- 积分
- 85
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2017-5-8
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
|
950 passed
P3 A$ X* ] [6 T t Z119Q and 130Q都要讀,大約6題新的,; \6 Q# }5 o! r7 Z, }8 ~
Q119部分有爭議答案,我選擇如下
( D* r* g" o$ w, [' oQ51 BD& p$ ]5 R$ ^+ f$ Y6 z. v$ C
Q53 CE$ s! h& }& o: x2 s& _( n
Q54 B% \% \$ K8 k. Q
Q68 AD
. g+ Q+ C" t( ~ b1 r' g$ oQ95 C3 e8 m3 i7 T# T2 Y
Q108 BE
0 F9 X: ^! E9 _
4 `8 L. s, p: V下列為130Q部分題目與119Q重複但答案不一致的選擇,其它沒播的重複題目答案以130Q為主5 }# K: @ Y" L" e* q0 P, m# S
Q130的 QUESTION 50 我選B
) J. c5 u O( e. J( C5 S% DWhich IS-IS metric style is most suitable for MPLS traffic engineering?$ Z% G T- [( q3 y/ S! G
A. flat5 a! x& O0 d: B0 h7 i5 y
B. wide
8 W. P( }. C) \C. narrow
6 @: O# E6 a! vD. transition
7 W. h6 Z U. I# z3 m: \' r& Z' f) {# @% N- a
Q130的 QUESTION 51 我選D8 w& O4 V( `' q3 c! j
Which OpenStack component implements role-based access control?
( Y. h1 Q4 v" y& S- bA. Horizon
' V+ w4 [2 r z, ]% u0 R, h1 O$ _1 IB. Nova t8 B6 O" A* O1 J5 Z# C
C. Neutron
. H8 G/ c% {! W" Z) h8 i2 j" LD. Keystone9 s1 [/ d h& Z, K! c5 o
- R/ o& H5 Q4 v8 i5 l7 AQ130的 QUESTION 107 我選BE
/ k0 @$ f/ t e6 E' t5 |5 e4 s, T0 TUnder which two circumstances is ipsec transport mode appropriate?(Choose two)* d+ w/ g) e5 W3 h# b& y
A. When both hosts are behind IPsec peers- b7 x u* V) o' }4 i0 g) U
B. When IPsec peers are the source and the destination of the traffic8 P6 I/ l- }% P7 e
C. When only one host is behind an IPsec peer
& ^0 }0 J6 J: ]+ |0 J1 pD. When the hosts are transmitting router management traffic* l, W) i3 h- N) J% s
E. When only IPheader authentication is needed: b& N f# Z/ h6 F/ J1 Y0 b N6 T
F. When only IPheader encryption is needed
% o9 {1 N3 d; T2 U0 L# U" s: D$ n4 p) h2 t
Q130的 QUESTION 98 我選BC6 `1 A: F7 k" L7 P4 O8 M
Which two statement about IGmp fitering are true?(Choose two)4 F+ E3 F" e7 e# T ?
A. It supports IGMPv3 traffic only
4 y8 M8 L# N. tB. It allows Anycast RP to operate within a single AS3 z; |7 v, f% I) X7 M
C. It can be implemented on Layer-3 routed ports using the ip igmp access-list command+ o* [; B* P, T, o2 @- |1 A" c/ ~
D. It eliminates the need for a multicast RP
+ X1 X" R2 A( K% Z0 x2 `! F- i+ j, K1 h7 _! m" Q1 Y- g# ]& _
Q130的QUESTION 97 我選D
6 E7 ^& `; {* v, D: ], k1 s4 JWhich statement about Cisco Express Forwarding is true?
1 m/ d& T- I0 @: I9 pA. The FIB table resides on the route processor and the adjacency table resides on the line cards when7 c: V5 {, k" S" C/ R, v" ]7 P
Cisco Express Forwarding is enabled5 z2 ^4 c6 s/ [4 }
B. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is6 a( Z. k4 c1 V) q
enabled
% n, W5 @" i9 P/ \. ^ r* @. A3 nC. Layer 2 next-hop address information is maintained in the FIB table
: Y, }1 y$ N& Q$ gD. Layer 2 next-hop address information is maintained in the adjacency table' z' w! q$ @" w _0 S/ c. P
4 k% s( h: T& r
QUESTION 95 我選D
% z# H. j$ k3 u9 j" IWhich feature can you implement to most efficiently protect customer teaffic in a rate-limited WAN Ethernet. I- x0 a: G9 W% r& {
service?
2 o3 U4 g3 g$ u) n" g. nA. Q-in-Q
) q- H. d' f( q; {B. the IPsec VTI qos pre-classify command* O u* S) d6 U: m2 `. o1 }! b* B
C. HCBWFQ# g; g. [& z4 s5 A
D. Intserv with RSVP) [: d8 b( d& E0 A
E. Diffserv3 t' M5 J9 a8 V F! m
* g& ]2 i# A5 e& f: VQUESTION 46 我選CF+ w! M/ a' C( u5 ]
Which two statements about IPv6 multicast address are true?(Choose two)# j8 Z' G4 O% {: @3 W4 B
A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the
8 f' q# C4 r( m7 U( C; ~! b7 Xnode1 b( ?4 @( F2 L7 W8 h+ `
B. IPv6 routers update their routing tables when they receive a redirect message on a segment$ o. e6 N2 t8 t5 E* D B% n
C. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast
, Q E' m' Q! p1 |* Taddress
6 q+ d7 b6 A- kD. They perform neighbor unreachability detection only for neighbors that send multicast packets
& W# Q0 R f/ f, aE. Neighbors respone to solicitation messages by sending Router Advertisement message: `% H4 y5 Z5 M" Q
F. They use UDP packets to perform neighbor unreachability detection0 o7 o0 P2 B# f9 o \3 _. O3 t
E. It can be implemented on Layer-2 swirchports using IGMP profiles
; b% x3 K) K+ s/ _5 F; ^6 s+ P, q. j' |0 R$ o5 J! [, g
130Q的 Q17我選DEF
! S1 r; h$ E2 p
& D2 @% H# n( p3 yQUESTION 11 我選C
1 K$ |& U( o* p. H2 \. S- I+ d$ zWhich statement about EIGRP request packets is true?
8 e. S% X4 }* r+ VA. They determine whether a destination is reachable7 \- d$ ]! j/ P/ {& K1 {
B. They are transmitted via broadcast
: B; R# `0 a% v% \, {C. They are transmitted unreliably
# R8 k9 C8 Y( \D. They are sent in response to queries
4 {& Q$ y2 D, p6 f' Q: f& M
# ~! _+ D, D1 U |
评分
-
查看全部评分
|