2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案_第1页
2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案_第2页
2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案_第3页
2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案_第4页
2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案_第5页
已阅读5页,还剩16页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

2024年软件认证工程师考试-思科认证历年考试高频考点试题附带答案(图片大小可自由调整)第1卷一.参考题库(共25题)1.Examinethefollowingoptions,Multicastingsupportsapplicationsthatcommunicate.()A、many-to-oneB、one-to-oneC、one-to-manyD、many-to-many2.What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.3.Non-contiguousnetworkscanposeaproblemfornetworkreachabilityincertaincircumstances.Whichofthefollowingroutingprotocolshavemeansofminimizingtherisk?()A、RIPv1B、RIPv2C、EIGRPD、IGRPE、OSPFF、VLSM4.默认调色板包含了CMYK颜色模型中的()种颜色A、100B、150C、99D、885.WhichofthefollowingaretrueofbothOSPFv2andOSPFv3?()A、ThemethodofchoosinganOSPFrouterIDB、VerificationchecksthatmustbevalidatedbeforetworouterscanbecomeOSPFneighborsC、SupportforroutetagsD、Supportformultipleinstancesperinterface6.On a wlan controller,what is the default roaming bandwidth percentage reserved for voice clients?()A、12 percentB、6 percentC、18 percentD、24 percent7.What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on therouterB、It specifies the login authorization method list named console-in using the local RADIUS username-password databaseC、It specifies the login authentication list named console-in using the local username- password databaseon the routerD、It specifies the login authorization method list named console-in using the local username- passworddatabase on the router8.Youareanetworkadministratorandyouneedtoimplementaroutingprotocolon yournetworkthatprovides: *Scalability *VLSMsupport *Minimaloverhead *Supportforconnectingnetworksusingroutersofmultiplevendors Whichofthefollowingroutingprotocolwouldbestserveyourneeds?()A、VTPB、RIPversion1C、EIGRPD、OSPFE、IGRPF、CDP9.Which statement best describes the benefits of Cisco Integrated Services Routers?()A、 In a single device,ISRs provide threat defense against attacks from hackers and viruses thatcan occur in the network.B、 In a single device,ISRs provide the framework to integrate and extend wired and wirelessnetworks.C、 In a single device ISRs provide concurrent security, voice, data, wireless and applicationoptimization services.D、 In a single device,ISRs provide the common fabric,functionality,and CLI across the network.10.Asanexperiencedtechnician,youarerequiredtoconfigureandverifySRMwithSSOredundancy.Insuchasituation,youhavetoissueseveralcommandsinproperorders.Whichofthefollowingiscorrect?()A、showredundancystates,redundancy,modessoB、showredundancystates,modesso,redundancyC、redundancy,modesso,showredundancystatesD、modesso,redundancy,showredundancystates11.Whichtwoprovideintra-arearoutingservices?()A、L1

ESB、L2ISC、L2ESD、L1ISE、L1/L2IS12.The following output was displayed on a switch.  Study the exhibit carefully. The administrator is verifying that a CEF FIB entry exists to destination network 192.168.150.0. Given the output generated by the "show ip cef" and "show adjacency detail" commands,  which three statements are true? ()A、The "valid cached adjacency" entry indicates that CEF will put all packets going to such an adjacency to the next best switching mode.B、The number 003071506800 is the MAC address of the source IP address.C、There is a valid CEF entry for the destination network 192.168.150.0.D、The number 003071506800 is the MAC address of the 192.168.199.3 next hop IP address.E、The counters (0 packets, 0 bytes) indicate a problem with the 192.168.199.3 next hop IP address.F、There is an adjacency for the 192.168.199.3 next hop IP address.13.Anetworkadministratorneedstoconfigureportsecurityonaswitch.whichtwostatementsaretrue?