思科认证英文题库350-901
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 and r5.f. create a static route on router r2 (ip route 22.1.1.0 255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to addadditional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to 137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with 200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear asone route to ospf.。
Cisco CCNA 认证考试最新真题
Cisco CCNA 认证考试最新真题体验1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address 10.121.16.8 is the local router port used to forward data.C.102 is the remote DLCI that will receive the information.D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?A.the session layerB.the network layerC.the data link layerD.the access layer3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?A.router(config)# line console 0router(config-line)# enable password ciscoB.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# loginC.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# loginD.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login4. On point-to-point networks, OSPF hello packets are addressed to which address?A.127.0.0.1B.192.168.0.5C.224.0.0.5D.254.255.255.2555. What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported6. During startup, the router displays the following error message:boot: cannot open "flash:" What will the router do next?A.Because of damaged flash memory, the router will fail the POST.B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialogC.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog7. At which OSI layer is a logical path created between two host systems?A.sessionB.transportworkD.physical8. A routing protocol is required that supports:1) routing update authentication2) an addressing scheme that conserves IP addresses3) multiple vendors4) a network with over 50 routersWhich routing protocol fulfills these requirements?A.RIPv1B.RIPv2C.EIGRPD.OSPF9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A.no VLANsB.all VLANsC.only VLANs 1 - 6D.only the VLANs that are specified when creating the trunk10. Which protocol provides a method of sharing VLAN configuration information between switches?A.VTPB.STPC.ISLD.802.1QDBDCB CCDBA博主的更多文章>>CCNA第一学期《Final Examination》2009-02-27 08:58:47 标签:CCNA[推送到技术圈]1请参见图示。
Cisco认证实验考试经典题库CCIE_BootCamp3.0
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)137.20.0.0/24 is subnetted, 1 subnets c 137.20.20.0 is directly connected, ethernet 0 172.168.0.0/16 is variably subnetted, 7 subnets, 2 masks o ia 172.168.30.0/24 [110/65] via 172.168.100.3, 00:09:03, serial 1.1 i 172.168.40.0/24 [100/8576] via 172.168.200.2, 00:01:11, serial 1.2 o ia 172.168.60.0/24 [110/1572] via 172.168.65.1. 00:09:03, bri0 c 172.168.65.0/24 is directly connected, bri0 c172.168.100.0/24 is directly connected, serial 1.1 o172.168.100.0/24 [110/64] via 172.168.100.3, 00:09:13, serial 1.1 c 172.168.200.0/24 is directly connected, serial 1.2 o e1 192.168. 21.0/24 [110/21] via 137.20.20.1.00:09:03, ethernet 0 o e1 192.168. 17.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o e1 192.168. 70.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o*e10.0.0.0/0 [110/21] via 137.20.20.1. 00:09:03, ethernet 0r5#show ip ospf int bri0 bri0 is up, line protocol is up (spoofing) internet address 172.168.65.2/24, area 10 process id 1, router id 172.168.200.1, network typepoint_to_point, cost 1562 run as demand circuit donotage lsa allowed. transmit delay is 1 sec, state point_to_point,timer intervals configured, hello 10, dead 40, wait 40, retransmit 5 hello due in 00:00:06 neighbor count is 1, adjacent neighbor count is 1 adjacent with neighbor172.168.100.6 (hello suppressed) suppress hello for 1 neighbor(s) r5#show dialer bri0 – dialer type =isdn dial string successes failures last called last status 4930622 1 0 00:08:45 successful 0 incoming call(s) have been screened 0 incoming call(s) rejected for callback bri0:1 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle bri0:2 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle r5# now go back to router r7 and bring up router r7’s interface s4 again 3. ipx configuration –15 pts (1 hour) a. configure all the active interfaces, including loopbacks, on routers r1, r2, r3, r5, r6, and r8 for ipx. b. configure router r8 and the lan interfaces on routers r3, r4, r5 and r6 for ipx rip. c. configure router r1 & r2 for ipx nlsp. d. configure the serial interfaces on the rest of the routers for ipx eigrp( not routers r1& r2 these oly use nlsp), also make the ethernet interface on router r2 ipx eigrp only. e.configure the bri0 interfaces on routers r5 & r6 as ipx rip. f. after this point you should be able to see all the ipx networks in all the routers routing table. test connectivity with ipx ping.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第九章)j. make the default route on r2 appear in he routing table of all the other routers. k. configure routers r1, r2’ss1, and router r8’s ethernet interface e0 for eigrp. configure router r8’s interface to0 for rip. l. redistribute all routers between all routing protocols such that all routes are visible in all routers and every router can ping each other’s ip interfaces (even the loopback on r2) as shown on the lab diagram lab 5a. m. make sure that all ospf external routes appear as type-1, verify your routes. are the routes appearing in the correctly routing protocol? n. configure router r5 such that the only route on r6 for the 137. 20.0.0 network appears exactly as follows; o 137.20.20.0 [110/65] via 172.168.100.5,00:51:03, serial 1. hint pay attention to the underlined value 65. o. configure routers r3 & r4 to resolve dns namesusing dns servers 207.238.183.71 &207.238.183.72. 2. ospf demand circuit –15 pts (1 hour) a. use network172.168.65.0/24 for the isdn interfaces on routers r5 &r6 and ass them to ospf. configure routers r5 & r6 to use the isdn interfaces for restoral[ 恢复]. the isdn link should only come up when you administratively shutdown the serial 4 interface on router r7, and there is interesting traffic trying to get between routers r5 & r6 (i.e. use ping as the interesting traffic to test. make sure you test from router r6 and from router r5. see the router ports/configuration into online for the phone #’s, spids, and switch type if you are using our remote racks. configure the isdn link so that it will shutdown 45 seconds after an inbound or outbound ping packet. both routers should shave full ospf routes when the frame link is functional or not. you are required to use ospf demand-circuit as your solution here, after the initial isdn call to synchronize ospf, your isdn interfaces should stay down unless you break the frame connection between r5 and r6 and there is interesting traffic. now go to router r7 and shut down interface s4, your isdn connection should kick in and provide a backup path for router r6 to reach the rest of the network, butonly when there is data to send. ospf router updates should not keep the isdn up. pretend [假装]your isdn line is charged at $5 per minute and it comes out of your check. at this point when router r7’s interfaces s4 (your frame connection) is still down. router r5 should have the following displays for:”show ip route”, “show ip ospfint bri0”, and “show dialer”notice that the isdn connection is down and router r5 has a routing table with ospf entries using interface bri0 to get to router r6’s ethernet network, and is suppressing ospf hellos for 1 neighbor. also pay attention to the ospf dead time on r5’s bri0 interface. output from router r5 r5# show ip route codes: c- connected, s-static i- igrp, r-rip, m-mobile, b-bgp, d-eigrp, ex-eigrp external, o-ospf, ia-ospf inter area, n1-ospf nssa external type 1, n2- ospf nssa external type2, e1- ospf external type 1, e2- ospf external type 2 e- egp i- is-is, l1- is-is lever-1, l2- is-is level-2, *- candidate default, u- per-user static route, o- od gateway of last resort is 137.20.20.1 to network0.0.0.0Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 andr5.f. create a static route on router r2 (ip route 22.1.1.0255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear as one route to ospf.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第七章)d. routers r1, r3 and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with a 9-bit subnet mask on its ethernet interface.(the mask should be 255.255.128.0) sue subnet-zero here.g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface. (the mask shouldbe 255.255.0.0)i. use network 11.1.x.x 255.255.0.0 between routers r5 &r6.2. ospf & other ip routing configuration –35 pts (1hous 30 mins)a. configure ospf area 0 on the frame-relay interfaces between routers r1,r3, and r5.b. place router r1’s ethernet in ospf area 1. place router r3’s interface to 0 in ospf area 2.c. place router r3’s interface serial 0, and all of router r4 in ospf area 3. make ospf area 3 a totally-stubby area.d. place r5 and r6 ethernet interface in ospf area 4. make this ospf area a nssa (not-so-stubby-area) make the default cost 20.e. configure router r6’s interface serial 0 and routerr8’s interfaces s0, e0,and loop 0 for eigrp.f. place router r2’s interface serial 0 and router r1’ss0.1 in ospf area 5.g. redistribute all routes so that you can see all routes and ping from everywhere.h. summarize the routers for router r8’s interface e0, loop0, and s0 that were redistributed into ospf by routerr6 on router r5 so that all of router r8’s networks appear as one route to the rest of the ospf routers except r6.i. when you redistribute eigrp into ospf make these routes appear as type-1 external routes.j. configure router r2 such that it propagates a default route the other ospf routers.k. create a second loopback interface on router r2 with an address of 20.1.1.1/24. make sure you can ping the second loopback interface on router r2 from other the routers.l. create two loopbacks on router r3 with networks that could contain at most 30 hosts. place the loopbacks onrouter r3 in one area and summarize such that one route appears for both loopacks.m. place the ethernet interface on router r2 in area 10. n. configure simple password authentication in ospf area 4. o. use the ip ospf priority command on router r5 to make it become the dr for ospf area 4.p. change the cost on router r5’s interface e0 using an ip ospf command to make it appear as 100mbps as it relates to ospf metrics.q. change the cost on r6’s e0 without using an ip ospf command to make it appear as 100mbps as it relates to ospf metics.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第六章)d. configure two static saps on router r3. filter on router r5 such that routers r6 and r8 only see one of the saps.e. disable ipx on the between routers r3 &r4 all routes should still be seen by all routers running ipx.f. change the frequency of the rip updates across the r3-r4serial connection to once every 2 minutes.g. configure router r1’s ethernet with ipx 802.2 and 802.3 raw frame types.h. configure routers r3 and r4 to pass ipx netbios type-20 broadcasts between their lan interfaces.5. dlsw configuration – 10 pts (45 mins)a. configure dlsw between router r3’s interface token-ring0 and router r4’s interface ethernet 0.b. place router r2’s interface ethernet 0 into the dlsw network. make sure there is connectivity between all lan interfaces.c. configure a filter that blocks netbios packets with destination name ‘cciering1” from leaving router r3’s interface to0.d. setup a filter that would permit only sna traffic between routers r3 & r4.6. bgp configuration – 15 pts (1h)a. configure bgp on router r4 using as number 1. configure bgp on routers r1, r2, r3 and r5 using as number 2. you can only use one neighbor x.x..x.x remote-as 2 command on routers r2 and r5.b. configure two static routes to 172.168.1.0/24 and172.168.2.0/24 using the command ip route 172.168.1.0255.255.255.0 null 0 on router r4, redistribute the second route into bgp using the route-map command.c. make sure that router r5 can see the 172.168.2.0 route.d. setup router r8 with bgp in as number 3. on router r8 use the loopback interface lo0 as the source for its bgp connection to as2. make sure router r8 can see the specific 172.168.2.0 route, and not the aggregate 172.168.0.0you have completed lab 3. compare your configurations to the ones we provided. often there si more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations too.lab4at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration -10pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1,r2,r3, and r5 over the frame-relay. configure router r1 using sub-interfaces. configure routers r2.r3, and r5 without using sub-interfaces.c. use only frame-relay pvc on routers r2, r3 and r5. the recommended dlci numbers 102.201.103.105, and 501 are indicated on the network diagram.Cisco认证实验考试经典题库CCIE_BootCamp3.0(5)i. configure the ethernet interface e0 on router r4 to bein ospf area 40. j. configure the r5, r6, and r8 ethernet 0 interface to use eigrp. k. configure r8’s interface loop5 as 192.168.100.1/24 and add it to rip l. redistribute routes between all protocols such that router r1 can ping any interface. m. configure 2 loopbacks interfaces onrouter r8 with 10.1.1.1/24 & 10.1.2.1/24. add there to rip and redistribute rip to eigrp. summarize such that allrouters only see one route to the loopback interfaces. test connectivity to loopback interface via ping. n. filter such that router r6 can ping the loopbacks on router r1, but not the ethernet interface on router r1. the route for the ethernet on router r1 should still be visible and all other traffic such as telnet should still pass unfiltered. o. filter on router r5 such that routers r1 r2, r3, and r4, don’t see the route to router r8’s interface loopback 5. p. create three loopback interfaces on router r8 and use 160.10.10.1/24 for loopback 2, q. 161.10.10.1/24 for loopback 3, and 170.10.10.1 for loopback 4. now summarize the three loopback networks into one route. when done router r1 should see only one route for these three loopback interfaces ana should be able to ping all three of them. hint, the route may not look like what you think. 