思科认证英文题库300-410
Ramesh,s Study Guide(1)-思科认证试题
![Ramesh,s Study Guide(1)-思科认证试题](https://img.taocdn.com/s3/m/44ab0ddaf242336c1fb95e29.png)
Ramesh,s Study Guide(1)-思科认证试题Here is my latest Dump of CCNA exam which i took today with a score of 810.It was quite difficult unlike my expectation. The questions were from from the normal topics except few. However most of these questions were very badly worded Both gramatically and technically to confuse the guys. I think it is deliberately done by Cisco to fail the poor guys and make more money.So Here is Comprehensive Exam Cram for many of you preparing for CCNA. This cram was prepared by myself, quite a lot of hardwork behind this, i am sure you will appreciate it. This is more than enough to pass this exam with a similar score of mine.There are quite lot of short wordings used here only to reduce the time you might take to read this. You will have no problems in understanding this if you have a reasonably good networking knowledge.Ramesh's Study GuideOSI Layers: It allows changes in one layer to occur without changing other layers, It clarifies what general function is to be done rather than how to do it.Application –file, print, message, database, application svcs. identifying communication partners, determining resource availability, and synchng sending & receiving applictns, Eg: SMB, NCP, Telnet, FTP, WWW and SMTP, File Transfer Access and Mangt (FTAM), Virtual Term Proto (VTP), and Common Mangt Info Proto (CMIP).Presentation-Negotiating data xfer Syntax, Data encryption, compression, translation, coding and conversion functions. Eg. ASCII, EBCDIC, JPEG, GIF, TIFF, MPEG, PICT, MIDI, QuickTime, Session?u>Dialog Control-establishes, manages, maintains, and terminates sessions between applications, communication sessions consist of service requests and service responses that occur between applications located in different network devices. Eg. NFS (sun), SQL, RPC, X window, ASP, Zone Info Proto (ZIP), and Session Control Proto (SCP).Transport-End-End conn, hides info from upper layer, gives transparent data transfer, segments and reassembles data into data streams. responsible for both reliable and unreliable end-to-end logical conn. does flow control, windowing, acknowledgement, multiplexing, virtual circuit management, session establishment and error checking and recovery.Eg. TCP, UDP, SPX, Name Binding Protocol (NBP), Nwlink, NetBeui, ATP, NBP.Network-Routing-uses logical addressing to provide routing and related functions that allow multiple data links to be combined into an internetwork. supports both con。
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)
![Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)](https://img.taocdn.com/s3/m/b315907f852458fb770b56f7.png)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 and r5.f. create a static route on router r2 (ip route 22.1.1.0 255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to addadditional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to 137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with 200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear asone route to ospf.。
Cisco CCNA 认证考试最新真题
![Cisco CCNA 认证考试最新真题](https://img.taocdn.com/s3/m/8bbed74be45c3b3567ec8bd7.png)
Cisco CCNA 认证考试最新真题体验1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address 10.121.16.8 is the local router port used to forward data.C.102 is the remote DLCI that will receive the information.D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?A.the session layerB.the network layerC.the data link layerD.the access layer3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?A.router(config)# line console 0router(config-line)# enable password ciscoB.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# loginC.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# loginD.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login4. On point-to-point networks, OSPF hello packets are addressed to which address?A.127.0.0.1B.192.168.0.5C.224.0.0.5D.254.255.255.2555. What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported6. During startup, the router displays the following error message:boot: cannot open "flash:" What will the router do next?A.Because of damaged flash memory, the router will fail the POST.B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialogC.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog7. At which OSI layer is a logical path created between two host systems?A.sessionB.transportworkD.physical8. A routing protocol is required that supports:1) routing update authentication2) an addressing scheme that conserves IP addresses3) multiple vendors4) a network with over 50 routersWhich routing protocol fulfills these requirements?A.RIPv1B.RIPv2C.EIGRPD.OSPF9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A.no VLANsB.all VLANsC.only VLANs 1 - 6D.only the VLANs that are specified when creating the trunk10. Which protocol provides a method of sharing VLAN configuration information between switches?A.VTPB.STPC.ISLD.802.1QDBDCB CCDBA博主的更多文章>>CCNA第一学期《Final Examination》2009-02-27 08:58:47 标签:CCNA[推送到技术圈]1请参见图示。
思科认证考试试题
![思科认证考试试题](https://img.taocdn.com/s3/m/5c29b1129e31433238689338.png)
思科认证考试试题该公司针对其产品的网络规划和网络支持推出了工程师资格认证计划(Cisco Career Certification Program,简称CCCP),并要求其在各国的代理拥有这样的工程师,以提高对用户的'服务质量,建立Cisco产品网络工程师的资格认证体系。
ip classlessip default-network 198.0.18.0ip route 0.0.0.0 0.0.0.0 198.0.18.5ip http serverRTR_1#show ip route192.168.36.0/30 is subnetted, 1 subnetsC 192.168.36.12 is directly connected, Serial 0/0192.168.60.0/24 is variably subnetted, 5 subnets, 2 masksC 192.168.60.24/30 is directly connected, Serial0/1D 192.168.60.128/28 [ 90/21026560 ] via 192.168.60.26, 00:00:57, Serial 0/1D 192.168.60.144/28 [ 90/21026560 ] via 192.168.60.26, 00:00:57, Serial 0/1D 192.168.60.96/28 [ 90/21026560 ] via 192.168.36.14, 00:00:57, Serial 0/0192.168.77.0/30 is subnetted, 1 subnetsC 192.168.77.32 is directly connected, FastEthernet0/0C 192.0.18.0/24 is directly connected, Serial 1/0*S 0.0.0.0 via 198.0.18.5Explanation:Step1:Identify the faults in configuration on RTR_1 and RTR_2. As the SIM specifies all other inter connectivity and internet access for the existing locations of the company are working properly.Routing Protocols used in the SIM is EIGRP with AS 212 as provided by exhibit.Faults Identified:Wrong AS (EIGRP 22) provided at RTR_2 (New router)RTR_1 does not advertise the new network between RTR_1 and RTR_2 into EIGRP.We need to correct the above two configuration mistakes to have full connectivityStep2: Correcting the EIGRP AS to 212Wrong AS (EIGRP 22) provided at RTR_2 (New router)All routers that want to exchange routes within EIGRP needs to be in same Autonomous System.Step 2.1:First we need to remove the current wrong EIGRP AS 22 from Router RTR_2Click on Host-F to get CLI of RTR_2RTR_2>enablePassword : cisco (Provided by SIM Q )RTR_2#conf tRTR_2(conf)#Step 2.2:Removing the wrong EIGRP routing process with AS 22RTR_2(conf)#no router eigrp 22The above statement removes all the EIGRP configuration configured for AS 22 .Step 2.3:Adding the correct EIGRP configurationStart the EIGRP routing process with AS 212RTR_2(conf)#router eigrp 212Step 2.4:Advertise the directly connected networks into EIGRP on RTR_2Fa 0/0 - 192.168.77.34Fa 1/0 - 192.168.60.81Fa 0/1 - 192.168.60.65RTR_2(config-router)#network 192.168.60.0RTR_2(config-router)#network 192.168.77.0RTR_2(config-router)#no auto-summaryRTR_2(config-router)#endStep 2.5:Important save the changes made to router RTR_2RTR_2#copy run startStep 3:RTR_1 does not advertise the new network between RTR_1 and RTR_2 into EIGRP.Click on Host-G to get CLI of RTR_1The network 192.168.77.0 is used between RTR_1 Fa0/0 - RTR_2 Fa 0/0This network needs to be advertise into EIGRP routing process at RTR_1RTR_1>enablePassword : cisco (Provided by SIM Q )RTR_1#conf tRTR_1(conf)#Step 3.1:Enter EIGRP routing process for AS 212RTR_1(conf)#router eigrp 212Step 3.2:The network 192.168.77.0 is used between RTR_1 Fa0/0 - RTR_2 Fa 0/0 . Advertise this network into EIGRPRTR_1(config-router)#network 192.168.77.0RTR_1(config-router)#endStep 3.3:Important save the changes made to router RTR_1RTR_1#copy run startVerification:From RTR_2 CLIping RTR_1 Serial 1/0 IP address 198.0.18.6RTR_2#ping 198.0.18.6!!!!!A successful ping shows the new RTR_2 will have fullconnectivity with other routers.Any Questions are welcomed!!!!!。
Cisco认证实验考试经典题库CCIE_BootCamp3.0
![Cisco认证实验考试经典题库CCIE_BootCamp3.0](https://img.taocdn.com/s3/m/63f7fe4d51e79b8969022650.png)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)137.20.0.0/24 is subnetted, 1 subnets c 137.20.20.0 is directly connected, ethernet 0 172.168.0.0/16 is variably subnetted, 7 subnets, 2 masks o ia 172.168.30.0/24 [110/65] via 172.168.100.3, 00:09:03, serial 1.1 i 172.168.40.0/24 [100/8576] via 172.168.200.2, 00:01:11, serial 1.2 o ia 172.168.60.0/24 [110/1572] via 172.168.65.1. 00:09:03, bri0 c 172.168.65.0/24 is directly connected, bri0 c172.168.100.0/24 is directly connected, serial 1.1 o172.168.100.0/24 [110/64] via 172.168.100.3, 00:09:13, serial 1.1 c 172.168.200.0/24 is directly connected, serial 1.2 o e1 192.168. 21.0/24 [110/21] via 137.20.20.1.00:09:03, ethernet 0 o e1 192.168. 17.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o e1 192.168. 70.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o*e10.0.0.0/0 [110/21] via 137.20.20.1. 00:09:03, ethernet 0r5#show ip ospf int bri0 bri0 is up, line protocol is up (spoofing) internet address 172.168.65.2/24, area 10 process id 1, router id 172.168.200.1, network typepoint_to_point, cost 1562 run as demand circuit donotage lsa allowed. transmit delay is 1 sec, state point_to_point,timer intervals configured, hello 10, dead 40, wait 40, retransmit 5 hello due in 00:00:06 neighbor count is 1, adjacent neighbor count is 1 adjacent with neighbor172.168.100.6 (hello suppressed) suppress hello for 1 neighbor(s) r5#show dialer bri0 – dialer type =isdn dial string successes failures last called last status 4930622 1 0 00:08:45 successful 0 incoming call(s) have been screened 0 incoming call(s) rejected for callback bri0:1 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle bri0:2 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle r5# now go back to router r7 and bring up router r7’s interface s4 again 3. ipx configuration –15 pts (1 hour) a. configure all the active interfaces, including loopbacks, on routers r1, r2, r3, r5, r6, and r8 for ipx. b. configure router r8 and the lan interfaces on routers r3, r4, r5 and r6 for ipx rip. c. configure router r1 & r2 for ipx nlsp. d. configure the serial interfaces on the rest of the routers for ipx eigrp( not routers r1& r2 these oly use nlsp), also make the ethernet interface on router r2 ipx eigrp only. e.configure the bri0 interfaces on routers r5 & r6 as ipx rip. f. after this point you should be able to see all the ipx networks in all the routers routing table. test connectivity with ipx ping.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第九章)j. make the default route on r2 appear in he routing table of all the other routers. k. configure routers r1, r2’ss1, and router r8’s ethernet interface e0 for eigrp. configure router r8’s interface to0 for rip. l. redistribute all routers between all routing protocols such that all routes are visible in all routers and every router can ping each other’s ip interfaces (even the loopback on r2) as shown on the lab diagram lab 5a. m. make sure that all ospf external routes appear as type-1, verify your routes. are the routes appearing in the correctly routing protocol? n. configure router r5 such that the only route on r6 for the 137. 20.0.0 network appears exactly as follows; o 137.20.20.0 [110/65] via 172.168.100.5,00:51:03, serial 1. hint pay attention to the underlined value 65. o. configure routers r3 & r4 to resolve dns namesusing dns servers 207.238.183.71 &207.238.183.72. 