()A、ThenetworkadministratorcanapplyportsecuritytodynamicaccessportsB、Thenetworkadministratorcanconfigurestaticsecureorstickysecuremacaddressesinthevoicevlan.C、Thestickylearningfeatureallowstheadditionofdynamicallylearnedaddressestotherunningconfiguration.D、ThenetworkadministratorcanapplyportsecuritytoEtherChannels.E、Whendynamicmacaddresslearningisenabledonaninterface,theswitchcanlearnnewaddresses,uptothemaximumdefined.14.Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-insecurity mechanisms?()A、Frame RelayB、HDLCC、x.25D、PPP15.WhichthreechallengeshavebeencreatedbythemovetowardVirtualizationinthedatacenter?()A、overstaffingB、managementintegrationC、coherentpoliciesandsecurityD、scalabilityE、consolidationF、assettracking16.Whatarethecharacteristicoflinkstateroutingprotocols?()A、Theexchangeofadvertisementistriggeredbyachangeinthenetwork.B、AllroutersexchangeroutingtableswitheachotheriInamultipointnetwork.C、Packetsareroutedbasedupontheshortestpathtothedestination.D、Pathsarechosendependingonthecostefficiencyfactor.E、EveryrouterinanOSPFareaiscapableofrepresentingtheentirenetworktopology.F、OnlythedesignatedrouterinanOSPFareacanrepresenttheentirenetworktopology.17.Smart Call Home provides an email-based notification for critical system policies. A range of message formats are available for compatibility with pager services, standard email, or XML- based automated parsing applications. Destination profiles are used by Smart Call Home when sending notifications. Which of these are predefined destination profiles supported by Cisco NX- OS Software? ()A、 short-text-destinationB、 prerecorded audio alertsC、 CiscoTAC-1D、 dial911E、 full-text-destination18.WhenanIPpacketisLayer3-switchedfromasourceinoneVLANtoadestinationinanotherVLAN,whichfieldinapacketwillberewritten?()A、Layer2TTLB、Layer3TTLC、Layer3sourceaddressD、Layer3transportprotocolE、Layer3destinationaddress19.采用单模光纤的1000base-lx网段的理论最大长度为多少?()A、100米B、10公里C、200米D、500米20.When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()A、hub and spokeB、PEC、CED、hubE、spoke21.For SONET ring switching, the 50ms switch time: Select all that apply?()A、Plncludes the detection timeB、Applies to rings smaller than 1200kmC、Applies to rings smaller than 1000kmD、Includes up to 16 nodes22.In a high-availability deployment, when the Cisco CRS Administrator adds a JTAPI Call Control Group with 100 CTI ports, how many device records will be added to the Cisco Unified CallManager database?()A、CTI Ports are not added by the creation of a Call Control Group.  B、CTI ports are no longer required to be added to the Cisco Unified CallManager database.  C、100 devices will be added to the Cisco Unified CallManager database.  D、200 devices will be added to the Cisco Unified CallManager database.  E、It depends upon how many port groups these ports will be split into.  F、It depends upon the number of server nodes within the Cisco Unified CallManager cluster.23.Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions24.Whatisanadvantageofanexternallymodulatedlaseroveradirectlymodulatedlaser?()A、lowercostB、higherchirpC、easiertomanufactureD、higherdispersiontoleranceE、higheropticalsignal-to-noiseratio25.WhichoneofthefollowinganswerchoicesbelowistrueregardingtheOSPFtopologydatabase?()A、Allentriesinthetopologydatabasewillbeincludedoneachrouter.B、AllroutersinthesameOSPFareawillhaveonetopologydatabase.C、TheDijkstraalgorithmisusedinthecreationofthetopologydatabase.D、LSApacketsareusedtoupdateandmaintainthetopologydatabase.第2卷一.参考题库(共25题)1.Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pairin both directions.2.能够帮助获得强密码策略的具体方法()A、登陆尝试失败一定次数后禁用账号B、设置密码有效期C、不使用明文密码D、使用强密码3.Which statement about CiscoWorks 2000 Inventory Manager is true?()A、 It uses SNMP v1.B、 It scans devices for hardware information.C、 It scans and records the operational status of devices.D、 When the configuration of a device changes, the inventory is automatically updated.4.下列关于在接入点上启用开放式身份验证的陈述,哪一项是正确的?