设为首页收藏本站language→→ 语言切换

鸿鹄论坛

 找回密码
 论坛注册

QQ登录

先注册再绑定QQ

查看: 2102|回复: 16
收起左侧

[笔试战报] 05/16 CCIE笔试PASS , 119Q and 130Q valid

[复制链接]
发表于 2017-5-16 16:34:20 | 显示全部楼层 |阅读模式
950 passed
  P3 A$ X* ]  [6 T  t  Z119Q and 130Q都要讀,大約6題新的,; \6 Q# }5 o! r7 Z, }8 ~
Q119部分有爭議答案,我選擇如下
( D* r* g" o$ w, [' oQ51 BD& p$ ]5 R$ ^+ f$ Y6 z. v$ C
Q53 CE$ s! h& }& o: x2 s& _( n
Q54 B% \% \$ K8 k. Q
Q68 AD
. g+ Q+ C" t( ~  b1 r' g$ oQ95 C3 e8 m3 i7 T# T2 Y
Q108 BE
0 F9 X: ^! E9 _
4 `8 L. s, p: V下列為130Q部分題目與119Q重複但答案不一致的選擇,其它沒播的重複題目答案以130Q為主5 }# K: @  Y" L" e* q0 P, m# S
Q130的  QUESTION 50 我選B
) J. c5 u  O( e. J( C5 S% DWhich IS-IS metric style is most suitable for MPLS traffic engineering?$ Z% G  T- [( q3 y/ S! G
A. flat5 a! x& O0 d: B0 h7 i5 y
B. wide
8 W. P( }. C) \C. narrow
6 @: O# E6 a! vD. transition
7 W. h6 Z  U. I# z3 m: \' r& Z' f) {# @% N- a
Q130的 QUESTION 51 我選D8 w& O4 V( `' q3 c! j
Which OpenStack component implements role-based access control?
( Y. h1 Q4 v" y& S- bA. Horizon
' V+ w4 [2 r  z, ]% u0 R, h1 O$ _1 IB. Nova  t8 B6 O" A* O1 J5 Z# C
C. Neutron
. H8 G/ c% {! W" Z) h8 i2 j" LD. Keystone9 s1 [/ d  h& Z, K! c5 o

- R/ o& H5 Q4 v8 i5 l7 AQ130的 QUESTION 107 我選BE
/ k0 @$ f/ t  e6 E' t5 |5 e4 s, T0 TUnder which two circumstances is ipsec transport mode appropriate?(Choose two)* d+ w/ g) e5 W3 h# b& y
A. When both hosts are behind IPsec peers- b7 x  u* V) o' }4 i0 g) U
B. When IPsec peers are the source and the destination of the traffic8 P6 I/ l- }% P7 e
C. When only one host is behind an IPsec peer
& ^0 }0 J6 J: ]+ |0 J1 pD. When the hosts are transmitting router management traffic* l, W) i3 h- N) J% s
E. When only IPheader authentication is needed: b& N  f# Z/ h6 F/ J1 Y0 b  N6 T
F. When only IPheader encryption is needed
% o9 {1 N3 d; T2 U0 L# U" s: D$ n4 p) h2 t
Q130的 QUESTION 98 我選BC6 `1 A: F7 k" L7 P4 O8 M
Which two statement about IGmp fitering are true?(Choose two)4 F+ E3 F" e7 e# T  ?
A. It supports IGMPv3 traffic only
4 y8 M8 L# N. tB. It allows Anycast RP to operate within a single AS3 z; |7 v, f% I) X7 M
C. It can be implemented on Layer-3 routed ports using the ip igmp access-list command+ o* [; B* P, T, o2 @- |1 A" c/ ~
D. It eliminates the need for a multicast RP
+ X1 X" R2 A( K% Z0 x2 `! F- i+ j, K1 h7 _! m" Q1 Y- g# ]& _
Q130的QUESTION 97 我選D
6 E7 ^& `; {* v, D: ], k1 s4 JWhich statement about Cisco Express Forwarding is true?
1 m/ d& T- I0 @: I9 pA. The FIB table resides on the route processor and the adjacency table resides on the line cards when7 c: V5 {, k" S" C/ R, v" ]7 P
Cisco Express Forwarding is enabled5 z2 ^4 c6 s/ [4 }
B. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is6 a( Z. k4 c1 V) q
enabled
% n, W5 @" i9 P/ \. ^  r* @. A3 nC. Layer 2 next-hop address information is maintained in the FIB table
: Y, }1 y$ N& Q$ gD. Layer 2 next-hop address information is maintained in the adjacency table' z' w! q$ @" w  _0 S/ c. P
4 k% s( h: T& r
QUESTION 95 我選D
% z# H. j$ k3 u9 j" IWhich feature can you implement to most efficiently protect customer teaffic in a rate-limited WAN Ethernet. I- x0 a: G9 W% r& {
service?
2 o3 U4 g3 g$ u) n" g. nA. Q-in-Q
) q- H. d' f( q; {B. the IPsec VTI qos pre-classify command* O  u* S) d6 U: m2 `. o1 }! b* B
C. HCBWFQ# g; g. [& z4 s5 A
D. Intserv with RSVP) [: d8 b( d& E0 A
E. Diffserv3 t' M5 J9 a8 V  F! m

