APC渠道伙伴在线技术培训 答案 CN-Test for ISXD
- 格式:pdf
- 大小:112.63 KB
- 文档页数:1
100【题目】70Diameter信令网的寻址方式有()【正确答案】C D【A】A. PC【B】B. IP address【C】C. Relay【D】D. Proxy【题目】71关于智能天线的安装,下列说法正确的是()【正确答案】C D【A】A. 智能天线工作需要外接直流电源。
【B】B. 智能天线的外壳需要做防雷接地。
【C】C. 智能天线的馈线如果弯折半径过大,会影响驻波比。
【D】D. 安装智能天线时,安装人员必须佩戴高空作业防护用具。
【题目】71一个PDN Connection 由哪些参数来确定()【正确答案】A D【A】A. UE【B】B. MME【C】C. EPG【D】D. PDN APN【题目】71LTE DUL 21系列产品RI口的传输能力有()【正确答案】A D【A】A. 2.5Gbps【B】B. 5Gbps【C】C. 7.5Gbps【D】D. 10Gbps【题目】71SAPC 可以关联()【正确答案】A B C【A】A. 策略和服务【B】B. 策略和用户或用户组【C】C. 用户相关的服务;【D】D. 用户相关的位置【题目】71下列哪些项是属于PDC()【正确答案】A B C【A】A. PDC collection【B】B. PDC Parsing【C】C. PDC Pakaging【D】D. PDC Compression【题目】71下列哪些信息不会出现在PDP关联的追踪里面()【正确答案】B C D【A】A. Internal state-machine transitions【B】B. Radius server configuration【C】C. UE type【D】D. Charging info【题目】71以下哪些是OMC的产品特点()【正确答案】A B C D【A】A. OMC可集中管理EPC和eNode B,监控全网运行情况。
【B】B. 通过web方式,OMC客户端在登录时自动完成安装和升级。
1.从2007年6月份推向市场,智能管理中心(iMC)致力于解决用户上层的业务需求,目前已经形成了非常具有特色的三大解决方案中心,它们是(ACD)A. 安全控制中心B. 基础管理中心C. 性能优化中心D. 运营管理中心2.EAD解决方案的中文全称是( A )A. 终端准入控制B. 端点准入控制C. 网络准入防御D. 端点准入防御3.EAD解决方案能帮用户解决哪些问题(ABCDE )A. 病毒爆发导致的网络瘫痪B. 移动终端与非法接入C. 安全防护软件管理失效D. 用户网络滥用E. 桌面资产集中管理4.EAD无客户端是通过那种方式内嵌在网页中的(B )A. Java AppletB. ActiveXC. Web Portal5.EAD防ARP攻击有哪些做法(ABC )A. EAD策略服务器上绑定网关的MACB. iNode搜集客户端MAC上报给EAD策略服务器C. 客户端对ARP报文过滤6.EAD在外设控制方面,可以管理哪些外设(ABCDEFG )A. USB存储/USB外设B. 光驱C. 软驱D. 红外E. 蓝牙F. 1394口G. Modem7.EAD桌面资产管理的功能包括:(ABCD )A. 资产登记B. 资产分组C. 资产统计D. 软硬件资产变更统计8.08年EAD在高可靠性上改进很多,截止目前EAD的高可靠性方案有:(ABC)A. 双机冷备(两台服务器,两个IP,每天定时备份,切换时有数据丢失)B. 双机热备(两台服务器,一台共享存储,共用一个虚拟IP,实时备份,切换时无数据丢失)C. 逃生(一旦主服务器宕机,将切换到逃生PC上进行认证,此时所有认证请求都会通过,且不用再检查客户端的安全状态)9.下列哪些是H3C EAD的典型客户(ABCD)A. H3CB. 太原钢铁C. 新华社D. 民生银行10.iMC UBAS特色有(ABCD)A. 全面的日志采集B. 基于用户而不是IP的审计C. 提供专业报表,让管理者高枕无忧D. 解决海量日志存储问题E. 有效解决NAT地址穿越问题11.iMC智能分析报表iAR解决方案可以分为两部分:(AC)A. 预定义报表(平台和各业务组件如无线、UBAS等)B. 周期性报表C. 自定义报表12.在广域网环境,(QoS管理)是路由器的好帮手;同时,(NTA)能与其进行完美配合。
1+X网络培训第一次测试试题及答案本张试卷共100道单选题,每道题1分,共100分。
您的姓名: [填空题] *_________________________________1. Linux至少定义了 7 个“运行级”,其中运行级()代表单用户模式。 [单选题] *A.0B.6C.2D.1(正确答案)2.下列哪项是符合密码复杂性要求()。
[单选题] *A.Acd@132(正确答案)B.Abc@123C.123456D.a@1233.默认密码最长使用时间是() [单选题] *A.30天B.42天(正确答案)C.35天D.48天4.密码必须符合复杂性要求密码至少() [单选题] *A.3位B.5位C.6位(正确答案)D.9位5.Windows系统在默认的情况下已经防火墙已经() [单选题] *A.关闭B.开启(正确答案)C.禁用D.还没安装6.下列哪种方式可以以批处理的方式创建组织单元和其他的活动目录对象()。[单选题] *A.ActiveDirectory 用户和计算机B.活动目录服务工具C.轻型目录访问协议互换格式目录交换(正确答案)D.Windows 脚本主机7.在 DNS 中定义了不同类型的记录,但常用的不到 10 种,IPv6 又增加了几种。试问下列哪条记录属于 IPv6 的() [单选题] *A.SOAB.NSC.AD.AAAA(正确答案)8.通常 Linux 支持的网卡类型不包括:()。 [单选题] *A.令牌网卡B.以太网卡C.PCMCIAD.PS/2(正确答案)9.Windows系统默认情况防火墙状态是启用的,并且入站连接默认是阻止,出站连接是允许() [单选题] *A.允许B.连接C.断开D.阻止(正确答案)10.MBR分区中每块磁盘最多被划分为()个分区。
[单选题] *A.4(正确答案)B.8C.64D.12811.在Linux中如何用命令查找一个二进制命令 xcmd 的路径?() [单选题] * A.apropos xcmdB.which xcmd(正确答案)C.where xcmdD.find xcmd12.下面哪一条命令用来装载所有在 /etc/fstab 中定义的文件系统?() [单选题] * A.amountB.mount -a(正确答案)C.fmountD.mount –f13.在linux中,如何标识接在ide0上的slave硬盘的第2个逻辑分区?() [单选题] *A./dev/hdb2B./dev/hd1b2C./dev/hdb6(正确答案)D./dev/hd1b614.在应用程序起动时,如何设置进程的优先级?() [单选题] *A.priorityB.nice(正确答案)C.reniceD.setpri15.下面哪条命令可以把f1.txt复制为f2.txt? () [单选题] *A.cp f1.txt | f2.txtB.cat f1.txt | f2.txtC.cat f1.txt > f2.txt(正确答案)D.copy f1.txt | f2.Txt16.在Users组中的成员不能执行一些任务() [单选题] *A.运行程序B.使用本地网络C.锁定服务器D.关闭系统(正确答案)17.显示一个文件最后几行的命令是:() [单选题] *A.tacB.tail(正确答案)C.rearD.last18.如何快速切换到登录用户的主目录下? () [单选题] *A.cd(正确答案)B.cd #homeC.cd /homeD.cd ~home19.如何装载(mount),在 /etc/fstab 文件中定义的所有文件系统? () [单选题] * A.mount -a(正确答案)B.mount /mnt/*C.mountD.cat /etc/fstab | mount20.如果使用ln命令生成了一个指向文件old的符号链接new,如果你将文件old删除,是否还能够访问new文件中的数据? () [单选题] *A.不可能再访问(正确答案)B.仍然可以访问C.能否访问取决于new的所有者D.能否访问取决于old的权限21.如何在文件中查找显示所有以“ *”开头的行? () [单选题] *A.grep \* file(正确答案)B.wc -l *C.grep -n * fileD.find \* file22.在ps命令什么参数是用来显示所有用户的进程的? () [单选题] *A.a(正确答案)B.bC.uD.x23.在一行结束位置加上什么符号,表示未结束,下一行继续? () [单选题] * A./B.