CCNA第三学期英文答案chapter4
CCNA4.Chapter 4 (Form C).Answer
CCNA4 Chapter 4 (Form C) Answer 1Which two statements are true regarding network security? (Choose two.)Securing a network against internal threats is a lower priority because company employees represent a low security risk.Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who downloadexploits from the Internet pose a serious threat to network security.Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no furthersecurity measures are needed to protect the web server because no harm can come from it being hacked.Established network operating systems like UNIX and network protocols like TCP/IP can be used with their defaultsettings because they have no inherent security weaknesses.Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.Observable DescriptionMaxValue1correctness ofresponseOption 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selectedthan required.2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.1.2 Common Security Threats2Which two statements are true about network attacks? (Choose two.)Strong network passwords mitigate most DoS attacks.Worms require human interaction to spread, viruses do not.Reconnaissance attacks are always electronic in nature, such as ping sweeps or port scans.A brute-force attack searches to try every possible password from a combination of characters.Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internaldevices should be authenticated to prevent attacks such as port redirection.Observable DescriptionMaxValue1correctness of responseOption 4 and Option 5 are correct.1 point for each correct option. 0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.3 Types of Network Attacks3Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?reconnaissance access DoS worm virus Trojan horseObservable DescriptionMaxValue 1correctness of response2 points for Option3 0 points for any other option2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.3 Types of Network Attacks4An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?DoS DDoSvirusaccess reconnaissanceObservable DescriptionMaxValue 1correctness of response2 points for Option3 0 points for any other option2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.3 Types of Network Attacks5Which two statements regarding preventing network attacks are true? (Choose two.)The default security settings for modern server and PC operating systems can be trusted to have secure default security settings.Intrusion prevention systems can log suspicious network activity, but there is no way to counter an attack in progress without user intervention.Physical security threat mitigation consists of controlling access to device console ports, labeling critical cable runs, installing UPS systems, and providing climate control. Phishing attacks are best prevented by firewall devices.Changing default usernames and passwords and disabling or uninstalling unnecessary services are aspects of device hardening.Observable DescriptionMaxValue1correctness of responseOption 3 and Option 5 are correct.1 point for each correct option. 0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.4 General Mitigation Techniques6Intrusion detection occurs at which stage of the Security Wheel?securingmonitoringtestingimprovement reconnaissanceObservable DescriptionMaxValue 1correctness of response2 points for Option 2 0 points for any other option2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.5 The Network Security Wheel7Which two objectives must a security policy accomplish? (Choose two.)provide a checklist for the installation of secure servers describe how the firewall must be configured document the resources to be protectedidentify the security objectives of the organization identify the specific tasks involved in hardening a routerObservableDescriptionMax Value1correctness of responseOption 3 and Option 4 are correct.1 point for each correct option. 0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.6 The Enterprise Security Policy8What are three characteristics of a good security policy? (Choose three.)It defines acceptable and unacceptable use of network resources. It communicates consensus and defines roles. It is developed by end users.It is developed after all security devices have been fully tested. It defines how to handle security incidents.It should be encrypted as it contains backups of all important passwords and keys.Observable DescriptionMaxValue1correctness of responseOption 1, Option 2, and Option 5 arecorrect.1 point for each correct option. 0 points if more options are selected than required.3This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.1.6 The Enterprise Security Policy9Which two statements define the security risk when DNS services are enabled on the network? (Choose two.)By default, name queries are sent to the broadcast address 255.255.255.255.DNS name queries require the ip directed-broadcast command to be enabled on the Ethernet interfaces of all routers.Using the global configuration command ip name-server on one router enables the DNS services on all routers in thenetwork.The basic DNS protocol does not provide authentication or integrity assurance.The router configuration does not provide an option to set up main and backup DNS servers.Observable DescriptionMaxValue1correctness of responseOption 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.3.1 Vulnerable Router Services and Interfaces10What are two benefits of using Cisco AutoSecure? (Choose two.)It gives the administrator detailed control over which services are enabled or disabled. It offers the ability to instantly disable non-essential system processes and services. It automatically configures the router to work with SDM.It ensures the greatest compatibility with other devices in your network.It allows the administrator to configure security policies without having to understand all of the Cisco IOS software features.ObservableDescriptionMax Value1correctness of responseOption 2 and Option 5 are correct.1 point for each correct option. 0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN• 4.3.3 Locking Down Your Router with Cisco Auto Secure11Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?The privilege level of the user is not configured correctly.The authentication method is not configured correctly.The HTTP server is not configured correctly.The HTTP timeout policy is not configured correctly.Observable Description MaxValue1 correctness ofresponse2 points for Option 10 points for any other option2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.4.2 Configuring Your Router to Support Cisco SDM12The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)The "mz" in the filename represents the special capabilities and features of the IOS.The file is uncompressed and requires 2.6 MB of RAM to run.The software is version 12.1, 4th revision.The file is downloadable and 121.4MB in size.The IOS is for the Cisco 2600 series hardware platform.Observable DescriptionMaxValue1correctness of responseOption 3 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.5.2 Managing Cisco IOS Images13Refer to the exhibit. The network administrator is trying to back up the Cisco IOS router software and receives the output shown. What are tw possible reasons for this output? (Choose two.)The Cisco IOS file has an invalid checksum.The TFTP client on the router is corrupt.The router cannot connect to the TFTP server.The TFTP server software has not been started.There is not enough room on the TFTP server for the software.Observable DescriptionMaxValue1correctnessof responseOption 3 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.5.4 Backing up and Upgrading Software Image14Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)Verify the name of the TFTP server using the show hosts command.Verify that the TFTP server is running using the tftpdnld command.Verify that the checksum for the image is valid using the show version command.Verify connectivity between the router and TFTP server using the ping command.Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.Observable DescriptionMaxValue1correctness ofresponseOption 4 and Option 5 are correct.1 point for each correct option.0 points if more options are selected2than required.This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.5.3 Managing Cisco IOS Images15The password recovery process begins in which operating mode and using what type of connection? (Choose two.)ROM monitor boot ROM Cisco IOSdirect connection through the console port network connection through the Ethernet port network connection through the serial portObservable DescriptionMaxValue1correctness of responseOption 1 and Option 4 are correct.1 point for each correct option. 