- 积分
- 88
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
950 passed' D/ z: @& z4 X6 V
119Q and 130Q都要讀,大約6題新的,( d+ y8 |; F8 s
Q119部分有爭議答案,我選擇如下+ P& N9 ^' _, P7 f- ~/ X
Q51 BD5 u, _" b9 l3 t( ~( S8 u: y
Q53 CE
) v2 o- {% ^+ M" q- P4 f# X2 a. P2 HQ54 B" s5 b# @$ y1 c2 a* E
Q68 AD
J; r- t$ t% w2 z# F+ `4 P/ aQ95 C' v7 z- }% ^- Q* H$ e" O
Q108 BE
8 v6 F3 R: R' f s( e, Z( W' Y% ^' h! _
下列為130Q部分題目與119Q重複但答案不一致的選擇,其它沒播的重複題目答案以130Q為主
# g6 N! A/ c) @Q130的 QUESTION 50 我選B. H4 r3 y$ C! Q* a: F
Which IS-IS metric style is most suitable for MPLS traffic engineering?
: I& f6 @/ _4 x. Q6 g7 ^6 }A. flat/ F( S+ N: F9 a- h0 E
B. wide
8 K3 d/ m. r1 rC. narrow
' u9 C& r& P# K, | }D. transition
u5 d4 Z( r& v+ |; {9 x- G: ?" @# \2 N5 J" `
Q130的 QUESTION 51 我選D3 z3 u Q" p, m
Which OpenStack component implements role-based access control?
1 z3 D N4 W' n* u8 A' FA. Horizon) L) k5 G. E0 R e$ Y
B. Nova- f! _6 y# Q4 @, k" b, s
C. Neutron+ G( P: Y2 v7 [9 S% C
D. Keystone
; r3 k0 c r7 s# p. v
4 A, x/ b7 L3 d2 t2 {Q130的 QUESTION 107 我選BE
# M0 z5 g4 x( u0 `1 pUnder which two circumstances is ipsec transport mode appropriate?(Choose two)
9 q2 v9 T& l( N7 |A. When both hosts are behind IPsec peers' D# O1 _7 A6 R( `
B. When IPsec peers are the source and the destination of the traffic0 K0 E- \9 I# i3 C9 d2 t
C. When only one host is behind an IPsec peer% D# I" ^; y# E" S' s' e
D. When the hosts are transmitting router management traffic
! t7 p$ }+ m c( u. C( yE. When only IPheader authentication is needed3 S5 w3 D6 _* M1 u
F. When only IPheader encryption is needed
; X1 b& o3 T5 m% t/ V: I. g, S" F/ ]' q. D# u! F
Q130的 QUESTION 98 我選BC
, a0 R ]" H8 _0 |/ m7 vWhich two statement about IGmp fitering are true?(Choose two)& ] T( F4 S6 q, N2 u/ y4 N
A. It supports IGMPv3 traffic only! Z1 c9 g0 s0 M
B. It allows Anycast RP to operate within a single AS/ t* {* Q- L+ I. e$ P, l& n
C. It can be implemented on Layer-3 routed ports using the ip igmp access-list command* J$ \. N% e2 R6 v% l6 R
D. It eliminates the need for a multicast RP/ n: E" f7 J5 s3 i; U
) J: e [- P4 IQ130的QUESTION 97 我選D! [) v1 `; j7 C3 r+ `) |, W" G$ O9 o
Which statement about Cisco Express Forwarding is true?
C9 O8 f3 q# S6 y& DA. The FIB table resides on the route processor and the adjacency table resides on the line cards when
0 r- k( b, p# h( ACisco Express Forwarding is enabled
3 y* {9 n: x: n2 {% r) p. lB. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is
6 ]% a! }* J" E% ]enabled
' }# G) v$ v, G, b ]/ p, mC. Layer 2 next-hop address information is maintained in the FIB table
9 B: k$ Q8 ]1 uD. Layer 2 next-hop address information is maintained in the adjacency table" c8 ]/ y3 K3 l( ^8 e1 A; Q) x
+ {$ [* O% U, f& FQUESTION 95 我選D
# f9 t& a( ~2 T1 i3 v- z! sWhich feature can you implement to most efficiently protect customer teaffic in a rate-limited WAN Ethernet
, e, q. c5 z$ K& V( u2 V* I0 g& \service?
?8 T, T, x3 o; v# [A. Q-in-Q
5 I R- t$ P, H" ^4 B9 EB. the IPsec VTI qos pre-classify command' u/ m& g" A) R4 J0 Z( [# R
C. HCBWFQ
' o0 @0 y8 p* L2 {& B" E! jD. Intserv with RSVP
; ]1 Z! n8 l; f0 O: v( oE. Diffserv3 H2 @! Q8 u+ t9 l4 B% z3 P
1 Z" c3 B) i( B$ Q" b2 Q f( Y
QUESTION 46 我選CF; g, b4 j. [2 r8 h1 Z) N+ v
Which two statements about IPv6 multicast address are true?(Choose two)
) R8 D2 z; _- @A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the8 i+ l1 p& H4 o! P( s2 C
node
, s) p3 z- A u8 i1 ^& R2 SB. IPv6 routers update their routing tables when they receive a redirect message on a segment
1 Z* \* p* E; p/ UC. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast1 H" ^ q0 [# r: ^: J$ t
address
; v2 |2 d4 R7 w A/ CD. They perform neighbor unreachability detection only for neighbors that send multicast packets* H1 {) o, W( P! {0 G
E. Neighbors respone to solicitation messages by sending Router Advertisement message6 r% T8 Z: [7 l2 h9 \/ t# B
F. They use UDP packets to perform neighbor unreachability detection" |# v$ n. n2 {7 u1 ]1 R$ m
E. It can be implemented on Layer-2 swirchports using IGMP profiles
* o" @$ E0 v' W0 G$ I9 f s2 a* Q
130Q的 Q17我選DEF
' {) A3 P. y6 e- [: Q3 W' G
2 U* |+ l* N/ b: jQUESTION 11 我選C: N6 x, o. Q/ z# j$ D2 Y. W
Which statement about EIGRP request packets is true?# n E7 w( h$ U d6 P- @
A. They determine whether a destination is reachable
' f8 E" ^9 J P1 F; P3 a# WB. They are transmitted via broadcast( \/ c6 |4 e( d; I
C. They are transmitted unreliably
0 [6 x, O) ^9 X/ J; Q% @5 S9 O- ?& |D. They are sent in response to queries
; ?- B* M, R S& s6 f6 f6 H3 s& }# ^ A3 m( p, c" R
|
评分
-
查看全部评分
|