CCNA期末考试试题
CCNA期末考试试题

1、要求:(1)VTP域名为benet;密码为123;启用修剪;(2)配置2台3层交换机为VTP的server模式;配置2层交换机为VTP的client模式;(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生成树根网桥;在2层交换机上配置速端口与上行速链路;(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路由,指向10.1.1.1/24;(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的EthernetChannel;(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议(1)(2)○1SW1-3L 配置vtp域名benetpassword 123 Server模式SW2-3L同样配置○2SW1-3L启用修剪SW2-3L同样配置○3SW3-2L配置vtp的client模式、SW4-2L、SW5-3L、SW6-3L相同配置(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生成树根网桥;在2层交换机上配置速端口与上行速链路;○1SW-3L-1是VLAN 2-6的生成树根网桥;;○2设置SW-3L-2是VLAN 7-11的生成树根网桥○3SW3-2L配置速端口与上行链路,SW4-2L、SW5-2L 、SW6-2L上同样配置(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路由,指向10.1.1.1/24○1路由器上配置ip地址○2路由器上配置默认路由和RIP○3SW1-3L各vlan的ip地址○4SW2-3L各vlan的ip地址(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的EthernetChannel ○1在SW1-3L配置EthernetChannel;○2在SW2-3L配置EthernetChannel;(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议○1SW1-3L上配置路由接口○2SW2-3L上配置路由接口○3SW1-3L上的RIP配置○4SW2-3L上的RIP配置○5在SW1-3L验证RIP○6在SW2-3L验证RIP2、要求:如图所示,四台路由器R1,R2,R3以及R4运行OSPF协议(要求发布各路由器的loopback0地址),R1与R2属于Area1,R2与R3属于Area0,R3与R4属于Area2。
CCNA第四学期期末考试全真试题及答案(第一套)

1下列哪种类型的网络攻击是利用被入侵的系统中的漏洞在网络中自我传播?B病毒蠕虫特洛伊木马中间人2请参见图示。
有一个FTP 请求数据包需要发往IP 地址为172.16.1.5 的FTP 服务器。
Router1 的S0/0/0 接口收到该请求数据包后,会以何种方式处理?C路由器认定传入数据包与access-list 201 permit ip any any 命令创建的语句匹配,从而允许数据包进入路由器。
因为access-list 101 permit ip any any 命令没有创建任何语句,所以路由器会达到ACL 101 的尾部而找不到匹配的条件,从而丢弃该数据包。
路由器认定传入数据包与access-list 101 permit ip any 172.16.1.0 0.0.0.255 命令创建的语句匹配,从而忽略ACL 101 的其余的语句,允许数据包进入路由器。
路由器会认定传入数据包与命令access-list 201 deny icmp172.16.1.0 0.0.0.255 any 创建的语句匹配,然后继续将该数据包与ACL 201 中剩余的语句比对,以确保后续语句均未禁止FTP,然后路由器将丢弃该数据包。
3管理员正在使用RIPng 和双协议栈技术为一路由器配置IPv6 和IPv4,他在输入IPv4 路由时收到一条错误消息。
可能是什么原因导致出现错误消息?AIPv4 与RIPng 不兼容RIPng 与双协议栈技术不兼容。
路由器接口的地址配置错误。
在同一接口同时配置IPv4 和IPv6 时,所有IPv4 地址均被禁用,以支持新的技术。
4帧中继网络中所用的本地管理接口(LMI) 提供哪两项功能?(选择两项。
)AE流量控制错误通知拥塞通知映射DLCI 至网络地址发送keepalive 数据包以检验PVC 的工作情况5如果不以纯文本格式发送身份验证信息,在Cisco 和非Cisco 路由器之间建立链路连接时,应使用以下哪种第 2 层协议和身份验证的组合?DHDLC 与PAPHDLC 与CHAPPPP 与PAPPPP 与CHAP6服务提供商自何处开始对客户的WAN 连接负责?C本地环路路由器上的DTE 电缆分界点非军事区7请参见图示。
最新版本CCNA考试第一章期末考试答案b

最新版本CCNA考试第一章期末考试答案本文提供了最新版本的CCNA考试第一章期末考试答案,以供考生参考。
第一部分:单项选择题1. 以下哪种设备可用于实现广域网?A. 路由器B. 交换机C. 防火墙D. 网桥正解:A2. 哪一个网络层协议是用于将MAC地址转换为IP地址?A. ARP协议B. TCP协议C. UDP协议D. ICMP协议正解:A3. 网络安全中,以下哪项是确保数据在传输过程中不被窃取或修改的安全措施?A. 机密性B. 完整性C. 可用性D. 可验证性正解:B4. 在OSI模型中,下列哪层负责对收到的数据进行重新组装和排序?A. 传输层C. 数据链路层D. 物理层正解:A5. 哪种类型的地址可以用于从源到目的地的识别和路由?A. 物理地址B. MAC地址C. IP地址D. 逻辑地址正解:C第二部分:多项选择题1. 选择下列关于TCP传输协议的正确说法。
(可多选)A. TCP使用可靠性较低的UDP协议B. TCP的流控制指令有多种方式C. TCP在传输层实现D. TCP提供无连接服务正解:B、C2. 在主机间进行通信时,哪个MAC地址首先被使用?A. 源主机的MAC地址B. 目的主机的MAC地址C. 网关的MAC地址D. 路由器的MAC地址正解:C3. 下列哪个网络拓扑结构最好的容错性?A. 星形拓扑C. 总线型拓扑D. 带环形拓扑正解:A4. 以下哪个选项是网络安全的最佳实践?A. 使用复杂的密码并定期更改B. 允许所有用户访问系统C. 共享所有文件和文件夹D. 手动分配IP地址正解:A5. 哪种网络协议可以在发送方和接收方之间创建安全的数据连接?A. SSLB. HTTPC. FTPD. SMTP正解:A第三部分:简答题1. 请简要解释网络拓扑结构。
网络拓扑结构指的是计算机网络中设备的布局方式。
常见的网络拓扑包括星型、环状、总线型和带环型等。
其中,星型拓扑结构最为常见,它由多台计算机通过中心节点相连而组成。
思科CCNA第三学期期末考试(完整版!!!)