\(正确答案)C.;D.|24.在大多数linux发行版本中,图形方式的运行级定义为? () [单选题] * A.1B.2C.3D.5(正确答案)25.如何删除一个非空子目录/tmp? () [单选题] *A.del /tmp/*B.rm -rf /tmp(正确答案)C.rm -ra /tmp/*D.rm -rf /tmp/*26.对所有用户的变量设置,应当放在哪个文件下? () [单选题] *A./etc/bashrcB./etc/profile(正确答案)C.~/.bash_profileD./etc/skel/.Bashrc27.下面哪种写法表示如果cmd1成功执行,则执行cmd2命令? () [单选题] * A.cmd1&&cmd2(正确答案)B.cmd1|cmd2C.cmd1;cmd2D.cmd1||cmd228.命令 kill 9 的含义是: () [单选题] *A.结束pid是9的进程(正确答案)B.杀死所有uid为9的用户进程C.发送kill信号给pid是9的进程D.发送term型号给pid是9的进程29.在vi中退出不保存的命令是? () [单选题] *A.:qB.:wC.:wqD.:q!(正确答案)30.光盘所使用的文件系统类型是() [单选题] *A.vfatB.ext4C.swapD.iso9660(正确答案)31.()目录存放的是Linux系统管理的配置文件。
IPC培训考核试题姓名:分数:一、填空题(30分,每空5分)。
1、IPC是美国印刷电路协会的英文简称。
2、IPC标准中的产品分级主要分为三级:一级普通类电子产品、二级专用服务类电子产品、三级高性能电子产品 ,要求分为四类N对该级产品尚未建立要求A 可接受P制程警示D 缺陷。
3、目前使用的最新版本为2010年4月发布,目前的版本为IPC-A-610-E。
4、焊接起始面是指印制电路板用于焊接的那一面。
通是印制电路板进行波峰焊、浸焊或拖焊的辅面。
焊接终止面是指通孔插装中印制电路板焊锡流向的那一面。
通常是印制电路板进行波峰焊、浸焊或拖焊的主面。
5、IPC标准对焊接透锡量可接受的焊料填充至少大于75% ,竖直引脚的焊接面必须被焊锡覆盖至少75% 。
6、EOS含义电气过载、ESD含义静电释放,未防止静电危害,员工作业需佩戴防静电腕带。
ESDS元器件就是容易受此类高能放电影响的元器件如贴片元器件CMOS管。
二、选择题(20分,每题5分)1.下列那种焊接湿润角度最适宜焊接?(A )2、主面是指哪个面?(A)A、总设计图上规定的封装互连结构(印制电路板)面。
通常为最复杂、元器件最多的一面。
B、与辅面相对,同时在通孔插装技术中有时称作“焊接面”(SS)或“焊接起始面”3、以下哪个因素不符合焊接可接受性要求(D)A、焊点表层总体呈现光滑和与焊接部件有良好润湿。
B、引脚的轮廓容易分辨。
C、焊接部件的焊点有顺畅连接的边缘。
D、表层形状呈凸面状。
4、在部品承认中按照要求,除目标条件外,最严格的接受条件等级为(C)A、可接受- 1级B、可接受- 2级C、可接受- 3级D、可接受- 4级二、简答题。
(50分,1、2题各15分,3题20分)1、焊接不润湿的定义?答:熔融的焊料不能与金属基材(母材)形成金属键合。
本标准中金属基材亦包括表面涂层。
2、助焊剂清洁度要求?答:助焊剂残留在非公共焊盘、元器件引线或导体上,或其周围,或跨接在它们之间。
移动云中级方案经理认证培训习题1. 中国移动发布的“5G+AICDE”计划中,E是指()。
[单选题] *A、云计算B、人工智能C、边缘计算(正确答案)D、大数据2. 2022年移动云业务目标是()。
[单选题] *A、300亿B、358亿C、368亿D、388亿(正确答案)3. 以下哪种类型的移动云云主机产品最适用于视频解码、深度学习的场景()。
[单选题] *A、通用型B、本地存储型C、高IO型D、GPU型(正确答案)4. 关于云硬盘,以下说法错误的是()。
[单选题] *A、数据持久性高达9个9B、单盘最大支持32770GC、支持在线挂载/卸载D、单个用户拥有的云硬盘数量无上限(正确答案)5. 对象存储支持的访问方式,不包含有以下哪些()。
[单选题] *A、S3接口B、Swift接口C、管理控制台D、目录访问(正确答案)6. 客户若想将两个VPC网络互联,或将VPC与本地数据中心打通,组建混合云,可选用产品是()。
[单选题] *A、SSL VPNB、IPsec VPN(正确答案)C、NAT网关D、共享带宽7. 以下哪项不是数据加密产品特性()。
[单选题] *A、支持多种加密算法B、安全合规C、权责分离D、审计归档(正确答案)8. 移动云MySQL属于()层产品。
[单选题] *A、IaaSB、PaaS(正确答案)C、SaaSD、DaaS9. 移动云RocketMQ 支持如下哪个功能()。
[单选题] *A、定时消息(正确答案)B、流量管控C、权限管理D、重启集群10. 是一个刚建立的汽车资讯车友交流网站。
主站用Php搭建,有10GB的图片素材,部分JS文件。
目前购买一台ECS放置所有程序代码,并在ECS 上安装MySQL数据库。
随着用户访问量的不断增长,访问网站的速度越来越慢,图片加载慢,网站响应慢。
用户上传的图片每周增长50GB。
以下哪种产品组合方案可以同时解决大量图片存储和快速访问两个问题()。
1、单项选择题联想高性能计算解决方案为开发者提供的工具是什么?()A.LCOMS作业调度B.LCOMS并行应用分析C.LCOMS机群监控D.LCOMS运维报告2、单项选择题 ThinkPad硬盘的五重保护不包括以下哪项().A.减震双导轨B.硬盘金属保护罩C.减震防滑垫D.硬盘减震器E.防滚架3、多项选择题虚拟化前后的明显区别是下列哪些().A:虚拟化前所有应用分别跑在一台服务器上B:虚拟化后所有应用跑在多台服务器上C:虚拟化前所有应用分别跑在多台服务器上D:虚拟化后所有应用跑在同一台服务器上4、多项选择题 Z380/480/580是新一代影音娱乐本,各种暴强功能组合,主要体现在?()A.NVIDIA高性能娱乐显卡B.第四代杜比环绕立体音效认证,更完美音质C.C面最上方一整条的超大喇叭,内置专业高保真音响,带来更震撼音量D.100万高清画质摄像头,支持720P高清,更清晰网络视频聊天E.B&C面交接处隐藏的影音快捷触控键区,更便捷操控F.HDMI输出支持高清影院5、多项选择题单机系统容易遇到的灾难来源包括.()A.电力故障B.灾害或灾难发生C.操作系统故障D.硬件故障E.网络瘫痪F.软件故障G.人为操作失误6、判断题 LIM有流程管理功能.7、单项选择题在Gartner公司的魔力象限中,那个公司被认为是行业的领导者()A.RedhatB.MicrosoftC.CitrixD.VMware8、多项选择题关于备份技术描述正确的是?()A、备份服务器是用来管理备份的B、通常需要备份的数据越多,备份窗口越长C、备份窗口是指一个IE界面,通过界面进行备份D、磁带是最好的备份介质9、多项选择题关于iSCSI描述正确的是()A.一种新的存储B.一种廉价高效的数据传输协议C.跨过IP网络来传输SCSI数据块的方法D.一种基于以太网的新的数据传输方式10、单项选择题 ThinkServer两路机架服务器,哪款更适合做中小客户的门户网站、网络接入应用(如DNS、DHCP)服务器?()A:RD530B:RD430C:RD630D:RD33011、单项选择题 T系列的前身是哪款产品().A.ThinkPad560B.ThinkPad570C.ThinkPad770D.ThinkPad60012、单项选择题 TS140的噪音测试结果是?()A.40db(普通谈话场所)B.32db(安静的办公环境)C.20db(人耳不可辨识)D.B.26db(轻声絮语)13、单项选择题以下哪种磁盘是最低的容量成本().A:SSD闪存磁盘B:15000转SAS磁盘C:NLSAS/SATA磁盘D:FC接口磁盘14、多项选择题在营业厅的典型应用场景中,桌面虚拟化方案的优势有哪些().A.降低采购成本B.以上都对C.每个营业厅需要配备IT维护人员D.保证了IT服务水平,降低运营成本E.集中管理桌面,便于管理和维护15、多项选择题下列哪几款产品支持万兆().A.LS-IP2600B.LS-IP1400C.LS-IP1600D.LS-IP210016、判断题 SureHA100G2异地容灾双机方案包包括三个节点:本地共享型双机,异地单节点容灾.17、多项选择题 S100的QUICKSTART包含什么功能().A.officeB.上网C.在线游戏D.看照片E.听音乐F.邮件G.skype18、单项选择题 Y480的电源养护模式可以使电池寿命更长,在此模式下,电池充电区间最高为().A.45%B.60%C.50%D.80%19、多项选择题乐padS2让您拥有前所未有的细腻1080P 全高清影音享受,能够支持下列哪种格式?