Storm Control
Port security
CAM table size definition
IP spoof prevention
Network Based Application Recognition
第1题:
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()
第2题:
What tasks can only be performed in the default or admin VDC?()
第3题:
If a switch is working in the fail-open mode, what will happen when the switch’s CAM table fills to capacityand a new frame arrives?()
第4题:
What Cisco IOS feature examines packets received to make sure that the source address and interfaceare in the routing table and matck the interface that the packet was received on?()
第5题:
What Cisco Switch feature best protects against CAM table overflow attacks?()
第6题:
While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()
第7题:
What is a new feature of the Cisco ISR router? ()
第8题:
Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
UDLD protects against STP failures caused by cabling problems that create one-way links.
Loop guard detects and protects against duplicate packets being received and transmitted on different ports
UDLD protects against unidirectional cabling problems on copper and fiber media.
Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
第9题:
A copy of the frame is forwarded out all switch ports other than the port the frame was received on.
The frame is transmitted on the native VLAN.
The switch sends a NACK segment to the frame’s source MAC address.
The frame is dropped.
第10题:
advanced integration module
FICON ports
Cisco CallManager 5.0 support
warm Cisco IOS upgrade feature
第11题:
Cisco Configuration Assistant
CiscoSmartports
Cisco Network Admission Control
Cisco Smart Assist
第12题:
Spanning tree protect
Root Guard and BPDU Guard
Unicast Reverse Path Forwarding
MAC spoof guard
Port Security
第13题:
What is the purpose of Dual Ring Interconnect with D C for SDH rings?()
第14题:
Which three statements best describe multicast operation on Cisco Nexus switches in a data center?()
第15题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第16题:
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
第17题:
What are two characteristics of dual-ring interconnect in SDH networks? ()
第18题:
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()
第19题:
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
None of the other alternatives apply
第20题:
It protects signals against node failures between rings.
It protects signals against node failure within a single ring.
It allows for traffic to be preempted when a ring switch occurs.
Traffic can be dropped and continued at interconnecting nodes.
It protects preemptible traffic from being dropped when a ring switch occurs.
第21题:
Storm Control
Port security
CAM table size definition
IP spoof prevention
Network Based Application Recognition
第22题:
a routing protocol that is flooding updates
a flapping port that is generating BPDUs with the TCN bit set
STP is not running on the switch
a user that is downloading the output of the show-tech command
a corrupted switch CAM table
第23题:
MPLS Traffic Engineering
Dynamic access-lists
Authentication
Receive ACL
Unicast RPF
第24题:
Cisco NX-OS Software does not support PIM dense mode.
The command ip multicast-routing must be enabled in Cisco NX-OS Software before any multicast configuration is possible on the switch.
PIM CLI configuration and verification commands are not available until you enable the PIM feature with the feature pim command.
Cisco NX-OS Software supports multicast routing per Layer 3 VRF instance.
The default PIM operational mode on the Cisco Nexus 7000 switch is SSM.