0 points if more options are selected than required.2This item references content from the following areas: CCNA Exploration: Accessing the WAN•4.5.7 Recovering a Lost Router Password 16Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL https://192.168.10.1?The password is sent in plain text.A Telnet session is established with R1.The SDM page of R1 appears with a dialog box that requests a username and password.The R1 home page is displayed and allows the user to download Cisco IOS images and configuration files.Observable Description MaxValue1 correctnessof response2 points for Option 30 points for any other option2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.4.3 Starting Cisco SDM17Which statement is true about Cisco Security Device Manager (SDM)?SDM can run only on Cisco 7000 series routers.SDM can be run from router memory or from a PC.SDM should be used for complex router configurations.SDM is supported by every version of the Cisco IOS software.Observable Description MaxValue1correctness of response 2 points for Option 2 0 points for any otheroption 2This item references content from the following areas:CCNA Exploration: Accessing the WAN•4.4.1 Cisco SDM Overview 18 Which step is required to recover a lost enable password for a router?Set the configuration register to bypass the startup configuration.Copy the running configuration to the startup configuration.Reload the IOS from a TFTP server from ROMMON.Reconfigure the router using setup mode.Observable Description MaxValue1correctness ofresponse 2 points for Option 1 0 points for any otheroption 2This item references content from the following areas:CCNA Exploration: Accessing the WAN•4.5.7 Recovering a Lost Router Password 19 What is the best defense for protecting a network from phishing exploits?Schedule antivirus scans.Schedule antispyware scans .Schedule training for all users.Schedule operating systems updates.Observable Description MaxValue1correctness ofresponse 2 points for Option 3 0 points for any otheroption 2This item references content from the following areas:CCNA Exploration: Accessing the WAN•4.1.2 Common Security Threats 20Refer to the exhibit. Security Device Manager (SDM) has been used to configure a required level of security on the router. What would be accomplished when the SDM applies the next step on the security problems that are identified on the router?SDM will automatically invoke the AutoSecure command.SDM will generate a report that will outline the proper configuration actions to alleviate the security issues.SDM will create a configuration file that can be copy and pasted into the router to reconfigure the services.SDM will reconfigure the services that are marked in the exhibit as “fix it” to apply the suggested security changes.Observable Description MaxValue1 correctnessof response2 points for Option 40 points for any other option2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.4.6 Locking Down a Router with Cisco SDM21Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1 md5 cisco" statement in the configuration?to specify a key that is used to authenticate routing updatesto save bandwidth by compressing the trafficto enable SSH encryption of trafficto create an IPsec tunnelObservable Description MaxValue1 correctness ofresponse2 points for Option 10 points for any other option2This item references content from the following areas:CCNA Exploration: Accessing the WAN•4.3.2 Securing Routing Protocols 22Refer to the exhibit. What is accomplished when both commands are configured on the router?The commands filter UDP and TCP traffic coming to the router.The commands disable any TCP or UDP request sent by the routing protocols.The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.The commands disable the BOOTP and TFTP server services to prevent security vulnerabilities.Observable Description Max Value 1 correctness of response 2 points for Option 30 points for any other option 2This item references content from the following areas:CCNA Exploration: Accessing the WAN• 4.3.1 Vulnerable Router Services and Interfaces。
CCNAS chapter 4 Exam
Cisco CCNA Security, chapter 4 Exam. Questions and answers 95.8% correct.1. Which statement accurately describes Cisco IOS zone-based policy firewall operation?The pass action works in only one direction.A router interface can belong to multiple zones.Service policies are applied in interface configuration mode.Router management interfaces must be manually assigned to the self zone.2. Which location is recommended for extended numbered or extended named ACLs?a location as close to the destination of traffic as possiblea location as close to the source of traffic as possiblea location centered between traffic destinations and sources to filter as muchtraffic as possibleif using the established keyword, a location close to the destination to ensure that return traffic is allowed3. When using Cisco IOS zone-based policy firewall, where is the inspection policyapplied?a global service policyan interfacea zonea zone pair4.Refer to the exhibit. Based on the SDM screen shown, which statement describ es the zone-based firewall component being configured?a class map that inspects all traffic that uses the HTTP, IM, P2P, and emailprotocolsa class map that prioritizes traffic that uses HTTP first, followed by SMTP,and then DNSa class map that denies all traffic that uses the HTTP, SMTP, and DNS protocolsa class map that inspects all traffic that uses the HTTP, SMTP, and DNSprotocolsa class map that inspects all traffic, except traffic that uses the HTTP, SMTP,and DNS protocols5.Refer to the exhibit. Based on the SDM screen shown, which two statements describe the effect this zone-based policy firewall has on traffic? (Choose two.)HTTP traffic from the in-zone to the out-zone is inspected.Unmatched traffic to the router from the out-zone is permitted.ICMP replies from the router to the out-zone are denied.Traffic from the in-zone to the out-zone is denied if the source address isin the 127.0.0.0/8 range.Traffic from the in-zone to the out-zone is denied if the destination addressis in the 10.1.1.0/29 range.6. Which type of packet is unable to be filtered by an outbound ACL?ICMP packetbroadcast packetmulticast packetrouter-generated packet7.Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?The packet is forwarded, and an alert is generated.The packet is forwarded, and no alert is generated.The initial packet is dropped, but subsequent packets are forwarded.The packet is dropped.8. Which zone-based policy firewall zone is system-defined and applies to trafficdestined for the router or originating from the router?self zonesystem zonelocal zoneinside zoneoutside zone9. Which statement correctly describes a type of filtering firewall?A transparent firewall is typically implemented on a PC or server with firewallsoftware running on it.A packet-filtering firewall expands the number of IP addresses avail able andhides network addressing design.An application gateway firewall (proxy firewall) is typically implemented ona router to filter Layer 3 and Layer 4 information.A stateful firewall monitors the state of connections, whether the connectionis in an initiation, data transfer, or termination state.10. In addition to the criteria used by extended ACLs, what conditions are used by CBACto filter traffic?TCP/IP protocol numbersIP source and destination addressesapplication layer protocol session informationTCP/UDP source and destination port numbers11. Which statement describes the characteristics of packet-filtering and statefulfirewalls as they relate to the OSI model?Both stateful and packet-filtering firewalls can filter at the applicationlayer.A stateful firewall can filter application layer information, while apacket-filtering firewall cannot filter beyond the network layer.A packet-filtering firewall typically can filter up to the transport layer,while a stateful firewall can filter up to the session layer.A packet-filtering firewall uses session layer information to track the stateof a connection, while a stateful firewall uses application layer informationto track the state of a connection.12.Refer to the exhibit. What is represented by the area marked as “A”?DMZinternal networkperimeter security boundarytrusted networkuntrusted network13. Which three actions can a Cisco IOS zone-based policy firewall take if configuredwith Cisco SDM? (Choose three.)inspectevaluatedropanalyzepassforward14. A router has CBAC configured and an inbound ACL applied to the external interface.Which action does the router take after inbound-to-outbound traffic is inspected and a new entry is created in the state table?A dynamic ACL entry is added to the external interface in the inbounddirection.The internal interface ACL is reconfigured to allow the host IP addressaccess to the Internet.The entry remains in the state table after the session is terminated sothat it can be reused by the host.When traffic returns from its destination, it is reinspected, and a newentry is added to the state table.15. For a stateful firewall, which information is stored in the st ateful session flowtable?TCP control header and trailer information associated with a particular sessionTCP SYN packets and the associated return ACK packetsinside private IP address and the translated inside global IP addressoutbound and inbound access rules (ACL entries)source and destination IP addresses, and port numbers and sequencinginformation associated with a particular session16.Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24network are allowed.Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24network are allowed.SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24network are allowed.Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24network are blocked.SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24network are blocked.Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24network are allowed.17. When configuring a Cisco IOS zone-based policy firewall, which three actions canbe applied to a traffic class? (Choose three.)dropinspectpassreroutequeueshape18.Refer to the exhibit. In a two-interface CBAC implementation, where should ACLs be applied?inside interfaceoutside interfaceinside and outside interfacesno interfaces19. Which two parameters are tracked by CBAC for TCP traffic but not for UDP traffic?(Choose two.)source portprotocol IDsequence numberdestination portSYN and ACK flags20. What is the first step in configuring a Cisco IOS zone-based policy firewall usingthe CLI?Create zones.Define traffic classes.Define firewall policies.Assign policy maps to zone pairs.Assign router interfaces to zones.21. Which two are characteristics of ACLs? (Choose two.)Extended ACLs can filter on destination TCP and UDP ports.Extended ACLs can filter on source and destination IP addresses.Extended ACLs can filter on source and destination IP addresses.Standard ACLs can filter on source and destination IP addresses.Standard ACLs can filter on source and destination TCP and UDP ports.22. Which type of packets exiting the network of an organization should be blocked b yan ACL?packets that are not encryptedpackets that are not translated with NATpackets with source IP addresses outside of the organization's network addressspacepackets with destination IP addresses outside of the organization's networkaddress space23.When logging is enabled for an ACL entry, how does the router switch packets filteredby the ACL?topology-based switchingautonomous switchingprocess switchingoptimum switching。
CISCO_CCNA网络工程师题库
培训大讲堂官方YY 频道:3660mCCNA题库考试代号: 640-802考试时间:英文110+30=140分钟通过分数: 825题库版本: V104.4鸿鹄论坛招募CCNA、CCNP答疑讲师答疑地点:鸿鹄官方YY频道3660鸿鹄大讲堂:bbs.hh010./thread-46172-1-1.htmlCCNA题库战报交流QQ群:144288127 (500人超级群)CCNA题库战报交流区: bbs.hh010./forum-261-1.html1000 G视频教程免费下载:bbs.hh010./forum-228-1.htmlCCNA(640-802)题库V104.4CCNA(640-802)题库V104.4(情人节版)CCNA 题库战报500人超级QQ群 144288127V104系列是官方的终结版本,以后不会再出V105 V106 V108等等CCNA 最新题库/最新战报发布区: bbs.hh010./forum-261-1.html下载官方正版题库、看最新考试战报,请随时关注鸿鹄论坛 bbs.hh010.CCNA考试报名1900,详情请联系鸿鹄全国区十七名客服 QQ 71202306========================================更新容:V104.1修正V104中错误题目,确定经典争议题目答案;V104.2增加拖图题并可完美模拟考试,VCE题库增加中文注释;V104.3针对思科CCNA考试变题,更新考试新增题目93Q,更新V104.2实验题;V104.4增加全文中文注释,汇总V104.3九次更新,删除部分旧题目,为目前最新官方正版题库;2011.8.1 增加每日新题,修订部分错误。
2012.2.14 情人节版增加5道新题,分别是519、520、521、522、523题修改176题、375题、443题、482题答案错误修改59题、88题、453题、107题、270题注释错误增加个别疑难拖图题注释,优化实验题=============================================QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?(当您登录到交换机,哪种提示表明你在特权模式?)A. %B.C. >D. $E. #Answer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:特权模式就是#提示符QUESTION 2Which command shows system hardware and software version information?(哪些命令显示系统硬件和软件的版本信息?)A. show configurationB. show environmentC. show inventoryD. show platformE. show versionAnswer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:查看系统的软件和硬件信息使用的命令是show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?(思科 Catalyst 交换机 CAT1 和 CAT2 有它们之间的连接使用端口FA0/13。
CCNA英文试题_(含答案)
1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。
CCNA思科第三学期ESwitchingEam正确答案
单臂路由器VLAN 间路由有哪三项特征?(选择三项。
)需要使用VTP需要使用子接口减少广播域的数量使用过多VLAN 时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于VLAN 间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口2如果将允许使用中继链路的VLAN 范围设置为默认值,表示允许哪些VLAN?仅管理VLAN除扩展范围VLAN 之外的所有VLAN除VLAN 1 和VLAN 1002-1005 之外的所有VLAN所有的VLAN3请参见图示。
哪一个口令可让管理员进入特权执行模式?cisco1cisco2cisco3cisco4请参见图示。
假设所有交换机的网桥优为默认值,那么哪台交换机将当选为生成树拓扑的根桥?Cat-ACat-BCat-CCat-D5请参见图示。
最近安装了SW1 用于取代集线器。
主机1 和传送数据。
网络设备会如何处理此事件?(选择两项。
)当冲突发生时,会调用回退算法。
由于主机 1 和主机4 都连接到交换机,因此不会发生冲突。
交换机将根据交换机MAC 地址表中的信息将数据转发到相应的端口。
主机 2 和主机3 会获分配更短的回退值,从而获得访问介质的优先权。
为了防止再发生冲突,交换机会在设定时间内阻塞与主机2、主机 3 和主机4 连接的端口。
6请参见图示。
网络管理员east-hosts VLAN 并将属于该VLAN 的交换机端口用到一个现有VLAN 中。
如果要从S1-Central 完全删除VLAN 2,同时及其所有接口工作正常,应该使用哪两组命令?(选择两项。
)S1-Central> enable S1-Central# reloadS1-Central> enable S1-Central# erase flash:S1-Central> enable S1-Central# delete flash:vlan.datS1-Central> enable S1-Central# configure terminal S1-Central(config)# no vlan 2S1-Central> enable S1-Central# configure terminal S1-Central(config-if)# interface fastethernet 0/1S1-Centralswitchport access vlan 37请参见图示。
CCNA第三学期英文答案chapter3
1.Which two statements describe the benefits of VLANs? (Choose two.)VLANs improve network performance by regulating flow control and window size.VLANs enable switches to route packets to remote networks via VLAN ID filtering.VLANs reduce network cost by reducing the number of physical ports required on switches.VLANs improve network security by isolating users that have access to sensitive data andapplications.VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms2.What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)VLAN1 should renamed.VLAN 1 is the management VLAN.All switch ports are members of VLAN1.Only switch port 0/1 is assigned to VLAN1.Links between switches must be members of VLAN13.Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if theneighboring interface is configured in nonegotiate mode.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration of the configuration on the neighboring interface4.Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and computer 4 will a VLAN ID tag be included with the frame?AA, BA, B, D, GA, D, FC, EC, E, F5.The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two statements are true concerning VLAN configuration? (Choose two.)The VLANs may be named.VLAN information is saved in the startup configuration.Non-default VLANs created manually must use the extended range VLAN numbers.The network administrator may create the VLANs in either global configuration mode or VLAN database mode.Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations6.Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the outputshown? (Choose two.)The network administrator configured VLANs 1002-1005.The VLANs are in the active state and are in the process of negotiating configuration parameters.A FDDI trunk has been configured on this switch.The command switchport access vlan 20 was entered in interface configuration mode for FastEthernet interface 0/1.Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to portsfa0/9 through fa0/12 without the use of a Layer 3 device7.What happens to the member ports of a VLAN when the VLAN is deleted?The ports cannot communicate with other ports.The ports default back to the management VLAN.The ports automatically become a part of VLAN1.The ports remain a part of that VLAN until the switch is rebooted. They then become members ofthe management VLAN.8.A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1 command,received. Why did this command generate an error?VLAN 1 can never be deleted.VLAN 1 can only be deleted by deleting the vlan.dat file.VLAN 1 can not be deleted until all ports have been removed from it.VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities9.What is the effect of the switchport mode dynamic desirable command?DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and b up as needed.A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switctrunk commands.10.Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?Cisco switches only support the ISL trunking protocol.The trunk cannot be negotiated with both ends set to auto.By default, Switch1 will only allow VLAN 5 across the link.A common native VLAN should have been configured on the switches11.Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?Disable DTP.Delete any VLANs currently being trunked through port Fa0/1.Administratively shut down and re-enable the interface to return it to default.Enter the switchport mode access command in interface configuration mode.12.Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem?The link between the switches is up but not trunked.VLAN 3 is not an allowed VLAN to enter the trunk between the switches.The router is not properly configured to route traffic between the VLANs.Computer D does not have a proper address for the VLAN 3 address space13.Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?There is a native VLAN mismatch.The link between Switch1 and Switch2 is up but not trunked.The router is not properly configured for inter-VLAN routing.VLAN 50 is not allowed to entering the trunk between Switch1 and Switch214.Refer to the exhibit. Which statement is true concerning interface Fa0/5?The default native VLAN is being used.The trunking mode is set to auto.Trunking can occur with non-Cisco switches.VLAN information about the interface encapsulates the Ethernet frames15.What statements describe how hosts on VLANs communicate?Hosts on different VLANs use VTP to negotiate a trunk.Hosts on different VLANs communicate through routers.Hosts on different VLANs should be in the same IP network.Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network16.Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LANdomain?none of the computers will receive the broadcast framecomputer A, computer B, computer Ccomputer A, computer D, computer Gcomputer B, computer Ccomputer D, computer Gcomputer A, computer B, computer C, computer D, computer E, computer F, computer G, computerH, computer I17.What is a valid consideration for planning VLAN traffic across multiple switches?Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VA trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.Carrying all required VLANs on a single access port will ensure proper traffic separation18.Which two statements about the 802.1q trunking protocol are true? (Choose two.)802.1q is Cisco proprietary.802.1q frames are mapped to VLANs by MAC address.If 802.1q is used on a frame, the FCS must be recalculated.802.1q will not perform operations on frames that are forwarded out access ports.802.1q allows the encapsulation of the original frame to identify the VLAN from which a frameoriginated19.What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in "dynamic d mode?dynamic desirable modeon or dynamic desirable modeon, auto, or dynamic desirable modeon, auto, dynamic desirable, or nonegotiate mode20.Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a newcompany office. The company will add a switch, S3, connected via a trunk link to S2, another switch. Forsecurity reasons the new PC will reside in the HR VLAN, VLAN 10. The new office will use the172.17.11.0/24 subnet. After installation, the existing PCs are unable to access shares on PC4. What isthe likely cause?The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.PC4 must use the same subnet as the other HR VLAN PCs.A single VLAN cannot span multiple switches.21.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3。
新理念网络平台英语读写教程第三册单元测试unit4答案
U4-A-B3Reading ComprehensionDirections: There are two passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices. Click on the bestchoice. (20 points)Passage OneA scientific panel convened by the World Health Organization recommended guidelines on Friday for doctors conducting clinical studies of SARS patients. The panel urged doctors to apply the guidelines in analyzing the masses of potentially useful information about various therapies that were collected in this year's epidemic. Much of that information has not been published or analyzed."It is a matter of urgency to get better analysis and review," said Dr. Simon Mardel, a WHO official who led the two-day meeting that ended on Friday. He said thousands of potential therapies and compounds had been tested so far as researchers try to determine treatments for SARS, or severe acute respiratory syndrome. "We recognize that having no treatment for SARS is hindering our ability to control an epidemic in so many ways." He said.In the epidemic earlier this year, various treatments, like drugs to fight the virus or strengthen the immune system, as well as traditional Chinese medicine, were delivered under emergency conditions, in widely different settings and countries to patients suffering from varying stages of the illness. Those conditions —generally without standardized measurements or controlled situations — have made it hard to interpret results.Standard supportive therapy like nursing, and in severe cases the use of mechanical respirators(呼吸器)to help patients breathe, is the mainstay(主要支持)of SARS care, and helped many patients survive. But doctors still do not know how best to treat SARS patients who have breathing difficulties, Dr. Mardel said. One method is invasive ventilation. A second method involves blowing oxygen into the lungs through a mask. Both carry the risk of transmitting the virus to hospital employees. Without proper analysis, the panel was unable to say definitively which treatment worked best, or which caused the most harm. "There is a lack of shared information," Dr. Mardel said, noting that a lot of data have not been published.The panel also agreed on guidelines that would allow doctors to conduct quick and safe clinical trials, a process that generally takes years to complete. The World Health Organization, a United Nations agency did not release the guidelines. Dr. Mardel said they were flexible because no one knew where, when and in what setting SARS would return. Experts in many countries have already listed the treatments they want to test, and the health agency is leaving these decisions to individual nations.21. Guidelines recommended by the scientific panel can be used for _____.A. gathering potentially useful information about various therapies collected该选项共0人选择B. conducting clinical studies of SARS patients该选项共0人选择C. determining treatment for SARS该选项共0人选择D. . publishing all the information about SARS该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B22. According to the passage, it is difficult to interpret the results of certain treatments for SARS because _____.A. patients were in different countries该选项共0人选择B. patients were given medicines in widely different settings该选项共0人选择C. patients were at different stages of the illness该选项共0人选择D. these conditions had no standardized measurements or controlled situations该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D23. According to doctors, the two methods to treat SARS patients who have breathing difficulties both _______.A. carry the risk of infecting hospital employees该选项共0人选择B. are effective in curing patients who have breathing difficulties该选项共0人选择C. don't run the risk of transmitting the virus to hospital employees该选项共0人选择D. prove to work effectively and cause no harm该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A24. According to a WHO official, Dr. Mardel, the guidelines were flexible because _____.A. SARS would reemerge in poor countries该选项共0人选择B. no one knew where, when and in what setting SARS would return该选项共0人选择C. SARS would not appear in developed countries该选项共0人选择D. no one knew whether SARS would return or not该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B25. Which of the following can be the best title of the passage?A. SARS, a Dreadful Disease该选项共0人选择B. No Good Methods to Treat SARS该选项共0人选择C. SARS Will Return One Day该选项共0人选择D. Health Panel Recommends New Guidelines on SARS该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D请根据需要填入Script:Passage TwoChildren are getting so fat that they may be the first generation to die before their parents. Today's youngsters are already falling prey to potential killers such as diabetes (糖尿病) because of their weight. Fatty fast-food diets combined with sedentary (长坐的) lifestyles dominated by televisions and computers could mean kids will die tragically young, says Professor Andrew Prentice, from the London School of Hygiene and Tropical Medicine.At the same time, the shape of the human body is going through a huge evolutionary shift because adults are getting so fat. Here in Britain, latest research shows that the average waist size for a man is 36~38 inches, and may be 42~44 by 2032. This compares with only 32.6 inches in 1972. Women's waists have grown from an average of 22 inches in 1920 to 24 in the 50s and 30 now. One of the major reasons why children now are at greater risk is that we are getting fatter younger.In the UK alone, more than one million under 16 are classed as overweight or obese (过度肥胖的) —double the number in the mid 80s. One in ten four-year-olds are also medically classified as obese.The obesity (肥胖症) pandemic (流行病) —an extensive epidemic —which started in the US, has now spread to Europe, Australia, Central America and the Middle