设为首页收藏本站language 语言切换
查看: 6203|回复: 53
收起左侧

CCIE笔试400-101新题

[复制链接]
 成长值: 64645
发表于 2016-2-26 10:37:37 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2016-2-26 11:02 编辑
% ^* H9 t* U: d
# z  r5 }9 X6 X- @% Z) \3 I6 N9 i据说新题库题目数量已经接近900Q,宝宝们有没有被吓到
+ z  z0 G) I; M" r7 z, d
- {/ _: u: Q& i; `% P- S# Q QQ截图20160226103750.jpg
* J6 }: m5 }. K; I4 D8 }3 |- ~2 ~8 t, I5 N5 N
' N; x2 s/ x: \: J6 {
, y4 a- |* o0 h; |( `
QQ截图20160226103758.jpg
! S$ m, C! F% P8 x$ w

Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable?

A.    6rd tunneling6 g; C. E8 @* U- ?, l0 r
B.    automatic 6to4 tunneling
( V2 r8 v5 [8 g; }C.    NAT-PT tunneling
( G5 T& f' ~4 DD.    ISATAP tunneling1 b! o% @3 d0 o; v! W5 o
E.    manual ipv6ip tunneling0 e8 |6 @+ ]9 r. P! P1 c; j# K
F.    automatic 4to6 tunneling

Answer: A

QUESTION
- }; E) F) Z3 B* U7 c* ~. k6 }Which two discovery mechanism does LDP support? (Choose two.)

A.    strict1 p5 w. T/ @/ x8 c5 A
B.    extended: i. m! M$ I" Q: u+ U# k! N" O
C.    loose% n! L3 r/ v2 k) o- w) Q( k
D.    targeted% c& X. r9 M( v& ?7 S
E.    basic

Answer: BE

QUESTION
( H6 M3 I9 h: ROn a network using RIPng, the prefix field of a routing table entry has a value of 0:0:0:0:0:0:0:0. What does this value signify?

A.    The next hop address is unknown.
7 c3 A% @7 L# R+ U1 zB.    The next hop address is a site-local address./ F, J2 x: a0 H7 b/ M
C.    The neighboring router has IPv6 ND disabled.+ E0 G  ~* [/ f
D.    The next hop address must be the originator of the route advertisement.2 `1 E* K' L& K2 D4 w, T( ]
E.    The associated route follows a default route out of the network.

Answer: E

QUESTION
' {" q5 J: J# VWhich AS_PATH attribute can you use to prevent loops when implementing BGP confederations?

A.    AS_CONFED_SET2 l, a, y0 J( d% |
B.    AS_SEQUENCE
$ }; ]" F6 _$ Y$ |9 [% v4 q' }6 DC.    AS_CONFED_SEQUENCE* o  e$ J* o9 a8 W% L3 v
D.    AS_SET

Answer: C

QUESTION
2 k( |. N- f* Q& ?; ?Which two statements about OSPF are true? (Choose two.)

A.    External type 2 routes are preferred over interarea routes.
. |! [: V' ~0 Y4 W# HB.    Intra-area routes are preferred over interarea routes.
" K: E1 U% t- |) a5 [8 hC.    External type 1 routes are preferred over external type 2 routes.
* i0 h+ R: f2 WD.    External type 1 routes are preferred over intra-area routes.
9 i' \& m: }/ TE.    External type 2 routes are preferred over external type 1 routes.

Answer: BC

QUESTION/ o6 i. e: z6 p9 _; b0 c
Which two statements about the OSPF two-way neighbor state are true? (Choose two.)

A.    Each neighbor receives its own router ID in a hello packet from the other neighbor.
+ E5 N1 @' E5 e5 k+ P( p/ UB.    Each neighbor receives a hello message from the other neighbor.
. J% X$ Q; F: X) a: @C.    It is valid only on NBMA networks.! M6 N. x) y' S3 d* A
D.    It is valid only on point-to-point networks.2 X% g6 F6 P+ H) Z/ z, m2 v
E.    Each neighbor receives an acknowledgement of its own hello packet from the other neighbor.' C. I8 U- Q! M) ~
F.    Each neighbor receives the router ID of the other neighbor in a hello packet from the other neighbor.

Answer: AE

QUESTION) `. o% S& H+ P. r/ Q- x  q9 k
Which two statements about device access control are true? (Choose two.)

