CCNA中英对照题库(0-10.pdf概论

合集下载

CCNA中英对照题库(0-10.pdf

CCNA中英对照题库(0-10.pdf

CCNA中英对照题库(0-10.pdfCCNA (200-120)题库中英对照整理于:2015 年 3 月 31 日版本:1.2 声明:本题库来源互联网(鸿鹄论坛)本题库为英文考试原版左右选择题中文考试为随机抽取英文题的中译版此题库非中文考试题库,而是英文题库手动翻译此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。

如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。

QUESTION 001 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做? A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. R1会剥离源MAC地址,以 0000:0C36.6965 代替。

B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源 IP 地址,1/ 10以 192.168.40.1 代替。

C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. R1会剥离源MAC地址,以 0000:0C36.6965 代替。

D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. R1会剥离目的 IP 地址,以 192.168.40.1 代替。

CCN认证试题中文答案

CCN认证试题中文答案

C C N A认证试题一(附答案和解析)中文版(一)1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。

IEEE制定的IEEE 802.3标准给出了以太网的技术标准。

它规定了包括物理层的连线、电信号和介质访问层协议的内容。

以太网是当前应用最普遍的局域网技术。

它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。

以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE-T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD介质访问控制方法。

电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会。

建会于1963年1月1日。

总部在美国纽约市。

在150多个国家中它拥有300多个地方分会。

目前会员数是36万。

专业上它有35个专业学会和两个联合会。

IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议。

IEEE定义的标准在工业界有极大的影响。

下面列出:IEEE802.3以太网标准802.3--------- 10Base以太网标准802.3u-------- 100Base-T(快速以太网)802.3z-------- 1000Base-X(光纤吉比特以太网)802.3ab-------- 1000Base-T(双绞线吉比特以太网)答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上3、Quidway系列路由器在执行数据包转发时,下列哪些项没有发生变化(假定没有使用地址转换技术)?()(A) 源端口号(B) 目的端口号(C) 源网络地址(D) 目的网络地址(E) 源MAC地址(F) 目的MAC地址答案:ABCD参考知识点:路由功能就是指选择一条从源网络到目的网络的路径,并进行数据包的转发。

思科认证CCNP经典试题

思科认证CCNP经典试题

思科认证CCNP经典试题第一部分填空题1、在Cisco体系的IGP协议中,RIP的A-D管理距离是,EIGRP 的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。

BGP 从EBGP学习到的路由学到路由的A-D管理距离是; BGP从IBGP学习到的路由学到路由的A-D管理距离是。

2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP 的默认本地优先级为:。

3、BGP的邻居分为和。

4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。

如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。

5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是;本地站点地址是。

(没有/10的写法)8、在选择STP的角色(身份)有哪些?,默认STP的收敛时间为。

配置了portfast后,收敛时间会小于。

9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP 发送hello包组播地址是;VRRP发送hello 包的组播地址是。

10、目前以太通道最多可以使用条物理线缆逻辑捆绑成一个以太通道接口?形成以太通道方式有。

11、BGP在EBGP中使用属性避免AS间的环路(确保无环),该属性属于BGP的必遵属性,其中还有哪两个是BGP公认必遵属性为和。

第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IP CEF FIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2 B K3,K4 C、K1,K5 D、K1,K33、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。

)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。

你应该使用什么协议来完成这?A. SMTP简单邮件传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4. What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A. RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案描述载波侦听多路由访问/冲突检测(CSMA/CD)的工作原理。

CSMA/CD是一种帮助设备均衡共享带宽的协议,可避免两台设备同时在网络介质上传输数据。

虽然他不能消除冲突,但有助于极大的减少冲突,进而避免重传,从而提高所的设备的数据传输效率。

区分半双工和全双工通信。

并指出两种方法的需求。

与半双工以太网使用一对导线不同,全双工以太网使用两队导线,全双工使用不同的导线来消除冲突,从而允许同时发送和接收数据,而半双工可接收或发送数据,但不能同时接收和发送数据,且仍会出现冲突。

要使用全双工,电缆两端的设备都必须支持全双工,并配置成一全双模式运行。

描述MAC地址的组成部分以及各部分包含的信息。

MAC(硬件)地址时一种使用十六进制表示的地址,长48位(6B)。

其中前24位(3B)称为OUI(Organizationally Unique Idebtifier,组织唯一表示符),有IEEE分配给NIC制造商;余下的部分呢唯一地标识了NIC识别十进制数对应的二进制值和十六进制值。

