最新CCNA认证考试真题
思科认证CCNA认证试题和答案中文版

思科认证CCNA认证试题和答案中文版思科认证CCNA认证试题和答案中文版想要获得思科认证,首先要参加由思科推荐并授权的培训中心(Cisco Training Partner,简称CTP)所开设的培训课程。
完成学业后再到由全球考试机构Sylvan Prometric授权的.考试中心参加由思科指定的科目的认证考试。
通过指定的系列科目考试后,学员就可以获得相应分支系列等级的资格认证。
下面是店铺为大家搜集的相关试题,供大家参考练习。
16、路由器A串口0配置如下interface serial0link-protocol pppppp pap local-user huawei password simple quidwayip address 2.2.2.1 255.0.0.0路由器B串口及全局配置如下local-user huawei service-type ppp password simple quidway!interface serial0link-protocol pppppp authentication-mode papip address 2.2.2.2 255.0.0.0当两台路由器串口0相连时,两台路由器是否可以连接到对端()(A) 能(B) 不能答案:A17、关于千兆以太网,以下说法正确的是( )(A) IEEE802.3ab定义了千兆以太网(B) 在同一冲突域中,千兆以太网不允许中继器的互连(C) IEEE802.3z专门定义了千兆以太网在双绞线上的传输标准(D) 千兆以太网支持网络速率的自适应,可以与快速以太网自动协商传输速率答案:AB参考知识点:华为3com认证教材第一册3-8页18、高层的协议将数据传递到网络层后,形成( ),而后传送到数据链路层(A) 数据帧(B) 信元(C) 数据包(D) 数据段答案:C参考知识点:华为3com认证教材第一册1-20页19、在路由器上配置帧中继静态map必须指定( )参数(A) 本地的DLCI(B) 对端的DLCI(C) 本地的协议地址(D) 对端的协议地址答案:AD20、路由器的主要性能指标不包括( )(A) 延迟(B) 流通量(C) 帧丢失率(D) 语音数据压缩比答案:D【思科认证CCNA认证试题和答案中文版】。
思科认证CCNA认证试题与答案中文版

答案:D 注释:这个题目不是太严谨,应该加上子网掩码. A:224. 0. 0. 5 是多播地址 B: 127. 0.0. 0 保留作为测试使用 C:网络地址 26、 设置主接口由 up 转 down 后延迟 30 秒切换到备份接口,主 接口 由 down 转 up 后 60 秒钟切换回主接口的配置为()
忍一句,息一怒,饶一着,退一步。——《增广贤文》
人之为学,不日进则日退,独学无友,则孤陋而难成;久处一方,则习染而不自觉。——《顾炎武》
答案:D 注释:255. 255. 255. 255 是全网广播,DHCP 客户端发送全网广播来 查 找 DHCP 服务器. 24、 下而有关 NAT 叙述正确的是() (A) NAT 是英文“地址转换”的缩写,又称地址翻译 (B) XAT 用来实现私有地址与公用网络地址之间的转换 (C) 当内部网络的主机访问外部网络的时候,一定不需要 NAT (D) 地址转换的提出为解决 IP 地址紧张的问题提供了一个有效途 径 答案:ABD 25、 以下属于正确的主机的 IP 地址的是()
(A) arp-a (B) traceroute (C) routeprint (D) displayiprouting-table
答案:D 23、 D0. 0. 0 (B) 10. 0. 0. 1 (0127. 0. 0. 1 (D)255. 255. 255. 255
192. 168. 1. 1
答案:D 注释:PC 的'默认网关要指向路由器的以太网口的 IP 地址. 28、 ISDNB 信道速率是()
(A) 16kbps (B) 64kbps
最新CCNA认证考试真题

⽆忧考为⼤家收集整理了《最新CCNA认证考试真题》供⼤家参考,希望对⼤家有所帮助(1)TCP/IP Addressing and Protocol1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?A. 255.0.0.0B. 255.255.0.0C. 255.245.255.0D. 255.255.255.0E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?A. TCPB. UDPC. IPD. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?A. 255.255.0.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?A. 172.16.12.33/28B. 172.16.12.32/27C. 172.16.12.33/27D. 172.16.12.34/27E. 172.16.12.35/28F. 172.16.12.38/28G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A. 172.16.176.0–255.255.240.0B. 172.16.192.0–255.255.240.0C. 172.16.208.0–255.255.240.0D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?A. One network with 254 hostsB. Two networks with 128 hostsC. Four networks with 64 hostsD. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)A. 201.168.27.33B. 201.168.27.112C. 201.168.27.119D. 201.168.27.126E. 201.168.27.175F. 201.168.27.208 9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?A. 201.100.5.0B. 201.100.5.32C. 201.100.5.64D. 201.100.5.65E. 201.100.5.31F. 201.100.5.1 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?A. TCPB. IPC. UDPD. IPXE. Frame relay 11: Which of the following protocols is connection-oriented? A. TCPB. IPC. IPXD. Frame relay 12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?A. TCPB. IPC. UDPD. SPXE. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.A. MTU adjustmentB. WindowingC. Flexible Send PathD. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information?A. The ACK received will not include the segment number that was not received.B. The ACK received will include the segment number that was not received.C. The sending host will send a PACK to verify segment receipt.D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?A. Class AB. Class BC. Class CD. Class DE. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)A. 10.23.45.67B. 126.21.34.56C. 172.16.32.1D. 172.31.234.55E. 192.169.4.5 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?Department Number of Users Corporate 7 Customer Support 15 Financial 13 HR 7 Engineering 16 A. 255.255.255.0B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?A. UDPB. TCPC. SNMPD. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)A. MAC address resolutionB. Sequence numbersC. AcknowledgmentsD. PingE. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?A. Increased throughputB. Decreased throughputC. Increased latencyD. Decreased reliability21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.224E. 255.255.255.240F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?A. ARPB. RARPC. SLARPD. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?A. The host's default gateway is down.B. The destination host is not powered on.C. The IP address of the router interface is incorrect.D. The IP address of the switch to which the destination host connects is incorrect.E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting?A. Class AB. Class BC. Class CD. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork.B. It represents the number of subnetworks that are being used.C. It represents the class of IP address being used.D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.224E. 255.255.255.240 27: Which of the following would a Class A network be assigned to?A. Government agencyB. Small-to-medium sized corporationD. An individual 28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)A. 192.168.5.95B. 192.168.5.100C. 192.168.5.128D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet?A. 2.3.4.5B. 11.12.13.14C. 165.23.224.2D. 172.31.45.34E. 203.33.45.22 30: You are given a Class B network. What is the default subnet mask assigned to the Class B network?A. 255.255.255.255B. 255.255.0.0C. 255.224.0.0D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address?A. Class C addresses cannot be assigned to Ethernet interfaces.B. The /27 is an invalid mask.C. It is a broadcast address.D. It is a public IP address.E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?A. 255.255.255.254B. 255.255.254.0C. 255.255.240.254D. 255.255.0.0 33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of255.255.255.248?A. 192.168.2.24/192.168.2.31B. 192.168.2.32/192.168.2.39C. 192.168.2.40/192.168.2.47D. 192.168.2.48/192.168.2.55E. 192.168.2.56/192.168.2.63 34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?A. 218B. 219C. 220E. 222 35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?A. 75B. 83C. 90D. 97 36: One of your co-workers at Acme, Inc. , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 1 0 1 0 1 1 0 i n t o a d e ci m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 1 0 " > A . 1 9 8 / p > p b d s f i d = " 2 1 1 " > B . 2 14 / p > p b d s f i d = " 2 1 2 " > C . 25 2 / p > p b d s f i d = " 2 1 3 " > D . 2 5 5 3 7 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 0 1 1 0 1 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 1 4 " > A . 1 8 2 / p > p b d s f i d = " 2 1 5 " > B . 1 9 2 / p > p b d s f i d = " 2 16 " > C . 2 0 2 / p > p b d s f i d = " 2 17 " > D . 2 1 2 38 : Y o u a r e c o n f i g u r i n g a s u b n e t f o r t h e A c m e , I n c . , b r a n c h o f f i c e i n B e i j i n g . Y o u n e e d t o a s s i g n I P a d d r e s s e s t o h o s t s i n t h i s s u b n e t . Y o u h a v e b e e n g i v e n t h e s u b n e t m a s k o f 2 5 5 . 2 5 5 . 2 5 5 . 2 2 4 . W h i c h o f t h e s e I P a d d r e s s e s w o u l d b e v a l i d ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 2 1 8 " > A . 1 5 . 2 3 4 . 1 1 8 . 6 3 / p > p b d s f i d = " 2 19 " > B . 9 2 . 1 1 . 1 7 8 . 9 3 / p > p b d s f i d = " 2 2 0 " > C . 1 3 4 . 1 7 8 . 1 8 . 5 6 / p > p b d s f i d = " 2 2 1 " > D . 1 9 2 . 1 6 8 . 1 6 . 8 7 / p > p b d s f i d = " 2 2 2 " > E . 2 0 1 . 4 5 . 1 1 6 . 1 5 9 / p > p b d s f i d = " 2 2 3 " > F . 2 1 7 . 6 3 . 1 2 . 1 9 2 3 9: Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 2 0 8 . 9 8 . 1 1 2 . 0 n e t w o r k w i t h a / 2 8 m a s k . Y o u r b o s s a s k s y o u h o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v id e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r i s u s i n g i p s u b n e t - z e r o ? / p > p b d s f i d = " 22 4 " > A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 2 5 " > B . 6 n e t w o r k s a n d3 0 h o s t s / p > p b d s f i d = " 2 2 6 " > C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 2 7 " > D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f i d = " 2 2 8 " > E . 1 6 n e t w o r k s a n d 14 h o s t s 4 0 : W h a t i s a d i s a d v a n t a g e o f u s i n g a c o n n e c t i o n -o r i e n t e d p r o t o c o l s u c h a s T C P ? / p > p b d s f i d = " 2 2 9 " > A . P a c k e t a c k n o w l e d g m e n t m i g h t a d d o v e r h e a d . / p > p b d s f i d = " 2 3 0 " > B . P a c k e t s a r e n o t t a g g e d w i t h s e q u e n c e n u m b e r s . / p > p b d s f i d = " 2 3 1 " > C . L o s s o r d u p l i c a t i o n o f d a t a p a c k e t s i s m o r e l i k e l y t o o c c u r . / p > p b d s f i d = " 2 32 " > D . T h e a p p l i c a t i o n l a y e r m u s t a s s u m e r e s p o n s i b i l i t y f o r t h e c o r r e c t s e q u e n c i n g o f t h ed a t a p a c ke t s . 4 1 : Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 1 9 2 . 16 8 .7 2 . 0 n e t w o r k w i t h a / 3 0 m a s k f o r c o n n e c t i o n s b e t w e e n y o u r r o u t e r s . Y o u r b o s s a s k s y o uh o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v i d e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r c a n n o t u s e i p s u b n e t - z e r o ? / p > p b d s f i d = " 2 3 3 " > A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 3 4 " > B . 6 n e t w o r k s a n d 3 0 h o s t s / p > p b d s f i d = " 23 5 " > C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 3 6 " > D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f id = " 2 3 7 " > E . 1 4 ne t w o r k s a n d 1 4 h o s t s 4 2 : W h i c h of t h e f o l l o w i ng I P a d d r e s s e s a r e c o n s i d e re d " n e t w o r k " a d d r e s s e s w i t h a / 2 6 p r ef i x ? ( C h o o s e t w o . ) / p > p b d s f i d = " 2 3 8 " > A . 1 6 5 . 2 0 3 . 2 . 0 / p > p b d s f i d = " 2 3 9 " > B . 1 6 5 . 2 0 3 . 5 . 1 9 2 / p > p b d s f i d = " 2 4 0 " > C . 1 6 5 . 2 0 3 . 6 . 6 3 / p > p b d s f i d = " 2 4 1 " > D . 1 6 5 . 2 0 3 . 6 . 1 9 1 / p > p b d s f i d = " 2 4 2 " > E . 1 6 5 . 2 0 3 . 8 . 2 5 5 4 3 : I d e n t i f y t h r e e v a l i d h o s t s i n a n y s u b n e t o f 1 9 2 . 1 6 8 . 3 2 . 0 , a s s u m i ng th e s u b n e t m a s k u s e di s 2 5 5 . 2 5 5 . 2 5 5 . 2 4 0 . (C h o o s e t h r e e . ) / p > p b d s f i d = " 2 4 3 " > A . 1 9 2 . 1 6 8 . 3 2 . 3 3 / p > p b d s f i d = " 2 4 4 " > B . 1 9 2 . 1 6 8 . 3 2 .1 12 / p > p b d s f i d = " 2 4 5 " > C . 1 9 2 . 1 6 8 .3 2 . 1 1 9 / p > p b d s f i d = " 24 6 " > D . 1 9 2 . 1 6 8 . 3 2 . 1 2 6 / p > p bd s f i d = " 2 4 7 " > E . 1 9 2 . 1 6 8 . 3 2 . 1 7 5 / p > p b d s f i d = " 2 4 8 " > F . 1 9 2 . 1 6 8 . 3 2 . 2 0 8 4 4 : A C l a s s C ne t w o r k a d d r e s s h a s b e e n s u b n e t t e d w i t h a / 2 7 m a s k . W h i c h of t h e f o l l o w i ng a d d r e s s e s i s a b r oa d c a s t a d d r e s s f o r o n e o f t h e r e s u l t i n g s ub n e t s ? / p > p b d s f i d = " 2 4 9 " > A . 1 9 8 . 5 7 . 7 8 . 3 3 / p > pb d s f i d = " 2 5 0 " > B . 1 9 8 . 5 7 . 7 8 . 6 4 / p > p b d s f i d = " 2 5 1 " > C . 1 9 8 . 5 7 . 7 8 . 9 7 / p > p b d s f i d = " 2 5 2 " >D . 1 9 8 . 5 7 . 7 8 . 9 7 / p > p b d s f i d = " 2 5 3 " >E . 1 9 8 . 5 7 . 7 8 . 1 5 9 / p > p b d s f i d = " 2 5 4 " >F . 1 9 8 . 5 7 . 7 8 .2 5 4 4 5 : W h a t i s t h e s u b n e t w o r k a d d r e s s f o r a h o s t w i t h I P a d d r e s s 1 6 5 . 1 0 0 . 5 . 6 8 / 2 8 ? / p > p bd s f i d = " 2 5 5 " > A . 1 6 5 . 1 0 0 . 5 . 0 / p > p b d s f i d = " 2 5 6 " > B . 1 6 5 . 1 0 0 . 5 . 3 2 / p > p b d s f i d = " 2 5 7 " > C .1 6 5 . 1 0 0 . 5 . 6 4 / p > p b d s f i d = "2 5 8 " > D . 1 6 5 . 1 0 0 . 5 . 6 5 / p > p b d s f i d = " 2 5 9 " > E . 1 6 5 . 1 0 0 . 5 .3 1 / p > p b d s f i d = " 2 6 0 " > F . 1 6 5 . 1 0 0 . 5 . 14 6 : Y o u r b o s s w a n t s t o k n o w w h a t T C P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 2 6 1 " > A . T r a n s m i s s i o n C h e c k P r o t o c o l / p > p b d s f i d = " 2 6 2 " > B . T r a n s p o r t C h e c k P r o t o c o l / p > p b d s f i d = " 2 6 3 " > C . T r a n s m i s s i o n C o n t r o l P r o t o c o l / p > p b d s f i d = " 2 6 4 " > D . T r a n s p o r t C o n t r o l P r o t o c o l 4 7 : Y o u r b o s s w a n t s t o k n o w w h a t U D P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 2 65 " > A . U n r e l i a b l e D a t a P r o t o c o l / p > p b d s f i d = " 26 6 " > B . U n r e l i a b l e D a t a P r o g r a m / p > p b d s f i d = " 2 67 " > C . U s e r - D e f i n e d P r o t o c o l / p > p b d s f i d = "2 6 8 " > D . U s e r D a t a g r a m P r o t o c o l 4 8 : W h i c h o f t h e f o l l o w i n g s t a t e m e n t s a c c u r a t e l y d e s c r ib e s U D P ? / p > p b d s f i d = " 2 6 9 " > A . U D Pc o p i e s f i l e s b e t w e e n a c o m p u t e r a nd a s y s te m r u n n i n g r s h d , t h e r e m o t e s h e l l s e r v i c e ( d a e m o n ) . / p > p b d sf i d = " 2 7 0 " > B . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t o c o l s t h a tg o v e r n s th e e x c h a n g e o f e l e c t r o ni c m a i l b e t w e e n m e s s a g e t ra n s f e r a g e n t s . / p > pb d s f i d = " 2 7 1 " > C . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t oc o l s a nd i s u se d t o c o p yf i l e s b e t w e e n t w o c o m p u t e r s o n t h e I n t e r n e t . B o t h c o m p u t e r s m u s t s u p p o r t t h e i r r e s p e c t i v e r o l e s : o n e m u s t b e a c l i e n t , a n d t h e o t h e r a s e r v e r . / p > p b d s f i d = " 2 7 2 " > D . U D P i s a T C P c o m p l e m e n t t h a t o f f e r s a c o n n e c t i o n l e s s d a t ag r a m s e r v i c e g u a r a n t e e i n g n e i th e r d e li v e r y n o r c o r r e c t s e q u e n c i n g o f d e l i v e r e d p a c k e t s ( m u c h l i k e I P ) . 4 9 : W h i c h o f t h e f o l l o w i n g h o s t a d d r e s s e s a r e m e m b e r s o f n e t w o r k s t h a t c a n b e r o u t e d a c r o s s t h e p u b l i c I n t e r n e t ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 2 7 3 " > A . 1 0 . 2 0 . 1 2 . 6 4 / p > p b d s f i d = " 2 7 4 " > B . 1 7 2 . 1 6 . 32 . 1 2 9 / p > p b d s f i d = " 2 7 5 " > C . 1 7 2 . 6 4 .3 2 . 34 / p > p b d s f i d = " 2 7 6 " > D . 1 9 2 . 1 6 8 . 2 3 . 25 2 / p > p bd s f i d = " 2 7 7 " > E . 1 9 6 . 1 0 4 . 1 2 . 9 5 / p > p b d s f i d = " 2 7 8 " > F . 2 1 4 . 1 9 2 . 4 8 . 2 5 4 5 0 : Y o u a re c o n n e c t i n g y o u r S e r i a l 0 / 1 i n t e rf a c e t o t h e I n t e r n e t . W h i c h o f t h e f o l l o w i ng n e e d t o b e d o n e f o r th e c o n n e c ti o n t o w o r k ? ( C h o o s e t w o . ) / p > p b d s f i d = " 2 7 9 " > A . A s s i g n a p u b l i c I P a d d r e s s . / p > pb d s f i d = " 2 8 0 " > B . U s e t h e s h u t d o w nc o m m a nd . / p > p b d s f i d = " 2 8 1 " > C . U se t h e n o s h u t d o w nc o m m a nd . / p > p b d s f i d = " 2 8 2 " > D . M a ke s u r e t h e i n t e rf a c e i s r u n n i ng i n f u l l - d u p l e x . / p >。
Cisco CCNA 认证考试最新真题

