|
思科EI CCNP CCIE/无线CCIE笔试350-301) y, f# u+ W" q7 {
◣视频+文字解析◢乾颐堂网络实验室- L! Q3 I' \( E. r* l5 J/ I0 ]4 D
9 V( D+ G/ |! e7 P2 y6 \
微信:qyt3378266435 客服QQ:3378266435  联系在线客服,获取免费部分的CCIE题库 3 g2 u' l- p! c8 O
; F, n) J! u( B% e3 @1 v( T3 K6 S点击回复获取视频8 |4 X) j8 v: Y# j& U
# F/ r6 K8 U5 r- }: j: j; t0 z1 \" Y( ^
QUESTION 1! }9 e0 m9 l0 _! l) J+ _! K1 a
Refer to the exhibit.. ?3 C+ s6 ]0 V9 x; g4 m
$ d, v2 d7 t3 W4 V! ?& b1 y `% \& `3 c5 F6 h5 H
: a# r, Q' R1 V' M& U7 a1 j2 ~# T) UWhich privilege level is assigned to VTY users?* `5 b5 P3 u, R, w- ~
A. 1
G0 |( k# B) n( U8 M! W: cB. 7
2 K5 `' M; \3 S' a4 f4 h kC. 13
* C! M5 H9 Q% y) F \% mD. 15& f; d4 I0 c- V% t
Correct Answer: A
& k2 ^3 o2 f1 i1 J6 XExplanation/Reference:& S/ h, Y8 C* X4 ^4 y# _. y
Explanation: Lines (CON, AUX, VTY) default to level 1 privileges.
7 g E# {) E) {* w# q4 D Z9 i
: _8 D# k$ s Z. C# {2 ?' p8 { xQUESTION 2
+ A2 a" J: B' A4 AWhat is the difference between a RIB and a FIB?. c& h7 U( I% u
A. The FIB is populated based on RIB content.
7 m% ?" I/ t0 m$ Q0 CB. The RIB maintains a minor image of the FIB.
7 i5 P, r; V' H m WC. The RIB is used to make IP source prefix-based switching decisions.: o; `8 @6 @! S% o* Q
D. The FIB is where all IP routing information is stored.5 l3 \' l2 K7 i! u. g* z
Correct Answer: A# z, e. w3 z' H+ r6 D
Explanation/Reference:7 t; h+ n( x! W0 |6 R- d! E
Explanation: CEF uses a Forwarding Information Base (FIB) to make IP destination prefix-based switching decisions. The FIB is conceptually similar to a routing
( n6 ]- t. z6 s2 m S8 Xtable or information base. It maintains a mirror image of the forwarding information contained in the IP routing table. When routing or topology changes occur in the
" h J# u: h9 Pnetwork, the IP routing table is updated, and those changes are reflected in the FIB. The FIB maintains next-hop address information based on the information in
& W- v i2 C0 d$ h# m' tthe IP routing table. Because there is a one-to-one correlation between FIB entries and routing table entries, the FIB contains all known routes and eliminates the
5 V4 O q% M* O. q: Z, bneed for route cache maintenance that is associated with earlier switching paths such as fast switching and optimum switching.
$ ~, K0 X3 ~2 [Note: In order to view the Routing information base (RIB) table, use the “show ip route” command.
- r! F. T4 R7 ~- o0 u3 b% k; u, l/ oTo view the Forwarding Information Base (FIB), use the “show ip cef” command. RIB is in Control plane while FIB is in Data plane.
5 W6 K& f* y6 x n5 C, n' z) l* }
QUESTION 3
5 G0 ~1 W3 V9 x7 _A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?
! V3 T6 d3 w) E# b6 I3 P# GA. The client has incorrect credentials stored for the configured broadcast SSID
. s0 ]. h( A" Z) AB. The hidden SSID was not manually configured on the client.
