思科第一学期第四章测试答案(英文版)

合集下载

(完整版)思科ite6.0第四章考试答案

(完整版)思科ite6.0第四章考试答案

第四章考试答案1. 而消极的环境因素清理电脑内减少吗?•灰尘•EMI•生锈•防静电2. 哪个组件可以很容易地受到的直接喷射压缩空气清理电脑机箱内部的什么时候?•风扇•散热器•电力供应•CPU•电缆连接器3. 在生产地板,家具工厂笔记本电脑过程监测和报告。

生产楼环境是80华氏度(27摄氏度)左右。

湿度水平相当高70%左右。

空气循环风扇安装在天花板上。

木粉是普遍的。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•空气流•尘埃4. 蔬菜罐头工厂生产线使用笔记本电脑的监控。

生产环境有一个环境温度在华氏75度(摄氏24度)。

湿度水平约为30%。

噪音水平很高,由于灌装机械。

笔记本电脑是一个木制的盒子里,紧紧围绕着笔记本电脑三面。

哪个因素最可能影响在这种环境下使用的一台笔记本电脑吗?•房间的温度•湿度•噪音•笔记本电脑的容器5. 科学探险团队使用笔记本电脑。

科学家们正在研究的温度范围从-13华氏度(-25摄氏度)到80华氏度(27摄氏度)。

湿度水平约为40%。

噪音水平很低,但地形是粗糙和时速可以达到45英里(每小时72公里)。

在需要的时候,科学家们停止行走,使用笔记本电脑输入数据。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•粗糙的地形•风6. 创建一个预防性维护计划的一部分是什么?•记录每个维护任务的细节和频率•执行硬件升级•丢弃所有取代部分•执行一个法医审计的安全漏洞7. 电脑的技术员执行硬件维护在一个建筑工地。

什么任务应该技术员执行预防性维护计划的一部分?•把灰尘从摄入的粉丝。

•备份数据,格式化硬盘,重新安装数据。

•开发和安装法医跟踪软件。

•执行审计的所有软件安装。

8. 哪个任务应该是硬件维护程序的一部分吗?•审查安全更新。

•更新病毒定义文件。

•调整显示器的最佳分辨率。

•从硬盘中除尘。

•检查并确保任何松散的电缆。

9. 在测试的过程中几个可能的原因的理论问题,应该先测试吗?•最简单和最明显的•那些客户认为是最重要的•最复杂的,难以诊断•随机选择的选择10. 这两个项目可以用来帮助建立一个行动计划解决电脑问题?(选择两个。