3. ntp & access-list & other tasks -15 pts (30 mins) a. configure ntp between routers r2 &r3. make r2 the time source. set the correct time and date on router on router r2. set the time-zone on routers r2 & r3, verify that router r3 has synced with router r2 via ntp. b. configure queuing on router r3’s s0 interface such that telnet, ip, ipx, and everything else use 25% of the bandwidth each.configure the queuing such that none of the traffic defined at 25% above uses more than 1000 bytes per time slice. you are allowed to exceed 1000 bytes per time slice only if there is part of a remaining individual packet that needs to be emptied from the queue. c. configure the frame-relay interface on router r2’s interface so such that ip is discard eligible on the frame. d. create the following 6 static routes on router r6; suing the cisco ios command ip route 192.168.x.0 255.255.255.0 null 0. use the number1,2,3,4,5 and 6 for the variable x. redistribute the static routes such that they are seen by all the other routers. now filter on router r5 using any method that use an access list so that only the even routes (i.e. x=2,4,and 6) are seen past router r5 towards the ospf network. your access-list can only have two lines in it, not seven for this exercise. all the 192.168.x.0 routes must still be seen in router r5’s routing table.4. ipx configuration – 20 pts (1h) a. configure all interface(including loopbacks ) for ipx b. configure ipx eigrp on the nbma frame-relay network c. configure ipxrip/sap everywhere else.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第四章)n. filter on router r5 such that the bgp route to null0 defined on router r4 isn’t seen on routers r6 &r8. o. hint the object of this bgp section is to provide end-to-end connectivity between all routers and interfaces. in this exercise you are not allowed to configure igp or two-way static route connectivity between routers r5 & r6, bgp should be providing the necessary routing information. you are allowed to setup a default route on router r6 to point to router r5. now that you have completed lab 2 check., the routing tables on all routers. do they make sense? ping all interfaces from all routers. can you ping everywhere? do the appropriate routers see the static route to null0 on r4 via bgp? go to every router and ping every interface. if you can’t ping everything you are not done yes. you have completed lab 2. compare your configuration to ones we provided. often there is more than one to complete a task so your configurations may be different than ours. if your configurations are different than ours make sure you understand how to complete the lab with our configurations too lab 3 at the end of this lab verify connectivity to allports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks. 1. initial configuration -5 pts (30 mins) a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks. b. configure lab 3 network using network 137.20.x.x c. create a loopback interface on router r2 with 172.168.32.1/24. d. connect routers r1,r2, r3, and r5 over frame-relay cloud. e. configure router r1 using sub-interfaces. f. configure router r2 without using sub-interfaces or frame-relay map commands. g. put routers r1 &r2 frame-relay interfaces on one subnet and routers r1, r3, and r5 on a different subnet. 2. ospf & other ip routing configuration -35 pts ( 2 h) a. configure ospf with the frame-relay cloud in ospf area 0 b. configure the r3-r4 serial connection to be in area 1. c. set the ring-speed on router r3 to 16 mbps. d. configure the loopback interface on router r2 in adifferent ospf area. e. configure the lan interfaces onrouters r1, r2,and r3 to be in different ospf areas. f. configure two loopbacks on router r3 using subnets thatwill contain at most 30 host ip addresses. g. configure two loopback interfaces on router r1 using subnets that will contain at most 14 host ip addresses. h. summarize the two loopback interfaces on routers r1 and r3 such that routerr2 only sees one route from each.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第三章)k. configure router r6 for ospf with a different process id than used thus far. do not configure r6’s e0 for ospf. l. configure router r8 to be in the same ospf area as routerr6. put router r8’s interface e0&lo0 into the ospf routing process. configure router r6 so that its s1 interface speed is correctly reflected in the ospf metrics without using the “ip ospf cost xxx” command. m. configure ospf message-digest authentication between routers r6 & r8. n. change the ospf hello interval between routers r6 & r8 to 45 seconds. o. configure router r8 suing the “ip ospf cost” command such that the speed of the link forinterface s0 is correctly reflected in the ospf metrics. p.change the ospf transmit interval delay to 10 seconds between routes r6 & r8. q. add a default route to router r2 that points to 137.20.20.2. configure one static route on router r2 so that full connectivity to r4’s interface e0 is available. you will notice that the default gateway of router r2 has a lower administrative cost than the one learned via router r1. as a result, the other default route never makes it in the routing table for router r2. r. you will notice that r2 can’t ping the serial interfaces between routers r3 & r4. fix this problem by only making changes to router r3 without static routes. 3. bgp configuration -15 pts (1 hour) a. configure router r4 in bgp autonomous system 1. b. create a static route to null0 router r4 and redistribute into bgp. c. create a loopback interface on r4 and add its network to bgp d. when adding the first loopback to bgp use a class a address with a 24-bit mask. the network that was added to bgp from the first loopback address should appear in the routing table of other routers as “ b 44.1.1.0…” e. create another loopback on router r4 with a class a address and put this network into rip and redistribute rip into bgp. f. configure router r3 in bgp autonomous system 1 and useinterface loopback 0 as the update source. g. configure routers r1, r2, and r5 in bgp autonomous system 2, only use one neighbor x.x.x.x remote-as 2 command on routers r2, r3. &r5 for autonomous system 2. h. place routers r6 and r8 in bgp autonomous system 3. i. configure bgp authentication between router r6 & r8. j. configure a loopback interface on router r8 and enable rip for this network. redistribute this rip network into ospf. k. redistribute the ospf routing process that contains routers r6 and r8 into bgp. l. you are not allowed to add any static routes to routerr8 during this exercise. m. configure router r6 such that all bgp routes learned from router r5 have a local preference of 300.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第二章)lab 2at the end of this lab verify connectivity to all ports. you should be able to ping every interface from and router. (don’t worry about being able to ping a local frame-relayinterface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration – 5 pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1, r2, r3, and r5 over the frame-relay cloud. configure router r1 using sub-interfaces. configure routers r2, r3, and r5 without using sub-interface.c. use only one frame-relay pvc on routers r2, r3, and r5, the recommended dlci numbers 102,201,103, 301,105, and 501 for the frame-relay pvc’s are indicated on the network diagram.d. routers r1,r3,and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfacese. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface ( the mask shouldbe 255.255.0.0)2. ospf configuration –30 pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between routers r1, r3 and router r5.b. place router r1’s ethernet in ospf area 1. place router r5’s interface e0 in ospf area 0.c. setup a default static route (default gateway) from r3to r4. redistribute this default static route into ospfwith a metric-type of 1 and a metric of 500.d. configure router r3’s serial 1 interface as173.168.40.1/24 and router r4’s serial 0 interface as172.168.40.2/24.e. configure router r4’s e0 interface as 200.100.100.1/24.f. configure a default gateway on router r4 to route all packets for which it has no routes to router r3.g. configure two loopback interfaces on router r3 with networks that could have at most 254 hosts and put themboth in the same ospf area, but different from ospf area 0. summarize this route into ospf so that the two subnets appear as one route.h. configure router r2 for eigrp and put all interface in the routing process.i. configure router r1 with eigrp and redistribute with ospf. set the metric type to type-1 when you redistribute from eigrp to ospf. also, redistribute ospf into eigrp.j. configure router r1 so that it only listens to eigrp updates on e0 and s0.2.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第一章)1- day format version 3.002- policy routing frame relay ospflab#1network learning, inc. r&s ccie practice lab 1 version2.00 1-day versionat the end of this lab verify connectivity to all ports. you should be able to ping every interface form any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are askedto filter packets, routers or other specific tasks.)1. initial configuration – 5 pts (30 minutes)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram.b. configure router r7 as a frame-relay switch. refer to the diagram for interface connections to other routers connected to router r7.c. connect routers r1,r2, r3, and r5 over the frame-relay cloud. configure router r1’s s0 interface as a sub-interface. configure r2,r3, and r5 without using sub-interfaces. use only one frame-relay pvc on routers r2, r3, and r5. the recommended dlci numbers 102, 201,103,301,105, and 501 are indicated on the lab diagram.d. routers r1, r2, r3, and r5 should share network10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)f. make sure all the ethernet interfaces are in their own broadcast domain if you are using an ethernet switch for your ethernet connections.2. ospf configuration –25pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between r1, r2, r3, and r5.b. configure router r1’s interface ethernet 0 for ospf area 1c. configure router r2’s interface e0 for ospf area 10d. configure router r3’s interface s 1 and all of router r4’s interface for ospf area 3.e. configure router r5’s interface e 0 for ospf area 4.f. create two loopback interface on r4 and put both of the associated subnets on these interfaces in ospf area 44.g. summarize the (2) loopback interface you just created on router r4 so they appear as one route to the rest of the ospf routers in your network..h. here is the tricky part. you can’t use the command ip ospf network xxxx anywhere in your router configurations.i. redistribute the default route on router r2 as type-1 with a metric of 100. this route is already part of the initial configurations we provided for you.j. also, one of the problems in this lab can be solved with multiple frame map ip statements, but that is not the solution we want you to use, solve the problem with。
CCNA Study Notes1(1)-思科认证试题
CCNA Study Notes1(1)-思科认证试题1. Identify and describe the functions of each of the seven layers of the OSI reference model. Physical LayerThe physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and the physical connectors to be used.Data Link LayerThe data link layer provides reliable transit of data across a physical network link. Different data link layer specifications define different network and protocol characteristics, including the following:Physical addressing --Physical addressing (as opposed to network addressing) defines how devices are addressed at the data link layer.Network topology -- Data link layer specifications often define how devices are to be physically connected (such as in a bus or a ring topology).Error notification -- Error notification involves alerting upper layer protocols that a transmission error has occurred.Sequencing of frames --Sequencing of data frames involves the reordering of frames that are transmitted out of sequence.Flow control -- Flow control involves moderating the transmission of data so that the receiving device is not overwhelmed with more traffic than it can handle at one time.The Institute of Electrical and Electronics Engineers (IEEE) has subdivided the data link layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).Network LayerThe network layer provides routing and related functions that allow multiple data links to be combined into an internetwork. This is accomplished by the logical addressing (as opposed to the physical addressing) of devices. The network layer supports both connection-oriented and connectionless service from higher-layer protocols.Transport LayerThe transport layer implements reliable internetwork data transport services that are transparent to upper layers. Transport layer functions typically include the following:Flow control -- Flow control manages data transmission between devices so that the transmitting device does not send more data than the receiving device can process.Multiplexing -- Multi。