Cisco CCNA 认证考试最新真题体验1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address 10.121.16.8 is the local router port used to forward data.C.102 is the remote DLCI that will receive the information.D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?A.the session layerB.the network layerC.the data link layerD.the access layer3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?A.router(config)# line console 0router(config-line)# enable password ciscoB.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# loginC.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# loginD.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login4. On point-to-point networks, OSPF hello packets are addressed to which address?A.127.0.0.1B.192.168.0.5C.224.0.0.5D.254.255.255.2555. What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported6. During startup, the router displays the following error message:boot: cannot open "flash:" What will the router do next?A.Because of damaged flash memory, the router will fail the POST.B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialogC.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog7. At which OSI layer is a logical path created between two host systems?A.sessionB.transportworkD.physical8. A routing protocol is required that supports:1) routing update authentication2) an addressing scheme that conserves IP addresses3) multiple vendors4) a network with over 50 routersWhich routing protocol fulfills these requirements?A.RIPv1B.RIPv2C.EIGRPD.OSPF9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A.no VLANsB.all VLANsC.only VLANs 1 - 6D.only the VLANs that are specified when creating the trunk10. Which protocol provides a method of sharing VLAN configuration information between switches?A.VTPB.STPC.ISLD.802.1QDBDCB CCDBA博主的更多文章>>CCNA第一学期《Final Examination》2009-02-27 08:58:47 标签:CCNA[推送到技术圈]1请参见图示。
思科CCNA第三学期官方试题(完整版)[有答案解析]
![思科CCNA第三学期官方试题(完整版)[有答案解析]](https://img.taocdn.com/s3/m/d3a11424f18583d0496459c9.png)
参加考试 - ESwitching Final Exam - CCNA Exploration: LAN 交换和无线 (版本 4.0)剩余时间正在显示第 1 页,共 4页下一页>页跳转<上一页1 以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSID OFDMWEPDSSS2 分层网络模型具有哪三项优点?(选择三项。
)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化3在将 Catalyst 交换机迁移到其它 VTP 管理域之前,应该进行哪三项任务?(选择正确的 VTP 模式和版本。
使用新管理域的名称配置交换机。
从新域中的 VTP 服务器上下载 VTP 数据库。
配置新域内的 VTP 服务器,使其识别该交换机的 BID。
重置 VTP 计数器,使交换机可与新域内的其它交换机同步。
检验交换机的配置修订版号是否比新域内的其它交换机的低。
4下列哪两种说法正确地描述了生成树协议?(选择两项。
)它只在第 2 层使用。
它在交换机上配置。
它消除了网络拓扑中的第 2 层环路。
它限制了端口上所允许的有效 MAC 地址的数量。
它使 VLAN 信息得以传播到网络中的其它交换机。
5下列哪种方法可建立用于配置 Linksys WRT300N 无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。
以物理方式连接到接入点,然后重新启动计算机以启动配置软件。
在接入点所在的 IP 子网内的计算机上的 web 浏览器中输入接入点的默认修改与接入点连接的计算机的 TCP/IP 属性,使其与接入点处于同一个网机以建立连接。
6请参见图示。
源地址并非 0019.d2e4.d9f7 的帧进入接口 Fa0/24 时会发生什么情况?Fa0/24 会变为 error-disabled(错误-禁用)状态。
传入帧会被丢弃。
Fa0/24 端口 LED 会关闭。
安全违规计数会增加。
最新CCNA题库 V102上卷(含答案无水印)

