思科第一学期期末考试最新考题CCNA1

合集下载

思科题目

思科题目

CCNACCNA11章节考试题之01《生活在以网络为中心的世界》1、在主要使用文本相互通信的两人或多人之间,他们使用的哪种通信形式属于基于文本的实时通信?A.网络日志B.维基C.即时消息D.播客E.协作工具2、哪种网络为客户提供对企业数据(如库存、部件列表和订单)的有限访问?A.内部网B.外联网C.网际网络D.Internet3、出于管理数据的目的,需要使用什么来权衡通信的重要性及其特征?A.网络管理B.网络流量C.QoS策略D.网络评估4、对网络通信采取哪些处理后才能使服务质量策略正常发挥作用?(选择两项)A.根据服务质量要求对通信分类。

B.对应用程序数据的每个分类分配优先级。

C.始终对Web通信分配高优先级处理队列。

D.始终对数字电影分配高优先级处理队列。

E.始终对电子邮件通信分配低优先级队列。

5、网络体系结构有哪两个部分?(选择两项)A.构成以人为本网络的人B.通过网络传输消息的编程服务和协议C.通过网络传输的数据D.支持网络通信的技术E.运营和维护数据网络的企业6、在当初开发Internet时,放弃面向连接的电路交换技术出于哪三个原因?(选三项)A.电路交换技术要求将单个消息划分为包含编址信息的多个消息。

B.早期的电路交换网络在电路出现故障时不能自动建立备用链路。

C.电路交换技术要求即使两个位置之间当前并未传输数据,也必须在网络端点之间建立开放电路。

D.通过面向连接的电路交换网络传输消息无法保证质量和一致性。

E.建立多路并发开放电路获得容错能力成本高昂。

7、开发Internet时使用数据包交换无连接数据通信技术出于哪三个原因?(选三项)A.它能快速适应数据传输设施的丢失。

B.它能有效利用网络基础架构传输数据。

C.数据包可同时通过网络采取多条路径传输。

D.支持按建立连接的时间收取网络使用费用。

E.传输数据之前需要在源设备和目的设备之间建立数据电路。

8、QoS在融合网络中的作用是什么?A.确保丢弃高于可用带宽水平的所有通信B.确定网络中不同通信的传输优先级C.针对所有网络通信确定精确的优先级D.允许网络中的其它组织共享未使用的带宽9、将左侧的选项和右侧的对象连线,使网络体系结构的特征与其定义相匹配。

思科网院-网络工程-CCNA1-2017计算机科学与技术-一到十一章-题库及答案

思科网院-网络工程-CCNA1-2017计算机科学与技术-一到十一章-题库及答案

某公司正在考虑是使用客户端/服务器还是对等网络。

下列哪三项是对等网络的特征?(选择三项。

)哪种设备的功能是确定消息在网际网络中传输的路径?哪两个条件有助于您从各种网络介质当中选择一种网络介质?(请选择两项。

)下列哪两项描述了中间设备?(选择两项。

)网络上的终端设备有哪两项功能?(选择两项。

)由于许多学生带着自己的平板电脑和智能手机去学校访问学校资源,大学里的IT 人员最有可能需要重新设计的网络区域是什么?家庭用户必须要有哪种网络类型访问才能进行网上购物?一位分支机构办公室的员工正在为客户创建报价。

为此,该员工需要访问位于总部办公室的内部服务器上的机密定价信息。

该员工将要访问哪种类型的网络?下列哪两种连接选项可以为家庭办公室中的计算机提供始终在线的高带宽Internet 连接?(选择两项。

)下列哪两个Internet 连接选项不需要建筑物铺设物理电缆?(请选择两项。

)以下哪种术语描述了当对网络资源的请求超出可用容量时网络的状态?哪种类型的网络流量需要QoS?以下哪项表述准确定义了术语“带宽”?网络管理员正在实施一种要求复杂强密码的策略。

该策略支持哪种数据保护目标?下列哪种说法正确描述了云计算的特征?什么是Internet?下列哪种说法描述了电力线网络技术的用途?哪种安全侵犯会对家庭用户的生活造成最大损害?一位用户正在一个小型办公室网络上实施安全策略。

以下哪两种操作将为此网络提供求?(选择两项。

)A网络能够通过相同的通信通道传输语音、视频、文本和图形。

填空题。

缩写词是指允许员工在公司办公室中使用其个人设备访问网络和其他资源的策略。

正确答案:byod将每个描述与网络通信形式配对请将每个特征对应的internet连接类型进行匹配将每个定义与安全目标配对操作软件内核的作用是什么?网络管理员与交换机建立远程CLI 连接对其实施管理时,需要确保用户ID、密码和会话内容的保密性。

应当选择哪种访问方法?当在安全环境下执行初始配置时,下列哪个程序可用来访问Cisco 2960 交换机?哪个命令或组合键让用户返回命令层级中的上一级?某台路由器具有有效的操作系统,且NVRAM 中存储有配置文件。

最新版本CCNA考试第一章期末考试答案b

最新版本CCNA考试第一章期末考试答案b

最新版本CCNA考试第一章期末考试答案本文提供了最新版本的CCNA考试第一章期末考试答案,以供考生参考。

第一部分:单项选择题1. 以下哪种设备可用于实现广域网?A. 路由器B. 交换机C. 防火墙D. 网桥正解:A2. 哪一个网络层协议是用于将MAC地址转换为IP地址?A. ARP协议B. TCP协议C. UDP协议D. ICMP协议正解:A3. 网络安全中,以下哪项是确保数据在传输过程中不被窃取或修改的安全措施?A. 机密性B. 完整性C. 可用性D. 可验证性正解:B4. 在OSI模型中,下列哪层负责对收到的数据进行重新组装和排序?A. 传输层C. 数据链路层D. 物理层正解:A5. 哪种类型的地址可以用于从源到目的地的识别和路由?A. 物理地址B. MAC地址C. IP地址D. 逻辑地址正解:C第二部分:多项选择题1. 选择下列关于TCP传输协议的正确说法。