思科CCNA考证习题答案
1. what could be possible causes for the "Serial0/0 is down"interface status? 这可能是为“Serial0 / 0的可能原因是向下”接口的状态?TWOA.a layer 1 problem exists.1层存在问题D.an incorrect cable is being used。
2.before installing a new,upgraded version of the ios,what should be checked on the router,and which command should be used to gather this information?在安装一个新的,升级的IOS版本,应该怎样检查路由器上,并命令应该被用来收集这些资料?B.the amount of avaiable flash and ram 缴费的闪存和RAM的数量D.show version 显示版本3.refer to the exhibit. which two statements are true about inter VLAN routing in the topology that is shown in the exhibit?(choose two)指展览。
这两个语句是对国际米兰的是在展会上展出的拓扑路由的VLAN是否属实?D. the FastEthernet 0/0 inerface on router1 must be configured with subinterfaces.关于路由器1的在FastEthernet 0/0 inerface 必须配置子接口F.the FastEthernet 0/0 interface on router1 and switch2 trunk ports must be configured using the same encapsulation type. 对在FastEthernet 0/0 接口上路由器1和交换器2中继端口必须配置使用相同的封装类型。
Cisco认证模拟题
Cisco认证模拟题篇一:思科认证CCNP经典试题第一部分填空题1、在Cisco体系的IGP协议中,RIP的A-D管理距离是,EIGRP的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。
BGP从EBGP学习到的路由学到路由的A-D管理距离是; BGP 从IBGP学习到的路由学到路由的A-D管理距离是。
2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP 从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP的默认本地优先级为:。
3、BGP的邻居分为和。
4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。
如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。
5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是。
(没有/10的写法)8、在选择STP的角色(身份)有哪些?默认STP的收敛时间为配置了portfast后,收敛时间会小于。
9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP发送hello包组播地址是;VRRP发送hello包的组播地址是。
10、目前以太通道最多可以使用通道方式有。
11、BGP在EBGP中使用AS间的环路(确保无环),该属性属于BGP的必遵属性,其中还有哪两个是BGP公认必遵属性为和。
第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IPCEFFIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2BK3,K4C、K1,K5D、K1,K33、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。
CCNA英文试题_(含答案)
1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。
CCIE模拟考试题_思科认证考试.doc
CCIE模拟考试题_思科认证考试1.What statement is FALSE with respect to the operation of Unidirectional Link Detection?A. It negotiates the Unidirectional Link Detection link state during physical signaling.B. It performs tasks that autonegotiation cannot perform.C. It works by exchanging protocol packets between the neighboring devices.D. Both devices on the link must support Unidirectional Link Detection and have it enabled on respective ports.2.What is true concerning Traffic contract, Traffic shaping, and Traffic policing in ATM networks?A. They are parameters of PNNI set during PNNI configuration.B. They are forms of QoS features used in ATM networks.C. They are types of SVCs.D. They are types of PVCs.E. They are only used between ATM switches to control traffic flows.3.Which are the primary reasons to use traffic shaping? (Select two)A. To control the maximum rate of traffic transmitted or received on an interface.B. To control access to available bandwidth.C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits.D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets.E. To ensure that traffic conforms to the policies established for it.4.In a bridged network running IEEE 802.1d spanning tree, what parameter will a bridge take form the root bridge?A. MaxageB. Forwarding delayC. Hello timeD. All of the above5.What statement is FALSE concerning the use of SPAN on the Catalyst 6500?A. It is possible to configure SPAN to have a Gigabit port, such as source port, and a 10/100 port as the destination port.B. If the source port is configured as a trunk port, the traffic on the destination port will be tagged as well, regardless of the configuration on the destination port.C. When a SPAN session is active the destination port does not participate in Spanning Tree.D. With SPAN an entire VLAN can be configured to be the source.E. In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN.。
思科认证(cisco)题4
301.One of the differences between Kerberos and KryptoKnight is that there is:a. a mapped relationship among the parties takes placeb. there is a peer-to-peer relationship among the parties with themselves.c. there is no peer-to-peer relationship among the parties and the KDCd. a peer-to-peer relationship among the parties and the KDCAnswer: D302.Which of thfoloing centralizdaccess control mechanisms is not appropriate for mobile workers accessthe corporate network over analog lines?a. TACACSb. Call-backc. CHAPd. RADIUSAnswer: B303.In addition to the accuracy of the biometric systems, there are other factors that must also be considered:a. These factors include the enrollment time and the throughput rate, but not acceptability.b. These factors do not include the enrollment time, the throughput rate, and acceptability.c. These factors include the enrollment time, the throughput rate, and acceptability.d. These factors include the enrollment time, but not the throughput rate, neither the acceptability. Answer: C304.Which of the following would NOT be considered a Deial of Service Attack?a. Zone Transferb. Smurfc. Syn Floodd. TearDropAnswer: A305.What is called the type of access control where there are pairs of elements that have the least upperbound of values and greatest lower bound of values?a. Mandatory modelb. Discretionary modelc. Lattice modeld. Rule modelAnswer: CLattice-based access control provides an upper bound and lower bound of access capabilities for everysubject and object relationship.Pg 156 Shon Harris All-In-One CISSP Certification Exam Guide306.Which of the following biometric characteristics cannot be used to uniquely authenticate an individual's identity?a. Retina scansb. Iris scansc. Palm scansd. Skin scansAnswer: DBiometrics:FingerprintsPalm ScanHand GeometryRetina ScanIris ScanSignature DynamicsKeyboard DynamicV oice PrintFacial ScanHand TopologyPg. 128-130 Shon Harris All-In-One CISSP Certification Exam Guide307.In non-discretionary access control, a central authority determines what subjects can have access tocertain objects based on the organizational security policy. The access controls may be based on:a. the societies role in the organizationb. the individual's role in the organizationc. the group-dynamics as they relate to the individual's role in the organizationd. the group-dynamics as they relate to the master-slave role in the organizationAnswer: Bobjects based on organizational security policy. The access controls may be based on the individual's role inthe organization (role-based) or the subject's responsibilities and duties (task-based).Pg. 33 Krutz: The CISSP Prep Guide.308.In biometric identification systems, at the beginning, it was soon apparent that trulypositive identification could only be based on physical attributes of a person. This raised the necessicity of answering 2 questions:a. What was the sex of a person and his ageb. what part of body to be used and how to accomplish identification to be viablec. what was the age of a person and his income leveld. whatwas the tone of the voice of a person and his habbitsAnswer: B309.Which of the following can best eliminate dial-up access through a Remote Access Server as a hackingvector?a. Using TACACS+ serverb. Installing th Remote Access Server outside thefirewall and forcing legitimate users to authenticate to thefirewall.c. Setting modem ring count to at least 5d. Only attaching modems to non-networked hosts.Answer: B310.Which of the following forms of authentication would most likely apply a digital signature algorithmto every bit of data that is sent from the claimant to the verifier?a. Dynamic authenticationb. Continuous authenticationc. Encrypted authenticationd. Robust authenticationAnswer: CThe correct answer is C. Unable to find any references to continuous encryption."A digital signature is the encrypted hash value of a message." Pg 550 Shon Harris: CISSP All-In-OneCertification Exam Guide."There are other options to improve the security offered by password authentication:Use the strongest form of one-way encryption available for password storage.Never allow passwords to be transmitted in clear text or with weak encryption." Pg. 9 Tittel: CISSP StudyGuide"[Kerberos] A complicated exchange of tickets (i.e., cryptographic messages) between the client, the server,and the TGS is used to prove identity and provide authentication between the client and server. This allowsthe client to request resources from the server while having full assurance that both entities are who theyclaimm to be. The exchange of encrypted tickets also ensures that no logon credentials, session keys, orauthentication messages are ever transmitted in the clear text." Pg 14 Tittel: CISSP Study Guide Note: There are 42 TCP/IP questions in the pool311.The OSI model contains seven layers. TCP/IP is generally accepted as having how many layers?a. fourb. fivec. sixd. eightAnswer: AThe TCP/IP Protocol Model is similar to the OSI model, but it defines only the following four layers insteadof seven: Application Layer, Host-to-Host Transport Layer, Internet Layer, Network Access or Link Layer.Pg. 84 Krutz: The CISSP Prep Guide.312.Which of the following layers provides end-to-end service?a. Network Layerb. Link Layerc. Transport Layerd. Presentation LayerAnswer: CSession services located in the Transport Layer both segment and reassemble the data from upper-layerapplications and unite it onto the same data stream, which provides end-to-end data transport services andestablishes a logical connection between the sending host and destination host on a network.Pg. 82 Krutz: The CISSP Prep Guide.313.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 172.5.42.5b. 172.76.42.5c. 172.90.42.5d. 172.16.42.5Answer: DThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSP Prep Guide.314.Telnet and rlogin use which protocol?a. UDPb. SNMPc. TCPd. IGPAnswer: C315.Which of the following provide network redundancy in a local network environment?a. Mirroringb. Shadowingc. Dual backbonesd. DuplexingAnswer: C316.The connection using fiber optics from a phone company's branch office to local customers is which ofthe following?a. new loopb. local loopc. loopbackd. indigenous loopAnswer: B317.The IP header contains a protocol field. If this fild contains the value of 2, what type of data is contained within the IP datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: D318.In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP, control functions are provided?a. Linkb. Transportc. Presentationd. ApplicationAnswer: A319.Which of the following is true related to network sniffing?a. Sniffers allow an attacher to monitor data passing across a network.b. Sniffers alter the source address of a computer to disguise and exploit weak authentication methods.c. Sniffers take over network connectionsd. Sniffers send IP fragments to a system that overlap with each otherAnswer: A320.In the days before CIDR (Classless Internet Domain Routing), networks were commonly organizaedby classes. Which of the following would have been true of a Class B network?a. The first bit of the ipaddress would be set to zerob. The first bit of the ipaddress would be set to one and the second bit set to zeroc. The first two bits of an ipaddress would be set to one, and the third bit set to zerod. The first three bits of the ipaddress would be set to oneAnswer: B321.The IP header contains a protocol field. If this field contains the value of 17, w hat type of data iscontained within the ip datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: CICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.322.The IP header contains a protocol field. If this field contains the value of 6, what type of data iscontained within the ip datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: AICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.323.The IP header contains a protocol field. If this field contains the value of 1, what type of data iscontained within the IP datagram?a. TCPb. ICMPc. UDPd. IGMPAnswer: BICMP = 1TCP = 6UDP = 17Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.324.In the OSI/ISO model, at what level are TCP and UDP provided?a. Transportb. Networkc. Presentationd. ApplicationAnswer: ATransport Layer. .... TCP and UDP operate on this layer.' Pg 82. Krutz: The CISSP Prep Guide.325.Fast ethernet operates at which of the following?a. 10 MBpsb. 100 MBpsc. 