设为首页收藏本站language 语言切换
查看: 2972|回复: 5
收起左侧

[其他] 4月10日路由题库的几道题

[复制链接]
发表于 2017-4-15 00:00:23 | 显示全部楼层 |阅读模式
求高手指导,QUESTION 222和QUESTION 202、QUESTION 223和QUESTION 220,好像答案有点问题# C  s5 I# c1 [2 \! z+ g

+ f5 a) P. l/ E& vQUESTION 222- B) \8 i1 k( Q3 u# l. z7 ?, I  T
What’s uRPF checking first when the packet enters the interface ? or when unicast reverse patch forwarding is configured on interinterface.
5 R4 T# E3 \2 ~& xA. it check the ingress access list: c% b$ E: n+ @  O8 Q4 `  w
B. it check the egress access list
' h6 M1 x8 }9 a/ ?3 R0 @C. Route available in FIB ot it verifies a reverse patch via the fib to the source9 t  o/ P4 A5 `  a9 \7 [; g
D. it verify that the source has a......
6 j- o  G" q/ N& u, y/ k: v% ICorrect Answer: C
. O4 V# A6 ~" @
, ^+ h/ x( }6 _/ ~2 ~. t$ _. {QUESTION 202
8 B9 k7 h1 X2 _1 C+ [* l0 sWhen unicast reverse path forwarding is configured on an interface, which action does the interface take first when it receives a packet?
2 H' P: o( u; Q& d$ PA. It check the ingress access list
, S4 C4 x( q2 n' Z8 f5 O0 |. G2 HB. It check the egress access list% ^: d" G, g5 T
C. It verifies that the source has a valid CEF adjacency; h- J( H/ g4 B4 J. b6 Y0 Z
D. It verifies a reverse path via the FIB to the source! N, R- z6 ?" k& r- R
Correct Answer: A
2 Q$ q& w' k% o5 m; ]: Y' K* d
& i, f, k6 D# k! a( hQUESTION 223
! d8 r/ b9 Y$ P# N7 S( CTwo scenarios for preventing fragmentation on GRE tunnel(Choose two)
) T8 l1 i+ K5 r: s- r0 P2 YA. TCP MSS
+ {) R; U% k- {B. DF Bit Clear
+ z* I: p! a& K% I7 `/ ^. lC. IP MTU
( t7 e9 y' b" w- d* KD. PMTUD
- }4 x2 P0 u) {E. http://bbs.hh010.com/
1 t* Z. n3 z; M. d) LF. http://bbs.hh010.com/
5 V( v% i/ I9 ZCorrect Answer: AD
$ W+ {1 {3 {& Z. v" F% X4 N/ S* z4 R  V
QUESTION 2204 \) H! |9 f! Q
Two GRE sccenarios for preventing(Choose two)
* a0 c  |2 `2 _) kA. TCP MSS# e/ M5 O; L3 R6 E4 o
B. DF Bit1 R3 N6 n5 S- Y" W/ a
C. http://bbs.hh010.com/
1 O- ]6 _9 Q* p% L- P" R, a8 d4 xD. http://bbs.hh010.com/% e; B- G7 `7 |; I/ m; m1 r
Correct Answer: AB
% `- R& j8 u0 |$ c. H. S* i0 H1 [; U1 P7 W5 N' B
发表于 2017-4-18 11:38:35 | 显示全部楼层
本帖最后由 liugangpaul 于 2017-4-18 12:13 编辑 ' E1 N7 d7 @' o1 z* W
2 Z- {4 G* r, S- S. ]
QUESTION 202和222问的其实是一样的内容
2 P) u) n- r- M3 Z- K4 ?+ [0 d/ c6 h参考CCNP学习指南英文版(300新版)关于uRPF的叙述:
% X9 b9 w" {+ x3 g7 \Network administrators can use Unicast Reverse Path Forwarding (uRPF) to help limit
$ M* g. P  _" S7 Sthe malicious traffic on an enterprise network. This security feature works with Cisco, ^) y8 q: c+ C1 o4 A. n/ R
Express Forwarding (CEF) by enabling the router to verify that the source of any IP
" O0 \( m* B$ i6 ~  mpackets received is in the CEF table and reachable via the routing table. If the source IP
+ R6 u4 q" h% o) ^, y) `address is not valid, the packet is discarded.

$ N5 P6 R8 b$ X( Y1 g9 t

! c. n' T5 p, i) I6 naccess list与ACL有关,可以排除% [! N) A8 O- u' j/ T) P
CEF和FIB,我倾向于选FIB,符合上述中的reachable via the routing table
6 Q9 {% p3 c' N5 U
- y7 ]; \- m* z, O+ |' M3 `+ m; Y, n' v  v/ d& A5 C
8 Z* F- K6 S* ~4 E$ `( X
请各位指教, z& \* D& x9 x( L
地板 2017-4-18 11:38:35 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-4-18 12:41:42 | 显示全部楼层
220和223看起来也像同一道题,我选TCP MSS和PMTUD
% T, ~* P. F2 @. @8 i0 U3 _+ c4 U( Y" i, S3 v3 M' x: U& p
参见http://www.cisco.com/c/en/us/sup ... 5-pmtud-ipfrag.html
5# 2017-4-18 12:41:42 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-4-24 00:12:54 | 显示全部楼层
请教有正确答案了吗?
6# 2017-4-24 00:12:54 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-24 13:54 , Processed in 0.132664 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表