- 积分
- 430
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|

楼主 |
发表于 2017-3-24 14:27:14
|
显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑 0 c2 G9 r( s/ e+ O' Q- w
. l* X* U ]. ~, R
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network?
& q5 s0 t' r% @/ YA. ACL analysis tool in APIC-EM
- ^: c, [ z6 t3 {) ^1 y! x7 P$ j$ f6 rB. ACL path analysis tool in APIC-EM& ^- Q' ]- P Z4 T5 C2 S
C. APIC-EM automation Schedular
; C2 @# t ^ z2 e' @& [$ e" r# WD. iWAN application
1 h) ?6 { O8 z# J0 l S; @8 z=> ANSWER: B0 J/ v' I- e* v( X0 U4 F$ q
答案沒變; A6 Z; d; b9 F9 z6 C, R0 P, }( ^2 [
以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)
0 n$ m) u8 l* Q- E G5 R" ~Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
1 d V" Q' J6 h# T8 T7 NA. it discards the packet' M: D! j: X& z( ^ I, E5 o) p
B. it broadcasts the packet to each network on the router R% @7 K3 T% S! v' `+ \
C. it routes the packet to the default route ' W q7 h. ?7 C( z& X0 D
D. it broadcasts the packet to each interface on the router- R* S6 o: N4 F. d+ f' }- F
=> ANSWER: A3 _1 J* k F7 J4 \* N3 s
7 ]5 T5 @3 z/ y' V8 u
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)
; B: B" Y7 f/ k; B/ BA. It automates network actions between different device types
; D" Q# \0 D' R- Q% V% u _B. It provides robust asset management2 k2 }* d" _. Z, S# C6 d
C. It tracks license usage and Cisco IOS versions
9 J" j. R' E( v, w4 X# w& pD. It automates network actions between legacy equipment
3 Y9 B' U& Y; T/ `; `E. It makes network functions programmable
2 O" }+ Y7 E; h3 s' Y' H=> ANSWER: A,E% X' }* a0 ~6 B; c$ X: R
" f; n( M- U6 ?" o+ m# c5 T0 @Q28 Which three options are types of Layer 2 network attack? (Choose three)
( `/ p5 N5 L* kA. ARP attacks7 G- y9 K7 F l, z
B. brute force attacks
5 O5 C; m3 {+ H( \& U" KC. spoofing attacks
5 `4 E, s6 t( Z" Q% {D. DDOS attacks
8 v2 j w% z0 H$ L0 H* N- c, zE. VLAN hopping
V7 C; o: \" H! i4 A% A1 w$ i( `" N! `F. botnet attacks
: O3 w4 T4 C' b: } }=> ANSWER: A,C,E( a k6 j% p" e B
! T3 W; \; q, DQ29 You are working in a data center environment and are assigned the address range
8 h% W6 {6 \4 J U10.188.31.0/23. You are asked to: I( Q1 }& ?( k6 k
develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts7 [; `0 q( M. u: E
each. Which IP
; E) t8 W9 \* ]address range meets these requirements?( M$ m- R6 ]4 ] m/ ~1 Q' @
A. 10.188.31.0/26
' r+ ]5 c/ m/ ^$ }B. 10.188.31.0/25) \4 K$ Y' e0 h& ]- U
C. 10.188.31.0/28
: o1 x1 ]2 E# D1 Y! R ~6 xD. 10.188.31.0/27
6 R: I( z0 }* ^E. 10.188.31.0/29
' \, ~$ o- I+ N7 N=> ANSWER: D
3 z0 z( q6 n( _3 P3 w" [# B6 l: H) I$ K" r6 E. m
Q30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?
! i( W/ t$ J* | g7 }: HA. 83 Q; u$ S6 p/ a6 |) R+ e
B. 2* t* U! w8 y/ O2 H* A
C. 1
6 S" A& v- V! J* W5 Q% E% H& y; C3 i' `) VD. 0* o/ D* |8 T- _6 @& b6 ]
=> ANSWER: C
2 l( o# Y$ G% K% A* X
B- D$ \! Y7 J% k; [Q31 Which two statements about unique local IPv6 addresses are true?
$ }, W* y! i. D0 N4 s( i4 _! M% AA. They are identical to IPv4 private addresses; t9 A. F& C- b& P
B. They are defined by RFC 1884$ j8 `# o6 B( X, N& o% [
C. They use the prefix FEC0::/10
; p( }0 C( `% p0 [; \( a) CD. They use the prefix FC00::/74 B* a6 }; r3 C" i
E. They can be routed on the IPv6 global internet; h; ~# {6 Y: C& \0 f7 N* b
=> ANSWER: A,D
5 _ _/ k$ K' M X# i {' L, Q1 E0 y1 L2 C% B
Q32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?& ^1 r& e0 W. T& a' n& f4 C; l7 B* [
A. PortFast on the interface
5 c9 ^, ?9 V$ m9 P5 ~$ IB. the interface as an access port to allow the voice VLAN ID2 S+ [" i B" f, Z. y% k/ ^
C. a voice VLAN ID in interface and global configuration mode0 [( {$ L' z& p; x$ O
D. Cisco Discovery Protocol in global configuration mode/ f& I6 q& z0 j. t7 c' g* X
=> ANSWER: B c2 a* s& H4 X' p/ R |7 I
' |! w h4 W- _& t* J+ c8 PQ33 Which identification number is valid for an extended ACL?2 c$ k. Y$ f, M( F5 O" O" \
A. 1! \) H. J5 k6 C* F& {
B. 64
n6 b4 v' O; d, b+ LC. 992 @, N+ e/ J8 N3 D& _0 }% h% z
D. 1001 E) {/ U/ T5 ?2 l' H2 r1 x! K/ a
E. 299: J7 M" z& k1 L$ C3 L0 M5 B
=> ANSWER: D
$ v2 t( c% ?" d# K4 }4 R/ m* r' W' H" V! u
Q34 Refer to the exhibit% U$ s p3 v% {. D1 H- a6 _
+ p" `7 N# m0 x+ sAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
4 A' U) b2 {" b ]+ ?: J6 wcan you take to
) l' s h, k w- M+ V% j% F" ^$ U- jcorrect the problem?6 r( P5 e7 f/ s; v( T0 C
A. Configure a loopback interface on R1
+ J {4 |, o iB. Enable IPv6 unicast routing on R1
6 g/ S5 ~. f+ E3 H' {5 Y1 xC. Configure an IPv4 address on interface F0/0) I9 Q% W7 T5 d6 m, m6 r
D. Configure an autonomous system number on OSPF
- R2 _0 Q* ^5 M* J1 B; o* d9 |=> ANSWER: C
: i* g3 C1 P/ T. y' U3 Q" w. F3 D0 H8 {" [3 S/ ?4 f, d
Q35 Which statement about static routes is true?
) F7 U* ]& H& Z% GA. The source interface can be configured to make routing decisions! ~3 w9 B) m- I& Y% z3 Q9 A( U6 t: O
B. A subnet mask is entered for the next-hop address
( @6 y" Q( b( F8 i2 U8 z0 QC. The subnet mask is 255.255 255.0 by default! _7 w2 E! _5 J4 \+ N/ {
D. The exit interface can be specified to indicate where the packets will be routed8 h! Y8 @% ^; J# K0 b1 |5 m
=> ANSWER: D 6 i7 s- y! k9 w# W$ D, D- V) e R" ?
|
24#
2017-3-24 14:27:14
回复(0)
收起回复
|