1000 MBpsd. All of the aboveAnswer: B326.A Packet containing a long string of NOP's followed by a command is usually indicative of what?a. A syn scanb. A half-port scanc. A buffer overflowd. A packet destined for the network's broadcast addressAnswer: C327.Y ou are running a packet sniffer on a network and see a packet with a long string of long string of "9090 90 90...." in the middle of it traveling to an x86-based machine. This could be indicative of what?a. Over-subscription of the traffic on a backboneb. A source quench packetc. a FIN scand. A buffer overflowAnswer: D328.Which of the following statements about the "Intranet" is NOT true?a. It is an add-on to a local area network.b. It is unrestricted and publicaly available.c. It is usually restricted to a community of usersd. t can work with MANS or W ANSAnswer: BExplanation:"An intranet is a 'private' network that uses Internet technologies, such as TCP/IP. The company has Webservers and client machines using Web browsers, and it uses the TCP/IP protocol suite. The Web pages arewritten in Hypertext Markup Language (HTML) or Extensible Markup Language (XML) and are accessedvia HTTP." Pg 395 Shon Harris: All-In-One CISSP Certification Guide.329.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 10.0.42.5b. 11.0.42.5c. 12.0.42.5d. 13.0.42.5Answer: AThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSP Prep Guide.330.What is the proper term to refer to a single unit of TCP data at the transport layer?a. TCP segmentb. TCP datagramc. TCP framed. TCP packetAnswer: AThe data package created at the transport layer, which encapsulates the Application layer message is called asegment if it comes from TCP/IP." Pg. 27 Pg. 55 Casad: Sams Teach Y ourself TCP/IP in 24 hrs.331.Which of the following type of packets can *easily* be denied with a stateful packet filter?a. ICMPb. TCPc. UDPd. IPAnswer: B332.What is the proper term to refer to a single unit of Ethernet data?a. Ethernet segmentb. Ethernet datagramc. Ethernet framed. Ethernet packetAnswer: CWhen the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.)Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames. Pg.40 Sams Teach Y ourself TCP/IP in 24 hrs.333.Which of the following is True:a. TCP is connection-oriented. UDP is notb. UDP provides for Error Correction. TCP does not.c. UDP is useful for longer messagesd. UDP gaurantees delivers of data. TCP does not gaurantee delivery of data.Answer: A334.Which of the following OSI layers does not provide confidentiality?a. Presentationb. Networkc. Transportd. SessionAnswer: CPresentation: This layer also handles data compression and encryption.Network: The main responsibility of the network layer is to insert information into the packet's header sothat it can be properly routed.Transport: (for purposes of CISSP exam, handles SSL)Session: SSLPg 350 Shon Harris All-In-One CISSP Certification Exam Guide (need newer version for Transportreference)335.DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model?a. Applicationb. Networkc. Presentationd. TransportAnswer: A336.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the internet)?a. 172.12.42.5b. 172.140.42.5c. 172.31.42.5d. 172.15.45.5Answer: CThe Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP addressspace for private Internets - 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to192.168.255.255- that are known as "global non-routable addresses."" Pg. 94 Krutz: The CISSPPrep Guide.337.Which of the following OSI layers provides routing and related services?a. Networkb. Presentationc. Sessionc. PhysicalAnswer: A338.The International Standards Organization/Open Systems Interconnection (ISO/OSI) Layers doesNOT have which of the following characteristics?a. Standard model for network communicationsb. Used to gain information from network devices such as count of packets received and routing tablesc. Allows dissimilar networks to communicated. Defines 7 protocol layers (a.k.a. protocol stacks)Answer: BNot A."The Open System Interconnect (OSI) is a worldwide federation that works to provide internationalstandards. "Not C."A protocol is a standard set of rules that determine how systems will communicate across networks. Twodifferent systems can communicate and understand each other because they use the same protocols in spiteof their differences."Pg. 343-344 Shon Harris: CISSP All-In-One Certification Exam Guide339.ARP and RARP map between which of the following?a. DNS addresses and IP addressesb. 32-bit hardware addresses and 48-bit IPv6 addressesc. 32-bit hardware addresses and 48-bit IPv4 addressesd. 32-bit addresses in IPv4 and 48-bit hardware addressesAnswer: DAn Ethernet address is a 48-bit address that is hard-wired into the NIC of the network node. ARP matchesup the 32-bit IP address with this hardware address, which is technically referred to as the Media AccessControl (MAC) address or the physical address. Pg. 87 Krutz: The CISSP Prep Guide.340.Frame relay and X.25 networks are part of which of the following?a. Circuit-switched servicesb. Cell-switched servicesc. Packet-switched servicesd. Dedicated digital servicesAnswer: CPacket-Switched Technologies:Link Access Procedure-Balanced (LAPB)Frame RelaySwitched Multimegabit Data Service (SMDS)Asyncronous Transfer Mode (A TM)V oice over IP (V oIP)341.In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized byclasses. Which of the following would have been true of a Class C network?a. The first bit of the ip address would be set to zerob. The first bit of the ip address would be set to one and the second bit set to zeroc. The first two bits of the ip address would be set to one, and the third bit set to zerod. The first three bits of the ip address would be set to oneAnswer: CPg. 80 Sams Teach Y ourself TCP/IP in 24 hrs.342.Both TCP and UDP use port numbers of what length?a. 32 bitsb. 16 bitsc. 8 bitsd. 4 bitsAnswer: B343.Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not avalid address to use on the Internet)?a. 192.168.42.5b. 192.166.42.5c. 192.175.42.5d. 172.1.42.5Answer: A344.Which of the following access methods is used by Ethernet?a. CSMA/CDb. CSU/DSUc. TCP/IPd. FIFOAnswer: A"Under the Ethernet CSMA/CD media-access process, any computer on a CSMA/CD LAN canaccess thenetwork at any time." Pg. 103 Krutz: The CISSP Prep Guide.345.ICMP and IGMP belong to which layer of the OSI model?a. Datagramb. Networkc. Transportd. LinkAnswer: BThe Network layer (layer 3) is responsible for adding routing information to the data. The Network layeraccepts the segment from the Transport layer and adds information to it to create a packet. The packetincludes the source and destination IP addresses. TThe routing protocols are located at this layer and include the following:Internet Control Message Protocol (ICMP)Routing Information Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)Internet Group Management Protocol (IGMP)Internet Protocol (IP)Internet Packet Exchange (IPX)Pg. 78 Tittel: CISSP Study Guide346.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 iswhich of the following?a. Application Layerb. Presentation Layerc. Data Link Layerd. Network LayerAnswer: B"Presentation Layer (Layer 6)." Pg 81 Krutz The CISSP Prep Guide.347.ICMP and IGMP belong to which layer of the OSI Model? (Fill in the blank)Answer: Network348.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 iswhich of the following? (Fill in the blank)Answer: Presentation Layer349.How do you distinguish between a bridge and a router? (Fill in the blank)Answer: The bridge connectos two networks at the link layer, while router connects two networksthe network layer.350.What is the proper term to refer to a single unit of IP data? (Fill in the blank)Answer: IP Datagram"When the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.)Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames." Pg.40 Sams Teach Y ourself TCP/IP in 24 hrs.351.The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers are inwhich of the following order (1 to 7). (Fill in the blank)Answer: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer352.Which of the following OSI layers provides non-repudiation services? (Fill in the blank) Answer: ApplicationNote: There are 50 HIPPA Questions in the pool353.The privacy provisions of the federal law, the Health Insurance Portability and Acc ountability Act of1996 (HIPPA),A. apply to certain types of critical health information created or maintained by health care providerswho engage in certain electronic transactions, health plans, and health care clearinghouses.B. apply to health information created or maintained by health care providers who engage in certainelectronic transactions, health plans, and health care clearinghouses.C. apply to health information created or maintained by some large health care providers who engage incertain electronic transactions, health plans, and health care clearinghouses.D. apply to health information created or maintained by health care providers regardless of wether theyengage in certain electronic transactions, health plans, and health care clearinghouses.Answer: B354.Gap analysis does not apply toA. TransactionsB. availabilityC. PrivacyD. SecurityAnswer: B355.A Gap analysis for PrivacyA. includes a comparison of your proposed policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy lawsB. inc ludes a comparison of your current policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy lawsC. includes a comparison of your ideal policies and procedures and the requirements established in theSecurity and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy laws.D. includes a comparison of your exceptional policies and procedures and the requirements established inthe Security and Privacy Regulation in order to identify any necessary modifications in existing policies tosatisfy HIPPA regulations when they are stricter than state privacy laws.Answer: B356.The privacy provisions of the federal law, the Health Insurance Portability and Accountability Act of1996 (HIPPA), apply to certain types of health information created or maintained by health care providersA. who engage in certain electronic transactions, health plans, and health care clearinghousesB. who do not engage in certain electronic transactions, health plans, and health care clearinghousesC. regardless of whether they engage in certain electronic transactions, health plans, and health careclearinghousesD. if they engage for a majority of days in a year in certain electronic transactions, health plans, and healthcare clearinghouses.Answer: A357.HIPPA preempts state lawsA. except to the extent that the state law is less stringentB. regardless of the extent that the state law is more stringentC. except to the extent that the state law more stringentD. except to the extent that the state law is legislated later than HIPPAAnswer: C358.The Implementation GuidesA. are referred to in the Static RuleB. are referred to in the Transaction RuleC. are referred to in the Transitional RuleD. are referred to in the Acquision RuleAnswer: B359.The HIPPA task force must firstA. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are critical to patient care and central to the organization's businessB. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are non critical to patient care and central to the organization's businessC. inventory the organization's systems, processes, policies, procedures and data to determine whichelements are critical to patient complaints and central to the organization's peripheral businesses D. modify the organization's systems, processes, policies, procedures and data to determine which elementsare critical to patient care and central to the organization's businessAnswer: A360.A covered healthcare provider which a direct treatment relationship with an individual need not:A. provide the notice no later than the date of the first service delivery, including service delivered electronicallyB. have the notice available at the service delivery site for individuals to request and keepC. get a acknowledgement of the notice from each individual on stamped paperD. post the notice in a clear and prominent location where it is reasonable to expect individuals seekingservice from the covered healthcare provider to be able to read itAnswer: C361.Employers often advocate on behalf of their employees in benefit disputes and appeals, answerquestions with regard to the health plan, and generally help them navigate their health benefits. Is individual consent required?A. NoB. SometimesC. Y esD. The answer is indeterminateAnswer: C362.A health plan may conduct its covered transactions through a clearinghouse, and may require aprovider to conduct covered transactions with it through a clearinghouse. The incremental cost of doing so must be borneA. by the HIPPA authoritiesB. by the health planC. by any other entity but the health planD. by insurance companiesAnswer: B363.Covered entities (certain health care providers, health plans, and health care clearinghouses) are notrequired to comply with the HIPPA Privacy Rule until the compliance date. Covered entities may, ofcourse, decide to:A. unvoluntarily protect patient health information before this dateB. voluntarily protect patient health information before this dateC. after taking permission, voluntarily protect patient health information before this dateD. compulsorily protect patient health information before this dateAnswer: B364.What is HIPPA?A. The Home Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.B. The Public Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191,which