设为首页收藏本站language 语言切换
楼主: qwe4925429
收起左侧

[考试战报] 3/23 台灣 839 PASS

[复制链接]
发表于 2017-3-24 09:58:11 | 显示全部楼层
16# 2017-3-24 09:58:11 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 10:05:19 来自手机 | 显示全部楼层
你考过没有?
17# 2017-3-24 10:05:19 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:45:55 | 显示全部楼层
茗小凯 发表于 2017-3-24 10:05
' o" x* I' b; W9 Q6 ~: `- f你考过没有?
' K) @( Z6 T; M( o# x+ C; `  F8 E
樓主已經在文章Title打839 pass?
18# 2017-3-24 10:45:55 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:51:39 | 显示全部楼层
19# 2017-3-24 10:51:39 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 11:12:41 | 显示全部楼层
谢谢分享
20# 2017-3-24 11:12:41 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 12:15:57 | 显示全部楼层
恭喜,恭喜
21# 2017-3-24 12:15:57 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 12:56:18 | 显示全部楼层
22# 2017-3-24 12:56:18 回复 收起回复
回复

使用道具 举报

 楼主| 发表于 2017-3-24 13:39:34 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 15:06 编辑
5 B  S" D& J. H# a% o  z5 `7 @5 y. t8 O, a0 s# |1 z
Q25 which authentication is supported on MLPPP?(Choose 2)
. W8 w# p; R) O+ w$ jA. PAP
3 v, Y: ^0 e2 JB. CHAP
" J) \  @+ P" @" CC. PEAP% N3 v3 E% E# U% S8 t5 \
D. LEAP
) ~/ _7 p. H$ H2 E# j. X$ c0 E=> ANSWER: A,B
- l/ f! F" a0 X# g* Z6 K6 k5 j9 N0 q2 J; s
再次聲明 我發的答案並非正確的  沒過別怪我; w, |- I0 k. r- b# H5 `+ \

. t$ V0 G# y, R3 N0 f$ j
23# 2017-3-24 13:39:34 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-3-24 14:27:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑 ! ?  O4 H0 D1 j% @
# E7 ?' [2 `9 ?9 _2 y
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
( R4 r! A& A6 S+ s3 cA. ACL analysis tool in APIC-EM
) d) y' e" N# d# a4 T8 iB. ACL path analysis tool in APIC-EM
7 b0 C: D& r3 s* wC. APIC-EM automation Schedular
+ }* p* q" Y# [% ?D. iWAN application/ o, x+ Y3 S. l! x6 N+ p! q$ {
=> ANSWER: B
+ M1 x0 A& B$ C0 [4 Y答案沒變
! s9 W) C) `: c; H以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)
, `1 k" x' Q9 [  ^0 bQ26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
9 k$ w/ m2 _0 ?4 |7 ?3 bA. it discards the packet
4 ]1 s$ c# w# ]. |( _0 f' a; EB. it broadcasts the packet to each network on the router$ F' K' |5 z/ k2 X
C. it routes the packet to the default route ) c4 P: T8 q+ z! S7 C. W* \- E
D. it broadcasts the packet to each interface on the router2 b( o3 D2 ^8 G6 t9 v2 o: s- K
=> ANSWER: A
& A' f6 E' }; F7 V9 i; [% C# ?% v' f, A& Q' g) P& s
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)& {5 t/ F! d& ^, l3 q1 Q' N+ s
A. It automates network actions between different device types
7 R& T- u" @- K0 eB. It provides robust asset management! ~: e& ?4 q/ |
C. It tracks license usage and Cisco IOS versions
  W6 L! M- \* k& e: Z- D; n2 QD. It automates network actions between legacy equipment3 q. f4 M& n+ E( r
E. It makes network functions programmable
1 O# A; P5 r+ R! Q& E=> ANSWER: A,E$ l9 ^' ~4 x3 |, p5 `. b7 r& I. _

