CCNP350-401学习笔记(151-200题)

news2024/9/23 17:22:42

151、Which two LISP infrastructure elements are needed to support LISP to non-LISP internetworking? (Choose two.)
A. PETR
B. PITR
C. MR
D. MS
E. ALT

152、In an SD-WAN deployment, which action in the vSmart controller responsible for?
A. handle, maintain, and gather configuration and status for nodes within the SD-WAN fabric
B. distribute policies that govern data forwarding performed within the SD-WAN fabric
C. gather telemetry data from vEdge routers
D. onboard vEdge nodes into the SD-WAN fabric

153、Drag and drop the Qos mechanisms from the left to the correct descriptions on the right

 154、

Refer to the exhibit.An engineer is using XML in an application to send information to a RESTCONFenable device.After sending the request,the engineer gets this response message and a HTTP response
code of 400.what do these responses tell the engineer?
A. The Accept header sent was application/xml
B. POST was used instead of PUT to update
C. The Content-Type header sent was application/xml
D. A JSON body was used 

155、

Refer to the exhibit. An engineer must create a configuration that executes the show run command and
then terminates the session when user
CCNP logs in. Which configuration change is required?
A. Add the autocommand keyword to the aaa authentication command.
B. Add the autocommand keyword to the username command.
C. Add the access-class keyword to the aaa authentication command.
D. Add the access-class keyword to the username command 

156、Which outbound access list, applied to the WAN interface of a router, permits all traffic except for httptraffic sourced from the workstation with IP address 10.10.10.1?
A. ip access-list extended 10
deny tcp host 10.10.10.1 any eq 80
permit ip any any
B. ip access-list extended 200
deny tcp host 10.10.10.1 eq 80 any
permit ip any any
C. ip access-list extended NO_HTTP
deny tcp host 10.10.10 1 any eq 80
D. ip access-list extended 100
deny tcp host 10.10.10.1 any eq 80
permit ip any any

157、

Refer to the exhibit. What are two effects of this configuration? (Choose two.)
A. R1 becomes the active router.
B. If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.
C. R1 becomes the standby router
D. If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.
E. If R1 goes down, R2 becomes active and remains the active device when R1 comes back online.

158、 

Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form?
A. network 20.1.1.2 0.0.255.255 area 0
B. network 20.1.1.2 255.255.0.0 area 0
C. network 20.1.1.2 255.255.255.255 area 0
D. network 20.1.1.2 0.0.0.0 area 0

159、 

Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all
three switches An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration
corrects the issue?
A. SW1(config)#int gi1/1
SW1(config)#switchport taink allowed vlan 1-9,11-4094
B. SW2(config)#int gi1/2
SW2(config)#switchport trunk allowed vlan 10
C. SW2(config)#int gi1/2
SW2(config)#switchport trunk allowed vlan 1-9,11-4094

D. SW1(config)#int gi1/1
SW1(config)#switchport trunk allowed vlan 10 

160、

Refer to the exhibit. An engineer must configure a SPAN session. What is the effect of the configuration?
A. Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1
B. Traffic received on VLANs 10,11, and 12 is copied and sent to interface g0/1
C. Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.
D. Traffic sent on VLANs 10, 11 , and 12 is copied and sent to interface g0/1 

161、What is the result of applying this access contol list ?

A. TCP traffic with the URG bit set is allowed
B. TCP traffic with the SYN bit set is allowed
C. TCP traffic with the ACK bit set is allowed
D. TCP traffic with the DF bit set is allowed

162、 

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a
Cisco IOS device?
A. A NETCONF request was made for a data model that does not exist
B. A NETCONF message with valid content based on the YANG data models was made, but the request failed.
C. The device received a valid NETCONF request and serviced it without error.
D. The NETCONF running datastore is currently locked. 

