- 积分
- 430
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|

楼主 |
发表于 2017-3-24 14:27:14
|
显示全部楼层
本帖最后由 qwe4925429 于 2017-3-24 16:18 编辑
) T% N9 }. t/ q+ w" s Z* n4 B6 y4 P0 p- T
Q7 Which utility can you use to identify the cause of a traffic flow blockage between two devices in a network? & t8 W9 l) { \4 {9 e7 S
A. ACL analysis tool in APIC-EM
5 H$ w' g- C9 G0 B" UB. ACL path analysis tool in APIC-EM) x! E3 I B. u: ?0 Q
C. APIC-EM automation Schedular; H- Q4 k& c6 Z; [
D. iWAN application
1 G- S8 D( H2 y+ _=> ANSWER: B" l }3 v1 Q9 c6 a- W9 l3 k
答案沒變
: C: Y' y( j2 c4 p5 |" l以下是可能會考的題目 答案並非是正確的 僅供參考(已提供我所知道的題目)9 H, X5 }6 U' g4 _% R) u0 {: Q
Q26 How does a router handle an incoming packet whose destination network is missing from the Routing table?
/ F$ b# o/ G6 h/ m" V lA. it discards the packet" k* l' ~2 }3 {: w4 K
B. it broadcasts the packet to each network on the router+ u, c7 @2 X( N0 m2 `6 W
C. it routes the packet to the default route
1 } p7 i3 n, xD. it broadcasts the packet to each interface on the router
: L6 r" Q' z+ n$ P% ^/ i=> ANSWER: A
# h. v, X8 Z7 K; v l- j; ^2 e! r5 U" }
Q27 Which two options are primary responsibilities of the APIC-EM controller? (Choose two)
. m7 X" x* g" a6 P3 D# M7 MA. It automates network actions between different device types
5 V' m5 D2 N4 t P8 {9 @B. It provides robust asset management& X5 R; J! r5 D$ Z
C. It tracks license usage and Cisco IOS versions
$ P& h" |. o, z$ W! C( T6 tD. It automates network actions between legacy equipment
8 I, M& L5 n- p% }) l6 c( HE. It makes network functions programmable+ W, ^3 m' T$ R) k' ?8 \4 |- t' v
=> ANSWER: A,E
* m1 F; q( R- t: A. j" P+ o3 ~0 ~: p2 _, y3 Y
Q28 Which three options are types of Layer 2 network attack? (Choose three)
. s" G; O! F; z# pA. ARP attacks
' E% M, Z' |" a7 W, [/ v+ B4 ~B. brute force attacks5 J+ b! ~) j$ N3 G4 F1 O9 o
C. spoofing attacks0 t/ R9 A$ x: T; I7 B: v
D. DDOS attacks
% O: F3 ~; g% X6 ]& _$ KE. VLAN hopping
$ h, O9 N; }& d( L0 [2 QF. botnet attacks1 `9 [) K8 f7 L9 S# j
=> ANSWER: A,C,E2 b; W, |2 e$ g& `
4 W9 H l* W# n' Z/ _) x, J( f
Q29 You are working in a data center environment and are assigned the address range
( t9 B' }0 g& l9 _2 V1 B0 b6 v10.188.31.0/23. You are asked to
1 t9 v/ O* r$ A3 `: G) @develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts% N, V6 k$ S2 S2 t
each. Which IP . \4 D4 @# d6 U( N4 y; q6 Q
address range meets these requirements?