2. ospf demand circuit –15 pts (1 hour) a. use network172.168.65.0/24 for the isdn interfaces on routers r5 &r6 and ass them to ospf. configure routers r5 & r6 to use the isdn interfaces for restoral[ 恢复]. the isdn link should only come up when you administratively shutdown the serial 4 interface on router r7, and there is interesting traffic trying to get between routers r5 & r6 (i.e. use ping as the interesting traffic to test. make sure you test from router r6 and from router r5. see the router ports/configuration into online for the phone #’s, spids, and switch type if you are using our remote racks. configure the isdn link so that it will shutdown 45 seconds after an inbound or outbound ping packet. both routers should shave full ospf routes when the frame link is functional or not. you are required to use ospf demand-circuit as your solution here, after the initial isdn call to synchronize ospf, your isdn interfaces should stay down unless you break the frame connection between r5 and r6 and there is interesting traffic. now go to router r7 and shut down interface s4, your isdn connection should kick in and provide a backup path for router r6 to reach the rest of the network, butonly when there is data to send. ospf router updates should not keep the isdn up. pretend [假装]your isdn line is charged at $5 per minute and it comes out of your check. at this point when router r7’s interfaces s4 (your frame connection) is still down. router r5 should have the following displays for:”show ip route”, “show ip ospfint bri0”, and “show dialer”notice that the isdn connection is down and router r5 has a routing table with ospf entries using interface bri0 to get to router r6’s ethernet network, and is suppressing ospf hellos for 1 neighbor. also pay attention to the ospf dead time on r5’s bri0 interface. output from router r5 r5# show ip route codes: c- connected, s-static i- igrp, r-rip, m-mobile, b-bgp, d-eigrp, ex-eigrp external, o-ospf, ia-ospf inter area, n1-ospf nssa external type 1, n2- ospf nssa external type2, e1- ospf external type 1, e2- ospf external type 2 e- egp i- is-is, l1- is-is lever-1, l2- is-is level-2, *- candidate default, u- per-user static route, o- od gateway of last resort is 137.20.20.1 to network0.0.0.0Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 andr5.f. create a static route on router r2 (ip route 22.1.1.0255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear as one route to ospf.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第七章)d. routers r1, r3 and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with a 9-bit subnet mask on its ethernet interface.(the mask should be 255.255.128.0) sue subnet-zero here.g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface. (the mask shouldbe 255.255.0.0)i. use network 11.1.x.x 255.255.0.0 between routers r5 &r6.2. ospf & other ip routing configuration –35 pts (1hous 30 mins)a. configure ospf area 0 on the frame-relay interfaces between routers r1,r3, and r5.b. place router r1’s ethernet in ospf area 1. place router r3’s interface to 0 in ospf area 2.c. place router r3’s interface serial 0, and all of router r4 in ospf area 3. make ospf area 3 a totally-stubby area.d. place r5 and r6 ethernet interface in ospf area 4. make this ospf area a nssa (not-so-stubby-area) make the default cost 20.e. configure router r6’s interface serial 0 and routerr8’s interfaces s0, e0,and loop 0 for eigrp.f. place router r2’s interface serial 0 and router r1’ss0.1 in ospf area 5.g. redistribute all routes so that you can see all routes and ping from everywhere.h. summarize the routers for router r8’s interface e0, loop0, and s0 that were redistributed into ospf by routerr6 on router r5 so that all of router r8’s networks appear as one route to the rest of the ospf routers except r6.i. when you redistribute eigrp into ospf make these routes appear as type-1 external routes.j. configure router r2 such that it propagates a default route the other ospf routers.k. create a second loopback interface on router r2 with an address of 20.1.1.1/24. make sure you can ping the second loopback interface on router r2 from other the routers.l. create two loopbacks on router r3 with networks that could contain at most 30 hosts. place the loopbacks onrouter r3 in one area and summarize such that one route appears for both loopacks.m. place the ethernet interface on router r2 in area 10. n. configure simple password authentication in ospf area 4. o. use the ip ospf priority command on router r5 to make it become the dr for ospf area 4.p. change the cost on router r5’s interface e0 using an ip ospf command to make it appear as 100mbps as it relates to ospf metrics.q. change the cost on r6’s e0 without using an ip ospf command to make it appear as 100mbps as it relates to ospf metics.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第六章)d. configure two static saps on router r3. filter on router r5 such that routers r6 and r8 only see one of the saps.e. disable ipx on the between routers r3 &r4 all routes should still be seen by all routers running ipx.f. change the frequency of the rip updates across the r3-r4serial connection to once every 2 minutes.g. configure router r1’s ethernet with ipx 802.2 and 802.3 raw frame types.h. configure routers r3 and r4 to pass ipx netbios type-20 broadcasts between their lan interfaces.5. dlsw configuration – 10 pts (45 mins)a. configure dlsw between router r3’s interface token-ring0 and router r4’s interface ethernet 0.b. place router r2’s interface ethernet 0 into the dlsw network. make sure there is connectivity between all lan interfaces.c. configure a filter that blocks netbios packets with destination name ‘cciering1” from leaving router r3’s interface to0.d. setup a filter that would permit only sna traffic between routers r3 & r4.6. bgp configuration – 15 pts (1h)a. configure bgp on router r4 using as number 1. configure bgp on routers r1, r2, r3 and r5 using as number 2. you can only use one neighbor x.x..x.x remote-as 2 command on routers r2 and r5.b. configure two static routes to 172.168.1.0/24 and172.168.2.0/24 using the command ip route 172.168.1.0255.255.255.0 null 0 on router r4, redistribute the second route into bgp using the route-map command.c. make sure that router r5 can see the 172.168.2.0 route.d. setup router r8 with bgp in as number 3. on router r8 use the loopback interface lo0 as the source for its bgp connection to as2. make sure router r8 can see the specific 172.168.2.0 route, and not the aggregate 172.168.0.0you have completed lab 3. compare your configurations to the ones we provided. often there si more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations too.lab4at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration -10pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1,r2,r3, and r5 over the frame-relay. configure router r1 using sub-interfaces. configure routers r2.r3, and r5 without using sub-interfaces.c. use only frame-relay pvc on routers r2, r3 and r5. the recommended dlci numbers 102.201.103.105, and 501 are indicated on the network diagram.Cisco认证实验考试经典题库CCIE_BootCamp3.0(5)i. configure the ethernet interface e0 on router r4 to bein ospf area 40. j. configure the r5, r6, and r8 ethernet 0 interface to use eigrp. k. configure r8’s interface loop5 as 192.168.100.1/24 and add it to rip l. redistribute routes between all protocols such that router r1 can ping any interface. m. configure 2 loopbacks interfaces onrouter r8 with 10.1.1.1/24 & 10.1.2.1/24. add there to rip and redistribute rip to eigrp. summarize such that allrouters only see one route to the loopback interfaces. test connectivity to loopback interface via ping. n. filter such that router r6 can ping the loopbacks on router r1, but not the ethernet interface on router r1. the route for the ethernet on router r1 should still be visible and all other traffic such as telnet should still pass unfiltered. o. filter on router r5 such that routers r1 r2, r3, and r4, don’t see the route to router r8’s interface loopback 5. p. create three loopback interfaces on router r8 and use 160.10.10.1/24 for loopback 2, q. 161.10.10.1/24 for loopback 3, and 170.10.10.1 for loopback 4. now summarize the three loopback networks into one route. when done router r1 should see only one route for these three loopback interfaces ana should be able to ping all three of them. hint, the route may not look like what you think. 3. ntp & access-list & other tasks -15 pts (30 mins) a. configure ntp between routers r2 &r3. make r2 the time source. set the correct time and date on router on router r2. set the time-zone on routers r2 & r3, verify that router r3 has synced with router r2 via ntp. b. configure queuing on router r3’s s0 interface such that telnet, ip, ipx, and everything else use 25% of the bandwidth each.configure the queuing such that none of the traffic defined at 25% above uses more than 1000 bytes per time slice. you are allowed to exceed 1000 bytes per time slice only if there is part of a remaining individual packet that needs to be emptied from the queue. c. configure the frame-relay interface on router r2’s interface so such that ip is discard eligible on the frame. d. create the following 6 static routes on router r6; suing the cisco ios command ip route 192.168.x.0 255.255.255.0 null 0. use the number1,2,3,4,5 and 6 for the variable x. redistribute the static routes such that they are seen by all the other routers. now filter on router r5 using any method that use an access list so that only the even routes (i.e. x=2,4,and 6) are seen past router r5 towards the ospf network. your access-list can only have two lines in it, not seven for this exercise. all the 192.168.x.0 routes must still be seen in router r5’s routing table.4. ipx configuration – 20 pts (1h) a. configure all interface(including loopbacks ) for ipx b. configure ipx eigrp on the nbma frame-relay network c. configure ipxrip/sap everywhere else.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第四章)n. filter on router r5 such that the bgp route to null0 defined on router r4 isn’t seen on routers r6 &r8. o. hint the object of this bgp section is to provide end-to-end connectivity between all routers and interfaces. in this exercise you are not allowed to configure igp or two-way static route connectivity between routers r5 & r6, bgp should be providing the necessary routing information. you are allowed to setup a default route on router r6 to point to router r5. now that you have completed lab 2 check., the routing tables on all routers. do they make sense? ping all interfaces from all routers. can you ping everywhere? do the appropriate routers see the static route to null0 on r4 via bgp? go to every router and ping every interface. if you can’t ping everything you are not done yes. you have completed lab 2. compare your configuration to ones we provided. often there is more than one to complete a task so your configurations may be different than ours. if your configurations are different than ours make sure you understand how to complete the lab with our configurations too lab 3 at the end of this lab verify connectivity to allports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks. 1. initial configuration -5 pts (30 mins) a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks. b. configure lab 3 network using network 137.20.x.x c. create a loopback interface on router r2 with 172.168.32.1/24. d. connect routers r1,r2, r3, and r5 over frame-relay cloud. e. configure router r1 using sub-interfaces. f. configure router r2 without using sub-interfaces or frame-relay map commands. g. put routers r1 &r2 frame-relay interfaces on one subnet and routers r1, r3, and r5 on a different subnet. 