()A.AVIB.RMVBC.WMVD.MKV20、多项选择题锋行K430采用了类似豪车的外观设计,以下对他外观设计描述正确的是?()A.前冲锋流线造型B.机箱底部跑车式的进气口C.重金属质感D.拨档式性能调节21、单项选择题 SureHA镜像型软件套件价格比共享型软件套件价格贵的原因().A.产品定价策略导致,与技术无关B.镜像型软件套件包含的主机license更多C.镜像型软件除了双机保护功能外,还增加了数据镜像功能模块等功能,软件更为复杂D.镜像型软件套件包含的服务内容较多22、单项选择题关于PCI-E特描述错误的是?()A.高带宽B.低延迟C.低成本D.不支持热插拔23、单项选择题 TS140的450w电源是否符合80+白金标准?()A.否B.是24、单项选择题以下哪些关于RAID0的描述是正确的()A、速度慢,安全性高B、速度快,安全性差C、速度慢,容量利用率高D、安全性差,容量利用率低25、多项选择题锋行K430采用了RAID0磁盘阵列技术,他给用户带来的好处是?()A.更方便的拆卸B.更大的硬盘容量C.更安全的硬盘保护D.更快的硬盘读写速度26、多项选择题联想负载均衡产品的竞品?()A.信安世纪B.深信服C.F5D.A1027、单项选择题下列描述中不属于超极本五大特性的是()A.极度纤薄B.极炫视觉C.极其快捷D.极度时尚28、单项选择题Y480采用14寸LED背光高清显示屏,最大亮度和可以完美播放的视频规格分别是()A.180nits,720PHDB.180nits,1080PHDC.220nits,720PHD29、单项选择题在被虚拟化后的服务器上可以运行().A:0个操作系统B:2个操作系统C:1个操作系统D:1个或多个操作系统30、判断题主/主方式(双机互备)是让所有业务都跑在同一台服务器上。
CISSP考试练习(习题卷7)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]Shandra wants to secure an encryption key. Which location would be the most difficult to protect, if the key was kept and used in that location?A)On a local networkB)On diskC)In memoryD)On a public network答案:C解析:2.[单选题]以下哪一位人员通常负责履行高级管理层委派的操作数据保护职责, 例如验证数据完整性测试备份和管理安全策略?A)Data custodian数据保管人B)Data owner数据拥有者C)User用户D)Auditor审核员答案:A解析:数据保管人角色分配给负责实施策略和高级管理层定义的安全控制的个人。
数据所有者确实对这些任务承担最终责任, 但数据所有者通常是将运营责任委派给数据保管人的高级领导。
章节:模拟考试2022013.[单选题]使用自主访问控制(DAC)的系统容易受到下列哪一选项的攻击?A)特洛伊木马B)电话截断C)电子欺骗D)同步洪流答案:C解析:<p>An attempt to gain access to a system by posing as an authorized user. Synonymous with impersonating, masquerading, or mimicking. Spoofing - The act of replacing the valid source and/or destination IP address and node numbers with false ones. Spoofing attack - any attack that involves spoofed or modified packets.</p>4.[单选题]应急预案演习的目的是做以下哪项?A)培训人员的作用和职责B)验证服务水平协议C)培训维护人员D)验证操作度量答案:A解析:5.[单选题]以下哪项是使用手动补丁而不是自动补丁管理的最佳理由?Which of the following is the BEST reason to apply patches manually instead of automated patch management?A)安装补丁所需的成本将会降低The cost required to install patches will be reduced.B)系统易受攻击的时间将减少The time during which systems will remain vulnerable to an exploit will be decreased.C)目标系统驻留在隔离网络中The target systems reside within isolated networks.D)增加覆盖大的地理区域的能力The ability to cover large geographic areas is increased.答案:C解析:隔离网络里,不能连接补丁服务器,只能手动打补丁。
阿里云acp模拟试题
一、选择题
1. 下列哪个是云计算的三大服务模式?
A. IAAS、EAAS、SAAS
B. PAAS、SAAS、DAAS
C. IAAS、PAAS、SAAS
D. NAAS、BAAS、CAAS
2. ACP(Aliyun Cloud Packet)主要负责的功能是?
A. 流量控制
B. 数据备份
C. 网络安全
D. 数据存储
3. ACP中,使用的是哪种协议来进行访问控制?
A. FTP
B. HTTP
C. LDAP
D. DNS
4. 下列哪种方法不是ACP实现访问控制的方式?
A. 黑名单
B. 白名单
C. 认证
D. 授权
5. ACP是否支持自定义访问控制策略?
A. 是
B. 否
二、判断题
1. ACP是云计算中的一种数据存储服务。
( )
2. ACP的功能主要是用来进行数据备份和恢复。
( )
3. ACP采用LDAP协议来实现访问控制。
( )
4. ACP不支持自定义访问控制策略。
( )
三、简答题
1. 请简要介绍一下ACP的基本功能以及在云计算中的作用。
2. 请说明ACP是如何实现访问控制的,列举至少两种方法。
3. 你认为云计算中的访问控制对于数据安全和隐私保护有何重要意义?
以上为阿里云ACP模拟试题,请根据题目要求完成答题,谢谢。
1. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)The configuration register is set to 0×2142.The first boot system command executed in the startup configuration file is boot system rom.The configuration register is set to 0×2100.The boot field is set to the hexadecimal number 2.The startup configuration file is missing or corrupt.2. What are two recommended uses of login banners? (Choose two.)to display security warning messagesto welcome any user to the routerto warn people about misusing privileged EXEC modeto identify circuits and other devices connected to the routerto announce a scheduled system shutdown3.Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting "interface is up, line protocol is up" status. RIP is then configured onRouter C using the following commands:RouterC(config)# router ripRouterC(config-router)# network 192.168.4.0RouterC(config-router)# network 172.16.0.0If no additional routing is configured on Router A, Router B, and Router C, what will be the result?Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.All networks shown in the graphic will be reachable by Router A, Router B, and Router C.Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.4. What are the primary functions of a router? (Choose two.) determine the best path for packetsprevent collisions on the network LANregulate flow control between sender and receiverprovide domain name resolutionforward packets to the appropriate interface5. What are some reasons to change the configuration register setting? (Choose two.)to force the system to ignore the configuration file stored in NVRAM to monitor password changesto change the POST sequenceto force the router to boot the IOS from NVRAMto force the system into ROM monitor mode6. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0×2102 and observes the following output:Erasing the nvram filesystem will remove all files! Continue? [Confirm] [OK]Erase of nvram: completeIf the router unexpectedly loses power after this sequence, what will occur when power is restored?The router will enter ROM monitor mode upon completion of the power-on self test (POST).The router will load the last known valid configuration file.The router will enter Rx-boot mode.The router will prompt the user to enter setup mode or to continue without entering setup mode.7. Why are routed protocols important to networking? (Choose two.) Routed protocols detect collisions and fragments.Routers use routed protocols to calculate the best path to a destination. Routed protocols transport data across the network.The fields and formats used within a packet are defined by routed protocols.Routed protocols are used to configure the metrics used by routing protocols.8. The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a TFTP server to the flash of the router. Which method will accomplish this task?Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command.Use the setup utility to load the new image to flash.Copy the IOS image file from a TFTP server using the command copy filenameip address flash .Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.9.A network administrator has a console connection to the Fremantle router. Pings to Melville are successful, but pings to Cottesloe and Nedlands fail. What could be a first step in troubleshooting the problem?Use an extended ping from Fremantle to each router in the network.Use the show interfaces command from a Telnet session on Melville to check the connection to Cottesloe.Use the traceroute command to discover exactly which link in the network is down.Use the show cdp neighbors detail command from Fremantle to gather information about all Cisco routers in the network.10.Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?access-list 197 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 197 permit ip 198.18.112.0 0.0.0.255 any eq wwwaccess-list 165 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq wwwaccess-list 165 permit ip any anyaccess-list 137 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq wwwaccess-list 89 permit 192.0.2.0 0.0.0.255 anyaccess-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www11.Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to traffic on the Shannon router interface Fa0/0 implementing this security?access-list 42 deny 172.19.123.0 0.0.0.255 192.0.2.0 0.0.0.255 access-list 42 permit anyaccess-list 56 deny 172.19.123.0 0.0.0.255access-list 56 permit anyaccess-list 61 deny 172.19.123.0 0.0.0.0access-list 61 permit anyaccess-list 87 deny ip any 192.0.2.0 0.0.0.255access-list 87 permit ip any12. Which of the following commands will correctly configure an extended ACL? (Choose two).Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 80Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23Router(config)# access-list 99 permit host 10.217.32.3Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 2313. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)The startup-config file will be ignored at bootup.The router will load the IOS from Flash.The router will enter ROM monitor mode upon reload.The router will enter boot ROM mode and have limited capabilities. The administrator can enter the b command to manually boot the IOS.14.Refer to the exhibit. Router D interface S0 on has gone down. What is the maximum time that will elapse before Router A learns that network 168.58.14.0 is down?5 seconds13 seconds17 seconds25 seconds30 seconds77 seconds15. During initial router bootup the following line appears: "NVRAM invalid, possibly due to write erase."What are two possible reasons for this result? (Choose two.)The startup-config file was not saved to RAM before reboot.The IOS has been erased.The router has not been configured.The startup-config file cannot be located.The router will not enter initial configuration dialog.16.The Suffolk router is directly connected to the networks shown in the graphic and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by the Suffolk router. What can be a reason for this result?The ip classless command is not enabled on the Richmond router.The route was ignored if the Richmond router did not include the 172.29.198.0/24 network in its routing updates.The Richmond router is in a different autonomous system than the Suffolk router.The ip subnet-zero command was not configured on the Suffolk router.The ip classless command is not enabled on the Suffolk router.17. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23 access-list 199 permit ip any anyAssuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)All FTP traffic from network 178.15.0.0 will be permitted.All Telnet traffic destined for network 178.15.0.0 will be denied.Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination.Telnet will not be permitted from any hosts on network 178.15.0.0 to any destination.Telnet will not be permitted to any host on network 178.15.0.0 from any destination.18.What facts can be determined from the highlighted text shown in the exhibit? (Choose two.)A weak encryption was applied to all unencrypted passwords.The enable password is now more secure than the enable secret password.An MD5 hashing algorithm was used on all encrypted passwords.Any configured user EXEC mode or Telnet passwords will be encrypted in this configuration.The service password-encryption command was used to encrypt all passwords on the router including enable secret.19. What are three features of CDP? (Choose three.)provides information on directly connected devices that have CDP enabled tests Layer 2 connectivityenabled by default on each interfaceprovides a layer of securityused for debugging Layer 4 connectivity issues20. What information can be learned during the initial router bootup? (Choose two.)the configuration register valuethe number and types of interfaces installedthe router model and the amount of memory that is availablethe amount of memory required to load the IOS and configurationthe number of interfaces with connected cables21.What can be concluded from the output shown in the exhibit? (Choose three.)This is a standard IP access list.This is an extended IP access list.The keyword host is implied in the command line access-list 99 deny 10.213.177.76.The wildcard mask must be configured for this access list to function properly.Host 10.213.177.100 will be allowed access to the Serial0/1 interface.22. Which statements are true regarding setup mode? (Choose three.)Press Ctrl-z to terminate setup