amends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.C.The Health Insurance Privacy & Accountability Act of 1996 (August 2), public law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.D. The Health Insurance Privacy & Accountability Act of 1996 (August 2), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act. Answer: BExplanation:"The United States Kennedy-Kassebaum Health Insurance Portability and Accountability Act (HIPPAPublicLaw 104-191), effective August 21, 1996, addresses the issues of health care privacy, security, transactions and code sets, unique identifies, electronic signatures, and plan portability in the United States."Pg 499-500 Krutz: The CISSP Prep Guide: Gold Edition.365.The confidentiality of alcohol and drug abuse patient records maintained by this program is protectedby federal law and regulations. Generally, the program may not say to a person outside the programthat a patient attends the program, or disclose any information identifying a patient as an alcohol ordrug abuser even if:A.The person outside the program gives a written request for the informationB.the patient consent in writingC.the disclosure is allowed by a court orderD. the disclosure is made to medical personnel in a medical emergency or to qualified personnel forresearch, audit, or program evaluation.Answer: A366.EmployersA. often advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to their health plan, and generally help them navigate their health benefits.B. sometimes advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to the health plan, and generally help them navigate their health benefitsC. never advocate on behalf of their employees in benefit disputes and appeals, answer questions withregard to the health plan, and generally help them navigate their health benefits.D. are prohibited by plan sponsors from advocating on behalf of group health plan participants or providingassistance in understanding their health plan.Answer: A367.What is HIPPA?A. The Health Insurance Portability & Accountability Act of 1996 (August) 21), Public Law 104-191,which extends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.B. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kateson Act. C. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, whichamends the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act.D. The Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, which。
思科认证试题
思科认证试题思科认证是全球范围内最受欢迎和最具权威性的IT网络技术认证之一。
通过参加思科认证试题的考试,可以获得思科认证的相关认可和证书,这对于从事网络领域的专业人士来说具有重要的意义。
本文将介绍思科认证试题的相关内容,包括试题类型、备考方法和考试注意事项等。
一、试题类型思科认证试题主要包括多项选择题、填空题、简答题和实操题。
多项选择题是最常见的试题形式,主要考察考生对网络技术知识的掌握和理解。
填空题要求考生根据给定的语境或问题,在合适的位置填入正确的答案。
简答题通常要求考生用适当的篇幅回答某个问题,展示对网络技术的深入理解。
而实操题则要求考生在实际操作中解决技术问题,检验其实际操作能力。
思科认证试题的难度和复杂度因不同认证级别而异。
从入门级认证(如CCENT)到专业级认证(如CCNP)再到专家级认证(如CCIE),试题的难度逐渐增加。
对于准备参加思科认证考试的考生来说,了解不同级别试题的特点,对备考和提高通过率有着重要的帮助。
二、备考方法备考思科认证试题时,首先需要了解考试的内容大纲和要求。
认真阅读官方提供的考试大纲,熟悉考察的知识点和技能要求,有针对性地进行学习和准备。
学习资料的选择也是备考的重要环节。
推荐选择官方指定的教材和参考书籍,这些资料经过严格筛选,内容全面、系统、准确。
此外,还可以参考一些优质的网络课程和培训班,通过学习视频、案例分析等方式,获得更多实践经验和技巧。
在备考过程中,刷题是必不可少的环节。
选择合适的试题集,进行有针对性的练习,强化自己的知识和技能。
同时,要养成做笔记的习惯,将重点知识点和易错点记录下来,方便日后查阅和复习。
另外,网络论坛和社群是备考过程中宝贵的资源。
在相关的论坛和社群中,可以与其他准备考试的考生交流心得和经验,获取备考的技巧和建议。
这些互动交流对于提高备考效果和自信心有着积极的作用。
三、考试注意事项在参加思科认证考试之前,应该掌握以下考试注意事项:1.了解考试规则和流程。
思科认证考试(CCNA)考试模拟题集锦(1-71题)及答案
思科认证考试(CCNA)考试模拟题集锦(1-71题)及答案19及答案1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header? a) 96b) 47c) a random number above 1024d) 69e) none of the above2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.33. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the above4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addresses5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cache6. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an I P host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the above8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) OSPFc) RIPd) EIGRPe) IS-IS9. [CxNx] Of the following commands, identify the correct one for clearing the IP arp table in memory of the router.a) clear ip arp-cacheb) clear ip arp-tablec) clear arp-cached) clear arp-tablee) clear arp-ram10. [CxNx] Which of the following explains the correct definition of administrative distance as it pertains to Cisco’s IOS?a) The process by which routers select an administrator for an autonomous system.b) The process where a router will select the best path to a destination network.c) The process where a router will distance itself from other routers due to it’s lack of administrative experience.d) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.e) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the highest administrative distance will take priority.11. [ExNx] Collisions occur whena) multiple packets are placed on a serial linkb) multiple stations listen for traffic and transmit at the same timec) when multiple tokens are on a ring simultaneouslyd) beaconing process takes place12. [RINx] How many subnets are possible with a Class C address and a subnet mask of 255.255.255.252?a) 32b) 30c) 60d) 62e) 413. [RxNx] What commands will list all protocols that are currently being routed? (Choose all that apply.)a) show ip protocolb) show protocolc) show rund) show starte) All of the above14. [xxNx] Which of the following are true of access lists?a) Access list should have at least one permit statement.b) The last configured line should always be a permit statement.c) Every access-list will implicitly deny all traffic.d) Access-lists are processed top down.e) All of the above.15. [xxNx] If the access-group command is configured on an interface and there is no access-list created which of the following is most correct?a) An error message will appear.b) The command will be executed and deny all traffic out.c) The command will be executed and permit all traffic out.d) The command will be executed and permit all traffic in and out.e) The command will be executed and deny all traffic in and out.16. [xxNx] What is the result of the command?" access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established"a) telnet sessions will be permitted regardless of the source addressb) telnet sessions will be denied regardless of the source addressc) telnet sessions will be denied if initiated from any address other than 172.16.0.0 networkd) telnet sessions will be permitted to the 172.16.0.0 network onlye) telnet sessions will be denied to the 172.16.0.0 network only17. [xxNx] Which is generally true of the location of access-lists? (Choose all that apply.)a) Standard lists will most likely be placed close to the destination.b) Standard lists will most likely be placed close to the source.c) Extended lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.e) It does not matter.18. [RxNx] Which of the following is most correct?a) IP is to TCP. as IPX is to SPX.b) RTMP is to Appletalk as IP RIP is to IP.c) NLSP is to IPX as OSPF is to IP.d) a is true.e) b is true.f) a & b are true.g) c is true.h) b & c are true.i) a, b and c are true.19. [ExNx] If Host A sends a packet to Host B over ethernet and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the token monitor.Coding Key and InformationThe first character represents the category of question.A - ATMB - BridgingC - Cisco specificE - EthernetF - Frame relayH - HDLCI - FDDIN - ISDNO - OSI modelP - PPPR - RoutingS - SwitchingT - Token ringX - X.25x - Not applicableThe second character represents protocol.A - AppletalkB - Banyan VinesD - DecnetI - IPL - Dial on DemandN - NLSPO - OSPFX - IPXx - Not ApplicableThe third character represents the certification that the question will help you prepare for.N - CCNA Exam #640-407P - CCNPAdvanced Cisco Router Configuration (ACRC) Exam 640-403Cisco LAN Switch Configuration (CLSC) Exam #640-404Cisco Monitoring and Troubleshooting Dial-up Services Exam #640-405Cisco Internetworking Troubleshooting ( CIT) Exam #640-406D - CCDA & CCDPCisco Design Specialist Exam #9E0-004Cisco Internetwork Design#640-025We will reserve the fourth character for future use.As an example, when you come across a question coded "BXDx", it signifies a question that will help you gain the CCDA or CCDP certification.CCNA试题1-19答案1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header?a) 96b) 47c) a random number above 1024d) 69e) none of the aboveAnswerd) 69Here is a sampling of other port numbers and the application they are associated with. The first 8 of these protocols are automatically forwarded through the router by using the helper-address commandTrivial File Transfer (TFTP) (port 69)Domain Name System (port 53)IEN-116 Name Server (port 42)Time service (port 37)NetBIOS Name Server (port 137)NetBIOS Datagram Server (port 138)Boot Protocol (BootP) client and server datagrams (port 67)TACACS service (port 49)Simple Mail Transfer Protocol (25)File Transfer Protocol (21)Simple Network Management Protocol (161)2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.3Answerb) ARPASNAP is the default encapsulation for a token ring interface NOVELL-ETHER is the default encapsulation for a ipx interface.3. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the aboveAnswera) ip address 1.1.1.1 255.255.255.0If you are not in the configuration mode, the ip address can be set by using the setup mode.Configuring interface Ethernet0/0:Is this interface in use? [yes]:Configure IP on this interface? [yes]:IP address for this interface [10.10.10.1]: 10.10.10.1Number of bits in subnet field [16]: 16Class A network is 10.0.0.0, 16 subnet bits; mask is /24Take note when using the setup mode the mask is configured using the number of subnet bits.4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addressesAnswerc) show ip interfaced) show interfaceExamples of each of these commands are shown below: Router_A#sh int e0/0Ethernet0/0 is up, line protocol is upHardware is AmdP2, address is0010.7b15.bd41(bia 0010.7b15.bd41)Internet address is 10.10.10.1/24MTU 1500 bytes, BW 10000 Kbit,DLY 1000 usec,rely 255/255, load 1/255Encapsulation ARPA, loopback not set,keepalive set (10 sec)ARP type: ARPA, ARP Timeout 04:00:00Last input never, output 00:00:06,output hang neverLast clearing of "show interface"counters neverQueueing strategy: fifoOutput queue 0/40, 0 drops;input queue 0/75,0 drops5 minute input rate 0 bits/sec,0 packets/sec5 minute output rate 0 bits/sec,0 packets/sec0 packets input, 0 bytes,0 no bufferReceived 0 broadcasts, 0 runts,0 giants,0 throttles, 0 input errors, 0 CRC,0 frame, 0 overrun, 0 ignored,0 abort0 input packets with dribblecondition detected127 packets output, 11802 bytes,0 underruns0 output errors, 0 collisions,2 interface resets0 babbles, 0 late collision,0 deferred0 lost carrier, 0 no carrier0 output buffer failures, 0 outputbuffers swapped outRouter_A#sh ip int e0/0Ethernet0/0 is up, line protocol is upInternet address is 10.10.10.1/24Broadcast address is 255.255.255.255Address determined bynon-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is enabledOutgoing access list is not setInbound access list is not setProxy ARP is enabledSecurity level is defaultSplit horizon is enabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is enabledIP fast switching on the sameinterface is disabledIP multicast fast switching is enabledRouter Discovery is disabledIP output packet accounting is disabledIP access violation accounting isdisabledTCP/IP header compression is disabledProbe proxy name replies are disabledGateway Discovery is disabledPolicy routing is disabledNetwork address translation is disabled5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cacheAnswerc) show ip arpExample:Router_A#sh ip arpProtocol Address Age(min) Hardware Address Type InterfaceInternet 1.1.1.2 - 0010.7b15.bd50 ARPA FastEthernet1/0Internet 10.10.10.1 - 0010.7b15.bd41 ARPA Ethernet0/06. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network a nd a BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The dest ination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.Answera) Whe re an IP host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.Choice C describes Address Resolution Protocol (ARP). A host never has to resolve it’s own MAC address. The MAC address is burned into the Network Interface card. When the host is booted the MAC address will be loaded into memory.