2. ospf & other ip routing configuration -35 pts ( 2 h) a. configure ospf with the frame-relay cloud in ospf area 0 b. configure the r3-r4 serial connection to be in area 1. c. set the ring-speed on router r3 to 16 mbps. d. configure the loopback interface on router r2 in adifferent ospf area. e. configure the lan interfaces onrouters r1, r2,and r3 to be in different ospf areas. f. configure two loopbacks on router r3 using subnets thatwill contain at most 30 host ip addresses. g. configure two loopback interfaces on router r1 using subnets that will contain at most 14 host ip addresses. h. summarize the two loopback interfaces on routers r1 and r3 such that routerr2 only sees one route from each.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第三章)k. configure router r6 for ospf with a different process id than used thus far. do not configure r6’s e0 for ospf. l. configure router r8 to be in the same ospf area as routerr6. put router r8’s interface e0&lo0 into the ospf routing process. configure router r6 so that its s1 interface speed is correctly reflected in the ospf metrics without using the “ip ospf cost xxx” command. m. configure ospf message-digest authentication between routers r6 & r8. n. change the ospf hello interval between routers r6 & r8 to 45 seconds. o. configure router r8 suing the “ip ospf cost” command such that the speed of the link forinterface s0 is correctly reflected in the ospf metrics. p.change the ospf transmit interval delay to 10 seconds between routes r6 & r8. q. add a default route to router r2 that points to 137.20.20.2. configure one static route on router r2 so that full connectivity to r4’s interface e0 is available. you will notice that the default gateway of router r2 has a lower administrative cost than the one learned via router r1. as a result, the other default route never makes it in the routing table for router r2. r. you will notice that r2 can’t ping the serial interfaces between routers r3 & r4. fix this problem by only making changes to router r3 without static routes. 3. bgp configuration -15 pts (1 hour) a. configure router r4 in bgp autonomous system 1. b. create a static route to null0 router r4 and redistribute into bgp. c. create a loopback interface on r4 and add its network to bgp d. when adding the first loopback to bgp use a class a address with a 24-bit mask. the network that was added to bgp from the first loopback address should appear in the routing table of other routers as “ b 44.1.1.0…” e. create another loopback on router r4 with a class a address and put this network into rip and redistribute rip into bgp. f. configure router r3 in bgp autonomous system 1 and useinterface loopback 0 as the update source. g. configure routers r1, r2, and r5 in bgp autonomous system 2, only use one neighbor x.x.x.x remote-as 2 command on routers r2, r3. &r5 for autonomous system 2. h. place routers r6 and r8 in bgp autonomous system 3. i. configure bgp authentication between router r6 & r8. j. configure a loopback interface on router r8 and enable rip for this network. redistribute this rip network into ospf. k. redistribute the ospf routing process that contains routers r6 and r8 into bgp. l. you are not allowed to add any static routes to routerr8 during this exercise. m. configure router r6 such that all bgp routes learned from router r5 have a local preference of 300.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第二章)lab 2at the end of this lab verify connectivity to all ports. you should be able to ping every interface from and router. (don’t worry about being able to ping a local frame-relayinterface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration – 5 pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1, r2, r3, and r5 over the frame-relay cloud. configure router r1 using sub-interfaces. configure routers r2, r3, and r5 without using sub-interface.c. use only one frame-relay pvc on routers r2, r3, and r5, the recommended dlci numbers 102,201,103, 301,105, and 501 for the frame-relay pvc’s are indicated on the network diagram.d. routers r1,r3,and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfacese. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface ( the mask shouldbe 255.255.0.0)2. ospf configuration –30 pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between routers r1, r3 and router r5.b. place router r1’s ethernet in ospf area 1. place router r5’s interface e0 in ospf area 0.c. setup a default static route (default gateway) from r3to r4. redistribute this default static route into ospfwith a metric-type of 1 and a metric of 500.d. configure router r3’s serial 1 interface as173.168.40.1/24 and router r4’s serial 0 interface as172.168.40.2/24.e. configure router r4’s e0 interface as 200.100.100.1/24.f. configure a default gateway on router r4 to route all packets for which it has no routes to router r3.g. configure two loopback interfaces on router r3 with networks that could have at most 254 hosts and put themboth in the same ospf area, but different from ospf area 0. summarize this route into ospf so that the two subnets appear as one route.h. configure router r2 for eigrp and put all interface in the routing process.i. configure router r1 with eigrp and redistribute with ospf. set the metric type to type-1 when you redistribute from eigrp to ospf. also, redistribute ospf into eigrp.j. configure router r1 so that it only listens to eigrp updates on e0 and s0.2.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第一章)1- day format version 3.002- policy routing frame relay ospflab#1network learning, inc. r&s ccie practice lab 1 version2.00 1-day versionat the end of this lab verify connectivity to all ports. you should be able to ping every interface form any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are askedto filter packets, routers or other specific tasks.)1. initial configuration – 5 pts (30 minutes)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram.b. configure router r7 as a frame-relay switch. refer to the diagram for interface connections to other routers connected to router r7.c. connect routers r1,r2, r3, and r5 over the frame-relay cloud. configure router r1’s s0 interface as a sub-interface. configure r2,r3, and r5 without using sub-interfaces. use only one frame-relay pvc on routers r2, r3, and r5. the recommended dlci numbers 102, 201,103,301,105, and 501 are indicated on the lab diagram.d. routers r1, r2, r3, and r5 should share network10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)f. make sure all the ethernet interfaces are in their own broadcast domain if you are using an ethernet switch for your ethernet connections.2. ospf configuration –25pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between r1, r2, r3, and r5.b. configure router r1’s interface ethernet 0 for ospf area 1c. configure router r2’s interface e0 for ospf area 10d. configure router r3’s interface s 1 and all of router r4’s interface for ospf area 3.e. configure router r5’s interface e 0 for ospf area 4.f. create two loopback interface on r4 and put both of the associated subnets on these interfaces in ospf area 44.g. summarize the (2) loopback interface you just created on router r4 so they appear as one route to the rest of the ospf routers in your network..h. here is the tricky part. you can’t use the command ip ospf network xxxx anywhere in your router configurations.i. redistribute the default route on router r2 as type-1 with a metric of 100. this route is already part of the initial configurations we provided for you.j. also, one of the problems in this lab can be solved with multiple frame map ip statements, but that is not the solution we want you to use, solve the problem with。
CCNA Study Notes1(1)-思科认证试题
![CCNA Study Notes1(1)-思科认证试题](https://img.taocdn.com/s3/m/ef31e5847375a417866f8fb5.png)
CCNA Study Notes1(1)-思科认证试题1. Identify and describe the functions of each of the seven layers of the OSI reference model. Physical LayerThe physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and the physical connectors to be used.Data Link LayerThe data link layer provides reliable transit of data across a physical network link. Different data link layer specifications define different network and protocol characteristics, including the following:Physical addressing --Physical addressing (as opposed to network addressing) defines how devices are addressed at the data link layer.Network topology -- Data link layer specifications often define how devices are to be physically connected (such as in a bus or a ring topology).Error notification -- Error notification involves alerting upper layer protocols that a transmission error has occurred.Sequencing of frames --Sequencing of data frames involves the reordering of frames that are transmitted out of sequence.Flow control -- Flow control involves moderating the transmission of data so that the receiving device is not overwhelmed with more traffic than it can handle at one time.The Institute of Electrical and Electronics Engineers (IEEE) has subdivided the data link layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).Network LayerThe network layer provides routing and related functions that allow multiple data links to be combined into an internetwork. This is accomplished by the logical addressing (as opposed to the physical addressing) of devices. The network layer supports both connection-oriented and connectionless service from higher-layer protocols.Transport LayerThe transport layer implements reliable internetwork data transport services that are transparent to upper layers. Transport layer functions typically include the following:Flow control -- Flow control manages data transmission between devices so that the transmitting device does not send more data than the receiving device can process.Multiplexing -- Multi。
Cisco认证模拟题
![Cisco认证模拟题](https://img.taocdn.com/s3/m/f308d0ce0975f46527d3e1c5.png)
Cisco认证模拟题篇一:思科认证CCNP经典试题第一部分填空题1、在Cisco体系的IGP协议中,RIP的A-D管理距离是,EIGRP的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。
BGP从EBGP学习到的路由学到路由的A-D管理距离是; BGP 从IBGP学习到的路由学到路由的A-D管理距离是。
2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP 从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP的默认本地优先级为:。
3、BGP的邻居分为和。
4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。
如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。
5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是。
(没有/10的写法)8、在选择STP的角色(身份)有哪些?默认STP的收敛时间为配置了portfast后,收敛时间会小于。
9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP发送hello包组播地址是;VRRP发送hello包的组播地址是。
10、目前以太通道最多可以使用通道方式有。
11、BGP在EBGP中使用AS间的环路(确保无环),该属性属于BGP的必遵属性,其中还有哪两个是BGP公认必遵属性为和。
第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IPCEFFIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2BK3,K4C、K1,K5D、K1,K33、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。
CCNA英文试题_(含答案)
![CCNA英文试题_(含答案)](https://img.taocdn.com/s3/m/c53e1f17cd7931b765ce0508763231126edb771c.png)
1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。
CCIE模拟考试题_思科认证考试.doc
![CCIE模拟考试题_思科认证考试.doc](https://img.taocdn.com/s3/m/c92f99d925c52cc58ad6be07.png)
