成长值: 62785
|
- o2 @" j7 T2 }! G5 T& q- V9 Y根据考生考后回忆题目整理,仅供参考 H7 B* s" w8 V; T
6 r" l; d2 J/ N* x2 g9 A7 h8 E" \ _* J: e6 C1 s7 U8 Q/ V5 ?8 `1 Y
1.What is the VLAN range of VLAN that are eligible for pruning
9 f2 M- W9 d9 h, s8 W2 ?6 sA.2 through 1001
" A2 X' o0 g* L- J2 w% j' W2.Which two statements about GGP loo prevention are true? q$ J- c! {" r# @. }9 l
A. Advertisement from PE routers with peer neighbor SOO configured include a site that is equal to configure value of BGP peering
4 c6 W% W) O! zB.If the configured Site of Origin value of a BGP peering is equal to the site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
' `; i M, L" B( F' T z- {3.Which three types of address-family configurations are support in EIGRP named mode
! K8 ]8 q9 ?) }0 k5 XA.address-family ipv4-unicast
0 ?5 A% z2 l& u- O) a; g: XB.address-family ipv6 unicast
. k2 G8 ^# C3 RC.address-family ipv4 multicast$ `+ z% k4 q: z% x
4.Drag each IPv6 extension header on the left to its corresponding description on the right.
^) X9 A# S' j1 B6 CRouting – Specific the path for a datagram; g& Y% E" J5 v( t
ESP—Carries encrypted data7 R6 @) ~/ G5 g
Fragment—Specific parameters used to split datagrams.3 N, G1 n$ r) y! O3 S l6 D
AH—Carries authentication information
+ c) z |7 y) oDestination—Specific options to be examined only at the final device
+ Y; J+ J6 V" ]$ x j; _Hop-by-Hop—Specific options to be examined by all devices' z% H1 t( I7 \. K5 f9 m
5.Drag each spaning tree feature on the left to the matching statement on the right' J2 R" M; m- Q& [: s7 l
Port fast – Can create loops when configured on a non-host port
% [4 | G* ?4 q+ k* JBPDU guard – Error-disable a port when it receiver an errorneous BPDU. Q1 }9 P# b; B R
Uplink fast – Enable the root port to transition directly from the blocking state to the forwarding state.
2 ~" P/ l* T+ F- @9 s* U' x* GEtherChannel guard – Detects misconfigurations between a switch and a connected device.- C+ o0 {$ z9 E
BPDU filtering—Discard inbound BPDU and prevents the interface from sending outbound BPDUs.1 W+ ~; ]$ k- s! j3 h, c' \
Backbonefast—Starts spaning-tree reconfiguration when it detects an indirect link failure.
% L( v* h& q8 {' m+ F/ o6.Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right1 Y7 t0 K: ^8 y: t+ n6 ~
Universal – sets the load-balancing algorithm to use a source a destination and an ID hash
7 ~) W! {- \& UTunnel –Sets the load-balancing algorithm for environment with a small number of source and destination IP address pairs9 Z% T3 n. r2 u |' n
Include-ports source destination – sets load-balancing algorithm to use Layer 4 information
2 |- `' R6 `7 j/ p1 ?0 e" k+ TOriginal—sets the load-balancing algorithm to use a source and destination hash
" U3 f0 c! k( R% ^: E7.Which two commands enable OSPF graceful shutdown?3 r4 ~5 s9 @* w. Y* l% y: D
A.ip ospf shutdown8 t1 M! T. e( A, U4 o7 Y$ m4 e
B.Shutdown
/ J6 l1 O9 d$ ^1 u6 e7 t2 P8 B8.Which three address family types does EIGRP support?) A% |* D$ y' _6 s( Q$ {& g4 \8 B! q
A.IPv4 unicast
~. C8 E u& e4 _: fB.IPv4 Multicast
+ P6 k2 `. K3 c) [$ l4 V0 @5 bC.IPv6 unicast: B6 Q$ n5 s( n3 X* d5 v! j n( O9 `+ W
9.Which two statements about MLD are true?
+ [) S3 l8 Q$ O( ?0 gA.MLD is a subprotocol of ICMPv6" y2 p: `" k" b' u
BWhen a single link supports multiple interfaces, only one interface is required to send MLD messages
/ j% G2 N0 V7 j9 U10.Which three options are characteristics of a Type 10 LSA?