(可多选)A. TCP使用可靠性较低的UDP协议B. TCP的流控制指令有多种方式C. TCP在传输层实现D. TCP提供无连接服务正解:B、C2. 在主机间进行通信时,哪个MAC地址首先被使用?A. 源主机的MAC地址B. 目的主机的MAC地址C. 网关的MAC地址D. 路由器的MAC地址正解:C3. 下列哪个网络拓扑结构最好的容错性?A. 星形拓扑C. 总线型拓扑D. 带环形拓扑正解:A4. 以下哪个选项是网络安全的最佳实践?A. 使用复杂的密码并定期更改B. 允许所有用户访问系统C. 共享所有文件和文件夹D. 手动分配IP地址正解:A5. 哪种网络协议可以在发送方和接收方之间创建安全的数据连接?A. SSLB. HTTPC. FTPD. SMTP正解:A第三部分:简答题1. 请简要解释网络拓扑结构。

网络拓扑结构指的是计算机网络中设备的布局方式。

常见的网络拓扑包括星型、环状、总线型和带环型等。

其中,星型拓扑结构最为常见,它由多台计算机通过中心节点相连而组成。

思科考试CCNA

思科考试CCNA

CCNA(1)适用班级:CCNA注意事项:1.在试卷的标封处填写姓名和班级2.考试时间共120分钟3.答案写在答题卡上1. What is the maximum number of IP addresses that can be assigned to hosts on a local subnetthat uses the subnet maskA. 14B. 15C. 16D. 30E. 31F. 622. You have a network that needs 29 subnets while maximizing the number of host addressesavailable on each subnet. How many bits must you borrow from the host field to provide thecorrect subnet maskA. 2B. 3C. 4D. 5E. 6F. 73. What is the subnetwork address for a host with the IP address The network address of provides how many subnets and hostsA. 7 subnets, 30 hosts eachB. 7 subnets, 2,046 hosts eachC. 7 subnets, 8,190 hosts eachD. 8 subnets, 30 hosts eachE. 8 subnets, 2,046 hosts eachF. 8 subnets, 8,190 hosts each5. Which two statements describe the IP address 10.16.3.65/23 (Choose two.)A. The subnet address is 10.16.3.0 The lowest host address in the subnet is 10.16.2.1 The last valid host address in the subnet is 10.16.2.254 The broadcast address of the subnet is 10.16.3.255 The network is not subnetted.6. If a host on a network has the address what is the subnetwork this hostbelongs toA. On a VLSM network, which mask should you use on point-to-point WAN links in order toreduce the waste of IP addressesA. /27B. /28C. /29D. /30E. /318. What is the subnetwork number of a host with an IP address of You have an interface on a router with the IP address of Including the routerinterface, how many hosts can have IP addresses on the LAN attached to the router interfaceA. 6B. 8C. 30D. 62E. 12610. You need to configure a server that is on the subnet The router has the firstavailable host address. Which of the following should you assign to the serverA. You have an interface on a router with the IP address of What is thebroadcast address the hosts will use on this LANA. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classfulsubnet mask would you useA. A network administrator is connecting hosts A and B directly through their Ethernet interfaces,as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can bedone to provide connectivity between the hosts (Choose two.)A. A crossover cable should be used in place of the straight-through cable.B. A rollover cable should be used in place of the straight-through cable.C. The subnet masks should be set to A default gateway needs to be set on each host.E. The subnet masks should be set to Address: Address: Cable164 Chapter 3 Subnetting, VLSMs, and Troubleshooting TCP/IP14. If an Ethernet port on a router were assigned an IP address of what wouldbe the valid subnet address of this hostA. Using the following illustration, what would be the IP address of E0 if you were using theeighth subnet The network ID is and you need to use the last available IPaddress in the range. The zero subnet should not be considered valid for this question.A. Using the illustration from the previous question, what would be the IP address of S0 if you wereusing the first subnet The network ID is and you need to use the last availableIP address in the range. Again, the zero subnet should not be considered valid for this question.A. Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is Router(config)#ip classlessB. Router(config)#ip version 6C. Router(config)#no ip classfulD. Router(config)#ip unnumberedE. Router(config)#ip subnet-zeroF. Router(config)#ip all-nets18. You have a network with a subnet of Which is the valid host addressA. Your router has the following IP address on Ethernet0: Which of the following can be valid host IDs on the LAN interface attached to the router (Choose two.)A. To test the IP stack on your local host, which IP address would you pingA. 1.0.0.127C. You type show running-config and get this output:[output cut]Line console 0Exec-timeout 1 44Password 7098C0BQRLogin[output cut]What do the two numbers following the exec-timeout command meanA. If no command has been typed in 44 seconds, the console connection will be closed.B. If no router activity has been detected in 1 hour and 44 minutes, the console will be locked out.C. If no commands have been typed in 1 minute and 44 seconds, the console connection willbe closed.D. If you’re connected to the router by a Telnet connection, input must be detected within 1 minute and 44 seconds or the connection will be closed.22. You need to find the broadcast address used on a LAN on your router. What command willyou type into the router from user mode to find the broadcast addressA. show running-configB. show startup-configC. show interfacesD. show protocols23. You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you useA. replace run startB. copy run startC. copy start runD. reloadReview Questions 24324. Which command will show you whether a DTE or a DCE cable is plugged into serial 0A. sh int s0B. sh int serial 0C. show controllers s 0D. show serial 0 controllers25. What keystroke will terminate setup modeA. Ctrl+ZB. Ctrl+^C. Ctrl+CD. Ctrl+Shift+^26. You set the console password, but when you display the configuration, the password doesn’t show up; it looks like this:[output cut]Line console 0Exec-timeout 1 44Password 7098C0BQRLogin[output cut]What cause the password to be stored like thisA. encrypt passwordB. service password-encryptionC. service-password-encryptionD. exec-timeout 1 4427. Which of the following commands will configure all the default VTY ports on a routerA. Router#line vty 0 4B. Router(config)#line vty 0 4C. Router(config-if)#line console 0D. Router(config)#line vty all28. Which of the following commands sets the secret password to CiscoA. enable secret password CiscoB. enable secret ciscoC. enable secret CiscoD. enable password Cisco244 Chapter 4 Cisco’s IOS and Security Device Manager29. If you wanted administrators to see a message when logging into the router, which command would you useA. message banner motdB. banner message motdC. banner motdD. message motd30. How many simultaneous Telnet sessions does a Cisco router support by defaultA. 