- 积分
- 88
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
950 passed
+ G& _5 [: U' W/ J119Q and 130Q都要讀,大約6題新的,, a: ]! C2 X" K
Q119部分有爭議答案,我選擇如下0 M' N/ [/ X& T- \1 U
Q51 BD
8 ^) Y/ @2 x+ \4 sQ53 CE) W2 ?, s3 {+ B% P; A" v: `
Q54 B6 S9 g, N4 ~1 c7 U
Q68 AD
* j; a: ^, V, G8 aQ95 C5 @- {; D6 A- f% \
Q108 BE" I3 Q. s: L3 i f' b7 `- q1 j0 v: x
0 n2 o& r. j+ @ Q$ B& r2 E
下列為130Q部分題目與119Q重複但答案不一致的選擇,其它沒播的重複題目答案以130Q為主
9 z" k) Q" h8 I. P& f: GQ130的 QUESTION 50 我選B( y( N3 R, M2 O6 _# M6 H5 J2 o! Q
Which IS-IS metric style is most suitable for MPLS traffic engineering?
. g3 i% y2 A# H" K7 D+ SA. flat
" z B% t3 ]6 K0 D4 m8 q6 MB. wide
4 R6 B6 R; l" q% Z2 r$ ^C. narrow
/ ^ q: r& N+ U' W, \: ]9 p9 f4 ND. transition: `. u, I' C5 l0 S9 c! f! C6 }3 n
9 j p0 z& C6 g+ @9 D7 VQ130的 QUESTION 51 我選D5 N( r6 m7 M' b E& y: l; g" W
Which OpenStack component implements role-based access control?, |/ S: k$ b4 j9 O$ ~* r
A. Horizon, B4 a7 B' M9 | O* o# W/ M8 i
B. Nova
$ R4 p6 A2 s* T4 q, i2 J n) vC. Neutron
" n/ E- Q. Y$ J) f- c: a, BD. Keystone; F# i# X( z3 V: e# c v
5 d7 \9 a+ E/ k4 b7 F8 oQ130的 QUESTION 107 我選BE- J* r( y* }9 r+ a' u4 F
Under which two circumstances is ipsec transport mode appropriate?(Choose two)
' f. S) }, Y* q: Q! W/ x' r/ }A. When both hosts are behind IPsec peers
7 {# L _$ S5 L' c$ Y5 `B. When IPsec peers are the source and the destination of the traffic3 \; I" w) c4 h8 q1 Z+ M) R8 c
C. When only one host is behind an IPsec peer
' D n% n z+ D. I3 m7 P+ L, jD. When the hosts are transmitting router management traffic% \5 D. N7 `0 K* F
E. When only IPheader authentication is needed
- T3 f2 w9 x- w1 TF. When only IPheader encryption is needed. K* X8 o: [9 B& I' H
1 `7 T4 R# b; X! g, G
Q130的 QUESTION 98 我選BC
- {( c- Q* A5 v2 v: Z. G& iWhich two statement about IGmp fitering are true?(Choose two)+ C( x2 v" J K: Y- N
A. It supports IGMPv3 traffic only' h3 e: G3 {9 f
B. It allows Anycast RP to operate within a single AS
]/ m1 E0 ^2 h V6 pC. It can be implemented on Layer-3 routed ports using the ip igmp access-list command
& l6 }7 u/ T; m( wD. It eliminates the need for a multicast RP
" Y# k) q( g [) B
, |1 ^' F' p3 xQ130的QUESTION 97 我選D, r) x1 b" u' [$ u3 R
Which statement about Cisco Express Forwarding is true?
0 W. n$ N2 w( F: DA. The FIB table resides on the route processor and the adjacency table resides on the line cards when; q) [; e6 f$ n3 r3 p
Cisco Express Forwarding is enabled. J* L2 }( L v4 |' a2 Z+ Y' N
B. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is3 p7 u, w5 k& K
enabled
7 o4 P/ o0 a5 ZC. Layer 2 next-hop address information is maintained in the FIB table5 R- V: \ }' w/ l/ d7 a- _
D. Layer 2 next-hop address information is maintained in the adjacency table
. [2 T" |: R2 p) l
; e# n4 l/ N J+ Z1 F" ]QUESTION 95 我選D
+ [; A& ?1 {) \; ]& i9 kWhich feature can you implement to most efficiently protect customer teaffic in a rate-limited WAN Ethernet. @/ t. @; s- [3 j0 m2 ^1 O
service?% h4 V/ k9 W" i- x9 S
A. Q-in-Q
; Y. ~ O7 r# ]$ r3 h6 Z6 fB. the IPsec VTI qos pre-classify command
6 h$ ]' w# Y. {$ a$ M0 KC. HCBWFQ
; N! W. H1 ^/ N& I; P# _D. Intserv with RSVP: Z! E- a' r5 q* E7 l
E. Diffserv
3 E5 I( B* m( p! Q! h
" W) I, d0 K1 p9 l- I5 I2 jQUESTION 46 我選CF/ P/ C- ^" z3 C0 L5 t( O
Which two statements about IPv6 multicast address are true?(Choose two)( {5 r. r T+ A4 |4 z1 k
A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the
- J7 F3 `& f+ G+ |; R: s8 G) }node7 N, h* n8 j& P0 S( {" ~. o' O
B. IPv6 routers update their routing tables when they receive a redirect message on a segment5 ~4 \3 `: |7 }$ m9 v6 R! s2 n
C. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast. u2 s' O4 i5 t3 k F( C
address$ @+ f/ ?# w2 e7 R6 c
D. They perform neighbor unreachability detection only for neighbors that send multicast packets
3 q9 j/ I) l3 l: ?7 BE. Neighbors respone to solicitation messages by sending Router Advertisement message ?7 M3 @3 m5 M( j+ K2 t4 F
F. They use UDP packets to perform neighbor unreachability detection3 Y$ y( I4 J) K" y
E. It can be implemented on Layer-2 swirchports using IGMP profiles
: D0 m# s( y* `5 j* K. w5 F# q+ s" l! z% t7 u8 H( j
130Q的 Q17我選DEF
. G+ B! A. g- F: m- }/ e; |$ T+ E5 I# t, \6 D& ~( {, A( }: n; C# ]/ ]
QUESTION 11 我選C; t; j$ }5 @4 _4 O7 J7 |
Which statement about EIGRP request packets is true?
$ B9 M0 N# j- n1 KA. They determine whether a destination is reachable
4 B+ ^' d0 b$ @+ H' @# U( bB. They are transmitted via broadcast
7 C( }3 a7 H' d3 k9 KC. They are transmitted unreliably
" s" m# j' a) W3 ]- j- d7 ]6 \D. They are sent in response to queries) p* t) E4 D% V4 Z' ~
- H5 D2 x) x8 L1 w2 M+ {3 ~ |
评分
-
查看全部评分
|