成长值: 64985
|
本帖最后由 小乔 于 2015-12-29 10:34 编辑 6 ]/ \9 ` [$ E6 w9 Z D
. ?) Q! S$ S( ^2 h9 }- B
新题为考生考后回忆,题目不完整仅供参考0 e! S. ?: @# t/ O6 ~% a. h
5 U6 p$ _- `8 {+ ?/ Q
Question1 rag and Drop Question4 w; q* l& G. K1 j# Q w: ?, i
CDP* t4 b# S6 [# n7 X- @2 d
– multicast destination address 01-00-0c-cc-cc-cc5 s9 F/ j, I9 e/ J0 G2 F
– 60 seconds' \( L* q) z& I8 l$ n+ d9 M* o3 d
– compatible with Cisco Discovery Protocol uses IEEE 802.2 and 802.3 encapsulation only.3 x. }3 @: V+ \4 h* S
LLDP
' O6 a* ^8 ^5 u/ W) o– multicast destination address 01-80-C2-00-00-0E //03 r 00; x8 s [! G/ R, A
– 30 seconds) d4 D( _- f( q0 b: k
– Inform topology change: V* H" j) w' m
Question2:7 s, H* |! y% q# k! {& V& ^8 e
2. How many table in DHCP snooping database can bindings?
7 e6 {$ V5 Q" DA. 1000+ v K, V, t2 |, J& S1 v
B. 2000
; M, \7 d) G+ CC. 4000
+ a5 Q$ N5 Z" Q2 | ?D. 8000
1 D2 r. `, B2 p2 H1 uAnswer: D: 8000 (The DHCP snooping database stores at least 8,000 bindings.); m% W$ G9 B) Q5 h- }2 r
Question3:5 L( o3 ^( w5 q
Engineer request to set half of cdp transmission default time' k" a# Y" \0 M2 O) U. C
Answer : cdp timer 30
% z6 _" |* ?; ~Question4:/ ?8 m& y3 w5 {. R5 _
On which layer does IP source guard provide filtering to prevent a malicious host from impersonating IP address of legitimate host?
# a! W/ l6 \$ n, l8 _7 x5 t/ h% k3 SA Layer 1( b5 u% y) g" }( s% A- q& V
B Layer 2
! o) x3 f5 n0 L) ]C Layer 3
( r6 p: H' e. N% ]: ]D Layer 7
" r3 c) r) z9 p! f+ E/ x" UAnswer : B: Layer 2- t4 M' i# i& o7 ?" n
Question5:7 h& X; [( B+ B: E4 B+ m
Which feature puts the port into err-disabled state when the port has PortFast enabled and receives BPDUs?
) T$ [# x. @! g' _: m# @A EtherChannel
n$ i: }/ v! }# lB BackboneFast; v' L5 j4 L8 ?
C BPDU guard8 N x. x! ?" L* k( x
D BPDU filtering
K/ h4 `% H& i) Y. h+ h' c* c/ jAnswer : C: BPDU guard' o1 E& M: F; m( A0 D/ W- \
Question6:. F# Y* R$ N" X( k4 p# i
When SDM templates are configured, which action must be performed for the configuration to take affect?1 a A9 B/ [& |# B6 s
A write memory$ m" s2 V7 @$ x- |, [0 l, e" a& F3 r7 J
B shutdown
! \& K5 _9 @6 |/ u$ r" `C reload
- r1 T" Y8 P0 g" [+ t$ PD backup config( z9 Q& u, T, G3 M9 I" B
Answer : C:reload
- \& V0 m1 t5 `Question7:; l9 S! w: r, ] A8 Y" u. H
Which of the below options is VALID for etherchannel load-balancing?9 Y. U6 a. \: s- M# k
a) source mac , destination ip3 x3 O$ \; Z: K9 o6 E4 E( t
b) source mac , destination mac7 l# M4 c; h' z/ C* T$ w& K
c) source ip , source mac. D H' ^3 U, u6 ?5 ?0 D8 D& P
d) destination ip , mac ip7 L. k+ L! P3 x
Answer: B
+ w: w0 `/ w2 [$ B9 a$ G3 ~) [Question8:
, Y/ e. O' I( Z4 x' x# yWhich two statements about SPAN source and destination ports during an active session are true (Choose two.)
