CCIE R&S 笔试选择题

  1. Refer to the exhibit. Provided that routing is configured correctly, what command can a user on R1 enter to telnet R2?
     telnet 172.16.193.2 3005 /source-interface Loopback0
  2. Refer to the exhibit. You have configured a VRF named Blue on R1 as shown. Which action must you take to enable uRPF on the…
     Configure the ip verify unicast source reachable via rx allow default command on interface E1/0
  3. Which two statements about WAN rate-based Ethernet circuits are true? (Choose two)
     The CIR represents the amount of traffic that can pass from a customer to an ISP over the circuit.
     QoS is performed at the CE edge to prevent the service provider from dropping excessive traffic.
  4. Which statement about MAC authentication Bypass is true?
     It can initiate after 802.1X authentication times out.
  5. What does reverse path forwarding ensure in a multicast network?
     It ensures a loop-free multicast network.
  6. Which ISATAP representation of the IPv4 address 209.165.200.227 when the IPv6 prefix is 2001:DB8:1234:5678::/64 is true?
     2001:DB8:1234:5678:0000:5EFE:D1A5:C8E3
  7. Which IS-IS feature allows an IS-IS router to determine a path to a prefix without performing an SPF computation?
     Partial Route computation
  8. Which two statements about IPsec VTIs are true? (Choose two)
     They support IP and multicast traffic.
     They support tunnel mode only.
  9. How does an IPv6 host automatically generate a global address?
     It appends its interface identifier to the network prefixes contained in Router Advertisement messages.
  10. How many address families can a single OSPFv3 instance support?
     1
  11. What is the initial BFD state?
     Down
  12. Which EIGRP feature allows the use of leak maps?
     Stub
  13. Which two statements about QoS classification and marking are true? (Choose two)
     It can classify packets based on their source IP and MAC addresses only.
     CAR rate policies use CoS, IP precedence, and prefix lists to match traffic.
  14. Refer to the exhibit. An IPv6 tunnel is configured between site A and site B. Which feature does the tunnel support?
     Site-to-site tunnel mode.
  15. Company A have two remote sites, which are connected to a common ISP by BGP. At each site, company A is using the …
     Allowas-in
  16. Refer to the exhibit. Which option describes the purpose of the as-set argument of the aggregate-address command?
     It provides an AS path in the aggregate advertisement that includes the AS numbers of the component members.
  17. Which IPv4 feature can limit indiscriminate flooding of multicast traffic on a VLAN?
     IGMP Snooping.
  18. Refer to the exhibit. Which two statements about the output are true? (Choose two)
     Setting the priority of this switch to 0 for VLAN 1 would cause it to become the new root.
     Spanning tree PortFast should not be enabled on GigabitEthernet2/1.
  19. Which three criteria are used for stackwise election of a master switch?
     Lowest MAC address
     Longest uptime
     User-selected priority
  20. Which two statements about HDLC operations in asynchronous balanced mode are true? (Choose two)
     Either device can send frames at any time.
     Either device can initiate transmission of frames.
  21. Which three features support object tracking? (Choose two)
     HSRP
     vPC
     EEM
  22. An IPv6 network has different MTUs on different segments, if the network is experiencing reliability issues, which option is…
     ICMPv6 is filtered.
  23. A host on an Ethernet segment has a different subnet mask than the default gateway. What can be done to allow it to co…,
     Enable proxy ARP on the default gateway.
  24. Which two IPv6 extension headers are valid?
     Encapsulating Security Payload
     Mobility
  25. Which feature can you implement to most effectively protect customer traffic in a rate-limited WAN Ethernet service?
     HCBWFQ
  26. How are the Cisco Express Forwarding table and the FIB related to each other?
     Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions.
  27. Which two OSPF network type require the use of DR and BDR? (Choose two)
     Broadcast networks
     Non-broadcast networks
  28. Refer to the exhibit. You notice that neighboring RIP IPv6 routers cannot reach OSPFv3 routes on R1. Which reason for the…
     The redistribution metric is too large.
  29. Refer to the exhibit. Your organization has two offices, Site 1 and Site2, which are connected by a provider backbone, as…
     PE Site 1 Fa1/0 and PE Site 2 Fa0/0
  30. Which option describes how a router responds if LSA throttling is configured and it receives the identical LSA before the…
     The LSA is ignored.
