最新CCIE笔试题库.pdf

上传人:哈尼dd 文档编号:3728479 上传时间:2019-09-22 格式:PDF 页数:348 大小:7.66MB
返回 下载 相关 举报
最新CCIE笔试题库.pdf_第1页
第1页 / 共348页
最新CCIE笔试题库.pdf_第2页
第2页 / 共348页
最新CCIE笔试题库.pdf_第3页
第3页 / 共348页
最新CCIE笔试题库.pdf_第4页
第4页 / 共348页
最新CCIE笔试题库.pdf_第5页
第5页 / 共348页
亲,该文档总共348页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《最新CCIE笔试题库.pdf》由会员分享,可在线阅读,更多相关《最新CCIE笔试题库.pdf(348页珍藏版)》请在三一文库上搜索。

1、CCIE笔笔笔笔笔笔笔笔350-001题题题题题题题题_485Q(2013.1.25) Number: 350-001 Passing Score: 7 Time Limit: 120 min File Version: 485Q CCIE 笔笔笔笔笔笔笔笔题题题题题题题题 考考考考笔笔笔笔考考考考考考考考: 350-001 考考考考笔笔笔笔考考考考考考考考: 150分分分分分分分分 通通通通通通通通分分分分通通通通: 790 题题题题题题题题题题题题题题题题: 485Q 更更更更更更更更更更更更更更更更:2013年年年年1月月月月25更更更更 CCIE Routing and Switchi

2、ng Written Exam 鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿鸿:http:/ 培培培培培培培培YY频频频频频频频频3660: http:/ CCIE考考考考笔笔笔笔考考考考考考考考QQ群群群群:87181883 加加加加群群群群加加加加加加加加加加加加加加加加(要要要要考考考考IE)(500人人人人群群群群) CCIE题题题题题题题题题题题题题题题题考考考考考考考考题题题题:http:/ 1000 G视视视视频频频频视视视视视视视视视视视视视视视视视视视视视视视视:http:/ IT电电电电电电电电电电电电电电电电视视视视视视视视视视视视视视视视:http:/ b b s .h h

3、010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c o m / Exam A QUESTION 1 Which two commands are required to enable multicast on a router, knowing that the receivers only support IGMPv2? (Choose two.) A. ip pim rp-address B. ip pim ssm C. ip pim sparse-mode D. ip pim

4、passive Correct Answer: AC Section: (none) Explanation Explanation/Reference: Explanation: Sparse mode logic (pull mode) is the opposite of Dense mode logic (push mode), in Dense mode it is supposed that in every network there is someone who is requesting the multicast traffic so PIM-DM routers begi

5、n by flooding the multicast traffic out of all their interfaces except those from where a prune message is received to eliminate the “leaf“ from the multicasting tree (SPT), the Source-Based Tree (S, G); as opposed to Sparse mode that send the traffic only if someone explicitly requested it. Not lik

6、e Dense mode, which build a separated source-based tree (S, G) between the source and the requester of the traffic, Sparse mode mechanism is based on a fixed point in the network named Rendez- Vous point. All sources will have to register with the RP to which they send their traffic and thereby buil

7、d a source-based tree (S, G) between them and the RP (not with the final multicast receiver like in PIM-DM) and all PIM-SM routers, “whatever“ multicast traffic they are requesting, have to register with the RP and build a shared-tree (*. G) Reference http:/tools.ietf.org/html/rfc2236 http:/ shtml h

8、ttp:/ mode QUESTION 2 A branch router is configured with an egress QoS policy that was designed for a total number of 10 concurrent VOIP calls. Due to expansion, 15 VOIP calls are now running over the link, but after the 14th call was established, all calls were affected and the voice quality was dr

9、amatically degraded. Assuming that there is enough bandwidth on the link for all of this traffic, which part of the QoS configuration should be updated due to the new traffic profile? A. Increase the shaping rate for the priority queue. B. Remove the policer applied on the priority queue. C. Remove

10、the shaper applied on the priority queue. D. Increase the policing rate for the priority queue. Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 3 A new backup connection is being deployed on a remote site router. The stability of the connection has b b s .h

11、 h 010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c o m / been a concern. In order to provide more information to EIGRP regarding this interface, you wish to incorporate the “reliability“ cost metric in the EIGRP calculation with the command metric weights 1 0 1 0 1.