( u% ]* U7 ?7 e/ vA the destination port can be destination in multiple SPAN sessions, Q1 m q" O. C/ f$ k1 m
B The source port can be only an Ethernet physical port
( Y2 n5 C/ y- e; x' R1 Y" @: a$ @3 \C The destination port does not participate in STP9 k* |# Z+ U3 E5 @( I4 o- b, L ^/ B
D You can mix individual source ports and source VLANs within a single session
$ ]$ o i1 {; v9 g+ k4 \- wE The source port can be monitored in multiple SPAN session.
7 j2 ^0 ?7 d1 KAnswer:C,E5 A. c3 q" t, W: c g- p
– c) The destination port does not participate in STP/ t+ n3 [5 w/ K) ~2 ]% t- x
– e) The source port can be monitored in multiple SPAN session., r3 @1 L+ j$ _; B4 b
Question9:
- K* `- `- a, Y ^( wMST Configure on switch (spanning tree mode client)
7 }& b: e5 B+ @' c* LAnswer: Configure Manual, same region name, revision number and MST instance VLAN mappings.1 b1 [1 d1 }" M8 W7 `3 V. l6 _
Question10:
2 w. P$ Y% j6 ]# ?11. What is the max. “stack bidirectional speed”?0 v0 R! T5 W" H3 G
A) 8000
6 s7 C( P( v, h2 MB) 16000
, [1 |2 S1 ?/ l0 S7 F) JC) 32000 **# d; i7 v8 Y! E
D) 64000
; C' J( g0 T% \" W, o4 `Answer: C:32Gb/ d7 |/ i7 d4 c1 @1 E( w
Question11:9 @$ ?" f! s& p0 m! k7 O4 c
What’s state of port security by default in a switch.+ G3 l3 l& R1 |7 M, s+ U/ F
Answer: Disabled! I! q8 J+ z. K7 e5 q! G. }% t
Question12:
; g& A; f+ \4 h8 G' v+ M! {4 uExhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that duplicate with virtual ip address): j7 x# \9 q# }4 S; l [7 x
a) misconfigure; t" y1 S2 G' z3 {% n3 T8 E
b) PC’s IP address
: h# {0 t ]: V+ F Dc) STP Loop (This should be answer)
- {( c2 j0 I( P N8 y* K+ R6 {: ?( S/ sd) can’t remember" R1 s. y0 G# Q9 `- l/ z4 F4 M
Answer:C. ]. G# @+ F( F# G2 U, l2 I
Question13:- L# a+ H3 a" n8 S' ]
Where does a subordinate switch in a stack store the information about VLANS?8 w, v+ A- I; C3 y0 \
answer : vlan.dat4 s& D6 p* p( p2 p, o' u% P8 J4 R
Question14:
. z' {3 k/ c+ w8 YOne site is “active” on port channel what other side can you configure? Choose two.
4 f3 A- }2 h. ^A) Active **+ ]3 P* k$ x" ^ N
B) Passive **7 b/ H$ p% Z, A6 u
C) Auto
8 U3 y' x8 Q6 ?* t4 cD) Desirable9 ]5 c8 D# c( i
Answer:A,B:Active, passive
! O" Q" u+ i# G# I9 @- T0 [: y, Y; MQuestion15:
( L( H) _- i3 A* l8 P& `" D$ o5 UWhich two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration (Choose two):
2 \) W3 a+ M8 D* K2 zA) The switchport that is configured for VLAN 50 is the primary connection to the spanning-tree root switch
) m0 c# p3 p2 \+ L0 bB)The primary value for VLAN 50 is set to 4094 on the root while the local switch priority is set to 32768: ~) e7 S. M+ g8 Q7 @1 |. N
C) All ports that are configured on the current switch with VLAN 50 transition to designated ports! `$ s! Q3 m$ x# h2 o
D) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value
& q& h: K% Y! E( ?E) The spanning-tree timers are reduced to improve the convergences time for Vlan 50$ ~/ ~; l2 L) H2 U R8 l& ~
Answer :C,D
. H0 F% |+ ^4 L. t– C) All ports that are configured on the current switch with VLAN 50 transition to designated ports (because Root switch has only designated ports)/ p7 I. u8 Y2 t6 K1 C, _' F ]- H
– D) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value8 S6 B/ v5 y8 ^- V
1 q v! H9 B3 o# z2 r
. a t: H9 R2 R/ E$ X1 X# K5 @; H4 c: ^' o
# F9 W [% [( o3 s" b
/ \, Y& }$ ?* l( R( Z6 U |
|