学网络技术去鸿鹄网网络技术从零开始梦想之路鸿鹄开启鸿鹄论坛:鸿鹄团队致力于为每一位网络技术爱好者提供帮助有事您发帖,斑竹为您跑腿,给您答疑。
CCNA CCNP最新题库/最新战报发布区:/thread.php?fid-166.html 鸿鹄客服QQ:712023090请加QQ群:96564501103107466鸿鹄题库新纪元CCNA V102上卷(共上下两卷,加lab集)1What can a network administrator utilize by using PPP Layer2encapsulation?(Choose three.)A.VLAN supportpressionC.AuthenticationD.Sliding windowsE.Multilink supportF.Quality of serviceAnswer:B,C,E2Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)A.It specifies use of a static encryption key that must be changed frequently to enhance security.B.It requires use of an open authentication method.C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D.It requires that all access points and wireless devices use the same encryption key.E.It includes authentication by PSK.Answer:C,E3While troubleshooting a connectivity problem,a network administrator notices that a port status LED on a Cisco Catalyst series switch is alternating green and amber.Which condition could this indicate?A.The port is experiencing errors.B.The port is administratively disabled.C.The port is blocked by spanning tree.D.The port has an active link with normal traffic activity.Answer:A4Refer to the exhibit.The network shown in the exhibit is running the RIPv2routing protocol.The network has converged, and the routers in this network are functioning properly.The FastEthernet0/0interface on R1goes down.In which two ways will the routers in this networkrespond to this change?(Choose two.)A.All routers will reference their topology database to determine if any backup routes to the192.168.1.0network are known.B.Routers R2and R3mark the route as inaccessible and will not accept any further routing updates from R1until their hold-down timers expire.C.Because of the split-horizon rule,router R2will be prevented from sending erroneous information to R1about connectivity to the192.168.1.0network.D.When router R2learns from R1that the link to the192.168.1.0network has been lost,R2will respond by sending a route back to R1with an infinite metric to the192.168.1.0network.E.R1will send LSAs to R2and R3informing them of this change,and then all routers will send periodic updates at an increased rate until the network again converges.Answer:C,D5Which three statements are correct about RIP version2?(Choose three.)A.It has the same maximum hop count as version1.B.It uses broadcasts for its routing updates.C.It is a classless routing protocol.D.It has a lower default administrative distance than RIP version1.E.It supports authentication.F.It does not send the subnet mask in updates.Answer:A,C,E6What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individuals.C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E.Minimize network overhead by deactivating automatic antivirus client updates.Answer:B7How should a router that is being used in a Frame Relay network be configured to avoid split horizonissues from preventing routing updates?A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to thesub-interface.B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.C.Configure many sub-interfaces on the same subnet.D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.Answer:A8Refer to the exhibit.Which statement describes DLCI17?A.DLCI17xn R2and R3.B.DLCI17describes a PVC on R2.It cannot be used on R3or R1.C.DLCI17is the Layer2address used by R2to describe a PVC to R3.D.DLCI17describes the dial-up circuit from R2and R3to the service provider. Answer:C9Which routing protocol by default uses bandwidth and delay as metrics?A.RIPB.BGPC.OSPFD.EIGRPAnswer:D10Refer to the exhibit.Switch-1needs to send data to a host with a MAC address of00b0.d056.efa4.What will Switch-1do with this data?A.Switch-1will drop the data because it does not have an entry for that MAC address.B.Switch-1will flood the data out all of its ports except the port from which the data originated.C.Switch-1will send an ARP request out all its ports except the port from which the data originated.D.Switch-1will forward the data to its default gateway.Answer:B11Refer to the exhibit.Why would the network administrator configure RA in this manner?A.To give students access to the InternetB.To prevent students from accessing the command prompt of RAC.To prevent administrators from accessing the console of RAD.To give administrators access to the InternetE.To prevent students from accessing the InternetF.To prevent students from accessing the Admin networkAnswer:B12While troubleshooting a network connectivity problem,a technician observes steady link lights on boththe workstation NIC and the switch port to which the workstation is connected.However,when the ping command is issued from the workstation,the output message"Request timed out."is displayed.At which layer of the OSI model does the problem most likely exist?A.The session layerB.The protocol layerC.The data link layerD.The access layerE.The network layerF.The application layerAnswer:E13A network administrator has configured two switches,named London and Madrid,to use VTP. However,the switches are not sharing VTP messages.Given the command output shown in the graphicWhy are these switches not sharing VTP messages?A.The VTP version is not correctly configured.B.The VTP operating mode is not correctly configured.C.The VTP domain name is not correctly configured.D.VTP pruning mode is disabled.E.VTP V2mode is disabled.F.VTP traps generation is disabled.Answer:C14On point-to-point networks,OSPF hello packets are addressed to which address?A.127.0.0.1B.172.16.0.1C.192.168.0.5D.223.0.0.1E.224.0.0.5F.254.255.255.255Answer:E15Refer to the exhibit.The switches on a campus network have been interconnected as shown.All of the switches are running Spanning Tree Protocol with its default settings.Unusual traffic patterns are observed and it is discovered that Switch9is the root bridge.Which change will ensure that Switch1will be selected as the root bridge instead of Switch9?A.Lower the bridge priority on Switch1.B.Raise the bridge priority on Switch1.C.Lower the bridge priority on Switch9.D.Raise the bridge priority on Switch9.E.Disable spanning tree on Switch9.F.Physically replace Switch9with Switch1in the topology.Answer:A16You just entered the following command:Company(config)#line console0A.Configure the terminal type.B.Enter protocol parameters for a serial line.C.Create a password on the console terminal line.D.Establish a terminal type4connection to a remote host.Answer:C17The part of Company network is shown below:According to the diagram,which of the following is true about the internetwork?pany2is the root bridge.B.Spanning Tree is not runn ing.C.No collisions can occur in traffic between CompanyB and CompanyC.panyD and Company Server1are in the same network.E.If Fa0/0is down on Company-R,PassGuideA cannot access Company Server1Answer:E18Which three of the following are reasons for assigning ports to VLANs on a switch?(Choose three.)A.to permit more devices to connect to the networkB.to iscC.to logically group hosts on the basis of functionD.to increase network securityAnswer:B,C,D19The Company network is shown below:Based on the information shown above,when the Company network administrator attempts to ping Host Company-PC2from Host Company-PC1and shown.What is a possible problem?A.The link between Company1and Company2is down.B.Interface Fa0/0on Company2is shutdown.C.The link between Company2and Company3is down.D.The default gateway on Company-PC1is incorrect.Answer:C20What is the objective of a default route?A.Offering routing to override the configured dynamic routing protocolB.Offering routing to a local web serverC.Offering routing from an ISP to a stub networkD.Offering routing to a destination that is not specified in the routing table and which is outside the local networkAnswer:D21Which three benefits are of VLANs?(Choose three.)A.To increase the size of collision domains.B.To allow logical grouping of users by function.C.To enhance network security.D.To increase the number of broadcast domains while decreasing the size of the broadcast domains. Answer:B,C,D22A default Frame Relay WAN is classified as what type of physical network?A.Point-to-pointB.Broadcast multi-accessC.Nonbroadcast multi-accessD.Nonbroadcast multipointE.Broadcast point-to-multipointAnswer:C23Refer to the exhibit.How many broadcast domains exist in the exhibited topology?A.OneB.TwoC.ThreeD.FourE.FiveF.SixAnswer:C24The command frame-relay map ip10.121.16.8102broadcast was entered on the router.Which of thefollowing statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address10.121.16.8is the local router port used to forward data.C.102is the remote DLCI that will receive the information.D.This command is required for all Frame Relay configurations.E.The broadcast option allows packets,such as RIP updates,to be forwarded across the PVC. Answer:E25Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?A.Denial of serviceB.Brute forceC.ReconnaissanceD.Trojan horseAnswer:A26Which of the following are associated with the application layer of the OSI model?(Choose two.)A.PingB.TelnetC.FTPD.TCPE.IPAnswer:B,C27What are two recommended ways of protecting network device configuration files from outside network security threats?(Choose two.)A.Allow unrestricted access to the console or VTY ports.e a firewall to restrict access from the outside to the network devices.C.Always use Telnet to access the device command line because its data is automatically encrypted.e SSH or another encrypted and authenticated transport to access device configurations.E.Prevent the loss of passwords by disabling password encryption.Answer:B,D28Refer to the exhibit.Switch1has just been restarted and has passed the POST routine.Host A sends its initial frame to Host C.What is the first thing the switch will do as regards populating the switching table?A.Switch1will add192.168.23.4to the switching table.B.Switch1will add192.168.23.12to the switching table.C.Switch1will add000A.8A47.E612to the switching table.D.Switch1will add000B.DB95.2EE9to the switching table.Answer:C29Exhibit:The user of Host1wants to ping the DSL modem/router at192.168.1.254.Based on the Host1 ARP table that is shown in the exhibit,what will Host1do?A.Send a unicast ARP packet to the DSL modem/routerB.Send unicast ICMP packets to the DSL modem/routerC.Send Layer3broadcast packets to which the DSL modem/router respondsD.Send a Layer2broadcast that is received by Host2,the switch,and the DSL modem/router Answer:B30Which spread spectrum technology does the802.11b standard define for operation?A.IRB.DSSSC.FHSSD.DSSS and FHSSE.IR,FHSS,and DSSSAnswer:B31Refer to the exhibit.Assume that all router interfaces are operational and correctly configured.In addition,assume that OSPF has been correctly configured on router R2.How will the default route configured on R1affect the operation of R2?A.Any packet destined for a network that is not directly connected to router R1will be dropped.B.Any packet destined for a network that is not directly connected to router R2will be dropped immediately.C.Any packet destined for a network that is not directly connected to router R2will be dropped immediately because of the lack of a gateway on R1.D.The networks directly connected to router R2will not be able to communicate with the172.16.100.0, 172.16.100.128,and172.16.100.64subnetworks.E.Any packet destined for a network that is not referenced in the routing table of router R2will be directed to R1.R1will then send that packet back to R2and a routing loop will occur.Answer:E32A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network.From this statement,what is known about the network interface port?A.This is a10Mb/s switch port.B.This is a100Mb/s switch port.C.This is an Ethernet port operating at half duplex.D.This is an Ethernet port operating at full duplex.E.This is a port on a network interface card in a PC.Answer:C33Refer to the topology and router configuration shown in the graphic.A host on the LAN is accessing an FTP server across the Internet.Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server?A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18Answer:D34What is the purpose of the Cisco VLAN Trunking Protocol?A.To allow traffic to be carried from multiple VLANs over a single link between switchesB.To allow native VLAN information to be carried over a trunk linkC.To allow for managing the additions,deletions,and changes of VLANs between switchesD.To provide a mechanism to manually assign VLAN membership to switch portsE.To provide a mechanism to dynamically assign VLAN membership to switch portsAnswer:C35Which two statements describe the Cisco implementation of VLANs?(Choose two.)A.VLAN1is the default Ethernet VLAN.B.CDP advertisements are only sent on VLAN1002.C.By default,the switch IP address is in VLAN1005.D.VLANs1002through1005are automatically created and cannot be deleted.Answer:A,D36Refer to the exhibit.What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN?(Choose two.)A.The number of collision domains would remain the same.B.The number of collision domains would decrease.C.The number of collision domains would increase.D.The number of broadcast domains would remain the same.E.The number of broadcast domains would decrease.F.The number of broadcast domains would increase.Answer:C,D37Three access points have been installed and configured to cover a small office.What term defines thewireless topology?A.BSSB.IBSSC.ESSD.SSIDAnswer:C38A TCP/IP transfer is diagrammed in the exhibit.A window size of three has been negotiated for this transfer.Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?A.Send ACK1-3B.Send ACK3C.Send ACK4D.Send ACK4-6E.Send ACK6F.Send ACK7Answer:C39Which two statements are true based the output of the show frame-relay lmi command issued on the Branch router?(Choose two.)A.LMI messages are being sent on DLCI0.B.LMI messages are being sent on DLCI1023.C.Interface Serial0/0is not configured to encapsulate Frame Relay.D.The Frame Relay switch is not responding to LMI requests from the router.E.The LMI exchange between the router and Frame Relay switch is functioning properly.F.The router is providing a clock signal on Serial0/0on the circuit to the Frame Relay switch. Answer:A,D40.Refer to the graphic.A static route to the10.5.6.0/24network is to be configured on the HFD router. Which commands will accomplish this?(Choose two.)A.HFD(config)#ip route10.5.6.00.0.0.255fa0/0B.HFD(config)#ip route10.5.6.00.0.0.25510.5.4.6C.HFD(config)#ip route10.5.6.0255.255.255.0fa0/0D.HFD(config)#ip route10.5.6.0255.255.255.010.5.4.6E.HFD(config)#ip route10.5.4.60.0.0.25510.5.6.0F.HFD(config)#ip route10.5.4.6255.255.255.010.5.6.0Answer:CD41.What should be done prior to backing up an IOS image to a TFTP server?(Choose three.)A.Make sure that the server can be reached across the network.B.Check that authentication for TFTP access to the server is set.C.Assure that the network server has adequate space for the IOS image.D.Verify file naming and path requirements.E.Make sure that the server can store binary files.F.Adjust the TCP window size to speed up the transfer.Answer:ACD42.What are the possible trunking modes for a switch port?(Choose three.)A.transparentB.autoC.onD.desirableE.clientF.forwardingAnswer:BCD43.The network172.25.0.0has been divided into eight equal subnets.Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?(Choose three.)A.172.25.78.243B.172.25.98.16C.172.25.72.0D.172.25.94.255E.172.25.96.17F.172.25.100.16Answer:ACD44.Refer to the graphic.Host1cannot receive packets from Host2.Assuming that RIP v1is the routing protocol in use,what is wrong with the IP configuration information shown?(Choose two.)A.The fa0/1interface of router R2has been assigned a broadcast address.B.The fa0/1network on router R2overlaps with the LAN attached to R1.C.Host2has been assigned the incorrect subnet mask.D.Host1has been configured with the255.255.248.0subnet mask.E.Host2on router R2is on a different subnet than its gateway.Answer:BC45.What are three valid reasons to assign ports to VLANs on a switch?(Choose three.)A.to make VTP easier to implementB.to isolate broadcast trafficC.to increase the size of the collision domainD.to allow more devices to connect to the networkE.to logically group hosts according to functionF.to increase network securityAnswer:BEF46.Refer to the topology shown in the exhibit.Which ports will be STP designated ports if all the links areoperating at the same bandwidth?(Choose three.)A.Switch A-Fa0/0B.Switch A-Fa0/1C.Switch B-Fa0/0D.Switch B-Fa0/1E.Switch C-Fa0/0F.Switch C-Fa0/1Answer:BCD47.Which statements describe two of the benefits of VLAN Trunking Protocol?(Choosetwo.)A.VTP allows routing between VLANs.B.VTP allows a single switch port to carry information to more than one VLAN.C.VTP allows physically redundant links while preventing switching loops.D.VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E.VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F.VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain. Answer:DE48What are two results of entering the Switch(config)#vtp mode client command on a Catalyst switch?(Choose two.)A.The switch will ignore VTP summary advertisements.B.The switch will forward VTP summary advertisements.C.The switch will process VTP summary advertisementsD.The switch will originate VTP summary advertisements.E.The switch will create,modify and delete VLANs for the entire VTP domain.Answer:BC49.A network administrator issues the ping192.168.2.5command and successfully tests connectivity to a host that has been newly connected to the network.Which protocols were used during the test? (Choose two.)A.ARPB.CDPC.DHCPD.DNSE.ICMPAnswer:AE50.Refer to the exhibit.Host A is to send data to Host B.How will Router1handle the data frame received from Host A?(Choose three.)A.Router1will strip off the source MAC address and replace it with the MAC address on the forwardingFastEthernet interface.B.Router1will strip off the source IP address and replace it with the IP address on the forwarding FastEthernetinterface.C.Router1will strip off the destination MAC address and replace it with the MAC address of Host B.D.Router1will strip off the destination IP address and replace it with the IP address of Host B.E.Router1will forward the data frame out interface FastEthernet0/1.F.Router1will forward the data frame out interface FastEthernet0/2.Answer:ACF51.Refer to the exhibit.What will Router1do when it receives the data frame shown?(Choose three.)A.Router1will strip off the source MAC address and replace it with the MAC address0000.0c36.6965.B.Router1will strip off the source IP address and replace it with the IP address192.168.40.1.C.Router1will strip off the destination MAC address and replace it with the MAC address0000.0c07.4320.D.Router1will strip off the destination IP address and replace it with the IP address of192.168.40.1.E.Router1will forward the data packet out interface FastEthernet0/1.F.Router1will forward the data packet out interface FastEthernet0/2.Answer:ACF52.Refer to the exhibit.Host A pings Host B.What source MAC address and source IP address are contained in the frame as the frame leaves R2destined for host B?A.abcd.abcd.a001B.abcd.abcd.b002C.abcd.abcd.c003D.10.2.0.15E.10.0.64.1F.10.0.128.15Answer:BD53.Refer to the exhibit.A network associate has configured OSPF with the command:City(config-router)#network192.168.12.640.0.0.63area0After completing the configuration,the associate discovers that not all the interfaces are participating in OSPF.Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement?(Choose three.)A.FastEthernet0/0B.FastEthernet0/1C.Serial0/0D.Serial0/1.102E.Serial0/1.103F.Serial0/1.104Answer:BCD54.A Catalyst2950needs to be reconfigured.What steps will ensure that the old configuration is erased?(Choose three.)A.Erase flash.B.Restart the switch.C.Delete the VLAN database.D.Erase the runnin configuration.E.Erase the startup configuration.F.Modify the configurationregister.Answer:BCE55.Refer to the exhibit.The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server.The Accounting1,CEO,Mgr1,and Mgr2workstations should be the only computers with access to the Payroll Server.What two technologies should be implemented to help prevent unauthorized access to the server?(Choose two.)A.access listsB.encrypted router passwordsC.STPD.VLANsE.VTPF.wireless LANsAnswer:AD56.Refer to the exhibit.What commands must be configured on the2950switch and the router to allow communication between host1and host2?(Choose two.)A.Router(config)#interface fastethernet0/0Router(config-if)#ip address192.168.1.1255.255.255.0Router(config-if)#no shut downB.Router(config)#interface fastethernet0/0Router(config-if)#no shut downRouter(config)#interface fastethernet0/0.1Router(config-subif)#encapsulation dot1q10Router(config-subif)#ip address192.168.10.1255.255.255.0Router(config)#interface fastethernet0/0.2Router(config-subif)#encapsulation dot1q20Router(config-subif)#ip address192.168.20.1255.255.255.0C.Router(config)#router eigrp100Router(config-router)#network192.168.10.0Router(config-router)#network192.168.20.0D.Switch1(config)#vlan databaseSwitch1(config-vlan)#vtp domain XYZSwitch1(config-vlan)#vtp serverE.Switch1(config)#interface fastethernet0/1Switch1(config-if)#switchport mode trunkF.Switch1(config)#interface vlan1Switch1(config-if)#ip default-gateway192.168.1.1Answer:BE57.Which three Layer2encapsulation types would be used on a WAN rather than a LAN?(Choose three.)A.HDLCB.EthernetC.Token RingD.PPPE.FDDIF.Frame RelayAnswer:ADF58.Refer to the exhibit.The two connected ports on the switch are not turning orange or green.What would be the most effective steps to troubleshoot this physical layer problem?(Choose three.)A.Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.B.Ensure that cables A and B are straight-through cables.C.Ensure cable A plugged into a trunk port.D.Ensure the switch has power.E.Reboot all of the devices.F.Reseat all cables.Answer:BDF59.What can be determined from the line of show ip route output shown in the exhibit?(Choose two.)A.The next routing update can be expected in35seconds.B.The IP address10.10.10.6is configured on S0/1.C.The IP address10.10.10.8is configured on S0/1.D.This route is using the default administrative distance.E.The10.10.10.8network is two hops away from this router.Answer:DE60.Refer to the exhibit.All of the routers in the network are configured with the ip subnet-zero command.Which network addresses should be used for Link A and Network A?(Choose two.)work A-172.16.3.48/26work A-172.16.3.128/25work A-172.16.3.192/26D.Link A-172.16.3.0/30E.Link A-172.16.3.40/30F.Link A-172.16.3.112/30Answer:BD61.Which two subnetworks would be included in the summarized address of172.31.80.0/20? (Choose two.)A.172.31.17.4/30B.172.31.51.16/30C.172.31.64.0/18D.172.31.80.0/22E.172.31.92.0/22F.172.31.192.0/18Answer:DE62.The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning.It has been replaced with a Cisco Catalyst 2950series switch.What must be done to ensure that this new switch becomes the root bridge on the network?A.Lower the bridge prioritynumber.B.Change the MAC address of the switch.C.Increase the VTP revision number for the domain.D.Lower the root path cost on the switch ports.E.Assign the switch an IP address with the lowestvalue.Answer:A63.Refer to the exhibit.Assume that all of the router interfaces are operational and configured correctly.How will router R2be affected by the configuration of R1that is shown in the exhibit?A.Router R2will not form a neighbor relationship with R1.B.Router R2will obtain a full routing table,including a default route,from R1.C.R2will obtain OSPF updates from R1,but will not obtain a default route from R1.D.R2will not have a route for the directly connected serial network,but all other directly connected networks will be present,as well as the two Ethernet networks connected to R1.Answer:D64.Which three IP addresses can be assigned to hosts if the subnet mask is/27and subnet zero is usable? (Choose three.)A.10.15.32.17B.17.15.66.128C.66.55.128.1D.135.1.64.34E.129.33.192.192F.192.168.5.63Answer:ACD65.Refer to the exhibit.A packet with a source IP address of192.168.2.4and a destination IP address of 10.1.1.4arrives at the HokesB router.What action does the router take?A.forwards the received packet out the Serial0/0interfaceB.forwards a packet containing an EIGRP advertisement out the Serial0/1interfaceC.forwards a packet containing an ICMP message out the FastEthernet0/0interfaceD.forwards a packet containing an ARP request out the FastEthernet0/1interfaceAnswer:C66.Refer to the exhibit.From RouterA,a network administrator is able to ping the serial interface of RouterB but unable to ping any of the subnets attached to RouterB.Based on the partial outputs in the exhibit,what could be the problem?。
ccna考试题库最新版