()A、不需要身份验证B、使用64位加密算法C、需要使用身份验证服务器D、需要共同商定的密码5.The Company network is displayed in the following topology exhibit: Workstation 1 traffic is set for cos 5 and the switch CompanyA sends workstation 1 traffic to the  switch CompanyB. However, not all of the traffic from Switch CompanyA is from workstation 1.  Switch CompanyA configurations Switch CompanyB Configuration:   mlsqos mls qos   interfacefa0/1 interface fa0/1   switchportmode trunk switchport trunk mode   switchporttrunk encapsulation dot 1q switchport trunk encapsulation dot 1q   switchporttrunk native vlan 1 switchport trunk native vlan 1   Frames from Workstation 1 are given the rightful priority through Switch CompanyA, but Switch CompanyB doesn’t reciprocate, and treats Workstation 1 frames as if they have no precedence. Which of the following actions will prioritize traffic from Workstation 1?()A、 Configure qos all command under Switch CompanyB fa0/1 interface.B、 Configure mls qos trust cos command under Switch CompanyB fa0/1 interface.C、 Configure mls qos trust cos 5 command under Switch CompanyB fa0/1 interface.D、 Configure qos cos 5 command under Switch CompanyB fa0/1 interface.E、 Configure mls qos trust cos command under Switch CompanyA fa0/1 interface.F、 Configure qos cos 5 command under Switch CompanyA fa0/1 interface.6.AnetworkadministratorisconfiguringACLsonaciscorouter,toallowafficfromhostsonnetworks192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0only.WhichtwoACLstatementswhencombinedarethebestforaccomplishingthetask?()A、access-list10permitip192.168.147.00.0.0.255.255B、access-list10permitip192.168.149.00.0.0.255.255C、access-list10permitip192.168.146.00.0.0.0.255D、access-list10permitip192.168.146.00.0.1.255E、access-list10permitip192.168.148.00.0.1.255F、access-list10permitip192.168.146.0255.255.255.07.what’s IOS command , you can see the output as below : 8.he Clinton Howe Weights and Measures Company wants to send CDRs to a syslog server. Which two options are required?()A、The CDR collection must be enabled from the CLI. B、The syslog server IP address must be configured using the logging command. C、The CDRs must be sent to the syslog server using the gw-accounting syslog command. D、The logging file must be initialized using the logging buffered command.9.You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()A、Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memoryB、If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that applicationC、Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port numberD、The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applicationsE、Use the copy nbar flash: command to download a new PDLM file to flashF、Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website10.Whattwostatisticsappearinshowframe-relaymapoutput?()A、ThenumberofFECNpacketsthatarereceivedbytherouterB、ThenumberofBECNpacketsthatarereceivedbytherouter.C、TheipaddressofthelocalrouterD、ThevalueofthelocalDLCIE、ThestatusofthePVCthatisconfiguredontherouter11.在OSPF路由协议的网络中,OSPF定义了多种网络类型,下面那种网络类型需要选举DR和BDR?()A、Point-to-pointB、Nonbroadcast(NBMA)C、Point-to-multipointD、Point-to-multipoint nonbroadcast12.What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost13.在rip中metric等于()为不可达。A、8B、9C、10D、15E、1614.AworkgroupswitchisconfiguredwithallportsassignedtoVLAN2.Inaddition,allportsareconfiguredasfull-duplexFastEthernet.WhatistheeffectofaddingswitchportstoanewVLANonthisswitch?()A、Theadditionswillcreatemorecollisiondomains.B、IPaddressutilizationwillbemoreefficient.C、Morebandwidthwillberequiredthanwasneededpreviously.D、Anadditionalbroadcastdomainwillbecreated.E、Thepossibilitythatswitchingloopswilloccurwillincreasedramatically.15.Cisco ASDM provides 16 different graphs the help identify security risks by displaying data aboutpotentially malicious activity. What is one kind of data these graphs show? ()A、 stateful packet statisticsB、 real-time analysis & dropped packetsC、 ACL statement matchesD、 portmap requests16.What are two characteristics of Telnet? (Choose two.)