12、 What impact will this modification on the remote site router have for other existing EIGRP neighborships from the same EIGRP domain? A. Existing neighbors will immediately begin using the new metric. B. Existing neighbors will use the new metric after clearing the EIGRP neighbors. C. Existing neigh

13、bors will resync, maintaining the neighbor relationship. D. All existing neighbor relationships will go down. Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 4 Refer to the exhibit. R1 has an EBGP session to ISP 1 and an EBGP session to ISP 2. R1 receives t

14、he same prefixes through both links. Which configuration should be applied so that the link between R1 and ISP 2 will be preferred for outgoing traffic (R1 to ISP 2)? A. Increase local preference on R1 for received routes B. Decrease local preference on R1 for received routes C. Increase MED on ISP

15、2 for received routes D. Decrease MED on ISP 2 for received routes Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: Explanation Local preference is an indication to the AS about which path has preference to exit the AS in order to reach a certain network. A path with

16、 higher local preference is preferred more. The default value of preference is 100. Reference http:/ html? b b s .h h 010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c o m / referring_site=smartnavRD QUESTION 5 Refer to the exhibit. A small enterprise connects its off

17、ice to two ISPs, using separate T1 links. A static route is used for the default route, pointing to both interfaces with a different administrative distance, so that one of the default routes is preferred. Recently the primary link has been upgraded to a new 10 Mb/s Ethernet link. After a few weeks,

18、 they experienced a failure. The link did not pass traffic, but the primary static route remained active. They lost their Internet connectivity, even though the backup link was operating. Which two possible solutions can be implemented to avoid this situation in the future? (Choose two.) A. Implemen

19、t HSRP link tracking on the branch router R1. B. Use a track object with an IP SLA probe for the static route on R1. C. Track the link state of the Ethernet link using a track object on R1. D. Use a routing protocol between R1 and the upstream ISP. Correct Answer: BD Section: (none) Explanation Expl

20、anation/Reference: Explanation: Interface Tracking Interface tracking allows you to specify another interface on the router for the HSRP process to monitor in order to alter the HSRP priority for a given group. If the specified interfaces line protocol goes down, the HSRP priority of this router is

21、reduced, allowing another HSRP router with higher priority can become active (if it has preemption enabled). To configure HSRP interface tracking, use the standby group track interface priority command. When multiple tracked interfaces are down, the priority is reduced by a cumulative amount. If you

22、 explicitly set the decrement value, then the value is decreased by that amount if that interface is down, and decrements are cumulative. If you do not set an explicit decrement value, then the value is decreased by 10 for each interface that goes down, and decrements are cumulative. The following e

23、xample uses the following configuration, with the default decrement value of 10. Note: When an HSRP group number is not specified, the default group number is group 0. interface ethernet0 b b s .h h 010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c o m / ip address 10

24、.1.1.1 255.255.255.0 standby ip 10.1.1.3 standby priority 110 standby track serial0 standby track serial1 The HSRP behavior with this configuration is: 0 interfaces down = no decrease (priority is 110) 1 interface down = decrease by 10 (priority becomes100) 2 interfaces down = decrease by 10 (priori

25、ty becomes 90) Reference http:/ ntracking QUESTION 6 Why would a rogue host that is running a DHCP server on a campus LAN network present a security risk? A. It may allocate IP addresses from an unknown subnet to the users. B. All multicast traffic can be sniffed by using the DHCP multicast capabili

26、ties. C. The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports. D. A potential man-in-the-middle attack can be used against the clients. Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 7 Which statement is true ab

27、out TCN propagation? A. The originator of the TCN immediately floods this information through the network. B. The TCN propagation is a two step process. C. A TCN is generated and sent to the root bridge. D. The root bridge must flood this information throughout the network. Correct Answer: C Section

28、: (none) Explanation Explanation/Reference: Explanation: Explanation New Topology Change Mechanisms When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the root bridge. This is shown in this diagram: Once the root bridge is aware of a change in the topology

29、of the network, it sets the TC flag on the BPDUs b b s .h h 010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c o m / it sends out, which are then relayed to all the bridges in the network. When a bridge receives a BPDU with the TC flag bit set, it reduces its bridging-

30、table aging time to forward delay seconds. This ensures a relatively quick flush of stale information. Refer to Understanding Spanning-Tree Protocol Topology Changes for more information on this process. This topology change mechanism is deeply remodeled in RSTP. Both the detection of a topology cha