& `1 i6 R8 U, r8 y6 n6 H* u' D& P: ~A.It is an area-local,opaque LSA1 x5 G' p) N$ I. {
B.Data is flooded to all routers in the LSA scope+ U- C/ n* O; }' R! T; B
C.It is used for traffic-engineering extension to OSPF
( r. N( ]1 g9 f+ P" s: Q9 d11.Which two statements about IBGP multipath are true?7 ]' P0 o7 r; A' W" w
A.The IGP metric of the BGP next hop can be difference from the best-path IGP metric if you configure the router for unequal-cost IBGP multipath
- E0 E$ _2 y# d2 O3 hB.The router BGP process must learn the path from an internal neighbor ^3 @/ D/ A. N
12.Which two options are requirements to implement 6VPE
0 I, E0 p, R# KA.MPLS betwenn Pes# E5 |" a! y1 ]4 w6 [0 {; u
B.MP-BGP VPNv6 exchange
7 x9 j! k) {# W, S3 \4 y3 c! R13.Which three type of traffic are protected when you implement IP sec within an IPv6-in-IPv4 tunnel
- K8 A+ M Z# {" u7 Z- iA.IPV6 link local traffic
0 i+ C1 b2 b7 C- ?, YB.IPv6 multicast traffic
4 M/ M; j# c2 uC.IPv6 unicast traffic
& ~" h: C! |& Y' r5 W7 Z4 ^14. Drag and drop the extend ping command field on the left to its usage on the right
/ h4 e; W: D2 Z2 C' V1 o' x' B; DData pattern– discovering framing issues on serial line- \" \' Q( o/ O, K3 G
Type of service—adjust delay throughput and reliability preferences for the ping
; ]' l- e3 ~* J V+ z# {& Z9 h, ALoose strict record timestamp verbose—configuring the IP header option of the ping( x; I6 A/ U, A" t+ l1 L
Sweep range of sizes –determining the minimum MTU in a path) L5 {, O# p. H1 k8 {: U0 f2 b
15.Which three states about RIPng are true
9 g) }7 F4 X9 M% HA.It supports route tags
: o7 X d0 L3 f. A1 T" g8 z% WB.It sends updates on FF02:9
0 e: g) k% Z( Y! w0 h0 eC.its RTE last byte is 0XFF
) l# f6 L" c/ @7 i7 Z* @16.Which object tracking function tracks the command states of multiple object?. V4 i$ m( n- [, Y7 ^& a1 j
A.List
( u; H+ h# P' O. S6 F0 _17.Which three statement about the difference between Cisco IOS and IOS-XE functionality are true?; d$ J$ K2 S) j8 Q t; s. F% }
A.Only IOS-Xe software can host application outside of the IOS context
% k6 ~6 v& b) \: ~. T/ _$ H* D5 aB.Only the IOS-XE Sercices Plane has multiple cores1 t9 J( K" d+ F" u) p8 x
C.Only the IOS-XE data Plane has multiple cores.$ S2 v: W4 V, l, }8 v+ u
18.Drag each tracerote text character on the left to its meaning on the right7 i1 q$ ]+ |& G4 G
U—The port is Unreachable
; d t4 H7 M K7 \1 B5 o*–The probe time out4 `+ E9 g$ y# M# X5 t
P—The protocol is unreachable+ c. X$ Z) W# I0 a
?—unknow packet type& V* T( ^5 @9 k3 I
Q—The destination is too busy, V P/ w$ z! n9 w
A—Prohibited
], A( j- F( M19.Drag and drop each BGP feature on the left to the corresponding function it performs on the right# N% w6 r/ T4 c
Peer session templates—Apples configuration commands to a group of neighbors0 Y0 r: Z: ]& f8 U( W6 y/ b
BGP Dynamic Updates Peer-Group—Seperates updates from configurations, allowing group! |+ a9 q5 `' r" c! F; K
BGP dynamic neighbors—-Support the configuration of a group of neighbors by defining1 h6 e5 q! P5 @* a8 D1 `6 h! x
Peer policy template—Applies configuration commands to a group of neighbors
" G+ W4 f5 u# \ I; C% SPeer group—Cretes a group of neighbors in the same address family that
" F3 Y% d8 k0 |) `, A! p. \20.Which thress improvement does Cisco IOS XE software offer over trading IOS Software?
