 [# d$ ~
Q10 which three technical services support cloud computing?
6 t' y* [9 K+ x5 R6 }A. network-monitored power sources
1 Q3 R7 {% i! n  H$ a+ J. o! @, sB. layer 3 network routing
0 P8 j/ \  \, C1 bC. ip localization
+ B8 X' N8 H! S+ {8 LD. redundant connections
8 d- `) Z/ e% p7 e2 @8 o  j" VE. VPN connectivity
1 ?/ f' ^# G$ x; i" S0 |- EF. extended SAN services5 i* u. E  Y5 Q1 A" r6 K
=> ANSWER: A,D,F
  n! I: t7 t% ?/ M7 W
- m% |" _; b4 q% P5 T5 }/ |Q11 which symptom most commonly indicates that 2 connecting interface are configured with a duplex mismatch?
# ~) P# z2 v1 ]$ cA. an int with up/down state
- j( o1 T% Y" g$ U' w/ N; \B. an int with down/down state
, y  _8 T/ ?# XC. collisions on the interface
$ r. f3 M; d6 Z6 R0 `0 SD. the spanning tree process shutting down, l/ Q3 L8 v! N* v
=> ANSWER: C9 M. O6 I: F( T1 l) A* m+ e

3 L( I: W; E2 s# f. W1 L- `! {" \# VQ12 which 2 steps must u perform to enbale router-on-stick on a switch?  
1 z- B0 B3 J3 w4 u+ \  ^7 K3 vA. Connect the router to a trunk port
3 W2 Y, m# \1 t6 d# P% wB. Configure the subinterface number exactly the same as the matching VLAN
- E, d( s1 j# y: u' W( F5 {$ f" {! xC. Configure full duplex  P  E+ j2 [+ K
D. Configure an ip route to the VLAN destination network
8 h" ^4 m3 z" T3 h$ ?E. Assign the access port to the VLAN
: S! j8 ]5 _8 |7 X5 ]=> ANSWER: A,B3 H+ ?3 P+ I" P  Y: v% k5 q6 G# C

3 `1 [! [$ N& f# Z. Q, xQ13 which address prefix does OSPFv3 use when multiple IPv6 address are configured on a single interface?0 {- J- D/ B9 |
A. all prefix on the interface% W* z+ ]& [5 b4 o9 t
B. the prefix that the administrator configure for OSPFv3 use/ I8 ?* q. j- [/ c
C. the lowest prefix on the interface
5 Q7 S; F) K& N+ Y, Z! UD. the highest prefix on the interface8 B5 U+ Y6 Z$ `4 |
=> ANSWER: A. G6 c2 E2 i2 ?6 X( l
7 r! Z+ _- h* ~9 v+ i$ g
Q14 which IP configuration does the CIDR notation 192.168.1.1/25 refer?
" A9 C& g2 I4 y; t4 QA. 192.168.1.1 255.255.255.645 y# ?' f5 M! [! i0 L6 {' w9 o
B. 192.168.1.1 255.255.255.1% R; x' H0 [1 R- o  o
C. 192.168.1.1 255.255.255.32
& m- t5 e- D1 FD. 192.168.1.1 255.255.255.256
8 Q+ _  D2 |5 z9 B# c0 X4 m' zE. 192.168.1.1 255.255.255.128
' r9 o2 H2 V0 B# X=> ANSWER: E" T1 z/ V) o* F. {. P& w
+ p( P& K0 f9 d# `! _$ I
Q15 When a device learns multiple routes to a specific network, it installs the route with:
8 x2 Q: d( b6 U0 `( N/ GA. Longest bit Match (highest subnet Mask): T6 l2 u, k% L% O; ?
B. lowest AD (Administrative distance)1 q  f& r5 w; A, J3 j: v
C. lowest metric
. ^% t' u% P* S9 |D. equal load balancing
) c" a* }* i5 {) |* j8 h=> ANSWER: B
- n( d+ e. M/ k0 D* B- E/ n9 S" o$ ~: I
Q16 OSPF enable on interface with multiple ipv6 prefix which ip will OSPF use?  
9 ?5 i5 K, N6 `8 U5 p" nA. higest prefix( N1 n/ y; S( P+ w1 C- Y
B. lowest prefix
) d/ `' F( f% f' {  s. D( a# mC. all prefix4 R7 W4 D& Z6 V2 y$ A1 i
=> ANSWER: C
3 D' n* c/ x) L8 w" O6 o3 |3 ?4 R# f0 @' t/ |$ {4 Y- L2 m) b
Q17 What are the requirement to configure DHCP binding? (Choose 2) 不確定
$ q. e1 P$ W% u5 ?- Q: AA. DHCP pool
' t7 D/ g9 i2 ZB. ip address
( r* W' Q6 R  \! N- J: jC. Hardware address. ~5 _3 T  P0 q3 j" v3 D3 ~# z
D. other option
/ F! A/ I7 ]1 V1 T6 J/ a/ R=> ANSWER: A,B% a9 n! j/ ~( U/ D% P( A

