|
思科EI CCNP CCIE/无线CCIE笔试350-3011 P3 v. D0 W$ q
◣视频+文字解析◢乾颐堂网络实验室
8 ]; O* d. P% X, e) z* l' Q& }3 F+ L _
微信:qyt3378266435 客服QQ:3378266435  联系在线客服,获取免费部分的CCIE题库 ( y4 O( Q \$ X4 G6 c; }
0 v) y/ j! j9 `, Q, e* S
点击回复获取视频
0 U2 q8 H/ N1 c% h9 n* G. |5 p& S; a
$ E7 l* @# d6 Z8 O7 m4 m, {# PQUESTION 1
k2 D2 ~5 }) F! fRefer to the exhibit.
/ ]) y" I* x3 g" ^
& h2 l# S3 u4 ]! }/ r# i% m( W/ z8 }) ~
6 A& V# m# N6 x5 u5 Y& g/ D
Which privilege level is assigned to VTY users?1 s, \: D& K( [
A. 1
& A5 _( {1 }: H* }B. 7. g% G% G# B& g& X$ t
C. 13
4 r) ~" v, o4 m2 t; ]2 GD. 15: H' `5 Y$ V4 W: o9 `. e. k' L1 u
Correct Answer: A7 Z; A, M/ @& R, L) l! ]
Explanation/Reference:1 n# y1 J/ D! F8 J) }# J$ Z m( c
Explanation: Lines (CON, AUX, VTY) default to level 1 privileges.8 Y" n( r! J/ v& [" A; k! W
7 I4 F! p9 @4 y0 |0 o& z
QUESTION 2
9 [8 G( O# V8 p" }+ H( EWhat is the difference between a RIB and a FIB?
: `1 y6 I& ~9 W/ h- BA. The FIB is populated based on RIB content.
8 ?# D- P" r, ?+ nB. The RIB maintains a minor image of the FIB.( ~4 [2 E% N. X& a( w& ]% D* u
C. The RIB is used to make IP source prefix-based switching decisions.
! x6 B# r0 ?$ j* {+ }: \D. The FIB is where all IP routing information is stored.
+ @& c* V2 }, D; c* yCorrect Answer: A
" h) t: l$ Y" Y) L7 iExplanation/Reference:
: `& o1 I8 d" O& A! K* P: g$ `9 [! TExplanation: CEF uses a Forwarding Information Base (FIB) to make IP destination prefix-based switching decisions. The FIB is conceptually similar to a routing3 k3 g$ `# F; a9 t. x `( Z- A
table or information base. It maintains a mirror image of the forwarding information contained in the IP routing table. When routing or topology changes occur in the
; F+ I) i5 X; m% _( inetwork, the IP routing table is updated, and those changes are reflected in the FIB. The FIB maintains next-hop address information based on the information in7 f/ O- m, R* v/ K* R( X" K0 z
the IP routing table. Because there is a one-to-one correlation between FIB entries and routing table entries, the FIB contains all known routes and eliminates the/ v* D2 _& a) s3 {
need for route cache maintenance that is associated with earlier switching paths such as fast switching and optimum switching.7 W3 |6 P s" @/ `
Note: In order to view the Routing information base (RIB) table, use the “show ip route” command.
4 G% K$ X7 R5 _/ _8 g3 KTo view the Forwarding Information Base (FIB), use the “show ip cef” command. RIB is in Control plane while FIB is in Data plane.6 s2 i0 Q& U# c
( w) A( \0 R, ]9 h' i) Y3 n* K9 M/ H
QUESTION 3; m+ }$ e5 V. n6 x- U
A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?
: R8 W0 N$ V0 |% @3 M( fA. The client has incorrect credentials stored for the configured broadcast SSID: i( e/ h$ R) y* e) i
B. The hidden SSID was not manually configured on the client.. p$ L% j9 P Z" a
C. The broadcast SSID was not manually configured on the client.4 ]8 U2 Z7 Y4 e+ o, k7 ~3 c
D. The client has incorrect credentials stored for the configured hidden SSID.
5 K& R( M1 r3 _Correct Answer: B
( L! z% `0 g: y5 h1 R! |+ ~Explanation/Reference:
0 N" l7 B6 N# I& v4 eExplanation: Because the SSID is hidden, the client can not find and join it, so the hidden SSID needs to be manually configured
9 N [. A+ ~' d; V# k3 W) d m M! J' y4 ^5 m* ]5 L
If the hidden SSID is manually configured and the configured password is wrong, the password error will be prompted, not only the SSID cannot be seen
1 g- X' G! Q0 S7 f- ?