用这三种格式之一表示的任何数字都可以转换为其他两种格式,能够执行这种转换对理解IP地址和子网划分至关重要。

识别以太网帧中与数据链路层相关的字段。

在以太网中,与数据链路层相关的字段包括前导码,帧其实位置分隔符,目标MAC地址,源MAC地址,长度或者类型以及帧校验序列。

识别以太网布线相关的IEEE标准。

这些标准描述了各种电缆类型的功能和物理特征,包括(但不限于)10Base2、10Base5和10BaseT。

区分以太网电缆类型及其用途。

以太网电缆分3种:直通电缆,用于将PC或路由器的以太网接口连接到集线器或交换机;交叉电缆。

用于将集线器连接到集线器,集线器连接到交换机,交换机连接到交换机以及PC连接到PC;反转电缆,用于PC和路由器或交换机之间建立控制台连接。

描述数据封装过程及其在分组创建中的作用。

数据封装指的是在OSI模型各层给数据添加信息的过程,也成为分组创建。

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。

)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。

你应该使用什么协议来完成这?A. SMTP简单传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4.What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A.RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。

CCNA第三学期中英文对照练习4

CCNA第三学期中英文对照练习4

1、当包含VLAN的交换网络中配置了VTP时,下列哪种说法正确?4Which statement is true when VTP is configured on a switched network that incorporates VLANs?VTP仅与802.1Q标准兼容。

VTP is only compatible with the 802.1Q standard.VTP增大了管理交换网络的复杂性。

VTP adds to the complexity of managing a switched network.通过VTP可将交换机配置为多个VTP域的成员。

VTP allows a switch to be configured to belong to more than one VTP domain.VTP会向同一VTP域内的所有交换机动态通知VLAN更改情况VTP dynamically communicates VLAN changes to all switches in the same VTP domain.2、VTP以客户端模式工作具有哪两项特点?(选择两项。

)14What are two features of VTP client mode operation? (Choose two.)无法添加VLAN unable to add VLANs可添加在本地有效的can add VLANs of local significance无论VLAN信息如何,将广播从所有端口转发出去VLAN forward broadcasts out all ports with no respect to VLAN information只能传递VLAN管理信息而无法接受更改can only pass VLAN management information without adopting changes可向同一VTP域中的其它交换机转发VLAN信息can forward VLAN information to other switches in the same VTP domain3请参见图示。

CCNA英文试题_(含答案)

CCNA英文试题_(含答案)

