成长值: 65015
|
本帖最后由 小乔 于 2015-12-29 10:34 编辑
1 U2 j* n5 }6 g& m# J
5 P5 m6 q) Y. v9 |# c, W8 ^新题为考生考后回忆,题目不完整仅供参考) M0 O) b8 `0 g1 e( u
( i( u' O! Q/ C/ Y
Question1 rag and Drop Question0 c! s$ I3 I$ T/ W
CDP
; e6 {! _! K% U# R( h– multicast destination address 01-00-0c-cc-cc-cc. P( P8 L, ^, N/ o/ k
– 60 seconds
) R. F3 T+ s* k– compatible with Cisco Discovery Protocol uses IEEE 802.2 and 802.3 encapsulation only.
+ Y% x# ]3 h: i3 c( z! {$ Z7 i6 O3 CLLDP3 l5 y. l: w K, b
– multicast destination address 01-80-C2-00-00-0E //03 r 00' P9 L) x4 Q% b2 K; ^: C- }
– 30 seconds
$ c! \% Y- K# J( w. a– Inform topology change0 H% N# z J; u% z$ ]! `2 \8 y ^- s
Question2:9 V& }2 s- @+ ], U2 w8 a$ R
2. How many table in DHCP snooping database can bindings?! r2 \4 k2 {1 O7 y; j; V, i1 C
A. 1000
! V2 y8 {2 A( b. MB. 20002 \/ T y& u4 p2 z7 d
C. 40009 F* m) {1 j1 X5 |" a
D. 80000 H' a5 l2 Q4 \
Answer: D: 8000 (The DHCP snooping database stores at least 8,000 bindings.)
/ ^& [$ m2 A6 YQuestion3:
0 p) w X" M. b2 k+ BEngineer request to set half of cdp transmission default time
; {$ @2 P- C7 m: F. A9 ?# f* CAnswer : cdp timer 30, p1 L) ^- q0 l0 K" f
Question4:
# M* b9 d a, A' m$ V+ d( r' t. NOn which layer does IP source guard provide filtering to prevent a malicious host from impersonating IP address of legitimate host?
& L7 Z) d/ l- ~9 d$ J1 ]A Layer 1: d5 `, Z( U2 L) J' p
B Layer 2
% z; v8 f2 j: j E' O4 m6 gC Layer 3/ b9 R. l) M4 X% k! P. m$ l& \5 K
D Layer 7- v7 f+ |! t5 W3 B7 L
Answer : B: Layer 2
% E2 L& h8 c/ Q+ K6 n \; p: Q7 ]Question5:
9 q p6 \) Q" r) ^$ J& ?Which feature puts the port into err-disabled state when the port has PortFast enabled and receives BPDUs?
9 f, s+ _- P PA EtherChannel
6 k9 P* c c0 l. W' O6 ?3 C( O+ sB BackboneFast
# V1 j% i( _; QC BPDU guard
- p( r' i. ]% R' LD BPDU filtering
! d) ]$ V: v4 f' z2 [# ^8 ~) oAnswer : C: BPDU guard; T; h: q. D! j$ m7 q
Question6:# n7 I% [# b; E B, @/ d8 ^7 Z% }
When SDM templates are configured, which action must be performed for the configuration to take affect?/ M7 {% u; y; v5 z6 r0 c
A write memory
3 F6 v% j& D2 j" S4 d% ZB shutdown6 a b7 f- x; k2 z+ r( {
C reload
7 F: S# r" k+ W' X) g u8 lD backup config
% t$ }( p+ y! RAnswer : C:reload
9 t F* h4 }7 O+ a' F' s% F UQuestion7:7 S V4 z8 g2 M0 L
Which of the below options is VALID for etherchannel load-balancing?