0 B+ [" j0 a4 w8 o9 bQUESTION 4; t% [0 e1 p! F
Which OSPF network types are compatible and allow communication through the two peering devices?( H0 @' y$ e3 v) K0 V
A. point-to-multipoint to nonbroadcast
: }# Q/ G- a/ M; Q, D6 CB. broadcast to nonbroadcast
2 s5 I7 j1 F3 \# N! a3 q1 XC. point-to-multipoint to broadcast
( ?0 L+ `% e1 M7 l2 WD. broadcast to point-to-point$ ]- o2 G |. O: I% P6 I! a
Correct Answer: B
& z, O4 j& P* J9 |6 _) [Explanation/Reference:
* [* e% n. v( c* v! k, S. PExplanation: The following different OSPF types are compatible with each other:4 D* Z" `- Z$ e& @+ L$ ^
+ Broadcast and Non-Broadcast (adjust hello/dead timers)
: V% i' g; [ S( P% Y8 u" a. x) Y! E+ Point-to-Point and Point-to-Multipoint (adjust hello/dead timers); d, V1 O0 N7 o5 v- G
Broadcast and Non-Broadcast networks elect DR/BDR so they are compatible. Point-topoint/ multipoint do not elect DR/BDR so they are compatible.
/ t( s/ ]5 L' E& j! W
( b# p3 B- v+ }# O; n2 q( iQUESTION 51 h: G: I0 w; x. v7 n- s
Refer to the exhibit. Which statement about the OPSF debug output is true?' v! q2 H5 q V: @ T3 c% j
6 \+ e& e- ~% s0 R9 u3 {$ A
A. The output displays OSPF hello messages which router R1 has sent or received on interface Fa0/1
( ?3 r& M- X- H0 f, A, t: UB. The output displays OSPF messages which router R1 has sent or received on all interfaces.
( f6 j }# V$ i4 jC. The output displays OSPF messages which router R1 has sent or received on interface Fa0/1." M5 N" y" Q. Z8 J% G. r5 F
D. The output displays OSPF hello and LSACK messages which router R1 has sent or received.
0 C% H& K! i' K# e9 y3 U M. D
4 s" r. D0 y) rCorrect Answer: A
: o/ `8 j7 }( W
3 z; K: ~/ H$ E: g- ~Explanation/Reference:& ~9 U8 V; z6 W$ E" o
Explanation: This combination of commands is known as “Conditional debug” and will filter the debug output based on your conditions. Each condition added, will+ g7 a. T3 H) H6 `1 a9 n8 [$ v
behave like an ‘And’ operator in Boolean logic.% z! J: Y- _: u* F
Some examples of the “debug ip ospf hello” are shown below:
: |/ W: v+ }3 V/ u2 Y6 f' E" F* w! Z. l+ M5 p
1 S5 l/ b& h) O% u# H2 {2 T
S; e3 n# L- V8 V- l- ~, B$ y1 e
! G1 u3 k% \& B% R* X [& z j5 B) S0 J+ O# J8 C2 N( l
% y1 d5 A8 Q* N, c+ ]& R4 v' b, ^
微信:qyt3378266435 客服QQ:3378266435 提供基础课免费资料供大家学习
- m0 G3 ], u/ E. B$ N乾颐堂提供 思科.华为.Python学习 CCNA|CCNP|CCIE|HCIA|HCIP|HCIE 路由交换|安全|DC数据中心|无线|云计算 乾颐堂客服热线:400-618-8070 乾颐堂网络实验室 我们为您想的更多 4 V* H r+ B( `% I6 k: i; o: t* \
9 r( |& v. D0 T, v2 Z# J# I
|
|