设为首页收藏本站language 语言切换
查看: 3306|回复: 16
收起左侧

[笔试战报] 05/16 CCIE笔试PASS , 119Q and 130Q valid

[复制链接]
发表于 2017-5-16 16:34:20 | 显示全部楼层 |阅读模式
950 passed' D/ z: @& z4 X6 V
119Q and 130Q都要讀,大約6題新的,( d+ y8 |; F8 s
Q119部分有爭議答案,我選擇如下+ P& N9 ^' _, P7 f- ~/ X
Q51 BD5 u, _" b9 l3 t( ~( S8 u: y
Q53 CE
) v2 o- {% ^+ M" q- P4 f# X2 a. P2 HQ54 B" s5 b# @$ y1 c2 a* E
Q68 AD
  J; r- t$ t% w2 z# F+ `4 P/ aQ95 C' v7 z- }% ^- Q* H$ e" O
Q108 BE
8 v6 F3 R: R' f  s( e, Z( W' Y% ^' h! _
下列為130Q部分題目與119Q重複但答案不一致的選擇,其它沒播的重複題目答案以130Q為主
# g6 N! A/ c) @Q130的  QUESTION 50 我選B. H4 r3 y$ C! Q* a: F
Which IS-IS metric style is most suitable for MPLS traffic engineering?
: I& f6 @/ _4 x. Q6 g7 ^6 }A. flat/ F( S+ N: F9 a- h0 E
B. wide
8 K3 d/ m. r1 rC. narrow
' u9 C& r& P# K, |  }D. transition
  u5 d4 Z( r& v+ |; {9 x- G: ?" @# \2 N5 J" `
Q130的 QUESTION 51 我選D3 z3 u  Q" p, m
Which OpenStack component implements role-based access control?
1 z3 D  N4 W' n* u8 A' FA. Horizon) L) k5 G. E0 R  e$ Y
B. Nova- f! _6 y# Q4 @, k" b, s
C. Neutron+ G( P: Y2 v7 [9 S% C
D. Keystone
; r3 k0 c  r7 s# p. v
4 A, x/ b7 L3 d2 t2 {Q130的 QUESTION 107 我選BE
# M0 z5 g4 x( u0 `1 pUnder which two circumstances is ipsec transport mode appropriate?(Choose two)
9 q2 v9 T& l( N7 |A. When both hosts are behind IPsec peers' D# O1 _7 A6 R( `
B. When IPsec peers are the source and the destination of the traffic0 K0 E- \9 I# i3 C9 d2 t
C. When only one host is behind an IPsec peer% D# I" ^; y# E" S' s' e
D. When the hosts are transmitting router management traffic
! t7 p$ }+ m  c( u. C( yE. When only IPheader authentication is needed3 S5 w3 D6 _* M1 u
F. When only IPheader encryption is needed
; X1 b& o3 T5 m% t/ V: I. g, S" F/ ]' q. D# u! F
Q130的 QUESTION 98 我選BC
, a0 R  ]" H8 _0 |/ m7 vWhich two statement about IGmp fitering are true?(Choose two)& ]  T( F4 S6 q, N2 u/ y4 N
A. It supports IGMPv3 traffic only! Z1 c9 g0 s0 M
B. It allows Anycast RP to operate within a single AS/ t* {* Q- L+ I. e$ P, l& n
C. It can be implemented on Layer-3 routed ports using the ip igmp access-list command* J$ \. N% e2 R6 v% l6 R
D. It eliminates the need for a multicast RP/ n: E" f7 J5 s3 i; U

) J: e  [- P4 IQ130的QUESTION 97 我選D! [) v1 `; j7 C3 r+ `) |, W" G$ O9 o
Which statement about Cisco Express Forwarding is true?
  C9 O8 f3 q# S6 y& DA. The FIB table resides on the route processor and the adjacency table resides on the line cards when
0 r- k( b, p# h( ACisco Express Forwarding is enabled
3 y* {9 n: x: n2 {% r) p. lB. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is
6 ]% a! }* J" E% ]enabled
' }# G) v$ v, G, b  ]/ p, mC. Layer 2 next-hop address information is maintained in the FIB table
9 B: k$ Q8 ]1 uD. Layer 2 next-hop address information is maintained in the adjacency table" c8 ]/ y3 K3 l( ^8 e1 A; Q) x

