|
本帖最后由 乾颐堂 于 2021-7-2 14:01 编辑 3 l3 |( a( J% E k9 `" h
( ]" G* p3 t, [EI CCIE&Wireless CCIE written examination PASS!# M% A$ a+ v7 X1 v
乾颐堂网络实验室6 N7 E3 R9 c& s" l8 x
题库都含解析,联系乾颐堂咨询详情
9 p' y) o+ v5 j. t* P+ h微信:qyt3378266435 客服QQ:3378266435 提供基础课免费资料供大家学习 联系在线客服 获取其余公开题库
8 K8 E7 L2 `# t5 u点击回复获取视频6 F6 J7 a2 D( f' ]2 g7 K3 w9 F
9 v& a0 g; B7 Z: \
, h. v; c( j$ y" d4 @4 {. ~+ @) `5 L a
, S4 O9 ~/ k2 O) k, |6 o1.
3 f2 H% V+ i/ d- FWhich technology is used as the basis for the Cisco SD-Access data plane?
, V$ K. {8 U7 v4 _' V7 }! bA. iPsec; Z' B6 @2 s: t% N, I
B. LISP
+ ]$ U- p5 t; q( @ K% qC. VXLAN/ F8 ]0 p( r/ R# S9 M4 a( s
D. 802.1Q2 _7 [. I( x& X; ]7 m
Answer:
) u4 F) { K6 u! q! @; k4 `C
, i k/ X6 k/ z4 e6 g; v8 J p& IIn SD-Access the control plane is based on LISP (Locator/ID Separation Protocol), the data plane is based on VXLAN
0 f6 B& ]4 {( A) {9 O) L/ ]9 P
8 E) y# h$ _2 G3 b/ K
8 Y+ ` B6 \$ n$ M, A9 `( H( A# z2.* n5 {: K) v7 }+ _" m) N( C
What is a characteristic of MAC sec?9 I$ U; P1 k! M. ]* \) P. r
A. 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the primary session key from a successful 802.1X session.
! n1 F* h$ k. sB. 802.1AE provides encryption and authentication services9 x/ I3 p& [2 i. ]2 x( S& h* D; X
C. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol9 |9 [) m6 K, x% c* e' B
D. 802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
6 u& z O8 C9 s0 w- K6 m, U) pAnswer: D0 j8 U% z% n/ ?; v1 X- o
in 2006 the IEEE ratified the 802.1AE standard, also known as MAC security standard (MACsec). MACsec encrypts all Ethernet frames, irrespective of the upper layer protocol. With MACsec, not only routed IP packets but also IP packets where the source and destination is in the same subnet or even non-IP traffic are encrypted.. M" j& x* x0 @) x4 F2 H8 U- y
我们可以了解到802.1AE是一种二层封装技术,通过封装所有以太网帧,从而实现加密的安全效果。802.1AE可以保护数据内容被抓包获取,同时也能保证数据的完整性& X( J9 d* C, G9 x
3 j/ G8 u1 d' u/ s7 i" i
3 M0 a) `4 z* ^, J2 f* ~2 |' Y3.
9 ~/ {# G& U* C% XAn engineer is working with the Cisco DNA Center API. Drag and drop the methods from the left onto the actions that they are used for on the right.
7 R$ ~" J& r6 F$ z0 [! {" T5 F v" e- Q
3 m/ a& {4 z3 A6 {Answer:/ a- C; w9 f$ e$ b/ G! Q
) X: v8 r, j( R! m" y* o$ } u
3 l% Z3 Q! A- Q5 W0 E. W
4.
0 I( Q3 F+ [; t# ]4 Z4 o1 g
$ u# V/ u3 C6 R0 r
Refer to the exhibit. Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?
+ g9 G! c8 F% ~% ~; Q, s% |2 B4 b9 ]
A, Cisco DNA Center pulled those details directly from the edge node where the user connected./ ~' Y$ ]' f& {* k# L, k2 N6 S
B, The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center.
( h2 F, i% {- J7 |C, User entered those details in the Assurance app available on iOS and Android devices.' L+ q r* P& \& X
D, Those details are provided to Cisco DNA Center by the Identity Services Engine.% R3 H% c, K. ?% M) o7 F
$ T4 n( `& ^; B. J' L
Answer: D8 n! r! ~( R* y) H& t8 A$ C+ f
DNA Center 通过 ISE 获取用户身份信息。) F9 p% O/ a& {& z, T" Y
1 y' n2 x$ O% u4 {5. After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
1 W9 M- D7 ~4 L/ C/ L% j6 B2 B8 Q- T5 Q( {, N; {
A, BFD' x9 o3 `; D$ V& a K8 E
B, NSF
: |3 U; s u( A1 c& h) p! }2 KC, RPVST+
& h% d6 r1 n* V7 J$ H# y& DD, RP failover; {: V) i2 I8 F' I+ a
+ G5 D$ p$ H4 }3 \; T* s- o9 R
Answer: B3 t( s+ P; F2 ?4 j/ S$ }) ]7 C
NSF, non stop forwaring" r0 t3 Q3 q* h/ _' D' t
% F h7 o u% D5 |( n$ B7 J0 t% R
/ f7 X( _+ V l% B! m微信:qyt3378266435 客服QQ:3378266435 提供基础课免费资料供大家学习 ) h; L6 P# Q* q# {* {( D/ D& O
乾颐堂提供 思科.华为.Python学习 CCNA|CCNP|CCIE|HCIA|HCIP|HCIE 路由交换|安全|DC数据中心|无线|云计算 乾颐堂客服热线:400-618-8070 乾颐堂网络实验室 我们为您想的更多 8 E. N7 T: J8 c _/ o
|
|