* g& ]2 i# A5 e& f: VQUESTION 46 我選CF+ w! M/ a' C( u5 ]
Which two statements about IPv6 multicast address are true?(Choose two)# j8 Z' G4 O% {: @3 W4 B
A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the
8 f' q# C4 r( m7 U( C; ~! b7 Xnode1 b( ?4 @( F2 L7 W8 h+ `
B. IPv6 routers update their routing tables when they receive a redirect message on a segment$ o. e6 N2 t8 t5 E* D  B% n
C. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast
, Q  E' m' Q! p1 |* Taddress
6 q+ d7 b6 A- kD. They perform neighbor unreachability detection only for neighbors that send multicast packets
& W# Q0 R  f/ f, aE. Neighbors respone to solicitation messages by sending Router Advertisement message: `% H4 y5 Z5 M" Q
F. They use UDP packets to perform neighbor unreachability detection0 o7 o0 P2 B# f9 o  \3 _. O3 t
E. It can be implemented on Layer-2 swirchports using IGMP profiles
; b% x3 K) K+ s/ _5 F; ^6 s+ P, q. j' |0 R$ o5 J! [, g
130Q的 Q17我選DEF
! S1 r; h$ E2 p
& D2 @% H# n( p3 yQUESTION 11 我選C
1 K$ |& U( o* p. H2 \. S- I+ d$ zWhich statement about EIGRP request packets is true?
8 e. S% X4 }* r+ VA. They determine whether a destination is reachable7 \- d$ ]! j/ P/ {& K1 {
B. They are transmitted via broadcast
: B; R# `0 a% v% \, {C. They are transmitted unreliably
# R8 k9 C8 Y( \D. They are sent in response to queries
4 {& Q$ y2 D, p6 f' Q: f& M
# ~! _+ D, D1 U

评分

参与人数 1鸿鹄币 +100 威望 +2 收起 理由
小乔 + 100 + 2 很给力!

查看全部评分

发表于 2017-5-16 21:43:47 | 显示全部楼层
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
沙发 2017-5-16 21:43:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 21:43:56 | 显示全部楼层
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
板凳 2017-5-16 21:43:56 回复 收起回复
回复 支持 0 反对 1

使用道具 举报

发表于 2017-5-16 22:18:46 | 显示全部楼层
0_1 发表于 2017-5-16 21:432 y2 s& W, \7 E' R* T& E
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
* t6 W0 }2 u* J# i. Y$ T
Request Packets – Request packets are used to get specific information from one or more neighbors and are used in route server applications. These packet types can be sent either via Multicast or Unicast, but are always transmitted unreliably.
: l: x# {3 n- e) j, M4 R) F---http://ericleahy.com/index.php/eigrp-packets-neighborships/- P2 R# S1 b* {/ ]8 [. D% z
通过上面看,应该是不可靠的,所以,C应该是对的
地板 2017-5-16 22:18:46 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:18:52 | 显示全部楼层
0_1 发表于 2017-5-16 21:43$ [5 g3 \% k7 p
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
' j$ {( b- N/ M, D) V9 ]/ Q8 [& z. A
Request Packets – Request packets are used to get specific information from one or more neighbors and are used in route server applications. These packet types can be sent either via Multicast or Unicast, but are always transmitted unreliably.% k7 B. q' T% z! c7 W& m
---http://ericleahy.com/index.php/eigrp-packets-neighborships/8 M' n! g' v% N4 `) ^" H- V/ H9 s
通过上面看,应该是不可靠的,所以,C应该是对的
5# 2017-5-16 22:18:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:22:22 | 显示全部楼层
0_1 发表于 2017-5-16 21:43
' D6 I1 P% G$ f! Z  tWhich statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

1 `4 y$ R  c- D# R0 Y2 P! \* x. Khttp://www.cisco.com/c/en/us/sup ... -eigrp/13669-1.html5 [* P+ |2 ]) m( `" g0 X. p( W0 ?" @; [' Y
3 g% G: C  u# ~+ c. `
Requests are transmitted unreliably.& m% G; |: C( O! n  @8 o
: @1 v& k7 s4 }9 D7 ~+ O
这里显示EIGRP的请求是传输不可靠的
6# 2017-5-16 22:22:22 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:22:27 | 显示全部楼层
0_1 发表于 2017-5-16 21:43
  a6 |; d2 ]' x% R/ J7 z$ D9 jWhich statement about EIGRP request packets is true?不能是C,EIGRP是可靠的
1 \/ _( ]# Z- X1 p& A0 v: W
http://www.cisco.com/c/en/us/sup ... -eigrp/13669-1.html5 a$ }& J* p  Z7 Q
) _$ r3 `+ M8 V7 q0 {3 X5 r
Requests are transmitted unreliably.
( O. x$ c3 j  C" c0 {5 M
- p6 o* W3 c5 ^3 V, T8 Q这里显示EIGRP的请求是传输不可靠的
7# 2017-5-16 22:22:27 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-16 22:48:43 | 显示全部楼层
0_1 发表于 2017-5-16 21:43+ X0 o7 Z8 X& W$ H
Which statement about EIGRP request packets is true?不能是C,EIGRP是可靠的

- @3 S* C/ a2 n0 Q% K: r肯定是C
8# 2017-5-16 22:48:43 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-17 10:22:25 | 显示全部楼层
牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛 牛
9# 2017-5-17 10:22:25 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-17 22:47:39 | 显示全部楼层
Congratulations
11# 2017-5-17 22:47:39 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-19 09:59:59 | 显示全部楼层
可以分享下130么   感激不尽
15# 2017-5-19 09:59:59 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2024-5-22 11:57 , Processed in 0.070696 second(s), 13 queries , Redis On.  

  Powered by Discuz!

  © 2001-2024 HH010.COM

快速回复 返回顶部 返回列表