; w, k6 X+ ]5 F) b" M0 ?Q18 which command can you enter to verify link speed and duplex setting on the interface?
3 Q* _( J0 B' ]7 E8 }0 Q: |. j. BA. router#show protocols5 n, e+ g8 u0 C. `+ b
B. router# show startup-config
- w  Z6 c% q+ ~* MC. router# show line1 U. G" E1 r5 \0 E% R
D. router# show interface gig0/1
; R$ o; [1 O+ e- T, W: Y=> ANSWER: D
* e9 T2 o, b: p& e  E
, X/ p3 e3 j1 f  i! J2 wQ19 which switch port security allows increment counter
1 V" `1 Q! {7 d' |  _& h' [9 R4 r8 I9 _=> ANSWER: restrict! M6 L) f4 T: }: }8 S

( |" ]6 l* M; K& z& H: v; ~! C# aQ20 which type of broadcast barely used in IPv4 which also exist in IPv6 like?3 f9 G3 a) A9 L( E( r" l  \
A. unicast
( K% D! C$ n7 J6 |3 gB. multicast
  p- G! e2 z4 C& W/ O# AC. broadcast1 U  ]' e: m6 N
D. anycast6 m6 c& `" K( K4 e
=> ANSWER: D
9 F: k& i1 [5 |% Y  O; }) h: P$ l" N6 d
Q21 Which Cisco platform can verify ACLs?
' n* U. n# \9 f4 ^' D6 v% vA. Cisco Prime Infrastructure' f' m) a$ B! N/ q1 G' J
B. Cisco Wireless LAN Controller/ C- M/ e0 _# ]9 M) p2 l+ c& L
C. Cisco APIC-EM
3 H) \5 c- @  e2 X+ gD. Cisco IOS-XE* e* @+ M9 I7 y3 d. t3 }# o
=> ANSWER: C& _; h7 Y8 B2 i2 H" a9 z* W

% R/ |; p  A5 Y3 @Q22 how to trouble DNS issue? (multiple options)3 N4 E: O& M$ e8 q" A( @5 N: P
A. Ping DNS server( K8 D9 Y3 O) `. g4 ^+ K7 V) L- @1 Y
B. check IP assigned
# f( |* l( j" |! M4 f4 cC. Ping public IP
7 C/ t% @) [! r+ k4 D=> ANSWER: B,C0 d, v9 |$ `3 R

3 d# d. i) x1 m# L9 S& r: _/ p* XQ23 What is true about SNMPv2?' ?. H! ?  k3 V. ]2 _- {3 C
A. Uses MD5 encryption
5 S8 b# {( S0 a$ C0 lB. No default value is initialized for authority and policy mechanisms
  F% I) U' U2 ^* T$ s8 |6 LC. Other Option0 T4 K% `' ]& |8 K% a
D. Other Option/ h2 R) N' c& B9 m6 C8 Z
=> ANSWER: B
7 z! z7 F2 }9 X- K0 R3 e
) b1 Z8 g, W" y& E* Z# fQ24 Which Cisco network component allows you to isolate users by policy?
1 N, A+ H3 y) V1 W/ YA. Policy enforcement9 `- ]% L: k5 r" }' E/ f
B. Access control- b! M4 w# R1 d
C. Network services virtualization’
. U# `8 q$ E( b$ P( f0 ZD. Other Option
) z, i  Y; v! L% I" n+ C# W2 K=> ANSWER: B% T% T  j) g2 |; O* }( X

2 T4 t1 [1 ~& N

评分

参与人数 1鸿鹄币 +100 威望 +1 收起 理由
崔凯 + 100 + 1 赞一个!

