设为首页收藏本站language 语言切换
查看: 2503|回复: 3
收起左侧

[其他] 300-410 詢問這些題目的正確答案

[复制链接]
发表于 2022-8-19 15:47:11 | 显示全部楼层 |阅读模式
本帖最后由 junejune 于 2022-8-19 15:59 编辑
2 v! H- m% w% Q  p% O2 ]! q' }" ?$ K$ Q% o% y
詢問這些題目><  
題庫內的答案 與太多網站的答案都不一樣....

/ T! N* b  D: k( U

, a$ `( w- m2 s0 B0 [
問題1
Whichconfiguration feature should be used to block rogue router advertisementsinstead of using the IPv6 Router Advertisement Guard feature?
A. VACL blocking broadcast frames from nonauthorizedhosts.
B. PVLANs with promiscuous ports associated to routeadvertisements and isolated ports for nodes.
C. PVLANs with community ports associated to routeadvertisements and isolated ports for nodes.
D. IPv4 ACL blocking route advertisements fromnonauthorized hosts.
------------------------------------------------------------------------------------------------------
問題2
! ]! J% |  ]1 p
Refer to the exhibit.

6 Y( D0 }0 S" g; x5 U                               
登录/注册后可看大图
' c5 {4 k5 P1 q* @
8 l5 H6 j# y* p
The control plane is heavily impacted after the CoPP configuration is appliedto the router. 9 u# a) J! ]0 b! @5 P# r
Which command removal lessens the impact on the control plane?
A. access-list 120 permit udp any any eg pim-auto-rp
B. access-list 120 permit eigrp any host 224.0.0.10
C. access-list 120 permit ospf any
D. access-list 120 permit tcp any gt 1024 eg bap log

" `" N. Q, V; M& \  D* B* w  y
------------------------------------------------------------------------------------------------------
問題33 J  u* f: b/ r! A' H' l- x
Referto the exhibit. * I9 f( b  y( E- \4 J
% S  L% Y8 H% v& z9 {
                               
登录/注册后可看大图

: e8 k7 y) h* ]A network administrator must block ping from user 3 to the App Server only.
- K- y4 x" e$ v( v& AAn inbound standard access list is applied to R1 interface G0/0 to block ping.
: e9 s/ g6 `" W4 q7 bThe network administrator was notified that user 3 cannot even ping user 9anymore.4 I6 m/ e0 _6 `8 v4 E- X
Where must the access list be applied in the outgoing direction to resolve theissue?
A. R2interface Gi 1/0
B. R2interface Gi 0/0
C. SW1interface Gi 1/10
D. SW1interface Gi 2/21
------------------------------------------------------------------------------------------------------
問題4
) e; E+ C5 n0 q! n/ t' t2 p9 }% }
Referto the exhibit.
3 ]# W2 m8 G* r2 ^' F4 C/ U1 ]6 ^
                               
登录/注册后可看大图
4 D2 Z4 H: _  L$ P
R1 and R2 are configured for EIGRP peering using authentication and theneighbors failed to come up.
& h/ G" d8 \. E7 M6 _, @& BWhich action resolves the issue?
A.Configure a matching key-id number on both routers
B.Configure a matching authentication type on both router
C. Configurea matching key-chain name on both routers
D.Configure a matching lowest key-id on both routers
------------------------------------------------------------------------------------------------------
問題5
Referto the exhibit.
" ^/ ^% o# a3 j  x7 U" w
) D' F  m, |1 |  e+ F' N
                               
登录/注册后可看大图

( R5 g5 N  F1 t9 l2 i, `. `4 XAn engineer is troubleshooting a failed Telnet session from PC to the DHCPserver. ( W0 a# Y/ E& Z8 g  e+ k
Which action resolves the issue?
A.Remove sequence 30 and add it back to the IPv6 traffic filter as sequence 5.
B.Remove sequence 20 and add it back to the IPv6 traffic filter as sequence 5.
C.Remove sequence 10 to add the PC source IP address and add it back as sequence10.
D.Remove sequence 20 for sequence 40 in the access list to allow Telnet.
------------------------------------------------------------------------------------------------------
3 W3 k, z3 q, h9 l  R
問題6
Referto the exhibit. 0 y! K5 m0 {8 k. K( R- T' h: A
6 Q0 T2 k: ]2 w* t9 e& {
                               