mode.Enter a question mark (?) for help at any point.Press Spacebar to accept the default settings.Use setup mode to enter complex protocol features.Press Enter to accept the default settings.Press Ctrl-c to abort configuration dialog.23.Refer to the graphic. Which series of commands will create static routes that will allow Router A and Router B to deliver packets destined for LAN A and LAN B, and direct all other traffic to the Internet?RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 172.20.20.4 255.255.255.252 s0/0RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/024.Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.)Ethernet switchDTEmodemhubDCE deviceCSU/DSU25.What will occur when the following ACL is applied inbound to both FastEthernet interfaces of Router A in the graphic?access-list 125 permit tcp 192.168.2.0 0.0.0.255 10.90.3.0 0.0.0.255 eq 23access-list 125 permit tcp 10.90.3.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 23access-list 125 permit tcp 192.168.2.0 0.0.0.255 any eq wwwWorkstations A and B will be able to Telnet to each other. WorkstationA will be allowed to access Web servers on the Internet, while WorkstationB will be denied Internet Web access.Workstations A and B will be able to Telnet to each other. All other traffic will be denied.The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces.The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.26. Based on this partial output of the show ip route command, which routing protocol is configured on the router?R 172.16.3.0/24 [120/3] via 172.16.2.2, 00:00:27, Serial0/0RIPEIGRPOSPFIGPBGP27.Which of the following are correct statements verified by the router output shown in the graphic? (Choose two.)Layer 3 connectivity exists between BigCity and the devices in the Device ID column.Layer 2 connectivity exists between BigCity and the devices in the Device ID column.All devices shown in the Device ID column use the TCP/IP protocol suite.All devices shown in the Device ID column can be pinged from BigCity.All devices listed in the Device ID column are directly connected to BigCity.28. A network administrator must configure a FastEthernet interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?StPetersburg(config)# banner San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 netmask255.255.255.252StPetersburg(config-if)# description San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# banner remote site San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# description San Jose T129. What are the features of a serial interface on a router? (Choose two.) enabled by defaultassigned a unique MAC addressmust be configured as a DCE in lab and production environmentsmust be configured with the default clock rate of 56000may be administratively enabled by using the no shutdown commandmust be configured with a valid IP address and subnet mask in order to forward packets30. Assuming the following ACL is correctly applied to a router interface, what can be concluded about this set of commands? (Choose two.) Router(config)# access-list 165 deny tcp 192.28.115.0 0.0.0.255 172.20.0.0 0.0.255.255 eq 23Router(config)# access-list 165 permit ip any anyThis is a standard IP access list that denies network 192.28.115.0 Telnet access to the 172.20.0.0 network.All Telnet traffic destined for 172.20.0.0 from any network will be denied access.Network 192.28.115.0 is denied Telnet access to the 172.20.0.0 network. Network 172.20.0.0 is denied Telnet access to the 192.28.115.0 network.All FTP and HTTP traffic destined for 172.20.0.0 will be permitted access.31. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)Use a crossover cable to connect the terminal serial port to the router console port.Use a rollover cable to connect the terminal NIC to the router console port.Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.Use a transceiver to connect a straight-through cable to the router console port.Use a straight-through cable to connect the router console port to the terminal NIC.Use a rollover cable to connect from a terminal serial port to the router console port.32. What critical information about the status of the router can be found in the outputs of both the show interfaces and show protocols commands? (Choose two.)the Layer 3 address of each configured interfacethe routing protocol configured to forward updates out of each interface the operational status of each interfacetraffic statistics for each interfacewhether the interface is configured as a DTE or DCE33.The following access list has been created to prevent traffic from the 192.0.2.63 host on the Sales LAN from accessing servers and hosts on the Payroll LAN.access-list 26 deny host 192.0.2.63access-list 26 permit anyRefer to the exhibit. Which group of commands will properly place the access list so that only the host on the Sales LAN is denied access to the 172.29.7.0 network but all other traffic is permitted?Payroll(config)# interface fa0/0Payroll(config-if)# ip access-group 26 outPayroll(config)# interface fa0/1Payroll(config-if)# ip access-group 26 outSales(config)# interface fa0/1Sales(config-if)# ip access-group 26 inSales(config)# interface fa0/0Sales(config-if)# ip access-group 26 out34.Refer to the exhibit. Assuming default metrics are used and the networkis fully converged, which path will RIP use to send a packet from Router A to Router F?A, D, E, FA, B, D, E, FA, C, D, E, G, FA, B, D, E, G, F35.Refer to the graphic. Communication is needed between the LAN connected to the fa0/0 interface of the Kansas router and the fa0/0 interface of the Maine router. All hosts on those LANs also need connectivity to the Internet. Which commands will allow this communication? (Choose three).Kansas(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.2Kansas(config)# ip route 192.168.6.0 255.255.255.0 s0/1Kansas(config)# ip route 0.0.0.0 0.0.0.0 s0/1Maine(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.1Maine(config)# ip route 0.0.0.0 0.0.0.0 s0/1Maine(config)# ip route 172.16.32.0 255.255.255.0 172.18.64.236. Why are interface descriptions used in router configurations? (Choose three).to enable support personnel to easily identify networks and customers that may be affected by a possible interface issueto provide comments on the interface without affecting the router functionalityto display access warning messages before users enter the interface configuration modeto eliminate the need to use IP addresses when using the ping and telnet commandsto identify the purpose and location of the interface37.A network administrator has enabled RIP on routersB andC in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?A(config)# router ripA(config-router)# passive-interface S0/0B(config)# router ripB(config-router)# network 192.168.25.48B(config-router)# network 192.168.25.64A(config)# router ripA(config-router)# no network 192.168.25.32B(config)# router ripB(config-router)# passive-interface S0/0A(config)# no router rip38. What could a Cisco support technician learn from the IOS filename c2600-d-mz.121-3? (Choose three.)the format of the filethe RAM memory requirements of the filethe version number of the filethe size of the filethe device platform of the file39.While planning an IOS upgrade, the administrator issues the show version command. Based on the output in the graphic, what is the current IOS boot location?RAMNVRAMFlashROM40. A new technician must add boot system commands to one of the department routers. Which