1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。

ccnp的试题全中文

ccnp的试题全中文

CCNP级别网络工程师面试题1、解决路由环问题的方法有(ABD) A.水平分割 B.路由保持法 C.路由器重启D.定义路由权的最大值2、下面哪一项正确描述了路由协议(C) A.允许数据包在主机间传送的一种协议 B.定义数据包中域的格式和用法的一种方式C.通过执行一个算法来完成路由选择的一种协议D.指定MAC地址和IP地址捆绑的方式和时间的一种协议3、以下哪些内容是路由信息中所不包含的(A) A.源地址 B.下一跳 C.目标网络D.路由权值4、以下说法那些是正确的(BD)A.路由优先级与路由权值的计算是一致的B.路由权的计算可能基于路径某单一特性计算,也可能基于路径多种属性C.如果几个动态路由协议都找到了到达同一目标网络的最佳路由,这几条路由都会被加入路由表中D.动态路由协议是按照路由的路由权值来判断路由的好坏,并且每一种路由协议的判断方法都是不一样的5、IGP的作用范围是(C) A.区域内 B.局域网内 C.自治系统内 D.自然子网范围内6、距离矢量协议包括(AB) A.RIP B.BGP C.IS-IS D.OSPF7、关于矢量距离算法以下那些说法是错误的(A) A.矢量距离算法不会产生路由环路问题 B.矢量距离算法是靠传递路由信息来实现的C.路由信息的矢量表示法是(目标网络,metric)D.使用矢量距离算法的协议只从自己的邻居获得信息求职胜经/简历亮出你的精彩简历写作技巧,...面试前准备才是...8、如果一个内部网络对外的出口只有一个,那么最好配置(A) A.缺省路由 B.主机路由 C.动态路由9、BGP是在(D)之间传播路由的协议 A.主机 B.子网C.区域(area)D.自治系统(AS)10、在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有(AC) A.路由的优先级 B.路由的发布者 C.路由的metirc值 D.路由的生存时间11、在RIP协议中,计算metric值的参数是(D) A.MTU B.时延 C.带宽D.路由跳数12、路由协议存在路由自环问题(A) A.RIP B.BGP C.OSPF D.IS-IS13、下列关于链路状态算法的说法正确的是:(bc) A.链路状态是对路由的描述B.链路状态是对网络拓扑结构的描述C.链路状态算法本身不会产生自环路由D.OSPF 和RIP都使用链路状态算法14、在OSPF同一区域(区域A)内,下列说法正确的是(d) A.每台路由器生成的LSA都是相同的B.每台路由器根据该最短路径树计算出的路由都是相同的C.每台路由器根据该LSDB计算出的最短路径树都是相同的 D.每台路由器的区域A的LSDB(链路状态数据库)都是相同的15、在一个运行OSPF的自治系统之内:(ad) A.骨干区域自身也必须是连通的 B.非骨干区域自身也必须是连通的C.必须存在一个骨干区域(区域号为0)D.非骨干区域与骨干区域必须直接相连或逻辑上相连16、下列关于OSPF协议的说法正确的是:(abd) A.OSPF支持基于接口的报文验证B.OSPF支持到同一目的地址的多条等值路由C.OSPF是一个基于链路状态算法的边界网关路由协议D.OSPF发现的路由可以根据不同的类型而有不同的优先级17、禁止RIP协议的路由聚合功能的命令是(c) A.undo rip B.auto-summanyC.undo auto-summanyD.undo network10.0.0.018、下列静态路由配置正确的是(d) A.ip route129.1.0.016serial0 B.ip route10.0.0.216129.1.0.0 C.ip rout e129.1.0.01610.0.0.2D.ip route129.1.0.0255.255.0.010.0.0.219、以下不属于动态路由协议的是(d) A.RIP B.ICMP C.IS-ISD.OSPf20、三种路由协议RIP、OSPF、BGP和静态路由各自得到了一条到达目标网络,在华为路由器默认情况下,最终选选定(b)路由作为最优路由 A.RIP B.OSPF C.BGPD.静态路由21、IGP包括如下哪些协议(acd) A.RIP B.BGP C.IS-IS D.OSPF22、路由环问题会引起(abd) A.慢收敛 B.广播风暴 C.路由器重起D.路由不一致23、以下哪些路由表项要由网络管理员手动配置(a) A.静态路由B.直接路由C.动态路由D.以上说法都不正确24、在运行Windows98的计算机中配置网关,类似于在路由器中配置(a) A.直接路由 B.默认路由 C.动态路由 D.间接路由25、关于RIP协议,下列说法正确的有:(ac) A.RIP协议是一种IGP B.RIP协议是一种EGPC.RIP协议是一种距离矢量路由协议D.RIP协议是一种链路状态路由协议欢迎您的下载,资料仅供参考!致力为企业和个人提供合同协议,策划案计划书,学习资料等等打造全网一站式需求。

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。

CCNA中文试题

CCNA中文试题

一、为了提高(加强)企业网的安全性,网络管理员使用ACL(访问控制列表)。

下列哪两个原因将使网络管理员使用访问控制列表?1.控制vty访问路由器时To control vty access into a router2.当数据包流过路由器时,对数据包进行过滤的时候。

To filter traffic as it passes through a router.二、当你是某网站的管理员时,为了提高交换网络的安全性,请参考下面意见,哪两个方法可以在思科交换机上的第二层协议上安全实现?1.禁止交换机建立协商通路。

disable trunk negotation on the switch2.为交换机连接主机的接口进行适当的配置。

configure a switch port host where appropriate三、一个802.11g的AP已经被配置并且安装在一个正方形的办公室中央,一些无线用户有丢包和性能下降现象,而大多使用户工作正常。

从下面列表中找出哪三个是可能的原因?1.无线电话(手机)cordlee phones;2.金属文件橱柜metal file cabinets;3.无线类型或天线指向antenna type or direction;四、参考图示,连接在交换机上的两个接口没有变黄或者变绿,下面哪些方法是最有效的调试物理层问题的方法?(选3个)1.确保电缆A,B是直通线Ensure that cables A and B are straight-through cables2.重做所有电缆Reseat all cables3.确保交换机有电工作正常Ensure the P4S-S has power五、一个网络管理员正在配置一个路由器,使他成为一个帧中继中星型的布局中的集线器。

下面那个是在路由器上使用点到点子接口代替多点接口的优点?1.它可以避免距离矢量路由协议中的负载平衡问题It avoids split-horizon issues with distance vector routing protocols六、如图所示,图中无线局域网运行了哪两个设备管理系统?(选2)1、网络图中显示的一个长期运行的一套系统是ESS(主管支持系统)The network diagram represents an extended service set(ESS)2、两个APS(辅助推进系统)应该被配置在不同的通道起作用。

CCNA专业英文词汇全集(1)(1)-思科认证试题

CCNA专业英文词汇全集(1)(1)-思科认证试题

CCNA专业英文词汇全集(1)(1)-思科认证试题CCNA为思科最基础的入门认证,其中,考试偏重网络概念和理论,对于初学者来说,不少专业英文术语难以理解,导致学员学习进度维难。