163、

Refer to the exhibit.Which two commands are needed to allow for full reachability between AS 1000 and AS 2000?(choose two)
A. R2#network 192.168.0.0 mask 255.255.0.0
B. R1#network 192.168.0.0 mask 255.255.0.0
C. R2#network 209.165.201.0 mask 255.255.192.0
D. R2#no network 10.0.0.0 255.255.255.0
E. R1#no network 10.0.0.0 255.255.255.0 

164、What is a Type 1 hypervisor?
A. runs directly on a physical server and depends on a previously installed operating system
B. runs directly on a physical server and Includes its own operating system
C. runs on a virtual server and depends on an already installed operating system
D. runs on a virtual server and includes its own operating system

165、What is the difference between CEF and process switching?
A. CEF is more CPU-intensive than process switching.
B. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.
C. CEF processes packets that are too complex for process switching to manage.
D. Process switching is faster than CEF

166、what is the purpose of an RP in PIM?
A. send join messages toward a multicast source SPT
B. ensure the shortest path the multicast source to the receiver
C. receive IGMP joins from multicast receivers
D. secure the communiation channel between the multicast sender and receiver

167、How do agent-based versus agentless configuration management tools compare?
A. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes
B. Agentless tools require no messaging systems bet-veen master and slaves.
C. Agent-based tools do not require instaltation of additional software packages on the slave nodes
D. Agentless tools use proxy nodes to interface with slave nodes

168、

Refer to the exhibit. An engineer configures monitoring on SW1 and enters the show show command to verify operation. What does the output confirm?
A. SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.
B. SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.
C. RSPAN session 1 is incompietety configured for monitoring.
D. RSPAN session 1 monitors activity on VLAN 50 of a remote switch. 

169、Refer to the exhibit. An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume tliat all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task?

A. R4(config)#route-map PREPEND permit 10
R4(config-route-map)#set as-path prepend 200 200 200
R4(config)#router bgp 200R4(conflg-router)#neighbor 10.2.2.2 route-map PREPEND out
B. R3(config)#route-map PREPEND permit 10
R3(config-route-map)#set as-path prepend 200 200 200
R3(config)#router bgp 200
R3(conflg-router)#neighbor 10.1.1.1 route-map PREPEND out

C. R4(config)#route-map PREPEND permit 10
R4(config-route-map)#set as-path prepend 100 100 100
R4(config)#router bgp 200
R4(config-router)#neighbor 10.2.2.2 route-map PREPEND in
D. R3(config)#route-map PREPEND permit 10
R3(config-route-map)#set as-path prepend 100 100 100
R3(config)#router bgp 200
R3(config-router)#neighbor 10.2.2.2 route-map PREPEND in 

170、An engineer reviews a router's logs and discovers the following entry. What is the event's logging severity level?
Router# *Jan 01 38:23:19.579: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up
A. warning
B. error
C. notification
D. informational

171、What are two reasons a company would choose a cloud deployment over an on-prem deployment?
(Choose two.)
A. In a cloud environment, the company controls technical issues. On-prem environments rely on the service provider to resolve technical issues.
B. Cloud deployments require long implementation times due to capital expenditure processes. On-prem deployments can be accomplished quickly using operational expenditure processes.
C. Cloud costs adjust up or down depending on the amount of resources consumed. On-prem costs for hardware,power, and space are on-going regardless of usage.
D. Cloud resources scale automatically to an increase in demand. On-prem requires additional capital expenditure.

E. In a cloud environment, the company is in full control of access to their data. On-prem risks access to data due to service provider outages

172、

Refer to the exhibit.R1 is able to ping the R3 fa0/1 interface.why do the extended pings fail?
A. R2 and R3 do not have an OSPF adjacency
B. The DF bit has been set
C. R3 is missing a return route to 10.99.69.0/30
D. The maximum packet size accepted by the command is 1476 bytes

173、 

Refer to the exhibit.which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
A. Atlanta(config-router)# area 1 range 192.168.0.0 255.255.248.0
B. Atlanta(config-router)# area 1 range 192.168.0.0 255.255.252.0
C. Atlanta(config-router)# area 0 range 192.168.0.0 255.255.248.0
D. Atlanta(config-router)# area 0 range 192.168.0.0 255.255.252.0 

174、

Refer to the exhibit.An engineer configures CoPP and enters the show command to verify the
implementation.what is the result of the configuration?
A. ICMP will be denied based on this configuration
B. If traffic exceeds the specified rate,it will be transmitted and remarked
C. Class-default traffic will be dropped
D. All traffic will be policed on access-list 120

175、 

Refer to the exhibit.An engineer reconfigures the port-channel between SW1 and SW2 from an access port to a trunk and immediately notice this error in sw1's log:
*Mar 1 09:47:22.245: %PM-4-ERR_DISABLE:bpduguard error detected on Gi0/0, putting Gi0/0 in errdisable state
which command set resolves this error?         D

 176、An engineer must configure interface GigabitEthernet0/0 for VRRP group 10.when the router has the highest priority in the group,it must assume the master role.which command set must be added to the initial configuration to accomplish this task?        C

 177、Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)

A. Use a virtual switch running as a separate virtual machine.
B. Use a virtual switch provided by the hypervisor
C. Use a single trunk link to an external Layer2 switch.

