- 积分
- 132
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
QUESTION 1; t8 M0 \: {9 G9 n( T0 \" n# p( ]
The following commands are issued on a Cisco Router:) u2 ?7 f" v! ]5 X* q! _( F" l: [- M
Router(configuration)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1
. Q& H3 |; c$ R$ _: a, zRouter(configuration)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1, U1 f! D$ @, l& ]
Router(configuration)#exit6 Q) e3 F: F9 f1 D% q: p& W
Router#debug ip packet 1991 a+ L, R i1 P; B
What will the debug output on the console show?' ^' H: V2 |, F) J. o
A. All IP packets passing through the router
1 a* ~* s4 ^2 i: a4 s9 G$ L8 N& SB. Only IP packets with the source address of 10.1.1.1
3 M. R, ^2 _8 z+ C0 J& }- J- CC. All IP packets from 10.1.1.1 to 172.16.1.1
9 {. D4 Y+ ~: g8 C9 o( u# M2 @D. All IP Packets between 10.1.1.1 and 172.16.1.1
1 b7 m4 F; ?" u4 V tCorrect Answer: D0 B0 c; C5 f: M, V9 Q5 u
Section: Mix Questions
2 k% W/ V8 ~! i. ?) f( C( \Explanation5 i0 a3 e1 f& T4 u
Explanation/Reference:4 j5 D3 e: _! U3 v; m* y
In this example, the “debug ip packet” command is tied to access list 199, specifying which IP packets% v; \/ p% K8 G' ]2 I
should be debugged. Access list 199 contains two lines, one going from the host with IP address 10.1.1.1 to9 A0 J H9 K8 u5 y! V* U% G
172.16.1.1 and the other specifying all TCP packets from host 172.16.1.1 to 10.1.1.1.
5 {, A1 x1 h! E' D5 oImproved7 W( P. O- g1 I9 o! \
$ z) F( w7 \# i5 Y; w
QUESTION 2
& ^ n: a! h; @* k1 O$ A, xWhat level of logging is enabled on a Router where the following logs are seen?
; [6 H! K: l: t8 B%LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
/ F& s% ` F% y/ l% [7 @( J( Z8 a/ K, X%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up' _: g0 O' U5 l7 c& G' J# G% ?
A. alerts
2 c' l1 g9 D: \$ t" }+ w3 NB. critical
3 y' w5 I1 q1 H4 f8 }/ s# KC. errors
2 E" p& b- U; i) b, oD. notifications
& F3 Q" G6 Y9 SCorrect Answer: D
6 ~ |- ?$ g4 p- M" d! ESection: Mix Questions
5 K+ h$ l! i9 W! U6 A( o+ a# nExplanation
7 Y; c# d5 e6 L1 K; XExplanation/Reference:
1 G" J2 u! Y4 y9 ICisco routers, switches, PIX and ASA firewalls prioritize log messages into 8 levels (0-7), as shown below:
. j% A5 h7 D# B* ^LevelLevel NameDescription
7 j4 i* z: e. g# Z u0 Emergencies System is unusable' r9 ]$ b& O% B M9 [
1 Alerts Immediate action needed& x1 m/ c' m, ^7 `! ]
2 Critical Critical conditions* a% G) d- D( x; S8 S9 ^8 X
3 Errors Error conditions
: t7 B' @5 \5 p# R. h9 a4 Warnings Warning conditions
% D( M' I8 _7 c# v# I5 Notifications Informational messages
/ w# s F# @6 g4 A; m6 Informational Normal but significant conditions( ~% c4 U6 d; O& @$ I5 G) X% B
7 Debugging Debugging messages* ^+ B1 g* p* W& g1 H/ M6 G
When you enable logging for a specific level, all logs of that severity and greater (numerically less) will be
; C) P9 Q9 y( E; Z' _3 W t9 I; k& glogged. In this case we can see that logging level of 3 (as seen by the 3 in “LINK-3-UPDOWN”) and level 5- s Q, j2 t4 [9 B) f
(as seen by the 5 in “LINEPROTO-5-UPDOWN”) are shown, which means that logging level 5 must have
h" M0 m! m- m& [9 ~been configured. As shown by the table, logging level 5 is Notifications.! \1 I$ y z. ^7 A
Explanation Added.