CISCO系列认证的原版教材,专业词汇出现频率积高,考生只要熟悉本文,相信学习起来一定事半功倍。

10BaseT-----原始IEEE802.3标准的一部分,1OBaseT是1OMb/s基带以太网规范,它使用两对双绞电缆(3类、4类或5类),一对用于发送数据另一对用于接收数据。

1OBaseT每段的距离限制约为100米。

参见Ethernet和IEEE 802.3。

1OOBaseT-----基于IEEE 802.3U标准,1OOBaseT是使用UTP接线的基带快速以太网规范。

当没有通信量出现时。

1OOBaseT在网络上发送链接脉冲(比1OBaseT中使用的包含更多信息)。

参见10BaseT、Fast Ethernet和IEEE 802.3。

100BaseTX-----基于IEEE 802.3U标准,100BaseTX是使用两对UTP或STP接线的10OMb/S 基带快速以太网规范。

第一对线接收数据;第二对线发送数据。

为确保正确的信号定时,一个100BaseTX网段不能超过100米长。

A&B bit signaling (A和B比特信令)-----用于T-1传输设备,有时称为"第24信道信令"。

在这一方案中,每个T-1于信道使用每个第六帧的一个比特来发送监控信令信息。

AAA-----身份验证(Authentication)、授权(Authorization)和统计(Accounting)Cisco开发的一个提供网络安全的系统。

奏见authentication。

authorization和accounting AAL ATM适应层-----数据链路层的一个与服务有关的子层,数据链路层从其他应用程序接受数据并将其带人ATM层的48字节有效负载段中。

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。

思科CCNA1第七章试题及答案英文版

思科CCNA1第七章试题及答案英文版

25. QuestionWhat is the binary equivalent of the decimal number 232?o 11101000o 11000110o 10011000o 1111001026. QuestionWhat is the decimal equivalent of the binary number 10010101?o149o 157o 168o 1921. QuestionHow many bits are in an IPv4 address?o32o 64o 128o 2562. QuestionWhich two parts are components of an IPv4 address? (Choose two.)o subnet portiono network portiono logical portiono host portiono physical portiono broadcast portion3. QuestionWhat does the IP address 172.17.4.250/24 represent?o network addresso multicast addresso host addresso broadcast address4. QuestionWhat is the purpose of the subnet mask in conjunction with an IP address?o to uniquely identify a host on a networko to identify whether the address is public or privateo to determine the subnet to which the host belongso to mask the IP address to outsiders5. QuestionWhat subnet mask is represented by the slash notation /20?o 255.255.255.248o 255.255.224.0o 255.255.240.0o 255.255.255.0o 255.255.255.1926. QuestionA message is sent to all hosts on a remote network. Which type of message isit?o limited broadcasto multicasto directed broadcasto unicast7. QuestionWhat are three characteristics of multicast transmission? (Choose three.)o The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.o A single packet can be sent to a group of hosts.o Multicast transmission can be used by routers to exchange routing information.o The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.o Computers use multicast transmission to request IPv4 addresses.o Multicast messages map lower layer addresses to upper layer addresses.8. QuestionWhich three IP addresses are private ? (Choose three.)o 10.1.1.1o 172.32.5.2o 192.167.10.10o 172.16.4.4o 192.168.5.5o 224.6.6.69. QuestionWhich two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.)o trunkingo dual stacko encapsulationo tunnelingo multiplexing10. QuestionWhich of these addresses is the shortest abbreviation for the IP address:3FFE:1044:0000:0000:00AB:0000:0000:0057?o 3FFE:1044::AB::57o 3FFE:1044::00AB::0057o 3FFE:1044:0:0:AB::57o 3FFE:1044:0:0:00AB::0057o 3FFE:1044:0000:0000:00AB::57o 3FFE:1044:0000:0000:00AB::005711. QuestionWhat type of address is automatically assigned to an interface when IPv6 is enabled on that interface?o global unicasto link-localo loopbacko unique local12. QuestionWhat are two types of IPv6 unicast addresses? (Choose two.)o multicasto loopbacko link-localo anycasto broadcast13. QuestionWhat are three parts of an IPv6 global unicast address? (Choose three.)o an interface ID that is used to identify the local network for a particular hosto a global routing prefix that is used to identify the network portion of the address that has been provided by an ISPo a subnet ID that is used to identify networks inside of the local enterprise siteo a global routing prefix that is used to identify the portion of the network address provided by a local administratoro an interface ID that is used to identify the local host on the network14. QuestionAn administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?o SLAACo stateless DHCPv6o stateful DHCPv6o RA and EUI-6415. QuestionWhich protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?o ARPv6o DHCPv6o ICMPv6o UDP16. QuestionWhich two things can be determined by using the ping command? (Choose two.)o the number of routers between the source and destination deviceo the IP address of the router nearest the destination deviceo the average time it takes a packet to reach the destination and for theresponse to return to the sourceo the destination device is reachable through the networko the average time it takes each router in the path between source and destination to respond17. QuestionWhat is the purpose of ICMP messages?o to inform routers about network topology changeso to ensure the delivery of an IP packeto to provide feedback of IP packet transmissionso to monitor the process of a domain name to IP address resolution 18. QuestionWhat is indicated by a successful ping to the ::1 IPv6 address?o The host is cabled properly.o The default gateway address is correctly configured.o All hosts on the local link are available.o The link-local address is correctly configured.o IP is properly installed on the host.19. QuestionA user is executing a tracert to a remote device. At what point would a router,which is in the path to the destination device, stop forwarding the packet?o when the router receives an ICMP Time Exceeded messageo when the RTT value reaches zeroo when the host responds with an ICMP Echo Reply messageo when the value in the TTL field reaches zeroo when the values of both the Echo Request and Echo Reply messages reach zero20. QuestionWhat field content is used by ICMPv6 to determine that a packet has expired?o TTL fieldo CRC fieldo Hop Limit fieldo Time Exceeded field21. QuestionFill in the blank.The decimal equivalent of the binary number 10010101is 149 .22. QuestionFill in the blank.The binary equivalent of the decimal number 232 is 1110100023. QuestionFill in the blank.What is the decimal equivalent of the hex number 0x3F? 63。

鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

1、请参见图示。

当收到下列帧将会怎么做?(选择三项。

)ACFA. Router1的将剥离的源MAC地址,并将其与MAC地址0000.0c36.6965取代。

B. Router1的将剥离的源IP地址,并将其与IP地址192.168.40.1取代。

C.router1将剥离的目的MAC地址,并将其与MAC地址代替0000.0c07.4320。

D.router1将剥离的目的IP地址,并将其与192.168.40.1的IP地址替换。

E. Router1的将转发数据包输出接口的FastEthernet0/1。

F.router1将转发数据包输出接口的FastEthernet0/2。

2、请参见图示。

哪三种说法正确描述了网络设备A?(选择三项。

)BDEA.使用255.255.255.128子网掩码时,在各接口不需要的IP地址。

B.使用255.255.255.128子网掩码时,在各接口确实需要一个唯一的IP地址IP子网。

C.为255.255.255.0的子网掩码时,必须是一个二层设备的电脑进行通信彼此。

D.为255.255.255.0的子网掩码时,必须是一个三层设备的电脑进行通信彼此。

E.使用255.255.254.0的子网掩码时,每个接口并不需要一个IP地址。

3、OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?EA.传输B.网络D.会话E.应用4、以下哪项描述了WAN设备的角色?(选择三项。

)A.CSU/ DSU用于端接本地数字环路B.调制解调器端接本地数字环路C.一个CSU/ DSU终止模拟本地环路D.调制解调器终止模拟本地环路E.路由器通常被视为DTE设备F.路由器通常被视为DCE设备注:SU/DSU是用于连接终端和数字专线的设备,属于DCE设备modem用于数字信号和模拟信号的转换,属于DCE设备路由器一般是DTE设备5、请参见图示,主机A ping接口S0/0的router3,什么是该ping的TTL值?A. 253B. 252C. 255D. 2546、网络管理员可以通过建立一个FTP连接到远程服务器验证新安装的主机的配置。