参加考试 - ESwitching Final Exam - CCNA Exploration: LAN 交换和无线 (版本 4.0)1 以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSIDOFDMWEPDSSS2 分层网络模型具有哪三项优点?(选择三项。
)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化3 在将 Catalyst 交换机迁移到其它 VTP管理域之前,应该进行哪三项任务?(选择正确的 VTP 模式和版本。
使用新管理域的名称配置交换机。
从新域中的 VTP 服务器上下载 VTP 数据库。
配置新域内的 VTP 服务器,使其识别该交换机的 BID 。
重置 VTP 计数器,使交换机可与新域内的其它交换机同步。
检验交换机的配置修订版号是否比新域内的其它交换机的低。
4下列哪两种说法正确地描述了生成树协议?(选择两项。
)它只在第2 层使用。
它在交换机上配置。
它消除了网络拓扑中的第 2 层环路。
它限制了端口上所允许的有效MAC 地址的数量。
它使VLAN 信息得以传播到网络中的其它交换机。
5下列哪种方法可建立用于配置Linksys WRT300N 无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。
以物理方式连接到接入点,然后重新启动计算机以启动配置软件。
在接入点所在的IP 子网内的计算机上的web 浏览器中输入接入点的默认IP 地址。
修改与接入点连接的计算机的TCP/IP 属性,使其与接入点处于同一个网络中,然后重新机以建立连接。
6请参见图示。
源地址并非0019.d2e4.d9f7 的帧进入接口Fa0/24 时会发生什么情况?Fa0/24 会变为error-disabled(错误-禁用)状态。
传入帧会被丢弃。
Fa0/24 端口LED 会关闭。
安全违规计数会增加。
7可采用哪两种方法删除交换机的MAC 地址表中的条目?(选择两项。
ccna考试试题库

ccna考试试题库CCNA(Cisco Certified Network Associate)考试是思科认证网络专家的初级认证,主要测试考生在网络基础、路由、交换、无线和安全等方面的知识。
以下是一些模拟CCNA考试的试题和答案:1. 什么是子网掩码,它有什么作用?答案:子网掩码是一种IP地址的附加信息,用于指定IP地址中网络部分和主机部分的界限。
它的作用是允许路由器区分IP地址中的网络地址和主机地址,从而实现不同网络之间的路由。
2. 描述静态路由和动态路由的区别。
答案:- 静态路由:由网络管理员手动配置的路由信息,不随网络结构的变化而自动调整。
- 动态路由:由路由器根据网络拓扑的变化自动生成和更新的路由信息。
3. 什么是VLAN,它有什么好处?答案: VLAN(虚拟局域网)是一种在交换机上划分不同网络的技术,即使物理上连接在同一交换机上,也可以属于不同的VLAN。
VLAN的好处包括提高安全性、减少广播域、提高网络管理的灵活性等。
4. 简述TCP和UDP的区别。
答案:- TCP(传输控制协议):提供可靠的、面向连接的传输服务,有流量控制和拥塞控制机制。
- UDP(用户数据报协议):提供不可靠的、无连接的传输服务,适用于对实时性要求高的应用。
5. 什么是DHCP,它的作用是什么?答案: DHCP(动态主机配置协议)是一种网络管理协议,用于自动分配IP地址和其他网络配置信息给网络中的设备。
它的作用是简化网络配置,避免IP地址冲突。
6. 什么是NAT,它在网络中扮演什么角色?答案: NAT(网络地址转换)是一种技术,允许多个设备共享一个公共IP地址与互联网通信。
它在网络中扮演的角色是节省IP地址资源,隐藏内部网络结构。
7. 什么是STP(生成树协议)?答案: STP(生成树协议)是一种网络协议,用于在局域网中防止网络环路的产生。
通过创建一个无环的逻辑拓扑,STP确保网络的稳定性和可靠性。
8. 描述OSPF(开放最短路径优先)协议的工作原理。
ccna_第三学期期末考试

1.VLAN 中继有何用途?通过减少广播流量提高网络性能。
选择在交换网络中传输数据的最佳路径。
通过一条链路传送多个VLAN 的流量。
避免交换网络中出现生成树环路。
请参见图示。
两台交换机都配置有默认的网桥优先级。
如果所有链路都在相同的带宽下运行,哪个端口将作为STP 根端口?S1 的Fa0/1 接口S1 的Fa0/2 接口S2 的Fa0/1 接口S2 的Fa0/2 接口请参见图示。
从图中显示的输出可以得到有关STP 的哪两项结论?(选择两项。
)交换机S1 所配置的STP 优先级值在该网络中最低。
交换机S1 被配置为VLAN1 的根桥。
Fa0/21 是交换机S1 的根端口。
Fa0/22 是冗余链路。
Fa0/24 被视为通往根桥的最佳路径。
下列哪种说法正确描述了生成树路径开销?根据环路中连接的交换机总数计算。
根据给定路径上所有交换机的使用率计算。
根据给定路径上交换机的网桥优先级计算。
根据给定路径上每个交换机端口的端口开销值(由端口速度决定)的总和计算。
使用单臂路由器模型配置VLAN 间路由有哪两项要求?(选择两项。
)每个子接口都应配置有自己的IP 地址、子网掩码和唯一的VLAN 分配。
路由器的物理接口必须连接到相邻交换机上的中继链路。
路由器的物理接口数量应该与VLAN 数量匹配。
应该将不同的静态VLAN 分配给路由器的不同接口。
路由器应该配置为VTP 服务器。
请参见图示。
下列哪两项正确描述了图中所示的路由器配置。
(选择两项。
)在路由器上配置路由协议之前,网络192.168.1.0 与网络192.168.3.0 之间无法成功路由。
路由器子接口上未正确配置VLAN。
该配置适用于单臂路由器网络设计。
路由器子接口上未正确配置中继。
应该为接口Fa0/1 分配IP 地址,否则无法进行路由请参见图示。
下列有关交换机S1 配置的说法中哪项正确?端口Fa0/1 和Fa0/3 使用的是Cisco 专有协议。
已使用switchport mode access命令配置交换机的Fa0/1 和Fa0/3 端口。
思科第一学期期末考试最新考题CCNA

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configurationserver before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?13Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.Destination MAC: 0030.16 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the mausers in the branch office, 28 users in manufacturing, 12 in17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?23Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhib IP address of the primary domain name server used by the host?.3224Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the command.Use the ipconfig command.Use the ipconfig/all command.Use the ping .254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP addressThe session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152. 33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine whic device is responsible for this failure?telnet 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?42Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?46Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, and default gateway should be assigned to this host to allow it to function in the network?IP address:IP address:IP address:IP address:IP address:IP address:49Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。
