设为首页收藏本站language 语言切换
楼主: qwe4925429
收起左侧

[考试战报] 3/23 台灣 839 PASS

[复制链接]
发表于 2017-3-24 09:58:11 | 显示全部楼层
16# 2017-3-24 09:58:11 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 10:05:19 来自手机 | 显示全部楼层
你考过没有?
17# 2017-3-24 10:05:19 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:45:55 | 显示全部楼层
茗小凯 发表于 2017-3-24 10:05
; E* J& \! _( d# [$ _" \$ O你考过没有?

: O: V+ |2 P2 ~( L9 {樓主已經在文章Title打839 pass?
18# 2017-3-24 10:45:55 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 10:51:39 | 显示全部楼层
19# 2017-3-24 10:51:39 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 11:12:41 | 显示全部楼层
谢谢分享
20# 2017-3-24 11:12:41 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 12:15:57 | 显示全部楼层
恭喜,恭喜
21# 2017-3-24 12:15:57 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 12:56:18 | 显示全部楼层
22# 2017-3-24 12:56:18 回复 收起回复
回复

使用道具 举报

 楼主| 发表于 2017-3-24 13:39:34 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 15:06 编辑 & ^& M% `7 F% y* n

' b/ |  S2 d. c# ~; _# ^0 J2 rQ25 which authentication is supported on MLPPP?(Choose 2)
+ @/ ~& p! Q, f/ s9 @A. PAP# M8 l  f4 G" Y. k" Y" _* W
B. CHAP$ Z) ^3 }7 e/ y0 t3 ?
C. PEAP; U, Z) R  t8 _
D. LEAP
: g5 m' q$ Z) y3 z& H. ?=> ANSWER: A,B
7 d; f- N6 t* H8 i# C  ?3 ^0 c6 x; C9 O: A+ X5 n
再次聲明 我發的答案並非正確的  沒過別怪我
" ^4 t* k5 ^2 J% D. m" y
7 x4 I8 f9 ?2 ^  j; L3 z- p( K
23# 2017-3-24 13:39:34 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2017-3-24 14:27:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑
) T% N9 }. t/ q+ w" s  Z* n4 B6 y4 P0 p- T
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network? & t8 W9 l) {  \4 {9 e7 S
A. ACL analysis tool in APIC-EM
5 H$ w' g- C9 G0 B" UB. ACL path analysis tool in APIC-EM) x! E3 I  B. u: ?0 Q
C. APIC-EM automation Schedular; H- Q4 k& c6 Z; [
D. iWAN application
1 G- S8 D( H2 y+ _=> ANSWER: B" l  }3 v1 Q9 c6 a- W9 l3 k
答案沒變
: C: Y' y( j2 c4 p5 |" l以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)9 H, X5 }6 U' g4 _% R) u0 {: Q
Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
/ F$ b# o/ G6 h/ m" V  lA. it discards the packet" k* l' ~2 }3 {: w4 K
B. it broadcasts the packet to each network on the router+ u, c7 @2 X( N0 m2 `6 W
C. it routes the packet to the default route
1 }  p7 i3 n, xD. it broadcasts the packet to each interface on the router
: L6 r" Q' z+ n$ P% ^/ i=> ANSWER: A
# h. v, X8 Z7 K; v  l- j; ^2 e! r5 U" }
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)
. m7 X" x* g" a6 P3 D# M7 MA. It automates network actions between different device types
5 V' m5 D2 N4 t  P8 {9 @B. It provides robust asset management& X5 R; J! r5 D$ Z
C. It tracks license usage and Cisco IOS versions
$ P& h" |. o, z$ W! C( T6 tD. It automates network actions between legacy equipment
8 I, M& L5 n- p% }) l6 c( HE. It makes network functions programmable+ W, ^3 m' T$ R) k' ?8 \4 |- t' v
=> ANSWER: A,E
* m1 F; q( R- t: A. j" P+ o3 ~0 ~: p2 _, y3 Y
Q28 Which three options are types of Layer 2 network attack? (Choose three)
. s" G; O! F; z# pA. ARP attacks
' E% M, Z' |" a7 W, [/ v+ B4 ~B. brute force attacks5 J+ b! ~) j$ N3 G4 F1 O9 o
C. spoofing attacks0 t/ R9 A$ x: T; I7 B: v
D. DDOS attacks
% O: F3 ~; g% X6 ]& _$ KE. VLAN hopping
$ h, O9 N; }& d( L0 [2 QF. botnet attacks1 `9 [) K8 f7 L9 S# j
=> ANSWER: A,C,E2 b; W, |2 e$ g& `
4 W9 H  l* W# n' Z/ _) x, J( f
Q29 You are working in a data center environment and are assigned the address range
( t9 B' }0 g& l9 _2 V1 B0 b6 v10.188.31.0/23. You are asked to
