-
Prior to 802.1w,Cisco implemented a number of proprietary enhancements to 802.1D to improve convergence in a Layer 2 network. Which statement is correct?()
A . Only UplinkFast and BackboneFast are specified in 802.1w;PortFast must be manually configured.
B . Only PortFast is specified in 802.1w;UplinkFast and BackboneFast must be manually configured.
C . None of the proprietary Cisco enhancements are specified in 802.1w.
D . PortFast,UplinkFast,and BackboneFast are specified in 802.1w.
-
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()
A . In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B . In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C . In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D . In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
-
Which two design concerns must be addressed when designing a multicast implementation?()
A . only the low-order 23 bits of the MAC address are used to map IP addresses
B . only the low-order 24 bits of the MAC address are used to map IP addresses
C . only the high-order 23 bits of the MAC address are used to map IP addresses
D . only the low-order 23 bits of the IP address are used to map MAC addresses
E . the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F . the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresse
-
Which two statements about route redistribution when implementing OSPF are true?()
A . Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.
B . OSPF can import routes learned using EIGRP, RIP, and IS - IS.
C . OSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.
D . At the interdomain level, OSPF cannot import routes learned using BGP.
E . OSPF routes can be exported into BGP.
-
AutoQoS takes the interface type and bandwidth into consideration when implementing what three QoS features?()
A . FECN
B . LLQ
C . WRED
D . LFI
E . CRTP
F . CBWFQ
-
Which commands, when used together, would create an 802.1Q link?()
A . Switch(vlan)# mode trunk
B . Switch(config)# switchport access mode trunk
C . Switch(config-if)# switchport mode trunk
D . Switch(config-if)# switchport trunk encapsulation dot1q
E . Switch(config)# switchport access mode 1
F . Switch(vlan)# trunk encapsulation dot1q
-
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
A . hub and spoke
B . PE
C . CE
D . hub
E . spoke
-
What network information do you need when you plan to implement a VLAN-based solution?()
A . default VLAN information for all unused switch ports
B . 802.1x configuration parameters
C . number of IP subnets needed
D . IP routing protocol informatio
-
When configuring a wireless LAN controller for QoS, what 802.1p tag should be applied for video applications? ()
A . 3
B . 1
C . 4
D . 6
-
When should traffic shaping be implemented on Frame Relay PVCs?()
A . When you want to drop excess traffic above the CIR
B . When there is a speed mismatch between the central site and the remote site
C . When using Frame Relay SVCs
D . When over-subscribing the central site link
E . When LLQ is implemented on the Frame Relay PVC
F . When Multilink PPP LFI is implemented on the Frame Relay PVC
-
What are two important guidelines to follow when implementing VTP?()
A . CDPmust be enabled on all switches in theVTP management domain.
B . All switches in the VTPdomain must run the same version of VTP.
C . When using secure mode VTP, only configure management domain passwords onVTP servers.
D . EnablingVTP pruning on a server willenable the feature for the entire management domain.
E . Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.
-
802.1x协议仅关注接入端口的状态,802.1x协议支持不同的端口控制方式()。
A . 自动识别模式:端口初始状态为非授权状态,仅允许EAPOL报文收发,不允许用户访问网络资源;如果认证流程通过,则端口切换到授权状态,允许用户访问网络资源
B . 强制授权模式;端口始终处于授权状态,允许用户不经认证授权即可访问网络资源
C . 强制非授权模式;端口始终处于非授权状态,不允许用户访问网络资源
D . 强制自动识别模式:如果认证流程通过,则端口切换到授权状态,允许用户访问网络资源
-
pany has implemented 802.1X authentication as a security enhancement. Which statement is true about 802.1x port-based authentication?()
A . TACACS+ is the only supported authentication server type.
B . If a host initiates the authentication process and does not receive a response, it assumes it is not authorized.
C . RADIUS is the only supported authentication server type.
D . Before transmitting data, an 802.1x host must determine the authorization state of the switch.
E . Hosts are required to havea 802.1x authentication client or utilize PPPoE.
F . None of the other alternatives apply.
-
802.1x认证主要是为了解决局域网用户的接入认证问题,802.1x的认证方式包括()。
A . 中继方式
B . 代理方式
C . 终结方式
D . 远端方式
-
MA5200E/F增加了802.1X认证的功能,802.1X认证是端口认证,MA5200在端口认证后才进行二层帐号和密码的认证,所以802.1X认证是一种()的认证方式。
A . 二层、更安全
B . 三层和PPPOE一样
C . 二层和PPPOE一样
D . 三层、更安全
-
What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()
A . Adjust the default hello timers to three seconds for aggressive mode
B . Enable it in global mode and on every interface you need to support
C . Enable it in global mode to support every individual fiber-optic interface
D . Enable it to create channels containing up to eight parallel links between switche
-
What statement is true regarding processor allocation when implementing micro-partitions? ()
A . The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.1 core.
B . The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.01 core.
C . The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.01 core.
D . The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.001
-
Refer to the exhibit.
How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port? ()
https://assets.asklib.com/images/image2/2018073011005317862.jpg
A . The switch will uniquely authorize the client by using the client MAC address.
B . The switch will cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
C . The switch port will disable 802.1x port-based authentication and cause the port to transition to the authorized state without any further authentication exchange.
D . The switch port will enable 802.1x port-based authentication and begin relaying authentication messages between the client and the authentication server.
-
1. public class X ( 2. public object m () { 3. object o = new float (3.14F); 4. object [] oa = new object [1]; 5. oa[0]= o; 6. o = null; 7. return oa[0]; 8. } 9. } When is the float object created in line 3, eligible for garbage collection?()
A . Just after line 5
B . Just after line 6
C . Just after line 7 (that is, as the method returns)
D . Never in this method.
-
Which two design concerns must be addressed when designing a multicast implementation?()
A . only the low-order 23 bits of the MAC address are used to map IP addresses
B . only the low-order 24 bits of the MAC address are used to map IP addresses
C . only the high-order 23 bits of the MAC address are used to map IP addresses
D . only the low-order 23 bits of the IP address are used to map MAC addresses
E . the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F . the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresse
-
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
A . EAP-over-LAN
B . EAP MD5
C . STP
D . protocols not filtered by an ACL
E . CDP
F . TACACS+
-
Which two are needed components when designing and implementing a security solution?()
A . detailed VLAN information
B . an incident response plan
C . results of testing the new network configuration
D . an existing hierarchical network topology
E . a security policy for your organizatio
-
public class X { public object m () { object o = new float (3.14F); object oa = new object [1]; oa[0]= o; o = null; return oa[0]; } } When is the float object created in line 3, eligible for garbage collection?()
A . Just after line 5
B . Just after line 6
C . Just after line 7 (that is, as the method returns)
D . Never in this method.
-
在配置802.1x认证时,可以有针对性的配置静默功能,关于802.1x静默功能的描述,正确的有()
A.静默功能是为了避免用户发送大量能启动认证流程的报文,导致设备不停地向RADIUS服务器发起认证请求
B.启用静默功能后,在用户认证失败后的一段时间内,交换机丢弃用户的认证报文
C.启用静默功能后,在用户认证失败一定次数后,交换机在一段时间内丢弃该用户的认证报文
D.802.1x的静默功能默认开启,可以通过命令关闭