Cisco认证实验考试经典题库CCIE_BootCamp3.0

Cisco认证实验考试经典题库CCIE_BootCamp3.0

Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)137.20.0.0/24 is subnetted, 1 subnets c 137.20.20.0 is directly connected, ethernet 0 172.168.0.0/16 is variably subnetted, 7 subnets, 2 masks o ia 172.168.30.0/24 [110/65] via 172.168.100.3, 00:09:03, serial 1.1 i 172.168.40.0/24 [100/8576] via 172.168.200.2, 00:01:11, serial 1.2 o ia 172.168.60.0/24 [110/1572] via 172.168.65.1. 00:09:03, bri0 c 172.168.65.0/24 is directly connected, bri0 c172.168.100.0/24 is directly connected, serial 1.1 o172.168.100.0/24 [110/64] via 172.168.100.3, 00:09:13, serial 1.1 c 172.168.200.0/24 is directly connected, serial 1.2 o e1 192.168. 21.0/24 [110/21] via 137.20.20.1.00:09:03, ethernet 0 o e1 192.168. 17.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o e1 192.168. 70.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o*e10.0.0.0/0 [110/21] via 137.20.20.1. 00:09:03, ethernet 0r5#show ip ospf int bri0 bri0 is up, line protocol is up (spoofing) internet address 172.168.65.2/24, area 10 process id 1, router id 172.168.200.1, network typepoint_to_point, cost 1562 run as demand circuit donotage lsa allowed. transmit delay is 1 sec, state point_to_point,timer intervals configured, hello 10, dead 40, wait 40, retransmit 5 hello due in 00:00:06 neighbor count is 1, adjacent neighbor count is 1 adjacent with neighbor172.168.100.6 (hello suppressed) suppress hello for 1 neighbor(s) r5#show dialer bri0 – dialer type =isdn dial string successes failures last called last status 4930622 1 0 00:08:45 successful 0 incoming call(s) have been screened 0 incoming call(s) rejected for callback bri0:1 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle bri0:2 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle r5# now go back to router r7 and bring up router r7’s interface s4 again 3. ipx configuration –15 pts (1 hour) a. configure all the active interfaces, including loopbacks, on routers r1, r2, r3, r5, r6, and r8 for ipx. b. configure router r8 and the lan interfaces on routers r3, r4, r5 and r6 for ipx rip. c. configure router r1 & r2 for ipx nlsp. d. configure the serial interfaces on the rest of the routers for ipx eigrp( not routers r1& r2 these oly use nlsp), also make the ethernet interface on router r2 ipx eigrp only. e.configure the bri0 interfaces on routers r5 & r6 as ipx rip. f. after this point you should be able to see all the ipx networks in all the routers routing table. test connectivity with ipx ping.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第九章)j. make the default route on r2 appear in he routing table of all the other routers. k. configure routers r1, r2’ss1, and router r8’s ethernet interface e0 for eigrp. configure router r8’s interface to0 for rip. l. redistribute all routers between all routing protocols such that all routes are visible in all routers and every router can ping each other’s ip interfaces (even the loopback on r2) as shown on the lab diagram lab 5a. m. make sure that all ospf external routes appear as type-1, verify your routes. are the routes appearing in the correctly routing protocol? n. configure router r5 such that the only route on r6 for the 137. 20.0.0 network appears exactly as follows; o 137.20.20.0 [110/65] via 172.168.100.5,00:51:03, serial 1. hint pay attention to the underlined value 65. o. configure routers r3 & r4 to resolve dns namesusing dns servers 207.238.183.71 &207.238.183.72. 2. ospf demand circuit –15 pts (1 hour) a. use network172.168.65.0/24 for the isdn interfaces on routers r5 &r6 and ass them to ospf. configure routers r5 & r6 to use the isdn interfaces for restoral[ 恢复]. the isdn link should only come up when you administratively shutdown the serial 4 interface on router r7, and there is interesting traffic trying to get between routers r5 & r6 (i.e. use ping as the interesting traffic to test. make sure you test from router r6 and from router r5. see the router ports/configuration into online for the phone #’s, spids, and switch type if you are using our remote racks. configure the isdn link so that it will shutdown 45 seconds after an inbound or outbound ping packet. both routers should shave full ospf routes when the frame link is functional or not. you are required to use ospf demand-circuit as your solution here, after the initial isdn call to synchronize ospf, your isdn interfaces should stay down unless you break the frame connection between r5 and r6 and there is interesting traffic. now go to router r7 and shut down interface s4, your isdn connection should kick in and provide a backup path for router r6 to reach the rest of the network, butonly when there is data to send. ospf router updates should not keep the isdn up. pretend [假装]your isdn line is charged at $5 per minute and it comes out of your check. at this point when router r7’s interfaces s4 (your frame connection) is still down. router r5 should have the following displays for:”show ip route”, “show ip ospfint bri0”, and “show dialer”notice that the isdn connection is down and router r5 has a routing table with ospf entries using interface bri0 to get to router r6’s ethernet network, and is suppressing ospf hellos for 1 neighbor. also pay attention to the ospf dead time on r5’s bri0 interface. output from router r5 r5# show ip route codes: c- connected, s-static i- igrp, r-rip, m-mobile, b-bgp, d-eigrp, ex-eigrp external, o-ospf, ia-ospf inter area, n1-ospf nssa external type 1, n2- ospf nssa external type2, e1- ospf external type 1, e2- ospf external type 2 e- egp i- is-is, l1- is-is lever-1, l2- is-is level-2, *- candidate default, u- per-user static route, o- od gateway of last resort is 137.20.20.1 to network0.0.0.0Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 andr5.f. create a static route on router r2 (ip route 22.1.1.0255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear as one route to ospf.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第七章)d. routers r1, r3 and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with a 9-bit subnet mask on its ethernet interface.(the mask should be 255.255.128.0) sue subnet-zero here.g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface. (the mask shouldbe 255.255.0.0)i. use network 11.1.x.x 255.255.0.0 between routers r5 &r6.2. ospf & other ip routing configuration –35 pts (1hous 30 mins)a. configure ospf area 0 on the frame-relay interfaces between routers r1,r3, and r5.b. place router r1’s ethernet in ospf area 1. place router r3’s interface to 0 in ospf area 2.c. place router r3’s interface serial 0, and all of router r4 in ospf area 3. make ospf area 3 a totally-stubby area.d. place r5 and r6 ethernet interface in ospf area 4. make this ospf area a nssa (not-so-stubby-area) make the default cost 20.e. configure router r6’s interface serial 0 and routerr8’s interfaces s0, e0,and loop 0 for eigrp.f. place router r2’s interface serial 0 and router r1’ss0.1 in ospf area 5.g. redistribute all routes so that you can see all routes and ping from everywhere.h. summarize the routers for router r8’s interface e0, loop0, and s0 that were redistributed into ospf by routerr6 on router r5 so that all of router r8’s networks appear as one route to the rest of the ospf routers except r6.i. when you redistribute eigrp into ospf make these routes appear as type-1 external routes.j. configure router r2 such that it propagates a default route the other ospf routers.k. create a second loopback interface on router r2 with an address of 20.1.1.1/24. make sure you can ping the second loopback interface on router r2 from other the routers.l. create two loopbacks on router r3 with networks that could contain at most 30 hosts. place the loopbacks onrouter r3 in one area and summarize such that one route appears for both loopacks.m. place the ethernet interface on router r2 in area 10. n. configure simple password authentication in ospf area 4. o. use the ip ospf priority command on router r5 to make it become the dr for ospf area 4.p. change the cost on router r5’s interface e0 using an ip ospf command to make it appear as 100mbps as it relates to ospf metrics.q. change the cost on r6’s e0 without using an ip ospf command to make it appear as 100mbps as it relates to ospf metics.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第六章)d. configure two static saps on router r3. filter on router r5 such that routers r6 and r8 only see one of the saps.e. disable ipx on the between routers r3 &r4 all routes should still be seen by all routers running ipx.f. change the frequency of the rip updates across the r3-r4serial connection to once every 2 minutes.g. configure router r1’s ethernet with ipx 802.2 and 802.3 raw frame types.h. configure routers r3 and r4 to pass ipx netbios type-20 broadcasts between their lan interfaces.5. dlsw configuration – 10 pts (45 mins)a. configure dlsw between router r3’s interface token-ring0 and router r4’s interface ethernet 0.b. place router r2’s interface ethernet 0 into the dlsw network. make sure there is connectivity between all lan interfaces.c. configure a filter that blocks netbios packets with destination name ‘cciering1” from leaving router r3’s interface to0.d. setup a filter that would permit only sna traffic between routers r3 & r4.6. bgp configuration – 15 pts (1h)a. configure bgp on router r4 using as number 1. configure bgp on routers r1, r2, r3 and r5 using as number 2. you can only use one neighbor x.x..x.x remote-as 2 command on routers r2 and r5.b. configure two static routes to 172.168.1.0/24 and172.168.2.0/24 using the command ip route 172.168.1.0255.255.255.0 null 0 on router r4, redistribute the second route into bgp using the route-map command.c. make sure that router r5 can see the 172.168.2.0 route.d. setup router r8 with bgp in as number 3. on router r8 use the loopback interface lo0 as the source for its bgp connection to as2. make sure router r8 can see the specific 172.168.2.0 route, and not the aggregate 172.168.0.0you have completed lab 3. compare your configurations to the ones we provided. often there si more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations too.lab4at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration -10pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1,r2,r3, and r5 over the frame-relay. configure router r1 using sub-interfaces. configure routers r2.r3, and r5 without using sub-interfaces.c. use only frame-relay pvc on routers r2, r3 and r5. the recommended dlci numbers 102.201.103.105, and 501 are indicated on the network diagram.Cisco认证实验考试经典题库CCIE_BootCamp3.0(5)i. configure the ethernet interface e0 on router r4 to bein ospf area 40. j. configure the r5, r6, and r8 ethernet 0 interface to use eigrp. k. configure r8’s interface loop5 as 192.168.100.1/24 and add it to rip l. redistribute routes between all protocols such that router r1 can ping any interface. m. configure 2 loopbacks interfaces onrouter r8 with 10.1.1.1/24 & 10.1.2.1/24. add there to rip and redistribute rip to eigrp. summarize such that allrouters only see one route to the loopback interfaces. test connectivity to loopback interface via ping. n. filter such that router r6 can ping the loopbacks on router r1, but not the ethernet interface on router r1. the route for the ethernet on router r1 should still be visible and all other traffic such as telnet should still pass unfiltered. o. filter on router r5 such that routers r1 r2, r3, and r4, don’t see the route to router r8’s interface loopback 5. p. create three loopback interfaces on router r8 and use 160.10.10.1/24 for loopback 2, q. 161.10.10.1/24 for loopback 3, and 170.10.10.1 for loopback 4. now summarize the three loopback networks into one route. when done router r1 should see only one route for these three loopback interfaces ana should be able to ping all three of them. hint, the route may not look like what you think. 