- 积分
- 61
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2015-8-17
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
|
本帖最后由 bb_syd 于 2020-2-19 12:21 编辑 7 }5 ~/ T M8 r/ U
# ?: I* ]. w, X- S( v
Q124 全覆盖,87X pass, 感觉2月24日前应该不会再变题了。要考的同学,快!快!快!感谢论坛上的题库和战报。感谢xiaopengyou0的帖子总结。
3 [6 K% }* ? l; H
9 M* B. T' y8 Q5 R9 o3 C附件1. Q125的vce版,包括vce免安装版player。2. Q124的pdf版。" ~7 ]+ h! p+ O% v# E1 q8 _5 m3 u
之前xiaopengyou0大神,介绍过2个版本的区别,建议先用Q124的背熟,再用Q125 vce练习。% _3 l R4 V; D
) h! o% y0 ^. T" y5 W
下面的是PDF上和VCE的区别题
: a, O$ a+ D) P/ Q" V3 f5 ~
# u8 y2 d# u( z G _" F, m19、Router(config)# cts sxp reconciliation period 180
7 |" z% k/ E5 M( Q) ?' iB、If a peer reconnects to the device within 120 seconds of terminating a CTS-SXP connection, the reconciliation timer starts$ I7 {; g( ~/ [0 @5 F5 F
C、If a peer re-establishes a connection to the device before the hold-down tier expires, the device retains the SGT mapping entries it learned during the previous connection for an additional 3 minutes8 _! ?# M8 q V: u9 h- y) v4 S' s
* r& [! b8 Y2 b- e
40、Which statement is true regarding the failover link when ASAs are configured in a failover mode?0 O4 j4 M6 Z' A+ Y# R
D、The information sent over the failover link cannot be in clear text but it could be secured communication using a failover key( g0 m( [( s+ B1 m6 o+ W
' L( B( i* M3 y6 r/ K, j' S1 l62、A customer has configured a single Policy Set to authenticate and authorize MAB and 802.1x requests on Cisco ISE. The 802.1x authorization rules are on the top of the list and check Active Directory group membership for a math. The MAB results are at the bottom of the list and check local Identity Groupss for a match. When a MAB request comes to ISE.
, i+ L( F' C5 |+ u; T; ]: @, aC、ISE will ignore the 802.1x authorization rules on the top
0 k! B3 J1 U- b2 b/ f+ r! s1 r, ^/ y+ `; F3 J6 s* [0 }5 Y9 x
85、Which two of the following statements are true regarding this email message?% z. `0 u5 p( ~. s. @3 v2 Q
B、Multiple Anti-Virus engines were used to scan the email message
: J) |' w' h+ {' [F、Message was not delivered to eh recipient ccie@ccie.local
$ b: D( m1 G+ N8 u% C N2 B( I% a& j; u( k) g, V, ~
93、ISE is configured to use MsCHAPv2 inner method for PEAP authentication of users. What set of credetials needs to be exchanged between ISE and client for successful establishment of the PEAP tunnel and subsequent authentication?
9 i, Y; p0 D2 X7 ^# P! T: D( yD、Identify certificate from ISE and Username and password of the user from the client \+ C j9 n. F0 |/ |+ K
1 @" T0 `6 ]6 \( g# O99、Which of the following statements about Cisco Trust Sec is incorrect? 9 \' G1 }( F# i* E2 l# M
E、IKEv2 can be used to negotiate and inform IPsec about SGT capability
3 N& z$ p% |- B5 e8 i. {) o
9 |& m& R& f! s5 l$ w8 }109、Which of the following statements correctly describe how DMVPN can be used to provide network segmentation over public transport networks?
/ t& F/ m6 H) I3 X4 H* UA、The DMVPN hub and spokes must use the same VRF for a given DMVPN cloud
+ f) Q" w% e$ p' x
$ A Z! a6 W- M; I1 X9 _$ q9 Q) k# H4 ?& V, ?: ?7 t
|
评分
-
查看全部评分
|