1B. 2C. 3D. 4E. 5F. 631. What command do you type to save the configuration stored in RAM to NVRAMA. Router(config)#copy current to startingB. Router#copy starting to runningC. Router(config)#copy running-config startup-configD. Router#copy run startup32. You try to telnet into SFRouter from router Corp and receive this message:Corp#telnet SFRouterTrying SFRouter (10.0.0.1)…OpenPassword required, but none set[Connection to SFRouter closed by foreign host]Corp#Which of the following sequences will address this problem correctlyA. Corp(config)#line console 0B. SFRemote(config)#line console 0C. Corp(config)#line vty 0 4D. SFRemote(config)#line vty 0 433. Which command will delete the contents of NVRAM on a routerA. delete NVRAMB. delete startup-configC. erase NVRAMD. erase startReview Questions 24534. What is the problem with an interface if you type show interface serial 0 and receive the following messageSerial0 is administratively down, line protocol is downA. The keepalives are different times.B. The administrator has the interface shut down.C. The administrator is pinging from the interface.D. No cable is attached.35. Which of the following commands displays the configurable parameters and statistics of all interfaces on a routerA. show running-configB. show startup-configC. show interfacesD. show versions36. If you delete the contents of NVRAM and reboot the router, what mode will you be inA. Privileged modeB. Global modeC. Setup modeD. NVRAM loaded mode37. You type the following command into the router and receive the following output: Router#show serial 0/0^% Invalid input detected at ‘^’marker.Why was this error message displayedA. You need to be in privileged mode.B. You cannot have a space between serial and 0/0.C. The router does not have a serial0/0 interface.D. Part of the command is missing.38. You type Router#sh ru and receive an % ambiguous command error. Why did you receivethis messageA. The command requires additional options or parameters.B. There is more than one show command that starts with the letters ru.C. There is no show command that starts with ru.D. The command is being executed from the wrong router mode.246 Chapter 4 Cisco’s IOS and Security Device Manager39. Which of the following commands will display the current IP addressing and the layer 1 and2 status of an interface (Choose three.)A. show versionB. show protocolsC. show interfacesD. show controllersE. show ip interfaceF. show running-config40. What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following messageSerial1 is down, line protocol is downA. Physical layerB. Data Link layerC. Network layerD. None; it is a router problem.41. What does the command o/r 0x2142 provideA. It is used to restart the router.B. It is used to bypass the configuration in NVRAM.C. It is used to enter ROM Monitor mode.D. It is used to view the lost password.42. Which command will copy the IOS to a backup host on your networkA. transfer IOS to copy run startC. copy tftp flashD. copy start tftpE. copy flash tftp43. You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault.What IOS user exec command should you issueA. Router>pingB. Router>traceC. Router>show ip routeD. Router>show interfaceE. Router>show cdp neighbors44. You copy a configuration from a network host to a router’s RAM. The configuration looks correct, yet it is not working at all. What could the problem beA. You copied the wrong configuration into RAM.B. You copied the configuration into flash memory instead.C. The copy did not override the shutdown command in running-config.D. The IOS became corrupted after the copy command was initiated.45. A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the currentIOS image and indicate whether there is enough room available to hold both the currentand new imagesA. show versionB. show flashC. show memoryD. show buffersE. show running-config46. The corporate office sends you a new router to connect, but upon connecting the console cable,you see that there is already a configuration on the router. What should be done before a new configuration is entered in the routerA. RAM should be erased and the router restarted.B. Flash should be erased and the router restarted.C. NVRAM should be erased and the router restarted.D. The new configuration should be entered and saved.47. Which command loads a new version of the Cisco IOS into a routerA. copy flash ftpB. copy ftp flashC. copy flash tftpD. copy tftp flash48. Which command will show you the IOS version running on your routerA. sh IOSB. sh flashC. sh versionD. sh running-config49. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operationA. 0x2100B. 0x2101C. 0x2102D. 0x214250. You save the configuration on a router with the copy running-config startup-configcommand and reboot the router. The router, however, comes up with a blank configuration.What can the problem beA. You didn’t boot the router with the correct command.B. NVRAM is corrupted.C. The configuration register setting is incorrect.D. The newly upgraded IOS is not compatible with the hardware of the router.E. The configuration you save is not compatible with the hardware.51. If you want to have more than one Telnet session open at the same time, what keystroke combination would you useA. Tab+spacebarB. Ctrl+X, then 6C. Ctrl+Shift+X, then 6D. Ctrl+Shift+6, then X52. You are unsuccessful in telnetting into a remote device. What could the problem be (Choose two.)A. IP addresses are incorrect.B. Access control list is filtering Telnet.C. There is a defective serial cable.D. The VTY password is missing.53. What information is displayed by the show hosts command (Choose two.)A. Temporary DNS entriesB. The names of the routers created using the hostname commandC. The IP addresses of workstations allowed to access the routerD. Permanent name-to-address mappings created using the ip host commandE. The length of time a host has been connected to the router via Telnet54. Which three commands can be used to check LAN connectivity problems on a router(Choose three.)A. show interfacesB. show ip routeC. tracertD. pingE. dns lookups55. You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type inA. closeB. disableC. disconnectD. exit56. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem beA. You must type the show ip rip command first.B. IP addressing on the network is incorrect.C. You must use the terminal monitor command.D. Debug output is sent only to the console.57. Which command displays the configuration register settingA. show ip routeB. show boot versionC. show versionD. show flash58. You need to gather the IP address of a remote switch that is located in Hawaii. What can youdo to find the addressA. Fly to Hawaii, console into the switch, then relax and have a drink with an umbrella in it.B. Issue the show ip route command on the router connected to the switch.C. Issue the show cdp neighbor command on the router connected to the switch.D. Issue the show ip arp command on the router connected to the switch.E. Issue the show cdp neighbors detail command on the router connected to the switch.59. You have your laptop directly connected into a router’s Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful (Choose three.)A. TFTP server software must be running on the router.B. TFTP server software must be running on your laptop.C. The Ethernet cable connecting the laptop directly into the router’s Ethernet port mu st bea straight-through cable.D. The laptop must be on the same subnet as the router’s Ethernet interface.E. The copy flash tftp command must be supplied the IP address of the laptop.F. There must be enough room in the flash memory of the router to accommodate the file tobe copied.60. The configuration register setting of 0x2102 provides what function to a routerA. Tells the router to boot into ROM monitor modeB. Provides password recoveryC. Tells the router to look in NVRAM for the boot sequenceD. Boots the IOS from a TFTP serverE. Boots an IOS image stored in ROM61. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication sessionA. Send a different source port number.B. Restart the virtual circuit.C. Decrease the sequence number.D. Decrease the window size.62. Which fields are contained within an IEEE Ethernet frame header (Choose two.)A. Source and destination MAC addressB. Source and destination network addressC. Source and destination MAC address and source and destination network addressD. FCS field63. Which layer 1 devices can be used to enlarge the area covered by a single LAN segment (Choose two.)A. SwitchB. NICC. HubD. RepeaterE. RJ45 transceiver64. Segmentation of a data stream happens at which layer of the OSI modelA. PhysicalB. Data LinkC. NetworkD. Transport65. Which of the following describe router functions (Choose four.)A. Packet switchingB. Collision preventionC. Packet filteringD. Broadcast domain enlargementE. Internetwork communicationF. Broadcast forwardingG. Path selection66. Routers operate at layer __. LAN switches operate at layer __. Ethernet hubs operate at layer __. Word processing operates at layer __.A. 3, 3, 1, 7B. 3, 2, 1, noneC. 3, 2, 1, 7D. 2, 3, 1, 7E. 3, 3, 2, none67. When data is encapsulated, which is the correct orderA. Data, frame, packet, segment, bitB. Segment, data, packet, frame, bitC. Data, segment, packet, frame, bitD. Data, segment, frame, packet, bit68. Why does the data communication industry use the layered OSI reference model (Choose two.)A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.B. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.C. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.D. It encourages industry standardization by defining what functions occur at each layer ofthe model.E. It provides a framework by which changes in functionality in one layer require changes inother layers.69. What are two purposes for segmentation with a bridgeA. To add more broadcast domainsB. To create more collision domainsC. To add more bandwidth for usersD. To allow more broadcasts for users70. Which of the following are unique characteristics of half-duplex Ethernet when compared tofull-duplex Ethernet (Choose two.)A. Half-duplex Ethernet operates in a shared collision domain.B. Half-duplex Ethernet operates in a private collision domain.C. Half-duplex Ethernet has higher effective throughput.D. Half-duplex Ethernet has lower effective throughput.E. Half-duplex Ethernet operates in a private broadcast domain.58 Chapter 1 Internetworking71. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you useA. Thicknet coaxB. Thinnet coaxC. Category 5 UTP cableD. Fiber-optic cable72. Acknowledgments, sequencing, and flow control are characteristics of which OSI layerA. Layer 2B. Layer 3C. Layer 4D. Layer 773. Which of the following are types of flow control (Choose all that apply.)A. BufferingB. Cut-throughC. WindowingD. Congestion avoidanceE. VLANs74. Which of the following types of connections can use full duplex (Choose three.)A. Hub to hubB. Switch to switchC. Host to hostD. Switch to hubE. Switch to host75. What is the purpose of flow controlA. To ensure that data is retransmitted if an acknowledgment is not receivedB. To reassemble segments in the correct order at the destination deviceC. To provide a means for the receiver to govern the amount of data sent by the senderD. To regulate the size of each segment76. Which three statements are true about the operation of a full-duplex Ethernet networkA. There are no collisions in full-duplex mode.B. A dedicated switch port is required for each full-duplex node.C. Ethernet hub ports are preconfigured for full-duplex mode.D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.E. The host network card and the switch port must be capable of operating in full-duplex mode. Review Questions 5977. What type of RJ45 UTP cable is used between switchesA. Straight-throughB. Crossover cableC. Crossover with a CSU/DSUD. Crossover with a router in between the two switches78. How does a host on an Ethernet LAN know when to transmit after a collision has occurred (Choose two.)A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C. You can improve the CSMA/CD network by adding more hubs.D. After a collision, the station that detected the collision has first priority to resend thelost data.E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.79. What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console portA. Straight-throughB. Crossover cableC. Crossover with a CSU/DSUD. Rolled80. You have the following binary number:What are the decimal and hexadecimal equivalentsA. 69/0x2102B. 183/B7C. 173/A6D. 83/0xC581. What are the decimal and hexadecimal equivalents of the binary number(Choose two.)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x15982. Which of the following allows a router to respond to an ARP request that is intended for a remote hostA. Gateway DPB. Reverse ARP (RARP)C. Proxy ARPD. Inverse ARP (IARP)E. Address Resolution Protocol (ARP)83. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you useto accomplish thisA. SMTPB. SNMPC. DHCPD. ARP84. What protocol is used to find the hardware address of a local deviceA. RARPB. ARPC. IPD. ICMPE. BootP85. Which of the following are layers in the TCP/IP model (Choose three.)A. ApplicationB. SessionC. TransportD. InternetE. Data LinkF. Physical86. Which class of IP address provides a maximum of only 254 host addresses per network IDA. Class AB. Class BC. Class CD. Class DE. Class E87. Which of the following describe the DHCP Discover message (Choose two.)A. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.B. It uses UDP as the Transport layer protocol.C. It uses TCP as the Transport layer protocol.D. It does not use a layer 2 destination address.8. Which layer 4 protocol is used for a Telnet connectionA. IPB. TCPC. TCP/IPD. UDPE. ICMP89. Which statements are true regarding ICMP packets (Choose two.)A. They acknowledge receipt of a TCP segment.B. They guarantee datagram delivery.C. They can provide hosts with information about network problems.D. They are encapsulated within IP datagrams.E. They are encapsulated within UDP datagrams.90. Which of the following services use TCP (Choose three.)A. DHCPB. SMTPC. SNMPD. FTPE. HTTPF. TFTP91. Which of the following services use UDP (Choose three.)A. DHCPB. SMTPC. SNMPD. FTPE. HTTPF. TFTP92. Which of the following are TCP/IP protocols used at the Application layer of the OSI model (Choose three.)A. IPB. TCPC. TelnetD. FTPE. TFTP93. The following illustration shows a data structure header. What protocol is this header fromA. IPB. ICMPC. TCPD. UDPE. ARPF. RARP94. If you use either Telnet or FTP, which is the highest layer you are using to transmit dataA. ApplicationB. PresentationC. SessionD. Transport95. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI modelA. ApplicationB. Host-to-HostC. InternetD. Network Access96. Which two of the following are private IP addressesA. 12.0.0.1B. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model A. ApplicationB. Host-to-HostC. InternetD. Network Access98. Which statements are true regarding ICMP packets (Choose two)A. ICMP guarantees datagram delivery.B. ICMP can provide hosts with information about network problems.C. ICMP is encapsulated within IP datagrams.D. ICMP is encapsulated within UDP datagrams.99. What is the address range of a Class B network address in binaryA. 01xxxxxxB. 0xxxxxxxC. 10xxxxxxD. 110xxxxx100. Which of the following protocols uses both TCP and UDPA. FTPB. SMTPC. TelnetD. DNS答题卡。

