设为首页收藏本站language 语言切换
楼主: qwe4925429
收起左侧

[考试战报] 3/23 台灣 839 PASS

[复制链接]
发表于 2017-3-24 09:58:11 | 显示全部楼层
回复

使用道具 举报

发表于 2017-3-24 10:05:19 来自手机 | 显示全部楼层
你考过没有?
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:45:55 | 显示全部楼层
茗小凯 发表于 2017-3-24 10:05
& c+ e) y* X" w你考过没有?
( W: }7 W4 d/ c/ a' ~
樓主已經在文章Title打839 pass?
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:51:39 | 显示全部楼层
回复

使用道具 举报

发表于 2017-3-24 11:12:41 | 显示全部楼层
谢谢分享
回复

使用道具 举报

发表于 2017-3-24 12:15:57 | 显示全部楼层
恭喜,恭喜
回复

使用道具 举报

发表于 2017-3-24 12:56:18 | 显示全部楼层
回复

使用道具 举报

 楼主| 发表于 2017-3-24 13:39:34 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 15:06 编辑 + O0 E- y7 k$ w% ^4 }  f+ Q
. Z. t3 D9 `- }) l: c/ |: W
Q25 which authentication is supported on MLPPP?(Choose 2)
. S! V! D, q! m- ^) RA. PAP
4 {# M3 r5 f& L9 H5 \* j# _B. CHAP; o* b( h: n. l$ l
C. PEAP
$ |, |9 s0 B3 r4 m8 \. N5 ^2 v- a/ sD. LEAP, }7 n  D$ u: H" O5 W; t# ~
=> ANSWER: A,B1 s4 t5 ]6 E. m( }

# w* b( l" a3 H# V再次聲明 我發的答案並非正確的  沒過別怪我/ o) F4 h1 y; H/ {; v. [
! b% `5 L5 f$ c* S, \& x) [7 [9 }
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-3-24 14:27:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑   i  h1 m# S$ j+ ]+ l2 b# ~
! z, h/ z$ H( Q7 k% x1 a- \
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
' h/ ?9 `! t! U' D4 I. B5 O. i: qA. ACL analysis tool in APIC-EM# J, q( z. ~; o1 |
B. ACL path analysis tool in APIC-EM
3 u( D1 Z; E: x- o6 u% M7 X- HC. APIC-EM automation Schedular  K  s5 ^6 j; f  ~
D. iWAN application' M) }1 C) R! A! s% T, c( {7 q
=> ANSWER: B
: G: D4 M, Y/ T  z4 x: z4 f答案沒變
! }# k4 Y" H: U" r. _以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)6 \# H; k: |, P; ^, W- r% G5 l
Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?1 l- O; ~) [4 L" v# `" z& P2 q) q: u
A. it discards the packet+ J) T1 i  x- d# D
B. it broadcasts the packet to each network on the router
9 }! l7 }, G- E0 ]6 H1 ]5 M; a5 P6 c# ^C. it routes the packet to the default route
& f) j0 P' K3 mD. it broadcasts the packet to each interface on the router( T9 s6 @/ E# T
=> ANSWER: A; }- R' h, z- c$ G- F

+ s, j3 O: _* P8 e/ C2 O. U. u5 ?Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)+ O4 i9 K8 A) P- g/ V# O4 a
A. It automates network actions between different device types
9 w- P# l4 B$ d- b; |B. It provides robust asset management; Q5 \+ l3 {# k3 a* O
C. It tracks license usage and Cisco IOS versions1 z" ?, [+ E; J/ i
D. It automates network actions between legacy equipment
6 R% Q2 X9 k. |2 Q. y) u5 k9 NE. It makes network functions programmable
7 Y/ H: q0 d' D# e  X8 o  M=> ANSWER: A,E" s+ g: Q8 H0 |# C" D# O# |0 f% [

