- 积分
- 132
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
QUESTION 1 z4 K2 V Q6 C# j
The following commands are issued on a Cisco Router:6 D4 ?; S; e2 O) t; U0 Z8 b9 n
Router(configuration)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1" T8 }6 H3 M7 p/ V
Router(configuration)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.19 q1 ^! v, ~0 j+ r" Q) B" D" |+ H5 S
Router(configuration)#exit
+ e* a( ~) o% zRouter#debug ip packet 199
% D- z' P! R* v* M% t* A* k! Y" NWhat will the debug output on the console show? n1 R) M- Q6 Y
A. All IP packets passing through the router3 z& Q8 Z( Q3 ]0 ~
B. Only IP packets with the source address of 10.1.1.1
1 }' c ~9 v2 UC. All IP packets from 10.1.1.1 to 172.16.1.1
, }9 w. y$ J: b! RD. All IP Packets between 10.1.1.1 and 172.16.1.1! s! |2 [1 F. e8 j6 \
Correct Answer: D! A' }4 O0 V4 S7 Q3 l, _+ L \
Section: Mix Questions
, D9 q$ ?0 b% l" [4 fExplanation" X8 T4 Q1 p+ F S& {" ^' k
Explanation/Reference:
2 r" A C; G5 aIn this example, the “debug ip packet” command is tied to access list 199, specifying which IP packets# k5 j- ]1 l4 ^5 W8 f) U2 q, @5 J
should be debugged. Access list 199 contains two lines, one going from the host with IP address 10.1.1.1 to
' b8 Z" `3 d$ ?4 t$ o- r4 X172.16.1.1 and the other specifying all TCP packets from host 172.16.1.1 to 10.1.1.1.; M# W3 L$ ]- ^2 v& D
Improved j" f- }/ [( a1 r5 C, [
( N, E7 b' P4 N3 v( F( {
QUESTION 2. G; t6 }2 ^) P H; ?
What level of logging is enabled on a Router where the following logs are seen?' i6 u: O- C9 V+ Y9 B
%LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up! Q: f- S( q6 i& B
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up$ s" t7 ?9 H/ `+ N' }
A. alerts
8 A3 D9 e% O: ^0 a/ e/ c8 nB. critical
) i2 M4 \4 Y8 Y7 sC. errors
) v6 g! `. M5 Y2 V0 M7 }D. notifications" C+ S+ ]6 K; K+ J8 o& V% V: G/ ]* ~' i
Correct Answer: D
$ T9 o7 g' a2 HSection: Mix Questions
4 D- e- i6 E' G" _6 N% hExplanation& ~7 H! C* y9 W2 ]& {
Explanation/Reference:# [! O0 ]" H/ N( O2 v
Cisco routers, switches, PIX and ASA firewalls prioritize log messages into 8 levels (0-7), as shown below:3 w8 k. L: J5 \) ~
LevelLevel NameDescription
2 D0 H" y* p, L* C' }% X4 t0 Emergencies System is unusable
3 G' b% k# T1 ^, j9 i, |, }( p1 Alerts Immediate action needed
7 J: T: t- M- g. h# G2 Critical Critical conditions
& l7 t1 f6 y3 r7 p1 {0 d) v3 Errors Error conditions
2 M/ s$ r% s R- i9 S# V4 Warnings Warning conditions9 K# d0 o5 G2 [) g/ ]! C. U
5 Notifications Informational messages. d7 Z ~/ I# v: u" r! b+ [
6 Informational Normal but significant conditions
7 ^6 [) Q1 P, ?5 W3 B6 v7 Debugging Debugging messages
) \) ] l4 y+ {- C9 aWhen you enable logging for a specific level, all logs of that severity and greater (numerically less) will be0 F* ~4 f7 p- i0 x2 L I7 X9 C4 i
logged. In this case we can see that logging level of 3 (as seen by the 3 in “LINK-3-UPDOWN”) and level 5
) L, N8 y3 ?" z* M0 v(as seen by the 5 in “LINEPROTO-5-UPDOWN”) are shown, which means that logging level 5 must have