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the aboveAnswera) Telnetb) FTPTFTP and SNMP use layer 4 UDP.8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) OSPFc) RIPd) EIGRPe) IS-ISAnswerb) OSPFe) IS-ISA link state routing protocol advertises, to it’s neighbors, the state of the link when the state of the link changes.A distance vector routing protocol advertises its routing table periodically.9. [CxNx] Of the following commands, identify the correct one for clearing the IP arp table in memory of the router.a) clear ip arp-cacheb) clear ip arp-tablec) clear arp-cached) clear arp-tablee) clear arp-ramAnswerc) clear arp-cacheIf you have changed an ip address or a NIC card on a host you might use this command to reset the cache.10. [CxNx] Which of the following explains the correct definition of administrative distance as it pertains to Cisco’s IOS?a) The process by which routers select an administrator for an autonomous system.b) The process where a router will select the best path to a destination network.c) The process where a router will distance itself from other routers due to it’s lack of administrative experience.d) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.e) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the highest administrative distance will take priority.Answerd) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.Cisco uses administrative distances (AD) to measure the reliability of the routing protocol. The lower the (AD) the more reliable the protocol.Router_C#sh ip routeCodes: C - connected, S - static,I - IGRP, R - RIP,M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O - OSPF,IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPFNSSA external type 2E1 - OSPF external type 1,E2 - OSPF external type 2,E - EGPi - IS-IS, L1 - IS-IS level-1,L2 - IS-IS level-2, * -candidate defaultU - per-user static route, o - ODRGateway of last resort is not set172.16.0.0/24 is subnetted, 2 subnetsC 172.16.1.0 is directly connected,Serial1C 172.16.2.0 is directly connected,Serial0I 10.0.0.0/8 [100/8576] via 172.16.1.1,00:00:09, Serial1[100/8576] via 172.16.2.1, 00:00:19,Serial0The 100 in bold is the administrativedistance for IGRP.A partial list of administrative distances is included below:Protocol ADEIGRP 90IGRP 100OSPF 110RIP 120BGP 180If a router hears a IP RIP and a IGRP update for the same network the router will discard the rip information. IP RIP uses hop count as it’s metric, while IGRP uses a composite metric including bandwidth and load, speed is the primary consideration.11. [ExNx] Collisions occur whena) multiple packets are placed on a serial linkb) multiple stations listen for traffic and transmit at the same timec) when multiple tokens are on a ring simultaneouslyd) beaconing process takes placeAnswerb) multiple stations listen for traffic and transmit at the same timeCollisions is a term that is used in an ethernet environment. Ethernet can be described as a listen then transmit scenario. First a station will listen for traffic if no traffic is sensed then a transmission will take place. If two stations transmit at the same time collisions will occur. The first station to detect the collision sends out a jamming signal to alert all stations a collision has occurred. At this point these stations set up a random interval timer when the timer expires re-transmission will occur.Token ring is a token passing process a station can transmit only when he has the token. There never can be multiple tokens on the ring. Early token release allows up to two data frames to be transmitted on a token ring LAN at the same time. Collisions do not occur on a token ring.Because of the point to point nature of serial links collisions do not occur.Beaconing is a term used in a token passing environment.12. [RINx] How many subnets are possible with a Class C address and a subnet mask of 255.255.255.252?a) 32b) 30c) 60d) 62e) 4Answerd) 62The above mask is using 6 bits to describe subnets. The formula used to determine the number of subnets (not including the all 0’s or all 1’s subnet) is 2n - 2 were n is the number of subnet bits. This is the number to use when configuring a ip address with the setup dialog.13. [RxNx] What commands will list all protocols that are currently being routed? (Choose all that apply.)a) show ip protocolb) show protocolc) show rund) show starte) All of the aboveAnswerb) show protocolc) show runShow ip protocol will show just the ip routing protocols that are currently configured. Show start may or may not show the current routed protocols.Below is the output of show protocolRouter_B#show protocolGlobal values:Internet Protocol routing is enabledAppletalk routing is enabledBRI0 is administratively down, line protocol is downBRI0:1 is administratively down, line protocol is downBRI0:2 is administratively down, line protocol is downSerial0 is administratively down, line protocol is downSerial1 is administratively down, line protocol is downSerial2 is administratively down, line protocol is downSerial3 is administratively down, line protocol is downTokenRing0 is administratively down, line protocol is down14. [xxNx] Which of the following are true of access lists?a) Access list should have at least one permit statement.b) The last configured line should always be a permit statement.c) Every access-list will implicitly deny all traffic.d) Access-lists are processed top down.e) All of the above.Answere) All of the above.Every access list has an implicit deny all at the end. What would the need be to create a access list with just deny statements. Access-list are processed from the top down therefore the order of each statement could be critical, for instance suppose you created an access list and the first line was a permit any and the next line was a deny. Since it’s top down processing a packet would be permitted to pass on the first line and the second line would never be executed. An extended list will give you a "match count" that will help in determining what the most efficient order should be.15. [xxNx] If the access-group command is configured on an interface and there is no access-list created which of the following is most correct?a) An error message will appear.b) The command will be executed and deny all traffic out.c) The command will be executed and permit all traffic out.d) The command will be executed and permit all traffic in and out.e) The command will be executed and deny all traffic in and out.d) The command will be executed and permit all traffic in and out.There are two steps to use an access list .1. Create the list2. Place the access list on a interfaceThe analogy I use in class is:Suppose you reside in a gated community. The community is not protected until you hire the guard and then place him at the gate. If you hire the guard and never place him at the gate all traffic will be permitted. When there is no access list on an interface it is implicit permit anyWhen an access list is placed on a interface it is implicit deny any16. [xxNx] What is the result of the command?" access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established"a) telnet sessions will be permitted regardless of the source addressb) telnet sessions will be denied regardless of the source addressc) telnet sessions will be denied if initiated from any address other than 172.16.0.0 networkd) telnet sessions will be permitted to the 172.16.0.0 network onlye) telnet sessions will be denied to the 172.16.0.0 network onlyAnswerc) telnet sessions will be denied if initiated from any address other than 172.16.0.0 networkThe secret to this question is the key word "established." Established means that the packet will be permitted unless it is the first part of the three way handshake. Recall that when we initiate a TCP connection we have no ACK. How can we acknowledge a sequence number from the other side when we have not established a session with him?17. [xxNx] Which is generally true of the location of access-lists? (Choose all that apply.)a) Standard lists will most likely be placed close to the destination.b) Standard lists will most likely be placed close to the source.c) Extended lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.e) It does not matter.Answera) Standard lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.A standard list will only check the source address. It makes no difference where the packet is going. If you place a standard list close to the source you could very well be denying that traffic to go to other destinations. An extended list can be placed close to the source because we can permit or deny traffic based upon the source and destination address. This insures that only traffic we wish to have denied is denied.18. [RxNx] Which of the following is most correct?a) IP is to TCP. as IPX is to SPX.b) RTMP is to Appletalk as IP RIP is to IP.c) NLSP is to IPX as OSPF is to IP.d) a is true.e) b is true.f) a & b are true.g) c is true.h) b & c are true.i) a, b and c are true.i) a, b and c are true.19. [ExNx] If Host A sends a packet to Host B over ethernet and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the token monitor.Answerd) The packet will "die" when it reaches the terminator.20—39及答案20. [TxNx] If Host A sends a packet to Host B over token ring, and Host B is not active: a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the token monitor.21. [TxNx] If Host A sends a packet to Host B over token ring: Host A dies after transmitting, and Host B is not active:a) The packet will time out.b) The packet will be removed by Host A.c) The NVRAM of Host B will remove the packet.d) The packet will "die" when it reaches the terminator.e) The packet will be removed by the Active monitor.22. [FxNx] BECN and FECN are:a) Used to provide keepalives in a Frame Relay environmentb) Used to provide error checking in a Frame Relay environmentc) Used to provide congestion information in a Frame Relay environmentd) Used to provide flow control parameters in a Frame Relay environmente) BECN and FECN are not used in a Frame Relay environment.23. [RxNx] Which of the following are benefits of a Link-State routing protocol? (Choose all that apply.)a) Allows the use of a more robust addressing scheme.b) Allows for a larger scalable networkc) Reduces convergence timed) Allows "supernetting"e) All of the above.24. [OxNx] Which of the following are reasons for the OSI model?a) Standardizes interfacesb) Allows modular engineeringc) Facilitates learning and teachingd) All of the above.25. [RxNx] Which of the following is NOT a ROUTING protocol:a) OSPFb) RIPc) IPXd) EIGRP26. [RxNx] Which statement is NOT true about link state protocols:a) Link state advertisements are sent to all routers in an area.b) Each router executes the SPF algorithm.c) Link state routers keep a topological database of the network.d) Link state routers include the originating router s routing table.e) Link state routers know of possible alternate paths to a particular network.27. [RxNx] Which of the following would NOT appear in a routing table?a) Next hop addressb) Interface Port referencesc) MAC addressd) Network addresse) Metrics28. [OxNx] Which statement is true of the Datalink OSI layer ?a) 802.3 is the MAC sub layer.b) No such thingc) MAC sublayer provides the connection to the network layer.d) MAC sublayer uses SAPS to access the network layer.e) SAP sublayer uses the MAC layer to access the LAN medium.29. [RINx] Given the IP address of 193.243.12.43 and a subnet mask of 255.255.255.128, what is the subnet address?a) 194.243.12.32b) 193.243.0.0c) 194.243.12.43d) 193.243.12.128e) None of the above.30. [CxNx] Cisco uses a naming convention to identify frame types. Which four of the following mappings are correct?Cisco_name = Common_namea) cisco_II = Ethernet_IIb) arpa = Ethernet_IIc) sap = Ethernet_802.3d) sap = Ethernet_802.2 LLCe) Novell Ether = Ethernet_802.2 LLCf) cisco_802 = Ethernet_802.2 LLCg) snap = Token Ring Snaph) snap = Ethernet_SNAP31. [RxNx] In order to communicate throughout an internetwork, which of the following are required. Choose Two.a) The use of a routable protocol such as NetBEUI or LATb) A hierarchical naming scheme server such as DNSc) A host file at each communicating deviced) A two part network addressing scheme such as Network/Hoste) The use of a routable protocol such as IP or IPXf) The use of a routable protocol such as TCP or IPX32. [CxNx] What is the default route on an IP network? Choose one.a) This is the route that will be chosen first by IP for delivery of a datagram.。
思科认证最新真题50道:TCPIP
