- 积分
- 430
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|

楼主 |
发表于 2017-3-24 14:27:14
|
显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑 ! ? O4 H0 D1 j% @
# E7 ?' [2 `9 ?9 _2 y
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
( R4 r! A& A6 S+ s3 cA. ACL analysis tool in APIC-EM
) d) y' e" N# d# a4 T8 iB. ACL path analysis tool in APIC-EM
7 b0 C: D& r3 s* wC. APIC-EM automation Schedular
+ }* p* q" Y# [% ?D. iWAN application/ o, x+ Y3 S. l! x6 N+ p! q$ {
=> ANSWER: B
+ M1 x0 A& B$ C0 [4 Y答案沒變
! s9 W) C) `: c; H以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)
, `1 k" x' Q9 [ ^0 bQ26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
9 k$ w/ m2 _0 ?4 |7 ?3 bA. it discards the packet
4 ]1 s$ c# w# ]. |( _0 f' a; EB. it broadcasts the packet to each network on the router$ F' K' |5 z/ k2 X
C. it routes the packet to the default route ) c4 P: T8 q+ z! S7 C. W* \- E
D. it broadcasts the packet to each interface on the router2 b( o3 D2 ^8 G6 t9 v2 o: s- K
=> ANSWER: A
& A' f6 E' }; F7 V9 i; [% C# ?% v' f, A& Q' g) P& s
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)& {5 t/ F! d& ^, l3 q1 Q' N+ s
A. It automates network actions between different device types
7 R& T- u" @- K0 eB. It provides robust asset management! ~: e& ?4 q/ |
C. It tracks license usage and Cisco IOS versions
W6 L! M- \* k& e: Z- D; n2 QD. It automates network actions between legacy equipment3 q. f4 M& n+ E( r
E. It makes network functions programmable
1 O# A; P5 r+ R! Q& E=> ANSWER: A,E$ l9 ^' ~4 x3 |, p5 `. b7 r& I. _
+ v3 W! C8 \5 b4 n+ WQ28 Which three options are types of Layer 2 network attack? (Choose three)7 |$ f; o8 G0 D; x
A. ARP attacks3 _2 N7 ]) T. B( E- ^6 P) i
B. brute force attacks
& N7 k! n; p& s; xC. spoofing attacks. o4 n- B9 x" N9 T$ t
D. DDOS attacks, i5 l H7 s4 V6 F @3 ^$ W& Y! f
E. VLAN hopping
% z) z- v0 C- J; z) x! F2 {6 j% N; UF. botnet attacks
# t! K! Y- n5 S! L& j k7 ~=> ANSWER: A,C,E
( k7 v2 I$ _8 C/ v; z! H0 {: d7 g( k, i# H4 n+ Y. k# E
Q29 You are working in a data center environment and are assigned the address range
% V) V/ i2 D$ s$ c' u" a) J4 i10.188.31.0/23. You are asked to4 p1 s [3 t; K! ]- f6 |0 N, z
develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts
7 i4 w- r/ r6 i9 G0 r; ~each. Which IP 6 s5 `. o( V q" m" O H4 w
address range meets these requirements?( a4 L0 }# [6 X+ f5 A
A. 10.188.31.0/26. S6 v+ m7 K% G
B. 10.188.31.0/25; }& a1 }! e, d) ]# i! s4 M, ~
C. 10.188.31.0/28
& y/ k, B: u. r) M) qD. 10.188.31.0/27
' i9 q1 R$ g! B" e: M* ME. 10.188.31.0/29: C- M! p% h! l# \% G8 s2 N+ W
=> ANSWER: D' j& S0 U8 m5 b4 v- B' x
/ b2 g' W* l$ l" P& m8 U2 mQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?" _% l5 h* i1 D+ ^; _+ G
A. 8+ L3 {2 s8 U$ [% U+ u3 v6 ^* O
B. 2
. F8 s$ V2 ^ y/ `5 EC. 1
. W$ `7 p% o$ ~D. 0
5 b( N9 E) D3 e; B=> ANSWER: C
7 A7 S" D2 H2 [& ^2 L$ \# Z% b/ L" m1 Z) G. L/ j7 D
Q31 Which two statements about unique local IPv6 addresses are true?, M8 u; I9 e& `8 X3 Y1 @$ |
A. They are identical to IPv4 private addresses r2 v5 H) B; A5 |& [* u" G
B. They are defined by RFC 1884
0 ^* s6 I) {+ E# FC. They use the prefix FEC0::/102 e, F/ ~6 x% h f
D. They use the prefix FC00::/7- C2 [9 v0 v/ |% V* \
E. They can be routed on the IPv6 global internet
9 ^% A/ x9 X% g' U& w, x9 P=> ANSWER: A,D+ F+ D, [4 r, Y \; P
: Y5 X8 f5 H% x8 G1 R0 GQ32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?/ r$ _# W* y1 U8 ] U
A. PortFast on the interface, H: D4 J4 F! O7 M# K- ?
B. the interface as an access port to allow the voice VLAN ID
9 O5 M0 ^* l' M( J1 QC. a voice VLAN ID in interface and global configuration mode2 y) d+ s$ a4 n# W; u
D. Cisco Discovery Protocol in global configuration mode, m5 [5 `' ?1 s b8 T' k+ a
=> ANSWER: B
! m* N7 t, }8 A% c+ E
0 s5 e, P& l: \- F+ cQ33 Which identification number is valid for an extended ACL?7 Q" ~0 Y$ D2 n1 D# L' @
A. 1
, ?6 D3 }) X; l0 `1 H1 q# R9 r; |B. 64- L" q5 v$ s. Z$ g& s% `
C. 99
+ c: o+ N4 Z7 A2 ^D. 100. \$ R( i+ I6 V; f. d }
E. 299
! t7 ~: G+ ^! O: J=> ANSWER: D: S: b8 P1 f$ u0 b5 t: N" p
- K# V: V' u2 h3 w, r9 M& HQ34 Refer to the exhibit
3 }/ q G5 L3 s4 @7 T
( ~- u) T9 f) d" TAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
! [. X; i" P! Z. Scan you take to7 [; ?, v. |' n
correct the problem?
7 R- j! C+ }; i5 F* W7 P0 Z$ p. oA. Configure a loopback interface on R1
A3 D: w( a: h( H/ s) r) IB. Enable IPv6 unicast routing on R13 K0 r" `# L$ d: R- {$ \! [$ t8 O
C. Configure an IPv4 address on interface F0/0) |5 v1 O2 o% z8 D! B; L
D. Configure an autonomous system number on OSPF
6 i# v& Z( ?! p- g* e=> ANSWER: C
# i: F+ d: d5 G" \6 V: J) x/ u1 C9 ?) U7 A
Q35 Which statement about static routes is true?7 d0 T+ ?# T3 e/ F3 Y
A. The source interface can be configured to make routing decisions; ] W0 t$ s' r: d, b& r
B. A subnet mask is entered for the next-hop address
, g4 z+ s# \4 t- P! K3 T6 b: CC. The subnet mask is 255.255 255.0 by default9 J& D5 Y+ @5 l2 ^$ c6 ]4 I
D. The exit interface can be specified to indicate where the packets will be routed
# ~5 M- l# T0 R) D=> ANSWER: D 5 x3 [- Q3 e* M" L
|
24#
2017-3-24 14:27:14
回复(0)
收起回复
|