- 积分
- 430
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|

楼主 |
发表于 2017-3-24 14:27:14
|
显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑 i h1 m# S$ j+ ]+ l2 b# ~
! z, h/ z$ H( Q7 k% x1 a- \
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
' h/ ?9 `! t! U' D4 I. B5 O. i: qA. ACL analysis tool in APIC-EM# J, q( z. ~; o1 |
B. ACL path analysis tool in APIC-EM
3 u( D1 Z; E: x- o6 u% M7 X- HC. APIC-EM automation Schedular K s5 ^6 j; f ~
D. iWAN application' M) }1 C) R! A! s% T, c( {7 q
=> ANSWER: B
: G: D4 M, Y/ T z4 x: z4 f答案沒變
! }# k4 Y" H: U" r. _以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)6 \# H; k: |, P; ^, W- r% G5 l
Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?1 l- O; ~) [4 L" v# `" z& P2 q) q: u
A. it discards the packet+ J) T1 i x- d# D
B. it broadcasts the packet to each network on the router
9 }! l7 }, G- E0 ]6 H1 ]5 M; a5 P6 c# ^C. it routes the packet to the default route
& f) j0 P' K3 mD. it broadcasts the packet to each interface on the router( T9 s6 @/ E# T
=> ANSWER: A; }- R' h, z- c$ G- F
+ s, j3 O: _* P8 e/ C2 O. U. u5 ?Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)+ O4 i9 K8 A) P- g/ V# O4 a
A. It automates network actions between different device types
9 w- P# l4 B$ d- b; |B. It provides robust asset management; Q5 \+ l3 {# k3 a* O
C. It tracks license usage and Cisco IOS versions1 z" ?, [+ E; J/ i
D. It automates network actions between legacy equipment
6 R% Q2 X9 k. |2 Q. y) u5 k9 NE. It makes network functions programmable
7 Y/ H: q0 d' D# e X8 o M=> ANSWER: A,E" s+ g: Q8 H0 |# C" D# O# |0 f% [
# m& F2 S# X) x* ~Q28 Which three options are types of Layer 2 network attack? (Choose three)' }& p3 s/ w, l7 t4 r
A. ARP attacks
* i1 R" m! m/ s8 t- YB. brute force attacks
3 @$ N* @" v! R4 K5 U- ~1 |C. spoofing attacks3 H2 G1 ]5 l2 k n7 T3 V
D. DDOS attacks. W1 d. z( }$ _& d/ `# } o! T3 }
E. VLAN hopping d. D, u3 G4 j, n# H4 T7 J% |
F. botnet attacks$ d# q6 Y" v% ]# D3 g
=> ANSWER: A,C,E
- R- x9 |7 ]8 O, k( E4 [8 t- r& M. e1 ?) i" v1 ], c
Q29 You are working in a data center environment and are assigned the address range
2 F, G' g' x+ \3 ^4 Z2 ~ L10.188.31.0/23. You are asked to
5 @/ l- b/ q: b1 D" \develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts7 H# R3 N3 D- [ p9 p: N
each. Which IP
1 G) J6 W7 g. i5 Vaddress range meets these requirements?
$ j5 a. y5 Q L9 e* D; yA. 10.188.31.0/26) e/ ` X% q3 y3 @# e- D3 A
B. 10.188.31.0/25+ o! Y1 Z9 M: E! I9 K, H8 L
C. 10.188.31.0/28
- @: D" ~& A6 }) nD. 10.188.31.0/27/ L- x4 l( m0 b5 X* m9 x
E. 10.188.31.0/293 o. W h; W4 N- I* K* E
=> ANSWER: D
- O$ c- F$ A: g$ p8 C, r
* f+ Y6 s9 ^& ?: ~$ T1 F( C. iQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?$ W( d. w4 s$ S& x; h
A. 8
$ T: t2 _# f$ O2 o1 A6 W" `B. 2; ?& ]/ q* }. W2 ?! a/ ]8 u) j, I* A
C. 16 u7 ?$ g9 @4 c% n% ?6 c! J
D. 0
- M. w4 s: `4 h g$ t' |' p, @; [=> ANSWER: C
* c. \& A; r1 H) R. e0 E, k8 _* w$ J6 l( Z0 B
Q31 Which two statements about unique local IPv6 addresses are true?4 o, s9 j: V# t7 v. S) |' O
A. They are identical to IPv4 private addresses5 L* h, ^6 [$ ^$ Y- }; H5 Q" r
B. They are defined by RFC 1884
/ S: C/ Q4 d5 l' G; j; XC. They use the prefix FEC0::/10
% z) ^. I! H3 a$ O! k. [ iD. They use the prefix FC00::/7
, \9 A! _# C- pE. They can be routed on the IPv6 global internet3 m/ ]7 e U. }7 \
=> ANSWER: A,D
# ]: H6 F* _' F* [4 b( @& ?. P& p) N# u# t
Q32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
( h/ I" f9 L1 B8 uA. PortFast on the interface, x4 e1 v- B2 Y* a5 t3 [$ M
B. the interface as an access port to allow the voice VLAN ID
3 |& J. B$ Y0 P6 Q5 e2 |: xC. a voice VLAN ID in interface and global configuration mode' Z: X2 p6 O- l& W
D. Cisco Discovery Protocol in global configuration mode' {' z( K3 a+ E) b9 C
=> ANSWER: B% f& i$ B# d' q
, O# C9 ~( y: w8 }: S7 d' m6 J
Q33 Which identification number is valid for an extended ACL?. T+ c7 q7 ^6 f" r
A. 1
1 t% N% @/ l9 U; M% O2 ~2 h5 [5 CB. 64
3 u% e. ~7 Z$ t, i. D8 y2 YC. 99
1 b+ D( n& t) ^) C4 ?$ q" xD. 100
4 Z7 k- e4 @3 TE. 299
1 K$ o; ?! C9 V; ?8 J& e=> ANSWER: D
7 `* I. M2 }% @, N
/ U e5 Y4 i& Q3 N3 `# C9 z$ Q) ]' zQ34 Refer to the exhibit6 |/ v- l0 A0 W" o: b# U1 I
3 @ I4 U8 R1 v6 m2 pAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action6 J5 `! ^# G1 U* |6 l# R
can you take to
8 Z t3 G7 m% E( @ v3 Mcorrect the problem?
1 c# _8 N) [- hA. Configure a loopback interface on R16 J. z" w$ }0 M% X- ^7 e* L( x
B. Enable IPv6 unicast routing on R1' |: k' }5 H4 c+ [3 z# X! e
C. Configure an IPv4 address on interface F0/05 o0 [# P2 Y! D9 |
D. Configure an autonomous system number on OSPF7 n( {. A; s$ s( l9 E1 M' |% B
=> ANSWER: C: [+ {7 o. s3 t7 t9 G
& Y! T7 @8 T0 I' g! X5 EQ35 Which statement about static routes is true?2 ]5 o: n$ p8 `7 U0 n
A. The source interface can be configured to make routing decisions8 L$ ~6 j4 Q% K ^; f. i; T
B. A subnet mask is entered for the next-hop address
5 U- x8 i. _9 H1 g4 i4 IC. The subnet mask is 255.255 255.0 by default
4 w \* I1 n# M1 k- j3 r2 kD. The exit interface can be specified to indicate where the packets will be routed- N5 ]1 F; D" X) c' _/ w& m9 o7 m+ O
=> ANSWER: D R% n( G, {; D' a, c. K/ c
|
|