- 积分
- 125
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
发表于 2018-5-25 21:15:20
|
显示全部楼层
) a/ f! ]" g( C' V& s- \+ _請問題目是像這樣嗎? ) t4 Q9 b! J' C
& i) _( \/ ^* c, }0 k4 _- xQUESTION 1
& D* G2 H4 Y# eThe following commands are issued on a Cisco Router:
0 n) U/ F# N7 k9 p# p3 Z% TRouter(configuration)#access-list 199 permit tcp host 10.1.1.1 host
/ Z& ^: z3 M: s6 ^7 |172.16.1.1
* _$ S7 @: a; kRouter(configuration)#access-list 199 permit tcp host 172.16.1.1 host # D) H, V! [: W8 h# `' Y W
10.1.1.1
2 J4 d/ Q1 }$ [" s# X! `/ QRouter(configuration)#exit
3 ?' }' r; \: v, D/ A* G% aRouter#debug ip packet 199
! P& n7 p; P% W y5 ]0 zWhat will the debug output on the console show? 7 Y6 s6 a1 Y2 W3 U! i3 Z
A. All IP packets passing through the router
3 D' R6 S; H/ a+ p& f, w3 RB. Only IP packets with the source address of 10.1. 1.1
$ m) c9 k& A$ c: ~C. All IP packets from 10.1.1.1 to 172.16.1.1 5 }4 i8 C: ^# r4 f
D. All IP Packets between 10.1.1.1 and 172.16.1.1 8 K& B7 i! w: ?" ~
Answer: D
+ y# ]# M" E% p* O) X3 g7 V3 }5 n9 X/ ]# L
Explanation: W5 o* V) x8 b$ Q
In this example, the "debug ip packet" command is tied to access list 199, specifying which IP " g* a, C7 S5 [" Y! s
packets should be debugged. Access list 199 contains two lines, one going from the host with IP
, p8 M2 ]5 l' U3 ?) ?& [, P* zaddress 10.1.1.1 to 172.16.1.1 and the other specifying all TCP packets from host 172.16.1.1 to
. ]2 L- w2 S7 J m2 W; C10.1.1.1. / N3 x+ A; o( h9 }
9 V3 z6 T0 `1 p4 ~, V8 x( k
QUESTION 2 - p5 M0 b7 B3 I0 S8 q# U2 D- }
What level of logging is enabled on a Router where the following logs are seen? %LINK-3- H- O0 ^: O/ c/ q
UPDOWN: % }* _3 t! k! k* c: \" R& R4 s, H
Interface FastEthernet0/1, changed state to up % LINEPROTO-5-UPDOWN: # ^) n7 t8 c8 }. ?2 I
Line protocol on Interface FastEthernet0/1, changed state to up ' n! V0 o- }6 P# z) N
A. alerts
( C/ F5 q! c( G1 zB. critical B+ b x9 t& p: @. g
C. errors
7 D: U) _% V( K( z% T6 l! HD. notifications $ p+ P. g, Z) }
Answer: D
6 N2 H/ d9 m; J( F3 I$ \% q
g8 U3 l$ M' M6 gExplanation:1 c$ |/ {' Z' ?& F( W/ \
Cisco routers, switches, PIX and ASA firewalls prioritize log messages into 8 levels (0-7), as
6 }3 X/ D+ m- W- Y0 Z, Y9 Zshown below: * {8 w) x3 J% g/ M
LevelLevel NameDescription 1 A; f$ S/ l9 U
0 Emergencies System is unusable
% q% I( c6 H9 s. r% Q1 Alerts Immediate action needed
, j- l+ I& u+ L/ J8 M* ^) k2 Critical Critical conditions
- g, p2 r5 y% _3 Errors Error conditions , j; S) A/ V/ W1 p( @' [
4 Warnings Warning conditions : M' X3 k8 k2 P5 |( H+ X
5 Notifications Informational messages
7 D: Q! ]5 c) E0 x* {6 i6 Informational Normal but significant conditions 6 n9 J ^# P3 J2 r
7 Debugging Debugging messages
1 Y S6 ^; q1 E1 u3 R6 y$ i- PWhen you enable logging for a specific level, all logs of that severity and greater (numerically
+ w. [2 F. U+ `% v6 pless) will be logged. In this case we can see that logging level of 3 (as seen by the 3 in "LINK-3-& j5 Y% R+ d- W# f3 _1 @
UPDOWN") and level 5 (as seen by the 5 in "LINEPROTO-5-UPDOWN") are shown, which
6 z# | m8 M4 y* f" m7 Rmeans that logging level 5 must have been configured. As shown by the table, logging level 5 is
+ m0 z M) i A. M
; M; q& y: O- `" a6 }QUESTION 3
% M) E; M! |4 |* T; G9 C" cYou have the followings commands on your Cisco Router:
7 [3 F! n) _! Wip ftp username admin
: _: o1 ^& j% b, Tip ftp password backup * x! D8 j3 b8 N
You have been asked to switch from FTP to HTTP. Which two commands will you use to replace 9 R7 D) W7 r# ~; l; R0 ^4 s! g* G
the existing commands?
# N+ \2 C: f( W, Q C9 K; _: rA. ip http username admin
6 R) S# X9 x0 dB. ip http client username admin 1 X& K. G O4 T
C. ip http password backup " T @0 H8 M& e' W' P
D. ip http client password backup
# K; {* V& e4 W5 H, |3 lE. ip http server username admin 5 c9 f! j k% R& l+ H
F. ip http server password backup % i. a- Q: D5 u
Answer: BD ) i: Q s9 J+ ] `1 l- A3 \
7 k* t7 l" Y* M$ e& e2 s
Explanation:: d0 ~; j" T6 y. o4 z) W
Configuring the HTTP Client 6 v) @$ J$ J$ J T1 x! s
Perform this task to enable the HTTP client and configure optional client characteristics. The
T6 r; r! X+ \, wstandard HTTP 1.1 client and the secure HTTP client are always enabled. No commands exist to - |1 W9 S8 q/ j- O, t/ D' L
disable the HTTP client. For information about configuring optional characteristics for the HTTPS ( g/ a" ]. u3 k0 ^9 S: \
client, see the HTTPS-HTTP Server and Client with SSL 3.0, Release 12.2(15)T, feature module. |
|