East. Many nations now record more than 20 percent of their population as clinically obese and well over half the population as overweight.Prof. Prentice said the change in our shape has been caused by an oversupply of easily available high-energy foods combined with a dramatic drop in the energy we use as a result of technology developments.Only last week one medical journal revealed how obesity was fuelling a rise in cancer cases. Obesity also increases the risk factor for strokes and heart disease as well as diabetes. An averagely obese person's lifespan is shortened by around nine years while a severely obese person by many more.Prof. Prentice said: "So will parents outlive their children? The answer is yes and no. Yes, when the offspring become grossly obese. This is now becoming an alarmingly common occurrence in the US. Such children and adolescents have a greatly reduced quality of life in terms of both their physical and psychosocial health."So say "No" to that doughnut and burger.26. Prof. Andrew Prentice said that the life of an extremely fat child ________.A. might be shorter该选项共0人选择B. might be longer该选项共0人选择C. shorter than his father, but longer than his mother该选项共0人选择D. might be longer than his father, but shorter than his mother该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A27. The word "prey"( Para.1) means ________.A. food该选项共0人选择B. vitamin该选项共0人选择C. victim该选项共0人选择D. fool该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C28. Which of the following fails to refer to an obese child?A. An extremely weighty child.该选项共0人选择B. An extremely fat child.该选项共0人选择C. An extremely fatty child.该选项共0人选择D. An overweight child.该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A29. According to the passage, obesity is an extensive epidemic starting in __________.A. Asia该选项共0人选择B. North America该选项共0人选择C. Europe该选项共0人选择D. Central America该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B30. Which of the following diseases is NOT mentioned in the passage?A. pneumonia该选项共0人选择B. diabetes该选项共0人选择C. heart disease该选项共0人选择D. stroke该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:AV ocabulary and Structure请根据需要填入Script:Directions: Each of the following sentences is provided with four choices. Choose the one that best completes the sentence. (60 points)31. Leaves which fall to the ground _______ and become of the soil.A. break该选项共0人选择B. bury该选项共0人选择C. decay该选项共0人选择D. fade该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C32. They _______ even though they knew it was an extremely difficult task.A. carried out该选项共0人选择B. carried off该选项共0人选择C. carried forward该选项共0人选择D. carried on该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D33. The book is so admirable in ______ of style that it is very popular among young people.A. behalf该选项共0人选择B. honour该选项共0人选择C. respect该选项共0人选择D. virtue该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%34. The representative of the company seemed very ______ to the conditions of the workers.A. ignorant该选项共0人选择B. disinterested该选项共0人选择C. careless该选项共0人选择D. indifferent该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D35. Most students in college consider it wrong to _______ in examinations.A. deceive该选项共0人选择B. blackmail该选项共0人选择C. cheat该选项共0人选择D. swindle该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C36. She was so ______ in her job that she didn't hear anybody knocking at the door.A. attracted该选项共0人选择B. absorbed该选项共0人选择C. drawn该选项共0人选择D. concentrated该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B37. After careful investigation, the police found the bomb was exploded by _______ control.A. far该选项共0人选择B. distant该选项共0人选择C. remote该选项共0人选择D. distance该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%38. Only two students in our school failed in the final examination, __, Bill and Mark.A. namely该选项共0人选择B. as follows该选项共0人选择C. for instance该选项共0人选择D. such as该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A39. To be an inventor, one needs profound knowledge as well as a very ______ imagination.A. bright该选项共0人选择B. vivid该选项共0人选择C. living该选项共0人选择D. colorful该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B40. Peter finally makes up his mind to lose weight because his fatness ______ him unable to touch his toes.A. regains该选项共0人选择B. reserves该选项共0人选择C. renders该选项共0人选择D. repays该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C41. I don't know how he can ______ himself for such bad conduct.A. witness该选项共0人选择B. justify该选项共0人选择C. testify该选项共0人选择D. swear该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B42. All the people waited outside the hall while the police were inquiring ______ the matter.A. of该选项共0人选择B. about该选项共0人选择C. for该选项共0人选择D. into该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D43. The child ________ the salt all over the floor.A. spilt该选项共0人选择B. spill该选项共0人选择C. splashed该选项共0人选择D. spat该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A44. The newspaper _______ against the government's action which caused the whole society in a state of complete disorder.A. criticized该选项共0人选择B. exclaimed该选项共0人选择C. shouted该选项共0人选择D. declared该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B45. Mrs. Brown insists that Tom marry Stella, but he is not ______ on her.A. keen该选项共0人选择B. fond该选项共0人选择C. eager该选项共0人选择D. sympathetic该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A46. He was not severely punished for his crime ______ that he was young.A. in the case of该选项共0人选择B. in view of该选项共0人选择C. on the ground该选项共0人选择D. on condition该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C47. The mosquito will ______ our blood. What's even worse, it will inject poison into our bodies.A. suck该选项共0人选择B. drink该选项共0人选择C. eat该选项共0人选择D. swallow该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A48. If you want to be a successful man, you will have to ______ the fear of failure.A. overpower该选项共0人选择B. overtake该选项共0人选择C. overcome该选项共0人选择D. overthrow该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C49. Could you elaborate on your government policy ______ environmental protection?A. on behalf of该选项共0人选择B. as regards该选项共0人选择C. for the purpose of该选项共0人选择D. in contrast to该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B50. Many schools place ______ emphasis on the proportion of students entering schools of a higher level.A. undue该选项共0人选择B. undone该选项共0人选择C. uneven该选项共0人选择D. uneasy该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A51. Unfortunately, all members of my family including my baby-sitter were infected _______ influenza.A. in该选项共0人选择B. to该选项共0人选择C. with该选项共0人选择D. from该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C52. Metals expand when they are heated, and they ______ as they get cooler.A. compress该选项共0人选择B. contract该选项共0人选择C. condense该选项共0人选择D. shrink该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B53. As a great fan of classical music, our teacher has a _______ against the popular music.A. prejudice该选项共0人选择B. interruption该选项共0人选择C. doubt该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A54. He _______ a sum of money every month for his old age.A. sets back该选项共0人选择B. sets down该选项共0人选择C. sets aside该选项共0人选择D. sets up该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:C55. As a result of the radio ______ for help for the earthquake victims, over a million pounds has been raised.A. invention该选项共0人选择B. appeal该选项共0人选择C. program该选项共0人选择D. advertisement该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:B56. The survival of civilization as far as we know is _______ threat.A. under该选项共0人选择B. within该选项共0人选择C. towards该选项共0人选择D. upon该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:A57. Some old people don't like pop songs because they can't ______ so much noise.A. resist该选项共0人选择B. sustain该选项共0人选择D. tolerate该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D58. Without the support of the masses, the leading group is becoming increasingly _______.A. parted该选项共0人选择B. separated该选项共0人选择C. divided该选项共0人选择D. isolated该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D59. Medical care reform has become this country's most important public health ______.A. question该选项共0人选择B. matter该选项共0人选择C. stuff该选项共0人选择D. issue该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:D60. ______ my judgment, the new plan is unlikely to succeed.A. To该选项共0人选择B. In该选项共0人选择C. As该选项共0人选择D. For该选项共0人选择请根据需要填入Script:该题共0人答题,答对0人,答错0人,正确率为0%,错误率为0%正确答案:BU4-B-B3Reading ComprehensionDirections: There are two passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices. Click on the bestchoice. (20 points)Passage One"When I get old, what do I become?" Gazing at my mother, brittle and slightly curled up in her wheelchair like a fallen leaf, I was speechless. Her eyes wore an expression of perpetual surprise, and her mouth formed an "O" of wonderment. And I thought, "How can someone who