1 t9 v/ O* r$ A3 `: G) @develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts% N, V6 k$ S2 S2 t
each. Which IP . \4 D4 @# d6 U( N4 y; q6 Q
address range meets these requirements?
( q" b+ k) A% f1 X- \A. 10.188.31.0/26
' F- I1 }8 s2 L$ W( KB. 10.188.31.0/251 Q6 C, t3 L: ~! y7 x
C. 10.188.31.0/28! |  J3 A' k2 O- V
D. 10.188.31.0/274 R$ H& B3 ?8 G. H2 e
E. 10.188.31.0/29: t) v/ V7 g* l1 N
=> ANSWER: D
2 m& Q& |" l. }1 D' j8 E1 T8 ?5 [2 L# L. K9 F9 ^( W' t2 s
Q30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?( z8 m: m, i, w' g! {
A. 8
1 f; _# F$ ]- N: ZB. 2/ `+ S/ ?1 p- `4 m8 Z8 ]1 @& }
C. 1
: L! h& A& E+ Y( p, I; x$ u9 P8 mD. 0. r7 l! }/ B! X* d
=> ANSWER: C5 z+ }! Z9 g4 m# k' W: l
4 P+ {6 w! P: a2 ^; b/ h% o
Q31 Which two statements about unique local IPv6 addresses are true?
4 ^! h& f2 i; W' _  XA. They are identical to IPv4 private addresses% \  i1 z4 w% J
B. They are defined by RFC 1884
3 x, q6 \6 x; D" [) h- aC. They use the prefix FEC0::/10
9 \. ]" K) q& o; ND. They use the prefix FC00::/7
3 o  |4 N3 f" j6 }  \E. They can be routed on the IPv6 global internet; ]! T+ p& O8 C8 G) c
=> ANSWER: A,D, G0 R; O" E% A' {. A
- e% N: D0 q0 T8 |
Q32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
1 k' b3 b4 c6 \5 JA. PortFast on the interface
4 `8 ?7 _# S. b' `B. the interface as an access port to allow the voice VLAN ID
& N0 [* m3 V/ }: A6 w4 NC. a voice VLAN ID in interface and global configuration mode6 Y4 {* w) K6 q" h7 ~0 m. |, n- a
D. Cisco Discovery Protocol in global configuration mode
. B6 Y$ U: o! i7 O3 n. H6 y7 p=> ANSWER: B
! ?) K. d* b# x, N
. w6 I0 S6 f; x- c- AQ33 Which identification number is valid for an extended ACL?
/ }: O* O5 ^' JA. 1
: Y; A( w: l# G+ P/ P; ?& DB. 640 J" u- f! c2 t
C. 99
4 m# d6 ~# u7 D9 v) j+ u* bD. 100% [+ M" ^9 c' Y' B  k, s
E. 299
, E9 i+ o% g5 j( [, t=> ANSWER: D
6 x  T+ \, p4 K4 k
( }3 a4 y+ O# q+ u0 nQ34 Refer to the exhibit5 c  C+ R3 }2 G1 C9 Q
q34.jpg . A0 t7 u1 n( o+ P/ S  H
After you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
9 x! [# `+ Z" U5 W7 S8 tcan you take to' k; {# M/ t' I4 c& |; M- h
correct the problem?
) v3 J' M: D( ]6 C5 GA. Configure a loopback interface on R1
9 R& M  e2 U) OB. Enable IPv6 unicast routing on R1
4 D: J2 ^, T" R" b& @0 k; L; kC. Configure an IPv4 address on interface F0/0* Q! ?, n0 \  t) \' _4 i3 ?+ X, }
D. Configure an autonomous system number on OSPF
0 a! |& _: |+ X$ _6 z. Q& J=> ANSWER: C
& G# W5 E( M& D& s' @: L
! l0 Q/ Y+ P) `0 V* [Q35 Which statement about static routes is true?! _5 P9 B' W7 H2 z* G  J! d% E% j
A. The source interface can be configured to make routing decisions$ E: _7 |+ ~6 o7 Y+ K% \- e8 t. Z
B. A subnet mask is entered for the next-hop address
7 Q+ h  e3 a6 h" h9 z; Q# ]C. The subnet mask is 255.255 255.0 by default( U: {: w+ O" b& {) j( r& M
D. The exit interface can be specified to indicate where the packets will be routed
9 r+ _- y( }: x=> ANSWER: D  2 W8 B' K. Z/ p2 R( d! n2 n
24# 2017-3-24 14:27:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-24 16:43:49 | 显示全部楼层
25# 2017-3-24 16:43:49 回复 收起回复
回复

使用道具 举报

发表于 2017-3-24 16:46:54 | 显示全部楼层
26# 2017-3-24 16:46:54 回复 收起回复
回复

使用道具 举报

 楼主| 发表于 2017-3-24 17:06:14 | 显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 17:26 编辑 + N  [5 o) B$ S8 O
qwe4925429 发表于 2017-3-24 14:27
! \) e: d3 d" p+ X+ Z7 |Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in ...