登录/注册后可看大图

) E, R% ?+ h! w9 Q1 P, j/ WAS 111 mut not be used as a transit AS, but ISP-1 is getting ISP-2 routes fromAS 111.
. j) T) [& s# ]" TWhich configuration stops Customer AS from being used as a transit path onISP-1?
A. ipas-path access-list 1 permit ^$5 J8 B1 B3 z2 I0 W4 n$ _- N4 h
B. ip as-path access-list 1 permit_111_% r4 i& a. u, H) Z: n4 m' V
C. ip as-path access-list 1 permit."
% S# S' L5 y1 Z' l* L2 ]D. ip as-path access-list 1 permit ^111$
------------------------------------------------------------------------------------------------------
問題7
Whichtwo components are required for MPLS Layer 3 VPN configuration? (Choose two)
A. Use pseudowire for Laver 2 routes.
B. Use MP-BGP for customer routes.
C. Use OSPF between PE and CE.
D. Use a unique RD per customer VRF.
E. Use LDP for customer routes.
------------------------------------------------------------------------------------------------------
問題8
Referto the exhibit:
$ r4 E4 j; s7 s. s" f/ i) F  v

' n) j1 t! M2 }( {9 h  k: k                               
登录/注册后可看大图
9 X; J" x6 s: ]# q+ t  I
After recovering from a power failure. Ethernet0/1 stayed down whileEthernet0/0 returned to the up/up state.
2 {# w, B$ Q! n& e1 W. B  U$ jThe default route through ISP1 was not reinstated m the routing table untilEthernet0/1 also came up.
' R6 H) @" H: a' \" m0 D* m: uWhich action resolves the issue?
A.Reference the track object 1 in both static default routes.
B.Remove the references to the interface names from both static default routes.
C.Configure the default route through ISP1 with a higher administrative distancethan 2.
D. Adda static route to the 8.8.8.8/32 destination through the next hop 203.0.113.1.
------------------------------------------------------------------------------------------------------
問題9
Referto the exhibit. % H3 S( O7 n5 K+ L
8 d4 k  d* ]% G9 l* m
                               
