设为首页收藏本站language 语言切换
查看: 11203|回复: 218
收起左侧

[题库发布] CCNP 300-101路由考试新题

  [复制链接]
 成长值: 64955
发表于 2016-10-19 12:15:54 | 显示全部楼层 |阅读模式
What needs to match to allow EIGRP rollover?
3 Q2 t: {. X0 u$ t- l# i# Z-syslog' C/ Y4 A) y. J! S& o9 e
-time
' l/ u7 {4 E# M& y-snmp1 ~/ b2 s; p4 u; X, o
-Password
/ u& @8 p1 R2 r) ^9 z# r7 E/ D5 Q————————————% {& D, {' y" H3 g+ [" S0 ]
Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation) R3 T6 y' T- Z2 w4 m* P6 D/ r: B5 s
? rewriting of higher layer information
; }- u' Q( _: g3 \/ J0 V/ {: e? chacksum verification$ P4 W& o! D  V6 V0 l
? ipv6 duplication and conservation
4 y3 ?6 u# x' T- ~0 K? IPSEC AH header modification( x% H: e+ e/ a5 F# n( N7 E3 Z
———————————————-, C  T0 ~* c! F* Z( A4 K
Which two options are causes of out-of-order packets? (Choose two.)
, m* {& c$ b5 uA. a routing loop1 y$ ]+ ]5 l; N: J  u6 }7 i2 M
B. a router in the packet flow path that is intermittently dropping packets' l  x: D0 D0 B: h5 ~
C. high latency
* U+ r0 P: U7 q" @D. packets in a flow traversing multiple paths through the network# {5 r9 n2 c% v* B- H
E. some packets in a flow being process-switched and others being interrupt-switched on a transit Router+ }. G  m+ C- C$ [5 T& I
——————————————————————————————————————
, a, Y+ H1 W2 b! \+ m- J) u# m0 g2 |How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?
, i$ A( N9 {8 r- @) B3 u3 I& p: pA. Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface.% U  ]" }, Z- k5 b8 e
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
* }' r  K7 L/ }C. Configure many subinterfaces in the same subnet.
: F) \$ {: ^/ w. g" [6 K$ wD. Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.
+ k8 F& z' G" C- R" E( @/ lE. Disable split horizon. m7 O( f  M" Q. @
———————————————————————————————————————-$ i  u" u0 O0 C& f3 O0 R
Drag and Drop of CHAP process – three way handshake (CHAP) put it in order
. |$ J7 g) ]+ j8 A! U' g1. After the LCP (Link Control Protocol) phase is complete, and CHAP is negotiated between both devices, the authenticator sends a challenge message to the peer.
) A: r$ n+ R" g8 a9 x5 r# _2. The peer responds with a value calculated through a one-way hash function (Message Digest 5 (MD5)).
- p  o6 Q. M/ h+ R: S% q" C3. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is successful. Otherwise, the connection is terminated.  }% P$ X+ l, @  E6 i/ S
Drag and drop (CHAP, its in the comments, very easy, challenge 1st, md5 2nd, terminates 3rd).2 N/ g' z7 E5 A. E# ?
————————————————————————————————————-# J* d7 m; j, Y: n
Your company uses Voice over IP (VoIP). The system sends UDP datagrams containing the voice data between communicating hosts. When areas of the network become busy, some of the datagrams arrive at their destination out of order. What happens when this occurs?4 Y$ m  h" U/ h* \9 i! }9 s
A. UDP will send an ICMP Information request message to the source host.
& s' g$ J+ f- q+ Y) PB. UDP will pass the information in the datagrams up to the next OSI layer in the order in
" S" M# s' `2 y( U6 wwhich they arrive.
' X" L- o+ I9 tC. UDP will drop the datagrams that arrive out of order.
- d3 b6 K5 R9 z  @D. UDP will use the sequence numbers in the datagram headers to reassemble the data into the( G2 R. p5 `7 B7 P
order in which it was transmitted./ k! h( Q% b9 B# s' v1 x7 [+ {7 A3 C3 }
ANS: B
. H/ G% X& \; `" W1 C# V1 ^———————————————————————————————————————-
; M$ ?5 X* H: w: b" d2 m0 bwhich IP SLA blablabla to monitor entreprise class network (chose 3)) {, t  J' [' e