3 B8 r. M- x: p0 e! N以下也是可能會考的題目 答案並非是正確的  僅供參考
; p. t! Q; ^; e- b, u8 W( zQ36 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose Refer
6 B1 X8 d# r, m1 A# hto the exhibit. While troubleshooting a switch, you executed the show interface port-channel 1
- Y( \" F8 U6 |& K9 O4 `( betherchannel command and it returned this output.9 e# S3 A2 k/ s. z9 `
Which information is provided by the Load value?
# C, R) Q: l4 m- e' u6 \( J q36.JPG # ]' E/ g/ B& U* G. C
A. the percentage of use of the link0 q1 }! r. R4 O5 I7 E1 c+ _0 X
B. the preference of the link
4 d7 P; |0 d( ]C. the session count of the link
5 U& q3 O$ |9 \D. the number source-destination pairs on the link
; B. t8 q: t/ p! }  f1 O3 ~" B=> ANSWER: D1 e% |* ~' e" ~/ Q* J. F

& @) L) ^% l5 tQ37 Which option describes a difference between EIGRP for IPv4 and IPv6?
* l/ p8 M% g$ ~3 g9 A! \& }5 I2 j5 rA. Only EIGRP for IPv6 advertises all connected networks
7 @, v4 J/ g& b  k/ IB. Only EIGRP for IPv6 requires a router ID to be configured under the routing process
+ k* m& l! J/ `; X4 g/ TC. AS numbers are configured in EIGRP but not in EIGRPv3: D& b" Y0 b& B$ y4 \% ?
D. Only EIGRP for IPv6 is enabled in the global configuration mode2 m4 Q1 ?4 Z: c' Q" b% H7 S
=> ANSWER: B; H( Q( `, `# S# K
, D7 I. I2 t0 ?8 B5 X2 o
Q38 Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router0 x: a) @! h' Z( O0 Z2 I4 ^5 k
ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to
5 ~  P. {& D* G) @3 ^7 s  \establish adjacency? (Choose two.)5 W5 \8 I( @6 N" e, N8 `
q38.JPG # q4 k4 Q* P$ ^( G3 z/ |. l+ q
A. Set the subnet mask on edge-1 to 255 255.255.2526 ~/ e1 V9 v- v
B. Reduce the MTU on edge-1 to 1514
) F2 w. ~; B, G( V$ E4 `; QC. Set the OSPF cost on edge-1 to 1522# Y& S4 P) c0 @1 q5 _
D. Reduce the MTU on edge-1 to 1500' ?- T7 b- ~9 E! k/ r1 ~
E. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface' n7 q* O7 _6 l) T! S+ ~
=> ANSWER: D,E8 f5 A5 |8 W8 l6 i' ]2 ~

5 E: q6 I' t1 Z3 \  ]Q39 Refer to the exhibit. Which statement describes the effect of this configuration?
$ t3 I; _* S8 M3 E( J q39.JPG
, w; @9 d" p: h+ |8 f3 j) TA. The VLAN 10 VTP configuration is displayed0 o, v8 W9 B9 b7 r3 c! D! I
B. VLAN 10 spanning-tree output is displayed( o0 ~: K# h' N  A* g9 V9 X
C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode
/ `  p# u$ T9 gD. VLAN 10 is added to the VLAN database
2 z# c1 b, f% c/ l& l1 z1 }=> ANSWER: D# y0 T4 @2 \( l- ?
以上是我所知道可能會考的題目(不會再新增題目了)
9 X, H$ ?( I+ i. `1 a; ?" C3 H  e) i
27# 2017-3-24 17:06:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-26 11:05:44 | 显示全部楼层
感谢楼主分享!
28# 2017-3-26 11:05:44 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-3-26 12:37:40 | 显示全部楼层
感谢, 感谢!
29# 2017-3-26 12:37:40 回复 收起回复
回复

使用道具 举报

发表于 2017-3-26 16:19:38 | 显示全部楼层
厉害了
30# 2017-3-26 16:19:38 回复 收起回复
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-6-15 11:13 , Processed in 0.063899 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表