Chinaunix首页 | 论坛 | 博客
  • 博客访问: 5697827
  • 博文数量: 745
  • 博客积分: 10075
  • 博客等级: 上将
  • 技术积分: 7716
  • 用 户 组: 普通用户
  • 注册时间: 2005-04-29 12:09
文章分类

全部博文(745)

文章存档

2019年(1)

2016年(1)

2010年(31)

2009年(88)

2008年(129)

2007年(155)

2006年(197)

2005年(143)

分类:

2006-04-05 16:00:25

76,Your CTO has authorized you to purchase 10 new switches that can support the VLAN Management Policy Server(VMPS) feature. Which three of the following switches can you consider?

a. 2900XL series

b. 3500XL series

c. 5000 seires

 

77,The testing demonstrated the following high availability and resilience features of catalyst switches:

Per-VLAN spanning tree(PVST) using Cisco’s interswitch Link(ISL) and 802.1Q VLAN Trunking

Cisco Spanning Tree Enhancements, including UplinkFast and PortFast

Cisco Hot Standby Router Protocol(HSRP) and HSRP track

Cisco IOS per-destination load balancing over equal cost OSPF paths

Cisco IOS fast convergence for OSPF

 

78,Which of the following switches have inline power support for Cisco IP telephony?

a. 3500 series

b. 4000 series

c. 5000 series

d. 6000 series

answer:a,b,d

 

79,Which kind of management can be performed from the console port of a Cisco 6500 switch?

Out-of-band management of the switch

When you configure a switch or a router from the console, it is considered ‘out of band’ because you don’t get in there from any of the paths that the network device is a part of. Modems are often attached to the console port, providing for remote out of band management of the device

 

80,In a CLI based switch, what command will display the information comparable to the IOS command “show span”?

Show spantree

 

81,Which command would you enter to display the blocked ports on a spanning tree environment?

Show spantree blockedports

 

82,The TestKing network is utilizing QoS techniques to prioritize their mission critical data. What’s true about implementing QoS at the access, distribution, and core layers?

b. classification and marking should be done at the access layer

d. the high speed core layer only requires proper queuing(like LLQ) and dropping(like WRED) configurations

 

83,In the three-layer hierarchical network design model, what’s associated with the core layer?

a. access control list

b. data encryption

c. optimized transport

d. address aggregation

e. packet switching

f. boundary definition

answer:c,e

 

84,Which two statements are true when the extended system ID feature is enabled?

b. The BID is made up of the bridge priority value(four bits), the system ID(12 bits), and a bridge MAC address(48 bits)

d. the system ID value is the VLAN ID(VID)

 

85,How does 802.1q trunking keep track of multiple VLANs?

a. modifies the port index of a data frame to indicate the VLAN

b. adds a new header containing the VLAN ID to the data frame

c. encapsulates the data frame with a new header and frame check sequence

d. tags the data frame with VLAN information and recalculates the CRC value

answer:d

 

86,Which type of IGMP message is sent when a network client wants to join a multicast group?

a. host membership query

b. host membership report

c. host membership status

d. host membership notification

answer:b

 

87,MST configuration must be manually configured on each switch within the MST region

 

88,Which router redundancy protocol cannot be configured for interface tracking?

a. HSRP

b. GLBP

c. VRRP

d. SLB

e. RPR

f. RPR+

answer:c

 

89,In the use of 802.1X access control, which three products are allowed through the switch port before authentication takes place?

a. STP

b. CDP

c. EAP MD5

d. TACACS+

e. EAP-over-LAN

f. protocols not filtered by an ACL

answer:a,b,e

 

阅读(1769) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~