D. Use a single routed link to an external router on stick.
E. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines.

178、How does SSO work with HSRP to minimize network disruptions?
A. It enables HSRP to elect another switch in the group as the active HSRP switch.
B. It ensures fast failover in the case of link failure.
C. It enables data forwarding along known routes following a switchover, while the routing protocol reconverges.
D. It enables HSRP to failover to the standby RP on the same device

179、

Refer to the exhibit.A network engineer configures a GRE tunnel and enters the show interface tunnel command. what does the output confirm about the configuration?
A. interface tracking is configured
B. The tunnel mode is set to the default
C. The keepalive value is modified from the default value

D. The physical interface MTU is 1476 bytes 

180、

Refer to exhibit.which two commands ensure that DSW1 becones the root bridge for VLAN 10 and 20? (choose two)
A. spanning-tree mst 1 root primary
B. spanning-tree mst 1 priority 1
C. spanning-tree mst vlan 10,20 priority root
D. spanning-tree mst vlan 10,20 root primary
E. spanning-tree mst 1 priority 4096 

181、How does the RIB differ from the FIB?

A. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destination
B. The FIB indudes many routes to a single destination. The RIB is the best route to a single destination.
C. The RIB includes many routes to the same destination prefix. The FIB contains only the best route.
D. The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations.

182、which antenna type should be used for a site-to-site wireless connection?
A. path
B. omnidirectional
C. dipole
D. Yagi

183、which two characteristics define the intent API provided by Cisco DNA Center?(choose two)
A. northbound API
B. business outcome oriented

C. device-oriented
D. southbound API
E. procedural

184、

Refer to exhibit. An engineer attempts to configure a router on a stick to route packets between
clinet,servers,and printers; howerver,initial tests show that this configuration is not working.which
command set resolves this issue?        C

 

 185、

Refer to the exhibit. PC-1 must access the web server on port 8080.To allow this traffic,which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
A. permit tcp host 192.168.0.5 It 8080 host 172.16.0.2
B. permit tcp host 172.16.0.2 host 192.168.0.5 eq 8080
C. permit tcp host 192.168.0.5 host 172.16.0.2 eq 8080
D. permit tcp host 192.168.0.5 eq 8080 host 172.16.0.2 

186、

Refer to the exhibit^ Which command allows hosts that are connected to FastEthernetO/2 to access the
Internet?
A. ip nat inside source list 10 interface FastEthemet0/1 overtoad
B. ip nat outside source static 209.165.200.225 10.10.10.0 overload

C. ip nat inside source list 10 interface FastEthernetO/2 overload
D. ip nat outside source Hst 10 interface FastEthernetO/2 overload 

187、How is a data modeling language used?
A. To enable data to be easily structured, grouped, validated, and replicated.
B. To represent finite and well-defined network elements that cannot be changed
C. To model the flows of unstructured data within the infrastructure.
D. To provide human readability to scnptmg languages.

188、which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
A. underlay network
B. VPN routing/forwarding
C. easy virtual network
D. overlay network

189、

Refer to the exhibit Which router is the designated router on the segment 192 168 0 0/24?
A. Router NewYork because it has a higher router ID.
B. This segment has no designated router because it is a nonbroadcast network type.
C. This segment has no designated router because it is a p2p network type.
D. Router Chicago because it has a lower router ID 

190、Drag and drop the characteristics from the left onto the infrastructure types on the right.

 

191、Drag and drop the DHCP message that are exchage between a client and an AP into the order they are exchage on the right 

192、Drag and drop the threat defense solutions from the left onto their descriptions on the right

 

193、Drag and drop the characteristics from the left onto the routing protocols they describe on the right

 

 

194、Which element enables communication between guest VMs within a virtualized environment?
A. pNIC
B. vSwitch
C. virtual router
D. hypervisor 

195、Which router is elected the IGMP Querier when more than one router is in the same LAN segment?
A. The router with the longest uptime
B. The router with the shortest uptime.
C. The router with the highest IP address
D. The router with the lowest IP address

196、Refer to the exhibit These commands have been added to the configuration of a switch. Which command flags an error if it is added to this configuration?