6 T' N7 K1 q P( y# ]+ ?$ J$ Wbeen configured. As shown by the table, logging level 5 is Notifications.
; }, k; j6 l `& E' UExplanation Added. e v$ W8 z: s4 q6 f7 f' e9 @1 I
+ s! T0 V6 w- c6 T* u& ~
QUESTION 3* z+ k4 L+ f! F2 y1 v2 f; r
You have the followings commands on your Cisco Router:6 k2 d! o& O- k1 W
ip ftp username admin" {; O& Y5 M2 ]" i
ip ftp password backup) d& ]* S4 l$ z( `( S
You have been asked to switch from FTP to HTTP. Which two commands will you use to replace the [: B% I$ S2 c; q: {% J P- {
existing commands?
9 M9 z* n, J) v# f( X y% v; ]/ |. oA. ip http username admin/ k# W- Q+ N8 }
B. ip http client username admin
2 n5 s. w5 @; HC. ip http password backup, }0 r! N4 F6 l& _
D. ip http client password backup: h6 V, b" ?0 k. X r+ X; c. {- o. B
Correct Answer: BD
h1 q6 o2 H5 W4 W1 }) c5 lSection: Mix Questions2 P2 A9 P5 ?' q4 R2 c
Explanation3 ^$ Z2 G b0 o8 v0 R6 h
Explanation/Reference:3 R" _! K8 R! F
Configuring the HTTP Client
5 |* h# i* H4 DPerform this task to enable the HTTP client and configure optional client characteristics.
]4 S+ t3 w) q( fThe standard HTTP 1.1 client and the secure HTTP client are always enabled. No commands exist to3 V; Z6 r. t; L7 J3 ]
disable the HTTP client. For information about configuring optional characteristics for the HTTPS client, see
" ~; v: T2 I. ^& \the HTTPS-HTTP Server and Client with SSL 3.0, Release 12.2(15)T, feature module.
% E" Y6 {4 d0 S8 w: ISUMMARY STEPS
8 X( d, k8 R! Q) Q4 ?1. enable
# H6 _8 T$ p9 n4 J2. configure terminal3 ]3 m- L& n' _
3. ip http client cache {ager interval minutes | memory {file file-size-limit | pool pool-size-limit}9 p5 x X4 Q% p$ V# w( l/ }! D
4. ip http client connection {forceclose | idle timeout seconds | retry count | timeout seconds}
! J" L" s. N/ H; Y# J9 n- {5. ip http client password password
5 K' o V3 D K ^; C8 y# q8 Y9 V6. ip http client proxy-server proxy-name proxy-port port-number
/ ?8 Z! r" ?0 D7 N& I7. ip http client response timeout seconds
" F- I1 A* X, v9 t$ `8. ip http client source-interface type number
; p1 r% C$ u) J& x3 Q9. ip http client username username l) B5 V' z- h* _' I a) U2 v
References:8 b4 l) [7 U6 r9 p
. F6 k# B5 G' C: B! P9 m% n. A& ]/ ~
QUESTION 42 r/ w6 f' D1 _, Q# i+ V$ f+ e. {
Which two of the following options are categories of Network Maintenance tasks?) u. A$ I* T/ |" [
A. Firefighting
; I# ? ?! H% W6 g) }B. Interrupt-driven
7 c" U$ \5 e; ^1 |+ mC. Policy-based
4 ~& C5 A, j8 H# Q% D7 uD. Structured+ y2 s9 n4 D: b5 ?4 w
Correct Answer: BD2 h% |/ S: p& r! E- B3 p7 _( b8 C
Section: Mix Questions
1 C) _) ?9 d3 Y! n+ L$ e8 CExplanation" r, }! Z* Y5 Y% F+ }: Q
Explanation/Reference:
5 J) Z6 u( c- d+ l4 i6 yProactive Versus Reactive Network Maintenance:( S. f' j; T- d# w! ^
Network maintenance tasks can be categorized as one of the following:0 G0 a& p1 R% A( N; y
Structured tasks: Performed as a predefined plan.