3. ntp & access-list & other tasks -15 pts (30 mins) a. configure ntp between routers r2 &r3. make r2 the time source. set the correct time and date on router on router r2. set the time-zone on routers r2 & r3, verify that router r3 has synced with router r2 via ntp. b. configure queuing on router r3’s s0 interface such that telnet, ip, ipx, and everything else use 25% of the bandwidth each.configure the queuing such that none of the traffic defined at 25% above uses more than 1000 bytes per time slice. you are allowed to exceed 1000 bytes per time slice only if there is part of a remaining individual packet that needs to be emptied from the queue. c. configure the frame-relay interface on router r2’s interface so such that ip is discard eligible on the frame. d. create the following 6 static routes on router r6; suing the cisco ios command ip route 192.168.x.0 255.255.255.0 null 0. use the number1,2,3,4,5 and 6 for the variable x. redistribute the static routes such that they are seen by all the other routers. now filter on router r5 using any method that use an access list so that only the even routes (i.e. x=2,4,and 6) are seen past router r5 towards the ospf network. your access-list can only have two lines in it, not seven for this exercise. all the 192.168.x.0 routes must still be seen in router r5’s routing table.4. ipx configuration – 20 pts (1h) a. configure all interface(including loopbacks ) for ipx b. configure ipx eigrp on the nbma frame-relay network c. configure ipxrip/sap everywhere else.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第四章)n. filter on router r5 such that the bgp route to null0 defined on router r4 isn’t seen on routers r6 &r8. o. hint the object of this bgp section is to provide end-to-end connectivity between all routers and interfaces. in this exercise you are not allowed to configure igp or two-way static route connectivity between routers r5 & r6, bgp should be providing the necessary routing information. you are allowed to setup a default route on router r6 to point to router r5. now that you have completed lab 2 check., the routing tables on all routers. do they make sense? ping all interfaces from all routers. can you ping everywhere? do the appropriate routers see the static route to null0 on r4 via bgp? go to every router and ping every interface. if you can’t ping everything you are not done yes. you have completed lab 2. compare your configuration to ones we provided. often there is more than one to complete a task so your configurations may be different than ours. if your configurations are different than ours make sure you understand how to complete the lab with our configurations too lab 3 at the end of this lab verify connectivity to allports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks. 1. initial configuration -5 pts (30 mins) a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks. b. configure lab 3 network using network 137.20.x.x c. create a loopback interface on router r2 with 172.168.32.1/24. d. connect routers r1,r2, r3, and r5 over frame-relay cloud. e. configure router r1 using sub-interfaces. f. configure router r2 without using sub-interfaces or frame-relay map commands. g. put routers r1 &r2 frame-relay interfaces on one subnet and routers r1, r3, and r5 on a different subnet. 2. ospf & other ip routing configuration -35 pts ( 2 h) a. configure ospf with the frame-relay cloud in ospf area 0 b. configure the r3-r4 serial connection to be in area 1. c. set the ring-speed on router r3 to 16 mbps. d. configure the loopback interface on router r2 in adifferent ospf area. e. configure the lan interfaces onrouters r1, r2,and r3 to be in different ospf areas. f. configure two loopbacks on router r3 using subnets thatwill contain at most 30 host ip addresses. g. configure two loopback interfaces on router r1 using subnets that will contain at most 14 host ip addresses. h. summarize the two loopback interfaces on routers r1 and r3 such that routerr2 only sees one route from each.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第三章)k. configure router r6 for ospf with a different process id than used thus far. do not configure r6’s e0 for ospf. l. configure router r8 to be in the same ospf area as routerr6. put router r8’s interface e0&lo0 into the ospf routing process. configure router r6 so that its s1 interface speed is correctly reflected in the ospf metrics without using the “ip ospf cost xxx” command. m. configure ospf message-digest authentication between routers r6 & r8. n. change the ospf hello interval between routers r6 & r8 to 45 seconds. o. configure router r8 suing the “ip ospf cost” command such that the speed of the link forinterface s0 is correctly reflected in the ospf metrics. p.change the ospf transmit interval delay to 10 seconds between routes r6 & r8. q. add a default route to router r2 that points to 137.20.20.2. configure one static route on router r2 so that full connectivity to r4’s interface e0 is available. you will notice that the default gateway of router r2 has a lower administrative cost than the one learned via router r1. as a result, the other default route never makes it in the routing table for router r2. r. you will notice that r2 can’t ping the serial interfaces between routers r3 & r4. fix this problem by only making changes to router r3 without static routes. 3. bgp configuration -15 pts (1 hour) a. configure router r4 in bgp autonomous system 1. b. create a static route to null0 router r4 and redistribute into bgp. c. create a loopback interface on r4 and add its network to bgp d. when adding the first loopback to bgp use a class a address with a 24-bit mask. the network that was added to bgp from the first loopback address should appear in the routing table of other routers as “ b 44.1.1.0…” e. create another loopback on router r4 with a class a address and put this network into rip and redistribute rip into bgp. f. configure router r3 in bgp autonomous system 1 and useinterface loopback 0 as the update source. g. configure routers r1, r2, and r5 in bgp autonomous system 2, only use one neighbor x.x.x.x remote-as 2 command on routers r2, r3. &r5 for autonomous system 2. h. place routers r6 and r8 in bgp autonomous system 3. i. configure bgp authentication between router r6 & r8. j. configure a loopback interface on router r8 and enable rip for this network. redistribute this rip network into ospf. k. redistribute the ospf routing process that contains routers r6 and r8 into bgp. l. you are not allowed to add any static routes to routerr8 during this exercise. m. configure router r6 such that all bgp routes learned from router r5 have a local preference of 300.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第二章)lab 2at the end of this lab verify connectivity to all ports. you should be able to ping every interface from and router. (don’t worry about being able to ping a local frame-relayinterface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration – 5 pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1, r2, r3, and r5 over the frame-relay cloud. configure router r1 using sub-interfaces. configure routers r2, r3, and r5 without using sub-interface.c. use only one frame-relay pvc on routers r2, r3, and r5, the recommended dlci numbers 102,201,103, 301,105, and 501 for the frame-relay pvc’s are indicated on the network diagram.d. routers r1,r3,and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfacese. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface ( the mask shouldbe 255.255.0.0)2. ospf configuration –30 pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between routers r1, r3 and router r5.b. place router r1’s ethernet in ospf area 1. place router r5’s interface e0 in ospf area 0.c. setup a default static route (default gateway) from r3to r4. redistribute this default static route into ospfwith a metric-type of 1 and a metric of 500.d. configure router r3’s serial 1 interface as173.168.40.1/24 and router r4’s serial 0 interface as172.168.40.2/24.e. configure router r4’s e0 interface as 200.100.100.1/24.f. configure a default gateway on router r4 to route all packets for which it has no routes to router r3.g. configure two loopback interfaces on router r3 with networks that could have at most 254 hosts and put themboth in the same ospf area, but different from ospf area 0. summarize this route into ospf so that the two subnets appear as one route.h. configure router r2 for eigrp and put all interface in the routing process.i. configure router r1 with eigrp and redistribute with ospf. set the metric type to type-1 when you redistribute from eigrp to ospf. also, redistribute ospf into eigrp.j. configure router r1 so that it only listens to eigrp updates on e0 and s0.2.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第一章)1- day format version 3.002- policy routing frame relay ospflab#1network learning, inc. r&s ccie practice lab 1 version2.00 1-day versionat the end of this lab verify connectivity to all ports. you should be able to ping every interface form any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are askedto filter packets, routers or other specific tasks.)1. initial configuration – 5 pts (30 minutes)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram.b. configure router r7 as a frame-relay switch. refer to the diagram for interface connections to other routers connected to router r7.c. connect routers r1,r2, r3, and r5 over the frame-relay cloud. configure router r1’s s0 interface as a sub-interface. configure r2,r3, and r5 without using sub-interfaces. use only one frame-relay pvc on routers r2, r3, and r5. the recommended dlci numbers 102, 201,103,301,105, and 501 are indicated on the lab diagram.d. routers r1, r2, r3, and r5 should share network10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)f. make sure all the ethernet interfaces are in their own broadcast domain if you are using an ethernet switch for your ethernet connections.2. ospf configuration –25pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between r1, r2, r3, and r5.b. configure router r1’s interface ethernet 0 for ospf area 1c. configure router r2’s interface e0 for ospf area 10d. configure router r3’s interface s 1 and all of router r4’s interface for ospf area 3.e. configure router r5’s interface e 0 for ospf area 4.f. create two loopback interface on r4 and put both of the associated subnets on these interfaces in ospf area 44.g. summarize the (2) loopback interface you just created on router r4 so they appear as one route to the rest of the ospf routers in your network..h. here is the tricky part. you can’t use the command ip ospf network xxxx anywhere in your router configurations.i. redistribute the default route on router r2 as type-1 with a metric of 100. this route is already part of the initial configurations we provided for you.j. also, one of the problems in this lab can be solved with multiple frame map ip statements, but that is not the solution we want you to use, solve the problem with。