CCNA第二学期期末考试

1关于数据包通过路由器传输时的封装和解封的表达,以下哪三项是正确的?〔选择三项。
〕路由器修改 TTL 字段,将其值减 1。
路由器将源 IP 更改为送出接口的 IP。
路由器保持一样的源 IP 和目的 IP。
路由器将源物理地址更改为送出接口的物理地址。
路由器将目的 IP 更改为送出接口的 IP。
路由器会从所有接口将数据包转发出去,包括路由器接收数据包时使用的那个接口。
Option 1, Option 3, and Option 4 are correct.2请参见图示。
当数据包发往哪两个网络时需要路由器执行递归查找?〔选择两项。
〕Option 1 and Option 6 are correct.3对于为防止路由环路而通过毒性反转实现的水平分割方法,哪两项表达正确?〔选择两项。
〕所有 Cisco IOS 都会默认启用此方法。
会将一个表示无穷大度量的值分配给路由以将其毒化。
将毒化路由更新发回该更新的发送接口。
指示路由器将可能会影响路由的更改保持一段特定的时间。
限制数据包在被丢弃之前能够在网络中传输的跳数。
Option 2 and Option 3 are correct.4网络管理员在所示网络图中的路由器 B 和 C 上启用了 RIP。
什么命令可防止向路由器 A 发送 RIP 更新?A(config)# router ripA(config-router)# passive-interface S0/0B(config)# router ripA(config)# router ripB(config)# router ripB(config-router)# passive-interface S0/0A(config)# no router rip2 points for Option 45请参见图示。
根据如下列图的输出,以下哪两项陈述是正确的?〔选择两项。
〕所有路由都处于稳定状态。
每条路由都有一个可行后继。
CCNA--期末题2

CCNA复习题一、选择题(每题2分,共80分)1、如下图,两个交换机都使用默认的配置,主机4向主机1发送信息时会使用哪两个目的地址。
(选两个)答案:AFA、主机1的IP地址。
F、路由器R1上的F0/1接口的MAC地址。
2、使用NAT的两个好处是什么?(选择两项)答案:ABA、它可节省公有IP地址。
B、它可增强网络的私密性和安全性。
C、它可增强路由性能。
D、它可降低路由问题故障排除的难度。
E、它可降低通过IPSec实现隧道的复杂性。
3、如下图,对于图中拓扑中vlan之间路由,哪两个选项是正确的?(选两项)答案:DF4、请参见图示,流出R1的流量转换失败,最可能出错的是配置哪个部分?答案:BA、ip nat pool语句B、access-list语句。
C、ip nat inside语句。
D、接口S0/0/2应该拥有一个私有IP地址。
5、以下哪三项是私有IP地址?(选择三项)BCDA、172.16.33.1B、10.35.66.70C、192.168.99.5D、172.18.88.90E、192.33.55.89 F、172.35.16.56、请参见图示。
网络管理员已将192.168.10.0的地址范围分配给网际网络LBMISS,并已使用/29掩码将此地址范围划分为子网,为了满足新建筑的需要,技术人员决定使用第五个子网配置新网络(子网零是第一个子网),根据公司规定,必须始终将第一个可用主机地址分配给路由器接口,并将最后一个可用主机地址分配给工作组服务器。
为了连接到网络,应该在工作组服务器的属性中输入下列哪一项的配置。
答案:CA、IP地址:192.168.10.38 子网掩码:255.255.255.240 默认网关:192.168.10.39B、IP地址:192.168.10.38 子网掩码:255.255.255.240 默认网关:192.168.10.33C、IP地址:192.168.10.38 子网掩码:255.255.255.248 默认网关:192.168.10.33D、IP地址:192.168.10.39 子网掩码:255.255.255.248 默认网关:192.168.10.31E、IP地址:192.168.10.254 子网掩码:255.255.255.0 默认网关:192.168.10.17、路由器接口分配的IP地址为172.16.192.166,子网掩码为255.255.255.248,该IP地址属于哪个子网?答案:DA、172.16.0.0B、172.16.192.0C、172.16.192.128D、172.16.192.160E、172.16.192.168F、172.16.192.1768、如果最多可支持254台主机,网络管理员会为网络地址172.30.1.0分配什么子网掩码?答案:BA、255.255.0.0B、255.255.255.0C、255.255.254.0D、255.255.248.09、下面有关VTP的描述,哪些是正确的? 答案:ABDA、VTP客户模式交换机不能更改本地vlan。
CCNA期末考试题及答案试卷A(仅供参考)

1.下列有关网络层编址的陈述中哪三项是正确的?(选择三项。
)网络层编址使用分层式结构。
使用长度为48 位的地址。
以太网交换机可以使用它来作出转发决定。
它不支持广播。
其使用的编址方法可以识别地址的网络部分。
网络层编址可以区分每台主机。
2请参见图示。
网络中的所有设备均使用默认配置。
此拓扑中存在多少个广播域?3579113请参见图示。
主机B 已断电。
交换机的MAC 表将发生什么变化?MAC 表不会受影响。
交换机会在Fa0/19 上删除MAC 地址。
交换机会保留MAC 地址,直到主机B 再次通电。
交换机将通过为端口Fa0/19 分配地址FFF.FFFF.FFFF 来重建MAC表。
4.请参见图示。
为了使此网络中的主机接入Internet,路由器RT_A 需要提供哪种功能?地址转换DHCP 服务ftpWeb 服务器5.哪三个地址属于私有IP 地址?(选择三项。
)10.0.0.1127.0.0.1150.0.0.1172.16.0.1192.168.0.1200.100.50.16请参见图示。
电缆1 和电缆2 分别按照特定的物理层要求接线。
表中按编号列出了每个网段以及该网段中用来连接网络组件的电缆。
哪三个网段安装的电缆是正确的?(选择三项。
)网段1网段2网段3网段4网段5网段67.OSI 模型的哪两项功能在第2 层实现?(选择两项)物理编址编码路由布线介质访问控制8.请参见图示。
网络管理员想通过Modem1 从PC1 远程访问路由器的CLI。
要实现此访问,应将路由器的哪一个端口连接到Modem2?控制台端口以太网端口辅助端口串行端口9请参见图示。
某学生对5e 类电缆两端的接线方法如图所示。
结果是什么?(选择两项)电缆无法使用,必须重新接线。
该电缆适合作为全反电缆使用。
该电缆适合作为快速以太网交叉电缆使用。
该电缆适合作为千兆以太网直通电缆使用。
该电缆适合在支持Auto-MDIX 的两台100 Mbps 交换机之间使用。
ccna试题

ccna试题一、单选题1. 下面哪个是OSI模型的物理层?A. TCPB. IPC. EthernetD. HTTP答案:C2. 以下哪个是IPv6的全球未经分配地址?A. FC00::/7B. 2000::/3C. 8000::/4D. FFFF::/8答案:A3. 以下哪个在OSI模型的会话层工作?A. HTTPB. IPC. TCPD. NetBIOS答案:D二、多选题4. 下面哪些是用于路由器接口配置的命令?(选择两个)A. ip addressB. mac addressC. interfaceD. enable答案:A, C5. 下面哪些是IP协议的特点?(选择三个)A. 可靠传输B. 无连接C. 不可靠传输D. 面向连接答案:B, C, D6. 下面哪些是TCP的特点?(选择三个)A. 面向连接B. 可靠传输C. 无连接D. 面向字节流答案:A, B, D三、填空题7. TCP/IP协议族中,网络接口层对应的是__________。