  31. Which IS-IS topology allows IPv4 and IPv6 destinations to use the same path toward a remote network?
     Single-area multiple-topology
  32. Which two statements about the route summarization are true?
     EIGRP learned routes are automatically summarized.
     When a packet is routed to a destination, the router chooses the most specific prefix from the routing table.
  33. …ut a type 4 SLA in OSPF is true?
     …hat is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ASBR.
  34. Which two conditions must be met by default to implement the BGP multipath feature? (Choose two)
     All attributes must have the same values.
     The next-hop routers must be different.
  35. Refer to the exhibit. Which two statements about the capture are true? (Choose two)
     It is set to run for five minutes.
     It continues to capture data after the buffer is full.
  36. Which two statements about OSPF route filtering are true? (Choose two)
     It can be based on the external route tag.
     It can be based on the source router ID.
  37. Which IP SLA operation requires Cisco endpoints?
     UDP Jitter for VoIP
  38. Refer to the exhibit. What is the effect of the given configuration?
     The port rejects inbound advertisements and router redirect messages.
  39. Which are three ways to increase traceroute performance?
     Disable DNS lookups
     Set a timeout value of less than 3 seconds
     Use a probe count of 2 or lower
  40. For which two purposes can RTCP be used? (Choose two)
     Providing out-of-band statistics and control information for RTP sessions
     Collecting information about VoIP service quality
  41. Refer to the exhibit. You are configuring Router1 and Router2 for L2TPv3 tunneling. Which two additional configurations ar…
     Loopback 0 on Router 1 must be advertised to Router2.
     Router1 must be configured to encapsulate traffic by using L2TPv3 under the pseudowire -class R1toR2
  42. Which feature prevents multicast flooding to routers on a common VLAN that are not a part of the multicast distributor?
     PIM Snooping
  43. Which three statements about AToM are true? (Choose three)
     The PE routers must share the same VC identifier.
     It requires MPLS between PE routers.
     The attachment circuit is configured with the xconnect command.
  44. Which statement about the BGP scope of the cost community is true?
     It is shared with IBGP and confederation peers.
  45. Which two protocols are used by the management plane? (Choose two)
     Telnet
     FTP
  46. Which three pieces of information are carried in OSPF type-3 LSAs? (Choose three)
     Metric
     IP subnets
     Subnet mask
  47. Which two loop-prevention mechanisms are implemented in BGP? (Choose two)
     A route with its own AS in the AS_Path is dropped automatically if the route reenters its own AS.
     A route with its own cluster ID in the CLUSTER_LIST is dropped automatically when the routes reenters its own AS…
  48. Which command can you enter to configure a built-in policer with minimum guaranteed bandwidth without starving ot…
     Bandwidth
  49. Refer to the exhibit. Which statement about the CM-SILVER class map is true?
     It matches traffic in access list ACL-SILVER with DSCP value AF21 only.
  50. Refer to the exhibit. The Main1 and Branch1 switches are connected directly over an MPLS pseudowire, and both run……Main1 switch. Which two actions can you take to restore connectivity and prevent the problem from recurring? (Choose two)
     Enable errdisable recovery on both the Main1 and Branch1 switches.
     Issue the shutdown and no shutdown commands on the Branch1 switch uplink to the B1 router only.
  51. Which three fields are part of a TCN BPDU? (Choose three)
     Type
     Protocol ID
     Version
  52. Which two discovery mechanism does LDP support? (Choose two)
     Extended
     Basic
  53. Refer to the exhibit. What will be the IP MTU of tunnel 0?
     1476
  54. On a network using DiffServ, which option refers to the actions that applied to a packet as it moves through the network…
     DSCP
  55. Which two IP packet attributes are used by Traditional NetFlow? (Choose two)
     IP destination address
     IP source address
  56. Which STP feature can protect the network environment from loops in case of software failure?
     BPDU guard
  57. Which two statements about the logging are true?
     Logs can be displayed on the console or on a remote terminal.
     Log messages include a mnemonic that describes the message.
  58. In which way does the Bridge Assurance mechanism modify the default spanning-tree behavior in an effort to prevent…
     BPDUs are sent bidirectional on all active network ports, including blocked and alternate ports.
  59. Which two methods can you use to limit the range for EIGRP queries? (Choose two)
     Configure stub routers in the EIGRP domain.