思科第一学期期末考试最新答案CCNA1

思科第一学期期末考试最新答案CCNA1

要将数据包发送到远程网络,应使用哪种设备?访问交换机DHCP 服务器集线器路由器OSI 哪一层使用面向连接的协议来确保数据的可靠传输?应用层表示层会话层传输层请参见图示。

根据显示的IP 配置回答,主机 A 和主机 B 无法在本地网络外通信的原因是什么?对主机 A 分配了网络地址。

对主机 B 分配了组播地址。

主机 A 和主机 B 属于不同的网络。

对网关地址分配了广播地址。

请参见图示。

包含路由器 B 的网络遇到问题。

助理网络工程师已确定此网络的问题出在路由行什么操作可以纠正该网络问题?在接口Serial 0/0/0 上发出clock rate命令在接口Serial 0/0/1 上发出description命令在接口FastEthernet 0/0 上发出ip address命令在接口FastEthernet 0/1 上发出no shutdown命令请参见图示。

对于从主机 A 向Web 服务器发出的网页请求,正确的目的套接字数字是什么00-08-a3-b6-ce-46198.133.219.25:80C 172.18.0.0/24 is directly connected, FastEthernet0/0在Cisco IOS 设备中,启动配置文件存储于何处?闪存NVRAMRAMROM在配置路由器时,网络技术人员想要命名路由器。

输入hostname命令后,技术人员会看到下列示?Router>Router#Router(config)#Router(config-line)#下列哪三个IPv4 地址代表子网的广播?(选择三项)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /27网络管理员想要限制访问路由器的特权执行模式。

管理员应该使用哪一种口令?使能aux控制台VTY请参见图示。

CCNA1全书练习题(所有章节chapter1至11)

CCNA1全书练习题(所有章节chapter1至11)

CCNA1全书练习题(所有章节chapter1至11)CCNA Exploration: 网络基础知识(版本4.0)第2章1. TCP/IP 网络接入层有何作用?A.路径确定和数据包交换B. 数据表示、编码和控制C. 可靠性、流量控制和错误检测D. 详细规定构成物理链路的组件及其接入方法E. 将数据段划分为数据包2.在封装过程中,数据链路层执行什么操作?A. 不添加地址。