# m& F2 S# X) x* ~Q28 Which three options are types of Layer 2 network attack? (Choose three)' }& p3 s/ w, l7 t4 r
A. ARP attacks
* i1 R" m! m/ s8 t- YB. brute force attacks
3 @$ N* @" v! R4 K5 U- ~1 |C. spoofing attacks3 H2 G1 ]5 l2 k  n7 T3 V
D. DDOS attacks. W1 d. z( }$ _& d/ `# }  o! T3 }
E. VLAN hopping  d. D, u3 G4 j, n# H4 T7 J% |
F. botnet attacks$ d# q6 Y" v% ]# D3 g
=> ANSWER: A,C,E
- R- x9 |7 ]8 O, k( E4 [8 t- r& M. e1 ?) i" v1 ], c
Q29 You are working in a data center environment and are assigned the address range
2 F, G' g' x+ \3 ^4 Z2 ~  L10.188.31.0/23. You are asked to
5 @/ l- b/ q: b1 D" \develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts7 H# R3 N3 D- [  p9 p: N
each. Which IP
1 G) J6 W7 g. i5 Vaddress range meets these requirements?
$ j5 a. y5 Q  L9 e* D; yA. 10.188.31.0/26) e/ `  X% q3 y3 @# e- D3 A
B. 10.188.31.0/25+ o! Y1 Z9 M: E! I9 K, H8 L
C. 10.188.31.0/28
- @: D" ~& A6 }) nD. 10.188.31.0/27/ L- x4 l( m0 b5 X* m9 x
E. 10.188.31.0/293 o. W  h; W4 N- I* K* E
=> ANSWER: D
- O$ c- F$ A: g$ p8 C, r
* f+ Y6 s9 ^& ?: ~$ T1 F( C. iQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?$ W( d. w4 s$ S& x; h
A. 8
$ T: t2 _# f$ O2 o1 A6 W" `B. 2; ?& ]/ q* }. W2 ?! a/ ]8 u) j, I* A
C. 16 u7 ?$ g9 @4 c% n% ?6 c! J
D. 0
- M. w4 s: `4 h  g$ t' |' p, @; [=> ANSWER: C
* c. \& A; r1 H) R. e0 E, k8 _* w$ J6 l( Z0 B
Q31 Which two statements about unique local IPv6 addresses are true?4 o, s9 j: V# t7 v. S) |' O
A. They are identical to IPv4 private addresses5 L* h, ^6 [$ ^$ Y- }; H5 Q" r
B. They are defined by RFC 1884
/ S: C/ Q4 d5 l' G; j; XC. They use the prefix FEC0::/10
% z) ^. I! H3 a$ O! k. [  iD. They use the prefix FC00::/7
, \9 A! _# C- pE. They can be routed on the IPv6 global internet3 m/ ]7 e  U. }7 \
=> ANSWER: A,D
# ]: H6 F* _' F* [4 b( @& ?. P& p) N# u# t
Q32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
( h/ I" f9 L1 B8 uA. PortFast on the interface, x4 e1 v- B2 Y* a5 t3 [$ M
B. the interface as an access port to allow the voice VLAN ID
3 |& J. B$ Y0 P6 Q5 e2 |: xC. a voice VLAN ID in interface and global configuration mode' Z: X2 p6 O- l& W
D. Cisco Discovery Protocol in global configuration mode' {' z( K3 a+ E) b9 C
=> ANSWER: B% f& i$ B# d' q
, O# C9 ~( y: w8 }: S7 d' m6 J
Q33 Which identification number is valid for an extended ACL?. T+ c7 q7 ^6 f" r
A. 1
1 t% N% @/ l9 U; M% O2 ~2 h5 [5 CB. 64
3 u% e. ~7 Z$ t, i. D8 y2 YC. 99
1 b+ D( n& t) ^) C4 ?$ q" xD. 100
4 Z7 k- e4 @3 TE. 299
1 K$ o; ?! C9 V; ?8 J& e=> ANSWER: D
7 `* I. M2 }% @, N
/ U  e5 Y4 i& Q3 N3 `# C9 z$ Q) ]' zQ34 Refer to the exhibit6 |/ v- l0 A0 W" o: b# U1 I
q34.jpg
3 @  I4 U8 R1 v6 m2 pAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action6 J5 `! ^# G1 U* |6 l# R
can you take to
8 Z  t3 G7 m% E( @  v3 Mcorrect the problem?
1 c# _8 N) [- hA. Configure a loopback interface on R16 J. z" w$ }0 M% X- ^7 e* L( x
B. Enable IPv6 unicast routing on R1' |: k' }5 H4 c+ [3 z# X! e
C. Configure an IPv4 address on interface F0/05 o0 [# P2 Y! D9 |
D. Configure an autonomous system number on OSPF7 n( {. A; s$ s( l9 E1 M' |% B
=> ANSWER: C: [+ {7 o. s3 t7 t9 G

& Y! T7 @8 T0 I' g! X5 EQ35 Which statement about static routes is true?2 ]5 o: n$ p8 `7 U0 n
A. The source interface can be configured to make routing decisions8 L$ ~6 j4 Q% K  ^; f. i; T
B. A subnet mask is entered for the next-hop address
5 U- x8 i. _9 H1 g4 i4 IC. The subnet mask is 255.255 255.0 by default
4 w  \* I1 n# M1 k- j3 r2 kD. The exit interface can be specified to indicate where the packets will be routed- N5 ]1 F; D" X) c' _/ w& m9 o7 m+ O
=> ANSWER: D    R% n( G, {; D' a, c. K/ c
回复 支持 反对