" h w. J8 ~ d0 D% t$ }& f* wa) source mac , destination ip
: m) _6 v: g: p" _b) source mac , destination mac4 `" G/ D7 W8 B* @: |' j. v& ]
c) source ip , source mac
6 @ D) U+ }& Fd) destination ip , mac ip% Y9 v) x/ d9 E7 K" E: C4 h! G
Answer: B8 R& V/ i5 ?& `. a+ j" }
Question8:
- x6 X+ c; J, U0 Q- xWhich two statements about SPAN source and destination ports during an active session are true (Choose two.)% `2 d0 W0 ]7 c* Z8 r
A the destination port can be destination in multiple SPAN sessions
, `5 M7 O& D# EB The source port can be only an Ethernet physical port' E! ^+ G* {8 g; ?" ?& R
C The destination port does not participate in STP
% M7 K) y/ I X5 f2 {/ Z9 x6 L& f7 N$ JD You can mix individual source ports and source VLANs within a single session
# N1 O2 P0 m: xE The source port can be monitored in multiple SPAN session.% m8 T9 e9 I2 h7 F5 S7 C/ `5 F
Answer:C,E
7 r; q8 R( h) [/ L3 {– c) The destination port does not participate in STP
, A* ~- d$ V3 b! K: H! V! |– e) The source port can be monitored in multiple SPAN session. o$ G4 o1 H8 _; U2 H+ J
Question9:
5 w4 A2 I% T4 Z5 G7 w" n) A" z% yMST Configure on switch (spanning tree mode client)
9 o3 z2 x& c7 b" z7 t3 TAnswer: Configure Manual, same region name, revision number and MST instance VLAN mappings.
( h, y) D# q. R& cQuestion10:+ H5 j9 \/ m6 j2 p
11. What is the max. “stack bidirectional speed”?
( q7 ?: [% X1 hA) 8000
2 @6 l* k" y2 [. {( C) g3 z" `& M ZB) 16000
7 z8 o9 M; a8 ^4 n, BC) 32000 **
7 w; b& }. w! ^' E" M- w' OD) 64000* _1 l; b& W$ L. B. [1 h) V7 l0 K0 |
Answer: C:32Gb
1 V- m6 {, {9 _3 }$ ]+ T% fQuestion11:
& R' [4 Z& m# m5 \1 r; ZWhat’s state of port security by default in a switch.
' p9 A/ w% Y. Z$ tAnswer: Disabled
5 \7 @7 ?! g0 C( f6 r* p1 }8 S1 `Question12:
1 V+ D p" u# c) T7 J$ B7 g/ yExhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that duplicate with virtual ip address)
I5 |' j9 V5 D: U: r! \a) misconfigure
1 I* d1 U( t$ zb) PC’s IP address
+ v9 ~! z- a) Q4 P6 U# q) O, cc) STP Loop (This should be answer)
0 X' e6 P7 e# u0 U, e$ A* Ud) can’t remember; }: I Z! d1 Z2 \) t) f& N
Answer:C
' J( }+ T; P1 m+ vQuestion13:
( Z* ~' e; U! B+ p% lWhere does a subordinate switch in a stack store the information about VLANS?
$ l" a3 A3 O% U" K: D7 Yanswer : vlan.dat5 V; k! H! m/ Y3 e8 G; c& ?3 n
Question14:. N% i0 o; E. I
One site is “active” on port channel what other side can you configure? Choose two.% i2 s9 L' N) M, l
A) Active **4 f+ ]5 R0 n# O' e; ?
B) Passive **' L9 t2 @; ~$ l b) X" q
C) Auto
- s0 l5 Z U3 X. }% s4 L" m% |4 g6 ]D) Desirable( v* S- z+ O7 U3 c2 ?% V1 V
Answer:A,B:Active, passive
3 B1 U' \- K9 iQuestion15:
8 ^* g1 w2 k5 P+ `+ ]Which two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration (Choose two):' w6 i; N" R4 u4 K; w+ k$ x' ]
A) The switchport that is configured for VLAN 50 is the primary connection to the spanning-tree root switch# l5 Y% S* P9 g' V6 t
B)The primary value for VLAN 50 is set to 4094 on the root while the local switch priority is set to 32768
& L* C- G7 X+ W( kC) All ports that are configured on the current switch with VLAN 50 transition to designated ports
* ]+ e& Y9 A$ V6 eD) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value f1 v$ X6 N- B$ x. H1 w* K B
E) The spanning-tree timers are reduced to improve the convergences time for Vlan 50
I. p7 P4 L; O1 @2 }Answer :C,D
# Z* s: ^" }" I1 @7 w- n– C) All ports that are configured on the current switch with VLAN 50 transition to designated ports (because Root switch has only designated ports)+ [8 J8 V) x: T" a# X" R
– D) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value
# D& X% s3 y% T* k8 F. ]& Q) K3 o; v0 ] Q. ^; Q
8 G$ [! C" @: H1 _' R3 w) |
+ S1 ?5 c" C5 W8 @. ?9 W# N8 o, y- f5 a3 @" y7 V+ ?4 [0 w
8 M$ p7 }$ z' F8 J) k( U4 X
|
|