ccna考试题库最新版CCNA(Cisco Certified Network Associate)认证是全球范围内最受欢迎的网络工程师认证之一,具备CCNA认证可以证明一个人在建立、规划、运行、安装和配置中等规模的局域网和广域网方面的专业知识。
为了帮助广大考生顺利通过CCNA考试,不断更新的CCNA考试题库至关重要。
以下是最新版本的CCNA考试题库,希望对考生们有所帮助。
第一部分:网络基础知识1. 什么是OSI七层模型?简要介绍每一层的功能。
2. TCP和UDP之间有哪些区别?请分别举例说明。
3. 什么是IP地址?IP地址的类型有哪些?请列举并简要介绍各自的特点。
4. 什么是子网掩码?为什么在网络中使用子网掩码?5. 简述常见的网络设备有哪些,以及各自的功能与作用。
第二部分:路由和交换技术1. 路由器和交换机之间有何区别?请进行比较并指出各自的优势和劣势。
2. 什么是VLAN?VLAN的作用及在网络中的应用场景是什么?3. OSPF和EIGRP是两种常见的路由协议,请比较它们的特点并举例说明。
4. 请解释静态路由和动态路由的概念以及在网络中的应用。
5. 交换机在网络中扮演什么角色?交换机的MAC地址表是如何工作的?第三部分:网络安全和管理1. 网络安全的重要性是什么?请列举几种常见的网络安全威胁并介绍应对策略。
2. 什么是ACL(访问控制列表)?ACL的作用是什么?请给出一个ACL的配置示例。
3. VPN是什么?VPN的工作原理及在企业网络中的应用。
4. SNMP是网络管理中常用的协议,它的作用是什么?请解释SNMP中的几个重要概念。
5. 如何保护无线网络的安全?请列举几种方法。
第四部分:WAN技术1. 什么是WAN?WAN的主要特点是什么?2. PPP协议和HDLC协议分别是什么?请比较它们的异同。
3. 什么是Frame Relay?Frame Relay的工作原理及在WAN中的应用。
4. 请解释T1和E1的概念,以及它们在传输速率和应用方面的差异。
2023年CCNA考试真题

2023年CCNA考试真题2023年CCNA考试正式开考啦!本次考试涉及网络技术的基础知识,将对考生的技术水平进行全面考察。
下面是本次考试的真题,希望能够帮助考生更好地复习。
【第一部分:选择题】(共10题,每题2分,共计20分)1. OSI模型中,位于网络层的协议是:A. TCPB. IPC. HTTPD. UDP2. 下面哪个命令可以查看路由表信息:A. pingB. tracertC. ipconfigD. route print3. 在IP地址192.168.0.1/24中,/24表示什么意思:A. 子网掩码B. 路由器IP地址C. 网络IDD. 主机ID4. 下面哪个协议可以实现主机与交换机之间的通信:A. BGPB. ARPC. MPLSD. SNMP5. 下面哪个命令可以查看IP地址的连通性:A. telnetB. netstatC. pingD. tracert6. VLAN是指:A. 虚拟本地区域网络B. 可视化局域网C. 个人局域网D. 无线局域网7. 下面哪个设备可以实现不同局域网之间的互联:A. 集线器B. 路由器C. 交换机D. 网桥8. 下面哪个协议负责在网络中寻找设备的物理地址:A. ARPB. ICMPC. OSPFD. BGP9. 下面哪个命令可以查看交换机的端口信息:A. show ip interface briefB. show mac-address-tableC. show running-configD. show version10. 下面哪个协议可以实现安全的远程登录:A. FTPB. HTTPC. SSHD. Telnet【第二部分:填空题】(共5题,每题4分,共计20分)1. 在OSI模型中,位于物理层的设备是_________。
2. 在TCP/IP协议族中,位于传输层的协议是_________。
3. IP地址由_________位二进制数组成。
ccna中文试题及详解