思科认证英文题库300-410

思科认证英文题库300-410

Exam : 300-410Title : Implementing Cisco EnterpriseAdvanced Routing andServicesVendor : CiscoVersion : DEMONO.1 An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install.Which command must the engineer run to correct the configuration?A.sudo maglev-config updateB.sudo maglev install config updateC.sudo maglev reinstallD.sudo update config installAnswer: ANO.2 Which command displays the IP routing table information that is associated with VRF-Lite?A.show ip protocols vrfB.show run vrfC.show ip route vrfD.show ip vrfAnswer: CNO.3 Which statement about IPv6 RA Guard is true?A.It does not offer protection in environments where IPv6 traffic is tunneled.B.It is not supported in hardware when TCAM is programmed.C.It cannot be configured on a switch port interface in the ingress direction.D.Packets that are dropped by IPv6 RA Guard cannot be spanned.Answer: ANO.4 While troubleshooting connectivity issues to a router, these details are noticed:*Standard pings to all router interfaces, including loopbacks, are successful.*Data traffic is unaffected.*SNMP connectivity is intermittent.*SSH is either slow or disconnects frequently.Which command must be configured first to troubleshoot this issue?A.show interface | inc dropB.show ip routeC.show policy-map control-planeD.show policy-mapAnswer: CNO.5 Refer to the exhibit.Why is the remote NetFlow server failing to receive the NetFlow data?A.The flow exporter is configured but is not used.B.The destination of the flow exporter is not reachable.C.The flow monitor is applied to the wrong interface.D.The flow monitor is applied in the wrong direction.Answer: BNO.6 A network engineer is investigating a flapping (up/down) interface issue on a core switch thatis synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?A.service timestamps log uptimeB.clock calendar-validC.clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00D.service timestamps log datetime localtime show-timezoneAnswer: D。

思科答案CCNA4-3

思科答案CCNA4-3

1.下列哪项最准确地描述了采用帧中继与采用租用线路或ISDN 服务相比的优势?3客户可以更精确地定义其虚电路需求,且带宽需求之间的差别可低至64 kbps。

客户只需支付包含本地环路和网络链路的端对端连接的费用。

客户只需支付本地环路以及网络提供商所提供的带宽的费用。

连接新站点时,所需的新电路安装成本要低于ISDN 拨号的成本或因租用服务而添加额外硬件的成本。

2.帧中继技术使用哪两种方法处理包含错误的帧?(选择两项。

)14帧中继服务依靠上层协议来处理错误恢复工作。

它要求接收设备请求发送方重新传输错误帧。

设置帧中的FECN、BECN 和DE 位以尽量减少错误。

接收设备会丢弃所有包含错误的帧而不会通知发送方。

帧中继交换机会通知发送方检测到了错误。

3.哪种说法是对数据链路连接标识符(DLCI) 的最佳描述?2用于标识通过帧中继网络连接的目的路由器的本地地址用于标识虚电路的具有本地意义的地址用于标识路由器和帧中继交换机之间的接口的逻辑地址用于标识DCE 的逻辑地址4.在帧中继网络两个DTE 之间创建的是什么?4ISDN 电路有限访问电路交换并行电路虚电路5.在帧中继网络中,下列哪两项使路由器可将数据链路层地址映射到网络层地址?(选择两项。

)45ARPRARP代理ARP逆向ARPLMI 状态消息ICMP6.请参见图示。

从路由器Peanut 向地址192.168.50.10 发出了一次ping 命令。

发送该ping 命令时将使用什么DLCI?11101152202257.请参见图示。

子接口S0/0.110 上的点对点配置对路由器的运作有什么影响?3它有助于节约IP 地址。

它与多个物理接口建立多个PVC 连接。

它既消除了水平分割问题,又不增大出现路由环路的可能性。

它需要在子接口上配置encapsulation命令。

8.当帧中继交换机检测到队列中含有过多待处理帧时,会进行哪三项操作?(选择三项。

)256暂停接受超过CIR 的帧从队列中丢弃设置了DE 位的帧减少它发往链路的帧的数量与相连的设备重新协商流量控制对来自拥塞链路的所有帧设置FECN 位对发往拥塞链路的所有帧设置BECN 位9.请参见图示。

(最新)思科网络第一学期1-5章中文测试题及答案

(最新)思科网络第一学期1-5章中文测试题及答案

ENetwork Chapter 2 - CCNA Exploration: 网络基础知识(版本 4.0) 1在封装过程中,数据链路层执行什么操作?不添加地址。

添加逻辑地址。

添加物理地址。

添加进程的端口号。

2TCP/IP 网络接入层有何作用?路径确定和数据包交换数据表、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包3数据链路层封装添加的报尾信息有何主要功能?支持差错校验确保数据按照顺序到达确保送达正确目的标识本地网络中的设备帮助中间设备进行处理和路径选择4请参见图。

下列哪组设备仅包含终端设备?A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I J5OSI 模型各层从最高层到最低层的正确顺序如何?物理层、网络层、应用层、数据链路层、表示层、会话层、传输层应用层、物理层、会话层、传输层网络层、数据链路层、表示层应用层、表示层、物理层、会话层、数据链路层、传输层、网络层应用层、表示层、会话层、传输层、网络层、数据链路层、物理层表示层、数据链路层、会话层、传输层、网络层、物理层、应用层6下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)LAN 通常位于一个地域内。

此类网络由由一个组织管理。

LAN 中的不同网段之间一般通过租用连接的方式连接。

此类网络的安全和访问控制由服务提供商控制。

LAN 为同一个组织内的用户提供网络服务和应用程序访问。

此类网络的每个终端通常都连接到电信服务提供商(TSP)。

7第4 层端口指定的主要作用是什么?标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务8以下哪种特征正确代表了网络中的终端设备?管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径9请参见图示。

哪个术语正确判断出了包含于绿色区域中的设备类型?源终端传输中间10OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)网络层传输层物理层数据链路层会话层11请参见图示。

第四章 路由器基础练习题参考答案

第四章 路由器基础练习题参考答案

15、要显示路由器的运行配置,下面哪条命令正确?( A )
A、Router# show running-config B、Router# show startup-config
C、Router> show startup-config D、Router> show running-config
16、路由器命令 Router>show interface 的作用是( A )。
进行系统的配置。如果 NVRAM 中存在 Startup-Config 文件,则将该文件 调入 RAM 中并逐条执行。否则,系统默认无配置,直接进入用户操作模 式,进行路由器初始配置。
4、请简述路由器的几种工作模式。 答案:
l 一般用户模式 “ router> ” :用户可以看路由器的连接状态,访问其 它网络和主机,但不能看到和更改路由器的设置内容。
8、交换机和路由器相比,主要的区别有( AB )。
A、交换机工作在OSI参考模型的第二层
B、路由器工作在OSI参考模型的第三层
C、交换机的一个端口划分一个广播域的边界
D、路由器的一个端口划分一个冲突域的边界
四、简答题
1、请简述路由器的工作原理。 答案:
在数据包从源主机到目标主机的传送过程中,源 IP 地址和目标 IP 地址永 远不变,而每次数据交换源 MAC 地址和目标 MAC 地址都在变化。
lБайду номын сангаасIP 地址作用:确定主机所在网络范围,用于路径选择 l MAC 地址作用:用于实现三层节点间的数据交换
版权所有 ● 江西工业职业技术学院电子与信息工程分院赵怀明教师
江西工业职业技术学院电子与信息工程分院《网络互联技术》课程
2、路由器有哪些重要部件?各有什么作用? 答案:

