【文章內(nèi)容簡(jiǎn)介】
table to determine the addresses that are associated with each port and then enter the mands on each switch for MAC address portsecurity.Answer: CSection: Chapter 9: SwitchingExplanation/Reference:考點(diǎn):有200臺(tái)主機(jī)需要接入,采用什么方式來(lái)增強(qiáng)網(wǎng)絡(luò)安全性?A:先驗(yàn)證mac安全性,然后在交換機(jī)上綁定。錯(cuò)誤,工作量太大B:用戶發(fā)送郵件認(rèn)證再在交換機(jī)上配置,錯(cuò)誤,不科學(xué)。C:使用portsecurity,正確。D:錯(cuò)誤,工作量太大。QUESTION 30When troubleshooting a Frame Relay connection, what is the first step when performing a loopback test?【幀中繼連接故障排除時(shí),執(zhí)行環(huán)回測(cè)試時(shí)的第一步是什么?】A. Set the encapsulation of the interface to HDLC.B. Place the CSU/DSU in localloop mode.C. Enable localloop mode on the DCE Frame Relay router.D. Verify that the encapsulation is set to Frame Relay.Answer: ASection: Chapter 14: Wide Area Network (WAN)Explanation/Reference:在對(duì)FR進(jìn)行排錯(cuò)的時(shí)候,當(dāng)做回環(huán)測(cè)試的時(shí)候,第一步如何處理?A:講接口配置成HDLC,正確,F(xiàn)R封裝下無(wú)法正常ping自己端口QUESTION 31What occurs on a Frame Relay network when the CIR is exceeded?A. All TCP traffic is marked discard eligible.B. All UDP traffic is marked discard eligible and a BECN is sent.C. All TCP traffic is marked discard eligible and a BECN is sent.D. All traffic exceeding the CIR is marked discard eligible.Answer: DSection: Chapter 14: Wide Area Network (WAN)Explanation/Reference:在FR網(wǎng)絡(luò)中,當(dāng)CIR超過(guò)時(shí)會(huì)發(fā)生什么情況?D:所有超過(guò)的流量都丟棄。QUESTION 32What are two characteristics of Frame Relay pointtopoint subinterfaces? (Choose two.)A. They create splithorizon issues.B. They require a unique subnet within a routing domain.C. They emulate leased lines.D. They are ideal for fullmesh topologies.E. They require the use of NBMA options when using OSPF.Answer: BCSection: Chapter 14: Wide Area Network (WAN)Explanation/Reference:幀中繼點(diǎn)到點(diǎn)子接口的特點(diǎn)?A:水平分割,錯(cuò)誤。B:每個(gè)子接口需要一個(gè)獨(dú)立的網(wǎng)段,正確。C:類似專線,正確。D:全網(wǎng)互聯(lián)是理想拓?fù)?,錯(cuò)誤。通常是hubspokeE:NBMA不支持OSPF,錯(cuò)誤。QUESTION 33Refer to the exhibit. Addresses within the range A. debug ip natB. show accesslistC. show ip nat translationD. show ip nat statisticsAnswer: BSection: Chapter 8: NATExplanation/Reference:。允許的范圍是通過(guò)ACL定義的。A:打開NAT轉(zhuǎn)換的debug信息,錯(cuò)誤B:查看acl信息,正確。C:查看NAT轉(zhuǎn)換表,錯(cuò)誤。D:查看靜態(tài)NAT。錯(cuò)誤QUESTION 34A wireless client cannot connect to an [一臺(tái)帶有b/??蛻舳瞬糠譀]有發(fā)現(xiàn)可用的無(wú)線局域網(wǎng)。這種情況是什么原因?]A. The incorrect channel is configured on the client.B. The client39。s IP address is on the wrong subnet.C. The client has an incorrect preshared key.D. The SSID is configured incorrectly on the client.Answer: DSection: Chapter 11: WirelessExplanation/Reference:客戶端無(wú)法連接到無(wú)限接入點(diǎn),查看不到可用的無(wú)線信號(hào)。這通常是SSID信號(hào)沒有配置正確。A:不正確的信道。錯(cuò)誤B:客戶端的IP地址配置錯(cuò)誤C:客戶端的共享key錯(cuò)誤。D:SSID配置不正確。QUESTION 35Which two features did WPAv1 add to address the inherent weaknesses found in WEP? (Choose two.)[哪兩個(gè)功能 WPAv1 沒有添加地址找到 wep 的固有弱點(diǎn)?