答案:网络接口8. 在IPv6地址中,一个冒号表示__________。
答案:前缀和后缀之间的分隔符9. 在TCP连接终止过程中,主动关闭连接的一方发送的最后一个ACK分组中ACK标志位的值是__________。
答案:1四、解答题10. 请简要解释TCP/IP协议族中IP协议的作用。
答案:IP(Internet Protocol)协议是TCP/IP协议族中的一种网络层协议,主要负责在网络之间传输数据包。
它使用IP地址来标识网络上的设备,并通过路由选择算法实现数据包的正确传递。
IP协议是一种无连接的协议,不提供数据包的可靠传输,也不保证数据包按顺序到达目的地。
它使用IP头部来存储必要的控制信息,如源IP地址、目的IP地址、数据包长度等。
11. 请简要描述TCP三次握手的过程。
答案:TCP三次握手用于建立一个TCP连接。
过程如下:1. 客户端向服务器发送一个SYN(同步)分组,其中设置SYN标志位为1,并选择一个初始序列号。
CCNA_第三学期__期末完整版考试

1CCNA 第三学期 期末While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts onthe network? (Choose two.)Replace any existing hubs with switches.Add a Layer 3 device to route between networks.Subnet the existing IP network to create two networks.Increase the backbone speed by three times the current speed.Add additional switches and spread out the number of hosts evenly between them.2What advantage does cut-through switching provide?It enables QoSIt forwards frames quickly.It provides an analysis of frames.It allows reduction of traffic by using error checking to drop corrupt frames.3Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?Cat-ACat-BCat-CCat-D4W hich stackable switch feature allows for interconnection of multiple switches and will provide a cost effective solution for networks that require high bandwidth and high availability?modular line cardsspecial backplane portdedicated gigabyte line portsaggregated FastEthernet ports5Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)The network administrator will be able to configure VLANs of local significance on this switch.VLANs can only be added to the VLAN database on this switch by a VTP advertisement.All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.6Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?Configure VLANs with different VLAN IDs on switch SW2.Reconfigure the trunk port on switch SW2 with static trunk configuration.Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.7Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should beassigned to this new host?192.168.1.22 /28192.168.1.31 /28192.168.1.32 /28192.168.1.52 /28192.168.1.63 /288Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?Only VLAN 1 will be allowed across the trunk.All configured VLANs will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.Only the the management and native VLANs will be allowed across the trunk.Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.9Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?S2 will drop the traffic, unless it is management traffic.S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.S2 will leave the traffic untagged when it forwards it over a trunk link.S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link. 10Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?Allow all VLANs on the trunk link.Remove the native VLAN from the trunk.Include a router or switch with Layer 3 capabilities.Configure the same native VLAN on both ends of the trunk.11Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?This entry can only be removed from the MAC address table by a network administrator.When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.The switch learned this MAC address from the source address in a frame received on Fa0/18.12W hy is MAC address filtering considered a poor choice in securing a WLAN?Available bandwidth is reduced.MAC addresses are easily spoofed.APs are more susceptible to DoS attacks.The payload encryption is easily broken.13How does a switch that is configured for 802.1Q trunking handle untagged frames that are receivedon a trunk port?The frames are dropped.The frames are assigned to the native VLAN.The frames are assigned to the default VLAN.The frames are assigned to the management VLAN.14Refer to the exhibit. Which three options correctly describe the router configuration that is shown?