思科 cisco 课后习题答案

思科 cisco 课后习题答案

分界点:
19. 调制解调器: 语音调制解调器将计算机生成的数字信号转换为可通过公共电话网络的模拟线路传输的语音 频率; 速度越快的调制解调器(如有线电视调制解调器和 DSL 调制解调器)在传输时使用的带宽频 率也越高。 CSU/DSU: 数字线路(如 T1 或 T3 线路)需要信道服务单元(CSU)和数据服务单元(DSU) ; 这两者经常合并到一台设备中,名为 CSU/DSU; CSU 端接数字信号, 并通过纠错和线路监视确保连接的完整性; DSU 在 T 载波线路帧和 LAN 能够解释的帧之间进行转换。 接入服务器: 集中处理拨入和拨出用户通信。接入服务器可同时有模拟和数字接口,能够同时支持数百名 用户。 WAN 交换机: 运营商网络中使用的多端口互连设备。这些设备通常交换帧中继、ATM 或 X.25 等数据流。 路由器: 提供用于连接服务提供商网络的网络互联接口和 WAN 接入接口。 这些接口可以是串行接口或其他 WAN 接口。有些类型的 WAN 接口需要通过 DSU/CSU 或调制 解调器(模拟、有线电视或 DSL)等外部设备将路由器连接到服务提供商。 20. X.25: 一种低带宽的老式 WAN 技术,最大速度为 48kbit/s,读卡器通常使用拨号模式 X.25 向中央 计算机验证事务; 对这些应用来说,低带宽和高延时并不是问题,而低成本让 X.25 成为众家之选; 很多服务提供商已使用帧中继代替 X.25。 一种第 2 层 WAN 协议,通常提供 4Mbit/s 或更高的数据速度; 使用虚电路提供永久、共享的中等带宽连接,可同时传输语音和数据; VC 由 DLCI 唯一标识,这确保两台 DTE 设备之间能够进行双向通信。 异步传输模式(ATM)技术是一种基于信元而不是帧的架构,使用 53 字节的定长信元; 这些小型定长信元非常适合传输对延迟敏感的语音和视频数据流。

思科CCNA中文教程--第四章TACAS+(1)

思科CCNA中文教程--第四章TACAS+(1)

第四章TACAS+4.1. 用户登录集中鉴权提问 使用集中的鉴权方式对用户登录设备进行控制回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa authentication login default group tacacs+Router1(config)#aaa authentication enable default group tacacs+Router1(config)#tacacs-server host 172.25.1.1Router1(config)#tacacs-server key COOKBOOKRouter1(config)#endRouter1#注释 部署集中化鉴权就不需要在每台设备上配置用户名密码了,改密码也变得简单了 4.2. 限制特定命令的执行权限提问 对设备可执行命令权限进行基于用户的授权回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa authorization exec default group tacacs+Router1(config)#aaa authorization commands 15 default group tacacs+Router1(config)#tacacs-server host 172.25.1.1Router1(config)#tacacs-server key neoshiRouter1(config)#endRouter1#注释 无4.3. TACACS+服务器无法访问提问 防止出现TACACS+服务器故障导致所有用户都不能登录回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa authentication login default group tacacs+ enableRouter1(config)#aaa authentication enable default group tacacs+ enableRouter1(config)#aaa authorization commands 15 default group tacacs+ if-authenticatedRouter1(config)#tacacs-server host 172.25.1.1Router1(config)#tacacs-server key COOKBOOKRouter1(config)#endRouter1#注释 在认证服务器出现故障的情况下使用enable密码作为备份,同时建议使用if-authenticated参数在你配置授权的时候4.4. 在特定端口禁用TACACS+鉴权提问 为了方便禁止在控制口使用TACACS+鉴权回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa authentication login default group tacacs+ local Router1(config)#aaa authentication login NEOSHI lineRouter1(config)#line con 0Router1(config-line)#login authentication NEOSHIRouter1(config-line)#endRouter1#注释4.5. 记录用户行为提问 记录用户输入的配置命令和时间回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa accounting commands 1 default stop-only group tacacs+ Router1(config)#aaa accounting commands 15 default stop-only group tacacs+ Router1(config)#endRouter1#注释 下面是一条日志记录,很详尽吧Fri Jan 3 11:08:47 2006 toronto ijbrown tty66 172.25.1.1 stop task_id=512 start_time=1041610127 timezone=EST service=shell priv-lvl=15 cmd=configure terminal <cr>4.6. 记录系统事件提问 记录系统事件回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#aaa new-modelRouter1(config)#aaa accounting exec default start-stop group tacacs+Router1(config)#aaa accounting connection default start-stop group tacacs+Router1(config)#aaa accounting system default stop-only group tacacs+Router1(config)#endRouter1#注释 除了可以记录用户输入命令以外还提供了exec(用户开始和中止exec会话的时间记录),connection (用户发起外部连接的时间,地址,数据包 多少等信息记录比如telnet ssh等)和system(系统重启,禁用AAA等系统信息)等三种系统事件的记录4.7. 设置TACACS+消息的源地址提问 发送TACACS+消息时只使用特定的源地址回答Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router1(config)#ip tacacs source-interface Loopback0Router1(config)#endRouter1#注释 所有本设备的记录都来自于同一地址方便对日志进行汇总和统计<!--[if !supportLists]-->4.8. <!--[endif]-->TACACS+服务器配置文件样本 注释 可以使用思科免费的TACACS+服务器也可以使用商业的服务器,配置方式略。

思科第1学期期末考试答案

思科第1学期期末考试答案
2 points for Option 4
0 points for any other option
2
11
窗体顶端
路由器将按哪个默认顺序搜索启动配置信息?
NVRAM、RAM、TFTP
NVRAM、TFTP、设置模式
设置模式、NVRAM、TFTP
TFTP、ROM、NVRAM
闪存、ROM、设置模式
窗体底端
需要正确接地连接
绞合反向的电路线对
用金属屏蔽裹住线束
设计电缆基础设施避免串扰干扰
避免在安装时出现弯曲
窗体底端
在铜缆中,串扰是一条电线上的信号与相邻电线上的信号形成电场或磁场引起的干扰。绞合反向的电路线对可以有效地消除串扰。其他选项是消除EMI和RFI负面影响的有效措施,而不能消除串扰。
答案
说明
最高分值
0 points for any other option
2
10
窗体顶端
在传输过程中,IPv4数据包报头中的哪个字段通常会保持不变?
标志
生存时间
数据包长度
目的地址
窗体底端
在传输过程中,IPv4报头中的“目的地址”字段将保持不变。在传输过程中其他选项可能会发生变化。
答案
说明
最高分值
correctness of response
窗体底端
接口VLAN 1是交换机上的虚拟接口,称为SVI(交换机虚拟接口)。配置默认SVI(接口VLAN 1)上的IP地址可以远程访问交换机。还必须配置VTY线路允许远程访问,但是该线路上不能配置IP地址。
答案
说明
最高分值
correctness of response
2 points for Option 2