– bandwidth
, L7 o6 [2 K8 q( M7 J6 U6 w' `– delay ***/ V* t' B( v! [# u  j
– reliability
6 B1 |- J6 m. Y; j  I; ]1 _– packet loss ***; d1 t$ |7 u+ w+ ?
– traps+ S2 \: Q! h/ |# Q/ S4 C& _
– connectivity ***# A& j! b- G2 J. G$ O0 U
—————————————————————————-
1 U/ g/ d% E, ^5 NCEF at what layer works7 ]# @6 d" n0 u! Z/ r" x: J
– Layer 3 *
8 f$ {8 Z* D% d( B– Layer 2
$ _5 \6 p2 y* c7 `; R– Layer 4
+ n& n9 R# g/ b% ~; F' w– Layer my ass
—————————————————————————————–
: T; o. R4 T/ SSomething about an administrator wants to know when an IP SLA threshold is reached. (choose two)
, W  X" ~" B' f: K0 \+ W– MOS
4 z' ]5 B/ B% Q1 K! s0 [– Treshold action4 i) M! M% N* v$ \4 b! A+ p
– Cisco EMS6 p) W2 @; N4 S# g9 S
– SNMP traps% w2 C- }& d  d1 J( e' U$ _! s$ g: P
– IOS balblalb
% n2 j7 W2 ~; v  H; n– loggin console
6 G% g6 A6 ^' n6 m——————————————————————————————————–
' Q/ I6 Q) o/ t! tWhat enable secret command tells the os to set encrypted password that you copy from another switch configuration/ N7 ]6 r! J5 K& K/ S0 J# h, b2 S' D
Enable secret 5 $%%^82748273
) R) \" ]$ g: a$ L- r. G3 _) T: G: ^Enable secret 7 $%%^82748273
1 J9 h; B; p" g( _% i$ D! N  xEnable secret $%%^82748273
$ X* v3 {* \6 f& @' W' }Enable secret 0 $%%^82748273! \" L/ Q. H2 b; e+ j) R; |. B
answer: 1
# ?" b- r, a; d% z" y/ Q7 `) R————————————————————————4 C/ d5 M' ^2 z" H7 [) w
Question 29 C) t6 o1 G8 h2 V* e3 A
Which alerts will be seen on the console when running the command: logging console warnings.' A0 u. t0 u, |: p/ C1 E& u4 ]7 Z
A. warnings only
* a- l6 n; K: c" W7 H- FB. warnings, notifications, error, debugging, informational
* B- h6 @$ z) O! d, d8 o0 _6 cC. warnings, errors, critical, alerts, emergencies
! }) U. \# `9 T; L; {8 S" VD. notifications, warnings, errors/ I! h8 E) A$ Q4 r  u9 K4 \7 o1 ^& u
E. warnings, errors, critical, alerts
* B" N& X, X1 kAnswer: C1 M; Z* c$ x1 C* m6 Y3 U2 V( m8 U
——————————————————————————————–4 O3 ^! G5 f, x; f3 J3 q; T
Q. when the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true& `* D; x! Y4 a6 G0 Q, J' J: ?! \
-The router must have a route installed towards the tunnel destination3 ]+ }9 D+ ^& r% H# ?1 C% C( e5 }
-the router must have wccp redirects enabled inbound from the tunnel destination
  j/ w1 M9 O5 x5 g5 N3 x" P3 S, ?-the router must have cisco discovery protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination
3 D! h, a" v/ O-the router must have redirects enabled outbound towards the tunnel destination& m" n* i1 E* b: \5 }  q* I$ ]! @
——————————————————————————————————————-
9 ?; J9 P* U4 ]& UQ. A network engineer receives reports about poor voice quality issues at a remote site. The network engineer does a packet capture and sees ot-of-order packets being delivered. Which option can cause the VOIP quality to suffer?
; P! J# W+ ~1 x$ q! N-traffic over backup redundant links, L: M4 ?+ ?  u4 Z" M1 {
– misconfigured voice vlan. @; R0 k5 c9 J; g, l5 z1 t
– speed duplex link issues- J* E3 D- o% `* n5 S% M
– load balancing over redundant links8 A$ R. j" u" G
———————————————————————————————————–
) S" n- s0 b: D$ j1 n; zQ. Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation?  P6 c9 o  S( `- J; l; D) e
– rewriting of higher layer information
7 r' l: M/ _& C+ q" y. j– chacksum verification
* V" x' T- c( x4 b) Q; r. R– ipv6 duplication and conservation3 X& |* M+ H' n% }1 L2 I9 c
– IPSEC AH header modification8 E% h, R( ?0 ?+ x: O7 d
————————————————————————————-+ Y, R3 Y3 O0 v1 |
q
* B8 W- M% D7 w, `& qAccess-list 1 permit 192.168.1.1- L' a! Z; ]/ C- \. L
access-list 1 deny any0 y. o" N: {7 e+ A
Access-list 2 permit 192.168.1.4
6 y: E$ P7 E' I0 E+ `8 naccess-list 2 deny any) r! o+ i3 f$ F) [4 P2 A
ntp access-group serve 10 X9 K% _( T. Z5 F$ q3 H
ntp master 44 `  w' a" \$ u, T$ D2 z
ntp access-group peer 25 _$ e# P) }2 o& ^$ K
which three ntp features can be deduced on the router?& S# w6 @; N6 \2 M( D% Z
– only accepts time requests from 192.168.1.1; n/ e9 P7 q+ Q) v" X6 d3 }; }% j
– only handle four requests at a time" z2 `7 w, v4 H; a  ?
