- 积分
- 430
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|

楼主 |
发表于 2017-3-24 14:27:14
|
显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑
5 v. r3 |) J" v2 l
; ~" a3 _, ]; p6 ~8 H1 r1 dQ7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network? 5 Q6 X6 }/ l0 `& u5 C7 f& t
A. ACL analysis tool in APIC-EM
# W4 m g# q9 X3 O, g/ H, Y$ q2 R" LB. ACL path analysis tool in APIC-EM5 T% u. J/ B- s: @7 h
C. APIC-EM automation Schedular$ W: d% j4 y3 V5 `
D. iWAN application) F# u2 t9 D# W% T' y4 X( X! Y
=> ANSWER: B" U: x2 D- \9 {& b
答案沒變
# V- F9 E" @: }* w: l& n6 K6 _( @. E以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)
p# b8 ~7 Y0 G ^+ U. ~Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
1 _: s2 F5 O3 \! \$ J+ _* aA. it discards the packet
4 t2 ]8 _. Z1 |0 G* @4 O# }+ LB. it broadcasts the packet to each network on the router
3 w; S5 h# v7 d4 [C. it routes the packet to the default route 7 E3 P" ] J; _% \7 E, [
D. it broadcasts the packet to each interface on the router
* I# C, z P/ O5 c {* P, B=> ANSWER: A1 t" g$ o* S7 V
" }9 V) ?1 D& }1 O$ WQ27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)4 C* g: E/ |* [# M3 j X
A. It automates network actions between different device types
7 A, j# K( H8 F4 J. g. K* p- {B. It provides robust asset management" R' N' n0 C+ U% b0 S+ e
C. It tracks license usage and Cisco IOS versions
0 j; C; U4 \* @1 }" B3 X3 b# }; a' GD. It automates network actions between legacy equipment% {* e7 g; i, h: `! A7 i
E. It makes network functions programmable
: P& Z: T, F) U=> ANSWER: A,E
% s, {5 l, b) ^+ B: F. P
5 e0 w: v! b0 y1 M7 L* E C" BQ28 Which three options are types of Layer 2 network attack? (Choose three)
# L+ N& Z7 `- W' ~9 M# KA. ARP attacks3 Q( ^8 u! T: e9 V# U$ E- l
B. brute force attacks( D+ f, v, M% s, [! T/ P, m% u
C. spoofing attacks6 x; n) u( E' x( H% _; t9 M, O3 x8 d
D. DDOS attacks
# [# i9 ^2 O5 d9 kE. VLAN hopping
2 T$ ` I8 V3 i @( x: E5 G- lF. botnet attacks) t, G& q# a; e6 |/ ~$ X( G+ H
=> ANSWER: A,C,E
- Z8 Q+ o# D! V3 O B0 \
4 I7 t: r. r9 V$ _/ y/ s: ^Q29 You are working in a data center environment and are assigned the address range4 G1 P( }* b0 F+ w7 c: q! C% f+ J4 T
10.188.31.0/23. You are asked to# Z7 y- a2 s0 f2 D' A; T
develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts+ A# t3 C' a0 D$ y2 Y
each. Which IP
W+ g0 H. {* K: {, xaddress range meets these requirements?8 O! N6 U( r6 c/ }2 r6 M4 W; v( E
A. 10.188.31.0/26; R4 I" b# u6 N9 k% Z* S' |
B. 10.188.31.0/25
; P& e: Y8 ]# ~% e6 i/ `C. 10.188.31.0/28
, L$ ^& F J( d8 M5 y$ T& ?D. 10.188.31.0/27, a5 G& ?7 e3 v$ x1 B+ t, \
E. 10.188.31.0/294 i5 t+ d5 q w! W6 U5 }0 f! [- e
=> ANSWER: D
& V& S, ~9 H" D: R3 ~
. d, S2 L# [0 WQ30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?