1.对于MSFC(多层交换功能卡)的说法不正确的是A. MSFC只能运行IOS系统B. MSFC可运行IOS系统,或者CatOS系统C. 如果交换机管理引擎(Supervisor Engine)上运行的是CatOS系统,则所安装的MSFC必须D. 在管理引擎和MSFC上可同时运行IOS系统2. ROMmon模式恢复丢失映象的IOS交换机中,用来加载新的启动映射的命令是A. boot bootflash:B. boot system flash bootflash:C. boot tftp:D. copy tftp flash:3.现要把一个cisco交换机端口添加到多个VLAN中,则需要把该端口设置成()模式A. access portB. trunk portC. routed portD. tunnel port4.如下图所示的网络拓扑结构中,cisco交换机4的根路径开销(Root Path Cost)为A. 4B. 19C. 23D. 275.下面关于端口属性的说法不正确的是A. 快速以太网(10/100 Mbps)端口支持10 Mbps或者100 Mbps速率和所有双工选项B. 仅工作在1000 Mbps的千兆以太网端口不支持半双工模式C. 100BASE-x 和1000BASE-x SFP模块端口支持所有双工选项,但不支持速率自动协商D. 不能为10G以太网端口配置速率和双工模式6.有两台交换机想要通过两个普通RJ-45交换端口实现级联,并且支持直通和交叉电缆,则下面()配置步骤描述是不正确的A. 要在相连的两端口上分别配置auto-MDIX设置B. 可只在相连的任一端口上配置auto-MDIX设置C. 在启用auto-MDIX功能后,必须设置接口速率和双工模式为“auto”(自动)D. 不能使用1000BASE-SX /-LX SFP模块端口,但可使用10/100/1000BASE-TX SFP模块端口7.下面()不是Cisco设备VLAN间路由的可选方案A. 网关B. RSMC. RSFCD. 路由器8.下面是在Cisco交换机上一个把gigabitethernet0/1接口添加到VLAN 10的配置步骤,但其中少了关键的一步。
ccna1_6测试真题

1What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up t255.255.0.0255.255.255.0255.255.254.0255.255.248.02W hich IPv4 subnetted addresses represent valid host addresses? (Choose three.)172.16.4.127 /26172.16.4.155 /26172.16.4.193 /26172.16.4.95 /27172.16.4.159 /27172.16.4.207 /273Which statements are true regarding IP addressing? (Choose two.)NAT translates public addresses to private addresses destined for the Internet.Only one company is allowed to use a specific private network address space.Private addresses are blocked from public Internet by router.Network 172.32.0.0 is part of the private address space.IP address 127.0.0.1 can be used for a host to direct traffic to itself.4W hich process do routers use to determine the subnet network address based upon a given IP address and subnet mask?binary addinghexadecimal andingbinary divisionbinary multiplicationbinary ANDing5Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configu host is shown in the exhibit. What could be the cause of the problem?The host subnet mask is incorrect.The default gateway is a network address.The default gateway is a broadcast address.The default gateway is on a different subnet from the host.6Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0 range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use th for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assign usable host address and the workgroup server is given the last usable host address. Which configuration should be entere workgroup server's properties to allow connectivity to the network?IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.39IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.33IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.31IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.17Which three IP addresses are private? (Choose three.)172.168.33.110.35.66.70192.168.99.5172.18.88.90192.33.55.89172.35.16.58G iven the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this addreThis is a useable host address.This is a broadcast address.This is a network address.This is not a valid address.9How many bits make up an IPv4 address?12864483210W hat three facts are true about the network portion of an IPv4 address? (Choose three.)identifies an individual deviceis identical for all hosts in a broadcast domainis altered as packet is forwardedvaries in lengthis used to forward packetsuses flat addressing11Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)LAN workstationsserversnetwork printersroutersremote workstationslaptops12W hich of the following are features of IPv6? (Choose three.)larger address spacefaster routing protocolsdata types and classes of serviceauthentication and encryptionimproved host naming conventionssame addressing scheme as IPv413Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic./24/16/20/27/25/2814W hat two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is se away? (Choose two.)The router will discard the packet.The router will decrement the TTL value and forward the packet to the next router on the path to the destination hostThe router will send a time exceeded message to the source host.The router will increment the TTL value and forward the packet to the next router on the path to the destination host.The router will send an ICMP Redirect Message to the source host.15Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?The IP settings are not properly configured on the host.Internet Protocol is not properly installed on the host.There is a problem at the physical or data link layer.The default gateway device is not operating.A router on the path to the destination host has gone down.16What is the primary reason for development of IPv6?securityheader format simplificationexpanded addressing capabilitiesaddressing simplification17W hat is the network address of the host 172.25.67.99 /23 in binary?10101100. 00011001.01000011.0000000010101100. 00011001.01000011.1111111110101100. 00011001.01000010.0000000010101100. 00011001.01000010.0110001110101100. 00010001.01000011. 0110001010101100. 00011001.00000000.0000000018Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the serve connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?The router has an incorrect gateway.Host A has an overlapping network address.Host A has an incorrect default gateway configured.Host A has an incorrect subnet mask.NAT is required for the host A network.19W hat is a group of hosts called that have identical bit patterns in the high order bits of their addresses?an interneta networkan octeta radix20 A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnetaddress belong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160172.16.192.168172.16.192.17621Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 addre network that contains the serial link has already been addressed out of a separate range. Each network will be allocated t number of host addresses. Which network mask will be appropriate to address the remaining networks?255.255.255.248255.255.255.224255.255.255.192255.255.255.240255.255.255.128255.255.255.252。
ccna试题

ccna试题一、单选题1. 下面哪个是OSI模型的物理层?A. TCPB. IPC. EthernetD. HTTP答案:C2. 以下哪个是IPv6的全球未经分配地址?A. FC00::/7B. 2000::/3C. 8000::/4D. FFFF::/8答案:A3. 以下哪个在OSI模型的会话层工作?A. HTTPB. IPC. TCPD. NetBIOS答案:D二、多选题4. 下面哪些是用于路由器接口配置的命令?(选择两个)A. ip addressB. mac addressC. interfaceD. enable答案:A, C5. 下面哪些是IP协议的特点?(选择三个)A. 可靠传输B. 无连接C. 不可靠传输D. 面向连接答案:B, C, D6. 下面哪些是TCP的特点?(选择三个)A. 面向连接B. 可靠传输C. 无连接D. 面向字节流答案:A, B, D三、填空题7. TCP/IP协议族中,网络接口层对应的是__________。
答案:网络接口8. 在IPv6地址中,一个冒号表示__________。
答案:前缀和后缀之间的分隔符9. 在TCP连接终止过程中,主动关闭连接的一方发送的最后一个ACK分组中ACK标志位的值是__________。
答案:1四、解答题10. 请简要解释TCP/IP协议族中IP协议的作用。
答案:IP(Internet Protocol)协议是TCP/IP协议族中的一种网络层协议,主要负责在网络之间传输数据包。
它使用IP地址来标识网络上的设备,并通过路由选择算法实现数据包的正确传递。
IP协议是一种无连接的协议,不提供数据包的可靠传输,也不保证数据包按顺序到达目的地。
它使用IP头部来存储必要的控制信息,如源IP地址、目的IP地址、数据包长度等。
11. 请简要描述TCP三次握手的过程。
答案:TCP三次握手用于建立一个TCP连接。
过程如下:1. 客户端向服务器发送一个SYN(同步)分组,其中设置SYN标志位为1,并选择一个初始序列号。
ccna考试题及答案

ccna考试题及答案1. 以下哪项是网络层的功能?A. 路由选择B. 错误检测C. 流量控制D. 封装数据包答案:A2. 在OSI模型中,哪一层负责在网络中传输数据?A. 应用层B. 传输层C. 会话层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中发现网络设备的?A. ARPB. RARPC. ICMPD. OSPF答案:A4. 在TCP/IP模型中,哪一层与OSI模型的传输层相对应?A. 应用层B. 互联网层C. 网络接口层D. 传输层答案:D5. 以下哪个地址是一个有效的IPv4地址?A. 192.168.1.256B. 192.168.1.1C. 10.0.0.0D. 172.16.300.1答案:B6. 在配置路由器时,以下哪个命令用于进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B7. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show configD. show current-config答案:A8. 在Cisco设备上,以下哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. save startup-config答案:A9. 以下哪个命令用于在Cisco设备上查看所有接口的状态?A. show interfacesB. show ip interface briefC. show interface statusD. show running-config interface答案:B10. 在Cisco设备上,以下哪个命令用于关闭接口?A. shutdownB. no shutdownC. disableD. no enable答案:A11. 以下哪个命令用于在Cisco设备上启用接口?A. shutdownB. no shutdownC. disableD. no enable答案:B12. 在配置静态路由时,以下哪个命令用于指定下一跳地址?B. ip static-routeC. route ipD. static-route ip答案:A13. 以下哪个命令用于在Cisco设备上清除ARP表?A. clear arp-cacheB. clear arpC. clear arp tableD. clear ip arp答案:D14. 在配置动态路由协议时,以下哪个命令用于在接口上启用RIP?A. ip rip enableB. ip rip receiveD. network rip答案:C15. 以下哪个命令用于在Cisco设备上查看RIP路由表?A. show ip ripB. show ip route ripC. show ripD. show ip protocols答案:B16. 在配置EIGRP时,以下哪个命令用于指定自动汇总?A. metric weightsB. auto-summaryC. network auto-summaryD. no auto-summary答案:B17. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. show ip eigrp neighborsB. show eigrp neighborsC. show ip eigrpD. show eigrp interfaces答案:A18. 在配置OSPF时,以下哪个命令用于指定路由器ID?A. router-idB. router ospfC. networkD. area答案:A19. 以下哪个命令用于在Cisco设备上查看OSPF路由表?A. show ip ospfB. show ip ospf databaseC. show ospfD. show ip route ospf答案:D20. 在配置VLAN时,以下哪个命令用于创建一个新的VLAN?A. vlan databaseB. configure terminalC. vlan [vlan-id]D. new-vlan答案:C21. 以下哪个命令用于将接口分配给VLAN?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:C22. 在配置交换机时,以下哪个命令用于将接口设置为Trunk 模式?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:B23. 以下哪个命令用于在Cisco设备上查看VLAN配置?A. show vlanB. show vlan briefC. show vlan detailD. show vlan all答案:B24. 在配置VTP时,以下哪个命令用于将交换机设置为VTP服务器模式?A. vtp mode serverB. vtp mode clientC. vtp mode transparentD. vtp mode off答案:A25. 以下哪个命令用于在Cisco设备上查看VTP状态?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A26. 在配置STP时,以下哪个命令用于设置根桥?A. spanning-tree root primaryB. spanning-tree root secondaryC. spanning-tree root primary [priority]D. spanning-tree root secondary [priority]答案:C27. 以下哪个命令用于在Cisco设备上查看STP状态?A. show spanning-treeB. show spanning-tree detailC. show spanning-tree summaryD. show spanning-tree interface答案:A28. 在配置VLAN Trunking Protocol (VTP) 时,以下哪个命令用于设置VTP域名?A. vtp domain [domain-name]B. vtp password [password]C. vtp mode [mode]D. vtp version [version]答案:A29. 以下哪个命令用于在Cisco设备上查看当前的VTP版本?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A30. 在配置端口安全时,以下哪个命令用于限制接口上可以学习到的最大MAC地址数量?A. switchport port-security maximum [mac-count]B. port-security maximum [mac-count]C. switchport port-security violation restrictD. port-security violation shutdown答案:A这些题目和答案仅供学习和参考之用,实际的CCNA考试内容和形式可能会有所不同。
CCNA最新中文版题库第二学期第四单元

