雏鹰部落

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
查看: 2516|回复: 3

[讨论/求助] 642-892考试变题

[复制链接]
发表于 2009-2-14 13:14:33 | 显示全部楼层 |阅读模式
刚才从www.pass4side.cn  看到642-892 在2009-2-12刚刚更新,.提醒一下要考试的同学。我看论坛战报也说变题了
下面是我从pass4side客服要过来一些新题目和大家分享一下.

1. If no metric is specified for the routes being redistributed into ISIS,
what metric value is assigned to the
routes?
A. 0
B. 1
C. 10
D. 20
Answer: A
2. What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip
bgp command output? (Choose two.)
A. The network was originated via redistribution of an interior gateway protocol into BGP.
B. The network was defined by a static route.
C. The network was originated via a network or aggregate command.
D. The network was learned via EBGP.
E. The network was learned via IBGP.
Answer: AC
3. Refer to the exhibit. Which two statements are true about the partial configuration that is provided.
(Choose two.)
A. All the configured neighbors are in autonomous system 100.
B. The peer group shortens the IBGP configuration.
C. The peer group shortens the EBGP configuration.
D. Only the outgoing filters are applied to BGP **s.
E. Three ASpath
filters are applied to each BGP neighbor.
Answer: AB
Pass 4 side

4. Refer to the exhibit. Which two statements are correct? (Choose two.)
A. All six routes will be installed in the routing table.
B. Two routes will be installed in the routing table.
C. Four routes will be installed in the routing table.
D. All the routes were redistributed into BGP ** an IGP.
E. All the routes were originated by BGP with the network command.
Answer: CD
5. Which two reductions are the correct reductions of the IPv6 address
2001:0d02:0000:0000:0014:0000:0000:0095? (Choose two.)
A. 2001:d02::14::95
B. 2001:0d02:::0014:::0095
C. 2001:0d02:::0014:0:0:0095
D. 2001:d02::14:0:0:95
E. 2001:d02:0:0:14::95
F. FF::0014:0:0:0095
Answer: DE
6. Which three IP multicast related statements are true? (Choose three.)
A. Multicast addresses 224.0.1.0 through 238.255.255.255 are called globally scoped addresses. They
are used to multicast data between organizations and across the Internet.
B. The multicast address 224.0.0.1 is a globally scoped address that has been reserved for the Network
Time Protocol (NTP) by the IANA.
C. Multicast addresses 239.0.0.0 through 239.255.255.255 are called limited scope addresses. They are
constrained to a local group or organization.
D. Multicast addresses 224.0.0.5 and 224.0.0.6 are limited scoped addresses that have been reserved for
Pass 4 side

OSPF.
E. Multicast addresses 224.0.0.0 through 224.0.0.255 are used for network protocols on local LAN
segments. Because they are always transmitted with a Time to Live (TTL) of 1, they are never forwarded
by a router.
Answer: ACE
7. Which three IP multicast address related statements are true? (Choose three.)
A. Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted
with Time to Live (TTL) greater than 1.
B. Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.
C. Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved linklocal
addresses used by PIMv2 and
IGMPv3.
D. Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1
and 238.1.1.1 could not be used together.
E. Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA.
F. The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in
purpose to RFC 1918 private unicast addresses.
Answer: CEF
8. What are two rules for compacting IPv6 addresses? (Choose two.)
A. The maximum number of times a double colon can replace a 16bit
segment that consists of all zeroes
is two.
B. The leading zeroes in any 16bit
segment do not have to be written.
C. Every 16bit
segment segment that consists of all zeroes can be represented with a single colon.
D. The trailing zeroes in any 16bit
segment do not have to be written.
E. Any single, continuous string of one or more 16bit
segments that consists of all zeroes can be
represented with a double colon.
F. Two zeroes in the **dle of any 16bit
segment do not have to be written.
Answer: BE
9. What is the difference between the IPv6 addresses ::/0 and ::/128?
A. ::/0 is the unspecified address, and ::/128 is the multicast address.
B. ::/0 is the unicast address, and ::/128 is the anycast address.
C. ::/0 is the unicast address, and ::/128 is the multicast address.
D. ::/0 is the anycast address, and ::/128 is the multicast address.
Pass 4 side

E. ::/0 is the default route, and ::/128 is the unspecified address.
F. ::/0 is the anycast address, and ::/128 is the default address.
Answer: E
10. Which three IP multicast group concepts are true? (Choose three.)
A. If a packet is sent to a multicast group address, all members of the multicast group will receive it.
B. If a packet is sent to a multicast group address, the multicast frame contains the source multicast
address.
C. A router does not have to be a member of a multicast group to receive multicast data.
D. A router does not have to be a member of a multicast group to send to the group.
E. A router must be a member of a multicast group to receive multicast data.
F. A router must be a member of a multicast group to send to the group.
Answer: ADE