(Choose three.)An IEEE standard trunking protocol is in use.Interface Fa0/1 has been configured with subinterfaces.The shutdown command has been applied to interface Fa0/1.Interface Fa0/1.3 is mapped to the default management VLAN.The configuration is appropriate for a router-on-a-stick network design.An IP address should be applied to interface Fa0/1 for routing to occur.15RSTP is enabled in a switched network that is active and converged. Which switch port type assumesa discarding state on non-root switches?root portedge portalternate portdesignated port16What provides an authentication mechanism for 802.11-based wireless networks?DSSSOFDMSSIDWPA17W hat is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?dynamically assigns a new management VLAN IDautonegotiates IP address information for initial management connectionsallows the use of straight-through patch cables regardless of connected device typesplaces a port immediately in the forwarding state to reduce the time for the spanning tree toreconverge18Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?It will be dropped.It will be forwarded out port Fa0/5 only.It will be forwarded out ports Fa0/5 and Fa0/10.It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.19Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem?The RSA key has been removed.SSH has been configured on the wrong line.The transport input command is applied incorrectly.The domain name has been configured in the wrong configuration mode.20Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?The link between the switches is up but not trunked.The Fa0/11 interface of Switch1 is not configured as a trunk.Hosts B and D are configured with IP addresses from different subnets.VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.21Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?only hosts A and Bonly hosts A, B, and Conly hosts A, B, C, and Donly hosts A, B, C, and E22 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router.What is one important fact that must be considered?The physical interface must have an IP address configured.The subinterface numbers must match the VLAN ID number.The no shutdown command must be issued on each subinterface.The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.23W hat is the purpose of VLAN trunking?It improves network performance by reducing broadcast traffic.It selects the best path to transmit data in a switched network.It carries the traffic of multiple VLANs through a single link.It avoids spanning tree loops in a switched network.24Which parameter is used to uniquely identify one wireless network from another?SSIDOFDMWEPDSSS25W hich layers should support QoS in a hierarchical network?only the distribution and core layersonly the access and distribution layersthe access, distribution, and core layers26Refer to the exhibit. What does "FORWARDING" mean in the command output shown?The switch is sending and receiving data frames.The switch is receiving BPDUs, but not sending data frames.The switch is participating in an election process by forwarding the BPDUs it receives.The switch is receiving BPDUs and populating the MAC address table, but not sending data.27Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other.Based on the router configuration, what is causing the problem?Interface Fa0/0 is missing IP address configuration information.IP addresses on the subinterfaces are incorrectly matched to the VLANs.Each subinterface of Fa0/0 needs separate no shutdown commands.Routers do not support 892.1Q encapsulation on subinterfaces.28Which switch forwarding method should be used on a network that employs frame classification based on an assigned Quality of Service (QoS) value?cut-throughfast-forwardfragment-freestore-and-forward29Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?Replace S1 with a router that has one FastEthernet interface for each PC.Add a second switch and divide the PCs so that each VLAN is connected to its own switch.Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.30Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8switchport command to check the status of the port. What can be concluded from the output?Port Fa0/8 is configured as a trunk with 802.1q encapsulation.Port Fa0/8 is configured as a trunk in VLAN 1.Port Fa0/8 is configured in access mode and associated with VLAN 1.31What will be the effect of the command S1# copy system:running-configtftp://172.16.2.155/tokyo-config?The IOS will be copied to the TFTP server.The configuration file named tokyo-config will overwrite the startup configuration file on S1.The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.32W hich three statements are correct concerning the default configuration of a new switch? (Choose three.)It is configured in VTP server mode.STP is automatically enabled.The first VTY line is automatically configured to allow remote connections.VLAN1 is configured with a management IP address.All switch ports are assigned to VLAN1.The enable password is configured as cisco.33Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now amember of VLAN 1.34Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2.What could be the reason for this?The VTP configuration revision is different on both switches.The VTP domains are different on both switches.VTP pruning is disabled.VTP v2 is disabled.35Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electricalIncrease the distance between the clients.Change the channel on AP-B to 6 or 11.Place AP-A and AP-B on the same wireless channel.36I n which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?clientrootservertransparent37Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks.Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?Increase the capacity of the distribution and core trunk links to 10 Gb/s.Use Layer 3 switching on the core switch.Implement Rapid Spanning Tree Protocol.38Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?Rename VLAN1.Connect one more port of S1 to R1.Configure the Fa0/1 port of S1 as a trunk port.Move the Fa0/0 interface of R1 to another VLAN.39What is a result of improperly implementing a network with redundancy at Layer 2?an increase of unicast and multicast errors at Layer 3a decrease in the amount of broadcast trafficend device malfunction because of broadcast storms40W hy is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?The network diameter limitation is 9.BPDUs may be discarded because of expiring timers.The cabling distance between the switches is 100 meters.The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.41Refer to the exhibit. A network administrator needs to add IP phones to the network. To whichdevices should the IP phones connect?AS1 and AS2DS1 and DS2DS1, DS2, and CS1AS1, AS2, DS1, and DS242Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?Core_S1Access_S2 and Access_S3Core_S1, Access_S2, and Access_S3Core_S1, Access_S2, Access_S3, and R143Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?The port will transition into blocking state.The port will transition immediately into forwarding state.The port will transition into blocking state and then immediately into forwarding state.The port will transition into blocking state and immediately transition through the