B. 添加逻辑地址。

C. 添加物理地址。

D. 添加进程的端口号。

3. 请参见图示。

下列哪组设备仅包含终端设备?A. A、C、DB. B、E、G、HC. C、D、G、H、I、JD. D、E、F、H、I、JE. E、F、H、I、J4. 下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)A. 确定数据传输路径B. 发起数据通信C. 重新定时和重新传输数据信号D. 发送数据流E. 管理数据流F. 数据流最后的终止点5. 下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)A. LAN 通常位于一个地域内。

B. 此类网络由由一个组织管理。

C. LAN 中的不同网段之间一般通过租用连接的方式连接。

D. 此类网络的安全和访问控制由服务提供商控制。

E. LAN 为同一个组织内的用户提供网络服务和应用程序访问。

F. 此类网络的每个终端通常都连接到电信服务提供商(TSP)。

6. 通过检查网络层报头可以确定什么?A. 本地介质上的目的设备B. 用于到达目的主机的路径C. 将要通过介质传输的比特D. 创建数据的源应用程序或进程7. 哪种设备被视为中间设备?A. 文件服务器B. IP 电话C. 笔记本电脑D. 打印机E. 交换机8. OSI 模型各层从最高层到最低层的正确顺序如何?A. 物理层、网络层、应用层、数据链路层、表示层、会话层、传输层B. 应用层、物理层、会话层、传输层、网络层、数据链路层、表示层C. 应用层、表示层、物理层、会话层、数据链路层、传输层、网络层D. 应用层、表示层、会话层、传输层、网络层、数据链路层、物理层E. 表示层、数据链路层、会话层、传输层、网络层、物理层、应用层9. 请参见图示。

ccna考试题库最新版

ccna考试题库最新版

ccna考试题库最新版CCNA(Cisco Certified Network Associate)认证是全球范围内最受欢迎的网络工程师认证之一,具备CCNA认证可以证明一个人在建立、规划、运行、安装和配置中等规模的局域网和广域网方面的专业知识。

为了帮助广大考生顺利通过CCNA考试,不断更新的CCNA考试题库至关重要。

以下是最新版本的CCNA考试题库,希望对考生们有所帮助。

第一部分:网络基础知识1. 什么是OSI七层模型?简要介绍每一层的功能。

2. TCP和UDP之间有哪些区别?请分别举例说明。

3. 什么是IP地址?IP地址的类型有哪些?请列举并简要介绍各自的特点。

4. 什么是子网掩码?为什么在网络中使用子网掩码?5. 简述常见的网络设备有哪些,以及各自的功能与作用。

第二部分:路由和交换技术1. 路由器和交换机之间有何区别?请进行比较并指出各自的优势和劣势。

2. 什么是VLAN?VLAN的作用及在网络中的应用场景是什么?3. OSPF和EIGRP是两种常见的路由协议,请比较它们的特点并举例说明。

4. 请解释静态路由和动态路由的概念以及在网络中的应用。

5. 交换机在网络中扮演什么角色?交换机的MAC地址表是如何工作的?第三部分:网络安全和管理1. 网络安全的重要性是什么?请列举几种常见的网络安全威胁并介绍应对策略。

2. 什么是ACL(访问控制列表)?ACL的作用是什么?请给出一个ACL的配置示例。

3. VPN是什么?VPN的工作原理及在企业网络中的应用。

4. SNMP是网络管理中常用的协议,它的作用是什么?请解释SNMP中的几个重要概念。

5. 如何保护无线网络的安全?请列举几种方法。

第四部分:WAN技术1. 什么是WAN?WAN的主要特点是什么?2. PPP协议和HDLC协议分别是什么?请比较它们的异同。

3. 什么是Frame Relay?Frame Relay的工作原理及在WAN中的应用。

4. 请解释T1和E1的概念,以及它们在传输速率和应用方面的差异。

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题C C N A11Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfacnetwork card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423the IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 491 assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254 statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server.application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

思科CCNA考试答案(全)

思科CCNA考试答案(全)

CCNA思科考试答案(全)第 1 章考试1一家拥有10 名员工的小型公司使用单个LAN 在计算机之间共享信息。

哪种类型连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如DSL)答案:4解析:对于这种小型办公室,比较适合通过被称为数字用户线路(DSL) 的常见宽带服务实现Internet 连接,这种服务由当地的电话服务提供商提供。

由于员工人数很少,带宽的问题并不突出。

如果公司较大,在远程站点有分支机构,则专用线路会更加适合。

如果公司员工需要通过Internet 与公司联系,则采用虚拟专用网。

2哪种网络情况需要使用WAN?员工工作站需要获取动态分配的IP 地址。

员工在出差时需要通过VPN 连接到公司电子邮件服务器。

分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。

员工需要访问托管在其建筑物内DMZ 中的公司Web 服务器上的网页。

答案:2解析:当出差的员工需要通过WAN 连接到公司电子邮件服务器时,VPN 将通过WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。

通过DHCP 获取动态IP 地址是LAN 通信的功能。

在企业园区的不同建筑物之间共享文件可通过LAN 基础设施来实现。

DMZ 是企业LAN 基础设施内一个受保护的网络。

3以下哪项描述了WAN 的特征?WAN 和LAN 在同一地理范围内运行,但有串行链路。

WAN 网络归运营商所有。

所有串行链路均被视为WAN 连接。

WAN 可提供到园区主干网的终端用户网络连接。

答案:2解析:WAN 可用于将企业LAN 互连到远程分支机构站点LAN 和远程工作人员站点。

WAN 归运营商所有。

虽然WAN 连接一般通过串行接口实现,但并不是所有串行链路均连接至WAN。

LAN(而非WAN)可在组织中提供终端用户网络连接。

4电路交换WAN 技术的两个常见类型是什么?(请选择两项。

(完整版)ccna1章节与期末答案

(完整版)ccna1章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

ccna1章节与期末答案

ccna1章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

CCNA1 思科第一学期 ENetwork Chapter 3(附答案)