1 下列哪两项正确描述了管理距离与度量的概念?(选择两项。
)管理距离是指特定路由的可信度。
理距离是指特定路由的可信度。
路由器会首先添加具有较大管理距离的路由。
由器会首先添加具有较大管理距离的路由。
网络管理员无法更改管理距离的值。
络管理员无法更改管理距离的值。
具有到目的地的最小度量的路由即为最佳路径。
有到目的地的最小度量的路由即为最佳路径。
度量总是根据跳数确定。
量总是根据跳数确定。
度量会根据所采用的第量会根据所采用的第 3 层协议(如层协议(如 IP 或 IPX )而发生变化。
)而发生变化。
2 下列关于无类路由协议的陈述,哪两项是正确的?(选择两项。
)在路由更新中发送子网掩码信息路由更新中发送子网掩码信息将完整的路由表更新发送给所有邻居完整的路由表更新发送给所有邻居受 RIP 第 1 版支持版支持允许在同一拓扑结构中同时使用许在同一拓扑结构中同时使用 192.168.1.0/30 和 192.168.1.16/28 子网子网减少组织中可用地址空间的大小少组织中可用地址空间的大小3 关于使用静态路由的优点,下列哪两项描述正确?(选择两项。
)安全性更高全性更高配置路由的工作量更少置路由的工作量更少管理员保持对路由的控制理员保持对路由的控制在不断扩展的网络中更容易实施不断扩展的网络中更容易实施降低了路由出错的几率低了路由出错的几率提高了路由资源的使用率高了路由资源的使用率4请参见图示。
如果路由协议为请参见图示。
如果路由协议为 RIP ,那么从路由器,那么从路由器 A 到网络到网络 192.168.5.0/24 的度量值是多少?的度量值是多少? 3 4 56 624 724 5都运行 EIGRP。
所有接口都正常运行,并且数据包能在所有网络之间转发。
在Router1 请参见图示。
Router1 和Router2 都运行的路由表中可找到下列哪一项信息?的路由表中可找到下列哪一项信息?R outer1 有6 个直连网络。
CCNA认证基础试卷A

1CCNA 认证基础 考卷(A 卷)考试时间 年 月 日(120分钟) 课程 CCNA 认证基础 教师签名_____一、选择题(每题2分,共30分)二、名词解释(每题2分,共10分)三、简单题(每题15分,共60分)1、答:2、答:3、答4、答:一、填空(每空2分,共20分)1如图所示,路由器A和B已经配置使用RIP作为动态路由协议,且路由器A和B上的所有接口都报告“interface is up, line protocol is up”。
现在使用下面的命令在路由器C上配置RIP:RouterC(config)# router ripRouterC(config-router)# network 192.168.4.0RouterC(config-router)# network 172.16.0.0如果路由器A,B,C上没有其它路由配置,那么当前配置导致的结果是?A 从路由器A上无法到达网络192.168.12.0/24,192.168.4.0/24和172.16.0.0/16。
B 路由器A无法学习到网络192.168.12.0/24,但是会有到192.168.4.0/24和172.16.0.0/16的路由。
C 路由器A,B,C都可以到达图中所显示的所有网络。
D 从路由器A和路由器B上无法到达网络192.168.4.0/24和172.16.0.0/16。
232路由器A 直接连接在图示的网络中,并且其上有一条默认路由指向路由器B 。
所有的接口都配置了恰当的IP 地址。
然而,当网络172.16.4.0/24中的工作站试图发送一个报文到目的地址172.16.201.5时,报文被路由器A 丢弃。
为什么会出现这样的结果? A 路由器A 上没有启用ip classless 命令。
B 路由器B 与路由器A 在不同的自治域中。
C 路由器A 和B 使用不同的路由协议。
D 路由器A 的路由表中没有包括地址172.16.201.5的路由。
CSNA笔试题库(含答案)

……………………………………………………………最新资料推荐…………………………………………………4.在Rip路由中设置管理距离是衡量一个路由可信度的等级,你可以通中星认证网络工程师CSNA理论试题题库一、单项选择题1.在R2624路由器发出的Ping命令中,“U”代表什么?A.数据包已经丢失B.遇到网络拥塞现象C.目的地不能到达D.成功地接收到一个回送应答2.IP地址是202.114.18.10,掩码是255.255.255.252,其广播地址是多少? 过定义管理距离来区别不同___来源。
路由器总是挑选具有最低管理距离的路由。
A.拓扑信息B.路由信息C.网络结构信息D.数据交换信息5.如何跟踪RIP路由更新的过程?A.show ip routeB.debug ip ripC.show ip ripD.clear ip route *A.202.114.18.255 6.配置了访问列表如下所示:access-list101 permit 192.168.0.0B.202.114.18.12C.202.114.18.11D.202.114.18.83.IP、Telnet、UDP分别是OSI参考模型的哪一层协议?A.1、2、3B.3、4、5C.4、5、6D.3、7、4 0.0.0.255 10.0.0.0 0.255.255.255最后缺省的规则是什么A.允许所有的数据报通过B.仅允许到10.0.0.0的数据报通过C.拒绝所有数据报通过D.仅允许到192.168.0.0的数据报通过7.以下那一项不是增加VLAN带来的好处?A.交换机不需要再配置B.机密数据可以得到保护C.广播可以得到控制第1页……………………………………………………………最新资料推荐…………………………………………………8.静态路由协议的默认管理距离是?;rip路由协议的默认管理距离是?A.1,140B.1,120C.2,140D.2,120 A.A类B.B类C.C类D.D类E.E类9.RIP的最大跳数是:13.在访问列表中,有一条规则如下:access-list131 permit ip anyA.24B.18C.15D.1210.Ethernet Hub的介质访问协议为?A.CSMA/CAB.Token-BusC.CSMA/CDD.Token-Ring11.IEEE802.1Q VLAN能支持的最大个数为?A.256B.1024C.2048D.4094192.168.10.0 0.0.0.255 eq ftp在该规则中,any的意思是表示:A.检察源地址的所有bit位B.检查目的地址的所有bit位C.允许所有的源地址D.允许255.255.255.255 0.0.0.014.标准访问控制列表的序列规则范围在A.1-10B.0-100C.1-99D.1-10015.访问列表是路由器的一种安全策略,你决定用一个标准ip访问列表来做安全控制,以下为标准访问列表的例子为:A.access-list standart 192.168.10.23B.access-list 10 deny 192.168.10.23 0.0.0.0C.access-list 101 deny 192.168.10.23 0.0.0.0……………………………………………………………最新资料推荐…………………………………………………12.192.108.192.0属于哪类IP地址?第2页D.access-list 101 deny 192.168.10.23 255.255.255.25516.交换机工作在OSI七层的哪一层?A.一层B.二层C.三层D.三层以上17.当RIP向相邻的路由器发送更新时,它使用多少秒为更新计时的时间值?A.30B.20C.15D.2518.IEEE的哪个标准定义了RSTP?A.IEEE802.3B.IEEE802.1C.IEEE802.1dD.IEEE802.1w19.如果子网掩码是255.255.255.128,主机地址为195.16.15.14,则在该子网掩码下最多可以容纳多少个主机?A.254B.126C.62D.3020.ip access-group {number} in这句话表示:A.指定接口上使其对输入该接口的数据流进行接入控制B.取消指定接口上使其对输入该接口的数据流进行接入控制C.指定接口上使其对输出该接口的数据流进行接入控制D.取消指定接口上使其对输出该接口的数据流进行接入控制21.IEEE802.1Q数据帧用多少位表示VID?A.10B.11C.12D.1422.S2126G交换机如何将接口设置为TAG VLAN模式?A.switchport mode tagB.switchport mode trunkC.trunk onD.set port trunk on23.在R2624路由器发出的Ping命令中,“!”代表什么?A.数据包已经丢失B.遇到网络拥塞现象C.目的地不能到达D.成功地接收到一个回送应答第3页B.MPEG24.如何在R2624路由器上测试到达目的端的路径?A.tracertB.pathpingC.tracerouteD.ping <IP address>25.下列哪些属于工作在OSI传输层以上的网络设备?A.集线器B.中继器C.交换机D.路由器E.网桥F.服务器26.190.188.192.100属于哪类IP地址?A.A类B.B类C.C类D.D类E.E类27.下列哪些是应用层的例子?A.ASCIIC.JPEGD.HTTP28.RIP对应的端口号是什么?A.25B.23C.520D.6929.建立TCP连接需要几个数据段?A.2B.3C.4D.130.校园网设计中常采用三层结构,S1908主要应用在哪一层?A.核心层B.分布层C.控制层D.接入层31.下列哪个应用既使用TCP又使用UDP?A.telnetB.DNS 第4页……………………………………………………………最新资料推荐…………………………………………………C.httpD.WINS32.对应OSI参考模型的网络层在TCP/IP定义叫什么名称?A.应用层B.网际层C.会话层D.传输层33.下列哪些属于RFC1918指定的私有地址?A.10.1.2.1B.224.106.9.10C.191.108.3.5D.172.33.10.934.下列哪些访问列表范围符合IP范围的扩展访问控制列表?A.1-99B.100-199C.800-899D.900-99935.如何跟踪RIP路由更新的过程?A.show ip routeB.debug ip ripC.show ip ripD.clear ip route *36.STP交换机缺省的优先级为:A.0B.1C.32767D.3276837.IP报文中,固定长度部分为多少字节?A.10B.20C.30D.4038.IEEE制定实现STP使用的是下列哪个标准?A.IEEE 802.1WB.IEEE 802.3ADC.IEEE 802.1DD.IEEE 802.1X39.下列哪些属于有类路由选择协议?A.RIPV1B.OSPFC.RIPV2D.静态路由第5页40.R2624路由器如何验证接口的ACL应用? D.系统加密A.show int B.show ip int C.show ip D.show access-list 44、设计网络时应控制冲突域的规模,使网段中的(化。
ccna考试题库301-350