: |8 F# \ H8 z, E8 p. g3 Q. B. Y+ A) U6 H6 O
QUESTION 3
' \. I- c+ o& s3 ^4 G! yYou have the followings commands on your Cisco Router:
) ? L0 f" p% g+ u3 B' q) Jip ftp username admin
# Y& }6 V! B/ Q' D8 j1 i; z1 N4 Hip ftp password backup
7 N1 s0 L. U7 @7 j% C( }You have been asked to switch from FTP to HTTP. Which two commands will you use to replace the( O; F9 K( p# W; F
existing commands?( h3 p4 D% T) }" V( ^
A. ip http username admin; d. x( h1 U& ~( S
B. ip http client username admin( e" w4 H) a) H
C. ip http password backup
- {- R, F( M( O' \+ ] y. zD. ip http client password backup
' X0 K" r3 Z+ e6 C) X; C# zCorrect Answer: BD9 ~. a' M+ Y* E- r
Section: Mix Questions
6 D C+ i; i/ H6 z0 B% tExplanation
& B3 h9 b h5 A" I/ H8 x5 IExplanation/Reference:
" _- v7 w6 w( a2 f! Z X- PConfiguring the HTTP Client
9 g0 X' W! R( B* V W( xPerform this task to enable the HTTP client and configure optional client characteristics.
2 U; }# ]( P7 }/ F7 a9 o5 k0 WThe standard HTTP 1.1 client and the secure HTTP client are always enabled. No commands exist to" k8 B7 c( N4 k$ J" C
disable the HTTP client. For information about configuring optional characteristics for the HTTPS client, see+ f% b; U. s6 G( b% V
the HTTPS-HTTP Server and Client with SSL 3.0, Release 12.2(15)T, feature module.
0 T0 A2 [5 z/ Q$ z+ ~) ASUMMARY STEPS$ F' Y+ \/ W5 P5 ^2 F$ a* n2 ]
1. enable
: B0 q0 S" V; v E2. configure terminal
: |* Z, f2 Q3 Z& S3. ip http client cache {ager interval minutes | memory {file file-size-limit | pool pool-size-limit}; X. g9 V T$ h6 {
4. ip http client connection {forceclose | idle timeout seconds | retry count | timeout seconds}, \( H; _. ^7 ~: N9 H/ B$ t! B" e+ l
5. ip http client password password( E9 \- K& @9 X0 ]$ j V
6. ip http client proxy-server proxy-name proxy-port port-number
, x4 N, N, ^3 r% I3 X9 [$ h7. ip http client response timeout seconds
# g; k/ h3 Q ~4 g: c8. ip http client source-interface type number* B% L1 C4 a4 w
9. ip http client username username3 N8 N* A+ F% n
References:
# ]- E8 V! B1 `0 H% q+ r I0 w( v2 Q( N) A
QUESTION 49 ?- `6 }( g1 g* J$ x* _2 j- w9 Q
Which two of the following options are categories of Network Maintenance tasks?2 h( ^8 f4 W2 \, @! o3 d
A. Firefighting, ~& {/ E! }% a7 B
B. Interrupt-driven6 ^5 W' h* w$ T [7 X
C. Policy-based
9 q- B! j) r: Y; pD. Structured, m1 x7 r4 M' c3 S& i
Correct Answer: BD" |6 E2 J+ O v
Section: Mix Questions
3 p; m0 z7 o1 H0 DExplanation
6 u5 h- P1 F9 M# L& H- PExplanation/Reference:
2 Q9 s5 L4 R; w) ]" LProactive Versus Reactive Network Maintenance:
* E+ ~+ T! D1 ]$ W3 b) I0 q: X5 j. s$ NNetwork maintenance tasks can be categorized as one of the following:
3 g! O- K, y5 K+ s Structured tasks: Performed as a predefined plan.! {! T/ e7 O% D$ I) [
Interrupt-driven tasks: Involve resolving issues as they are reported.