CCNA1 思科第一学期 ENetwork Chapter 3(附答案)

Simplified Chinese FormA ENetwork v4.0 Chapter 3此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.2.3 应用层服务及协议服务器上的应用层通常如何处理多客户端服务请求?终止与服务的所有连接拒绝与单一守护程序的多个连接暂停当前连接,建立新连接使用下一层功能的支持来区分不同的服务连接评分规则:correctness of response2 points for Option 40 points for any other option最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.3.4 FTP哪个应用层协议通常用于支持客户端与服务器之间的文件传输?HTMLHTTPFTPTelnet评分规则:correctness of response2 points for Option 30 points for any other option最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.1.2 应用层软件应用层软件的两种形式是什么?(选择两项)应用程序对话请求服务语法评分规则:correctness of responseOption 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required. 最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.1.1 OSI 模型及TCP/IP 模型OSI 应用层有何作用?提供数据分段提供数据加密和转换提供网络任意终端上应用程序之间的接口对源设备和目的设备之间流经的所有数据提供控制评分规则:correctness of response2 points for Option 30 points for any other option最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.2.1 客户端—服务器模型数据网络中的客户端有哪两种特征?(选择两项)使用守护程序发起数据交换是数据库可以向服务器上传数据侦听服务器的请求评分规则:correctness of responseOption 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.3.6 文件共享服务及SMB 协议哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?DHCPDNSSMBSMTPTelnet评分规则:correctness of response2 points for Option 30 points for any other option最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 3.2.4 点对点(P2P) 网络及应用程序以下哪两项是点对点网络的特征?(选择两项)可扩展单向数据流分散资源集中用户帐户共享资源时可以不借助专用服务器评分规则:correctness of responseOption 3 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required. 最高分值= 2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识* 4.5.3 应用层和传输层协议请参见图示。

思科第一学期期末考试最新答案[范文模版]

思科第一学期期末考试最新答案[范文模版]

思科第一学期期末考试最新答案[范文模版]第一篇:思科第一学期期末考试最新答案[范文模版]要将数据包发送到远程网络,应使用哪种设备?访问交换机DHCP 服务器集线器路由器OSI 哪一层使用面向连接的协议来确保数据的可靠传输?应用层表示层会话层传输层请参见图示。

根据显示的 IP 配置回答,主机 A 和主机 B 无法在本地网络外通信的原因是什么?对主机 A 分配了网络地址。

对主机 B 分配了组播地址。

主机 A 和主机 B 属于不同的网络。

对网关地址分配了广播地址。

请参见图示。

包含路由器B 的网络遇到问题。

助理网络工程师已确定此网络的问题出在路由行什么操作可以纠正该网络问题?在接口 Serial 0/0/0 上发出 clock rate 命令在接口 Serial 0/0/1 上发出 description 命令在接口 FastEthernet 0/0 上发出 ip address 命令在接口 FastEthernet 0/1 上发出 no shutdown 命令00-08-a3-b6-ce-46198.133.219.25:80C 172.18.0.0/24 is directly connected, FastEthernet0/0 请参见图示。

对于从主机A 向Web 服务器发出的网页请求,正确的目的套接字数字是什么在 Cisco IOS 设备中,启动配置文件存储于何处?闪存NVRAM RAM ROM在配置路由器时,网络技术人员想要命名路由器。

输入hostname 命令后,技术人员会看到下列示?Router> Router#Router(config)#Router(config-line)#下列哪三个IPv4 地址代表子网的广播?(选择三项)(主机为1)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /27网络管理员想要限制访问路由器的特权执行模式。

思科第一学期期末考试最新考题CCNA1

思科第一学期期末考试最新考题CCNA1

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B,E, FC,D, G,IG,H,I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full—duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit。

思科第一学期期末考试考题CCNA

思科第一学期期末考试考题CCNA

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configurationserver before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhib IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 4915 to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine whic device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

CCNA期末考试复习题(1)

CCNA期末考试复习题(1)

CCNA期末考试复习题一、选择题1 、图示的网络中有多少个冲突域?A 1B 2C 3D 6E 72、如图所示网络,交换机都是默认配置。

主机A需要和主机D通信,但是主机A没有默认网关的MAC地址。

哪些主机将收到主机A发出的ARP请求?A 只有主机DB 只有路由器R1C 只有主机B和CD 只有主机B,C和DE 只有主机B,C和路由器R13、如图所示,主机A属于哪个子网?A 10.197.0.0B 10.192.0.0C 10.197.184.0D 10.197.187.0E 10.197.187.1684、248表示为二进制形式是:A 11101000B 11110100C 11111000D 111110105、10BASE-T指哪种线缆?A 10Mbit/s传输速度,基带信号,线缆长度500M,同轴线B 10Mbit/s传输速度,宽带信号,线缆长度100M,同轴线C 10Mbit/s传输速度,基带信号,线缆长度100M,双绞线D 10Gbit/s传输速度,宽带信号,线缆长度500M,双绞线6、如图所示,网络管理员希望创建一个子网用于两个路由器点对点连接。