listening and learning states.44A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?All previously learned MAC addresses are lost.The switch reverts to non-sticky dynamic learning.Connected hosts are no longer able to communicate with the switch.Previously learned sticky addresses are retained in the switch configuration.45The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)Reset the VTP counters.Configure VTP version 1 on the switch.Configure the VTP mode of the switch to transparent.Verify that the switch has a higher configuration revision number.Configure the switch with the same VTP domain name as other switches in the network.46Which statement regarding the service password-encryption command is true?The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.47Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?Hub AHubs A and BHubs A and CHubs A, B, C, and D48 A wireless LAN access point will convert traffic between which two frame encapsulation types?802.1 and 802.11802.3 and 802.11802.3 and 802.16802.5 and 802.1649I n the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge?root primarypriority 8192priority 2048spanning-tree mode rapid pvst50Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student hasdecided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?The Fa0/7 port of STW will be shutdown.The student will gain full access to the Internet.Both the teacher and student will be able to receive data but only the teacher will be able to send.The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.51Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?All the VLANs were pruned from the trunk port between SW1 and SW2.SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.。
ccna测试题及答案

ccna测试题及答案CCNA测试题及答案一、选择题1. 在Cisco设备上,以下哪个命令用于查看当前的路由表?A. show ip routeB. show running-configC. show interface statusD. show version答案:A2. 以下哪个协议用于在网络中自动发现其他设备?A. ARPB. CDPC. ICMPD. TCP答案:B3. 以下哪个命令用于配置Cisco设备上的接口?A. configure terminalB. interfaceC. ip addressD. hostname答案:A二、填空题4. 在Cisco设备上,使用命令_________可以查看接口的配置信息。
答案:show interface5. 静态路由配置中,_________命令用于指定下一跳地址。
答案:ip route6. 动态路由协议可以自动适应网络变化,其中_________是最常见的一种。
答案:RIP(路由信息协议)三、简答题7. 请简述VLAN(虚拟局域网)的作用。
答案:VLAN是一种将局域网内不同物理位置的设备划分为同一逻辑网络的技术,主要用于隔离广播域,提高网络的安全性和效率。
8. 描述交换机和路由器在网络中的基本功能。
答案:交换机主要用于局域网内部,通过MAC地址表来转发数据帧,实现数据包在局域网内的快速交换。
路由器则工作在网络层,使用IP地址来转发数据包,连接不同的网络,并进行路径选择。
四、计算题9. 假设一个子网掩码为255.255.255.192,计算这个子网的可用IP地址范围。
答案:可用IP地址范围为192.168.1.0到192.168.1.62(包含两端)。
五、实验题10. 请根据以下配置文件,列出Router1的接口配置信息。
```Router1show running-configinterface FastEthernet0/0ip address 192.168.1.1 255.255.255.0duplex autospeed auto!interface FastEthernet0/1no ip addressshutdown!interface Serial0/0/0ip address 10.0.0.1 255.255.255.252clock rate 64000!router ospf 1network 192.168.1.0 0.0.0.255 area 0network 10.0.0.0 0.0.0.3 area 0!```答案:- FastEthernet0/0: IP地址为192.168.1.1,子网掩码为255.255.255.0,双工模式和速度均为自动。
CCNA期末考试答案(网络安全技术练习题)

1. 半连接攻击属于()A.溢出攻击 B.嗅探攻击 C. 注入攻击 D.拒绝服务攻击2. TCP三次握手中用到的标志位是()A. FINB. SYNC. RSTD. PSH3. 下列关于对称加密算法和非对称加密算法的说法中正确的是()A.对称加密速度较慢B.对称加密可以实现数据的不可否认性C.非对称加密速度较慢D.非对称加密的密文是紧凑的4 以下不支持认证功能的路由协议是()A. EIGRPB. Ripv1C.ospfD. Ripv25. 以下哪一项不属于保护路由器的有效方法()A.开启日志服务并建立日志服务器B. 部署NTP服务器实现时钟同步C.关闭路由器上的CDP服务D. 启用端口安全6.以下关于SSH的说法正确的是()A.SSH采用对称加密算法B.SSH未对数据加密C.SSH采用非对称加密算法D.SSH一般用于内网发起的管理行为7. AAA不包含哪一层含义()A.认证B.过滤C.授权D.记账8.以下哪一项是思科的私有协议()A.radiusB.802.1qC.tacacs+D.ipsec9.通过访问控制列表防范分片攻击需要在语句后加关键字()A.establishedB.fragmentC.logD.reflect10.以下哪一项是基于异常的IDS监测模式的缺点()A.不能抵御新型攻击B.特征库更新速度制约使用效果C.不会错报D.容易错报漏报11. 以下关于IDS与IPS说法正确的是( )A. IDS一般部署在网络出口主干链路上B.IDS能够阻断发现的攻击行为C. IPS一般根据特征库来检测攻击行为D.IPS不能阻断发现的攻击行为12. 以下不能起到防火墙作用的技术是()A.IDSB.ACLC.NATD.代理服务器13.以下关于MD5的说法正确的是( )A.md5是一种加密算法B.md5用于保障数据的机密性C.md5是可逆的D.md5用于保障数据的完整性14. 为恢复路由器登录密码,需把寄存器值改为()。