[ 本帖最后由 freepass4isde 于 2009-2-14 13:30 编辑 ]
 楼主| 发表于 2009-2-14 13:20:56 | 显示全部楼层
11. Which two multicast protocol statements are true? (Choose two.)
A. Dense mode multicast requires explicit join messages ** their members.
B. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the
unwanted traffic.
C. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E. The primary use of sparse mode multicast is for test labs and router performance testing.
Answer: BC
12. Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust
cos on the switch port that is connected to the IP phone?
A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary.
C. The switch is rewriting packets it receives ** the IP phone and determining the CoS value.
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the
CoS.
Pass 4 side

Pass4side
Information Co., Ltd. All rights reserved.
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.
Answer: A
13. Which three WLAN statements are true? (Choose three.)
A. A lightweight AP receives control and configuration ** a WLAN controller to which it is associated.
B. A WLAN client that is operating in halfduplex
mode will delay all clients in that WLAN.
C. Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D. Another term for infrastructure mode is independent service set (IBSS).
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight
access point.
F. WLANs are designed to share the medium and can easily handle an increased demand of channel
contention.
Answer: ABC
14. Which statement is true about IP telephony calls?
A. A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and
Layer 2 link header.
B. The voice carrier stream uses H.323 to set up, maintain, and tear down call endpoints.
C. Call control signaling uses RealTime
Transport Protocol (RTP) packets that contain actual voice
samples.
D. The sum of bandwidth necessary for each major application, including voice, video, and data, should
not exceed 75 percent of the total available bandwidth for each link.
Answer: D
15. Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose
three.)
A. The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B. The voice VLAN feature is disabled by default.
C. The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS
priority of the port.
E. PortFast is is automatically disabled when a voice VLAN is configured.
F. The default CoS value for incoming traffic is set to 0.
Answer: BDF
Pass 4 side

Pass4side
Information Co., Ltd. All rights reserved.
16. Which statement is true about RSTP topology changes?
A. Any change in the state of the port generates a TC BPDU.
B. Only nonedge ports moving to the forwarding state generate a TC BPDU.
C. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.
D. Only nonedge ports moving to the blocking state generate a TC BPDU.
E. Any loss of connectivity generates a TC BPDU.
Answer: B
17. Refer to the exhibit. Which statement is true about where trust boundaries should be established in a
network?
A. Endpoint 1 is the only acceptable place to establish a trust boundary.
B. Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places
to establish a trust boundary.
C. Endpoint 2 is the only acceptable place to establish a trust boundary.
D. Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places
to establish a trust boundary.
E. Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place
to establish a trust boundary.
F. Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to
establish a trust boundary.
Answer: E
18. Refer to the exhibit. The command spanningtree
guard root is configured on interface Gi0/0 on both
switch S2 and S5. The global configuration command spanningtree
uplinkfast has been configured on
both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?
Pass 4 side

Pass4side
Information Co., Ltd. All rights reserved.
A. Yes. Traffic can pass either ** switch S6 to S3 to S2 to S1, or, ** switch S6 to S5 to S2 to S1.
B. No. Traffic will pass ** switch S6 to S5 and deadend
at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass ** switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass ** switch S6 to to S5 and deadend,
or traffic will pass ** switch S6 to
S3 to S2 and deadend.
Answer: D
19. Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured
through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the
installation and the icon appears in the system tray area in the lower right of the desktop. What is the
significance of the icon?
A. It indicates that the radio of the client adapter is disabled.
B. It indicates that the client adapter is not associated to an access point or another client.
C. It indicates that the client adapter is associated to an access point or another client, but the user is not
EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that the user is
authenticated if the client adapter is configured for EAP authentication, and that the signal strength is
excellent or good.
E. It indicates that the client adapter is associated to an access point or another client, that the user is
authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the user is
authenticated if the client adapter is configured for EAP authentication, and that the signal strength is
Pass 4 side

Pass4side
Information Co., Ltd. All rights
reserved.
poor.
Answer: F
20. Which description correctly describes a MAC address flooding attack?
A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the destination address found in the Layer 2 frames sent by the valid network
device.
B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the source address found in the Layer 2 frames sent by the valid network device.
C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The
switch then forwards frames destined for the valid host to the attacking device.
D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The
switch then forwards frames destined for the valid host to the attacking device.
E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space.
The result is that new entries cannot be **ed because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
F. Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The
result is that new entries cannot be **ed because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
Answer: F

[ 本帖最后由 freepass4isde 于 2009-2-14 13:29 编辑 ]
发表于 2009-2-14 13:59:08 | 显示全部楼层
不错啦,谢谢分享
发表于 2009-2-14 14:13:47 | 显示全部楼层
变了有多大啊 呵呵
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|熊猫同学技术论坛|小黑屋| 网络工程师论坛 ( 沪ICP备09076391 )

GMT+8, 2024-5-6 22:31 , Processed in 0.077661 second(s), 19 queries , Gzip On.

快速回复 返回顶部 返回列表