()A、It sends data in clear text format.B、It is no longer supported on Cisco network devices.C、It is more secure than SSHD、It requires an enterprise license in order to be implemented.E、It requires that the destination device be configured to support Telnet connections.17.A branch router is configured with an egress QoS policy that was designed for a total number of 10concurrent VOIP calls.Due to expansion, 15 VOIP calls are now running over the link, but after the 14th call was established, allcalls were affected and the voice quality was dramatically degraded.Assuming that there is enough bandwidth on the link for all of this traffic, which part of the QoSconfiguration should be updated due to the new traffic profile?()A、Increase the shaping rate for the priority queue.B、Remove the policer applied on the priority queue.C、Remove the shaper applied on the priority queue.D、Increase the policing rate for the priority queue.18.WhichtwostatesaretheportstateswhenRSTPhasconverged?()A、blockingB、learningC、disabledD、forwardingE、listening19.A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn newaddresses,upto the maximum defined.20.Which statement about multicast VPN is true?()A、The MDT group address should be the same for both address families in the same VRFB、The MDT group address should be the same for both address families in the different VRFsC、Configuration of the MDT source on a pre-VRF basis is supported only on IPv6D、The MDT group address should be different for both address families in the same VRF21.WhichISDNdeviceconvertsthefour-wireBRIsignalsfromanS/Tinterfaceintotwo-wiresignalsofaUinterface?()A、TE1B、NT-2C、TAD、TE2E、NT-122.WhataretwoCiscoIOScommandsthatcanbeusedtoviewneighboradjacencies?()A、showipospfinterfacesB、showipospfprotocolsC、showipospfneighborsD、showipospfdatabase23.Whichthreestatementsaccuratelydescribelayer2Ethernetswitches?()A、Microsegmentationdecreasesthenumberofcollisionsonthenetwork.B、ifaswitchreceivesaframeforanunkowndestination,itusesARPtoresolvetheaddress.C、SpanningTreeProtocolallowsswitchestoautomaticallysharevlaninformation.D、Inaproperlyfunctioningnetworkwithredundantswitchedpaths,eachswitchedaegmentwillcontainonerootbridgewithallitsportsintheforwardingstate.Allotherswitchesinthatbroadcastdomainwillhaveonlyonerootport.E、Establishingvlansincreasesthenumberofbroadcastdomains.F、Switchesthatareconfiguredwithvlansmakeforwardingdecisionsbasedonbothlayer2andlayer3addressinformation.24.Based on the username global configuration mode command displayed in the exhibit. What does the optionsecret 5 indicate about the enable secret password?() A、It is hashed using MD5B、It is encrypted using a proprietary Cisco encryption algorithmC、It is hashed using SHAD、It is encrypted using DH group 525.计算机网络系统主要由()、操作系统和应用系统构成。第3卷一.参考题库(共25题)1.What does the command "IP ARP synchronize" do in a vPC configuration?()A、 Synchronizes ARP entries between vPC peers every five minutesB、 Triggers a manual update of ARP entries from the primary peer to the secondaryC、 Enables a bulk loading of ARP entries when a vPC peer is restoredD、 Uses the peer-keepalive link to maintain ARP table consistency2.Arouterreceivesinformationaboutnetwork192.168.10.0/24frommultiplesources.Whatwilltherouterconsiderthemostreliableinformationaboutthepathtothatnetwork?()A、anOSPFupdatefornetwork192.168.0.0/16B、astaticroutertonetwork192.168.10.0/24B.astaticroutertonetwork192.168.10.0/24withalocalserialinterfaceconfiguredasthenexthopC、aRIPupdatefornetwork192.168.10.0/24D、adirectlyconnectedinterfacewithanaddressof192.168.10.254/24E、adefaultroutewithanexthopaddressof192.168.10.13.哪个两个命令正确验证是否端口快速以太网0/12端口安全性已配置的交换机?