available commands will the router return as output when the command shown below is entered? (Choose two.)Router(config)# boot system ?RAMNVRAMIOSIP AddressTFTPFLASH41. From the running-config, the following configuration entries are displayed:Router(config)# line vty 0 2Router(config-line)# password g8k33prRouter(config-line)# loginWhat can be interpreted from the exhibited configuration? (Choose two.)Three Telnet lines are available for remote access.Two Telnet lines are available for remote access.Future configuration of the remaining Telnet lines will require the password to be set to g8k33pr.To login to the remote device, g8k33pr will be used as the Telnet and secret password.Remote access to this local router will require a Telnet password of g8k33pr.42. Which router component stores the information that is displayed by the show running-config command?flashNVRAMRAMROM43. What are two characteristics of the support for Telnet within Cisco IOS software? (Choose two.)Up to five separate Telnet lines are supported by default in standard edition IOS files.For security purposes, Telnet sessions are required to be established from the privileged mode.A router can host simultaneous Telnet sessions.Once established, a Telnet session can remain operational regardless of network status.Telnet tests wireless connectivity and does not require a physical connection between devices to gain remote access.44. Which router components and operations are correctly described? (Choose two.)RAM – stores the ARP cacheNVRAM – store the operating systemROM – stores the backup IOSPOST – verifies the validity of the running-configFlash – executes diagnostics at bootupDRAM – loads the bootstrap45.Given the output shown in the exhibit, in what order and location will the router search for the IOS if no boot system commands are found in the startup-config file?ROM, Flash, TFTP serverFlash, NVRAM, RAMROM, TFTP server, FlashRAM, Flash, NVRAMFlash, TFTP server, ROM46. What can a network administrator do to recover from a lost router password?perform a reload or resettelnet from another router and issue the show running-config command to view the passwordboot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializesboot the router to bootROM mode and enter the b command to load the IOS manually47.Neither router in the exhibit has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)Tottenham# telnet OxfordTottenham> telnet 198.18.139.1Oxford# connect 198.18.139.0Oxford> connect TottenhamOxford# telnet TottenhamOxford# 198.18.139.248. If a PC does not have network connectivity to a router, which router port can be used to establish communication?consoleEthernetserialVTY。
APC在线技术进阶系列培训
第一讲 :善用利器
1. 现版本的英飞设计软件可配置的UPS为:( BD )
(A)SYPX40KW (B)SYPX48KH (C)SYPX80KH (D)SYPX160KH (E)SUVTP
2. 我们在ISX Designer的_InRow制冷中配置InRowRC后,如何去添加漏水检测绳?( C )
(A)系统自动生成 (B)在冷水分配单元中添加 (C)在客户自定义选项中
3. 如果我们要备份一个方案的配置,以便下次可以直接导入此配置,如何选择:(A)
(A)文件-备份 (B)文件-恢复 (C)文件-保存 (D)文件-导出
4. 如果我们在方案中已经为每个机柜配置了一个AP7851,但是客户突然要求将AP7851修改为
AP7551,这时我们应在ISX Designer中的(B )内修改。
(A)机柜编辑器 (B)机柜选项中的用户自定义 (C)就机柜中的设置
5. 选择服务共有( )种形式,我们应在服务选项中选择( D )作为英飞标准的服务形式
(A)基本型,增强型,企业型,管理型 增强型
(B)基本型,增强型,管理型 基本型
(C)基本型,增强型,工程型 基本型
(D)基本型,增强型,管理型,工程型 增强型
6. 如果我们需要在ISX Designer中添加ANC产品,应如何进行?( A)
(A) 提交特殊需求 (B)在机柜编辑器中 (C) 在左下角的第三方产品文件夹中
7. 如果我们需要在机柜中增加Netbotz传感器附件,我们应该在( AB )中添加。
(A) 在机柜选项中的用户自定义中添加
(B) 在机柜编辑器中添加
(C) 在主界面的安全与环境中添加
8. 在主界面上的任务栏中的视图选项中如果选择安全与环境选项,在机柜的右下脚如果出现“3” 这个数
字,则可能代表 (D )
(A) 机柜功率密度为3KW
(B) 此配置中有3个类型相同的机柜
(C) 此机柜已经被编辑过3次
(D) 此机柜中含有三个传感器
9. 如果我们在安全与环境中选择Netbotz550,在报告中将显示的SKU为( B )此产品自带包含了( )
(A) NBWL0550 1年软件电话支持服务,硬件质保服务1年
(B) NBRK0551 硬件质保服务2年
(C) NBRK0551 硬件质保2年,安装服务
(D) NB2L0550 配置服务,硬件质保1年
10. 信息栏中如果出现以下何种信息,可是为无效方案。( A )
(A) 报错
(B) 警告+建议
(C) 警告
(D) 建议