A.    The AUX port is displayed as type tty in the output of the show line command.
& }7 E& J( N0 t/ D+ G; j, _' h& R# BB.    VTY lines are associated with physical interfaces on a network device.% d9 `- J8 I2 j* I
C.    MPP restricts device-management access to interfaces that are configured under the control plane host configuration.
1 S) O' [' Z6 m4 J8 X* tD.    The enable password command sets an MD5 one-way encrypted password.( ?( Q0 {! h9 N+ X. E
E.    The console port supports hardware flow control

Answer: CE

QUESTION
; j: w3 a0 S7 d' M! A. LIn the DiffServ model, which class represents the highest priority with the lowest drop probability? (*)

A.    AF13
( J$ Y4 D" j- Y2 [& q" B) RB.    AF43
. y: E& O2 p3 W( PC.    AF11& [0 V5 m" Q8 S
D.    AF41

Answer: D

QUESTION* @* o1 R! O3 @
Which two methods can you use to limit the range for EIGRP queries? (Choose two.)

A.    Use an access list to deny the multicast address 224.0.0.1 outbound from select EIGRP neighbor and permit everything else.
# {4 D) B1 n/ C5 W1 s$ ~B.    Configure route tagging for all EIGRP routes.
, i; j2 S+ P- C2 sC.    Summarize routes at the boundary routers of the EIGRP domain.% {, \1 v; L0 S
D.    Configure unicast EIGRP on all routers in the EIGRP domain.- m+ V9 b) B  T
E.    Configure stub routers in the EIGRP domain.
: m. x0 E- g9 {* E! ?- LF.    Use an access list to deny the multicast address 224.0.0.10 outbound from select EIGRP neighbors and permit everything else.

Answer: CE

QUESTION! u8 p# h. c& E  }& h/ a; c8 S
Which two best practices does Cisco recommend to migrate a network from PVST+ to MST? (Choose two.)

A.    Start the migration at the edge nodes and work toward the root bridge.
9 D. n9 Q/ y! ~; k/ RB.    Before starting the transition, configure one of the edge nodes with a lower priority so that it becomes the root bridge after the transition.
7 t& \9 D* C7 ~9 d& ?& ?2 QC.    Before starting the transition, ensure that at least two nodes act as the root bridge for all VLANs in the network.; ^# }. B; {3 E" X
D.    Start the migration at the root bridge and work toward the edge nodes.1 R1 ?; l5 c4 b2 f" c# z# M+ @
E.    Before starting the transition, configure one of the edge nodes with a higher priority so that it becomes the root bridge after the transition.
/ t$ x1 }: z( D* `/ X; h+ y9 AF.    Before starting the transition, ensure that one node is the root bridge for all VLANs in the network.

Answer: AF

QUESTION
# ^+ x8 n. m, y) L* q( |& hRefer to the exhibit. Which two statements about this egress queue are true? (Choose two.)
- b& a. X! p4 N; C( y: SA.    The queue 3 buffer is allocated 20 percent, its drop threshold is 100 percent, and it is guaranteed 400 percent of memory.* L( A" O  w. I0 G& q
B.    The queue 1 buffer is allocated 30 percent, its drop threshold is 25 percent, and it is guaranteed 100 percent of memory., q$ _' h' ~& ~9 b- x
C.    The queue 1 buffer is allocated 30 percent, its drop threshold is 100 percent, and it is guaranteed 150 percent of memory.3 y# o4 z  k% R, k" E
D.    The queue 2 buffer is allocated 30 percent, its drop threshold is 200 percent, and it can use at maximum 400 percent of memory.5 R, ?9 V; K' H+ k
E.    The queue 3 buffer is allocated 30 percent, its drop threshold is 100 percent, and it can use at maximum 400 percent of memory.

Answer: BD

QUESTION9 [; `2 O( y! y. K
Which two statements about the function of PIM designated router are true? (Choose two.)

A.    It registers directly connected source to the PIM rendezvous point.
4 r+ R* `$ Y  E; t1 r0 ^B.    It sends PIM asserts on the interface of the outgoing interface list.  N, ^5 Y5 _3 I. B( D; n
C.    It sends PIM Join/Prune messages for directly connected receivers.+ p  N9 }$ I* J' c
D.    It forwards multicast traffic from the source into the PIM network.0 Q! p  T: }9 g7 V
E.    It sends IGMP queries.

Answer: AC


0 b  j) d) ?- k
, {* ^1 u+ A! l8 w6 k
发表于 2016-2-26 13:26:57 | 显示全部楼层
不是吧, 吓死宝宝了
7# 2016-2-26 13:26:57 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-2-26 14:24:48 | 显示全部楼层
我去,咋这么背撒~~~~什么时候出来新题库啊
8# 2016-2-26 14:24:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-2-26 15:14:29 | 显示全部楼层
不是吧, 太恐怖 了
10# 2016-2-26 15:14:29 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-2-27 09:56:34 | 显示全部楼层
吓死宝宝了
13# 2016-2-27 09:56:34 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-2-27 10:02:30 | 显示全部楼层
不是吧  那么多  
14# 2016-2-27 10:02:30 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-2-27 10:30:23 | 显示全部楼层
跪了~怎么差这么多呢?
15# 2016-2-27 10:30:23 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-26 12:41 , Processed in 0.264115 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表