()A、 SW1#show swithport port-security interface FastEthernet 0/12B、 SW1# show swithport port-secure interface FastEthernet 0/12C、 SW1# show port-secure interface FastEthernet 0/12D、 SW1#show running-configE、 SW1#show port-security interface FastEthernet 0/124.HowmanysimultaneousTelnetsessionsdoesaCiscoroutersupportbydefault?()A、1B、2C、3D、4E、5F、65.WhichtwoofthefollowingCiscorouterplatformssupportMulticastDistributedFastSwitching?()A、3600seriesB、7200serieswithNSE-1C、7500seriesD、12000series6.WhichoneoftheWANdata-linkprotocolsbelowisusedforout-of-bandsignaling?()A、HDLCB、NCPC、PAPD、LAPDE、LAPBF、Noneoftheabove7.To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voicenetwork?()A、 50B、 100C、 150D、 200E、 2508.Which statement correctly describes the Cisco implementation of RSTP? ()A、PortFast, UplinkFast, and BackboneFast specific configurations are ignored in Rapid PVST mode.B、RSTP is enabled globally and uses existing STP configuration.C、Root and alternative ports transition immediately to the forwarding state.D、Convergence is improved by using sub-second timers for the blocking, listening, learning, and forwarding port states.9.How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if theinterface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-inputcommands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on allinterfaces,then,when telnetting into the router perform a debug IP packet detail10.In a Cisco SDN, every element in the network acts as a point of defense. Which two best describethe features of Cisco SDN? ()A、 enables automated threat responseB、 enables noncompliant device accessC、 enables endpoint posture enforcementD、 enables third-party client and server protocols11.Refer to the exhibit. Routers A and B are directly connected and running EIGRP, but they are unable to form a neighbor relationship. What is the most likely cause? () A、 The network statements are misconfigured.B、 The IP address statements are misconfigured.C、 The autonomous system is misconfigured.D、 There is a physical issue with the cable.12.You have just successfully added a JTAPI trigger in CRS Administration. Which two items are automatically configured on your CallManager?()A、CTI dialogue control port B、CTI Route Point C、dialogue group D、Call Control Group E、CTI Route Port F、CTI Route Point association with JTAPI User13.IEEE802.5标准是指()。A、以太网B、令牌总线网C、令牌环网D、FDDI网14.Smallbusinessesfaceuniquecustomerchallenges,whichthreechallengesaresmallbusinesseslookingtoovercome?()A、technicalstaffingB、datacenterdeploymentsC、employeetrainingD、costcontainmentE、operationalefficiencyF、customerresponsiveness15.WhichtermrepresentsthemodethatisusedwhentherouterstoreslogmessagesinRAMmemory?()A、syslogloggingB、terminalloggingC、bufferedloggingD、consolelogging16.Which two benefits of network integration would be critical to a large metropolitan hospital?()A、 computerization of order entry for physiciansB、 compliance with HIPPA requirementsC、 improved bandwidthD、 greater fault tolerance17.Refer to the exhibit. What enterprise IP telephony deployment model is represented?() A、core distribution accessB、multisite with centralized call processingC、multisite with distributed call processingD、clustering over WANE、PSTN-WANF、Enterprise Composite Model18.流控的三种方式是()、()、()。19.Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces?()A、IP precedence bitsB、DSCP bitsC、original port numbersD、DE bitsE、source IP addressF、destination IP address20.WhentroubleshootingaFrameRelayconnection,whatisthefirststepwhenperformingaloopbacktest?()A、SettheencapsulationoftheinterfacetoHDLCB、PlacetheCSU/DSUinlocal-loopmodeC、Enablelocal-loopmodeontheDCEFrameRelayrouterD、VerifythattheencapsulationissettoFrameRelay21.Whichthreebestpracticesshouldbeimplementedatthecampusbackbonesubmoduletosupporttheserverfarmmodule?()A、Implementhighlyredundantswitchingandlinkswithnosinglepointsorpathso

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论