A. monitor session 1 source interface port-channel 6
B. monitor session 1 source vlan 10
C. monitor session 1 source interface FastEthernet0/1 rx
D. monitor session 1 source interface port-channel 7, port channel 8 

197、"HTTP/1.1 204 No Content" is returned when the curl -i -X DELETE command is issued. Which situation has occurred?
A. The object could not be located at the URI path.
B. The command succeeded in deleting the object.
C. The object was located at the URI, but it could not be deleted.
D. The URI was invalid.

198、Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?

A. R3(config-router)neighbor 10.1.1.1 weight 200
B. R4(config-router)bgp default local-preference 200
C. R3(config-router)bgp default local-preference 200
D. R4(config-router)neighbor 10.2.2.2 weight 200 

199、Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?
A. It rejects any unidirectional link traffic forwarding
B. It discovers the StackWise domain and brings up SVL interfaces
C. It determines which switch becomes active or standby.
D. It determines if the hardware is compatible to form the StackWise Virtual domain.

200、Which entity is responsible for maintaining Layer 2 isolation between segments in a VXL AN environment?
A. host switch
B. switch fabric
C. VTEP
D. VNID

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/355472.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

一文搞懂C/C++内存管理原理与实现

C 语言内存管理指对系统内存的分配、创建、使用这一系列操作。在内存管理中,由于是操作系统内存,使用不当会造成毕竟麻烦的结果。本文将从系统内存的分配、创建出发,并且使用例子来举例说明内存管理不当会出现的情况及解决办法。 一、内存 …

[python入门㊽] - 自定义异常 raise 关键字

目录 ❤ 自定义抛出异常关键字 - raise ❤ 使用raise主动引发异常 ❤ raise 关键字的用法 ❤ 触发异常 ❤ 自定义异常类 在前面我们学过异常三个关键字分别是try、except 以及 finally 在编程过程中合理的使用异常可以使得程序正常的执行。有直接抛出异常的形式&…

【HTML】HTML 表格总结 ★★★ ( 表格标签 | 行标签 | 单元格标签 | 表格标签属性 | 表头单元格标签 | 表格标题标签 | 合并单元格 )

文章目录一、表格标签组成 ( 表格标签 | 行标签 | 单元格标签 )二、table 表格属性 ( border 属性 | align 属性 | width 属性 | height 属性 )三、表头单元格标签四、表格标题标签五、合并单元格1、合并单元格方式2、合并单元格顺序3、合并单元格流程六、合并单元格示例1、原始…

Linux之ping\kill\killall命令

参考视频:linux命令(ping)linux命令(kill、killall)Linux ping 命令用于检测主机。执行 ping 指令会使用 ICMP 传输协议,发出要求回应的信息,若远端主机的网络功能没有问题,就会回应…

Redis进阶:布隆过滤器(Bloom Filter)及误判率数学推导

1 缘起 有一次偶然间听到有同事在说某个项目中使用了布隆过滤器, 哎呦,我去,我竟然不知道啥是布隆过滤器, 这我哪能忍?其实,也可以忍,但是,可能有的面试官不能忍!&#…

简介JVM

目录 一、内存分区 1、程序计数器 2、栈 3、堆 4、方法区 二、类加载 1、Loading 2、Linking Verification Preparation Resolution 3、Initializing 4、双亲委派模型 三、垃圾回收 1、如何判断为垃圾? 引入引用计数 可达性分析 2、如…

Transformer论文阅读:Swin Transformer算法笔记

标题:Swin Transformer: Hierarchical Vision Transformer using Shifted Windows 会议:ICCV2021 论文地址:https://ieeexplore.ieee.org/document/9710580/ 官方代码:https://github.com/microsoft/Swin-Transformer 作者单位&am…

[安装之2] 台式计算机加固态硬盘,台式机添加固态硬盘教程_台式主机固态硬盘怎么安装

固态硬盘是用固态电子存储芯片阵列制成的硬盘,也是电脑中比较常见的内存硬件,有些用户在使用电脑时候,由于内存不足导致系统运行较卡的情况,往往会选择添加固态硬盘来解决,那么台式主机固态硬盘怎么安装呢?…

shell脚本内调用另外一个shell脚本的几种方法

有时会在一个shell脚本(如test_call_other_shell.sh)中调用另外一个shell脚本(如parameter_usage.sh),这里总结几种可行的方法,这些方法在linux上和windows上(通过Git Bash)均适用: 1.通过source: 运行在相同的进程,在test_…