+ v3 W! C8 \5 b4 n+ WQ28 Which three options are types of Layer 2 network attack? (Choose three)7 |$ f; o8 G0 D; x
A. ARP attacks3 _2 N7 ]) T. B( E- ^6 P) i
B. brute force attacks
& N7 k! n; p& s; xC. spoofing attacks. o4 n- B9 x" N9 T$ t
D. DDOS attacks, i5 l  H7 s4 V6 F  @3 ^$ W& Y! f
E. VLAN hopping
% z) z- v0 C- J; z) x! F2 {6 j% N; UF. botnet attacks
# t! K! Y- n5 S! L& j  k7 ~=> ANSWER: A,C,E
( k7 v2 I$ _8 C/ v; z! H0 {: d7 g( k, i# H4 n+ Y. k# E
Q29 You are working in a data center environment and are assigned the address range
% V) V/ i2 D$ s$ c' u" a) J4 i10.188.31.0/23. You are asked to4 p1 s  [3 t; K! ]- f6 |0 N, z
develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts
7 i4 w- r/ r6 i9 G0 r; ~each. Which IP 6 s5 `. o( V  q" m" O  H4 w
address range meets these requirements?( a4 L0 }# [6 X+ f5 A
A. 10.188.31.0/26. S6 v+ m7 K% G
B. 10.188.31.0/25; }& a1 }! e, d) ]# i! s4 M, ~
C. 10.188.31.0/28
& y/ k, B: u. r) M) qD. 10.188.31.0/27
' i9 q1 R$ g! B" e: M* ME. 10.188.31.0/29: C- M! p% h! l# \% G8 s2 N+ W
=> ANSWER: D' j& S0 U8 m5 b4 v- B' x

/ b2 g' W* l$ l" P& m8 U2 mQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?" _% l5 h* i1 D+ ^; _+ G
A. 8+ L3 {2 s8 U$ [% U+ u3 v6 ^* O
B. 2
. F8 s$ V2 ^  y/ `5 EC. 1
. W$ `7 p% o$ ~D. 0
5 b( N9 E) D3 e; B=> ANSWER: C
7 A7 S" D2 H2 [& ^2 L$ \# Z% b/ L" m1 Z) G. L/ j7 D
Q31 Which two statements about unique local IPv6 addresses are true?, M8 u; I9 e& `8 X3 Y1 @$ |
A. They are identical to IPv4 private addresses  r2 v5 H) B; A5 |& [* u" G
B. They are defined by RFC 1884
0 ^* s6 I) {+ E# FC. They use the prefix FEC0::/102 e, F/ ~6 x% h  f
D. They use the prefix FC00::/7- C2 [9 v0 v/ |% V* \
E. They can be routed on the IPv6 global internet
9 ^% A/ x9 X% g' U& w, x9 P=> ANSWER: A,D+ F+ D, [4 r, Y  \; P

: Y5 X8 f5 H% x8 G1 R0 GQ32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?/ r$ _# W* y1 U8 ]  U
A. PortFast on the interface, H: D4 J4 F! O7 M# K- ?
B. the interface as an access port to allow the voice VLAN ID
9 O5 M0 ^* l' M( J1 QC. a voice VLAN ID in interface and global configuration mode2 y) d+ s$ a4 n# W; u
D. Cisco Discovery Protocol in global configuration mode, m5 [5 `' ?1 s  b8 T' k+ a
=> ANSWER: B
! m* N7 t, }8 A% c+ E
0 s5 e, P& l: \- F+ cQ33 Which identification number is valid for an extended ACL?7 Q" ~0 Y$ D2 n1 D# L' @
A. 1
, ?6 D3 }) X; l0 `1 H1 q# R9 r; |B. 64- L" q5 v$ s. Z$ g& s% `
C. 99
+ c: o+ N4 Z7 A2 ^D. 100. \$ R( i+ I6 V; f. d  }
E. 299
! t7 ~: G+ ^! O: J=> ANSWER: D: S: b8 P1 f$ u0 b5 t: N" p

- K# V: V' u2 h3 w, r9 M& HQ34 Refer to the exhibit
3 }/ q  G5 L3 s4 @7 T q34.jpg
( ~- u) T9 f) d" TAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
! [. X; i" P! Z. Scan you take to7 [; ?, v. |' n
correct the problem?
7 R- j! C+ }; i5 F* W7 P0 Z$ p. oA. Configure a loopback interface on R1
  A3 D: w( a: h( H/ s) r) IB. Enable IPv6 unicast routing on R13 K0 r" `# L$ d: R- {$ \! [$ t8 O
C. Configure an IPv4 address on interface F0/0) |5 v1 O2 o% z8 D! B; L
D. Configure an autonomous system number on OSPF
6 i# v& Z( ?! p- g* e=> ANSWER: C
# i: F+ d: d5 G" \6 V: J) x/ u1 C9 ?) U7 A
Q35 Which statement about static routes is true?7 d0 T+ ?# T3 e/ F3 Y
A. The source interface can be configured to make routing decisions; ]  W0 t$ s' r: d, b& r
B. A subnet mask is entered for the next-hop address
, g4 z+ s# \4 t- P! K3 T6 b: CC. The subnet mask is 255.255 255.0 by default9 J& D5 Y+ @5 l2 ^$ c6 ]4 I
D. The exit interface can be specified to indicate where the packets will be routed
# ~5 M- l# T0 R) D=> ANSWER: D  5 x3 [- Q3 e* M" L
24# 2017-3-24 14:27:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 16:43:49 | 显示全部楼层
25# 2017-3-24 16:43:49 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 16:46:54 | 显示全部楼层
26# 2017-3-24 16:46:54 回复 收起回复
回复

使用道具 举报

 楼主| 发表于 2017-3-24 17:06:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 17:26 编辑
3 G0 [1 m3 {7 v! k/ c5 _6 L; i6 }
qwe4925429 发表于 2017-3-24 14:27
- T6 z0 v0 W" _Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in ...