CCNA考试题库中英文翻译版及标准答案

CCNA考试题库中英文翻译版及标准答案

CCNA考试题库中英文翻译版及答案————————————————————————————————作者:————————————————————————————————日期:CCNA考试题库中英文翻译版及答案1[1]1. What are two reasons that a network administrator would use access lists? (Choose two.)1.出于哪两种理由,网络管理员会使用访问列表?A. to control vty access into a routerA.控制通过VTY访问路由器B. to control broadcast traffic through a routerB.控制广播流量穿越路由器2.一个默认的帧中继WAN被分类为哪种物理网络类型?A. point-to-pointA.点到点B. broadcast multi-accessB.广播多路访问C. nonbroadcast multi-accessC.非广播多路访问D. nonbroadcast multipointD.非广播多点E. broadcast point-to-multipointE.广播点到多点Answer: C3. A single 802.11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency. What are three likely causes of this problem? (Choose three.)3.一个802.11接入点被部署在一个方形办公室的中央,当大多数用户在大流量传输数一些无线用户发现无线网络变得缓慢和出现丢包A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF4. Refer to the exhibit. How many broadcast domains exist in the exhibited topology?根据下图,图中的拓扑中存在多少个广播域?A. one A.1B. two B.2C. three C.3D. four D.4E. five E.5F. six F.6Answer: C5. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)5.根据下图,WLAN diagram决定了哪两个事实A. The area of overlap of the two cells represents a basic service set (BSS).A. 两个 cells的overlap的区域描述了一个basic service setB. The network diagram represents an extended service set (ESS).B. 网络描述了一个extended service setC. Access points in each cell must be configured to use channel 1.C. 再每个CELL中的AP必须被配置成使用channel 1D. The area of overlap must be less than 10% of the area to ensure connectivity.D. 为了确保连通性,重叠区域必须小于10%E. The two APs should be configured to operate on different channels.E. 两个访问点应该被配置成工作在不同的频道Answer: BE6. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router.Which of the following statements is true concerning this command?6.路由器上输入命令frame-relay map ip 10.121.16.8 102 broadcast,以下选项正确的是?A. This command should be executed from the global configuration mode.A.该命令应该在全局配置模式下被执行B. The IP address 10.121.16.8 is the local router port used to forward data.B.IP地址10.121.16.8是本地路由器用来转发数据的接口C. 102 is the remote DLCI that will receive the information.C.102是远端的DLCI它将接受信息。

CCNA中英文试题两套-推荐下载

CCNA中英文试题两套-推荐下载

14 下列哪两项陈述说明了无线网络安全的特征? (选择两项。)
4
请参见图示。 在 Linksys 集成路由器的 Wireless 菜单选项中,Network Mode 选项 Mixed 是什么意思?
路由器支持加密和身份验证。 路由器支持有线和无线两种连接。 路由器支持 802.11b、802.11g 和 802.11n 设备。 路由器支持通过红外和无线电射频连接。
5 接入点可以使用哪两种身份验证方法? (选择两项。)
WEP WPA EAP ASCII 预共享密钥
6 哪项接入点功能允许网络管理员定义可以进入无线网络的数据类型?
加密 黑客攻击拦截 通信过滤 MAC 地址过滤 身份验证
对全部高中资料试卷电气设备,在安装过程中以及安装结束后进行高中资料试卷调整试验;通电检查所有设备高中资料电试力卷保相护互装作置用调与试相技互术通关,1系电过,力管根保线据护敷生高设产中技工资术艺料0不高试仅中卷可资配以料置解试技决卷术吊要是顶求指层,机配对组置电在不气进规设行范备继高进电中行保资空护料载高试与中卷带资问负料题荷试2下卷2,高总而中体且资配可料置保试时障卷,各调需类控要管试在路验最习;大题对限到设度位备内。进来在行确管调保路整机敷使组设其高过在中程正资1常料中工试,况卷要下安加与全强过,看度并22工且22作尽22下可22都能22可地护以缩1关正小于常故管工障路作高高;中中对资资于料料继试试电卷卷保破连护坏接进范管行围口整,处核或理对者高定对中值某资,些料审异试核常卷与高弯校中扁对资度图料固纸试定,卷盒编工位写况置复进.杂行保设自护备动层与处防装理腐置,跨高尤接中其地资要线料避弯试免曲卷错半调误径试高标方中高案资等,料,编试要5写、卷求重电保技要气护术设设装交备备置底4高调、动。中试电作管资高气,线料中课并敷3试资件且、设卷料中拒管技试试调绝路术验卷试动敷中方技作设包案术,技含以来术线及避槽系免、统不管启必架动要等方高多案中项;资方对料式整试,套卷为启突解动然决过停高程机中中。语高因文中此电资,气料电课试力件卷高中电中管气资壁设料薄备试、进卷接行保口调护不试装严工置等作调问并试题且技,进术合行,理过要利关求用运电管行力线高保敷中护设资装技料置术试做。卷到线技准缆术确敷指灵设导活原。。则对对:于于在调差分试动线过保盒程护处中装,高置当中高不资中同料资电试料压卷试回技卷路术调交问试叉题技时,术,作是应为指采调发用试电金人机属员一隔,变板需压进要器行在组隔事在开前发处掌生理握内;图部同纸故一资障线料时槽、,内设需,备要强制进电造行回厂外路家部须出电同具源时高高切中中断资资习料料题试试电卷卷源试切,验除线报从缆告而敷与采设相用完关高毕技中,术资要资料进料试行,卷检并主查且要和了保检解护测现装处场置理设。备高中资料试卷布置情况与有关高中资料试卷电气系统接线等情况,然后根据规范与规程规定,制定设备调试高中资料试卷方案。