CCNA期末考试复习题(1)

CCNA期末考试复习题一、选择题1 、图示的网络中有多少个冲突域?A 1B 2C 3D 6E 72、如图所示网络,交换机都是默认配置。
主机A需要和主机D通信,但是主机A没有默认网关的MAC地址。
哪些主机将收到主机A发出的ARP请求?A 只有主机DB 只有路由器R1C 只有主机B和CD 只有主机B,C和DE 只有主机B,C和路由器R13、如图所示,主机A属于哪个子网?A 10.197.0.0B 10.192.0.0C 10.197.184.0D 10.197.187.0E 10.197.187.1684、248表示为二进制形式是:A 11101000B 11110100C 11111000D 111110105、10BASE-T指哪种线缆?A 10Mbit/s传输速度,基带信号,线缆长度500M,同轴线B 10Mbit/s传输速度,宽带信号,线缆长度100M,同轴线C 10Mbit/s传输速度,基带信号,线缆长度100M,双绞线D 10Gbit/s传输速度,宽带信号,线缆长度500M,双绞线6、如图所示,网络管理员希望创建一个子网用于两个路由器点对点连接。
哪个子网掩码可以给点对点连接提供足够的地址,且浪费又最少?A 255.255.255.192B 255.255.255.224C 255.255.255.240D 255.255.255.248E 255.255.255.2527、如图所示,主机A希望发送一个消息给主机B。
请将下列步骤排列为正确的顺序,使得消息能够发送出去。
A——添加网络层地址B——发送比特C——创建应用层数据D——添加数据链路层地址A B—A—D—CB D—A—C—BC A—D—C—BD C—A—D—BE C—D—A—BF C—B—A—D8、一个C类网络192.168.35.0使用/28的掩码划分子网,可用子网个数及每子网的可用主机数分别是多少?A 6 子网/64主机B 14 子网/32主机C 14子网/14主机D 30子网/64主机9、哪种协议用来消灭交换环路?A TCPB RIPC STPD IGRPE IP10、因为无法ping通本地路由器,技术人员决定查看一下路由器。
思科CCNA第三学期期末考试完整版

参加考试-ESwitchingFinalExam-CCNAExploration:LAN交换和无线(版本4.0)以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSIDOFDMWEPDSSS分层网络模型具有哪三项优点?(选择三项。
)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化在将Catalyst交换机迁移到其它VTP管理域之前,应该进行哪三项任务?(项。
)选择正确的VTP模式和版本。
使用新管理域的名称配置交换机。
从新域中的VTP服务器上下载VTP数据库。
配置新域内的VTP服务器,使其识别该交换机的BID。
重置VTP计数器,使交换机可与新域内的其它交换机同步。
检验交换机的配置修订版号是否比新域内的其它交换机的低。
下列哪两种说法正确地描述了生成树协议?(选择两项。
)它只在第2层使用。
它在交换机上配置。
它消除了网络拓扑中的第2层环路。
它限制了端口上所允许的有效MAC地址的数量。
它使VLAN信息得以传播到网络中的其它交换机。
下列哪种方法可建立用于配置LinksysWRT300N无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。
以物理方式连接到接入点,然后重新启动计算机以启动配置软件。
在接入点所在的IP子网内的计算机上的web浏览器中输入接入点的默认址。
修改与接入点连接的计算机的TCP/IP属性,使其与接入点处于同一个然后重新启动计算机以建立连接。
请参见图示。
源地址并非0019.d2e4.d9f7的帧进入接口Fa0/24时会发生什么Fa0/24会变为error-disabled(错误-禁用)状态。
传入帧会被丢弃。
Fa0/24端口LED会关闭。
安全违规计数会增加。
可采用哪两种方法删除交换机的MAC地址表中的条目?(选择两项。
)关闭交换机电源并再次打开以清除所有动态获知的地址。
可采用clearswitching-tables命令删除静态配置的条目。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1、要求:
(1)VTP域名为benet;密码为123;启用修剪;
(2)配置2台3层交换机为VTP的server模式;配置2层交换机为VTP的client模式;
(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生
成树根网桥;在2层交换机上配置速端口与上行速链路;
(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路
由,指向10.1.1.1/24;
(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的
EthernetChannel;
(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议
(1)(2)
○1SW1-3L 配置vtp域名benetpassword 123 Server模式
SW2-3L同样配置
○2SW1-3L启用修剪SW2-3L同样配置
○3SW3-2L配置vtp的client模式、SW4-2L、SW5-3L、SW6-3L相同配置
(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生成树根网桥;在2层交换机上配置速端口与上行速链路;
○1SW-3L-1是VLAN 2-6的生成树根网桥;;
○2设置SW-3L-2是VLAN 7-11的生成树根网桥
○3SW3-2L配置速端口与上行链路,SW4-2L、SW5-2L 、SW6-2L上同样配置
(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路由,指向10.1.1.1/24
○1路由器上配置ip地址
○2路由器上配置默认路由和RIP
○3SW1-3L各vlan的ip地址
○4SW2-3L各vlan的ip地址
(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的EthernetChannel ○1在SW1-3L配置EthernetChannel;
○2在SW2-3L配置EthernetChannel;
(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议○1SW1-3L上配置路由接口
○2SW2-3L上配置路由接口
○3SW1-3L上的RIP配置
○4SW2-3L上的RIP配置
○5在SW1-3L验证RIP
○6在SW2-3L验证RIP
2、要求:
如图所示,四台路由器R1,R2,R3以及R4运行OSPF协议(要求发布各路由器的loopback0地址),R1与R2属于Area1,R2与R3属于Area0,R3与R4属于Area2。
其中区域Area2为NSSA区域,区域Area1为stub区域(不要配置成完全末梢)。
R4路由器中OSPF协议重发布172.16.1.0/24,172.16.2.0/24 rip路由(rip使用v2版本,并将172.16.1.0/24,172.16.2.0/24配置为R4的loopback1和loopback2地址),将serial口封装成ppp模式。
配置四台路由器分别都用各自的LoopBack作为各自的Router ID。
(1)按图示配置路由器,通过ping/tracert命令来验证OSPF网络的连通性○1R1的配置信息
○2R2的配置信息
○3R3的配置信息
○4R4的配置信息
○5R4路由器中OSPF协议重发布172.16.1.0/24,172.16.2.0/24 rip路由配置
○6Ping 各接口ip地址和查看到达10.2.2.2经过的路由
○7查看到达4.4.4.4 所经过的路由
(2)通过show ip route查看各路由器的路由表项。
○1R1的路由表
○2R2的路由表
○3R3的路由表
○4R4的路由表
(3)写出完全末梢区域、末梢区域和NSSA区域和NSSA区域中允许泛洪的LSA类型。
末梢区域
○1R1上的LSA通告类型
○2R2上的LSA通告类型
○3R3上的LSA通告类型
○4R4上的LSA通告类型。