ImageVerifierCode 换一换
格式:DOCX , 页数:23 ,大小:1.60MB ,
资源ID:26734334      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/26734334.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(第三期English FormJ1a DRSEnt v40 Final.docx)为本站会员(b****3)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

第三期English FormJ1a DRSEnt v40 Final.docx

1、第三期English FormJ1a DRSEnt v40 FinalRefer to the exhibit. Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A to access host B? 192.168.1.32/26 192.168.1.64/26 192.168.1.126/26 192.168.1.129/26 What are two characteristics of EIGRP? (Choose two.) It supports a maximum hop c

2、ount of 15. It sends small hello packets to maintain knowledge of its neighbors. It forwards complete routing tables in its updates to neighboring routers. It supports equal and unequal cost load balancing负载平衡 It supports only one network layer protocol.Refer to the exhibit. The network is using OSP

3、F as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true? RB has the lowest priority value. RC and RD have the lowest router IDs on the network. RA has established adjacencies with all neighbor routers. RA a

4、nd RB can not form an adjacency because they are stuck in the 2-way state.Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255? It identifies traffic on all inside interfaces to be translated and given access to the ISP router. It ide

5、ntifies traffic from the fa0/1 interface to be translated and given access to the ISP router. It allows traffic from the ISP to reach all of the inside interfaces. It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router. It allows traffic from the ISP route

6、r to the fa0/1 interface. What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.) 0.0.0.0 255.255.240.0 255.255.255.255 0.0.31.255 255.255.255.240 0.0.0.31 Which two statements are true

7、 about the native VLAN on a switch? (Choose two.) It requires a special VLAN ID tag. It is unable to be changed to a different VLAN. Untagged traffic slows the switching process down. The native VLAN defaults to VLAN 1 on Cisco Catalyst switches. Untagged frames that are received on a trunk become m

8、embers of this VLAN. Which statement is accurate about the CIR in Frame Relay? It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise. The CIR can be no lower than the port speed of the local loop. The CIR defines the contracted maximum rate available fro

9、m the service provider on the Frame Relay circuit. It is possible to burst over the CIR if bandwidth is available. 如果带宽允许,则突发速率有可能超出 CIR 的突发量Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR? C, B, A, D D, C, B, A A, B,

10、C, D A, C, B, D B, C, A, DRefer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of th

11、is connectivity problem? no set loopback incorrect subnet mask on R2 incompatible bandwidth incorrect IP address on R1 incompatible encapsulationRefer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate传播to SW3. On the basis of the partial out

12、put of the show vtp status command, what is the possible cause of the problem? VTP V2 mode is disabled. SW3 is configured as transparent mode. The number of existing VLANs does not match. The configuration revision number does not match. When MD5 authentication is used for OSPF routing protocol auth

13、entication, what two facts are known about the key? (Choose two.) The key passes between routers in plain text. The key is used to help generate an encrypted number for authentication. 密钥用于帮助生成验证用的加密数字 The key passes between routers in encrypted form. The key is never transmitted. The key can be cap

14、tured by using a packet sniffer.Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal o

15、perations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes: BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200 BorderR(config)# ip route 0.0.0.0 0.0.

16、0.0 172.16.1.1 However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing? The first configuration command overwrites the second command. The first default route will

17、be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0 network. This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table. The first default rout

18、e cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network adm

19、inistrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch? VTP version mismatch VTP domain name mismatch VTP revision number mi

20、smatch time synchronization problemsRefer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output? Router B has EIGRP adjacencies with both router A and C. Router B has a ful

21、ly converged topology table. Router B has not formed an adjacency with router A. Router B has not formed an adjacency with router C. If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated? prior to link establishment during the link establ

22、ishment phase before the network layer protocol configuration begins after the network layer protocol configuration has ended Which statement is true about the difference between CHAP and PAP in PPP authentication? PAP and CHAP provide equivalent protection against replay attacks. PAP sends the pass

23、word encrypted and CHAP does not send the password at all. PAP uses a two-way handshake method and CHAP uses a three-way handshake method. PAP sends the password once and CHAP sends the password repeatedly until acknowledgement of authentication is received. What should be considered when designing

24、an addressing scheme that uses private IP address space? Private IP addresses are globally routable. Address summarization is not recommended. Hierarchical design principles should be utilized. Discontiguous networks are no longer problematic. An administrator is configuring a new router to permit o

25、ut-of-band management access. Which set of commands will allow the required login using a password of cisco? Router(config)# line vty 0 4 Router(config-line)# password manage Router(config-line)# exit Router(config)# enable password cisco Router(config)# line vty 0 4 Router(config-line)# password ci

26、sco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# exit Router(config)# service password-encryption In order for a VLAN to be created on a

27、 switch, what configuration parameter is required? VTP domain name VLAN number VLAN IP address VLAN database nameRefer to the exhibit. A network administrator is configuring R1 to send a summary route to R2. Which statement would include only the four Ethernet networks in one summarization route? Ro

28、uter(config-if)# ip summary-address eigrp 1 172.31.0.0 255.255.0.0 Router(config-if)# ip summary-address eigrp 1 172.31.0.0 255.255.248.0 Router(config-if)# ip summary-address eigrp 1 172.31.0.0 255.255.252.0 Router(config-if)# ip summary-address eigrp 1 172.31.0.0 255.255.255.0 Router(config-if)# i

29、p summary-address eigrp 1 172.31.0.0 255.255.255.248 Router(config-if)# ip summary-address eigrp 1 172.31.0.0 255.255.255.252 Refer to the exhibit. What is the lowest cost OSPF path for traffic that is sourced from H2 and destined for H3? R3 to R5 R3 to R2 to R5 R3 to R4 to R5 R3 to R2 to R1 to R5Re

30、fer to the exhibit. A network administrator wants to block Telnet sessions from host B to hosts E and F. Where should ACL 110 be placed if the administrator follows Cisco best practices? on the Fa0/0 interface of R1 inbound on the S0/0/0 interface of R1 inbound on the S0/0/0 interface of R3 outbound

31、 on the Fa0/0 interface of R3 inbound A company is trying to decide whether to use a PVC or an SVC for the company WAN connection. Which statement best describes a benefit of using a PVC? A PVC is dynamically established between two points when a router requests a transmission. A PVC eliminates the

32、need for call setup and clearing for each transmission session. A PVC is best suited for small companies with sporadic data flows. A PVC does not require preconfiguration by a service provider.Refer to the exhibit. All routers are configured to use the EIGRP routing protocol, and the network administrator has configured the serial interface

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1