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英⽂翻译版及答案CCNA考试题库中英⽂翻译版及答案1[1]1、 What are two reasons that a network administrator would use access lists? (Choose two、)1、出于哪两种理由,⽹络管理员会使⽤访问列表?A、 to control vty access into a routerA、控制通过VTY访问路由器B、 to control broadcast traffic through a routerB、控制⼴播流量穿越路由器2、⼀个默认得帧中继WAN被分类为哪种物理⽹络类型?A、 point-to-pointA、点到点B、 broadcast multi-accessB、⼴播多路访问C、 nonbroadcast multi-accessC、⾮⼴播多路访问D、 nonbroadcast multipointD、⾮⼴播多点E、 broadcast point-to-multipointE、⼴播点到多点Answer: C3、 A single 802、11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency、 What are three likely causes of this problem? (Choose three、)3、⼀个802、11接⼊点被部署在⼀个⽅形办公室得中央,当⼤多数⽤户在⼤流量传输数⼀些⽆线⽤户发现⽆线⽹络变得缓慢与出现丢包A、 mismatched TKIP encryptionB、 null SSIDC、 cordless phonesD、 mismatched SSIDE、 metalF、 antenna type or directionAnswer: CEF4、 Refer to the exhibit、 How many broadcast domains exist in the exhibited topology?根据下图,图中得拓扑中存在多少个⼴播域?A、 one A、1B、 two B、2C、 three C、3D、 four D、4E、 five E、5F、 six F、6Answer: C5、 Refer to the exhibit、 What two facts can be determined from the WLAN diagram? (Choose two、) 5、根据下图,WLAN diagram决定了哪两个事实A、 The area of overlap of the two cells represents a basic service set (BSS)、A、两个 cells得overlap得区域描述了⼀个basic service setB、 The network diagram represents an extended service set (ESS)、B、⽹络描述了⼀个extended service setC、 Access points in each cell must be configured to use channel 1、C、再每个CELL中得AP必须被配置成使⽤channel 1D、 The area of overlap must be less than 10% of the area to ensure connectivity、D、为了确保连通性,重叠区域必须⼩于10%E、 The two APs should be configured to operate on different channels、E、两个访问点应该被配置成⼯作在不同得频道Answer: BE6、 The command frame-relay map ip 10、121、16、8 102 broadcast was entered on the router、Which of the following statements is true concerning this command?6、路由器上输⼊命令frame-relay map ip 10、121、16、8 102 broadcast,以下选项正确得就是?A、 This command should be executed from the global configuration mode、A、该命令应该在全局配置模式下被执⾏B、 The IP address 10、121、16、8 is the local router port used to forward data、B、IP地址10、121、16、8就是本地路由器⽤来转发数据得接⼝C、 102 is the remote DLCI that will receive the information、C、102就是远端得DLCI它将接受信息。

2021年CCNA专业语汇中英对照

2021年CCNA专业语汇中英对照

CCNA专业语汇中英对照CA认证标志着具备 ___、配置、运行中型路由和交换网络,并进行故障排除的能力。

接下来为大家了CA专业语汇中英对照,希望对你有帮助哦!B8ZS 二进进制8零替换----- 一种线路编码,在连接的远端解释,在T-1和E-1电路的链路上连续传输八个零时,它使用一个特殊的代码替代。

这一技术保证1的密度不受数据流的约束。

也称为双极性8零替换。

对比AMI。

参见ones density。

backbone ----- 网络的基本部分,它提供发送到其他网络和从其他网络发起的通信量的主要路径。

back end ----- 为前端提供服务的一个节点或软件程序。

参见server。

bandwidth ----- 网络 ___使用的最高和最低频率间的间隔。

通常,它涉及一个网络协议或介质的额定吞吐能力。

bandwith on de ___nd ----- 这一功能允许一个附加的B信道用于为一个特定连接增加可用带宽量。

baseband ----- 网络技术的一个特性,它只使用一个载波频率。

以太网就是一个例子。

也称窄带。

对broadband。

baseline ----- 基线信息包括有关该网络的历史数据和常规使用信息。

这个信息可以用来确定该网络最近是否有可能引起问题的变化。

Basic Management Setup ----- Cisco路由器在建立模式中使用。

只有提供足够的管理和配置才能使路由器工作,这样才有人能远程登录到该路由器并配置它。

baud ----- 每秒比特的同义词,如果每个 ___单元代表一比特的话。

它是一个发 ___速度的单位,等效于每秒钟传输的单独的___单元数。

BDR 备份指定路由器 ----- 一个OSPF网络中用来备份指定的路由器以防失效。

beacon ----- 一个FBDT设备或令牌环帧,它指出环上的一个严重问题,如电缆断开。

信标帧载有下游站地址。

参见failure do ___in。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CCNA(200-120)题库中英对照整理于:2015年3月31日版本:1.2声明:●本题库来源互联网(鸿鹄论坛)●本题库为英文考试原版左右选择题●中文考试为随机抽取英文题的中译版●此题库非中文考试题库,而是英文题库手动翻译●此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织●本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。