QUESTION 301How many bits are contained in each field of an IPv6 address?A. 24B. 4C. 8D. 16QUESTION 302By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? (Choose two.)A. Create an additional ACL to block the access to VLAN 1.B. Move the management VLAN to something other than default.C. Move all ports to another VLAN and deactivate the default VLAN.D. Limit the access in the switch using port security configuration.E. Use static VLAN in trunks and access ports to restrict connections.F. Shutdown all unused ports in the Catalyst switch.QUESTION 303Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?A. BackboneFastB. UplinkFastC. Root GuardD. BPDU GuardE. BPDU FilterQUESTION 304Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?A. crossoverB. straight-throughC. rolledD. shielded twisted-pairQUESTION 305What is known as "one-to-nearest" addressing in IPv6?A. global unicastB. anycastC. multicastD. unspecified addressQUESTION 306Which option is a valid IPv6 address?A. 2001:0000:130F::099a::12aB. 2002:7654:A1AD:61:81AF:CCC1C. FEC0:ABCD:WXYZ:0067::2A4D. 2004:1:25A4:886F::1QUESTION 307Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?A. physicalB. data linkC. networkD. transportQUESTION 308Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?A. data linkB. networkC. transportD. presentationE. physicalQUESTION 309What is the principle reason to use a private IP address on an internal network?A. Subnet strategy for private companies.B. Manage and scale the growth of the internal network.C. Conserve public IP addresses so that we do not run out of them.D. Allow access reserved to the devices.QUESTION 310Which IP address can be assigned to an Internet interface?A. 10.180.48.224B. 9.255.255.10C. 192.168.20.223D. 172.16.200.18QUESTION 311What will happen if a private IP address is assigned to a public interface connected to an ISP?A. Addresses in a private range will be not routed on the Internet backbone.B. Only the ISP router will have the capability to access the public network.C. The NAT process will be used to translate this address in a valid IP address.D. Several automated methods will be necessary on the private network.E. A conflict of IP addresses happens, because other public routers can use the same range.QUESTION 312When is it necessary to use a public IP address on a routing interface?A. Connect a router on a local network.B. Connect a router to another router.C. Allow distribution of routes between networks.D. Translate a private IP address.E. Connect a network to the Internet.QUESTION 313What is the first 24 bits in a MAC address called?A. NICB. BIAC. OUID. VAIQUESTION 314In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)A. when they receive a special tokenB. when there is a carrierC. when they detect no other devices are sendingD. when the medium is idleE. when the server grants accessQUESTION 315Which term describes the process of encapsulating IPv6 packets inside IPv4 packets?A. tunnelingB. hashingC. routingD. NATQUESTION 316Which statement about RIPng is true?A. RIPng allows for routes with up to 30 hops.B. RIPng is enabled on each interface separately.C. RIPng uses broadcasts to exchange routes.D. There can be only one RIPng process per router.QUESTION 317Which statement about IPv6 is true?A. Addresses are not hierarchical and are assigned at random.B. Only one IPv6 address can exist on a given interface.C. There are 2.7 billion addresses available.D. Broadcasts have been eliminated and replaced with multicasts.QUESTION 318Which line from the output of the show ip interface command indicates a layer 1 problem?A. Serial0/1 is up, line protocol is downB. Serial0/1 is down, line protocol is downC. Serial0/1 is up, line protocol is upD. Serial0/1 is administratively down, line protocol is downQUESTION 319A network admin wants to know every hop the packets take when he accesses . Which command is the most appropriate to use?A. path B. debug C. trace D. traceroute QUESTION 320When a host transmits data across a network to another host, which process does the data go through?A. standardizationB. conversionC. encapsulationD. synchronizationQUESTION 321An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?A. RARPB. RUDPC. ICMPD. SNMPQUESTION 322Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?(choose two)A. SW1#show swithport port-security interface FastEthernet 0/12B. SW1# show swithport port-secure interface FastEthernet 0/12C. SW1# show port-secure interface FastEthernet 0/12D. SW1#show running-configQUESTION 323Which component of VPN technology ensures that data can be read only by its intended recipient?A. data integrityB. encryptionC. key exchangeD. authenticationQUESTION 324Refer to the exhibit.What is the effect of the configuration that is shown?A. It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B. It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.D. It configures the virtual terminal lines with the password 030752180500.E. It configures SSH globally for all logins.QUESTION 325Which of the following are true regarding the debug output shown in the graphic?(choose two)A. This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#version 2RtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0B. This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0C. Network 10.0.0.0 will be displayed in the routing table.D. Network 192.168.168.0 will be displayed in the routing table.E. This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 192.168.1.0RtrA(config-router)#network 10.0.0.0RtrA(config-router)#network 192.168.168.0F. split-horizon was disabled on this router.QUESTION 326The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?A. 10.10.0.0/18 subnetted with mask 255.255.255.252B. 10.10.0.0/25 subnetted with mask 255.255.255.252C. 10.10.0.0/24 subnetted with mask 255.255.255.252D. 10.10.0.0/23 subnetted with mask 255.255.255.252E. 10.10.0.0/16 subnetted with mask 255.255.255.252QUESTION 327VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?A. The command is accepted and the respective VLAN is added to vlan dat.B. The command is rejected.C. The command is accepted and you must configure the VLAN manually.D. The port turns amber.QUESTION 328Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?A. link bandwidthB. hop countC. link costD. administrative distanceE. link delayQUESTION 329Refer to the exhibit. In the Frame Relay network, which ip address would be assigned to the interfaces with point-to-poin PVCs?A. DLCI 16:192.168.10.1/24DLCI 17:192.168.10.2/24DLCI 99:192.168.10.3/24DLCI 28:192.168.10.4/24B. DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.11.2/24C. DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.12.1/24DLCI 28:192.168.13.1/24D. DLCI 16:192.168.10.1/24DLCI 17:192.168.10.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.10.3/24QUESTION 330Why will a switch never learn a broadcast address?A. Broadcast frames are never sent to swiches.B. Broadcast addresses use an incorrect format for the switching table.C. A broadcast address will never be the source address of a frame.D. Broadcasts only use network layer addressing.E. A broadcast frame is never forwarded by a switch.QUESTION 331Wich command can you use to manually assign a static IPV6 address to a router interface?A. ipv6 address PREFIX_1::1/64B. ipv6 autoconfig 2001:db8:2222:7272::72/64C. ipv6 autoconfigD. ipv6 address 2001:db8:2222:7272::72/64QUESTION 332The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?A. network 172.26.168.0 area 478B. network 172.26.0.0C. network 172.26.168.128 0.0.0.127D. network 172.26.168.128 area 478QUESTION 333Which IPsec security protocol should be used when confidentiality is required?A. AHB. MD5C. PSKD. ESPQUESTION 334What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?A. It designates VLAN 999 for untagged traffic.B. It blocks VLAN 999 traffic from passing on the trunk.C. It creates a VLAN 999 interface.D. It designates VLAN 999 as the default for all unkown tagged traffic.QUESTION 335Which command can be used from a PC to verfy the connectivity between host that connect throy?A. tracert addressB. ping addressC. arp addressD. traceroute addressQUESTION 336In which solution is a router ACL used?A. protecting a server frome unauthorized accesB. controlling path selection,based on the route metricC. reducing router CPU utilizationD. filterring packets that are passing through a routerQUESTION 337Which statement is true, as relates to classful or classless routing?A. RIPV1 and OSPF are classless routing protocols.B. Classful routing protocols send the subnet mask in routing updates.C. Automatic summarization at classful boundaries can cause problems on discontinuous subnets.D. EIGRP and OSPF are classful routing protocols and summarize routes by defaultQUESTION 338A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How can you accomplish this task,using the fewest physical interfaces and without decreasing network performance?A. Add two more FastEthernet interfaces.B. Add a second router to handle the vlan traffic.C. Use a hub to connect the four vlans with a FastEthernet interface on router.D. Implement a router-on-a-stick configuration.QUESTION 339Refer to the exhibit.How many broadcast domains are configured on switch2?A. 5B. 20C. 4D. 1QUESTION 340What is the effect of using the service password-encryption command?A. Only passwords configured after the command has been entered will be encrypted.B. Only the enable password will be encrypted.C. Only the enable secret password will be encryptedD. It will encrypt the secret password and remove the enable secret password from the configuration.E. It will encrypt all current and future passwords.QUESTION 341Refer to the exhibit.A technician has installed SwithchB and needs to configure it for remote access from the management workstation connected SwitchA Which set of commands is required to accomplish this task?A. SwitchB(config)#interface FastEthernet 0/1SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdownB. SwitchB(config)#ip default-gateway 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdownC. SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0 SwitchB(config)#no shutdownD. SwitchB(config)#ip default-network 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdownQUESTION 342Refer to the exhibit.The speed of all serial links is E1 and the speed of the all Ethernet links is 100Mb/s.A static route will be established on the Manchester router to the direct traffic toward the internet over the most direct path available.What configuration on the Manchester router will establish a router toward the internet for traffic that originates from workstation on the Manchester LAN?A. ip route 0.0.0.0 255.255.255.0 172.16.100.2B. ip route 0.0.0.0 255.255.255.252 128.107.1.1C. ip route 0.0.0.0 0.0.0.0 128.107.1.1D. ip route 0.0.0.0 0.0.0.0 172.16.100.1E. ip route 0.0.0.0 255.255.255.255 172.16.100.2F. ip route 0.0.0.0 0.0.0.0 172.16.100.2QUESTION 343What Frame Relay mechanism is used to build the map illustrated in the accompanying graphic?A. inverse multiplexingB. LMI mapingC. Inverse ARPD. ARPE. Proxy ARPQUESTION 344Refer to the exhibit.A network engineer is troubleshooting an internet connectivity problem on the computer.What is causing the problem?A. wrong DNS serverB. wrong default gatewayC. incorrect IP addressD. incorrect subnet maskQUESTION 345How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?A. oneB. sixC. twelveD. twoQUESTION 346How dose a DHCP server dynamically assign IP address to host?A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.B. Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address must be made ,and another address is then assigned.C. Addresses are leased to host.A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.D. Addresses are permanently assigned so that the host uses the same address at all times.QUESTION 347Which type of EIGRP route entry describes a feasible successor?A. a primary route,stored in the routing tableB. a backup route,stored in the routing tableC. a backup route,stored in the topology tableD. a primary route,stored in the topology tableQUESTION 348What is the purpose of the inverse ARP?A. to map a known DLCI to an IP addressB. to map a known IP address to a MAC addressC. to map known SPID to a MACaddressD. to map a known DLCI to a MAC addressE. to map a known IP address to a SPID.F. to map a known MAC address to an IP addressQUESTION 349What is the default maximum number of equal-cost paths that can be placed into the routing of a cisco OSPF router?A. 16B. 2C. unlimitedD. 4QUESTION 350Which IPV6 routing protocol uses multicast group FF02::9 to send updates?A. RIPngB. OSPFv3C. staticD. IS-IS for IPv6。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
最新CCNA认证考试真题小编为大家收集整理了《最新CCNA认证考试真题》供大家参考,希望对大家有所帮助!!!(1)TCP/IP Addressing and Protocol1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?A. 255.0.0.0B. 255.255.0.0C. 255.245.255.0D. 255.255.255.0E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?A. TCPB. UDPC. IPD. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?A. 255.255.0.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?A. 172.16.12.33/28B. 172.16.12.32/27C. 172.16.12.33/27D. 172.16.12.34/27E. 172.16.12.35/28F. 172.16.12.38/28G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A.172.16.176.0–255.255.240.0B. 172.16.192.0–255.255.240.0C. 172.16.208.0–255.255.240.0D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants toknow how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?A. One network with 254 hostsB. Two networks with 128 hostsC. Four networks with 64 hostsD. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)A. 201.168.27.33B. 201.168.27.112C. 201.168.27.119D. 201.168.27.126E. 201.168.27.175F. 201.168.27.208 9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?A. 201.100.5.0B. 201.100.5.32C. 201.100.5.64D. 201.100.5.65E. 201.100.5.31F. 201.100.5.1 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?A. TCPB. IPC. UDPD. IPXE. Frame relay 11: Which of the following protocols is connection-oriented? A. TCPB. IPC. IPXD. Frame relay 12: You are using an application on your Windows 2000 client machines that provides errorcorrection. You need a protocol to provide fast transport. Which protocol should your application use?A. TCPB. IPC. UDPD. SPXE. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.A. MTU adjustmentB. WindowingC. Flexible Send PathD. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information?A. The ACK received will not include the segment number that was not received.B. The ACK received will include the segment number that was not received.C. The sending host will send a PACK to verify segment receipt.D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?A. Class AB. Class BC. Class CD. Class DE. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)A. 10.23.45.67B. 126.21.34.56C. 172.16.32.1D. 172.31.234.55E. 192.169.4.5 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?Department Number of Users Corporate 7 Customer Support 15 Financial 13 HR 7 Engineering 16 A. 255.255.255.0B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correctioncapabilities of the application itself?A. UDPB. TCPC. SNMPD. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)A. MAC address resolutionB. Sequence numbersC. AcknowledgmentsD. PingE. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?A. Increased throughputB. Decreased throughputC. Increased latencyD. Decreased reliability21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.224E. 255.255.255.240F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?A. ARPB. RARPC. SLARPD. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?A. The host's default gateway is down.B. The destination host is not powered on.C. The IP address of the router interface is incorrect.D. The IP address of the switch to which the destination host connects is incorrect.E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting?A. Class AB. Class BC. Class CD. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork.B. It represents the number of subnetworks that are being used.C. It represents the class of IP address being used.D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.224E. 255.255.255.240 27: Which of the following would a Class A network be assigned to?A. Government agencyB. Small-to-medium sized corporationC. SOHOD. An individual 28: A client has the IP address192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)A. 192.168.5.95B. 192.168.5.100C. 192.168.5.128D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet?A. 2.3.4.5B. 11.12.13.14C. 165.23.224.2D. 172.31.45.34E. 203.33.45.22 30: You are given a Class B network. Whatis the default subnet mask assigned to the Class B network?A. 255.255.255.255B. 255.255.0.0D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address?A. Class C addresses cannot be assigned to Ethernet interfaces.B. The /27 is an invalid mask.C. It is a broadcast address.D. It is a public IP address.E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?A. 255.255.255.254C. 255.255.240.254D. 255.255.0.0 33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of255.255.255.248?A. 192.168.2.24/192.168.2.31B. 192.168.2.32/192.168.2.39C. 192.168.2.40/192.168.2.47D. 192.168.2.48/192.168.2.55E. 192.168.2.56/192.168.2.63 34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?A. 218B. 219C. 220D. 221E. 222 35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?A. 75B. 83C. 90D. 97 36: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?A. 198B. 214C. 252D. 255 37: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?A. 182B. 192C. 202D. 212 38: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.192 39: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?A. 62 networks and 2 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 16 networks and 14 hosts 40: What is a disadvantage of using a connection-oriented protocol such as TCP?A. Packet acknowledgment might add overhead.B. Packets are not tagged with sequence numbers.C. Loss or duplication of data packets is more likely to occur.D. The application layer must assume responsibility for the correct sequencing of the data packets. 41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?A. 62 networks and 2 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 14 networks and 14 hosts 42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)A. 165.203.2.0B. 165.203.5.192C. 165.203.6.63D. 165.203.6.191E. 165.203.8.255 43: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)A. 192.168.32.33B. 192.168.32.112C. 192.168.32.119D. 192.168.32.126E. 192.168.32.175F. 192.168.32.208 44: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?A. 198.57.78.33B. 198.57.78.64C. 198.57.78.97D. 198.57.78.97E. 198.57.78.159F. 198.57.78.254 45: What is the subnetwork address for a host with IP address 165.100.5.68/28?A. 165.100.5.0B. 165.100.5.32C. 165.100.5.64D. 165.100.5.65E. 165.100.5.31F. 165.100.5.1 46: Your boss wants to know what TCP stands for. What do you tell him?A. Transmission Check ProtocolB. Transport Check ProtocolC. Transmission Control ProtocolD. Transport Control Protocol 47: Your boss wants to know what UDP stands for. What do you tell him?A. Unreliable Data ProtocolB. Unreliable Data ProgramC. User-Defined ProtocolD. User Datagram Protocol 48: Which of the following statements accurately describes UDP?A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP). 49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)A. 10.20.12.64B. 172.16.32.129C. 172.64.32.34D. 192.168.23.252E. 196.104.12.95F. 214.192.48.254 50: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)A. Assign a public IP address.B. Use the shutdown command.C. Use the no shutdown command.D. Make sure the interface is running in full-duplex.(2)Basic IOS Configuration1: In which of the following modes in Cisco's IOS can you issue show commands? (Choose two.)A. UserB. PrivilegedC. Line ConfigurationD. Global Configuration 2: Yo u are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose two.)A. FTPB. TFTPC. SQLD. Oracle 3: You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?A. pingB. IPConfigC. tracerouteD. Show interface Ethernet 0 4: Which command would you use at the CLI in User mode to enter Privileged EXEC mode?A. PrivilegeB. AdminC. EnableD. Disable 5: You have just received 14 Catalyst switches for your network. You would like to install these switches into your production network to provide separate collision domains for each of the connected devices. What configuration is required to provide this functionality? A. No configuration is required.B. You must set up an IP address on the switch.C. You must configure unique VLANs on the switches.D. You must install the Cisco IOS. 6: Which of the following prompts indicates your router is in Privileged EXEC mode?A. Router>B. Router#C. Router&D. Router$ 7: You have made a console connection to your Cisco Catalyst switch and you see the > symbol in HyperTerminal. What does it mean?A. You are in Privileged EXEC mode.B. You are in User EXEC mode.C. The switch has not been configured.D. The switch is in need of repairs. 8: You would like to assign a meaningful name to your Catalyst switch. What command should you use?A. enableB. host nameC. hostnameD. name 9: You need to assign an IP address to your Catalyst 2950 switch. You are at the HQ_SW1> prompt. What is the correct series of commands? (cr = carriage return)A. enable ip address 10.1.1.1B. enable ip address 10.1.1.1 255.255.255.0C. enable configure terminal ip address 10.1.1.1255.255.255.0D. enable configure terminal interface vlan 1 ip address10.1.1.1 255.255.255.0 10: Which of the following commands displays the syntax for the clock command?A. cl?B. clock?C. clock ?D. cl ?11: Which of the following commands allows you to configure a welcoming message whenever you log in to a router?A. Router(config)# banner messageB. Router(config)# banner motd &C. Router# banner motd #D. Router# banner message ! 12: You need to connect to your 2621XM router to configure an interface. Which of the following methods allows you to connect to and issue commands on the router? (Choose three.) A. TelnetB. FTPC. Console connectionD. AUX connection 13: You want to prevent unauthorized users from plugging their laptops into the router. What type of password helps prevent this issue?A. vtyB. InterfaceC. ConsoleD. Enable 14: You have connected to the console port and are running HyperTerminal. You see only scrambled characters and symbols. What is the most likely solution to this problem?A. Change the connectors.B. Use a different Terminal program.C. Reset the router.D. Adjust the baud rate of your COM port.[View full size image] 15: Which of the following commands would you type to receive this output shown in the figure above?A. Show running-configB. Show startup-configC. Show ip routeD. Show version 16: You are configuring a router named East for authentication with a router named West using CHAP. What username should you configure on East to allow the routers to communicate?A. EastB. WestC. SouthD. North 17: What is the default point-to-point encapsulation protocol used on a Cisco router?A. PPPB. SLIPC. HDLCD. ATM 18: What type of handshake occurs with CHAP authentication?A. One-wayB. Two-wayC. Three-wayD. Mutual 19: You have connected to your Cisco router through a Telnet connection. To test one of your connections, you use a debug ip packet command. Even though you are sure traffic is passing through your router,nothing is reported in your terminal window. What is the most likely cause of this problem?A. There is no debug ip packet command.B. You need to type in the terminal monitor command to see debug output from a Telnet session.C. This command displays information only if the interface experiences trouble. No output indicates that the interface is fine.D. Cisco routers do not allow you to enable debug commands remotely due to security restrictions.[View full size image] 20: Which of the following commands would you type to see this output on your Cisco router shown in the previous figure?A. Show versionB. Show running-configC. Show startup-configD. Show router setup21: Which of the following commands would you type to see this output shown in the figure above?A. Show interface Ethernet 0/0B. Show ip interface detailC. Show interface Serial 0/1D. Show ip interface brief22: Your routers at ACME, Inc., are having someconnectivity issues. You issue show commands for each connecting router's interface. Why are they unable to communicate (see figures above)?A. Incorrect IP addressB. Wrong routing protocolC. Bad cableD. Encapsulation mismatch 23: You need to back up the configurations you just made, but no TFTP servers are available. Which of the following commands are options to back up your currently running configuration? (Choose two.)A. Router1#copy running-config startup-configB. Router1#copy running-config flashC. Router1#copy startup-config running-configD. Router1#copy running-config http 24: You are consulting a small business that is establishing its first WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose three.)A. Frame relayB. EthernetC. Token ringD. PPPE. HDLC 25: Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if he or she happens to view a configuration on your router. What command encrypts all passwords on your router?A. Router1#service password-encryptionB. Router1(config)#service password-encryptionC. Router1#enable secret passwordD. Router1(config)#enable secret password 26: You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?A. Acme1(config)# line console 0 Acme1(config-line)# password acme Acme1(config-line)# loginB. Acme1(config)# line vty 0 Acme1(config-line)# enable password acmeC. Acme1(config)# line vty 0 Acme1(config-line)# enable secret acme Acme1(config-line)# loginD. Acme1(config)# line vty 0 Acme1(config-line)# password acme Acme1(config-line)# login27: When you are setting up your serial interfaces, what does the clockrate command do for your connection?A. Establishes the timing at which you send dataB. Establishes keepalivesC. Establishes the advertised bandwidthD. Establishes the time on the router 28: You need to set up passwords on all your default Telnet lines. What command would you start with?A. Router1(config)#telnet configurationB. Router1(config)#interface Ethernet 0/1C. Router1(config)#line vty 1 5D. Router1(config)#line vty 0 4 29: You can execute show commands at which prompt? (Choose two.)A. Router1#B. Router1(config)#C. Router1(config-router)#D. Router1>E. romon1> 30: You are configuring your router and type in an Enable password and an Enable Secret password. Your fellow network technician asks you why you have two passwords set when you need only one. What do you tell him?A. The Enable password is used by low-level applications.B. If you reverted to an older version of the IOS, it would not understand the Secret password.C. Both passwords are treated the same.D. It is a failsafe method of ensuring that people need to type two passwords instead of just one.31: You need to get back to Privileged EXEC mode from Interface Configuration mode. What is the quickest method?A. Ctrl+Shift+6; then press XB. Ctrl+EscC. Ctrl+ZD. Type exit 32: When you are establishing a PPP link, which of the following would be negotiated? (Choose three.)A. IPCPB. CHAPC. UDPD. Q.931E. Multilink Protocol 33: Which of the following commands returns your router to a previously saved configuration?A. Router1#setupB. Router1#copy running-config startup-configC. Router1#copy startup-config running-configD. Router1#reload 34: You are in Interface Configuration mode and would like to recall the last command you typed, move your cursor to the beginning of the command line, and type no before the recalled command. You notice your up- and down-arrow keys do not function because you are using an older terminal program. What command combinations could you use to recall the previous command and move your cursor to the beginning of the line?Press Ctrl+P to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+L to recall the previous command and Ctrl+B to move to the beginning of the command line.Press Ctrl+D to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+E to recall the previous command and Ctrl+A to move to the beginning of the command line. 35: What is the baud rate setting for your terminal emulation program so that you can communicate through your console port?A. 2400B. 9600C. 14400D. 36300 36: What must be configured on a Cisco device to enable Telnet functionality?A. A management IP addressB. SNMPC. CDPD. vty ports 37: You are configuring your Cisco router and need to go back to User EXEC mode. What command takes you back to User EXEC mode?A. Router1#enableB. Router1#exitC. Router1#configure terminalD. Router1#disable 38: Which of the following commands places an IP address on your Catalyst switch?A. Switch1#ip address 10.2.2.2 255.255.255.0B. Switch1(config)#Set IP 10.2.2.2 255.255.255.0C. Switch1(config-vlan)#ip address 10.2.2.2D. Switch1(config-vlan)#ip address 10.2.2.2 255.255.255.0 39: Which of the following commands would you enter to receive this output shown in the figure above?A. Router1#show NVRAMB. Router1#show FlashC. Router1#show Flash-MemD. Router1#show Version 40: Your senior network administrator is unable to telnet to a Catalyst switch because she forgot the IP address. You have physical access and are able to console in. Which of the following commands is the best to get the IP address on the switch? A.Switch1#show ipB. Switch1#show vlan 1C. Switch1#show ip routeD. Switch1#show interface vlan141: You have powered up your Cisco 3640 router. The first thing you see is this output. Which of the following statements about this screen is accurate (see figure above)?A. Your IOS is corrupt and unable to load.B. Your configuration is missing parameters.C. You do not have a configuration saved in NVRAM.D. You have typed setup in the Privileged mode. 42: You type in a command and are shown the following output:% Ambiguous command: "show con"What does this mean?A. You did not enter enough characters for your device to recognize the command.B. You did not enter all the keywords or values required by this command.C. You entered the command incorrectly.D. Context-sensitive help is unable to help you with this command. 43: You are typing a command into the Cisco IOS.It is more than one terminal line long. What will the IOS do?A. The router automatically moves the cursor to the next line and uses a caret (^) to indicate the line break.B. The router truncates the command because commands longer than one line are not allowed.C. The router automatically scrolls the line to the left and uses a dollar sign ($) to indicate that there is text to the left of the $.D. The router shortens all the commands to squeeze the command on to the screen. 44: You want to change the size of the command history buffer. Which of the following commands will set it permanently to 100?A. Router1#terminal history 100B. Router1#history size 100C. Router1(config)#terminal history 100D. Router1(config-line)#history size 100 45: You have configured a description on your serial interfaces. Which of the following commands displays the description? (Choose two.)A. Show running-configB. Show flashC. Show interfacesD. Show ip protocols 46: You are typing commands into your Cisco IOS on your 3640 router. However, your typing is consistently interrupted by console messages, forcing you to retype. Which of the following commands forces the IOS to retype your original input after it displays the console message?A. Exec-timeoutB. Logging synchronousC. Line consoleD. Exec message readout 47: You are configuring a router and issue the command interface ethernet 1/0/0. What do the numbers represent?A. Slot/port/interfaceB. Slot/interface/portC. Port/slot/port numberD. Slot/port adapter/port number 48: Which of the following commands correctly sets the physical speed of a serial interface to 64Kbps?A. Router1(config-if)#bandwidth 64B. Router1(config-if)#bandwidth 64000C. Router1(config-if)#clockrate 64D. Router1(config-if)#clockrate 64000 49: In what mode do you use the encapsulation command?A. Interface Configuration modeB. Sub-interface Configuration modeC. User modeD. Privileged mode 50: You are configuring your router, and your boss happens to look over your shoulder as you type a show running-config command. She sees one of the lines that says password 7 14361F009A056E7D and asks what this means. What do you tell her?A. It is the actual password.B. It is the result of a service password-encryption command.C. The console output made a mistake.D. It is the result of an enable secret command.。