为⼤家收集整理了《思科认证最新真题50道:TCP / IP》供⼤家参考,希望对⼤家有所帮助 1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him? A. 255.0.0.0 B. 255.255.0.0 C. 255.245.255.0 D. 255.255.255.0 E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity? A. TCP B. UDP C. IP D. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? A. 255.255.0.0 B. 255.255.255.0 C. 255.255.255.192 D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch? A. 172.16.12.33/28 B. 172.16.12.32/27 C. 172.16.12.33/27 D. 172.16.12.34/27 E. 172.16.12.35/28 F. 172.16.12.38/28 G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A. 172.16.176.0–255.255.240.0 B. 172.16.192.0–255.255.240.0 C. 172.16.208.0–255.255.240.0 D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use? A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her? A. One network with 254 hosts B. Two networks with 128 hosts C. Four networks with 64 hosts D. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.) A. 201.168.27.33 B. 201.168.27.112 C. 201.168.27.119 D. 201.168.27.126 E. 201.168.27.175 F. 201.168.27.208 9: What is the subnetwork address for a host with the IP address 201.100.5.68/28? A. 201.100.5.0 B. 201.100.5.32 C. 201.100.5.64 D. 201.100.5.65 E. 201.100.5.31 F. 201.100.5.1 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions? A. TCP B. IP C. UDP D. IPX E. Frame relay 11: Which of the following protocols is connection-oriented? A. TCP B. IP C. IPX D. Frame relay 12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use? A. TCP B. IP C. UDP D. SPX E. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as _________. A. MTU adjustment B. Windowing C. Flexible Send Path D. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information? A. The ACK received will not include the segment number that was not received. B. The ACK received will include the segment number that was not received. C. The sending host will send a PACK to verify segment receipt. D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient? A. Class A B. Class B C. Class C D. Class D E. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.) A. 10.23.45.67 B. 126.21.34.56 C. 172.16.32.1 D. 172.31.234.55 E. 192.169.4.5 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table? Department Number of Users Corporate 7 Customer Support 15 Financial 13 HR 7 Engineering 16 A. 255.255.255.0 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself? A. UDP B. TCP C. SNMP D. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.) A. MAC address resolution B. Sequence numbers C. Acknowledgments D. Ping E. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network? A. Increased throughput B. Decreased throughput C. Increased latency D. Decreased reliability 21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.224 E. 255.255.255.240 F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts? A. ARP B. RARP C. SLARP D. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him? A. The host's default gateway is down. B. The destination host is not powered on. C. The IP address of the router interface is incorrect. D. The IP address of the switch to which the destination host connects is incorrect. E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting? A. Class A B. Class B C. Class C D. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork. B. It represents the number of subnetworks that are being used. C. It represents the class of IP address being used. D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.224 E. 255.255.255.240 27: Which of the following would a Class A network be assigned to? A. Government agency B. Small-to-medium sized corporation C. SOHO D. An individual 28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.) A. 192.168.5.95 B. 192.168.5.100 C. 192.168.5.128 D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet? A. 2.3.4.5 B. 11.12.13.14 C. 165.23.224.2 D. 172.31.45.34 E. 203.33.45.22 30: You are given a Class B network. What is the default subnet mask assigned to the Class B network? A. 255.255.255.255 B. 255.255.0.0 C. 255.224.0.0 D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address? A. Class C addresses cannot be assigned to Ethernet interfaces. B. The /27 is an invalid mask. C. It is a broadcast address. D. It is a public IP address. E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requireme n t s , y o u m u s t p r o v i d e t h e m a x i m u m n u m b e r o f s u b n e t s . W h i c h s u b n e t m a s k s h o u l d y o u u s e ? / p > p b d s f i d = " 2 3 3 " > 0 0 A . 2 5 5 . 2 5 5 . 2 5 5 . 2 5 4 / p > p b d s f i d = " 2 3 4 " > 0 0 B . 2 5 5 . 2 5 5 . 2 5 4 . 0 / p > p b d s f i d = " 2 3 5 " > 0 0 C . 2 5 5 . 2 55 . 2 4 0 . 2 5 4 / p > p b d s f i d = " 2 36 " > 0 0 D . 2 5 5 . 2 5 5 . 0 . 0 / p > p b d s f i d = " 2 37 " > 0 0 3 3 : W h a t i s t h e s ub n e t w o r k a n d b r o a dc a s t I P ad d re s s of 1 9 2 . 1 6 8 . 2 . 3 7 w i t h t h e s u b n e t m a s k o f 2 5 5 . 2 5 5 . 2 5 5 .2 4 8 ? / p > p b d s f i d = " 23 8 " > 0 0 A . 1 9 2 . 1 6 8 . 2 . 24 / 1 9 2 . 1 6 8 . 2 . 3 1 / p > p b d s f i d = " 2 3 9 " > 0 0 B . 1 9 2 . 1 6 8 . 2 . 3 2 / 1 9 2 . 1 6 8 . 2 . 3 9 / p > p b d s f i d = " 2 4 0 " > 0 0 C . 1 9 2 . 1 6 8 . 2 . 4 0 / 1 9 2 . 1 6 8 . 2 . 4 7 / p > p b d s f i d = " 2 4 1 " > 0 0 D . 1 9 2 . 1 6 8 . 2 . 4 8 / 1 9 2 . 1 6 8 . 2 .5 5 / p > p b d s f i d = " 2 4 2 " > 0 0 E . 1 9 2 . 16 8 . 2 . 5 6 / 1 9 2 . 1 6 8 . 2 . 6 3 / p > p b d s f i d = " 2 4 3 " > 0 0 3 4 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 1 0 1 1 0 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 4 4 " > 0 0 A . 2 1 8 / p > p b d s f i d = " 2 4 5 " > 0 0 B . 2 1 9 / p > p b d s f i d = " 2 4 6 " > 0 0 C . 2 2 0 / p > p b d s f i d = "2 4 7 " > 0 0 D . 2 2 1 / p > p b d s f i d = " 2 4 8 " > 0 0 E . 2 2 2 / p > p b d s f i d = " 2 4 9 " > 0 03 5 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 0 1 0 1 1 0 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 5 0 " > 0 0 A . 7 5 / p > p b d s f i d = " 2 5 1 " > 0 0 B . 8 3 / p > p b d s f i d = " 2 5 2 " > 0 0 C . 9 0 / p > p b d s f i d = " 2 5 3 " > 0 0 D . 9 7 / p > p b d s f i d = " 2 54 " > 0 0 3 6 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 1 0 1 0 1 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 25 5 " > 0 0 A . 1 9 8 / p > p b d s f i d = " 2 56 " > 0 0 B . 2 1 4 / p > p b d s fi d = " 2 5 7 " > 0 0 C . 2 5 2 / p > p b d s f i d = " 2 5 8 " > 0 0 D . 2 5 5 / p > p b d s f i d = " 2 5 9 " > 0 0 3 7 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 0 1 1 0 1 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 6 0 " > 0 0 A . 1 8 2 / p > p b d s f i d = " 2 6 1 " > 0 0 B . 1 9 2 / p > p b d s f i d = " 2 6 2 " > 0 0 C . 2 0 2 / p > p b d s f i d = " 2 6 3 " > 0 0 D . 2 1 2 / p > p b d s f i d = " 2 6 4 " > 0 0 3 8 : Y o u a r e c o n f i g u r i n g a s u b n e t f o r t h e A c m e , I n c . , b r a n c h o f f i c e i n B e i j i n g . Y o u n e e d t o a s s i g n I P a d d r e s s e s t o h o s t s i n t h i s s u b n e t . Y o u h a v e b e e n g i v e n t h e s u b n e t m a s k o f 2 5 5 . 2 5 5 . 2 5 5 . 2 2 4 . Wh i c h o f t h e s e I P a d d r e s s e s w o u l d b e v a l i d ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 2 6 5 " > 0 0 A . 1 5 . 23 4 . 1 1 8 . 6 3 / p > p b d s f i d = " 2 6 6 " > 0 0 B . 9 2 . 1 1 . 1 7 8 . 9 3 / p > p b d s f i d = " 2 6 7 " > 0 0 C . 1 3 4 . 1 7 8 . 1 8 .5 6 / p > p b d s f i d = " 2 6 8 " > 0 0 D . 1 9 2 . 1 6 8 . 1 6 . 8 7 / p > p b d s f i d = " 2 6 9 " > 0 0 E . 2 0 1 . 4 5 . 1 1 6 . 1 5 9 / p > p b d s f i d = " 2 7 0 " > 0 0 F . 2 1 7 . 6 3 . 1 2 . 1 9 2 / p > p b d s f i d = " 2 7 1 " > 0 0 3 9 : Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 2 0 8 . 9 8 . 1 1 2 . 0 n e t w o r k w i t h a / 2 8 m a s k . Y o u r b o s s a s k s y o u h o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v i d e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r i s u s i n g i p s u b n e t - z e r o ? / p > p b d s f i d = " 2 7 2 " > 0 0 A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 7 3 " > 0 0 B . 6 n e t w o r k s a n d 3 0 h o s t s / p > p b d s f i d = " 2 7 4 " > 0 0 C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 7 5 " > 0 0 D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f i d = " 2 7 6 " > 0 0 E . 1 6 n e t w o r k s a n d 1 4 h o s t s / p > p b d s f i d = " 2 7 7 " > 0 0 4 0 : W h a t i s ad i s a d v a n t a ge of u s i ng a c o n n e c t i o n - o r i e n t e d p r o t o c o l s u ch a s T C P ? / p > p b d s fi d = " 2 7 8 " >0 0 A . P a c k e t a c k n o w l e d g m e n t m i g h t a d d o v e r h e a d . / p > p b d s f i d = " 2 7 9 " > 0 0 B . P a c k e t s a r e n o t t a g g e d w i t h s e q u e n c e n u m b e r s . / p > p b d s f i d = " 2 8 0 " > 0 0 C . L o s s o r d u p l i c a t i o n o f d a t a p a c k e t s i s m o r e l i k e l y t o o c c u r . / p > p b d s f i d = " 2 8 1 " > 0 0 D . T h e a p p l i c a t i o n l a y e r m u s t a s s u m e r e s p o n s i b i l i t y f o r t h e c o r r e c t s e q u e n c i n g o f t h e d a t a p a c k e t s . 0 0 4 1 : Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 1 9 2 . 1 6 8 . 7 2 . 0 n e t w o r k w i t h a / 3 0 m a s k f o r c o n n e c t i o n s b e t w e e n y o u r r o u t e r s . Y o u r b o s s a s k s y o u h o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v i d e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r c a n n o t u s e i p s u b n e t - z e r o ? / p > p b d s f i d = " 2 8 2 " > 0 0 A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 8 3 " > 0 0 B . 6 n e t w o r k s a n d 3 0 h o s t s / p > p b d s f i d = " 2 8 4 " > 0 0 C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 8 5 " > 0 0 D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f i d = " 2 8 6 " > 0 0 E . 1 4 n e t w o r k s a n d 1 4 h o s t s / p > p b d s f i d = " 2 8 7 " > 0 0 4 2 : W h i c h o f t h e f o l l o w i n g I P a d d r e s s e s a r e c o n s i d e r ed " ne t w o r k " a d d r e s s e s w i t h a / 2 6 p r ef i x ? ( C h o o s e t w o . ) / p > p b d s f i d = " 2 8 8 " > 0 0 A . 1 6 5 . 2 0 3 .2 . 0 / p > p b d s f i d = " 2 8 9 " > 0 0 B . 1 6 5 . 2 03 . 5 . 1 9 2 / p > p b d s f i d = " 2 9 0 " > 0 0 C . 1 6 5 . 2 0 3 . 6 . 6 3 / p > pb d s f i d = " 2 9 1 " > 0 0 D . 1 6 5 . 2 0 3 . 6 . 1 9 1 / p > p b d s f i d = " 2 9 2 " > 0 0 E . 1 6 5 . 2 0 3 . 8 . 2 5 5 / p > p b d s f i d = " 2 9 3 " > 0 0 4 3 : I d e n t i f y t h r e e v a l i d h o s t s i n a n y s u b n e t o f 1 9 2 . 1 6 8 . 3 2 . 0 , a s s u m i n g t h e s u b ne t m a s k u s e d i s 2 5 5 . 2 5 5 . 2 5 5 . 2 4 0 . ( C h o o s e t h r e e . ) / p > p b d sf i d = " 2 9 4 " > 0 0 A . 1 9 2 . 1 6 8 . 3 2 .3 3 / p > p b d s f i d = " 2 9 5 " > 0 0 B . 1 9 2 . 1 6 8 . 3 2 . 1 1 2 / p > p b d s f i d = " 2 9 6 " > 0 0 C . 1 9 2 . 1 6 8 . 3 2 . 1 1 9 / p > p b d s f i d = " 2 9 7 " > 0 0 D . 1 9 2 . 1 6 8 . 3 2 . 1 2 6 / p > p b d s f i d = " 2 9 8 " > 0 0 E . 1 9 2 . 1 6 8 . 3 2 . 1 7 5 / p > p b d s f i d = " 2 9 9 " > 0 0 F . 1 9 2 . 1 6 8 . 3 2 . 2 0 8 / p > p b d s f i d = " 3 0 0 " > 0 04 4 : A C l a s s C n e t w o r k a d d r e s s h a s b e e n s u b n e t t e d w i t h a / 2 7 m a s k . W h i c h o f t h e f o l l o w i n g a d d r e s s e s i s a b r o a d c a s t a d d r e s s f o r o n e o f t h e r e s u l t i n g s u b n e t s ? / p > p b d s f i d = " 3 0 1 " > 0 0 A . 1 9 8 .5 7 . 7 8 . 3 3 / p > p b d s f i d = " 3 0 2 " > 0 0 B . 1 9 8 . 5 7 . 7 8 .6 4 / p > p b d s f i d = " 3 0 3 " > 0 0 C . 1 9 8 . 57 . 78 .9 7 / p > p b d s f i d = " 3 0 4 " > 0 0 D . 1 9 8 . 5 7 . 7 8 . 9 7 / p > p b d s f i d = " 3 0 5 " > 0 0 E . 1 9 8 . 5 7 . 7 8 . 1 5 9 / p > p b d s f i d = " 3 0 6 " > 0 0 F . 1 9 8 . 5 7 . 7 8 . 2 5 4 / p > p b d s f i d = " 3 0 7 " > 0 0 4 5: W h a t i s t h e s u b n e t w o r k a d d r e s s f o r a h o s t w i t h I P a d d r e s s 1 6 5 . 1 0 0 . 5 . 6 8 / 2 8 ? / p > p b d s f i d = " 3 0 8 " > 0 0 A . 1 6 5 . 1 0 0 . 5 . 0 / p > p b d s f i d = " 3 0 9 " > 0 0 B . 1 6 5 . 1 0 0 . 5 . 3 2 / p > p b d s f i d = " 3 1 0 " > 0 0 C . 1 6 5 . 1 0 0 . 5 . 6 4 / p > p b d s f i d = " 3 1 1 " > 0 0 D . 1 6 5 . 1 0 0 . 5 . 6 5 / p > p b d s f i d = " 3 1 2 " > 0 0 E . 1 6 5 . 1 0 0 . 5 . 3 1 / p > p b d s f i d = " 3 1 3 " > 0 0 F . 1 6 5 . 1 0 0 . 5 . 1 / p > p b d s f i d = " 3 1 4 " > 0 0 4 6 : Y o u r b o s s w a n t s t o k n o w w h a t T C P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 3 1 5 " > 0 0 A . T r a n s m i s s i o n C h e c k P r o t o c o l / p > p b d s f i d = " 3 1 6 " > 0 0 B . T r a n s p o r t C h e c k P r o t o c o l / p > p b d s f i d = " 3 1 7 " > 0 0 C . T r a n s m i s s i o n C o n t r o l P r o t o c o l / p > p b d s f i d = " 3 1 8 " > 0 0 D . T r a n s p o r t C o n t r o l P r o t o c o l / p > p b d s f i d = " 3 1 9 " > 0 0 4 7 : Y o u r b o s s w a n t s t o k n o w w h a t U D P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 3 2 0 " > 0 0 A . U n r e l i a b l e D a t a P r o t o c o l / p > p b d s f i d = " 3 2 1 " > 0 0 B . U n r e l i a b l e D a t a P r o g r a m / p > p b d s f i d = " 3 2 2 " > 0 0 C . U s e r - D e f i n e d P r o t o c o l / p > p b d s f i d = " 3 2 3 " > 0 0 D . U s e r D a t a g r a m P r o t o c o l / p > p b d s f i d = " 3 2 4 " > 0 0 4 8 : W h i c h o f t h e f o l l o w i n g s t a t e m e n t s a c c u r a t e l y d e s c r i b e s U D P ? / p > p b d s f i d = " 3 2 5 " > 0 0 A . U D P c o p i e s f i l e s b e t w e e n a c o m p u t e r a n d a s y s t e m r u n n i n g r s h d , t h e r e m o t e s h e l l s e r v i c e ( d a e m o n ) . / p > p b d s f i d = " 3 2 6 " > 0 0 B . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t o c o l s t h a t g o v e r n s t h e e x c h a n g e o f e l e c t r o n i c m a i l b e t w e e n m e s s a g e t r a n s f e r a g e n t s . / p > p b d s f i d = " 3 2 7 " > 0 0 C . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t o c o l s a n d i s u s e d t o c o p y f i l e s b e t w e e n t w o c o m p u t e r s o n t h e I n t e r n e t . B o t h c o m p u t e r s m u s t s u p p o r t t h e i r r e s p e c t i v e r o l e s : o n e m u s t b e a c l i e n t , a n d t h e o t h e r a s e r v e r . / p > p b d s f i d = " 3 2 8 " > 0 0 D . U D P i s a T C P c o m p l e m e n t t h a t o f f e r s a c o n n e c t i o n l e s s d a t a g r a m s e r v i c e g u a r a n t e e i n g n e i t h e r d e l i v e r y n o r c o r r e c t s e q u e n c i n g o f d e l i v e r e d p a c k e t s ( m u c h l i k e I P ) . / p > p b d s f i d = " 3 2 9 " > 0 0 4 9 : W h i c h o f t h e f o l l o w i n g h o s t a d d r e s s e s a r e m e m b e r s o f n e t w o r k s t h a t c a n b e r o u t e d a c r o s s t h e p u b l i c I n t e r n e t ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 3 3 0 " > 0 0 A . 1 0 . 2 0 . 1 2 . 6 4 / p > p b d s f i d = " 3 3 1 " > 0 0 B . 1 7 2 . 1 6 . 3 2 . 1 2 9 / p > p bd s f i d = " 3 3 2 " > 0 0 C . 1 7 2 . 6 4 . 3 2 . 3 4 / p > p b d s f i d = " 3 3 3 " > 0 0 D . 1 9 2 . 1 6 8 . 2 3 . 2 5 2 / p > p b d s f i d = "3 34 " > 0 0 E . 1 9 6 . 1 0 4 . 1 2 . 95 / p > p b d s f i d = " 3 3 5 " > 0 0 F . 2 1 4 . 1 9 2 . 4 8 . 2 5 4 / p > p b d s f i d = " 3 36 " >0 0 5 0 : Y o u a r e c o n n e c t i n g y o u r S e r i a l 0 / 1 i n t e r f a c e t o t h e I n t e r n e t . W h i c h o f t h e f o l l o w i n g ne e d t o b e d o n ef o r t h e c o n n e c t i o n t o w o r k ? ( C h o o s e t w o . ) / p > p b d s f i d = " 3 3 7 " > 0 0 A . A s s ig n a p u b l i c I P a d d r e s s . / p > p b d s f i d = " 3 3 8 " > 0 0 B . U s e th e s h u t d o w n c o m m a n d . / p > p b d s fi d = " 3 3 9 " > 0 0 C . U s e t h e n o s h u t d o w n c o m m a n d . / p > p b d s f i d = " 3 4 0 " > 0 0 D . M a k e s u r e t h e i n t e r f a c e i s r u n n i n g i n f u l l - d u p l e x . / p > / d i v > d i v i d = " f l o a t _ b t n " c l a s s = " " b d s f i d = " 3 4 1 " > b u t t o n c l a s s = " f l o a t _ b t n l e f t _ b t n " i d = " c o p y _ b u t t o n " d a t a - c l i p b o a r d - a c t i o n = " c o p y " d a t a - c l i p b o a r d -t a r g e t = " # c o n t e n t - t x t " o n c l i c k = " d o _ c o p y ( ) ; " b d s f i d = " 3 4 2 " > e m c l a s s = " i c o n " b d s f i d = " 3 4 3 " >。
