CCDP 642-892 考试题库由我们的资深IT认证讲师及产品专家精心打造,包括了当前最新的全套全真642-892考试试题,全部附有正确答案。所有购买 killtest 认证考题的客户都将得到60天的免费升级服务,保证了对Composite Exam考试题库的完整覆盖。 killtest 助你一次通过 Composite Exam 认证考试,一次不过全额退款!3 E; ]$ q. k/ z+ ^5 y) ~1 h7 i
1. Refer to the exhibit. EIGRP is configured on all routers in the network. On the basis of the output provided, which statement is true?) B6 A6 B5 ^; {! O! y/ u
. n) q& d i4 V- ^+ DA. Because the key chain names do not match, router R1 will not be able to ping routers R2 and R3 .
. i; H) h/ V. u7 k8 @+ T$ AB. Because the key strings do not match, router R1 will not be able to ping routers R2 and R3.
2 d ^: \* E$ P" Z V& g( h( jC. Because authentication is misconfigured on interfaces Gi0/0 and Gi0/1 on router R2, router R1 will not be able to ping routers R2 and R3.* T+ b1 e4 K& K, H" [* `* c
D. Because autosummarization needs to be turned on for EIGRP on all routers, router R1 will not be able to ping routers R2 and R3. k/ p. A. @; t f% p
E. Router R1 will be able to ping routers R2 and R3.
# |$ [/ j; u( ^" G/ cAnswer: E 2. The switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows:
. i b# k4 W$ _: a7 ~" ^" oRouter Ethernet port - 1st usable address2 h- {* q9 c- R A' [! m
Core - 2nd usable address
# X J% C* N" Y9 w O6 J- }. ~( N. i! UCore2 - 3rd usable address5 I" Z: Q8 E1 z. @* U% ]
For this network, which of the following commands must be configured on Core2 to$ ~6 Q* |% k2 `1 \9 h; E& b
allow it to be managed remotely from any subnet on the network? (Choose three.)
* k) J! K- ~( j9 w & r2 b5 S4 b) ?& ~; y& O) g" o& w6 B/ F
A. Core2(config)# interface f0/04 O" w5 a4 Q3 O% c; C3 a5 R
Core2(config-if)# ip address 192.168.1.10 255.255.255.248. z: {! w2 q: Y/ O- ]/ u0 T6 ^ a- R
B. Core2(config)# interface vlan 1: a2 r% f4 `( i
Core2(config-if)# ip address 192.168.1.11 255.255.255.248
! P1 h7 P& Q. w* [5 D, sC. Core2(config)# line con 0# C3 f* _! F1 ]# w
Core2(config-line)# password cisco
$ F7 k* Q6 M' E; T; L/ \. MD. Core2(config)# line vty 0 4
0 v) ~: H' W9 G" z Core2(config-line)# password cisco4 y% S; l: x2 W `' d: Y
E. Core2(config)# ip default-gateway 192.168.1.9
; R3 [0 z8 }3 |' |" K% \F. Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.82 K. Q. S, [- a; a3 q; M2 k
Answer: BDE 3. Which statement is true about IPv6?8 @: b2 W% x$ `* Q/ K
A. Only one IPv6 address is assigned per node.
- S' w3 ]% A/ Y1 L2 V; [1 YB. Only one IPv6 address can be assigned to each interface.' P" x4 h/ H: Y
C. Each host can autoconfigure its address without the aid of a DHCP server. W( y, s4 @* U. G2 S3 Y H
D. IPv6 hosts use anycast addresses to assign IP addresses to interfaces.
! x" M6 [, D8 r6 n4 z, U+ xAnswer: C 4. Which two features or capabilities are valid options for both an Autonomous and a Lightweight WLAN solution? (Choose two)8 u" q# _* X& U/ z0 m+ I& T9 O
A. use of a Cisco Wireless Location Appliance for location tracking
0 t# y0 H. {4 _B. use of Cisco Secure Access Control Server (ACS) for security! |6 w/ @$ `4 B! B1 x# H
C. Cisco Wireless Control System (WCS) for management
$ E; b; U3 ]. Q5 W% g j" o0 ]$ eD. PoE capability) f" V U1 K' w2 G; h4 ]/ m) v
Answer: BD 5. Which three statements are true about EIGRP route summarization? (Choose three.)! y( {6 O! w8 z* q9 [. w: s4 N
A. Manual route summarization is configured in router configuration mode when the router is configured for EIGRP routing.
/ f, ^. B% `$ M) _& OB. Manual route summarization is configured on the interface.
/ W+ Q' G- ], q- K1 nC. When manual summarization is configured, the summary route will use the metric of the largest specific metric of the summary routes.