can't remember how to use a fork ask such a deep question?" My mother, who had crossed the Atlantic during World War II in a troop ship surrounded by destroyers and submarines, and yet who feared getting old more than anything else in the world, would never have asked this question when she was younger.She had me stumped. But, I reflected on our temptation to view elderly dementia patients as having reached the end of their usefulness to society, as having lost their humanity. What exactly DO we become when we get old?A basic aspect of humanity is our ability to give to others. Did my mother have opportunities to give? I remembered working with her to write a get-well note to John, laid up at home with a bad back. He was grateful to receive her note and she was overjoyed at his note back.I think about the smiles she caused when she sang a song. Many dementia patients in her ward could not talk, but when I took their hands, I communicated with them however one-sided it might have seemed. I decided that humanity in my mother was alive and well and that she was very useful to her family and friends. In fact humanity appeared to be more alive among her fellow inmates on Alzheimer's Row than in many places in the world.My mother was not forgetting her question and I had to answer. I said, "When you are old, you are the same, only different. You may look and sound different, and perhaps you can't remember or do the things you used to do, but you affect people in positive ways. Even though you are old, you are still my mother, and although you are different, I like the things you do. And no matter what, when you get old, you become a person who is loved even more."She nodded, gave me a beautiful smile and seemed satisfied with the answer. I hope I can be satisfied with it when I am 86.21. Why does the author mention her mother's anecdote during World War II?A. To prove her mother was brave enough.该选项共0人选择B. To tell us her mother was depressed.该选项共0人选择C. To contrast with her mother's fear of getting old.该选项共1人选择D. To tell us the cause of her mother's illness.该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C22. According to the essay, which might not be right to describe a dementia patient?A. A dementia patient might have difficulty in walking.该选项共0人选择B. A dementia patient might have difficulty in talking.该选项共0人选择C. A dementia patient might have a poor memory.该选项共0人选择D. A dementia patient might have a bad temper.该选项共1人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:D23. What does the author mean by saying that "humanity in my mother was alive"?A. My mother was still active in mind.该选项共0人选择B. My mother still affected us in her positive ways.该选项共1人选择C. My mother needed our care.该选项共0人选择D. My mother became getting well.该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B24. What is the author's purpose for this essay?A. To arouse the public's attention to these dementia patients.该选项共0人选择B. To express the love between mother and son.该选项共0人选择C. To remind people that old people need more care and love.该选项共1人选择D. To tell people not to fear getting old.该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C25. What is the best title for this passage?A. When I get old, what do I become?该选项共1人选择B. My badly-illed mother该选项共0人选择C. Dementia patient, need help!该选项共0人选择D. A paradoxical question该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A请根据需要填入Script:Passage TwoAging, and aging as healthily as possible, isn't just about our physical health and outwardappearance. Mental health is gaining the spotlight with increasing regularity as an important aspect of good, overall health and well-being.Aging is a complex process that involves physical, mental, spiritual and social processes that affect each person differently. There's no way to predict which route we will take and heredity is only one factor to consider. But we can control how well we age and make smart choices and changes that can ease the process.Those seniors who are faced with mental health issues need as much extra care and compassion as possible. These people are faced with all the usual concerns of aging such as having secured housing, living independently, and remaining healthy and leading meaningful and productive lives, as well as the mental health aspect.Depression is one of the most common mental conditions that the aging population must deal with today. A lack of independence and control are often enough to cause an elderly person to withdrawal and lose interest in the basic, simple pleasures of life. Certain medications can also cause depression in the elderly and any changes in behavior should be reported to a medical professional.Dementia, senility and Alzheimer's disease are also unpleasant realities of aging that some of us may have to face sooner or later. A person with severe cognitive or behavioral disorders must receive the proper care and medication for successful treatment and for the best quality of life.Caregivers of the aged who are dealing with mental health issues often need assistance such as respite care or in-home nursing care to provide a rest for the caregiver or to provide more skilled care for the patient. There are also nursing homes and facilities that accept patients on a respite care basis for families taking vacations or for those that require alternate forms of care for whatever reason. This also can give seniors the opportunity to socialize with their peers when they may not normally have the chance at home.A reliable support system of family, friends and medical professionals will ensure that mental health doesn't become an overwhelming issue as we age, and if it does, a support system can be invaluable for enhancing quality of life and making a considerable difference in the life of a senior citizen.26. According to the passage, which of the following statements is INCORRECT?A. It's impossible to predict how we age.该选项共0人选择B. We can control how well we age.该选项共0人选择C. It's possible to make the aging process easier.该选项共0人选择D. Heredity decides how the aging process is.该选项共1人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:D27. What is the most common mental problem that ageing people must deal with today?A. Security.该选项共0人选择B. Depression.该选项共1人选择C. Dementia.该选项共0人选择D. Alzheimer's disease.该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B28. An elderly person who lives independently ______.A. should be given more compassion该选项共0人选择B. is less likely to get depressed该选项共1人选择C. is more likely to have depression该选项共0人选择D. prefers to a simple way of life该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B29. The word "respite" in the sixth paragraph means _______.A. a short break or escape该选项共1人选择B. involving many people该选项共0人选择C. meticulous该选项共0人选择D. thoughtful该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A30. What is the main idea of this passage?A. How can people age well.该选项共0人选择B. Factors affecting the aging process.该选项共0人选择C. How to keep your mind sharp as well as your body.该选项共1人选择D. Mental health problems of elderly people.该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:CV ocabulary and Structure请根据需要填入Script:Directions: Each of the following sentences is provided with four choices. Choose the one thatbest completes the sentence. (60 points)31. This is the most important respect ________ civilized man can be distinguished from primitive communities.A. in that该选项共0人选择B. which该选项共0人选择C. where该选项共1人选择D. in which该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C32. Uncle Freddy, as I called him he was in reality a very _________ cousin.A. indifferent该选项共0人选择B. remote该选项共1人选择C. aloof该选项共0人选择D. distant该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B33. The club will ________ new members the first week in September.A. enroll该选项共0人选择B. subscribe该选项共0人选择C. absorb该选项共1人选择D. register该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C34. Letters published in the newspaper are edited for ________ and clarity.A. brevity该选项共1人选择B. neatness该选项共0人选择C. cleanness该选项共0人选择D. shortness该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A35. People of my generation who lived through World War II have _______ memories of confusion and incompetence.A. marvelous该选项共0人选择B. vivid该选项共1人选择C. genuine该选项共0人选择D. imaginary该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B36. The poet sought support for a point he was making by _______ the tale of an Irish peasant.A. speaking该选项共0人选择B. seeking该选项共0人选择C. relating该选项共1人选择D. reminding该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C37. It is unrealistic to put undue pressure on ourselves by saying we are the best. Here "undue" means _______.A. excessive该选项共1人选择B. sufficient该选项共0人选择C. delayed该选项共0人选择D. reasonable该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A38. _______ regards the