CCIE模拟考试题_思科认证考试1.What statement is FALSE with respect to the operation of Unidirectional Link Detection?A. It negotiates the Unidirectional Link Detection link state during physical signaling.B. It performs tasks that autonegotiation cannot perform.C. It works by exchanging protocol packets between the neighboring devices.D. Both devices on the link must support Unidirectional Link Detection and have it enabled on respective ports.2.What is true concerning Traffic contract, Traffic shaping, and Traffic policing in ATM networks?A. They are parameters of PNNI set during PNNI configuration.B. They are forms of QoS features used in ATM networks.C. They are types of SVCs.D. They are types of PVCs.E. They are only used between ATM switches to control traffic flows.3.Which are the primary reasons to use traffic shaping? (Select two)A. To control the maximum rate of traffic transmitted or received on an interface.B. To control access to available bandwidth.C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits.D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets.E. To ensure that traffic conforms to the policies established for it.4.In a bridged network running IEEE 802.1d spanning tree, what parameter will a bridge take form the root bridge?A. MaxageB. Forwarding delayC. Hello timeD. All of the above5.What statement is FALSE concerning the use of SPAN on the Catalyst 6500?A. It is possible to configure SPAN to have a Gigabit port, such as source port, and a 10/100 port as the destination port.B. If the source port is configured as a trunk port, the traffic on the destination port will be tagged as well, regardless of the configuration on the destination port.C. When a SPAN session is active the destination port does not participate in Spanning Tree.D. With SPAN an entire VLAN can be configured to be the source.E. In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN.。
CISCO资格认证考试:CCNP模拟试题BSCI.doc
![CISCO资格认证考试:CCNP模拟试题BSCI.doc](https://img.taocdn.com/s3/m/f24c3ef2a8956bec0875e363.png)
CISCO资格认证考试:CCNP模拟试题BSCICCNP - BSCI6.Which of the following is a characteristic of link-state protocols?A. A network topology change generates an update that is broadcast to every router onthe network.B. The periodic routing update interval is slightly different in each router on a subnet.C. Each router creates a routing table that only includes its directly connected neighbors.D. Link-state protocols send routing updates only when there is a change in the networktopology.7.What is the term associated with synchronizing the routing tables after a topology change occurs?A. floodingB. broadcastingC. convergenceD. summarization8.Which of the following must be determined first by the router in order to route the data?A. the distance metric of the dataB. the source address of the dataC. which routing protocol is used by the dataD. whether the protocol suite of the data is active9.You are a technician at ABC. ABC has the subnet/mask of 172.29.100.0/26 set aside for small remote locations. Each location will have 5 IP devices connected to the network. Which VLSM mask will provide the minimum number of hosts you require?A. /27B. /28C. /29D. /30E. /3110.You are a trainee technician at ABC. Your instructor shows you the following route summarization entry:192.168.134.0/22 Your instructor wants to know how many class C addresses are contained in this summarization. What would your reply be?A. 1E. 16。
思科认证(cisco)题4
![思科认证(cisco)题4](https://img.taocdn.com/s3/m/6857fedb6f1aff00bed51e40.png)
301.One of the differences between Kerberos and KryptoKnight is that there is:a. a mapped relationship among the parties takes placeb. there is a peer-to-peer relationship among the parties with themselves.c. there is no peer-to-peer relationship among the parties and the KDCd. a peer-to-peer relationship among the parties and the KDCAnswer: D302.Which of thfoloing centralizdaccess control mechanisms is not appropriate for mobile workers accessthe corporate network over analog lines?a. TACACSb. Call-backc. CHAPd. RADIUSAnswer: B303.In addition to the accuracy of the biometric systems, there are other factors that must also be considered:a. These factors include the enrollment time and the throughput rate, but not acceptability.b. These factors do not include the enrollment time, the throughput rate, and acceptability.c. These factors include the enrollment time, the throughput rate, and acceptability.d. These factors include the enrollment time, but not the throughput rate, neither the acceptability. Answer: C304.Which of the following would NOT be considered a Deial of Service Attack?a. Zone Transferb. Smurfc. Syn Floodd. TearDropAnswer: A305.What is called the type of access control where there are pairs of elements that have the least upperbound of values and greatest lower bound of values?a. Mandatory modelb. Discretionary modelc. Lattice modeld. Rule modelAnswer: CLattice-based access control provides an upper bound and lower bound of access capabilities for everysubject and object relationship.Pg 156 Shon Harris All-In-One CISSP Certification Exam Guide306.Which of the following biometric characteristics cannot be used to uniquely authenticate an individual's identity?a. Retina scansb. Iris scansc. Palm scansd. Skin scansAnswer: DBiometrics:FingerprintsPalm ScanHand GeometryRetina ScanIris ScanSignature DynamicsKeyboard DynamicV oice PrintFacial ScanHand TopologyPg. 128-130 Shon Harris All-In-One CISSP Certification Exam Guide307.In non-discretionary access control, a central authority determines what subjects can have access tocertain objects based on the organizational security policy. The access controls may be based on:a. the societies role in the organizationb. the individual's role in the organizationc. the group-dynamics as they relate to the individual's role in the organizationd. the group-dynamics as they relate to the master-slave role in the organizationAnswer: Bobjects based on organizational security policy. The access controls may be based on the individual's role inthe organization (role-based) or the subject's responsibilities and duties (task-based).Pg. 33 Krutz: The CISSP Prep Guide.308.In biometric identification systems, at the beginning, it was soon apparent that trulypositive identification could only be based on physical attributes of a person. This raised the necessicity of answering 2 questions:a. What was the sex of a person and his ageb. what part of body to be used and how to accomplish identification to be viablec. what was the age of a person and his income leveld. whatwas the tone of the voice of a person and his habbitsAnswer: B309.Which of the following can best eliminate dial-up access through a Remote Access Server as a hackingvector?a. Using TACACS+ serverb. Installing th Remote Access Server outside thefirewall and forcing legitimate users to authenticate to thefirewall.c. Setting modem ring count to at least 5d. Only attaching modems to non-networked hosts.Answer: B310.Which of the following forms of authentication would most likely apply a digital signature algorithmto every bit of data that is sent from the claimant to the verifier?a. Dynamic authenticationb. Continuous authenticationc. Encrypted authenticationd. Robust authenticationAnswer: CThe correct answer is C. Unable to find any references to continuous encryption."A digital signature is the encrypted hash value of a message." Pg 550 Shon Harris: CISSP All-In-OneCertification Exam Guide."There are other options to improve the security offered by password authentication:Use the strongest form of one-way encryption available for password storage.Never allow passwords to be transmitted in clear text or with weak encryption." Pg. 9 Tittel: CISSP StudyGuide"[Kerberos] A complicated exchange of tickets (i.e., cryptographic messages) between the client, the server,and the TGS is used to prove identity and provide authentication between the client and server. This allowsthe client to request resources from the server while having full assurance that both entities are who theyclaimm to be. The exchange of encrypted tickets also ensures that no logon credentials, session keys, orauthentication messages are ever transmitted in the clear text." Pg 14 Tittel: CISSP Study Guide Note: There are 42 TCP/IP questions in the pool311.The OSI model contains seven layers. TCP/IP is generally accepted as having how many layers?a. fourb. fivec. sixd. eightAnswer: AThe TCP/IP Protocol Model is similar to the OSI model, but it defines only the following four layers insteadof seven: Application Layer, Host-to-Host Transport Layer, Internet Layer, Network Access or Link Layer.Pg. 84 Krutz: The CISSP Prep Guide.312.Which of the following layers provides end-to-end service?a. Network Layerb. Link Layerc. Transport Layerd. Presentation LayerAnswer: CSession services located in the Transport Layer both segment and reassemble the data from upper-layerapplications and unite it onto the same data stream, which provides end-to-end data transport services andestablishes a logical connection between the sending host and destination host on a network.Pg. 82 Krutz: The CISSP Prep Guide.313.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 172.5.42.5b. 172.76.42.5c. 172.90.42.5d. 172.16.42.5Answer: DThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSP Prep Guide.314.Telnet and rlogin use which protocol?a. UDPb. SNMPc. TCPd. IGPAnswer: C315.Which of the following provide network redundancy in a local network environment?a. Mirroringb. Shadowingc. Dual backbonesd. DuplexingAnswer: C316.The connection using fiber optics from a phone company's branch office to local customers is which ofthe following?a. new loopb. local loopc. loopbackd. indigenous loopAnswer: B317.The IP header contains a protocol field. If this fild contains the value of 2, what type of data is contained within the IP datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: D318.In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP, control functions are provided?a. Linkb. Transportc. Presentationd. ApplicationAnswer: A319.Which of the following is true related to network sniffing?a. Sniffers allow an attacher to monitor data passing across a network.b. Sniffers alter the source address of a computer to disguise and exploit weak authentication methods.c. Sniffers take over network connectionsd. Sniffers send IP fragments to a system that overlap with each otherAnswer: A320.In the days before CIDR (Classless Internet Domain Routing), networks were commonly organizaedby classes. Which of the following would have been true of a Class B network?a. The first bit of the ipaddress would be set to zerob. The first bit of the ipaddress would be set to one and the second bit set to zeroc. The first two bits of an ipaddress would be set to one, and the third bit set to zerod. The first three bits of the ipaddress would be set to oneAnswer: B321.The IP header contains a protocol field. If this field contains the value of 17, w hat type of data iscontained within the ip datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: CICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.322.The IP header contains a protocol field. If this field contains the value of 6, what type of data iscontained within the ip datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: AICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.323.The IP header contains a protocol field. If this field contains the value of 1, what type of data iscontained within the IP datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: BICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.324.In the OSI/ISO model, at what level are TCP and UDP provided?a. Transportb. Networkc. Presentationd. ApplicationAnswer: ATransport Layer. .... TCP and UDP operate on this layer.' Pg 82. Krutz: The CISSP Prep Guide.325.Fast ethernet operates at which of the following?a. 10 MBpsb. 100 MBpsc. 