) i9 k4 i+ |+ K5 z- p5 r+ aReferences:
" Q5 {3 M; n1 s. U: h$ s9 w/ p0 U# a2 R/ g9 S" r+ g; W* J
QUESTION 5
! f1 J p6 f! l9 b% ]You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol status
3 N$ P7 _" c$ r, N* l" N/ F% x% I& rfor the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors.
! C t5 [; i# P( M: a+ v; zWhich layer of the OSI model does the problem most likely exist?; ]; i: c0 Y2 k: d7 f4 C" k
A. Physical/ l& q1 J% d) U( _ R8 W
B. Session
! c$ W1 |4 a8 J; \; x: j' U9 }C. Application& A9 o& t- M7 r
D. Data-Link
" i, O S+ Z+ d hCorrect Answer: D+ {* h6 `4 {$ X
Section: Mix Questions' O" r: @( j* X' q- z8 q! k
Explanation1 T1 v2 `4 i, x- E
Explanation/Reference:+ ?8 I9 u4 n& L" G7 r9 b# K0 ?+ h
CDP is a protocol that runs over Layer 2 (the data link layer) on all Cisco routers, bridges, access servers,
+ ~" [8 g, y' c! b! ~" ^' Q7 xand switches. CDP allows network management applications to discover Cisco devices that are neighbors: B! p9 n1 c. {; q+ k$ V6 `( e' ?0 y
of already known devices, in particular, neighbors running lower-layer, transparent protocols. With CDP,2 f1 t3 J! K" W5 s# D R1 [
network management applications can learn the device type and the SNMP agent address of neighboring
. }. H# Y m& n& H/ i5 B) W5 mdevices. This feature enables applications to send SNMP queries to neighboring devices. In this case, the
* V& H y; S( U) [ e0 oline protocol is up which means that the physical layer is operational (layer 1) but the data link layer is not.
( C4 o3 G+ @3 v, ~* n) {5 m0 a2 l- O8 iReferences:& r# R; w* o S( H, ]4 @9 d
$ Y+ k/ T- L, z7 p) P5 B7 O
QUESTION 6! }& D% [- @% a+ m: N9 w, _) J7 n
Refer to the shown below.
7 E; x f/ v$ d/ n7 s%LINK-3-UPDOWN: Interface Serial0/0, changed state to up
. W' x/ {% A! L! Q5 G6 C& u4 z%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up9 w6 Y4 Q4 U1 ?7 n8 N" e
What statement is correct regarding the output shown in the graphic?7 K/ c0 P& [; ^5 s( _
A. These two log messages will not have a severity level. They are not errors but are just informational
. ?* \ H! K: j7 j3 J( B4 Rmessages.
8 f% Z/ s9 Z3 h; _& ^% BB. The first log message is categorized as a warning message.
5 y! k9 o' G8 e# G* H+ i+ j8 G& F( pC. These messages regarding interface status are normal output and will always be displayed when you8 x: ?! e5 |8 T+ t$ ]# b5 g/ T# e
exit config mode.
1 N3 H6 d4 I* ?2 I5 PD. The first log message is an error message with a severity level of 3.9 |5 I0 |' J: n! _/ k2 k3 H
Correct Answer: D
) g8 C/ U9 }, S9 @8 N8 m" U7 C, `/ x8 NSection: Mix Questions
5 V- P" C4 x8 N9 ?# K5 |Explanation/ {- G' W/ u0 \8 t. ]
Explanation/Reference:
1 K* D- k/ N( U7 rAnswer Corrected8 R6 J' T) o( v$ I, g3 I/ H
% l5 C- F" ?6 g4 y
祝大家好運
9 }1 {' m5 e% }- K1 u5 i! m8 u( s# W% ]0 v0 [; l
|
|