+ {$ [* O% U, f& FQUESTION 95 我選D
# f9 t& a( ~2 T1 i3 v- z! sWhich feature can you implement to most efficiently protect customer teaffic in a rate-limited WAN Ethernet
, e, q. c5 z$ K& V( u2 V* I0 g& \service?
  ?8 T, T, x3 o; v# [A. Q-in-Q
5 I  R- t$ P, H" ^4 B9 EB. the IPsec VTI qos pre-classify command' u/ m& g" A) R4 J0 Z( [# R
C. HCBWFQ
' o0 @0 y8 p* L2 {& B" E! jD. Intserv with RSVP
; ]1 Z! n8 l; f0 O: v( oE. Diffserv3 H2 @! Q8 u+ t9 l4 B% z3 P
1 Z" c3 B) i( B$ Q" b2 Q  f( Y
QUESTION 46 我選CF; g, b4 j. [2 r8 h1 Z) N+ v
Which two statements about IPv6 multicast address are true?(Choose two)
) R8 D2 z; _- @A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the8 i+ l1 p& H4 o! P( s2 C
node
, s) p3 z- A  u8 i1 ^& R2 SB. IPv6 routers update their routing tables when they receive a redirect message on a segment
1 Z* \* p* E; p/ UC. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast1 H" ^  q0 [# r: ^: J$ t
address
; v2 |2 d4 R7 w  A/ CD. They perform neighbor unreachability detection only for neighbors that send multicast packets* H1 {) o, W( P! {0 G
E. Neighbors respone to solicitation messages by sending Router Advertisement message6 r% T8 Z: [7 l2 h9 \/ t# B
F. They use UDP packets to perform neighbor unreachability detection" |# v$ n. n2 {7 u1 ]1 R$ m
E. It can be implemented on Layer-2 swirchports using IGMP profiles
* o" @$ E0 v' W0 G$ I9 f  s2 a* Q
130Q的 Q17我選DEF
' {) A3 P. y6 e- [: Q3 W' G
2 U* |+ l* N/ b: jQUESTION 11 我選C: N6 x, o. Q/ z# j$ D2 Y. W
Which statement about EIGRP request packets is true?# n  E7 w( h$ U  d6 P- @
A. They determine whether a destination is reachable
' f8 E" ^9 J  P1 F; P3 a# WB. They are transmitted via broadcast( \/ c6 |4 e( d; I
C. They are transmitted unreliably
0 [6 x, O) ^9 X/ J; Q% @5 S9 O- ?& |D. They are sent in response to queries
; ?- B* M, R  S& s6 f6 f6 H3 s& }# ^  A3 m( p, c" R

评分

参与人数 1鸿鹄币 +100 威望 +2 收起 理由
小乔 + 100 + 2 很给力!

查看全部评分

发表于 2017-5-16 21:43:47 | 显示全部楼层
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
沙发 2017-5-16 21:43:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 21:43:56 | 显示全部楼层
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
板凳 2017-5-16 21:43:56 回复 收起回复
回复 支持 0 反对 1

使用道具 举报

发表于 2017-5-16 22:18:46 | 显示全部楼层
0_1 发表于 2017-5-16 21:436 z2 H6 p# K# y) f( Q- S
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
/ q" ]/ h4 X! O( ~4 |
Request Packets – Request packets are used to get specific information from one or more neighbors and are used in route server applications. These packet types can be sent either via Multicast or Unicast, but are always transmitted unreliably.: \* F- K/ M/ T7 e+ v' x
---http://ericleahy.com/index.php/eigrp-packets-neighborships/! ^, s) r$ a( {- Z: Z; k
通过上面看,应该是不可靠的,所以,C应该是对的
地板 2017-5-16 22:18:46 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:18:52 | 显示全部楼层
0_1 发表于 2017-5-16 21:43% z( h) ?3 i: |' E* ?  C
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

6 G, }8 [9 {/ l9 JRequest Packets – Request packets are used to get specific information from one or more neighbors and are used in route server applications. These packet types can be sent either via Multicast or Unicast, but are always transmitted unreliably.
9 Q6 J* }/ s" d) p---http://ericleahy.com/index.php/eigrp-packets-neighborships/4 g  A4 ~& K6 B. n( q* E
通过上面看,应该是不可靠的,所以,C应该是对的
5# 2017-5-16 22:18:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:22:22 | 显示全部楼层
0_1 发表于 2017-5-16 21:43" c: p7 P$ H5 `
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

8 [, k' g& ^1 ghttp://www.cisco.com/c/en/us/sup ... -eigrp/13669-1.html5 ?9 ]. x" W: L6 c5 C$ ?

( N3 S+ y) z( C( ]( w, a) l  @. @Requests are transmitted unreliably.
5 L' |# [: v& u3 D1 A1 Y7 W
8 W% P, o% P; v: j1 B# p这里显示EIGRP的请求是传输不可靠的
6# 2017-5-16 22:22:22 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:22:27 | 显示全部楼层
0_1 发表于 2017-5-16 21:43# W8 C9 I- m- o$ k2 e
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

3 w. _! Q2 T2 X+ T% ^' Phttp://www.cisco.com/c/en/us/sup ... -eigrp/13669-1.html. q  H: Y* q6 N& F" e. e

- w, {6 J6 M/ b; Y) ERequests are transmitted unreliably.
6 D/ _/ E6 @/ m9 v* \
! N" d8 J5 {3 Y这里显示EIGRP的请求是传输不可靠的
7# 2017-5-16 22:22:27 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:48:43 | 显示全部楼层
0_1 发表于 2017-5-16 21:43. e9 r6 T% `" _- L7 _6 I
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

/ `) t; ~# g  }肯定是C
8# 2017-5-16 22:48:43 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-17 10:22:25 | 显示全部楼层
牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛
9# 2017-5-17 10:22:25 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-17 22:47:39 | 显示全部楼层
Congratulations
11# 2017-5-17 22:47:39 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-19 09:59:59 | 显示全部楼层
可以分享下130么   感激不尽
15# 2017-5-19 09:59:59 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-24 16:46 , Processed in 0.090493 second(s), 26 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表