登录/注册后可看大图

" k3 n- t6 G" iThe ISP router is fully configured for customer A and customer B using theVRF-Lite feature.5 v" q" N/ f% ], @/ ?( G
What is the minimum configuration required for customer A to communicatebetween routers A1 and A2??
A.
A1:
: H5 ^5 X0 U7 e" E1 C* t+ Uinterface fa0/0
! }) o: j1 Q5 u- X7 adescription To->ISP
2 D; S7 I. c. t- dip vrf forwarding A
7 D/ E5 U, z' k% Q2 x' @* m! j* bip add 172.31.100.1 255.255.255.0. |& V$ [: H' t* `. c
no shut/ `4 O/ ]$ q% \$ h$ c
!" L. I4 Y3 {2 H/ Z) r8 q
router ospf 100; y5 h2 w2 c/ Z. W# Z2 \" s! @. S' V  i% t
net 172.31.100.1 0.0.0.255 area 0- B% ?0 n" |0 X# T
! l3 k. z9 k" ]& \0 o8 x' w. n: a
A2:, e  u( @" W( L2 A  {) z
interface fa0/0
$ i6 s! O2 L2 o" l5 ndescription To->ISP4 [6 G2 Q" P' F9 ?; }6 N0 Z
ip vrf forwarding A
7 I5 n8 a* }. y" wip add 172.31.200.1 255.255.255.0
% }- F4 \" K+ H- P- E' P0 I/ Jno shut
) P. l* u6 r4 f. |# i( l/ z3 J!1 o7 r1 n* [# S) U; k5 l, }
router ospf 100
$ v. I( a  p9 R* ?) ^2 J% onet 172.31.200.1 0.0.0.255 area 0
B.
A1:$ ~! L' d" |. [* |5 v! E  y4 B* ?. g
interface fa0/0
% r: _$ f9 r8 [2 Ddescription To->ISP; I+ }5 V5 E/ _) s
ip add 172.31.200.1 255.255.255.0
6 |, G. ?, B3 J( ano shut
2 |% ]0 N7 G$ H2 g. x2 o; m1 V!
: J/ V" X4 m% j, u. }# W, U; g5 lrouter ospf 100
( Y" y9 |9 w+ h+ Bnet 172.31.200.1 0.0.0.255 area 0
# y2 W. |- R4 ]$ g  b# E0 p; x; e6 _- q! Z+ G# P; F+ t
A2:7 T9 Z0 T3 p* O& f
interface fa0/0+ S; T3 D/ {+ L
description To->ISP
$ F% }2 q& y$ g0 jip add 172.31.100.1 255.255.255.0
, D0 q3 s. S! Z5 n! `2 C/ Tno shut
* Z$ p) E4 e( B; i6 z! q" l!) ^9 l. X6 x, \+ `  e- d
router ospf 100$ j$ [% Z* l+ h! {3 X/ c, B
net 172.31.100.1 0.0.0.255 area 0
C.
A1:/ O9 Y! k5 o/ D) K
interface fa0/0
/ z! {2 j" F9 N) S, t7 T, |description To->ISP0 ~% D( _* p# G  D% x6 S" A2 S. Y
ip vrf forwarding A
) k4 q6 v; ~- i7 H/ iip add 172.31.100.1 255.255.255.0
) @0 N' ~8 ]( d; o# Yno shut2 l0 E0 M4 I* \% I/ V
!8 {  Q5 K7 n6 A. Q  \7 g, y
router ospf 100 vrf A
9 G  j! D: |  x9 \' S; e: pnet 172.31.100.1 0.0.0.255 area 0' Y% ]* |. ?8 W. z# L! T, S  G
0 C9 \, F6 A, w
A2:, ^6 J6 x/ S  O- R/ F
interface fa0/0
# H( f& D! a1 idescription To->ISP5 L' @0 h3 w; N3 y/ \
ip vrf forwarding A( C( V& L- B( X7 L' {# R. E
ip add 172.31.200.1 255.255.255.0/ _( A- R1 B( H- Y4 Q! q& s. t
no shut
8 u4 f5 X+ l% s3 D4 o9 X4 ~/ @2 A!# G1 K: m9 T& h2 T5 e0 @
router ospf 100 vrf A; d6 T+ M; e) v( P% v0 H1 P
net 172.31.200.1 0.0.0.255 area 0
D.
A1:
3 x1 [! [4 Z* ~+ ^+ cinterface fa0/0& m" i! a" [3 b$ }. m1 _( w5 ^
description To->ISP
3 J9 Y0 }* C! d. J- a( aip add 172.31.100.1 255.255.255.0; e) w+ L) Y1 e2 r* u' Z
no shut
4 n$ D0 N4 e; w# b6 F$ R!
' x: @- X9 w6 {, B' M0 q  {router ospf 100
5 B- n- j# @3 o% ~- _net 172.31.100.1 0.0.0.255 area 0
, _: p) |5 k, }! |  I! d" l# F! K3 k/ D
A2:+ o2 Z" w1 B7 |4 G
interface fa0/01 f! u( b; A$ H1 ]% G# N
description To->ISP
6 w0 n) ^! x. p4 \! j$ V* lip add 172.31.200.1 255.255.255.0
8 Z/ `) H$ E( d) @" w6 ~no shut
! N$ T! Q8 B/ x* M" S% B!1 ^* A- s8 g6 Y  m  J
router ospf 100  }( {( f2 P7 Q% ]
net 172.31.200.1 0.0.0.255 area 0
------------------------------------------------------------------------------------------------------
Question10
What are two characteristics of VRF instance? (Choosetwo)
A . All VRFs share customers routing and CEF tables
B . Each VRF has a different set of routing and CEFtables
C . An interface must be associated to one VRF
D . A customer site can be associated to different VRFs
E . It is defined by the VPN membership of a customersite attached to a P device
截圖 2022-08-19 下午2.37.34.png
您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-3 04:59 , Processed in 0.068739 second(s), 15 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表