CCIE重认证-300-401-拖图题全

拖图 拖图题 编程 snippet;192.168.5.0,mask 255.255.255.0;number是192.168.5.0;mask是255.255.255.0 snippets;edit-config对config,loopback对name 100,address对primary,mask…

广度优先搜索算法 - 迷宫找路

广度优先搜索算法1 思考问题1.1 这个迷宫需不需要指定入口和出口?2 先粗略实现2.1 源码2.2 源码解释3 优化代码3.1 优化读取文件部分3.2 增加错误处理4 再优化-让程序变得更加灵活4.1 用户外部可以循环输入入口和出口5 完整代码这是一个提问者的提出的问题&#xff…

制造业的云ERP在外网怎么访问?内网服务器一步映射到公网

随着企业信息化、智能化时代的到来,很多制造业企业都在用云ERP。用友U 9cloud通过双版本公有云专属、私有云订阅、传统软件购买三种模式满足众多制造业企业的需求,成为一款适配中型及中大型制造业的云ERP,是企业数智制造的创新平台。 用友U 9…

python 面向对象利用selenium【获取某东商品信息】

用python程序和谷歌selenium插件获取某东商品详细信息【商品名称、商品简介,超链接】利用selenium自动化程序 中的css页面结构索取来获取详细数据关于谷歌selenium的安装方法和使用方法第一步检查自己谷歌浏览器的版本1.1 找到设置:并鼠标点击进入1.2进入…

排序评估指标——NDCG和MAP

在搜索和推荐任务中,系统常返回一个item列表。如何衡量这个返回的列表是否优秀呢? 例如,当我们检索【推荐排序】,网页返回了与推荐排序相关的链接列表。列表可能会是[A,B,C,G,D,E,F],也可能是[C,F,A,E,D],现在问题来了…

使用canvas写一个flappy bird小游戏

简介 canvas 是HTML5 提供的一种新标签,它可以支持 JavaScript 在上面绘画,控制每一个像素,它经常被用来制作小游戏,接下来我将用它来模仿制作一款叫flappy bird的小游戏。flappy bird(中文名:笨鸟先飞&am…

XSS注入进阶练习篇(一)XSS-LABS通关教程

XSS注入进阶练习篇1.常用标签整理2. XSS-LABS 练习2.1 level 1 无限制2.2 level 2 双引号闭合2.3 level 3 源码函数书写不全,单引号绕过2.4 level 4 无尖括号绕过2.5 level 5 a标签使用2.6 level 6 大小写绕过2.7 level 7 置空替换绕过2.8 level 8 URL编码绕过 - 重…

安全—07day

Tomcat AJP 文件包含漏洞(CVE-2020- 1938) 漏洞概述 Ghostcat(幽灵猫)是由长亭科技安全研究员发现的存在于Tomcat 中的安全漏洞,由于Tomcat AJP 协议设计上存在缺陷,攻击者通过Tomcat AJP Connector可以读取或包含 Tomcat上所有…

Java岗面试题--Java并发(日积月累,每日三题)

目录面试题一:并行和并发有什么区别?面试题二:线程和进程的区别?追问:守护线程是什么?面试题三:创建线程的几种方式?1. 继承 Thread 类创建线程,重写 run() 方法2. 实现 …

详解垃圾回收算法,优缺点是什么?|金三银四系列

本文详细介绍了在 JVM 中如何判断哪些对象是需要回收的,以及不同的垃圾回收算法以及优缺点。点击上方“后端开发技术”,选择“设为星标” ,优质资源及时送达上篇文章详细介绍了 JVM 的结构以及其内存结构,需要阅读请移步。本文主要…

Android 9.0系统源码_通知服务(二)应用发送状态栏通知的流程

前言 应用发送一个显示在状态栏上的通知,对于移动设备来说是很常见的一种功能需求,本篇文章我们将会结合Android9.0系统源码具体来分析一下,应用调用notificationManager触发通知栏通知功能的源码流程。 一、应用触发状态栏通知 应用可以通…