哪个子网掩码可以给点对点连接提供足够的地址,且浪费又最少?A 255.255.255.192B 255.255.255.224C 255.255.255.240D 255.255.255.248E 255.255.255.2527、如图所示,主机A希望发送一个消息给主机B。

请将下列步骤排列为正确的顺序,使得消息能够发送出去。

A——添加网络层地址B——发送比特C——创建应用层数据D——添加数据链路层地址A B—A—D—CB D—A—C—BC A—D—C—BD C—A—D—BE C—D—A—BF C—B—A—D8、一个C类网络192.168.35.0使用/28的掩码划分子网,可用子网个数及每子网的可用主机数分别是多少?A 6 子网/64主机B 14 子网/32主机C 14子网/14主机D 30子网/64主机9、哪种协议用来消灭交换环路?A TCPB RIPC STPD IGRPE IP10、因为无法ping通本地路由器,技术人员决定查看一下路由器。

CCNA1 思科第一学期 v1.0 ENetwork Chapter_5(附答案)

CCNA1 思科第一学期 v1.0 ENetwork Chapter_5(附答案)

1 默认网关有何作用?E错误!未找到引用源。

用于物理连接计算机和网络错误!未找到引用源。

为计算机提供永久地址错误!未找到引用源。

标识计算机所连接的网络错误!未找到引用源。

标识网络计算机的逻辑地址,并且是网络中的唯一标识错误!未找到引用源。

允许本地网络计算机和其它网络中的设备通信的设备标识2大型网络存在哪三个常见问题?(选择三项)BCE 错误!未找到引用源。

广播太少错误!未找到引用源。

性能下降错误!安全问题源。

错误!未找管理职责受限制到引用源。

错误!未找主机标识到引用源。

错误!未找协议兼容性到引用源。

3IP 数据包的哪个字段用于防止无限循环?D 错误!未找服务类型到引用源。

错误!未找标识到引用源。

错误!未找标志到引用源。

错误!生存时间未找到引误!未找报头校验和到引用源。

4下列哪项陈述描述了默认路由的作用?错误!未找主机使用默认路由将数据传输到位于同一个网段中的其它主机。

到引用源。

错误!未找主机使用默认路由将数据转发到本地交换机,它充当前往所有目的设备的下一跳。

到引用源。

错误!未找主机使用默认路由确定本地网络中终端设备的第 2 层地址。

到引用源。

错误!未找不存在通往目的主机的其它路由时,主机使用默认路由将数据传输到本地网络外的主机。

到引用源。

5在IPv4 环境中,路由器根据什么信息在不同的路由器接口之间转发数据包?A 错误!未找目的网络地址到引用源。

错源网络地址误!未找错误!未找源MAC 地址到引用源。

错误!未找公认端口目的地址到引用源。

6在无连接系统中,下列哪项陈述是正确的?B错误!未找发送数据包之前联系目的设备。

到引用源。

错误!未找发送数据包之前不联系目的设备。

到引用源。

错误!未找目的设备向源设备发送确认,表示已经收到数据包。

到引用源。

错误!未找目的设备向源设备发送确认,请求发送下一个数据包。

到引用源。

7如果目的网络未列在Cisco 路由器的路由表中,路由器可能会采取哪两项措施?(选择两项)错路由器发送ARP 请求以确定所需的下一跳地址。

CCNA E am CCNA第一学期期末考试

CCNA E am CCNA第一学期期末考试

CCNA1ENetworkFinalExam -CCNAExploration: 网络基础知识(版本 4.0)下列有关网络层编址的陈述中哪三项是正确的?(选择三项。

)网络层编址使用分层式结构。

使用长度为48 位的地址。

以太网交换机可以使用它来作出转发决定。

它不支持广播。

其使用的编址方法可以识别地址的网络部分。

网络层编址可以区分每台主机。

请参见图示。

在PC 上发出所示的命令。

IP 地址代表什么?主机的IP 地址主机的默认网关主机的主页IP 地址主机的首选域名服务器网站的IP 地址。

哪三个地址属于公有IP 地址?(选择三项。

)数据链路层有哪两项功能?(选择两项)分割和记录数据。

在源主机和目的主机上运行的程序之间进行数据交换。

控制数据如何传递到介质中。

生成信号以表示每个帧中的比特。

使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。

请参见图示。

主机A 要访问Internet。

哪项第2 层地址和第3 层地址的组合可以让主机A 实现此访问?目的MAC:,默认网关:目的MAC:,默认网关:目的MAC:,默认网关:目的MAC:,默认网关:下列哪三项是CSMA/CD 的特征?(选择三项。

)设备会侦听介质,并且仅当无法检测到介质上存在其它信号时才会传输数据。

介质上的所有设备均可侦听所有通信。

设备根据配置的优先级来进行通信。

发生冲突后,引起冲突的设备会优先尝试传输数据。

发生冲突时,所有设备会在一段时间内停止传输数据,该段时间的长度随机决定。

CSMA/CD 使用令牌系统来避免冲突。

下列哪三个IPv4 地址代表子网的有效网络地址?(选择三项。

)请参见图示。

用记号来表示每条介质链路。

用来连接不同设备的正确电缆类型是什么?连接1 - 直通电缆,连接2 - 直通电缆,连接3 - 交叉电缆连接1 - 直通电缆,连接2 - 交叉电缆,连接3 - 全反电缆连接1 - 交叉电缆,连接2 - 全反电缆,连接3 - 直通电缆连接1 - 交叉电缆,连接2 - 直通电缆,连接3 - 交叉电缆连接1 - 直通电缆,连接2 - 全反电缆,连接3 - 交叉电缆请参见图示。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configurationserver before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the mausers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhib IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 4915 to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

相关文档
最新文档