! L/ ?9 J0 z5 F: w# o# I( HA. 8
/ j. ^/ Q9 @* }9 ]B. 2+ ^$ u% F+ ~- |: i+ W
C. 1
F F% Q; g2 M1 s% B, ?7 JD. 0
8 t! H+ }0 k( g2 [+ o7 r4 q=> ANSWER: C9 s4 x: A, i3 e% o4 s
. e6 ^0 i A. e
Q31 Which two statements about unique local IPv6 addresses are true?7 ?* q$ e/ e* {5 E8 ~4 w5 B
A. They are identical to IPv4 private addresses% D; C2 p7 m0 Y! Y- u7 d
B. They are defined by RFC 1884* J% |. H8 w* @& z* r) t4 S
C. They use the prefix FEC0::/109 ^2 S; s5 P9 j+ o j+ y
D. They use the prefix FC00::/7) @6 N3 {, p; v# c! b2 Q
E. They can be routed on the IPv6 global internet Q9 x& K ]* G. H4 U2 t2 K
=> ANSWER: A,D# K8 g2 W7 Q0 f/ ^( @3 A& D- Z3 R8 C
1 m- `) T* Y% s1 w. X7 jQ32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?! D6 H7 X+ M: g' S4 x/ l& Q
A. PortFast on the interface
+ W& l9 G# P k) P5 l- hB. the interface as an access port to allow the voice VLAN ID
. [# T2 { ^5 A5 B1 b. x& c2 jC. a voice VLAN ID in interface and global configuration mode
4 w0 k! i) x0 R) ?5 V7 F eD. Cisco Discovery Protocol in global configuration mode' O8 ?: } }7 N3 {# _, D) ^
=> ANSWER: B
, ~+ Q: s; h5 r5 @. g5 c3 X4 v
Q33 Which identification number is valid for an extended ACL?) s4 c. d( y p3 U$ _
A. 1% f6 T. A/ n1 Q8 c: Z* I
B. 64
+ T: E5 G1 @ i2 yC. 99
6 T1 [( i: q7 O9 ^. ?D. 100
3 y. R6 t" c# K$ {- p% X5 l* dE. 299
- U: E, s" g5 A1 y3 A=> ANSWER: D: p u6 E) x( @' |0 T! u! E1 w* n# k
1 T: V% T5 C6 xQ34 Refer to the exhibit
& g9 J% U. M3 \* y* W" E8 ]% l
( }! n% c+ ]0 a% C% f1 yAfter you apply the given configuration to R1, you notice that it failed to enable OSPF Which action" l4 e% j/ B( }3 [
can you take to
9 [! A+ C8 F" ccorrect the problem?
1 l6 M8 ^" t- s- aA. Configure a loopback interface on R1
- |6 i5 i' b& O% o$ W) z9 \8 ZB. Enable IPv6 unicast routing on R1. M7 O5 E% U' Z, s, ?8 i+ u ] B
C. Configure an IPv4 address on interface F0/06 n( I4 k* v1 m6 w1 N9 J3 Y u" Y3 l
D. Configure an autonomous system number on OSPF
( e6 q+ h' Q6 _& W/ e1 A=> ANSWER: C
+ V5 L' V" |2 l4 S4 \: I' }# Y& D2 ?8 y$ R* C2 d' V
Q35 Which statement about static routes is true?0 B: O$ ~% j# k) [
A. The source interface can be configured to make routing decisions
6 a0 R. ~9 l$ s# J0 U7 f( _. uB. A subnet mask is entered for the next-hop address% ~* `6 _- `( m- h! f
C. The subnet mask is 255.255 255.0 by default) h& ^3 D* }3 n
D. The exit interface can be specified to indicate where the packets will be routed
/ o/ m, G0 ?, z4 A' v- @6 @, ^9 |( g=> ANSWER: D * [1 {+ _: {: x- I
|
24#
2017-3-24 14:27:14
回复(0)
收起回复
|