思科网院第一学期1-6单元部分试题及答案

思科网院第一学期1-6单元部分试题及答案

第一单元1、应用程序可以分为通用软件和行业专用软件。

下列哪两项属于行业专用软件?(选择两项。

)教育工具演示文稿电子表格字处理医疗实践管理软件数据库管理2、字处理软件的哪种特征表明它是本地应用程序?该应用程序可以在不同用户之间共享。

该软件存储在本地硬盘上。

该软件可以通过网页访问。

该软件能够处理文本和图片。

3、下列哪三个术语描述了计算机的不同类型?(选择三项。

)操作系统网络笔记本电脑台式计算机Windows大型机4、将笔记本电脑连接到扩展坞有哪两项优点?(选择两项)增强了机动性。

减少了所需电力。

可以使用外部显视器。

可以使用更多无线安全选件。

可以使用备用的连接选件。

5、为何服务器通常配备重复或冗余部件?服务器需要更高功率,因此需要更多组件。

服务器要全天候可供访问。

服务器可设计为独立塔式或机架安装式。

网络标准要求服务器配备重复部件。

6、通常用什么单位来表示计算机的处理速度?位像素赫兹字节7、购买预先组装好的计算机有哪两项优点?(选择两项。

)成本通常比较低可以精确指定组件组装的等待期更长足以执行大多数一般的应用程序适合有特殊需求的客户8、某用户计划在一台计算机上同时运行多个应用程序。

哪个计算机组件是完成此任务的关键?RAMNIC显卡声卡存储设备9、哪种适配卡可让计算机系统与本地网络中的其它系统交换信息?显卡声卡调制解调器卡网络接口卡10、服务器、台式计算机、便携式计算机使用的主要存储设备是什么?磁带驱动器硬盘光盘驱动器 (DVD)软盘驱动器11、哪个组件用于消除来自电源线的高压尖峰,使其不损坏计算机系统?CPU电涌抑制器主板硬盘12、 UPS 可以提供哪两项浪涌保护器所不具备的功能?(选择两项)保护计算机不受电压浪涌的损坏。

用内部电池提供备用电源。

保护计算机不受突然电压尖峰的损坏。

让用户有时间给电力公司打电话。

在电源出现故障时,为用户提供安全关机的时间。

通过墙上插座供电的发电机提供备用电源13、哪个计算机组件是计算机系统的神经中枢,并且负责处理机器中的所有数据?RAMCPU显卡声卡操作系统14、可以通过什么来防止静电放电 (ESD)?干燥、没有湿气的环境铺有地毯的地板接地腕带整洁的工作空间15、哪两种设备可能存在危险电压电平,因此未经专门的操作培训不得打开机体?(选择两项)鼠标打印机显示器键盘硬盘电源16、在当今较新的操作系统中,安装组件后,默认将如何分配系统资源?通过操作系统手动分配由管理员手动分配由组件静态分配给预设置的资源在组件和操作系统之间动态分配17、一位用户反映说,上周为某 PC 正确安装了一台外围设备,但自从今天启动 PC 后,该设备就一直无法正常工作。

思科第四期

思科第四期

1 下列哪一个地址可恰好用来总结网络 172.16.0.0/24、172.16.1.0/24、172.16.2.0/24 和172.16.3.0/24?172.16.0.0/21//172.16.0.0/22172.16.0.0 255.255.255.248172.16.0.0 255.255.254.02 可通过哪三种方法确保非授权用户无法连接到无线网络中并查看其数据?(选择三项。

)//禁用 SSID 广播配置过滤器以限制 IP 地址//在客户端与无线设备之间使用身份验证在客户端与无线设备之间使用 NetBIOS 名称过滤//配置诸如 WPA 等强加密手段使用 WEP 压缩方法3 哪三种说法正确描述了 Cisco 分层网络设计模型的功能?(选择三项。

)在核心层和分布层不必进行路由总结。

//分布层负责过滤流量并将故障隔离在核心层之外。

//核心层的两个目标是百分之百的正常运行时间和最大化吞吐量。

//接入层提供了将终端设备接入网络的途径。

分布层将网络流量直接分发给最终用户。

核心层通常采用星形拓扑。

4 网络设计师正在架设一个新网络。

设计时既需要提供足够的冗余度以防止单条链路或单台设备的故障影响整个网络,且不能太复杂或太昂贵。

哪种拓扑可满足这些需求?星型全网状//部分网状扩展星型集中星型5 在分层网络模型中,分布层具有哪三项功能?(选择三项。

)//总结来自接入层的路由使最终用户可访问本地网络为核心层设备提供最后选用网关通过过滤网络功能,保留接入层的带宽//隔离网络问题,防止其影响核心层//使用用于负载均衡的冗余链路增加可用带宽6 在分布层可配置哪项 Cisco IOS 功能来过滤不需要的流量并管理流量?病毒防护间谍软件防护VPN//访问控制列表7 在分布式服务器环境中,将服务器集中到数据中心服务器群中有什么好处?可将客户端与服务器之间的流量保持在单个子网内。

位于数据中心内的服务器需要较少带宽。

//便于对进出数据中心的通信进行过滤和排列优先顺序。

思科第一学期第四单元考试题目及答案

思科第一学期第四单元考试题目及答案

参加考试 - DHomesb Chapter 4 - CCNA Discovery: 家庭和小型企业网络(版本 4.0)剩余时间:00:55:591成功连接 Internet 必须具备以下哪三个要素? (选择三项。

)IP 地址 启用了文件共享网络连接启用了服务器服务可以接入 Internet 服务提供商直接从 RIR 获取地址2哪种类型的最终用户连接要求 ISP 在其网络中配备 DSLAM 设备?模拟技术电缆调制解调器技术 数字用户线路技术无线技术3下面哪个术语表示连接不同 ISP 的高速数据链路?Internet LANISP 主干Internet 网关Internet 提供商Internet 主干4请参见图示。

所示电缆属于哪一类型?STPUTP同轴光纤5下面哪种设备可以同时用作路由器、交换机和无线接入点?集线器网桥调制解调器中继器ISR6使用什么连接器来端接以太网非屏蔽双绞线(UTP)?STBNCRJ-11RJ-457商业级ISP 服务有哪三项特征?(选择三项。

)快速连接额外Web 空间免费Windows 升级为所有用户提供最便宜服务附加的电子邮件帐户免费更换硬件8下面哪个术语准确描述了数据包在源网络和目的网络之间传输时所通过的各个路由器?NOCISP跃点网段9请参见图示。

所示电缆属于哪一类型?STPUTP同轴光纤10非对称Internet 服务的主要特征是什么?下载速度与上载速度相同。

下载速度比上载速度慢。

上载速度与下载速度不同。

上载速度与下载速度不相关。

11以下哪两个地方适合使用UTP 电缆?(选择两项。

)建筑物之间家庭办公室网络中存在EMI 问题的地方有线电视网络中学校建筑内部具有几百台电力设备的制造环境中12下面哪一个定义准确描述了Internet?一组通过局域网连接在一起的PC一组通过ISP 连接在一起的PC由连接全球各国的网络所组成的网络由一个组织控制的全球网络集合13请参见图示。

思科答案

思科答案

ENetwork Chapter 4 - CCNA Exploration网络基础知识(版本4.0) 1Web 浏览器向侦听标准端口的Web 服务器发出请求之后,在服务器响应的TCP 报头中,源端口号是多少?错误!未找到引用源。