– only is in stratum 4
2 F8 n6 @$ d$ f! z7 B0 G– only updates its time from 192.168.1.1
9 B) ~* X+ v4 c7 f; B- K5 m# C4 O) n– only accepts time requests from 192.168.1.4
6 B& j" i6 U" Y1 J% a$ a3 s; k– only updates its time from 192.168.1.4. e9 X. X. o3 }& C% w
——————————————————————————————-4 F8 M  N5 t% h/ Y2 ]$ H7 I
Q. when the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true
' L1 d# ^; o7 p' X+ t6 |6 I/ c* s' Bx The router must have a route installed towards the tunnel destination5 k/ b; X- R8 ~. j
-the router must have wccp redirects enabled inbound from the tunnel destination
& e2 l+ B( B" O7 d3 ]. o-the router must have cisco discovery protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination4 l( d0 L/ Q! E5 y% M4 ?8 K0 I: O; R
-the router must have redirects enabled outbound towards the tunnel destination, E/ a" y  C, F$ u2 x4 R* i
————————————————————————————————————————–
: \; E) j+ P( L: w& BWhich easy virtual networking configuration component significantly decreases network configuration?
/ D) F/ @* q* }$ Q% i– Easy Trunk9 d2 J5 A8 M% K/ g+ y
– dot1e" L# {5 N) v! e/ L5 Z
– virtual network trunk
- @' V0 D" V+ A: ?  h– VNET tags& w6 T9 P, G( h8 N& l/ l: O
– MBGP
8 Q  z" t  A' C* b) B————————————————————————————————————-+ S$ b; |1 A+ W# n  ^7 }
Thanks NetworkO. The following question was about CEF adjacencies.
$ m1 \) O) p: |  @/ jCEF at what layer works to find adjacencies! H" N9 u# j; h4 D# R! m
– Layer 3
# k% p* \/ l& n* H– Layer 2
. a( k& I  w3 P  p6 J' B! l' Z9 D– Layer 4
& F4 a: Z* H& E1 b———————————————————————-
9 T) A2 ?7 ~1 N: A; @5 m5 lType message DHCP IPv6, These are the messages with frame ***************
% Q& E$ k! y/ F1 Z0 VSOLICIT
' W% F. W% ]9 ~" jADVERTISE, v+ `- l& n* k, `1 N( a3 u
REQUEST
5 a. B2 ?0 H' C$ O3 TCONFIRM
5 J- D) ^0 L6 @9 r0 y, e, dRENEW. L6 V( o2 y  I# z% {: t' s, q
REBIND
; f2 V! R5 W5 j% B9 \REPLY
& p( s% g* S3 u( s8 z) d+ C% K, e& J" E1 M———————————————————————————-/ d/ g# T4 i6 T. c) V0 V
Q. Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation?7 v* c, D. C8 S* n; w5 F+ h  ]
– rewriting of higher layer information* E0 o* ?8 f& k1 s% z
– chacksum verification6 h4 j! x4 e9 {+ s8 q
– ipv6 duplication and conservation" I1 Y) q- L  n8 P
-IPSEC AH header modification& d- D% T5 |5 `2 E* ?
———————————————————————————————————-
- {* k6 s' D7 Q% |3 LSomething about cef routing loop., Q8 e2 Y: G6 l
Implementing CEF. s. Y/ m+ [. ?, U$ Z! F
Cisco Router loop Express Forwarding
8 P0 f* a4 s, u$ ?high memory8 [* ~3 a' C. O! Q
low memory
5 k( ?4 l% g" U2 EBw high! O' ]0 W2 m6 D( v- l
low Bw
游客,如果您要查看本帖隐藏内容请回复

& ]. P  o, o: R# U
( o7 H. a+ _0 R5 |) ~
发表于 2016-10-19 12:22:43 | 显示全部楼层
你有去考嗎
板凳 2016-10-19 12:22:43 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-10-19 12:33:31 | 显示全部楼层
請問有可以download考古題
6# 2016-10-19 12:33:31 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-10-19 13:41:24 | 显示全部楼层
出來了嗎?2 B, n/ |; c. q3 j  P  M% f3 Z, N2 ~1 Y
超級需要啊啊啊啊啊
10# 2016-10-19 13:41:24 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-10-19 14:47:06 | 显示全部楼层
我需要相关资料
15# 2016-10-19 14:47:06 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-17 03:08 , Processed in 0.285848 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表