●如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。

QUESTION001Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做?A.Router1 will strip off the source MAC address and replace it with the MACaddress 0000.0c36.6965.R1会剥离源MAC地址,以0000:0C36.6965代替。

B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源IP地址,以192.168.40.1代替。

C.Router1 will strip off the destination MAC address and replace it with the MAC address0000.0c07.4320.R1会剥离源MAC地址,以0000:0C36.6965代替。

D.Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.R1会剥离目的IP地址,以192.168.40.1代替。

E.Router1 will forward the data packet out interface FastEthernet0/1.R1将会从F0/1转发这个数据包。

F. Router1 will forward the data packet out interface FastEthernet0/2. R1将会从F0/2转发这个数据包数据传输过程中,IP 地址不变,但是在不同的网段中,MAC 地址要根据设备的具体情况而发生改变。

在不同网络中,依靠 IP 地址定位,在同一网络中,依靠 MAC 地址定位。

QUESTION002Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)如图所示,关于网络设备 A 哪三项是正确的描述?A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.如果配置一个 25 位的网络号,每个端口不需要配置一个地址。

B.With a network wide mask of 255.255.255.128, each interface does require an IP address ona unique IP subnet.如果配置一个 25 位的网络号,每个端口需要配置一个地址和子网。

C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs tocommunicate with each other.如果配置一个 24 位的网络号,成为一个二层设备以便让 PC 和其他设备通讯。

D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs tocommunicate with each other.如果配置一个 24 位的网络号,成为一个三层设备以便让 PC 和其他设备通讯。

E.With a network wide mask of 255.255.254.0, each interface does not require an IP address. 如果配置一个 23 位的网络号,每个端口不需要配置一个地址。

QUESTION003Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?在 OSI 参考模型当中,哪一层可以判断程序的可用性以机是否有足够的资源来支持这个通讯?A.transport 传输层work 网络层C.presentation 表示层D.session会话层E.application应用层QUESTION004Which of the following describes the roles of devices in a WAN? (Choose three.)下列哪些描述广域网设备的作用?A. A CSU/DSU terminates a digital local loop 联系数字本地环路B. A modem terminates a digital local loopC. A CSU/DSU terminates an analog local loopD. A modem terminates an analog local loop 一个模拟信号F. A router is commonly considered a DTE device路由器通常是 DTE 设备G. A router is commonly considered a DCE device路由器通常是 DCE 设备QUESTION005Refer to the exhibit, Host A pings interface S0/0 on router 3, what is the TTL value for that ping? 如图所示,主机 A 的 ping 路由器 3 的 S0/0 接口,TTL 值会是多少?A.253B.252C.255D.254QUESTION006A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?网络管理员验证的配置是一个新安装的主机通过建立 FTP 连接到远程服务器。

网络管理员这个操作使用的最高协议层是什么?A.applicationB.presentationC.sessionD.transportE.internetF.data linkFTP 协议属于应用层QUESTION007Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?如图所示,主机Aping 主机 B,在此通信中,以下哪个列表将会进入主机 A 的 ARP 缓存?A.B.C.D. E.F.QUESTION008A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?在一个双绞线网络中的一个网络接口上监测到网络冲突,冲这个表述中,有关这个网络接口,哪一项是正确的?A.This is a 10Mb/s switch port.B.This is a 100Mb/s switch port.C.This is an Ethernet port perating at half duplex.D.This is an Ethernet port operating at full duplex.E.This is a port on a network interface card in a PC.半双工模式会产生冲突,全双工模式不会产生冲突QUESTION009A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?收到一个主机发来的帧并进行校验以确认是否损坏,然后丢弃。

这个过程在 OSI 哪一层发生?A.sessionworkC.PhysicalD.data linkE.Transport传输层:数据段,segment网络层:数据包,数据报,packet数据链路层:数据帧,frameQUESTION010Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)以下那些正确描述了 OSI 数据封装的过程?A.The transport layer divides a data stream into segments and may add reliability and flowcontrol information.传输层将数据分段,并且加上可靠性和流控制信息。

相关文档
最新文档