     Summarize routes at the boundary routers of the EIGRP domain.
  60. Which three factors does Cisco PFR use to calculate the best exit path? (Choose two)
     Delay
     Loss
     Reachability
  61. Which statement is true about LLDP?
     LLDP provides VTP support.
  62. Which two statements about IGPs are true? (Choose two)
     RIPv2 and EIGRP support VLSM.
     OSPF and IS-IS are classless protocols.
  63. Which two statements about IPv6 6to4 tunnels are true? (Choose two)
     They are point-to-multipoint tunnels.
     Sites use address from the 2002::/16 prefix.
  64. Which two statements about Cisco IOS XE are true? (Choose two)
     Its functions run as multiple separate processes in the OS.
     It is deployed in a Linux-based environment.
  65. Which prefix list matches and permits all RFC 1918 network 10.0.0.0 routes that have masks of /16 through /24?
     Ip prefix-list foo seq 10 permit 10.0.0.0/8 ge 16 le 24
  66. Which action does router poisoning take that serves as a loop-prevention method?
     It immediately sends routing updates with an unreachable metric to all devices.
  67. Which statement about EIGRP request packet is true?
     They are transmitted unreliably.
  68. What are two general SDN characteristics? (Choose two)
     Southbound interfaces are interfaces used between the control plane and the data plane.
     The separation of the control plane from the data plane.
  69. Which three benefits of virtualizing the DMZ are true? (Choose three)
     Analytics
     Per-app network functions and operation
     Dynamic and automated service insertion with focus on security
  70. Which statement correctly describes Ansible operations and playbooks?
     Ansible is agentless and uses playbooks formatted in YAML.
  71. Which three connectivity models for vEdge Site Architecture are true? (Choose three)
     Hybrid with Fallback
     Secure virtual connectivity
     Full SD-WAN
  72. One of your clients which is in the manufacturer area is after a solution in order to manage all his fog nodes. Which ma…
     Cisco Prime Infrastructure
  73. Which three campus fabric nodes in SD-Access architecture are true? (Choose three)
     Fabric border nodes
     Fabric edge nodes
     Control plane nodes
  74. Which description correctly describes Git?
     Git is a version control system for tracking changes in files.
  75. Which are the three recommended steps to implement your Risk-Based IoT Security Program? (Choose three)
     Assess
     Analyze
     Implement
  76. Which three basic types of SD-WAN deployments are out on the market? (Choose three)
     Internet-based SD-WAN
     SD-WAN as-a-Services
     Managed service SD-WAN
  77. Which three statements correctly describe the encoding used by NETCONF and RESTCONF? (Choose two)
     RESTCONF uses XML-encoded data.
     NETCONF uses XML-encoded data.
     RESTCONF uses JSON-encoded data.
  78. Which two options are requirements for AToM support? (Choose two)
     MPLS must be configured with an LSP in the SP core.
     The PE routers must be able to communicate with each other over IP.

2019年3月4日

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 214,377评论 6 496
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 91,390评论 3 389
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 159,967评论 0 349
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 57,344评论 1 288
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 66,441评论 6 386
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 50,492评论 1 292
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 39,497评论 3 412
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 38,274评论 0 269
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 44,732评论 1 307
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 37,008评论 2 328
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 39,184评论 1 342
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 34,837评论 4 337
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 40,520评论 3 322
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 31,156评论 0 21
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 32,407评论 1 268
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 47,056评论 2 365
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 44,074评论 2 352

推荐阅读更多精彩内容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi阅读 7,319评论 0 10
  • The Inner Game of Tennis W Timothy Gallwey Jonathan Cape ...
    网事_79a3阅读 12,000评论 3 20
  • 雄关漫道萧瑟路, 人常在,天涯住。 雨渐微山湿小渡, 一溪春水,两只鸳鹭, 白云深处去。 万里青山人未老, 可惜年...
    释迦干屎橛阅读 345评论 7 2
  • 早晚有点凉凉 所以对阳光十分渴望 早和晚一样 投在地平线上的影子都十分斜长 街对面是一行行斜柳 身后是一位女子开的...
    江城诗苑阅读 313评论 1 9
  • 2017.7.6——2017.8.28 IBT单词终于终于背完一遍了,好开森!我背单词的方法向来生猛直接,这就表明...
    Yi号橙子喵阅读 208评论 0 0