1000 MBpsd. All of the aboveAnswer: B326.A Packet containing a long string of NOP's followed by a command is usually indicative of what?a. A syn scanb. A half-port scanc. A buffer overflowd. A packet destined for the network's broadcast addressAnswer: C327.Y ou are running a packet sniffer on a network and see a packet with a long string of long string of "9090 90 90...." in the middle of it traveling to an x86-based machine. This could be indicative of what?a. Over-subscription of the traffic on a backboneb. A source quench packetc. a FIN scand. A buffer overflowAnswer: D328.Which of the following statements about the "Intranet" is NOT true?a. It is an add-on to a local area network.b. It is unrestricted and publicaly available.c. It is usually restricted to a community of usersd. t can work with MANS or W ANSAnswer: BExplanation:"An intranet is a 'private' network that uses Internet technologies, such as TCP/IP. The company has Webservers and client machines using Web browsers, and it uses the TCP/IP protocol suite. The Web pages arewritten in Hypertext Markup Language (HTML) or Extensible Markup Language (XML) and are accessedvia HTTP." Pg 395 Shon Harris: All-In-One CISSP Certification Guide.329.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 10.0.42.5b. 11.0.42.5c. 12.0.42.5d. 13.0.42.5Answer: AThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSP Prep Guide.330.What is the proper term to refer to a single unit of TCP data at the transport layer?a. TCP segmentb. TCP datagramc. TCP framed. TCP packetAnswer: AThe data package created at the transport layer, which encapsulates the Application layer message is called asegment if it comes from TCP/IP." Pg. 27 Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.331.Which of the following type of packets can *easily* be denied with a stateful packet filter?a. ICMPb. TCPc. UDPd. IPAnswer: B332.What is the proper term to refer to a single unit of Ethernet data?a. Ethernet segmentb. Ethernet datagramc. Ethernet framed. Ethernet packetAnswer: CWhen the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.)Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames. Pg.40 Sams Teach Y ourself TCP/IP in 24 hrs.333.Which of the following is True:a. TCP is connection-oriented. UDP is notb. UDP provides for Error Correction. TCP does not.c. UDP is useful for longer messagesd. UDP gaurantees delivers of data. TCP does not gaurantee delivery of data.Answer: A334.Which of the following OSI layers does not provide confidentiality?a. Presentationb. Networkc. Transportd. SessionAnswer: CPresentation: This layer also handles data compression and encryption.Network: The main responsibility of the network layer is to insert information into the packet's header sothat it can be properly routed.Transport: (for purposes of CISSP exam, handles SSL)Session: SSLPg 350 Shon Harris All-In-One CISSP Certification Exam Guide (need newer version for Transportreference)335.DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model?a. Applicationb. Networkc. Presentationd. TransportAnswer: A336.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 172.12.42.5b. 172.140.42.5c. 172.31.42.5d. 172.15.45.5Answer: CThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSPPrep Guide.337.Which of the following OSI layers provides routing and related services?a. Networkb. Presentationc. Sessionc. PhysicalAnswer: A338.The International Standards Organization/Open Systems Interconnection (ISO/OSI) Layers doesNOT have which of the following characteristics?a. Standard model for network communicationsb. Used to gain information from network devices such as count of packets received and routing tablesc. Allows dissimilar networks to communicated. Defines 7 protocol layers (a.k.a. protocol stacks)Answer: BNot A."The Open System Interconnect (OSI) is a worldwide federation that works to provide internationalstandards. "Not C."A protocol is a standard set of rules that determine how systems will communicate across networks. Twodifferent systems can communicate and understand each other because they use the same protocols in spiteof their differences."Pg. 343-344 Shon Harris: CISSP All-In-One Certification Exam Guide339.ARP and RARP map between which of the following?a. DNS addresses and IP addressesb. 32-bit hardware addresses and 48-bit IPv6 addressesc. 32-bit hardware addresses and 48-bit IPv4 addressesd. 32-bit addresses in IPv4 and 48-bit hardware addressesAnswer: DAn Ethernet address is a 48-bit address that is hard-wired into the NIC of the network node. ARP matchesup the 32-bit IP address with this hardware address, which is technically referred to as the Media AccessControl (MAC) address or the physical address. Pg. 87 Krutz: The CISSP Prep Guide.340.Frame relay and X.25 networks are part of which of the following?a. Circuit-switched servicesb. Cell-switched servicesc. Packet-switched servicesd. Dedicated digital servicesAnswer: CPacket-Switched Technologies:Link Access Procedure-Balanced (LAPB)Frame RelaySwitched Multimegabit Data Service (SMDS)Asyncronous Transfer Mode (A TM)V oice over IP (V oIP)341.In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized byclasses. Which of the following would have been true of a Class C network?a. The first bit of the ip address would be set to zerob. The first bit of the ip address would be set to one and the second bit set to zeroc. The first two bits of the ip address would be set to one, and the third bit set to zerod. The first three bits of the ip address would be set to oneAnswer: CPg. 80 Sams Teach Y ourself TCP/IP in 24 hrs.342.Both TCP and UDP use port numbers of what length?a. 32 bitsb. 16 bitsc. 8 bitsd. 4 bitsAnswer: B343.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the Internet)?a. 192.168.42.5b. 192.166.42.5c. 192.175.42.5d. 172.1.42.5Answer: A344.Which of the following access methods is used by Ethernet?a. CSMA/CDb. CSU/DSUc. TCP/IPd. FIFOAnswer: A"Under the Ethernet CSMA/CD media-access process, any computer on a CSMA/CD LAN canaccess thenetwork at any time." Pg. 103 Krutz: The CISSP Prep Guide.345.ICMP and IGMP belong to which layer of the OSI model?a. Datagramb. Networkc. Transportd. LinkAnswer: BThe Network layer (layer 3) is responsible for adding routing information to the data. The Network layeraccepts the segment from the Transport layer and adds information to it to create a packet. The packetincludes the source and destination IP addresses. TThe routing protocols are located at this layer and include the following:Internet Control Message Protocol (ICMP)Routing Information Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)Internet Group Management Protocol (IGMP)Internet Protocol (IP)Internet Packet Exchange (IPX)Pg. 78 Tittel: CISSP Study Guide346.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 iswhich of the following?a. Application Layerb. Presentation Layerc. Data Link Layerd. Network LayerAnswer: B"Presentation Layer (Layer 6)." Pg 81 Krutz The CISSP Prep Guide.347.ICMP and IGMP belong to which layer of the OSI Model? (Fill in the blank)Answer: Network348.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 iswhich of the following? (Fill in the blank)Answer: Presentation Layer349.How do you distinguish between a bridge and a router? (Fill in the blank)Answer: The bridge connectos two networks at the link layer, while router connects two networksthe network layer.350.What is the proper term to refer to a single unit of IP data? (Fill in the blank)Answer: IP Datagram"When the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.)Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames." Pg.40 Sams Teach Y ourself TCP/IP in 24 hrs.351.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers are inwhich of the following order (1 to 7). (Fill in the blank)Answer: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer352.Which of the following OSI layers provides non-repudiation services? (Fill in the blank) Answer: ApplicationNote: There are 50 HIPPA Questions in the pool353.The privacy provisions of the federal law, the Health Insurance Portability and Acc ountability Act of1996 (HIPPA),A. apply to certain types of critical health information created or maintained by health care providerswho engage in certain electronic transactions, health plans, and health care clearinghouses.B. apply to health information created or maintained by health care providers who engage in certainelectronic transactions, health plans, and health care clearinghouses.C. apply to health information created or maintained by some large health care providers who engage incertain electronic transactions, health plans, and health care clearinghouses.D. apply to health information created or maintained by health care providers regardless of wether theyengage in certain electronic transactions, health plans, and health care clearinghouses.Answer: B354.Gap analysis does not apply toA. TransactionsB. availabilityC. PrivacyD. SecurityAnswer: B355.A Gap analysis for PrivacyA. includes a comparison of your proposed policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy lawsB. inc ludes a comparison of your current policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy lawsC. includes a comparison of your ideal policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy laws.D. includes a comparison of your exceptional policies and procedures and the requirements established inthe Security and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy laws.Answer: B356.The privacy provisions of the federal law, the Health Insurance Portability and Accountability Act of1996 (HIPPA), apply to certain types of health information created or maintained by health care providersA. who engage in certain electronic transactions, health plans, and health care clearinghousesB. who do not engage in certain electronic transactions, health plans, and health care clearinghousesC. regardless of whether they engage in certain electronic transactions, health plans, and health careclearinghousesD. if they engage for a majority of days in a year in certain electronic transactions, health plans, and healthcare clearinghouses.Answer: A357.HIPPA preempts state lawsA. except to the extent that the state law is less stringentB. regardless of the extent that the state law is more stringentC. except to the extent that the state law more stringentD. except to the extent that the state law is legislated later than HIPPAAnswer: C358.The Implementation GuidesA. are referred to in the Static RuleB. are referred to in the Transaction RuleC. are referred to in the Transitional RuleD. are referred to in the Acquision RuleAnswer: B359.The HIPPA task force must firstA. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are critical to patient care and central to the organization's businessB. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are non critical to patient care and central to the organization's businessC. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are critical to patient complaints and central to the organization's peripheral businesses D. modify the organization's systems, processes, policies, procedures and data to determine which elementsare critical to patient care and central to the organization's businessAnswer: A360.A covered healthcare provider which a direct treatment relationship with an individual need not:A. provide the notice no later than the date of the first service delivery, including service delivered electronicallyB. have the notice available at the service delivery site for individuals to request and keepC. get a acknowledgement of the notice from each individual on stamped paperD. post the notice in a clear and prominent location where it is reasonable to expect individuals seekingservice from the covered healthcare provider to be able to read itAnswer: C361.Employers often advocate on behalf of their employees in benefit disputes and appeals, answerquestions with regard to the health plan, and generally help them navigate their health benefits. Is individual consent required?A. NoB. SometimesC. Y esD. The answer is indeterminateAnswer: C362.A health plan may conduct its covered transactions through a clearinghouse, and may require aprovider to conduct covered transactions with it through a clearinghouse. The incremental cost of doing so must be borneA. by the HIPPA authoritiesB. by the health planC. by any other entity but the health planD. by insurance companiesAnswer: B363.Covered entities (certain health care providers, health plans, and health care clearinghouses) are notrequired to comply with the HIPPA Privacy Rule until the compliance date. Covered entities may, ofcourse, decide to:A. unvoluntarily protect patient health information before this dateB. voluntarily protect patient health information before this dateC. after taking permission, voluntarily protect patient health information before this dateD. compulsorily protect patient health information before this dateAnswer: B364.What is HIPPA?A. The Home Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.B. The Public Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191,which amends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.C.The Health Insurance Privacy & Accountability Act of 1996 (August 2), public law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.D. The Health Insurance Privacy & Accountability Act of 1996 (August 2), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act. Answer: BExplanation:"The United States Kennedy-Kassebaum Health Insurance Portability and Accountability Act (HIPPAPublicLaw 104-191), effective August 21, 1996, addresses the issues of health care privacy, security, transactions and code sets, unique identifies, electronic signatures, and plan portability in the United States."Pg 499-500 Krutz: The CISSP Prep Guide: Gold Edition.365.The confidentiality of alcohol and drug abuse patient records maintained by this program is protectedby federal law and regulations. Generally, the program may not say to a person outside the programthat a patient attends the program, or disclose any information identifying a patient as an alcohol ordrug abuser even if:A.The person outside the program gives a written request for the informationB.the patient consent in writingC.the disclosure is allowed by a court orderD. the disclosure is made to medical personnel in a medical emergency or to qualified personnel forresearch, audit, or program evaluation.Answer: A366.EmployersA. often advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to their health plan, and generally help them navigate their health benefits.B. sometimes advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to the health plan, and generally help them navigate their health benefitsC. never advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to the health plan, and generally help them navigate their health benefits.D. are prohibited by plan sponsors from advocating on behalf of group health plan participants or providingassistance in understanding their health plan.Answer: A367.What is HIPPA?A. The Health Insurance Portability & Accountability Act of 1996 (August) 21), Public Law 104-191,which extends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.B. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kateson Act. C. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.D. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, which。
CISCO 银牌认证650-393 题库
![CISCO 银牌认证650-393 题库](https://img.taocdn.com/s3/m/ada7278e0b4e767f5bcfce87.png)
Question #1Which definition best describes the staff training service component within the implement phase? Select exactly 1 answer(s) from the following:A. improving the network management system and the performance and functionality of infrastructure operationsB. providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer networkC. developing and implementing a training plan using classes, workshops, or c-learning coursesD. compiling a training manual for use in ongoing operationsE. reducing the risk of downtime due to facilities-related problemsAnswer : A (Reference : [websitebanned], examworx)Question #2In which of these phases are a customers technology strategy requirements identified and documented? Select exactly 1 answer(s) from the following:A. PlanB. designC. prepareD. operateAnswer : C (Reference : pass4sure, [websitebanned])Question #3What is the key objective of the plan phase? Select exactly 1 answer(s) from the following:A. identify the activities involved in installing and configuring equipment at a cus tomer’s site or sites.B. Describe the day-to-day activities required to support, manage, and monitor a newly implemented system.C. Assess current network readiness, site readiness, and operational readiness in preparation for designing a solution proposal.D. Gain an understanding of high-level business and technical requirement.Answer : A (Reference : [websitebanned], examworx)Question #4In which of these phases is a customers network assessed to determine its system readiness? Select exactly 1 answer(s) from the following:A. planC. operateD. implementAnswer : A (Reference : [websitebanned], examworx)Question #5In the design phase, which service component provides the customer with a comprehensive design? Select exactly 1 answer(s) from the following:A. Implementation PlanB. Detailed Design DevelopmentC. Project Kick-offD. Staging PlanE. High-Level DesignAnswer : B (Reference : pass4sure, [websitebanned], examworx)Question #6Which best describes the customer benefit of developing business requirements in the prepare phase?A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirementsB. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategyC. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processesD. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the systemAnswer : D (Reference : [websitebanned], examworx)Question #7In Which of these phases are a customer’s business requirements identified and documented?A. planB. designC. prepareD. operateAnswer : C (Reference : [websitebanned], examworx)Question #8What is one key objective of the operations readiness assessment performed in the plan phase? Select exactly 1 answer(s) from the following:E. align business requirements with technical requirementsF. create a plan to recycle used equipmentG. evaluate the readiness of a customers current operations and network management infrastructure to support a new technologyH. install and test system components in a non-production environmentAnswer : C (Reference : pass4sure, [websitebanned])Question #9Conducting a project kick-off in the plan phase provides which of the following customer benefits? Select exactly 1 answer(s) from the following:A. ensure that it receives detailed network diagramsB. reduce the risk of downtime due to facilities-related problemsC. ensure end-user support immediately after the launch of a new systemD. confirm project roles and responsibilities, as well as milestone datesAnswer : D (Reference : Actualests, [websitebanned], examworx)Question #10Which prepare phase service component involves providing a customer with a financial justification for adopting a technology? Select exactly 1 answer(s) from the following:A. Technology Strategy DevelopmentB. High-Level Design DevelopmentC. Business Case DevelopmentD. Proof of ConceptAnswer : C (Reference : [websitebanned], examworx)Question #11Which three of these service components are in the design phase? (Choose three.)Select exactly 3 answer(s) from the following:A. Account Qualification and PlanningB. Detailed Design DevelopmentC. Staff TrainingD. Systems Acceptance Test Plan DevelopmentE. Staging Plan DevelopmentF. Site Readiness AssessmentAnswer : B, C, E (Reference : [websitebanned], examworx)Question #12Which of the following best describe the customer benefit of assessing for network readiness in the plan phase? Select exactly 1 answer(s) from the following:A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirementsB. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategyC. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processesD. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the systemAnswer : D (Reference : [websitebanned], examworx)Question #13Which of these phase comprises post-project support activities: activities that happen after a project is successfully implemented and handed off? Select exactly 1 answer(s) from the following:A. planB. prepareC. operateD. implementAnswer : A (Reference : [websitebanned], examworx)Question #14Which prepare phase service component involves recommending an appropriate technology that will address a customers business requirements? Select exactly 1 answer(s) from the following:E. Technology Strategy DevelopmentF. Account Qualification and PlanningG. Business Case DevelopmentH. Proof of ConceptAnswer : C (Reference : [websitebanned], examworx)Which definition best describes the staging plan development service component within the design phase? Select exactly 1 answer(s) from the following:A. providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer networkB. assessing the ability of site facilities to accommodate proposed infrastructure changesC. developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancementsD. improving the network management system and the performance and functionality of infrastructure operationsAnswer : A (Reference : Actualests, [websitebanned], examworx)Question #16Which of these phases involves ensuring that a new solution has been integrated without disrupting the existing network? Select exactly 1 answer(s) from the following:A. planB. prepareC. operateD. implementAnswer : D (Reference : pass4sure, [websitebanned], examworx)Question #17Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities?Select exactly 1 answer(s) from the following:A. Staging and System MigrationB. Post Implementation Support Handoff MeetingC. Detailed Design DevelopmentD. Staff TrainingAnswer : A (Reference : [websitebanned], examworx)Question #18Which of the following best describe the customer benefits of change management in the operate phase? Select exactly 1 answer(s) from the following:A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirementsbusiness case based on its business requirements and establishing a basis for developing a technology strategyC. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processesD. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the systemAnswer : C (Reference : [websitebanned])Question #19Which three business requirements development activities are performed in the prepare phase before creating a technology strategy? (Choose three.)Select exactly 3 answer(s) from the following:A. identifying and assessing customer business requirementsB. documenting and categorizing customer business requirements in terms of performance. availability, capacity, and securityC. producing a documented technology strategyD. creating a bill of materialsE. presenting documented business requirements to a customer and having the customer validate themF. completing a site surveyAnswer : A, B, E (Reference : pass4sure, [websitebanned])Question #20Which three of these service components are in the implement phase? (Choose three.)Select exactly 3 answer(s) from the following:A. StagingB. Business Requirements DevelopmentC. Post Implementation Support Handoff MeetingD. Detailed Design DevelopmentE. Staff TrainingF. Incident ManagementAnswer : A, D, E (Reference : examworx, [websitebanned])Question #21During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:A. installation, configuration, and testing, as well as the commissioning ofB. provision of information regarding customer-specified design requirements and configurationC. the migration of network services from an existing state to a future state in accordance with the migration planD. the provision of an objective means of measuring system operability and functionalityAnswer : D (Reference : examworx)Question #22Which benefit can be obtained by using the configuration management service component in the operate phase? Select exactly 1 answer(s) from the following:A. reduced operating costs, due to a consistent framework for making necessary changes in an efficient and accountable mannerB. greater accuracy, completeness, and timeliness of network configuration informationC. notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirementsD. improved system service quality and fewer disruptionsAnswer : A (Reference : pass4sure, examworx)Question #23Which design phase service component consists of developing a detailed, site-specific plan for implementing a new technology system or solution? Select exactly 1 answer(s) from the following:A. Detailed Design DevelopmentB. Systems Acceptance Test Plan DevelopmentC. Staging PlanD. Implementation Plan DevelopmentE. Project Kick-offAnswer : D (Reference : pass4sure)Question #24Which three best describe the customer benefits of the Cisco Lifecycle Services approach? (Choose three.) Select exactly 3 answer(s) from the following:A. improve the skill sets of its staff membersB. increase the value of and return on investment for its networksC. increase network staff productivityD. increase the amount of server room rack spaceE. improve network availability, resiliency, security, and scalabilityF. increase the amount of time required to integrate network changesAnswer : B, E, F (Reference : examworx)Question #25Which of these is the best definition of the Cisco Lifecycle Services approach? Select exactly 1 answer(s) from the following:A. It defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies.B. It determines how best to price Cisco products.C. It provides partners with a useful way to leverage Cisco resources.D. It consists of these phases: plan, deploy, support, and troubleshoot.Answer : A (Reference : Actualests, examworx)Question #26In which of these phases is a set of acceptance tests developed and documented?A. implementB. designC. prepareD. operateAnswer : C (Reference : examworx)Question #27Which is the most accurate statement regarding the business requirements development service component in the prepare phase. Select exactly 1 answer(s) from the following:A. Determine the appropriate cooling temperature for a customers server room.B. Analyze the customers business requirements for a proposed solution.C. Analyze a customers ongoing operational requirements.D. Identify a customers technology requirements.Answer : B (Reference : examworx)Question #28Which of these is an accurate list of Cisco Lifecycle Services phases?Select exactly 1 answer(s) from the following:A. initiation planning analysis design development implementation operations and maintenanceB. project planning, site assessment risk assessment solution selection and acquisition, testing, and operationsC. prepare, plan, design, implement operate, and optimizeD. analysis, design, deployment testing, implementation, and productiontesting, and operations sign- offAnswer : C (Reference : Actualests)Question #29Which two service components are in the plan phase? (Choose two)A. Proof of ConceptB. Site Readiness AssessmentC. Proposal DevelopmentD. Operations Readiness AssessmentE. Account planningAnswer : B, D (Reference : Actualests)Question #30Which design phase service component includes the development and documentation of the test case or cases used to verify that a deployed infrastructure meets operational, functional, and interface requirements? Select exactly 1 answer(s) from the following:A. Implementation PlanB. Business PlanC. Staging PlanD. Detailed Design DevelopmentE. Systems Acceptance Test Plan DevelopmentAnswer : E (Reference : Actualests, examworx)Question #31In which of these phases is a customers current network infrastructure assessed?A. planB. designC. implementD. prepareAnswer : AQuestion #32Choose the most accurate statement regarding the account qualification and planning service component in the prepare phase. Select exactly 1 answer(s) from the following:A. providing a partner with information regarding customer acceptance of a newB. providing information regarding current network infrastructure readinessC. using stakeholder interviews to identify stakeholders and decision-makers, high-level solution requirements, timelines, and the scope of an opportunityD. adjusting a solution to account for a customers physical site characteristicsAnswer : C (Reference : pass4sure, examworx)Question #33Which three service components are in the operate phase? (Choose three.)Select exactly 3 answer(s) from the following:A. System MonitoringB. Operations ImplementationC. Incident and Problem ManagementD. Change ManagementE. Operations PlanF. Project Close OutAnswer : A, C, D (Reference : pass4sure, examworx)Question #34Which definition best describes the implementation service component within the implement phase? Select exactly 1 answer(s) from the following:A. providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer networkB. assessing the ability of site facilities to accommodate proposed infrastructure changesC. developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancementsD. installing, configuring, and integrating systems components based on an implementation plan developed in earlier phasesE. improving a customer’s infrastructure security systemAnswer : D (Reference : examworx)Question #35Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer? Select exactly 1 answer(s) from the following:A. identifying what a customer requires from a proposed solutionB. analyzes the customers business requirements and recommends the appropriate Cisco technologies to meet business requirementsC. determining what end-user training a customer requiresAnswer :B (Reference : examworx)Question #36 (e)Which three best describe the partner benefits of the Cisco Lifecycle Services approach? (Choose three.) Select exactly 3 answer(s) from the following:A. improve customer satisfaction ratesB. improve the skill sets of their staff membersC. increase their staff productivityD. reduce the risk involved with deploying and supporting new and complex technologiesE. improve response times for network outagesF. help ensure that suppliers are meeting metricsAnswer : A, C, DQuestion #37In which of these phases is a detailed design of a proposed customer solution developed?A. planB. designC. prepareD. operate被过滤广告Answer : C (Reference : examworx)Question #38Which of these is a phase of Cisco Lifecycle Service?A. site readiness assessmentB. business requirements developmentC. deignD. site surveyE. customer educationAnswer : B (Reference : examworx)Question #39Which plan phase service component involves evaluating how prepared a customers current facility infrastructure is to support a new technology? Select exactly 1 answer(s) from the following:A. Proof of ConceptB. Site Readiness AssessmentC. Proposal DevelopmentD. Operations Readiness AssessmentAnswer : B (Reference : Pass4sure)Question #40In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:A. an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB. a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC. an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD. the optimal technologies for supporting its business requirements and objectivesAnswer : A (Reference : Actualests, examworx)Question # 41Which best describes the customer benefit of creating a system acceptance test plan in the design phase? Select exactly 1 answer(s) from the following:A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirementsB. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategyC. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processesD. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the systemAnswer : CQuestion # 42Which prepare phase service component involves testing high-level in a controlled environment to ensure that it meets business and technology requirements?Select exactly 1 answer(s) from the following:A. Technology Strategy DevelopmentB. High-Level Design DevelopmentC. Business Case DevelopmentD. Proof of ConceptAnswer : BQuestion # 43Which of the following best describe the customer benefit of creating a system acceptance test plan in the design phase? Select exactly 1 answer(s) from the following:A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirementsB. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategyC. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processesD. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the systemAnswer : CI JUST ?2008-4-17 10?00?PASSED THE EXAME,WITH SCORE 900 ?1? In which of these phases is a customers current network infrastructure assessed?A. planB. designC. implementD. prepareAnswer : A2? Which definition best describes the staging plan development service component within the design phase? Select exactly 1 answer(s) from the following:A. providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer networkB. assessing the ability of site facilities to accommodate proposed infrastructure changesC. developing and executing proof-of-concept tests, validating high-levelinfrastructure design, and identifying any design enhancementsD. improving the network management system and the performance and functionality of infrastructure operationsAnswer : A3? Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities?Select exactly 1 answer(s) from the following:A. Staging and System MigrationB. Post Implementation Support Handoff MeetingC. Detailed Design DevelopmentD. Staff TrainingAnswer : B4? What is one key objective of the operations readiness assessment performed in the plan phase? Select exactly 1 answer(s) from the following:E. align business requirements with technical requirementsF. create a plan to recycle used equipmentG. evaluate the readiness of a customers current operations and network management infrastructure to support a new technologyH. install and test system components in a non-production environmentAnswer : C5? In which of these phases is a detailed design of a proposed customer solution developed?A. planB. designC. prepareD. operate。
CCNA专业英文词汇全集(1)(1)-思科认证试题
![CCNA专业英文词汇全集(1)(1)-思科认证试题](https://img.taocdn.com/s3/m/2aa39b9a83c4bb4cf7ecd1b2.png)
CCNA专业英文词汇全集(1)(1)-思科认证试题CCNA为思科最基础的入门认证,其中,考试偏重网络概念和理论,对于初学者来说,不少专业英文术语难以理解,导致学员学习进度维难。
CISCO系列认证的原版教材,专业词汇出现频率积高,考生只要熟悉本文,相信学习起来一定事半功倍。
10BaseT-----原始IEEE802.3标准的一部分,1OBaseT是1OMb/s基带以太网规范,它使用两对双绞电缆(3类、4类或5类),一对用于发送数据另一对用于接收数据。
1OBaseT每段的距离限制约为100米。
参见Ethernet和IEEE 802.3。
1OOBaseT-----基于IEEE 802.3U标准,1OOBaseT是使用UTP接线的基带快速以太网规范。
当没有通信量出现时。
1OOBaseT在网络上发送链接脉冲(比1OBaseT中使用的包含更多信息)。
参见10BaseT、Fast Ethernet和IEEE 802.3。
100BaseTX-----基于IEEE 802.3U标准,100BaseTX是使用两对UTP或STP接线的10OMb/S 基带快速以太网规范。
第一对线接收数据;第二对线发送数据。
为确保正确的信号定时,一个100BaseTX网段不能超过100米长。
A&B bit signaling (A和B比特信令)-----用于T-1传输设备,有时称为"第24信道信令"。
在这一方案中,每个T-1于信道使用每个第六帧的一个比特来发送监控信令信息。
AAA-----身份验证(Authentication)、授权(Authorization)和统计(Accounting)Cisco开发的一个提供网络安全的系统。
奏见authentication。
authorization和accounting AAL ATM适应层-----数据链路层的一个与服务有关的子层,数据链路层从其他应用程序接受数据并将其带人ATM层的48字节有效负载段中。
CCNA考试题库中英文翻译版及答案
![CCNA考试题库中英文翻译版及答案](https://img.taocdn.com/s3/m/91ab39e510661ed9ac51f35c.png)