2 a4 @% F/ @1 F5 h9 c. G! E; K; LD. The ip summary-address eigrp command generates a default route with an administrative distance of 90.$ s; f: ?& J! A2 w" L. T- U4 [# {
E. The ip summary-address eigrp command generates a default route with an administrative distance of 5.
# f( H; J" S/ C8 Z) IF. When manual summarization is configured, the router immediately creates a route that points to null0 interface.6 T5 f) I6 [/ [' V
Answer: BEF 5. Which two statements about the IS-IS routing protocol are true? (Choose two.)
6 b& m' B7 |2 m+ vA. IS-IS is capable of supporting IPv4 and IPv6.; I6 N. A6 ~) d* G( u
B. IS-IS is only capable of supporting IPv4 and CLNS.
, ]$ J: V/ z, ^" JC. IS-IS routers use ES-IS hellos (ESH) to establish and to maintain neighbor relationships.
2 c( }9 ]/ Y1 _# a6 y8 R; D! yD. IS-IS routers run the Bellman-Ford algorithm against their LSDBs to pick the best paths.
5 |4 S, r: [: m& JE. Level 1 routers learn about paths within the area of which they are a part.
. K3 k! C" k/ z; F9 T- OF. Level 2 routers learn about paths both within areas and between areas.9 B/ o/ X! e1 D0 f5 c
Answer: AE 6. Which statement is true about Layer 2 security threats?7 K" \* b W [% l: c) G
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points. E' S5 |1 Y% `6 p7 n9 t
B. DHCP snooping sends unauthorized replies to DHCP queries.
4 m6 G$ _ ?! j1 S, V# {C. ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.# B9 ^4 m. \5 ^! S
D. Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
7 N7 b8 l1 e/ R0 `- |3 TE. MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
& X8 `% h( E0 w/ }+ z% cF. Port scanners are the most effective defense against dynamic ARP inspection.
* k3 J0 `/ l ?- j1 _Answer: E 7. Refer to the exhibit. A network administrator has configured DHCP services on the router as shown. DHCP clients connected to the FastEthernet0/0 interface are working properly. DHCP clients connected to the FastEthernet0/1 interface are not receiving addresses. Which two statements contain recommendations that will solve the problem? (Choose two.)' k7 L' z) [6 ?3 ]9 Y
5 C W% _1 P QA. The ip helper-address 10.0.0.1 command should be issued so that the address can be added to the FastEthernet0/0 configuration. }+ ^0 p$ M( D7 J+ L$ x
B. The ip helper-address 10.0.0.1 command should be issued so that the address can be added to the FastEthernet0/1 configuration.
$ I1 f, ~3 P! `6 v5 n, U- BC. A second DHCP pool for network 10.10.0.0/24 should be configured. [: {3 S! V, i2 W- \
D. The network shown in the output under the ip dhcp pool Central command should be changed to network 10.10.0.0 with a mask of 255.255.255.0.
( n- t0 r( L% y! |( C+ e& LE. An ip dhcp excluded-address global configuration command for network 10.10.0.0/24 should be issued.
- \% Y! N* H1 h8 X fAnswer: CE 8. Which two statements about WLAN components are true? (Choose two.)5 F: o' ?2 }3 O! b+ h
A. Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.7 W( H, I* t) ^: F/ W9 I
B. Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network. - O4 h" m/ R2 E+ e+ F
C. In the autonomous access point solution, control is provided by the Wireless Domain Services (WDS).$ @% H: Z' q8 M; a# [5 P
D. In the autonomous access point solution, control is provided by the WLAN controller.
( A/ a( g4 C; y7 f' ^E. In the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).# f% e: z7 X7 w0 c1 m4 k, d
F. In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).; U% o! \+ h- ?" I7 }7 X9 V- u
Answer: CF 9. Which command will display EIGRP packets sent and received, as well as statistics on hello packets, updates, queries, replies, and acknowledgments?* J- d; V u" R5 J7 a
A. debug eigrp packets
?! V$ k. [# _4 vB. show ip eigrp traffic
2 j9 ]3 ]( c' \& wC. debug ip eigrp
' d' \& n$ Z6 }& V3 g# `9 ID. show ip eigrp interfaces, ]6 w( P- a8 [" f% J
Answer: B 10. Which three statements are true about implementing Cisco wireless LANs? (Choose three.)% g$ n! O, c0 V: V6 `
A. LWAPP allows encrypted communication between lightweight access points and WLAN controllers. 5 w3 S2 \% J, [
B. The WLAN Solution Engine (WLSE) is used to control lightweight access points. ! o) l) e0 j a4 D2 j, \# N
C. Power over Ethernet (PoE) is only available when a WLAN controller is integrated into the network.( p) F9 G# Q4 W6 D7 K) p
D. One of the advantages of the lightweight WLAN solution is that the devices act independently.
- F7 @8 u3 T: Y- [- eE. Antenna power is a relative value reference to dBi.+ c# k2 z6 J- _' T( F2 k% q+ j% d
F. Characteristics of antennas are directionality, gain, and polarization./ A, o( b/ J+ d% j3 |
Answer: |