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2.create two static routes to null0 using a class a address with a24-bit mask on r4 and inject into bgp such that router r3 cansee it. use loopbacks as the update source on both routers r3and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 and r5.f. create a static route on router r2 (ip route 22.1.1.0 255.255.255.0 null0) inject this route into bgp. make sure theother routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations tothe ones we provided. often there is more than one to complete a task so your configuration may be different thanours. if your configuration are different than ours make sureyou understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. youshould be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface.please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as neededas shown on the network diagram. you may have to add。
思科认证考试(CCNA)考试模拟题01—19及答案(1)-思科认证试题
思科认证考试(CCNA)考试模拟题01—19及答案(1)-思科认证试题Below are questions 1-19. To see an explanation for each question, please refer to the explanation link below the question or select explanations on the navigation bar to the left. Questions1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header?a) 96b) 47c) a random number above 1024d) 69e) none of the above2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.33. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the above4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addresses5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cache6. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network anda BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the above8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) O。
ccie350-001题库翻译满分的
1.What is the purpose of an explicit "deny any" statement at the end of an ACL?什么是明确表达在一个ACL最后有一个拒绝所有的条目D. to allow the log option to be used to log any matches用它来匹配剩下所有的项目2.Which of these is mandatory when configuring Cisco IOS Firewall?那个被强制配置在CISCO的防火墙上E. an inbound extended ACL applied to the untrusted interface一个在in方向上的扩展ACL 应用在不可信的端口上3. Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?哪种说法正确地描述了MPLS网络中IP传输的TTL是禁用的?D. The TTL field of the MPLS label header is set to 255.TTL失效是因为MPLS的标签头的TTL字段设置为255。
4. Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?有两个运行BGP的路由器连接到防火墙,一个在inside接口,一个在outside 接口。
思科认证考试(CCNA)考试模拟题01—19及答案(1)-思科认证试题
思科认证考试(CCNA)考试模拟题01—19及答案(1)-思科认证试题---------------------------------------Below are questions 1-19. To see an explanation for each question, please refer to the explanation link below the question or select explanations on the navigation bar to the left. Questions1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header?a) 96b) 47c) a random number above 1024d) 69e) none of the above2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Internet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.33. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the "router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the above4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addresses5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cache6. [CxNx] Reverse Address Resolution Protocol (RARP) is the process:a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network anda BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the above8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) O感谢阅读,欢迎大家下载使用!。
思科认证考试题库
思科认证考试题库思科认证考试题库首发网站:1. What are two reasons that a network administrator would use access lists? (Choose two.)A. to control vty access into a routerB. to control broadcast traffic through a routerC. to filter traffic as it passes through a routerD. to filter traffic that originates from the routerE. to replace passwords as a line of defense against security incursionsAnswer: AC解释一下:在VTY线路下应用ACL,可以控制从VTY线路进来的telnet的流量。
也可以过滤穿越一台路由器的流量。
2. A default Frame Relay WAN is classified as what type of physical network?A. point-to-pointB. broadcast multi-accessC. nonbroadcast multi-accessD. nonbroadcast multipointE. broadcast point-to-multipointAnswer: C解释一下:在默认的情况下,帧中继为非广播多路访问链路。
但是也可以通过子接口来修改他的网络的类型。
3.Refer to the exhibit. How many broadcast domains exist in the exhibited topology?A. oneB. twoC. threeD. fourE. fiveF. sixAnswer: C解释一下:广播域的问题,在默认的情况下,每个交换机是不能隔离广播域的,所以在同一个区域的所有交换机都在同一个广播域中,但是为了减少广播的危害,将广播限制在一个更小的范围,有了VLAN的概念,VLAN表示的是一个虚拟的局域网,而他的作用就是隔离广播。
思科考试试题
思科考试试题1. 简介思科考试是指由思科公司所提供的一系列专业认证考试,旨在评估个人在网络技术和解决方案方面的知识和技能。
本文将介绍思科考试的类型、考试结构以及考试准备的重要性。
2. 考试类型思科考试包括不同级别和专业领域的认证,其中最为知名的包括:- CCNA(思科认证网络工程师):测试网络基础知识和技能;- CCNP(思科认证网络专业人员):测试进阶的网络技术和解决方案能力;- CCIE(思科认证互联网专家):测试深度的网络架构和解决方案设计能力。
3. 考试结构思科考试的结构根据不同的认证级别而有所不同。
一般而言,考试结构包括以下几个方面:- 单选题:从若干个选项中选择正确答案;- 多选题:从若干个选项中选择多个正确答案;- 模拟题:模拟实际的网络问题,要求考生进行实际操作;- 案例分析题:根据实际案例,解决网络问题并提供解决方案;- 实验题:要求考生在实际网络环境中进行配置和故障排除。
4. 考试准备考试准备是取得好成绩的重要因素。
以下是考试准备的一些建议:- 学习思科官方教材:思科官方教材是准备思科考试的基础,具有全面的知识体系和详细的考试要点;- 参加培训课程:参加由思科认可的培训课程,能够获得系统化的培训和指导,提高学习效率;- 进行实践操作:通过搭建网络实验环境,进行实践操作,加深对网络知识和技术的理解和掌握;- 制定学习计划:合理规划学习进度和时间分配,每天进行坚持的学习,确保全面复习。
5. 注意事项在参加思科考试时,还需要注意以下细节:- 考试前的准备:考生应提前熟悉考场和考试要求,携带有效身份证件和考试确认函;- 考试态度:认真对待每一个考题,仔细阅读题目和选项,理解题意后再作答;- 时间管理:合理分配时间,不要在某一道题目上花费过多时间,以免耽误其他题目的答题时间;- 答题策略:对于不确定的题目,可以先标记留待后续再回答,以免过多耽误时间。
6. 总结思科考试作为评估个人网络技术和解决方案能力的重要指标,对于职业发展具有重要意义。
思科认证CNAA考试模拟试题及答案
思科认证CNAA考试模拟试题及答案1: your junior network administrator wants to know what the default subnet mask is for a class c ip address. what do you tell him?a. 255.0.0.0]6lb. 255.255.0.0c. 255.245.255.0d. 255.255.255.0e. 255.255.255.2552: an application needs to have reliable, end-to-end connect-ivity. which of the following protocols will give you reliable connectivity?a. tcpb. udpc. ipd. icmp3: you are designing a network, which needs to support 55 users. you don't plan to extend the segment beyond the current number of users. which subnet mask would best meet your needs?a. 255.255.0.0b. 255.255.255.0c. 255.255.255.192d. 255.255.255.1604: you have added a new switch to your network. you want to manage it remotely, so you need to assign it an ip address. your router that connects to the switch has an ip address of 172.16.12.33/27. which of the following addresses can you assign to this switch?a. 172.16.12.33/28b. 172.16.12.32/27c. 172.16.12.33/27d. 172.16.12.34/27e. 172.16.12.35/28f. 172.16.12.38/28g. 172.16.12.63/275: the address 172.16.208.16/20 is a host address in which of the following subnets?a. 172.16.176.0–255.255.240.0b. 172.16.192.0–255.255.240.0c. 172.16.208.0–255.255.240.0d. 172.16.224.0–255.255.240.06: you are designing an ip address scheme for your brand new remote office. the vice president of it calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. this supplies you with a single subnetwork with 62 hosts. you need to have at least two subnets with 14 hosts in each subnet. what custom subnet mask should you use?a. 255.255.255.128b. 255.255.255.192c. 255.255.255.224d. 255.255.255.240e. 255.255.255.2487: you have subnetted the 210.106.14.0 network with a /24 mask. your boss at acme, inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. what should youtell her?a. one network with 254 hostsb. two networks with 128 hostsc. four networks with 64 hostsd. six networks with 30 hosts8: identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (choose three.)a. 201.168.27.33b. 201.168.27.112c. 201.168.27.119d. 201.168.27.126e. 201.168.27.175f. 201.168.27.2089: what is the subnetwork address for a host with the ip address 201.100.5.68/28?a. 201.100.5.0b. 201.100.5.32c. 201.100.5.64d. 201.100.5.65e. 201.100.5.31f. 201.100.5.110: which of the following protocols uses a three-way handshake mechanism to establish sessions?a. tcpb. ipc. udpd. ipxe. frame relay11: which of the following protocols is connection-orienteda. tcpb. ipc. ipxd. frame relay12: you are using an application on your windows 2000 client machines that provides error correction. you need a protocol to provide fast transport. which protocol should your application use?a. tcpb. ipc. udpd. spxe. appletalk13: when using tcp, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. this behavior is known as ______________.a. mtu adjustmentb. windowingc. flexible send pathd. fcs14: if the destination did not receive a segment, how will the tcp host know to resend the information?a. the ack received will not include the segment number that was not received.b. the ack received will include the segment number that was not received.c. the sending host will send a pack to verify segment receipt.d. the destination host will send a yack message back to the sending host.15: you are planning on using a single network that supports 208 users. which ip address class would you choose to be the most efficient?a. class ab. class bc. class cd. class de. class e16: rfc 1918 defines the private ip address ranges. which of the following ip addresses are considered part of these ranges? (choose three.)a. 10.23.45.67b. 126.21.34.56c. 172.16.32.1d. 172.31.234.55e. 192.169.4.517: a new network is being designed for your company, acme, inc. if you use a class c ip network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?departmentnumber of userscorporate7customer support15financial13hr7engineering16a. 255.255.255.0b. 255.255.255.192c. 255.255.255.224d. 255.255.255.240e. 255.255.255.24818: which of these protocols provides data transport, relying on the error correction capabilities of the application itself?a. udpb. tcpc. snmpd. icmp19: which of the following are used by tcp to ensure reliable delivery of data? (choose two.)a. mac address resolutionb. sequence numbersc. acknowledgments(GbbFi,tk k&dF={(GbbFi,tk k&dF={t$d. pinge. routing updates20: you discover that you are able to adjust the window size of the tcp segment. you increase the window size to test the results. what will you observe happening on your network?a. increased throughputb. decreased throughputc. increased latencyd. decreased reliability。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exam : 350-901
Title : Developing Applications using
Cisco Core Platforms & APIs Vendor : Cisco
Version : DEMO
NO.1 A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. What must be done on the API to resolve the issue?
A.Additional permission must be granted before the request can submitted.
B.Configure new valid credentials.
C.The requested API endpoint does not exist, and the request URL must be changed.
D.Access permission to the resource must be granted, before the request.
Answer: A
NO.2 Which database type should be used with highly structured data and provides support for ACID transactions?
A.relational
B.time series
C.document
D.graph
Answer: A
NO.3 A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)
A.Ansible for configuration
B.Puppet for orchestration
C.Terraform for orchestration
D.Terraform for configuration
E.Ansible for orchestration
Answer: A,C
NO.4 Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.
Answer:
NO.5 Refer to the exhibit.
Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.
Answer:
NO.6 Which two strategies are used to protect personally identifiable information? (Choose two.)
A.Encrypt hash values of data.
B.Only hash usernames and passwords for efficient lookup.
C.Only encrypt usernames and passwords for efficient lookup.
D.Encrypt data at rest.
E.Encrypt data in transit.
Answer: A,E
NO.7 Refer to the exhibit.
The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is
the result when this task is run?
A.VRFs defined in the host_vars file are removed from the device.
B.VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.
C.VRFs not defined in the host_vars file are removed from the device.
D.VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.
Answer: D
NO.8 Refer to the exhibit.
Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.
Answer:
NO.9 Refer to the exhibit.
Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
A. headers = {'Authorization':'Basic YWRtaW46R3JhcGV2aW5IMQ=='}
B. headers = {'X-auth-token':'fa8426a0-8eaf-4d22-8e13-7c1b16a9370c'}
C.headers = {'Content-type':'application/json}
D.headers = {'Authorization':'Bearer ASDNFALKJER23412RKDALSNKF"}
Answer: B。