CCNA考试题库中英文翻译版及答案1[1]1. What are two reasons that a network administrator would use access lists? (Choose two.)1.出于哪两种理由,会使用访问列表?A. to control vty access into a routerA.控制通过VTY访问器B. to control broadcast traffic through a routerB.控制广播流量穿越路由器2.一个默认的帧中继WAN被分类为哪种物理网络类型?A. point-to-pointA.点到点B. broadcast multi-accessB.广播多路访问C. nonbroadcast multi-accessC.非广播多路访问D. nonbroadcast multipointD.非广播多点E. broadcast point-to-multipointE.广播点到多点Answer: C3. A single 802.11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency. What are three likely causes of this problem? (Choose three.)3.一个802.11接入点被部署在一个方形办公室的中央,当大多数用户在大流量传输数一些用户发现无线网络变得缓慢和出现丢包A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF4. Refer to the exhibit. How many broadcast domains exist in the exhibited topology?根据下图,图中的拓扑中存在多少个广播域?A. one A.1B. two B.2C. three C.3D. four D.4E. five E.5F. six F.6Answer: C5. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)5.根据下图,WLAN diagram决定了哪两个事实A. The area of overlap of the two cells represents a basic service set (BSS).A. 两个 cells的overlap的区域描述了一个basic service setB. The network diagram represents an extended service set (ESS).B. 网络描述了一个extended service setC. Access points in each cell must be configured to use channel 1.C. 再每个CELL中的AP必须被配置成使用channel 1D. The area of overlap must be less than 10% of the area to ensure connectivity.D. 为了确保连通性,重叠区域必须小于10%E. The two APs should be configured to operate on different channels.E. 两个访问点应该被配置成工作在不同的频道Answer: BE6. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router.Which of the following statements is true concerning this command?6.器上输入命令frame-relay map ip 10.121.16.8 102 broadcast,以下选项正确的是?A. This command should be executed from the global configuration mode.A.该命令应该在全局配置模式下被执行B. The IP address 10.121.16.8 is the local router port used to forward data.B.IP地址10.121.16.8是本地路由器用来转发数据的接口C. 102 is the remote DLCI that will receive the information.C.102是远端的DLCI它将接受信息。
思科认证CNAA考试模拟试题及答案
![思科认证CNAA考试模拟试题及答案](https://img.taocdn.com/s3/m/5762b1f680c758f5f61fb7360b4c2e3f57272585.png)
思科认证CNAA考试模拟试题及答案2016年思科认证CNAA考试模拟试题及答案1: your junior network administrator wants to know what the default subnet mask is for a class c ip address. what do you tell him?a. 255.0.0.0]6lb. 255.255.0.0c. 255.245.255.0d. 255.255.255.0e. 255.255.255.2552: an application needs to have reliable, end-to-end connect-ivity. which of the following protocols will give you reliable connectivity?a. tcpb. udpc. ipd. icmp3: you are designing a network, which needs to support 55 users. you don't plan to extend the segment beyond the current number of users. which subnet mask would best meet your needs?a. 255.255.0.0b. 255.255.255.0c. 255.255.255.192d. 255.255.255.1604: you have added a new switch to your network. you want to manage it remotely, so you need to assign it an ip address. your router that connects to the switch has an ip address of 172.16.12.33/27. which of the following addresses can you assign to this switch?a. 172.16.12.33/28b. 172.16.12.32/27c. 172.16.12.33/27d. 172.16.12.34/27e. 172.16.12.35/28f. 172.16.12.38/28g. 172.16.12.63/275: the address 172.16.208.16/20 is a host address in which of the following subnets?a. 172.16.176.0–255.255.240.0b. 172.16.192.0–255.255.240.0c. 172.16.208.0–255.255.240.0d. 172.16.224.0–255.255.240.06: you are designing an ip address scheme for your brand new remote office. the vice president of it calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. this supplies you with a single subnetwork with 62 hosts. you need to have at least two subnets with 14 hosts in each subnet. what custom subnet mask should you use?a. 255.255.255.128b. 255.255.255.192c. 255.255.255.224d. 255.255.255.240e. 255.255.255.2487: you have subnetted the 210.106.14.0 network with a /24 mask. your boss at acme, inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. what should you tell her?a. one network with 254 hostsb. two networks with 128 hostsc. four networks with 64 hostsd. six networks with 30 hosts8: identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (choose three.)a. 201.168.27.33b. 201.168.27.112c. 201.168.27.119d. 201.168.27.126e. 201.168.27.175f. 201.168.27.2089: what is the subnetwork address for a host with the ip address 201.100.5.68/28?a. 201.100.5.0b. 201.100.5.32c. 201.100.5.64d. 201.100.5.65e. 201.100.5.31f. 201.100.5.110: which of the following protocols uses a three-way handshake mechanism to establish sessions?a. tcpb. ipc. udpd. ipxe. frame relay11: which of the following protocols is connection-orienteda. tcpb. ipc. ipxd. frame relay12: you are using an application on your windows 2000 client machines that provides error correction. you need a protocol to provide fast transport. which protocol should your application use?a. tcpb. ipc. udpd. spxe. appletalk13: when using tcp, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. this behavior is known as ______________.a. mtu adjustmentb. windowingc. flexible send pathd. fcs14: if the destination did not receive a segment, how will the tcp host know to resend the information?a. the ack received will not include the segment number that was not received.b. the ack received will include the segment number that was not received.c. the sending host will send a pack to verify segment receipt.d. the destination host will send a yack message back to the sending host.15: you are planning on using a single network that supports 208 users. which ip address class would you choose to be the most efficient?a. class ab. class bc. class cd. class de. class e16: rfc 1918 defines the private ip address ranges. which of the following ip addresses are considered part of these ranges? (choose three.)a. 10.23.45.67b. 126.21.34.56c. 172.16.32.1d. 172.31.234.55e. 192.169.4.517: a new network is being designed for your company, acme, inc. if you use a class c ip network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?departmentnumber of userscorporate7customer support15financial13hr7engineering16a. 255.255.255.0b. 255.255.255.192c. 255.255.255.224d. 255.255.255.240e. 255.255.255.24818: which of these protocols provides data transport, relying on the error correction capabilities of the application itself?a. udpb. tcpc. snmpd. icmp19: which of the following are used by tcp to ensure reliable delivery of data? (choose two.)a. mac address resolutionb. sequence numbersc. acknowledgments(GbbFi,tk k&dF={(GbbFi,tk k&dF={t$d. pinge. routing updates20: you discover that you are able to adjust the window size of the tcp segment. you increase the window size to test the results. what will you observe happening on your network?a. increased throughputb. decreased throughputc. increased latencyd. decreased reliability【2016年思科认证CNAA考试模拟试题及答案】。
思科认证考试题库
![思科认证考试题库](https://img.taocdn.com/s3/m/065f0f25f5335a8102d220b6.png)
思科认证考试题库思科认证考试题库首发网站:1. What are two reasons that a network administrator would use access lists? (Choose two.)A. to control vty access into a routerB. to control broadcast traffic through a routerC. to filter traffic as it passes through a routerD. to filter traffic that originates from the routerE. to replace passwords as a line of defense against security incursionsAnswer: AC解释一下:在VTY线路下应用ACL,可以控制从VTY线路进来的telnet的流量。
也可以过滤穿越一台路由器的流量。
2. A default Frame Relay WAN is classified as what type of physical network?A. point-to-pointB. broadcast multi-accessC. nonbroadcast multi-accessD. nonbroadcast multipointE. broadcast point-to-multipointAnswer: C解释一下:在默认的情况下,帧中继为非广播多路访问链路。
但是也可以通过子接口来修改他的网络的类型。
3.Refer to the exhibit. How many broadcast domains exist in the exhibited topology?A. oneB. twoC. threeD. fourE. fiveF. sixAnswer: C解释一下:广播域的问题,在默认的情况下,每个交换机是不能隔离广播域的,所以在同一个区域的所有交换机都在同一个广播域中,但是为了减少广播的危害,将广播限制在一个更小的范围,有了VLAN的概念,VLAN表示的是一个虚拟的局域网,而他的作用就是隔离广播。
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)
![Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)](https://img.taocdn.com/s3/m/18dce3b0e53a580216fcfef6.png)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)137.20.0.0/24 is subnetted, 1 subnetsc 137.20.20.0 is directly connected, ethernet 0172.168.0.0/16 is variably subnetted, 7 subnets, 2 maskso ia 172.168.30.0/24 [110/65] via 172.168.100.3, 00:09:03, serial 1.1i 172.168.40.0/24 [100/8576] via 172.168.200.2, 00:01:11, serial 1.2o ia 172.168.60.0/24 [110/1572] via 172.168.65.1. 00:09:03, bri0c 172.168.65.0/24 is directly connected, bri0c 172.168.100.0/24 is directly connected, serial 1.1o 172.168.100.0/24 [110/64] via 172.168.100.3, 00:09:13, serial 1.1c 172.168.200.0/24 is directly connected, serial 1.2o e1 192.168. 21.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0o e1 192.168. 17.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0o e1 192.168. 70.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0o*e1 0.0.0.0/0 [110/21] via 137.20.20.1. 00:09:03, ethernet 0r5#show ip ospf int bri0bri0 is up, line protocol is up (spoofing)internet address 172.168.65.2/24, area 10process id 1, router id 172.168.200.1, network type point_to_point, cost 1562run as demand circuitdonotage lsa allowed.transmit delay is 1 sec, state point_to_point,timer intervals configured, hello 10, dead 40, wait 40, retransmit 5hello due in 00:00:06neighbor count is 1, adjacent neighbor count is 1adjacent with neighbor 172.168.100.6 (hello suppressed)suppress hello for 1 neighbor(s)r5#show dialerbri0 –dialer type =isdndial string successes failures last called last status 4930622 1 0 00:08:45 successful0 incoming call(s) have been screened0 incoming call(s) rejected for callbackbri0:1 –dialer type =isdnidle time(45 secs), fast idle timer (20 secs)wait for carrier (30 secs), re-enable (15 secs) dialer state is idlebri0:2 –dialer type =isdnidle time(45 secs), fast idle timer (20 secs)wait for carrier (30 secs), re-enable (15 secs)dialer state is idlenow go back to router r7 and bring up router r7’s interface s4 again3. ipx configuration –15 pts (1 hour)a. configure all the active interfaces, including loopbacks, on routers r1, r2, r3, r5, r6, and r8 for ipx.b. configure router r8 and the lan interfaces on routers r3, r4, r5 and r6 for ipx rip.c. configure router r1 & r2 for ipx nlsp.d. configure the serial interfaces on the rest of the routers for ipx eigrp( not routers r1& r2 these oly use nlsp), also make the ethernet interface on router r2 ipx eigrp only.e. configure the bri0 interfaces on routers r5 & r6 as ipx rip.f. after this point you should be able to see all the ipx networks in all the routers routing table. test connectivity with ipx ping.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exam : 300-410
Title : Implementing Cisco Enterprise
Advanced Routing and
Services
Vendor : Cisco
Version : DEMO
NO.1 An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install.
Which command must the engineer run to correct the configuration?
A.sudo maglev-config update
B.sudo maglev install config update
C.sudo maglev reinstall
D.sudo update config install
Answer: A
NO.2 Which command displays the IP routing table information that is associated with VRF-Lite?
A.show ip protocols vrf
B.show run vrf
C.show ip route vrf
D.show ip vrf
Answer: C
NO.3 Which statement about IPv6 RA Guard is true?
A.It does not offer protection in environments where IPv6 traffic is tunneled.
B.It is not supported in hardware when TCAM is programmed.
C.It cannot be configured on a switch port interface in the ingress direction.
D.Packets that are dropped by IPv6 RA Guard cannot be spanned.
Answer: A
NO.4 While troubleshooting connectivity issues to a router, these details are noticed:
*Standard pings to all router interfaces, including loopbacks, are successful.
*Data traffic is unaffected.
*SNMP connectivity is intermittent.
*SSH is either slow or disconnects frequently.
Which command must be configured first to troubleshoot this issue?
A.show interface | inc drop
B.show ip route
C.show policy-map control-plane
D.show policy-map
Answer: C
NO.5 Refer to the exhibit.
Why is the remote NetFlow server failing to receive the NetFlow data?
A.The flow exporter is configured but is not used.
B.The destination of the flow exporter is not reachable.
C.The flow monitor is applied to the wrong interface.
D.The flow monitor is applied in the wrong direction.
Answer: B
NO.6 A network engineer is investigating a flapping (up/down) interface issue on a core switch that
is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?
A.service timestamps log uptime
B.clock calendar-valid
C.clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00
D.service timestamps log datetime localtime show-timezone
Answer: D。