查看全部评分

 楼主| 发表于 2017-3-24 13:39:34 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 15:06 编辑
6 n: N, |7 a' r" T3 x7 h0 O2 l& x8 S- L: h$ \9 s( b+ A
Q25 which authentication is supported on MLPPP?(Choose 2) 2 ^" N: Y* }$ l6 h- J
A. PAP
+ N2 x, ^7 W- Q7 a3 kB. CHAP
( a2 h" Q. @. ~# `1 e6 wC. PEAP' G+ w' q: i+ s- S5 @
D. LEAP
: S% _" ^1 |& n* W=> ANSWER: A,B
# [2 S/ i( N7 q; h- ~+ X9 V, F8 B- E2 a' Z( V2 B+ d" S, G3 f( a; r
再次聲明 我發的答案並非正確的  沒過別怪我
' \- I" U8 Y+ ?: o9 n6 D# c- l
来自 23# 2017-3-24 13:39:34 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-3-24 14:27:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑 1 p0 S; K* s, |" z! m
! h  \, F% t' p- M5 U$ Z
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
, K1 C0 ?3 ]9 |8 m' F0 ~A. ACL analysis tool in APIC-EM; Q: _  ^1 g& M( ?0 d9 |+ x% {
B. ACL path analysis tool in APIC-EM
' S" n. m* l- f% }! G* mC. APIC-EM automation Schedular: l9 }9 W: O9 W; [
D. iWAN application5 m( C3 }7 r) }
=> ANSWER: B
/ Q1 J8 [8 R8 U) A* K: F) o答案沒變# k# @8 r5 r3 V9 h7 c* d* G
以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)
! h  e+ c$ O% B0 m% xQ26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
2 _; }2 U' m& i1 F5 ~( j* QA. it discards the packet; w# U5 @3 j2 {  A% X7 I% V+ n
B. it broadcasts the packet to each network on the router
0 X+ A& W" i4 c, xC. it routes the packet to the default route
8 S6 \+ J2 r7 A! RD. it broadcasts the packet to each interface on the router' O( `  H7 O' R4 C" [
=> ANSWER: A
' {* T6 |5 ^- v& @0 B% b8 X, x' R9 n: I! F4 C, t( L0 t! F: v; {. L
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)
, b! u" V/ z' s. d% X' ^A. It automates network actions between different device types
1 N9 c! t9 E3 T$ }" a0 ~* t- AB. It provides robust asset management
8 b- w" q/ z3 F8 N; NC. It tracks license usage and Cisco IOS versions
& n7 R; h- }) ]5 O/ bD. It automates network actions between legacy equipment; ]) Z, ?7 H6 O7 z% P/ v  |6 z( F
E. It makes network functions programmable& U( Z5 G9 a2 u& b' a
=> ANSWER: A,E
3 I" B4 z; v3 K1 e) |9 g+ O
/ [& t7 i& l" o6 M0 g" pQ28 Which three options are types of Layer 2 network attack? (Choose three)
9 S2 e" g6 h9 E7 Z9 ], Y4 E' VA. ARP attacks; f7 Y# h0 v8 u0 I/ [
B. brute force attacks
  ?, E* J' v5 b# G+ F3 B, bC. spoofing attacks" `5 X$ q4 N! _. T
D. DDOS attacks
) j$ ~+ G( t! b/ b( z) NE. VLAN hopping! g$ X( f8 Y* ?
F. botnet attacks
0 v; F0 A$ l, S' z9 x+ P=> ANSWER: A,C,E7 u4 J/ i7 u: o# \. v% J

3 W$ G: _/ o" F; eQ29 You are working in a data center environment and are assigned the address range! |  X3 D' V: t& h9 G- B- ^
10.188.31.0/23. You are asked to/ _+ ^2 Y* i# h4 H2 L5 d0 N
develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts
# G0 S- g4 x$ meach. Which IP
% ~, W! R7 \( U; F3 p7 s/ K6 ^2 raddress range meets these requirements?
1 I* J5 [. x& t, o1 ^) ]& L" S: aA. 10.188.31.0/26
, j4 K% w+ W0 W1 Y/ _3 P5 nB. 10.188.31.0/25/ {& a/ x5 P& K& c+ w
C. 10.188.31.0/28& M5 B) U. I$ C/ B
D. 10.188.31.0/274 }2 S3 T" P' {& N1 o7 ~5 G" B* E
E. 10.188.31.0/29
) K1 g6 H$ O, ?0 o$ y3 h=> ANSWER: D: ]' j8 v3 v! R3 c# ~/ C1 G