war against Japan, Haig believed in victory at any price.A. To该选项共0人选择B. For该选项共0人选择C. In该选项共0人选择D. As该选项共1人选择该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:D39. Whether these experiments are morally _______ is highly controversial.A. justifiable该选项共0人选择B. defensible该选项共1人选择C. reliable该选项共0人选择D. accountable该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:B40. It's easy to be _______ to money when you've never been poor.A. indifferent该选项共1人选择B. identical该选项共0人选择C. attracted该选项共0人选择D. rejected该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A41. Congress has tried dozens of approaches to revitalize _________ urban and rural areas.A. decreased该选项共0人选择B. deluding该选项共0人选择C. decaying该选项共1人选择D. departed该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C42. We reached the open sea and the coast _________ into the distance.A. withdrew该选项共0人选择B. departed该选项共0人选择C. faded该选项共0人选择D. receded该选项共1人选择该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:D43. These people often are ________ by the governments of the countries they find themselves in.A. operated该选项共0人选择B. suffered该选项共0人选择C. oppressed该选项共1人选择D. dominated该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:C44. The committee was asked to ________ a report on the housing situation.A. render该选项共1人选择B. forecast该选项共0人选择C. state该选项共0人选择D. ease该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A45. The government has made great efforts to ______ safety rules and to educate the public.A. enforce该选项共1人选择B. observe该选项共0人选择C. regular该选项共0人选择D. direct该选项共0人选择请根据需要填入Script:该题共1人答题,答对1人,答错0人,正确率为100%,错误率为0%正确答案:A46. Poor transport facilities and the lack of resources, raw materials and energy also partly ______ the drop in contract fulfillment.A. contributed to该选项共0人选择B. attributed to该选项共0人选择C. depended on该选项共0人选择。
CCNA第四节答案Word版
第4章1 网络接入层1OSI 模型的哪一层负责指定特定介质类型使用的封装方法应用层传输层数据链路层物理层封装是数据链路层的一种功能。
不同介质类型需要采用不同的数据链路层封装。
答案说明最高分值correctness of response2 points for Option 30 points for any other option222 下列哪种说法正确描述了物理层的信令?异步发送信号意味着无需时钟信号即可传输信号。
在信令中 1 始终代表电压0 始终代表没有电压。
无线编码包括发送一系列点击来划定帧。
信令是一种将数据流转换成预定义代码的方法。
除了表示是否存在电压外也可使用许多方法在铜缆上表示 0 或 1 信号。
无线网络技术的运行频率远远超出人类可听的范围并且不使用点击。
编码或线路编码是一种将数据位流转换为预定义代码的方法。
答案说明最高分值correctness of response2 points for Option 10 points for any other option233 下列哪两项是物理层协议使用帧编码技术的原因请选择两项。
降低介质上的冲突数量甄别数据位和控制位提供更好的介质错误校正识别帧的开始和结束位置提高介质吞吐量编码技术可将数据位流转换为发送方和接收方都能识别的预定义代码。
使用预定义模式有助于区别控制位和数据位并提供良好的介质错误检测。
答案说明最高分值correctness of responseOption 2 and Option 4 are correct.1 point for each correct option.20 points if more options are selected than required.44 快速以太网的吞吐量为 80 Mb/s。
同一时期用于建立会话、确认和封装的流量开销是 15 Mb/s。
该网络的实际吞吐量是多少15 Mb/s95 Mb/s55 Mb/s65 Mb/s80 Mb/s实际吞吐量就是给定时间内传输的可用数据吞吐量减去用于建立会话、确认和封装的流量开销后的结果。
CCNA_ERouting_Chapter_4
1Which event will cause a triggered update?an update routing timer expiresa corrupt update message is receiveda route is installed in the routing tablethe network is converged2T hree routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers relo happen?They will share all routes saved in NVRAM prior to the power loss with their directly connected neighbors.They will multicast hello packets to all other routers in the network to establish neighbor adjacencies.They will send updates that include only directly connected routes to their directly connected neighbors.They will broadcast their full routing table to all routers in the network.3What is a routing loop?a packet bouncing back and forth between two loopback interfaces on a routera condition where a return path from a destination is different from the outbound path forming a "loop"a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destinthe distribution of routes from one routing protocol into another4Refer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks1234565What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessibRouter C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.6What does the RIP holddown timer do?ensures an invalid route has a metric of 15prevents a router from sending any updates after it has introduced a routing loop into the networkensures every new route is valid before sending an updateinstructs routers to ignore updates, for a specified time or event, about possible inaccessible routes 7W hich of the following can exist in a distance vector network that has not converged? (Choose three.)routing loopsinconsistent traffic forwardingno traffic forwarding until system convergesinconsistent routing table entriesrouting table updates sent to wrong destinations8What is the purpose of the TTL field in the IP header?used to mark routes as unreachable in updates sent to other routersprevents regular update messages from reinstating a route that may have gone badprevents a router from advertising a network through the interface from which the update camelimits the time or hops that a packet can traverse through the network before it should be discardeddefines a maximum metric value for each distance vector routing protocol by setting a maximum hop count9W hich three routing protocols are distance vector routing protocols? (Choose three).RIPv1EIGRPOSPFIS-ISRIPv210The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has go then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effectsplit horizonerror conditionhold-down timerroute poisoningcount to infinity11Which statement is true regarding cisco’s RIP_JITTER variable?It prevents the synchronization of routing updates by buffering the updates as they leave the router interfaces.It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of interval time from the next routing update interval.It prevents the synchronization of routing updates by causing the router to skip every other scheduled update time.It prevents the synchronization of routing updates by forcing the router to listen when its time for other updates on th sending its update.12W hich of the following methods does split horizon use to reduce incorrect routing information?Routing updates are split in half to reduce the update time.Information learned from one source is not distributed back to that source.New route information must be learned from multiple sources to be accepted.The time between updates is split in half to speed convergence.New route information is suppressed until the system has converged.13Which two statements are true regarding the function of the RIPv1 routing updates? (Choose two).updates are broadcast only when there are changes to the topologyupdates are broadcast at regular intervalsbroadcast are sent to 0.0.0.0broadcasts are sent to 255.255.255.255updates contain the entire network topologyonly changes are included in the updates14A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion a respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (ChooseEIGRP uses periodic updates.EIGRP only updates affected neighbors.EIGRP uses broadcast updates.EIGRP updates are partial.EIGRP uses the efficient Bellman-Ford algorithm.11Which statement is true regarding cisco’s RIP_JITTER variable?It prevents the synchronization of routing updates by buffering the updates as they leave the router interfaces.It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of interval time from the next routing update interval.It prevents the synchronization of routing updates by causing the router to skip every other scheduled update time.It prevents the synchronization of routing updates by forcing the router to listen when its time for other updates on th sending its update.12W hich of the following methods does split horizon use to reduce incorrect routing information?Routing updates are split in half to reduce the update time.Information learned from one source is not distributed back to that source.New route information must be learned from multiple sources to be accepted.The time between updates is split in half to speed convergence.New route information is suppressed until the system has converged.13Which two statements are true regarding the function of the RIPv1 routing updates? (Choose two).updates are broadcast only when there are changes to the topologyupdates are broadcast at regular intervalsbroadcast are sent to 0.0.0.0broadcasts are sent to 255.255.255.255updates contain the entire network topologyonly changes are included in the updates14A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion a respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (ChooseEIGRP uses periodic updates.EIGRP only updates affected neighbors.EIGRP uses broadcast updates.EIGRP updates are partial.EIGRP uses the efficient Bellman-Ford algorithm.15Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is routing protocol?The path will be router A -> router B -> router C -> router E.The path will be router A -> router D -> router E.Router A will load balance between the router A -> router D -> router E and router A -> router B -> router C -> router E Packets will alternate paths depending on the order they arrive at router A.\\Which of the following statements are correct about RIP?uses a broadcast to update all other routers in the network every 60 secondsuses a multicast address to update other routers every 90 secondswill send out an update if there is a failure of a linkupdates only contain information about routes that have changed since last updateRefer to the exhibit. The routers in this network are running RIP. Router A has not received an upda minutes. How will Router A respond?The Holddown timer will wait to remove the route from the table for 60 seconds.The Invalid timer will mark the route as unusable if an update has not been received in 180 seThe Update timer will request an update for routes that were learned from Router B.The Hello timer will expire after 10 seconds and the route will be flushed out of the routing tab What metric does the RIP routing protocol consider to be infinity?1516224255。