( q" b+ k) A% f1 X- \A. 10.188.31.0/26
' F- I1 }8 s2 L$ W( KB. 10.188.31.0/251 Q6 C, t3 L: ~! y7 x
C. 10.188.31.0/28! | J3 A' k2 O- V
D. 10.188.31.0/274 R$ H& B3 ?8 G. H2 e
E. 10.188.31.0/29: t) v/ V7 g* l1 N
=> ANSWER: D
2 m& Q& |" l. }1 D' j8 E1 T8 ?5 [2 L# L. K9 F9 ^( W' t2 s
Q30 By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?( z8 m: m, i, w' g! {
A. 8
1 f; _# F$ ]- N: ZB. 2/ `+ S/ ?1 p- `4 m8 Z8 ]1 @& }
C. 1
: L! h& A& E+ Y( p, I; x$ u9 P8 mD. 0. r7 l! }/ B! X* d
=> ANSWER: C5 z+ }! Z9 g4 m# k' W: l
4 P+ {6 w! P: a2 ^; b/ h% o
Q31 Which two statements about unique local IPv6 addresses are true?
4 ^! h& f2 i; W' _ XA. They are identical to IPv4 private addresses% \ i1 z4 w% J
B. They are defined by RFC 1884
3 x, q6 \6 x; D" [) h- aC. They use the prefix FEC0::/10
9 \. ]" K) q& o; ND. They use the prefix FC00::/7
3 o |4 N3 f" j6 } \E. They can be routed on the IPv6 global internet; ]! T+ p& O8 C8 G) c
=> ANSWER: A,D, G0 R; O" E% A' {. A
- e% N: D0 q0 T8 |
Q32 Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?
1 k' b3 b4 c6 \5 JA. PortFast on the interface
4 `8 ?7 _# S. b' `B. the interface as an access port to allow the voice VLAN ID
& N0 [* m3 V/ }: A6 w4 NC. a voice VLAN ID in interface and global configuration mode6 Y4 {* w) K6 q" h7 ~0 m. |, n- a
D. Cisco Discovery Protocol in global configuration mode
. B6 Y$ U: o! i7 O3 n. H6 y7 p=> ANSWER: B
! ?) K. d* b# x, N
. w6 I0 S6 f; x- c- AQ33 Which identification number is valid for an extended ACL?
/ }: O* O5 ^' JA. 1
: Y; A( w: l# G+ P/ P; ?& DB. 640 J" u- f! c2 t
C. 99
4 m# d6 ~# u7 D9 v) j+ u* bD. 100% [+ M" ^9 c' Y' B k, s
E. 299
, E9 i+ o% g5 j( [, t=> ANSWER: D
6 x T+ \, p4 K4 k
( }3 a4 y+ O# q+ u0 nQ34 Refer to the exhibit5 c C+ R3 }2 G1 C9 Q
. A0 t7 u1 n( o+ P/ S H
After you apply the given configuration to R1, you notice that it failed to enable OSPF Which action
9 x! [# `+ Z" U5 W7 S8 tcan you take to' k; {# M/ t' I4 c& |; M- h
correct the problem?
) v3 J' M: D( ]6 C5 GA. Configure a loopback interface on R1
9 R& M e2 U) OB. Enable IPv6 unicast routing on R1
4 D: J2 ^, T" R" b& @0 k; L; kC. Configure an IPv4 address on interface F0/0* Q! ?, n0 \ t) \' _4 i3 ?+ X, }
D. Configure an autonomous system number on OSPF
0 a! |& _: |+ X$ _6 z. Q& J=> ANSWER: C
& G# W5 E( M& D& s' @: L
! l0 Q/ Y+ P) `0 V* [Q35 Which statement about static routes is true?! _5 P9 B' W7 H2 z* G J! d% E% j
A. The source interface can be configured to make routing decisions$ E: _7 |+ ~6 o7 Y+ K% \- e8 t. Z
B. A subnet mask is entered for the next-hop address
7 Q+ h e3 a6 h" h9 z; Q# ]C. The subnet mask is 255.255 255.0 by default( U: {: w+ O" b& {) j( r& M
D. The exit interface can be specified to indicate where the packets will be routed
9 r+ _- y( }: x=> ANSWER: D 2 W8 B' K. Z/ p2 R( d! n2 n
|
24#
2017-3-24 14:27:14
回复(0)
收起回复
|