a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 168|回复: 1

[考试试题] 全国Cisco认证统考模拟试题(三)

[复制链接]
发表于 2012-8-3 19:18:10 | 显示全部楼层 |阅读模式
23.You are the network administrator at ABC.com. ABC has a switched network. - N# F( J# ^/ q
You want to control the designation of the spanning-tree root bridge in the ABC network. What should you do?
% x% X, `/ t5 P' s8 ~  m6 x( j; Q8 s7 d* k
A. By enabling uplink-fast on the ports of the desired switch. 3 e( M& I3 x; w3 T- y% t" a0 p
B. By lowering the bridge priority on the desired switch. . h- b; i9 m$ ?( {
C. By setting a lower MAC address on the designated switch. . j7 ]  g- q$ u2 E% A
D. By raising the bridge ID on one switch.
5 d% |# S; x1 T! R$ Q4 T3 [; V  w( L+ k$ i! v$ d- p
   24.You are a technician at ABC. You receive a report from several ABC users who
# t. H6 z6 x: Y complain that they get slow responses when sending and receiving email, especially ( T' C+ a6 W( V' v2 p9 a* Q3 ^
when browsing the Internet. You investigate the complaint by checking the output
& o2 L# N7 c4 R  i' V1 I of a ping command issued from her computer and find that it indicates intermitted
! ^% n" w6 B, J) q2 R success and failures messages, when attempting to contact the email server. A  4 b' n" T5 P8 U1 t1 l$ [
tracert to the corporate Internet gateway router shows high latency and occasional   u  a3 U$ k( E* b& C) {
time out messages. ' o' f5 N& ]; h! m
What would be the most effective troubleshooting approach if you are to determine & T# M, Y/ j7 i) W  K; c' v
the cause of the slow response time? " s) {& x& a2 L! w5 e
+ B( N. H; |- b
A. Bottom-up approach
6 f+ w  x! t: s8 MB. Random access approach
' R' F( n6 }5 k* \5 m- l2 Y$ OC. Divide and conquer approach
9 t9 p$ y9 [2 A+ b) g, k7 _1 WD. Top-down approach
: y+ w& P. f( ~2 \; UE. Top-down rule-out approach
2 a: l# U& g( A* C* @1 F$ `# d; V1 P. m
    25.You are a technician at ABC.com. Your newly appointed ABC trainee wants to  
0 V& s/ |% U- [4 F. vknow what features make OSPF more suitable than RP in large network installations.
0 j5 g% A4 w$ n: E) c What would your reply be? (Choose all that apply.)
% z) [" ^; e% r, Q# \$ e1 W1 k% h2 J5 S( u! I3 U
A. Diffusing Update Algorithm + R1 \; x5 ]5 ~! M
B. No hop count limitation % J& V0 j; w2 j; g
C. Higher routing update overhead
/ n+ N. r5 u* F; U& z# b; s% z4 I# N* fD. Faster convergence
/ `7 l3 N" r( F$ w1 U! kE. Lower routing update overhead
1 h+ i5 w: q: R& v+ W- j( L* c$ ^8 H9 I+ Q$ m5 \4 X. H5 B; _' P  m) t
    CCIE
- {. ?) V4 K7 g0 R
( `* E2 F: B8 l! I# }# \    26.You are the network administrator at ABC. You are troubleshooting a network
* A: i9 j# h  x8 H; B7 e) }3 k problem. You want to trace the route to a Unix workstation that you want to reach
+ {; ~& n# g0 L- j3 g9 _* G through the Internet. However, Traceroute does not work.
- v/ S) @: S7 f$ u  ]Currently, there is an inbound access-list applied to the serial interface on  
: H) G& ^% K) C/ gRouter 1. An entry in the access-list states "access-list 101 permit tcp any any".  : K- p/ `/ B) u- V
What access-list
9 h8 A- f& M! a
7 t( E4 F( ^/ hentry may you need to be added to the access-list in order to get traceroute to  
1 N/ u" U- w$ Twork?
6 |' n- M2 c7 K" }. c& B1 }# }7 Y
" ^2 f* o! d0 u3 k: H0 }A. access-list 101 permit udp any any   m1 X7 Z# @$ w% }* n! L
B. access-list 101 permit icmp any any time-exceeded access-list 101 permit icmp  
4 O, ^" ?& y- E" |- Q5 |8 jany any port-unreachable 9 j/ q" P% b/ ^& d
C. access-list 101 permit icmp any any time-exceeded access-list 101 permit icmp
回复

使用道具 举报

 楼主| 发表于 2012-8-3 19:18:11 | 显示全部楼层

全国Cisco认证统考模拟试题(三)

any any net-unreachable / n4 J/ b: j  K
D. access-list 101 permit icmp any any echo access-list 101 permit icmp any any  </p>net-unreachable ; m4 [; ~' ?, B3 o  x8 {
E. access-list 101 permit udp any any access-list 101 permit icmp any any  
5 m3 B6 x6 W/ q& N1 |" f* h' @' Z0 ?- hprotocol-unreachable
" m; O/ w: V3 f+ P' y
, w3 n4 O3 F. i    27.What does the BGP backdoor command do?
: m8 d* k/ v  |0 M# R1 c6 p; _0 U/ ], i4 a8 Z8 y1 g0 P
A. It changes the distance of an iBGP route to 20.
3 w! ]7 H" b6 _! L; X% A  oB. It changes the distance of an eBGP route to 200.
1 I% r, v$ S1 K4 X8 R% iC. It changes the distance of an IGP route to 20. ' I# m+ e" r  u0 X# e- w
D. It does not effect any changes in distance of the route.
- L' g! `. z: m6 L/ \E. It changes the distance of an IGRP route to 200. & Q3 v( s& I( t; j

) L5 v! d4 b& [/ V: C, H8 [    28.Which of the following DNS resource records is not valid?
" H3 Q/ W+ O6 X9 d' ~; l7 n
3 }' G  I0 ]& ^: f# aA. NS
4 x5 d8 p2 u4 }* m: QB. PTR * u& k2 T9 J7 q& }( f2 Y0 b& O
C. MX 3 c) `9 K! P" C: l: A: a2 D' H
D. FQDN 9 R! s% b% C1 `( z4 _4 q: H' S
E. A   d' \8 e% C: @9 N3 o
" W- P& H4 H5 c/ _; _4 g4 E
    29.Which of the following features is provided by RIP v2 that were previously : h; B) J2 R9 j+ |% Z$ C1 c5 W
not possible with RIP v1? (Choose all that apply.) ; {4 m" d. x" K

5 t6 K3 {. W8 e+ x9 m4 F0 vA. Classless routing and split-horizon. 1 x' @, U+ m2 d2 S" p) A+ P2 ^) A
B. Poison reverse and updating to multicast addresses. , _* N1 E+ v" U: N: t# h) G
C. Poison reverse and classless routing.
& t: K! |2 ]2 a8 L. t7 pD. Classless routing and updating to multicast addresses. * @8 C  v6 u: @, p. {
E. Route tag and classless routing. / |' R7 w/ U+ h1 y" m" q; ^& b! R
2 h& s) N, A, ^0 n5 f+ j, U
    30.Which of the following statements is valid when taking Custom Queuing into , j: G6 G' t6 |
account? 8 v( x0 T- Z, e  x7 M% |; e

# n% _" M7 m- u; ?$ [- \- q; eA. Custom queuing has the ability to restrict a particular type of traffic to a 1 {: D: ], _, y3 d- [
given bandwidth not matter what is load is like on that link.
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-5-6 04:06 , Processed in 0.266637 second(s), 23 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表