7 Y+ M: g2 |" e/ m  x9 \8 c以下也是可能會考的題目 答案並非是正確的  僅供參考
1 t5 g5 D# j! BQ36 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose Refer+ j* d( U0 p. l6 D
to the exhibit. While troubleshooting a switch, you executed the show interface port-channel 1
9 t: [0 I  q' k5 ^6 d. W7 Metherchannel command and it returned this output.
4 K% R% C: K9 N) F' D' W; p6 k: MWhich information is provided by the Load value?% S1 e6 u$ q% O: D% z2 _
q36.JPG
! `5 {+ r  a9 y3 ]9 u( EA. the percentage of use of the link
% S/ |$ s) [- h3 f& \* O/ UB. the preference of the link
7 q3 x. L/ I3 e# u8 Q" U+ S9 Z6 m* xC. the session count of the link4 q/ p; }0 v' P; z& \% E0 w) \& P
D. the number source-destination pairs on the link
( O: I& m8 ~3 }: }1 ]: V: z=> ANSWER: D
9 X/ ^  z; h' K4 ^; a0 P* s, V" @! s- d  C/ f: g
Q37 Which option describes a difference between EIGRP for IPv4 and IPv6?
) h1 L- H# A$ SA. Only EIGRP for IPv6 advertises all connected networks
% j' Y/ j' \3 M; T8 T- [7 B: FB. Only EIGRP for IPv6 requires a router ID to be configured under the routing process$ O4 f# P+ d+ D4 O
C. AS numbers are configured in EIGRP but not in EIGRPv3
: ~$ B% K& S  P: m6 ]( h$ ND. Only EIGRP for IPv6 is enabled in the global configuration mode" R3 {6 u, @. o' Q, V! }7 |  S
=> ANSWER: B
7 U, Q( g& v( p/ m) e
2 Y' A( D2 ^+ h/ P( \Q38 Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router
! v0 X6 f7 Q, T7 m) i9 e9 WISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to. U& O6 @  Z) u4 }+ b6 z: t1 g* X
establish adjacency? (Choose two.)7 [5 y' Z3 K% K' S, K
q38.JPG ) m- Q5 x5 v) D  y( ?1 j2 O  m
A. Set the subnet mask on edge-1 to 255 255.255.252+ k% A: T- ~5 P
B. Reduce the MTU on edge-1 to 1514
  }5 u' W4 l9 o9 S, |* YC. Set the OSPF cost on edge-1 to 15223 t1 h8 [5 o% g2 K
D. Reduce the MTU on edge-1 to 1500
$ [/ h% J3 [( U0 m+ m5 z" RE. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface
9 W& u- s  ?. o5 ?=> ANSWER: D,E1 y5 G! [) K, r; p$ P* L# q+ u

, r/ ?9 P( h5 c& ]8 bQ39 Refer to the exhibit. Which statement describes the effect of this configuration?9 C! {% F/ h3 b2 T* `9 w
q39.JPG
; s  c1 o3 u( pA. The VLAN 10 VTP configuration is displayed% @0 T2 M. w3 Q8 m/ _, L( R' }4 t* h0 Z; D
B. VLAN 10 spanning-tree output is displayed6 J5 x4 s" a" `& C
C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode6 L0 _4 L+ f1 G3 Y0 I
D. VLAN 10 is added to the VLAN database% }% j7 z' q2 \/ }. U8 v
=> ANSWER: D! |0 ]1 A- z9 [! T9 V1 c
以上是我所知道可能會考的題目(不會再新增題目了)( _9 G% I+ Y: |2 z$ B& y# n+ u
27# 2017-3-24 17:06:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-26 11:05:44 | 显示全部楼层
感谢楼主分享!
28# 2017-3-26 11:05:44 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-26 12:37:40 | 显示全部楼层
感谢, 感谢!
29# 2017-3-26 12:37:40 回复 收起回复
回复

使用道具 举报

发表于 2017-3-26 16:19:38 | 显示全部楼层
厉害了
30# 2017-3-26 16:19:38 回复 收起回复
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-7-1 18:32 , Processed in 0.176355 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表