31、nge and its propagation through the network evolve. Topology Change Detection In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This means that a loss of connectivity is not considered as a topology change any more, contrary to 802.1D (that is, a port that moves

32、 to blocking no longer generates a TC). When a RSTP bridge detects a topology change, these occur: It starts the TC While timer with a value equal to twice the hello-time for all its non-edge designated ports and its root port, if necessary. It flushes the MAC addresses associated with all these por

33、ts. Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC bit set. BPDUs are also sent on the root port while the timer is active. Topology Change Propagation When a bridge receives a BPDU with the TC bit set from a neighbor, these occur: It clears the MAC a

34、ddresses learned on all its ports, except the one that receives the topology change. It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port (RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified). This way, the TCN floods v

35、ery quickly across the whole network. The TC propagation is now a one step process. In fact, the initiator of the topology change floods this information throughout the network, as opposed to 802.1D where only the root did. This mechanism is much faster than the 802.1D equivalent. There is no need t

36、o wait for the root bridge to be notified and then maintain the topology change state for the whole network for seconds. In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of the entire network (VLAN) flush. This approach results in potentially more temp

37、orary flooding, but on the other hand it clears potential stale information that prevents rapid connectivity restitution. Reference http:/ QUESTION 8 Which statement is true about loop guard? A. Loop guard only operates on interfaces that are considered point-to-point by the spanning tree. B. Loop g

38、uard only operates on root ports. C. Loop guard only operates on designated ports. D. Loop guard only operates on edge ports. Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: b b s .h h 010.c o m 鸿鹄论坛:h t t p :/b b s .h h 010.c o m / 鸿鹄书院:h t t p :/b o o k .h h 010.c

39、 o m / Explanation Understanding How Loop Guard Works Unidirectional link failures may cause a root port or alternate port to become designated as root if BPDUs are absent. Some software failures may introduce temporary loops in the network. Loop guard checks if a root port or an alternate root port

40、 receives BPDUs. If the port is receiving BPDUs, loop guard puts the port into an inconsistent state until it starts receiving BPDUs again. Loop guard isolates the failure and lets spanning tree converge to a stable topology without the failed link or bridge. You can enable loop guard per port with

41、the set spantree guard loop command. Note When you are in MST mode, you can set all the ports on a switch with the set spantree global-defaults loop-guard command. When you enable loop guard, it is automatically applied to all of the active instances or VLANs to which that port belongs. When you dis

42、able loop guard, it is disabled for the specified ports. Disabling loop guard moves all loop-inconsistent ports to the listening state. If you enable loop guard on a channel and the first link becomes unidirectional, loop guard blocks the entire channel until the affected port is removed from the ch

43、annel. Figure 8-6 shows loop guard in a triangle switch configuration. Figure 8-6 Triangle Switch Configuration with Loop Guard Figure 8-6 illustrates the following configuration: Switches A and B are distribution switches. Switch C is an access switch. Loop guard is enabled on ports 3/1 and 3/2 on

44、Switches A, B, and C. Use loop guard only in topologies where there are blocked ports. Topologies that have no blocked ports, which are loop free, do not need to enable this feature. Enabling loop guard on a root switch has no effect but provides protection when a root switch becomes a nonroot switc

45、h. Follow these guidelines when using loop guard: Do not enable loop guard on PortFast-enabled or dynamic VLAN ports. Do not enable PortFast on loop guard-enabled ports. Do not enable loop guard if root guard is enabled. Do not enable loop guard on ports that are connected to a shared link. Note: We

46、 recommend that you enable loop guard on root ports and alternate root ports on access switches. Loop guard interacts with other features as follows: Loop guard does not affect the functionality of UplinkFast or BackboneFast. Root guard forces a port to always be designated as the root port. Loop gu

47、ard is effective only if the port is a root port or an alternate port. Do not enable loop guard and root guard on a port at the same time. PortFast transitions a port into a forwarding state immediately when a link is established. Because a PortFast-enabled port will not be a root port or alternate port, loop guard and PortFast cannot be configured on the same port. Assigning dynamic VLAN membership for the port requires that the port is PortFast enabled. Do not configure a loop guard-enabled port with dynamic VLAN membership. If your network has a type-inconsistent port or a PVID-inconsi

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1