13错误!未找到引用源。

53错误!未找到引用源。

80错误!未找到引用源。

1024错误!未找到引用源。

17282将流量控制用于TCP 数据传输的原因是什么?错误!未找到引用源。

同步设备速度以便发送数据错误!未找到引用源。

同步并对序列号排序,从而以完整的数字顺序发送数据错误!未找到引用源。

防止传入数据耗尽接收方资源错误!未找到引用源。

在服务器上同步窗口大小错误!未找到引用源。

简化向多台主机传输数据的过程3请参见图示。

主机 A 正在使用FTP 从服务器 1 下载大型文件。

在下载期间,服务器1 没有收到主机 A 对若干字节传输数据的确认。

服务器 1 将默认执行什么操作?错误!未找到引用源。

创建第 1 层堵塞信号错误!未找到引用源。

到达超时时间后重新发送需要确认的数据错误!未找到引用源。

向主机发送RESET 位错误!未找到引用源。

更改第 4 层报头中的窗口大小在线代理|网页代理|代理网页|4请参见图示。

此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?错误!未找到引用源。

会话创建错误!未找到引用源。

数据段重传错误!未找到引用源。

数据传输错误!未找到引用源。

会话断开5从源向目的传送数据段的过程中,TCP 使用什么机制提供流量控制?错误!未找到引用源。

序列号错误!未找到引用源。

会话创建错误!未找到引用源。

窗口大小错误!未找到引用源。

确认6请参见图示。

Host1 正在与Host2 建立TCP 会话。

Host1 已经发送了SYN 信息,开始建立会话。

接下来会发生什么?在线代理|网页代理|代理网页|错误!未找到引用源。

Host1 会向Host2 发送带有ACK 标志= 0、SYN 标志= 0 的数据段。

思科答案CCNA4-4

思科答案CCNA4-4

1.下列关于网络安全的说法中哪两项正确?(选择两项。

)25保护网络免受内部威胁侵害具有较低的优先级,因为由公司员工带来的安全风险较低。

无论是能自己编写攻击代码的资深黑客,还是从Internet 下载攻击程序的入门攻击者都可能对网络安全造成严重威胁。

假设一家公司将其web 服务器部署在防火墙之外,并充分备份web 服务器,则无需采取其它安全措施来保护web 服务器,因为即使它被攻击了也不会造成损失。

公众认可的网络操作系统(例如UNIX)和网络协议(例如TCP/IP)可采用默认设置工作,因为它们没有内在的安全缺陷。

保护网络设备免受水电等外在因素造成的物理破坏是安全策略的必要组成部分。

2.下列关于网络攻击的陈述,哪两项是正确的?(选择两项。

)45强网络口令可防范大多数DoS 攻击。

蠕虫需要人的参与才能扩散,而病毒不需要。

侦测攻击本质上始终是电子攻击,例如ping 扫描或端口扫描。

暴力攻击会尝试使用字符集组合来搜索每个可能的口令。

内部设备不应该完全信任DMZ 中的设备,应该对DMZ 和内部设备之间的通信进行身份验证以防范端口重定向等攻击。

3.用户无法访问公司服务器。

系统日志显示服务器运行缓慢,因为它正在收到具有高优先级的虚假服务请求。

这是什么类型的攻击?3侦测访问DoS蠕虫病毒特洛伊木马4.IT 主管发起了一项活动,旨在提醒用户避免打开来源可疑的电子邮件。

该IT 主管意在保护用户免受哪种攻击?3DoSDDoS病毒访问侦测5.下列关于预防网络攻击的说法中哪两项正确?(选择两项。

)35现代服务器和PC 操作系统具有可以信赖的默认安全设置。

入侵防御系统可以记录可疑的网络活动,但在没有用户干预的情况下无法对抗正在进行的攻击。

物理安全威胁的防范包括控制对设备控制台端口的访问、标识关键电缆、安装UPS 系统以及提供温湿控制。

防止网络钓鱼攻击的最好方法是采用防火墙设备。

更改默认的用户名和口令并禁用或取消不必要的服务有助于加强设备安全性。

web服务使用的默认tcp端口号为

web服务使用的默认tcp端口号为

竭诚为您提供优质文档/双击可除web服务使用的默认tcp端口号为篇一:思科第一学期第四章答案1图中所示的传输层报头回答,以下哪些陈述描述了建立的会话?(选择两项正确您的响应响应这是uDp报头。

包含Telnet请求。

包含TFTp数据传输。

从这台远程主机返回的数据包将包含确认号43693。

这是Tcp报头。

此试题参考以下领域的内容:ccnAexploration:网络基础知识?4.1.5端口寻址2采用Tcp/Ip数据封装时,以下哪个端口号范围标识了所有常用应用程序?正确您的响应响应0到255256到10220到10231024到204749153到65535此试题参考以下领域的内容:ccnAexploration:网络基础知识?4.1.5端口寻址数据段的Tcp报头中为什么包含端口号?正确您的响应响应3让接收主机转发数据到适当的应用程序让接收主机以正确的顺序组装数据包确定封装数据时应使用的第3层协议指示转发数据段时应使用的正确路由器接口标识接收或转发数据段时应使用的交换机端口此试题参考以下领域的内容:ccnAexploration:网络基础知识?4.1.5端口寻址4osI模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?正确您的响应响应应用层表示层会话层传输层网络层此试题参考以下领域的内容:ccnAexploration:网络基础知识?4.1.1传输层的用途5请参见图示。

主机A正在使用FTp从服务器1下载大型文件。

在下载期间,服务器1没有收到主机A对若干字节传输数据的确认。

服务器1将默认执行什么操作?正您的确响应响应创建第1层堵塞信号到达超时时间后重新发送需要确认的数据向主机发送ReseT位更改第4层报头中的窗口大小此试题参考以下领域的内容:ccnAexploration:网络基础知识?3.3.1Dns服务及协议6将流量控制用于Tcp数据传输的原因是什么?正确您的响应响应同步设备速度以便发送数据同步并对序列号排序,从而以完整的数字顺序发送数据防止传入数据耗尽接收方资源在服务器上同步窗口大小简化向多台主机传输数据的过程此试题参考以下领域的内容:ccnAexploration:网络基础知识?4.3.4Tcp拥塞控制—将可能丢失的数据段降到最少7以下哪两个选项代表第4层编址?(选择两项)正确您的响应响应标识目的网络标识源主机和目的主机标识正在通信的应用程序标识主机之间的多个会话标识通过本地介质通信的设备此试题参考以下领域的内容:ccnAexploration:网络基础知识?1.5.1它的发展方向是什么?8请参见图示。

2019年 思科ITE 3,4,5,6章考试原题及答案

2019年 思科ITE 3,4,5,6章考试原题及答案
将用户数据备份到可移动驱动器。
在故障排除流程中,实施了一种可能的解决方案后,下一个步骤是什么?
检验完整系统功能并实施维护程序
某员工反映防病毒软件无法获取更新。支持技术人员发现软件的许可证已过期。技术人员向软件添加了新许可证并完成了更新服务。技术人员下一步应如何操作?
对计算机运行全盘病毒扫描。
将问题上报给更高级别的技术人员之前,应完成什么任务?
用户在一台可正常工作的计算机上安装了新的视频驱动程序。安装新驱动程序后重启计算机,但计算机启动失败。用户如何让计算机快速返回到工作状态?
计算机启动时按F8,并选择“最近一次的正确配置”选项。
安装过程中所选择的设置存储在什么地方?
在注册表中
在Windows 中注册一个 DLL 文件为什么很重要?
可以使任何需要使用此特定程序代码的程序找到此文件
温度
以下哪一项是制定预防性维护计划的一部分?
记录每项维护任务的详细信息和频率
技术人员正在施工现场执行PC 硬件维护。作为预防性维护计划的一部分,技术人员应该执行什么任务?
进气风扇除尘。
以下哪项任务应作为硬件维护例行程序的一部分?
检查并固定任何松动的电缆。
在测试导致某个问题的若干可能原因时,应该首先测试哪类原因?
驱动器加密
调整BIOS 配置设置中的时钟速度的一个用途是什么?
允许计算机更慢地运行,发热量也更低
技术人员正在组装新计算机。在将主板装入机箱之前通常先安装哪两个组件?(选择两项。)
CPU
内存
升级一个使用较新主板的计算机系统时,通常会更换哪两个组件?(选择两项。)
ram
cpu
用户报告每天早晨打开某台计算机时,该计算机上的配置设置都必须重置。应采取什么措施解决此问题?