3 l6 O1 N, |7 T; p1 ] Interrupt-driven tasks: Involve resolving issues as they are reported.
, Z3 ]) d: l+ l- {References: n) B" w& L) F1 e* w# K7 ~0 s. K7 |
4 x | O/ Y+ W6 f U/ `% _0 F
QUESTION 5$ J% J3 x+ {& w
You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol status
4 p* o0 P4 ?' p% V1 H# X" afor the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors.: [" k( V) y1 B( _
Which layer of the OSI model does the problem most likely exist?% n; o0 B9 Z3 w; |9 Z1 K1 I! M
A. Physical( h8 I! p$ m$ S' f5 R x# |, V; {
B. Session
: F/ e4 }. N$ T v/ KC. Application
; G& d9 T: U! o. w8 UD. Data-Link
/ }$ z- m) X0 e/ G, F- ]6 \Correct Answer: D
6 y1 w) t0 I' ~9 E" hSection: Mix Questions
2 O) D o9 k% N+ ]+ }6 Z3 Z) MExplanation0 e/ W ]7 N1 O# R/ _3 E
Explanation/Reference:2 j) q! p7 i% |2 W9 t
CDP is a protocol that runs over Layer 2 (the data link layer) on all Cisco routers, bridges, access servers,
% f# u6 G9 j U& G4 K, I) z! u: X1 h: Pand switches. CDP allows network management applications to discover Cisco devices that are neighbors ^$ p3 c' C3 c4 h
of already known devices, in particular, neighbors running lower-layer, transparent protocols. With CDP,
$ Z) U/ y: `0 nnetwork management applications can learn the device type and the SNMP agent address of neighboring
) Q8 F. X! L2 x3 A; g# tdevices. This feature enables applications to send SNMP queries to neighboring devices. In this case, the; z- U/ O% K$ q0 C6 e2 k$ C
line protocol is up which means that the physical layer is operational (layer 1) but the data link layer is not.0 x; @, w3 n" {8 D7 n1 L
References:1 d4 R/ n" t8 r
8 |) K1 H6 t0 P" n xQUESTION 6
' Y- a' ~! ~8 }8 q+ V9 M1 ]Refer to the shown below.) n, U6 O. E: K7 W# o! i, Q1 O" G3 v, K
%LINK-3-UPDOWN: Interface Serial0/0, changed state to up0 a; c' G2 {* |7 W- w; e- \
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
5 v1 {3 n* }! ?: J5 H yWhat statement is correct regarding the output shown in the graphic?
/ C- O* ?, Y3 ~3 o |" b; _* WA. These two log messages will not have a severity level. They are not errors but are just informational
' W5 m" R, q* W/ G5 q% dmessages. O# b( ~, u) m
B. The first log message is categorized as a warning message.
) Q. H2 o8 P: xC. These messages regarding interface status are normal output and will always be displayed when you" z2 B* J' y# r8 e% u
exit config mode.
' X' c( D) ]7 s, ]" yD. The first log message is an error message with a severity level of 3.
" `0 n# ?% C V# J A" j9 x* KCorrect Answer: D! c" ?/ Y+ j% i2 F3 w% E, ^
Section: Mix Questions
1 T9 \$ `+ y3 s, RExplanation
; Y0 r! U6 S$ ?4 Z, {( h' `Explanation/Reference:. G/ s+ y- h1 @! y
Answer Corrected: L3 w+ w' c6 t
& R5 S) Y9 }( G, {8 I! h
祝大家好運3 a6 U9 \+ M: X* Z! R3 E( n
+ M& G; _1 L' w5 Y" A6 y |
|