( v0 E- [0 H5 N! i1 Z7 pC. The broadcast SSID was not manually configured on the client.& S4 |+ `- \9 P H$ A1 I' R
D. The client has incorrect credentials stored for the configured hidden SSID.% T3 }; j- H5 g: Y9 T
Correct Answer: B
8 A6 V; p" V3 HExplanation/Reference:/ W! k) h0 R: [4 b6 t
Explanation: Because the SSID is hidden, the client can not find and join it, so the hidden SSID needs to be manually configured7 I! L, V% i9 V2 s4 z- h
# u, T9 A; @6 [0 G6 l6 L
If the hidden SSID is manually configured and the configured password is wrong, the password error will be prompted, not only the SSID cannot be seen7 u1 S6 F: ]# Q$ E+ r6 S
4 p8 v) i4 Q8 l) \- Y9 ?/ r1 LQUESTION 4* g5 y& k% N I8 r
Which OSPF network types are compatible and allow communication through the two peering devices?. q- U2 @' K$ s* L! p6 x1 Y6 i
A. point-to-multipoint to nonbroadcast: q. J: f9 I6 p
B. broadcast to nonbroadcast' B/ C+ P% q% `" E
C. point-to-multipoint to broadcast4 B5 m' G4 V" q& j3 s5 e
D. broadcast to point-to-point
3 p6 y" f1 N) W3 y" e- X5 aCorrect Answer: B: F9 {- i8 C r
Explanation/Reference:
8 @. T) s! M: `1 c# W2 r0 e8 OExplanation: The following different OSPF types are compatible with each other:( h& `* e% a1 Y5 ~6 N6 A2 f
+ Broadcast and Non-Broadcast (adjust hello/dead timers)6 q/ P$ h* N4 Y+ s
+ Point-to-Point and Point-to-Multipoint (adjust hello/dead timers)" ^3 c) Y* T( h+ W
Broadcast and Non-Broadcast networks elect DR/BDR so they are compatible. Point-topoint/ multipoint do not elect DR/BDR so they are compatible.
; q9 W$ p& c) L% M) {
% j9 d" s" g" `QUESTION 5
, f- O0 W3 ]& s. f! P, IRefer to the exhibit. Which statement about the OPSF debug output is true?
3 |7 j, c) R: o+ `
1 J$ _9 T# i) h! _; m; u' Q3 d
A. The output displays OSPF hello messages which router R1 has sent or received on interface Fa0/1
6 K& [% V. s8 A. YB. The output displays OSPF messages which router R1 has sent or received on all interfaces.( G/ i- q$ c z3 e
C. The output displays OSPF messages which router R1 has sent or received on interface Fa0/1.' U, Y+ K# g0 G5 s
D. The output displays OSPF hello and LSACK messages which router R1 has sent or received.6 G/ T9 `: @2 S" P# E3 G
( N; v$ d7 |* B+ Z9 p4 FCorrect Answer: A) r ]0 X/ |! W# Z4 D0 f
' B# w- O! E8 {7 r7 R0 tExplanation/Reference:+ i( O2 M2 m& @# D( k
Explanation: This combination of commands is known as “Conditional debug” and will filter the debug output based on your conditions. Each condition added, will4 }! U7 @) t- j; m o3 B) E+ u
behave like an ‘And’ operator in Boolean logic.% _4 S1 J$ o- h8 R$ X
Some examples of the “debug ip ospf hello” are shown below:, S. z/ _& S: d m h- a0 h, ?4 x: D
' W: {! i) R$ t1 Y) q$ t
5 t) I5 t5 _/ q& T9 f
+ d, i a( f( J9 C% g! } i/ t- L" x1 Q+ }5 [" {, n
4 M* k& V% b: H& }
' O3 d' q0 G: U; R/ r
微信:qyt3378266435 客服QQ:3378266435 提供基础课免费资料供大家学习 $ n) E! C) @& v* L* p
乾颐堂提供 思科.华为.Python学习 CCNA|CCNP|CCIE|HCIA|HCIP|HCIE 路由交换|安全|DC数据中心|无线|云计算 乾颐堂客服热线:400-618-8070 乾颐堂网络实验室 我们为您想的更多
# \, R: H0 y# D: ]5 Y* I
d. r; J3 R) \& f$ f) L5 G: ~/ O |
|