移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | 思科认证考试

单选题 Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A

 reduction of processing in wireless controllers

B

 distributed approach to authentication, encryption, and policy enforcement

C

 provides security by blocking communication between access points and wireless clients

D

 access point discovery, information exchange, and configuration

多选题 Refer to the exhibit. Which three statements accurately describe this GLBP topology?()

A

Router A is responsible for answering ARP requests sent to the virtual IP address

B

If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address ofRouter A

C

If another router were added to this GLBP group, there would be two backup AVGs

D

Router B is in GLBP listen state

E

Router A alternately responds to ARP requests with different virtual MAC addresses

F

Router B will transition from blocking state to forwarding state when it becomes the AVG

单选题 Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

A

Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1

B

No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0

C

No. Traffic will loop back and forth between switch S5 and S2

D

Yes. Traffic will pass from switch S6 to S3 to S2 to S1

E

No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end

多选题 Which three IP multicast address related statements are true? (Choose three.) () 

A

Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted  with Time to Live (TTL) greater than 1.

B

Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.

C

Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and  IGMPv3.

D

Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1  and 238.1.1.1 could not be used together.

E

Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA

F

The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in  purpose to RFC 1918 private unicast addresses.

多选题 Refer to the exhibit. Which two statements are true about the partial configuration that is provided.  (Choose two.) ()

A

 All the configured neighbors are in autonomous system 100.

B

 The peer group shortens the IBGP configuration.

C

 The peer group shortens the EBGP configuration.

D

 Only the outgoing filters are applied to BGP updates.

E

 Three AS-path filters are applied to each BGP neighbor.

单选题 Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?()

A

 Endpoint 1 is the only acceptable place to establish a trust boundary.

B

 Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.

C

 Endpoint 2 is the only acceptable place to establish a trust boundary.

D

 Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.

E

 Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.

F

 Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to  establish a trust boundary.

多选题 Which three restrictions apply to OSPF stub areas? ()

A

 No virtual links are allowed.

B

 The area cannot be a backbone area.

C

 Redistribution is not allowed unless the packet is changed to a type 7 packet.

D

 The area has no more than 10 routers.

E

 No autonomous system border routers are allowed.

F

 Interarea routes are suppressed.

多选题 Which two multicast protocol statements are true? (Choose two.)  ()

A

 Dense mode multicast requires explicit join messages from their members.

B

 Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic.

C

 Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.  

D

 Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.

E

 The primary use of sparse mode multicast is for test labs and router performance testing.

多选题 What are two rules for compacting IPv6 addresses?()

A

The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two

B

The leading zeroes in any 16-bit segment do not have to be written.

C

Every 16-bit segment that consists of all zeroes can be represented with a single colon

D

The trailing zeroes in any 16-bit segment do not have to be written.

E

Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon

F

Two zeroes in the middle of any 16-bit segment do not have to be written

单选题 Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

A

 Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of  master virtual router.

B

 Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, it will regain the master virtual  router role.

C

 Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of  master virtual router.

D

 Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, it will regain the master virtual  router role.

1 2 3 4 5 下一页 尾页 /

到第