(選擇兩個(gè)]A. a stronger encryption algorithmB. key mixing using temporal keysC. shared key authenticationD. a shorter initialization vectorE. per frame sequence countersAnswer: BESection: Chapter 11: WirelessExplanation/Reference:考點(diǎn):WPA1中增強(qiáng)哪兩個(gè)在WEP中發(fā)現(xiàn)的弱點(diǎn)?WEP存在的隱患主要是依賴共享密鑰A:更強(qiáng)的加密算法B:混合使用的密鑰C:共享密鑰認(rèn)證D:較短的初始化向量E:一個(gè)幀一個(gè)序列計(jì)數(shù)器。QUESTION 36Which two wireless encryption methods are based on the RC4 encryption algorithm? (Choose two.)A. WEPB. CCKMC. AESD. TKIPE. CCMPAnswer: ADSection: Chapter 11: WirelessExplanation/Reference:考點(diǎn):哪兩種無(wú)限加密技術(shù)依賴RC4A:有線等效保密協(xié)議B:英特爾開發(fā)一種協(xié)議C:高級(jí)加密標(biāo)準(zhǔn)D:暫時(shí)密鑰集成協(xié)議E:基于AES的加密方式QUESTION 37What are two characteristics of RIPv2? (Choose two.)A. classful routing protocolB. variablelength subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to pute pathAnswer: BDSection: Chapter 6: IP RoutingExplanation/Reference:A:有類路由協(xié)議,錯(cuò)誤B:可變長(zhǎng)度子網(wǎng)掩碼,正確C:采用廣播地址更新,錯(cuò)誤D:手動(dòng)路由匯總,正確E:使用spf算法計(jì)算路徑,錯(cuò)誤。QUESTION 38Which two Ethernet fiberoptic modes support distances of greater than 550 meters?A. 1000BASECXB. 100BASEFXC. 1000BASELXD. 1000BASESXE. 1000BASEZXAnswer: CESection: Chapter 1: IntroductionExplanation/Reference:A:最長(zhǎng)距離25米B:最長(zhǎng)距離100米C:最長(zhǎng)距離3000米D:最長(zhǎng)距離550米E:最長(zhǎng)距離70千米QUESTION 39What two things will a router do when running a distance vector routing protocol? (Choose two.)A. Send periodic updates regardless of topology changes.B. Send entire routing table to all routers in the routing domain.C. Use the shortestpath algorithm to the determine best path.D. Update the routing table based on updates from their neighbors.E. Maintain the topology of the entire network in its database.Answer: ADSection: Chapter 6: IP RoutingExplanation/Reference:考點(diǎn):考查距離矢量路由協(xié)議特性A:周期性更新,正確B:發(fā)送整個(gè)路由表到整個(gè)路由域,錯(cuò)誤,只發(fā)送給鄰居C:使用SPF算法,錯(cuò)誤D:依靠鄰居發(fā)送更新來(lái)更新路由表,正確E:在數(shù)據(jù)庫(kù)中維護(hù)整個(gè)網(wǎng)絡(luò)的拓?fù)?。錯(cuò)誤QUESTION 40Refer to the exhibit. According to the routing table, where will the router send a packet destined for?A. B. C. D. Answer: CSection: Chapter 6: IP RoutingExplanation/Reference:路由查找原則:最長(zhǎng)掩碼匹配原則。QUESTION 41Which mand shows if an access list is assigned to an interface?A. show ip interface [interface] accesslistsB. show ip accesslists interface [interface]C. show ip interface [interface]D. show ip accesslists [interface]Answer: CSection: Chapter 7: SecurityExplanation/Reference:QUESTION 42Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?A. The address is removed from the pool until the conflict is resolved.B. The address remains in the pool until the conflict is resolved.C. Only the IP detected by Gratuitous ARP is removed from the pool.D. Only the IP detected by Ping is removed from the pool.E. The IP will be shown, even after the conflict is resolved.Answer: ASection: Chapter 5: Managing Cisco IOSExplanation/Reference:show ip dhcp conflict命令可以查看哪些ip地址在使用上有沖突。有沖突的地址不再分配出去。A:地址被刪除直到?jīng)_突解決,正確B:地址保留直到?jīng)_突解決,錯(cuò)誤C/D:答案片面。E:當(dāng)沖突解決后,地址會(huì)被顯示。錯(cuò)誤。QUESTION 43Refer to the exhibit. You are connected to the router as user Mike. Which mand allows you to seeoutput from the OSPF debug mand?A. terminal monitorB. show deb