; d/ \9 E* }1 q3 u. |A.It can run application as separate processes on multi core CPU8 X+ F. b' q7 f" W* R- |
B.It support drivers for data plane ASIC outside of the operation system
, F$ Z" C- ~- R# MC.It allow platform-dependent code to compiled into a sigle image
( o. G# ~* M9 r( r4 _21.Which two atatement about Metro Ethernet services are true?. _9 T1 ~) u) h, S3 Z
A.EPL is a point-to-point service from one customer site to another across an MPLS backbone% |; J3 s# q" }) ?+ B; j
B EVPL is a multipoint service that emulates a LAN over an MPLS backbone
8 r& a% c0 L- c22.Which two statements about OSPFv3 are true
! y8 G8 i3 n4 o& hA.It supports unicast address families for IPv4 and IPv6
2 b/ g- K$ E) o# e0 p4 g9 L/ O3 M' n, dB.It support only one address family per instance1 t; J* a; V. Q+ B6 ]" C
23.Which two statement about IBGP multipath are true
- [0 {3 i8 ^& h( C( n' H) u, FA.The IGP metric of the BGP next hop can be difference from the best-path IGP metric if you configure the router to unequql-cost IBGP multipath
7 r- Q0 C2 D# v! fB.The router BGP process must learn the path from an internal neighbor% i8 p! h8 G. S
24.When you implement CoPP on your network what is its default action?
- p$ Z& q# s& [/ j$ }' lA.Permit all traffic; D$ E5 }6 u& Y
25.Drag and drop the OSPFv3 LSA type on the left to the functionly it provides on the right% S; h, i, k$ E' \- }2 o
Interarea-prefix LSA for ABRs(Type 3)– advertise an internal network or set of network to routers in other areas
) B% s1 n, A c$ S8 O LIntra-Area-Prefix LSAs(Type 9)—associate a group pf prefixes for transit network or stub networks
! N }, h& w) S4 ?9 |Router LSA (Type 1)—multicast whether the router is part of a virtual link& x# n# n4 H* f. m' F/ c# Q0 n
Network LSA (Type 2)—collects link-state information and cost information for the
4 e1 @8 F& {) c9 m/ L' c GLink LSA (type 8)—-provide the link-local address of a router to other routers on8 j% U: }. Y1 _& ?: _
Autonomous system external LSA (type 5)—redistributes external routes5 F: ^/ |- z V# Q
Interarea-router LSA for ASBRs(type 4)—-enable routers to determine the best path to an external network$ D8 F8 N! a3 Z
26.Drag and drop the router preference on the left to the correct routing sequence
7 T& \" V7 E2 e- U) u! Z- m9 LMost specific prefix3 O0 \2 w/ Z6 x* w, L) y
Directly connected route: k$ E9 q& [1 ]1 }) m) Q' e
Static route
; p! z: h) i6 E7 x% W: qEBGP route
& m. [9 l3 E3 `: [- U27.Which three statement are true about OSPFv37 Z- [4 j2 ?$ k: o$ r
A.Multiple instance of OSPFv3 can be enable on a single link6 R/ |! G. |; Y' q/ ~" F
B.For OSPFv3 to function IPv6 unicast routing must be enable2 K7 f3 ?% Y) {7 h5 o, X0 Q! d! q
C.For OSPFv3 to function IPv6 must be enable on the interface* D) N7 {# `( A
28.Drag and drop the IS-IS component on the left to the function that it performs on the riht
. H& p; Z8 j9 f' H; i7 D: O( v# ^Overload bit—instructs other devices to route around the sending devices until its LSDB is fully converged$ t3 |* q- n( q0 L+ e
IIH—discovers neighboring IS-IS systems
" |7 S% P# L, O& l. y* vTLV—carirred addition data within IS-IS packet/ U" J' }1 A; @# k9 k# |
CNSP—synchronizes the LSDB with an IS-IS domain$ S6 ~. b1 u) [
Attached bits—Indicates to a Level 1 device that the sending devices has reachability to other areas
* M$ @4 F$ c+ U! [) U7 {PNSP—requests retransmission of the lates version of an LSP# V' h8 f) j) u2 l" f7 {9 q# l
" \! p6 _ C9 L3 A) m0 `- I& W7 ~3 d) E+ w# }( L
( b$ ?3 |; R2 b9 @1 k/ }
|
|