cisco packet tracer 答案

cisco packet tracer 答案
5. OSI 模型哪两层的功能与 TCP/IP 模型的网络接入层相同?(选择两项)
网络层 传输层 物理层 数据链路层
第 8/84页
会话层
6. 什么是 PDU?
传输期间的帧损坏 在目的设备上重组的数据 因通信丢失而重新传输的数据包 特定层的封装
7. 以下哪种特征正确代表了网络中的终端设备?
管理数据流 发送数据流 重新定时和重新传输数据信号 确定数据传输路径
14. 口令可用于限制对 Cisco IOS 所有或部分内容的访问。请选择可以用口令保护的模式和接口。(选
择三项。) VTY 接口 控制台接口 以太网接口 加密执行模式
第 4/84页
特权执行模式 路由器配置模式
15. 输入以下命令的作用是什么?
R1(config)# line vty 0 4 R1(config-line)# password check123 R1(config-line)# login 确保在进入用户执行模式之前输入口令 设置通过 Telnet 连接该路由器时使用的口令 要求在保存配置前输入 check123 创建本地用户帐户以便登录路由器或交换机
分组交换 网段扩展 广播域分段 根据逻辑编址选择最佳路径 根据物理编址选择最佳路径
8. 当路由器收到从一个网络发往另一个网络的数据包时,它会执行哪三个过程?(选择三项。)
通过解开第 2 层帧报头来解封第 3 层数据包 通过 IP 报头中的目的 MAC 地址在路由表中查找下一跳地址 解封第 3 层数据包时将第 2 层帧报头保持原样 通过 IP 报头中的目的 IP 地址在路由表中查找下一跳地址 将第 3 层数据包封装成新的第 2 层帧,并将该帧从送出接口转发出去 将第 3 层数据包封装成特殊的第 1 层帧,并将该帧转发到送出接口

思科答案

思科答案

ESwitching F.一台新交换机将加入远程办公室的现有网络。

网络管理员希望远程办公室的技术人员无法将新VLAN 添加到该交换机,但又希望交换机接收来自VTP 域的VLAN 更新。

要满足这些条件,必须在新交换机上执行哪两个VTP 配置步骤?(选择两项。

)1.在新交换机上配置IP 地址。

2.在新交换机上配置现有VTP 域名。

3.将两台交换机的所有端口都配置为接入模式。

4.将新交换机配置为VTP 客户端。

5.启用VTP 修剪。

2.下列关于无线基础架构组件的说法中哪两项正确?(选择两项。

)1.AP 将TCP/IP 数据包从802.11 帧封装格式转换为802.3 以太网帧格式(有线以太网络中)。

2.无线AP 不需要任何物理连接即可让无线客户端接入Internet。

3.AP 与交换机类似,是第2 层设备,为相连的每台无线主机提供专用带宽。

4.无线网卡和AP 之间不会发生冲突。

5.无线路由器兼具AP 和路由器的作用。

3.将Linksys 集成路由器上的安全模式设置为WEP 有什么作用?1.WEP 可标识无线LAN。

2.WEP 允许该接入点通知客户端它的存在。

3.WEP 将IP 地址转换为容易记忆的域名。

4.WEP 可加密无线客户端与接入点之间的数据。

5.WEP 可确保只有授权用户可以访问该WLAN。

6.WEP 将一个或一组内部地址转换为外部公有地址。

4.将路由器配置为SSH 服务器时,发出crypto key generate rsa 命令之前应先配置什么?1安全的域名2.VTP 域名3.IP 域名4.主机名5.VLAN 中继有何用途?1.通过减少广播流量提高网络性能。

2.选择在交换网络中传输数据的最佳路径。

3.通过一条链路传送多个VLAN 的流量。

4.避免交换网络中出现生成树环路。

2下列哪种说法正确描述了生成树路径开销?根据环路中连接的交换机总数计算。

根据给定路径上所有交换机的使用率计算。

根据给定路径上交换机的网桥优先级计算。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

思科第一学期第四章章节测试答案1What are two features of the User Datagram Protocol (UDP)? (Choose two.) flow controllow overheadconnectionlessconnection-orientedsequence and acknowledgements2What mechanism is used by TCP to provide flow control as segments travel from sou destination?sequence numberssession establishmentwindow sizeacknowledgments3With TCP/IP data encapsulation, which range of port numbers identifies all well-know applications?0 to 255256 to 10220 to 10231024 to 204749153 to 655354Which event occurs during the transport layer three-way handshake?The two applications exchange data.TCP initializes the sequence numbers for the sessions.UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client.5Which two options represent Layer 4 addressing? (Choose two.)identifies the destination networkidentifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media6Why are port numbers included in the TCP header of a segment?to allow the receiving host to assemble the packet in the proper orderto enable a receiving host to forward the data to the appropriate applicationto determine which Layer 3 protocol should be used to encapsulate the datato indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segment7What is dynamically selected by the source host when sending data?destination logical addresssource physical addressdefault gateway addresssource port8During a TCP communication session, if the packets arrive to the destination out of o will happen to the original message?The packets will not be delivered.The packets will be retransmitted from the source.The packets will be delivered and reassembled at the destination.The packets will be delivered and not reassembled at the destination.9Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is bei performed?session establishmentsegment retransmitdata transfersession disconnect10Which transport layer protocol provides low overhead and would be used for appl which do not require reliable data delivery?TCPIPUDPHTTPDNS11Refer to the exhibit. What two pieces of information can be determined from the outpu shown? (Choose two.)The local host is using multiple client sessions.The local host is using web sessions to a remote server.The local host is listening for TCP connections using public addresses.The local host is using well-known port numbers to identify the source ports.The local host is performing the three-way handshake with 192.168.1.101:1037.12Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical orderto prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts13After a web browser makes a request to a web server that is listening to the stand what will be the source port number in the TCP header of the response from the s1353801024172814Based on the transport layer header shown in the diagram, which of the following describe the established session? (Choose two.)This is a UDP header.This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of 43693.This is a TCP header.15Which three features allow TCP to reliably and accurately track the transmission o source to destination? (Choose three.)flow controlurgent pointerbest effort deliverysession establishmentconnectionless servicesnumbering and sequencing16Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2 sent a SYN message to begin session establishment. What happens next?Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.17Which OSI model layer is responsible for regulating the flow of information from sdestination, reliably and accurately?applicationpresentationsessiontransportnetwork18Which is an important characteristic of UDP?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery19Which information is found in both the TCP and UDP header information?sequencingflow controlacknowledgmentssource and destination port20Refer to the exhibit. Host A is using FTP to download a large file from Server 1. D download process, Server 1 does not receive an acknowledgment from Host A fo bytes of transferred data. What action will Server 1 take as a result?create a Layer 1 jam signalreach a timeout and resend the data that needs to be acknowledgedsend a RESET bit to the hostchange the window size in the Layer 4 header。

相关文档
最新文档