$ m; _- H& s7 {. p1 ~7 Z( zQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?( f( |, s7 j2 v+ s& }/ [: L
A. 8
: Y4 [) [/ p6 K/ y, HB. 2
. K/ x( a( S! @. ]; a7 AC. 1
; T' {* k4 |4 j5 ~8 B. ?D. 01 z# ]3 j0 k4 O7 q* s* C9 F3 y
=> ANSWER: C
, M8 e. `; A: z6 A
8 E; l; S! h5 \; g) @Q31 Which two statements about unique local IPv6 addresses are true?
. X. g% o. r4 ]: b* |) s) N4 [A. They are identical to IPv4 private addresses
4 Q4 s2 L( M$ C) \% t' iB. They are defined by RFC 1884
6 t4 N: ^% @" N' w- ~8 ~% [C. They use the prefix FEC0::/10
3 }9 r0 o$ k) |" n: hD. They use the prefix FC00::/7
: e) L  U- i) S7 Y1 x3 V! A& k0 [E. They can be routed on the IPv6 global internet+ Q: i3 P1 J: {) U8 `4 f; n
=> ANSWER: A,D
% U1 f8 |- a  k3 N' R; |
8 Z9 G+ u  z- z6 |: N5 UQ32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
% z& z/ O1 L  SA. PortFast on the interface
( _# Z6 W$ h4 D( n( \B. the interface as an access port to allow the voice VLAN ID  {+ _- R+ t  q9 W/ k( ?
C. a voice VLAN ID in interface and global configuration mode( X( l8 G2 s" G
D. Cisco Discovery Protocol in global configuration mode
7 d$ R  S' u! x6 J- `9 A" m=> ANSWER: B
& K' D8 T( {6 ?' Y, c7 ~
, ]# T! \# K! w* B: ZQ33 Which identification number is valid for an extended ACL?/ L) k& Y9 E2 Q3 E  h# d
A. 1( l' U  {0 Q* W) G% K  g
B. 641 z4 a4 `8 _0 v' h
C. 99
7 a4 W/ R3 z) ?- o9 r4 |D. 100
0 t) D9 V4 j' j7 \3 iE. 299
6 Q. ?3 E9 T8 q6 q7 l2 M=> ANSWER: D
+ ^: ^/ w8 k: O/ \& T8 O4 V7 F( l# r# k  z" `/ I; j9 j. q( y
Q34 Refer to the exhibit
/ ?1 H4 s' \/ K, q3 W: d q34.jpg . z3 K/ P! t7 K7 H5 Q2 T* A
After you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
8 j$ E) G" u! K: z) Fcan you take to
& G) U. P4 w* e3 lcorrect the problem?
$ ~' O4 N4 N, K( OA. Configure a loopback interface on R17 G& A$ L/ N1 ?- G' {/ ]; v- R
B. Enable IPv6 unicast routing on R1& z6 x' [. }( V: O- k) m. n
C. Configure an IPv4 address on interface F0/0! V2 z' Y+ X$ R* m
D. Configure an autonomous system number on OSPF( Z4 r; e- ~% {
=> ANSWER: C1 ?3 U3 \3 N1 h; \0 ?1 \" U
- J, E- s- F+ |7 V, A, l1 Q; q
Q35 Which statement about static routes is true?
. Y' c2 @" {& l; Z7 l; p* O( JA. The source interface can be configured to make routing decisions2 H7 y1 ?6 V; g  a) O9 _
B. A subnet mask is entered for the next-hop address: z9 H* u, l, P' E
C. The subnet mask is 255.255 255.0 by default
: Q+ n2 o. J; n8 @. ^. TD. The exit interface can be specified to indicate where the packets will be routed
$ E! ?: {# m9 g! w" `! e, V9 ^=> ANSWER: D  
. u! u) r9 q) Q& A& i9 M+ _* w
来自 24# 2017-3-24 14:27:14 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-3-24 17:06:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 17:26 编辑
. r% N0 q5 o3 N* X+ [
qwe4925429 发表于 2017-3-24 14:27
7 q1 N' C/ Q- h& U1 ]# u( @Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in ...
) @* M3 o/ ~  [% K( ^& X' z2 J
以下也是可能會考的題目 答案並非是正確的  僅供參考
, M" M! V9 n/ hQ36 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose Refer/ P. s8 f) F* [; C' b1 |
to the exhibit. While troubleshooting a switch, you executed the show interface port-channel 1
; }. S* E! ^" w$ i, R& ]etherchannel command and it returned this output.
( [. b  _6 z2 m/ l- `% V, IWhich information is provided by the Load value?, D* S+ N0 u5 J  R- v) M
q36.JPG
2 c& @2 S, M% \& b: t3 B! iA. the percentage of use of the link
! S7 t6 a  b" u4 \, o3 `0 R( LB. the preference of the link9 u7 z8 ^( \1 ]) d' ], G
C. the session count of the link
* {# K: V' Y; N% `, A$ dD. the number source-destination pairs on the link
/ i/ P* G( I9 d/ @6 m( o+ c=> ANSWER: D
! ]: P; h( g' g- M  P5 ^) a& U# X( r! b# D2 h9 f7 V5 ?/ M3 S
Q37 Which option describes a difference between EIGRP for IPv4 and IPv6?" i5 f4 f( }3 C5 `" I/ z
A. Only EIGRP for IPv6 advertises all connected networks
4 H/ ]7 _$ x: ]9 }B. Only EIGRP for IPv6 requires a router ID to be configured under the routing process2 V# H& m, x+ I. r2 Z
C. AS numbers are configured in EIGRP but not in EIGRPv3
, l- [2 C: h3 g1 J- ED. Only EIGRP for IPv6 is enabled in the global configuration mode
1 w; `& ~2 H; f) x=> ANSWER: B
% p6 L4 p: n* d$ R, p; |4 s
+ l$ s* t. w8 O3 j6 R4 ~Q38 Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router
% ]3 n+ B; I& ~' LISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to1 e* h. D" ~) W4 M- @/ t# V
establish adjacency? (Choose two.); C5 A5 H# W+ S  B5 I. |
q38.JPG ' _9 b9 y3 e# Y3 v
A. Set the subnet mask on edge-1 to 255 255.255.252
8 M+ m8 [6 ~/ t+ O/ c0 p- d3 h0 tB. Reduce the MTU on edge-1 to 1514! T' F1 Y& f8 K7 H( B
C. Set the OSPF cost on edge-1 to 1522
4 V/ A5 A( G; e- }, k( {6 h5 TD. Reduce the MTU on edge-1 to 1500+ O. T; k4 M% _$ y
E. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface
. `/ G" I8 H6 Y7 k# B=> ANSWER: D,E% D; h9 R( u& A