使用道具 举报

发表于 2017-3-24 16:43:49 | 显示全部楼层
回复

使用道具 举报

发表于 2017-3-24 16:46:54 | 显示全部楼层
回复

使用道具 举报

 楼主| 发表于 2017-3-24 17:06:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 17:26 编辑
- z; a" p$ `* S& O9 r5 v% s
qwe4925429 发表于 2017-3-24 14:27
  i4 @: j9 _# @4 Y' e+ BQ7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in ...
6 @& h* V( C9 _  x3 V
以下也是可能會考的題目 答案並非是正確的  僅供參考
, u& Y% B* d% z" \. }) F; u( YQ36 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose Refer: O0 ?: I, W! G: C  R. t
to the exhibit. While troubleshooting a switch, you executed the show interface port-channel 15 ?' F( l- h4 g; ^7 B9 j8 \9 N3 o
etherchannel command and it returned this output.
4 P+ k8 [2 j  w( q% uWhich information is provided by the Load value?
: k: \8 l! o$ ~3 ^8 M1 M* e q36.JPG   _2 W9 l9 _0 X6 h
A. the percentage of use of the link' E4 w8 E3 o/ t3 H. t; y- ]
B. the preference of the link
9 D; r7 ~( b+ i+ t0 o6 b! {) xC. the session count of the link
  ?1 G# m( f- |! H7 {# mD. the number source-destination pairs on the link
: C7 C1 L% a7 M* }+ }" \=> ANSWER: D
3 r+ e/ g7 y' I# R" {2 z
9 A( M( D1 s8 r1 M- ~Q37 Which option describes a difference between EIGRP for IPv4 and IPv6?
# k, ^) v% l: ~* q# _A. Only EIGRP for IPv6 advertises all connected networks
. K) F) |9 }* T8 yB. Only EIGRP for IPv6 requires a router ID to be configured under the routing process- @/ s6 p- u, u; a$ u2 z3 }
C. AS numbers are configured in EIGRP but not in EIGRPv3& u; O8 k9 n( A, {. s& C
D. Only EIGRP for IPv6 is enabled in the global configuration mode& O8 w% H; ^1 n& f5 g, k
=> ANSWER: B  \6 x, i& N' f2 [3 y$ x
( f7 N8 H* Z- t# s* r* e! W
Q38 Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router. S' m& u% q! s
ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to
3 |, @5 ], o& l: F. Festablish adjacency? (Choose two.)
" o+ p9 Y; A0 j$ V q38.JPG
. |0 v- x' k3 Z8 D7 fA. Set the subnet mask on edge-1 to 255 255.255.252
1 v7 c- |. e+ F' ]B. Reduce the MTU on edge-1 to 1514* O+ J$ K2 @8 z  |8 V  M& n) K
C. Set the OSPF cost on edge-1 to 1522& n/ r2 R4 P) B! m1 ?' b$ c* x& \
D. Reduce the MTU on edge-1 to 1500
! e4 J  W/ x% W; mE. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface$ L8 E' n1 L  ~' v3 j. i; R
=> ANSWER: D,E
+ Q& X* M2 F( u% l. {) z; z4 K
; Q5 c' g, [( Y! T+ r  G0 hQ39 Refer to the exhibit. Which statement describes the effect of this configuration?: F5 l  N6 @9 u6 C
q39.JPG
  k; P, H5 y: cA. The VLAN 10 VTP configuration is displayed2 d) F8 W( y7 l- W* l# l
B. VLAN 10 spanning-tree output is displayed4 R# g9 Y5 ]0 [5 \% v
C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode& k  n' z4 m# U
D. VLAN 10 is added to the VLAN database- Z! p$ _8 {+ \- V- }
=> ANSWER: D6 M- |% n% {9 h* e' o" C
以上是我所知道可能會考的題目(不會再新增題目了)
# H4 i8 {3 ]: z: w/ C" {9 k
回复 支持 反对

使用道具 举报

发表于 2017-3-26 11:05:44 | 显示全部楼层
感谢楼主分享!
回复 支持 反对

使用道具 举报

发表于 2017-3-26 12:37:40 | 显示全部楼层
感谢, 感谢!
回复

使用道具 举报

发表于 2017-3-26 16:19:38 | 显示全部楼层
厉害了
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-8-26 15:44 , Processed in 0.060058 second(s), 18 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表