, R, b# ]0 z( d+ s$ `1 N* c0 M( ?& ^; hQ39 Refer to the exhibit. Which statement describes the effect of this configuration?) l. e0 K! D# K. M5 c( G- l
q39.JPG . x& ?1 `1 i8 W( [7 L. A5 @
A. The VLAN 10 VTP configuration is displayed: |  l9 n" e2 i8 X; `  j* M: M8 o5 l- \
B. VLAN 10 spanning-tree output is displayed# @- c& A; l8 H) e$ _
C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode
& I9 j) T4 K( U  L( h) \& F+ ^1 ND. VLAN 10 is added to the VLAN database
: g6 d. O# m* F0 A7 F=> ANSWER: D
" i" p0 x$ m9 E' ?6 B! y( w以上是我所知道可能會考的題目(不會再新增題目了)6 C9 c  p- _% |" J: l
来自 27# 2017-3-24 17:06:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-23 23:31:12 | 显示全部楼层
你真的太偉大了... 讚!
沙发 2017-3-23 23:31:12 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-23 23:34:09 | 显示全部楼层
太及时了,感谢lz
板凳 2017-3-23 23:34:09 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 00:10:59 | 显示全部楼层
感恩感恩!!!
地板 2017-3-24 00:10:59 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 00:40:51 | 显示全部楼层
mark~~~~
5# 2017-3-24 00:40:51 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 04:36:31 | 显示全部楼层
6# 2017-3-24 04:36:31 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 04:36:42 | 显示全部楼层
7# 2017-3-24 04:36:42 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 07:35:28 来自手机 | 显示全部楼层
謝謝你的提供喔
8# 2017-3-24 07:35:28 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 07:35:34 来自手机 | 显示全部楼层
謝謝你的提供喔
9# 2017-3-24 07:35:34 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 08:09:19 | 显示全部楼层
10# 2017-3-24 08:09:19 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 08:10:28 | 显示全部楼层
恭喜  大大
11# 2017-3-24 08:10:28 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 08:39:58 | 显示全部楼层
感謝"qwe4925429"分享考試戰報資訊~
12# 2017-3-24 08:39:58 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 09:08:35 | 显示全部楼层
13# 2017-3-24 09:08:35 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 09:14:49 | 显示全部楼层
感谢同胞
14# 2017-3-24 09:14:49 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 09:38:12 | 显示全部楼层
感谢大神
15# 2017-3-24 09:38:12 回复 收起回复
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2024-5-4 12:19 , Processed in 0.073192 second(s), 11 queries , Redis On.  

  Powered by Discuz!

  © 2001-2024 HH010.COM

快速回复 返回顶部 返回列表