CCNA_ESwitching _Chapter_4_答案
1下列关于VTP 修剪的说法中哪两项正确?(选择两项。
)修剪功能默认为启用。
只能在VTP 服务器上配置修剪功能。
域中的所有VTP 服务器上都必须配置修剪功能。
VTP 客户端模式交换机上的VLAN 不会被修剪。
修剪功能可防止中继链路上出现不必要的广播泛洪。
2V TP 以客户端模式工作具有哪两项特点?(选择两项。
)无法添加VLAN可添加在本地有效的VLAN无论VLAN 信息如何,将广播从所有端口转发出去只能传递VLAN 管理信息而无法接受更改可向同一VTP 域中的其它交换机转发VLAN 信息3请参见图示。
从所提供的输出可以获得什么信息?它检验了已配置的VTP 口令。
它检验了VTP 域是否被配置为使用VTP 第 2 版。
它检验了是否在交换VTP 通告。
它检验了VTP 域名是否是V1。
4在某台交换机发生故障后,网络管理员用之前就位于网络中的另一台交换机更换了故障交换机。
为了避免不正确的VLAN 信播,管理员应该对新更换的交换机采取什么预防措施?启用VTP 修剪。
更改VTP 域名。
将VTP 模式改为客户端。
将该交换机上的所有接口都改为接入端口。
5下列哪两种说法正确描述了VTP 透明模式的工作情况?(选择两项。
)透明模式交换机可以创建VLAN 管理信息。
透明模式交换机添加的VLAN 只在本地有效。
透明模式下,交换机会将收到的所有VLAN 管理信息传递给其它交换机。
透明模式下,交换机可以接受其它交换机发来的VLAN 管理更改。
透明模式下,交换机会发出有关其VLAN 状态的更新,将该状态通知给其它交换机。
6请参见图示。
根据图中所示的输出可确认哪两项事实?(选择两项。
)如果将此交换机添加到已收敛的网络中,则同一个VTP 域内的其它启用了VTP 的交换机会认为自己的VLAN 信息比的VLAN 信息新。
此交换机未显示配置修订版的错误。
此交换机已经与相邻设备建立了双向通信。
此交换机被配置为向同一个VTP 域内启用了VTP 的其它交换机通告VLAN 配置。
CCNA考试题库中英文翻译版及标准答案
CCNA考试题库中英文翻译版及答案————————————————————————————————作者:————————————————————————————————日期:CCNA考试题库中英文翻译版及答案1[1]1. What are two reasons that a network administrator would use access lists? (Choose two.)1.出于哪两种理由,网络管理员会使用访问列表?A. to control vty access into a routerA.控制通过VTY访问路由器B. to control broadcast traffic through a routerB.控制广播流量穿越路由器2.一个默认的帧中继WAN被分类为哪种物理网络类型?A. point-to-pointA.点到点B. broadcast multi-accessB.广播多路访问C. nonbroadcast multi-accessC.非广播多路访问D. nonbroadcast multipointD.非广播多点E. broadcast point-to-multipointE.广播点到多点Answer: C3. A single 802.11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency. What are three likely causes of this problem? (Choose three.)3.一个802.11接入点被部署在一个方形办公室的中央,当大多数用户在大流量传输数一些无线用户发现无线网络变得缓慢和出现丢包A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF4. Refer to the exhibit. How many broadcast domains exist in the exhibited topology?根据下图,图中的拓扑中存在多少个广播域?A. one A.1B. two B.2C. three C.3D. four D.4E. five E.5F. six F.6Answer: C5. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)5.根据下图,WLAN diagram决定了哪两个事实A. The area of overlap of the two cells represents a basic service set (BSS).A. 两个 cells的overlap的区域描述了一个basic service setB. The network diagram represents an extended service set (ESS).B. 网络描述了一个extended service setC. Access points in each cell must be configured to use channel 1.C. 再每个CELL中的AP必须被配置成使用channel 1D. The area of overlap must be less than 10% of the area to ensure connectivity.D. 为了确保连通性,重叠区域必须小于10%E. The two APs should be configured to operate on different channels.E. 两个访问点应该被配置成工作在不同的频道Answer: BE6. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router.Which of the following statements is true concerning this command?6.路由器上输入命令frame-relay map ip 10.121.16.8 102 broadcast,以下选项正确的是?A. This command should be executed from the global configuration mode.A.该命令应该在全局配置模式下被执行B. The IP address 10.121.16.8 is the local router port used to forward data.B.IP地址10.121.16.8是本地路由器用来转发数据的接口C. 102 is the remote DLCI that will receive the information.C.102是远端的DLCI它将接受信息。
CCNA考试题库中英文翻译版及答案
CCNA考试题库中英⽂翻译版及答案CCNA考试题库中英⽂翻译版及答案1[1]1、 What are two reasons that a network administrator would use access lists? (Choose two、)1、出于哪两种理由,⽹络管理员会使⽤访问列表?A、 to control vty access into a routerA、控制通过VTY访问路由器B、 to control broadcast traffic through a routerB、控制⼴播流量穿越路由器2、⼀个默认得帧中继WAN被分类为哪种物理⽹络类型?A、 point-to-pointA、点到点B、 broadcast multi-accessB、⼴播多路访问C、 nonbroadcast multi-accessC、⾮⼴播多路访问D、 nonbroadcast multipointD、⾮⼴播多点E、 broadcast point-to-multipointE、⼴播点到多点Answer: C3、 A single 802、11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency、 What are three likely causes of this problem? (Choose three、)3、⼀个802、11接⼊点被部署在⼀个⽅形办公室得中央,当⼤多数⽤户在⼤流量传输数⼀些⽆线⽤户发现⽆线⽹络变得缓慢与出现丢包A、 mismatched TKIP encryptionB、 null SSIDC、 cordless phonesD、 mismatched SSIDE、 metalF、 antenna type or directionAnswer: CEF4、 Refer to the exhibit、 How many broadcast domains exist in the exhibited topology?根据下图,图中得拓扑中存在多少个⼴播域?A、 one A、1B、 two B、2C、 three C、3D、 four D、4E、 five E、5F、 six F、6Answer: C5、 Refer to the exhibit、 What two facts can be determined from the WLAN diagram? (Choose two、) 5、根据下图,WLAN diagram决定了哪两个事实A、 The area of overlap of the two cells represents a basic service set (BSS)、A、两个 cells得overlap得区域描述了⼀个basic service setB、 The network diagram represents an extended service set (ESS)、B、⽹络描述了⼀个extended service setC、 Access points in each cell must be configured to use channel 1、C、再每个CELL中得AP必须被配置成使⽤channel 1D、 The area of overlap must be less than 10% of the area to ensure connectivity、D、为了确保连通性,重叠区域必须⼩于10%E、 The two APs should be configured to operate on different channels、E、两个访问点应该被配置成⼯作在不同得频道Answer: BE6、 The command frame-relay map ip 10、121、16、8 102 broadcast was entered on the router、Which of the following statements is true concerning this command?6、路由器上输⼊命令frame-relay map ip 10、121、16、8 102 broadcast,以下选项正确得就是?A、 This command should be executed from the global configuration mode、A、该命令应该在全局配置模式下被执⾏B、 The IP address 10、121、16、8 is the local router port used to forward data、B、IP地址10、121、16、8就是本地路由器⽤来转发数据得接⼝C、 102 is the remote DLCI that will receive the information、C、102就是远端得DLCI它将接受信息。
ccna第三学期1-7套练习题答案(最新)
ESwitching Chapter 1 - CCNA Exploration: LAN 交换和无线(版本4.0)1、分层网络设计模型中的哪一层称为互连网络的高速主干层,其中高可用性和冗余性是该层的关键?A.接入层B. 核心层C. 数据链路层D. 分布层E. 网络层F. 物理层2、分层网络设计模型中的哪一层提供了将设备接入网络的途径并控制允许那些设备通过网络进行通信?A. 应用层B. 接入层C. 分布层D. 网络层E. 核心层3、分层设计模型中的哪一层使用策略来控制网络流量的流动并通过在虚拟局域网 (VLAN) 之间执行路由功能来划定广播域的边界?A. 应用层B. 接入层C. 分布层D. 网络层E. 核心层4、从传统的公司网络架构迁移到完全融合网络后,很可能产生什么影响?A. 可将本地模拟电话服务完全外包给收费更低的提供商B. 以太网 VLAN 结构会简化C. 会形成共享的基础架构,因此只需管理一个网络。
D. QoS 问题会大大减轻5、语音数据流和视频数据流争夺带宽的问题会减轻。
应该在分层网络的哪一层或哪几层实现链路聚合?A. 仅核心层B. 分布层和核心层C. 接入层和分布层D. 接入层、分布层和核心层6、下列哪种说法正确描述了模块化交换机?A. 外形纤细B. 允许通过冗余背板进行交换机互连C. 物理特性固定D. 特性灵活多变7、下列哪项功能可在交换网络中通过合并多个交换机端口来支持更高的吞吐量?A. 收敛B. 冗余链路C. 链路聚合D. 网络直径8、在处于不同的 VLAN 中的设备间配置通信需要使用 OSI 模型中的哪个层?A. 第 1 层B. 第 3 层C. 第 4 层D. 第 5 层9、企业级交换机有哪两项特点?(选择两项。
)A. 端口密度低B. 转发速度高C. 延时水平高D. 支持链路聚合E.端口数量预先确定10、Cisco 三层式分层模型中的三层都支持哪两项功能?(选择两项。
)A. 以太网供电B. 在冗余中继链路之间进行负载均衡C. 冗余组件D. 服务质量E. 链路聚合11、网络管理员选择的交换机将在网络核心层工作。
CCNA第三学期中英文对照练习5
1请参见图示。
该网络中所有交换机的MAC表均为空。
而且,该网络中的交换机已禁用STP。
该网络中会如何处理主机PC1所发送的广播帧?2Refer to the exhibit. All switches in the network have empty MAC tables. STP has been disabled on the switches in the network. How will a broadcast frame that is sent by host PC1 be handled on the network?交换机SW1会拦截广播并丢弃该帧。
Switch SW1 will block the broadcast and drop the frame 交换机SW1会将广播从除源端口之外的所有交换机端口转发出去。
这会在网络中造成无限循环。
Switch SW1 will forward the broadcast out all switch ports, except the originating port. This will generate an endless loop in the network.交换机SW1会将广播从除源端口之外的所有交换机端口转发出去。
而该网络中的所有主机则通过向主机PC1发送单播帧来回应。
Switch SW1 will forward the broadcast out all switch ports, except the originating port. All hosts in the network will reply with a unicast frame sent to host PC1交换机SW1会将该通信作为单播帧从除源端口之外的所有交换机端口转发出去。
而该网络中的所有主机则通过向交换机SW1发送单播帧来回应。
Switch SW1 will forward the traffic out all switch ports except the originating port as a unicast frame. All hosts in the network will reply with a unicast frame sent to switch SW1.2请参见图示。
思科CCNA第三学期期末考试完整版
参加考试-ESwitchingFinalExam-CCNAExploration:LAN交换和无线(版本4.0)以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSIDOFDMWEPDSSS分层网络模型具有哪三项优点?(选择三项。
)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化在将Catalyst交换机迁移到其它VTP管理域之前,应该进行哪三项任务?(项。
)选择正确的VTP模式和版本。
使用新管理域的名称配置交换机。
从新域中的VTP服务器上下载VTP数据库。
配置新域内的VTP服务器,使其识别该交换机的BID。
重置VTP计数器,使交换机可与新域内的其它交换机同步。
检验交换机的配置修订版号是否比新域内的其它交换机的低。
下列哪两种说法正确地描述了生成树协议?(选择两项。
)它只在第2层使用。
它在交换机上配置。
它消除了网络拓扑中的第2层环路。
它限制了端口上所允许的有效MAC地址的数量。
它使VLAN信息得以传播到网络中的其它交换机。
下列哪种方法可建立用于配置LinksysWRT300N无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。
以物理方式连接到接入点,然后重新启动计算机以启动配置软件。
在接入点所在的IP子网内的计算机上的web浏览器中输入接入点的默认址。
修改与接入点连接的计算机的TCP/IP属性,使其与接入点处于同一个然后重新启动计算机以建立连接。
请参见图示。
源地址并非0019.d2e4.d9f7的帧进入接口Fa0/24时会发生什么Fa0/24会变为error-disabled(错误-禁用)状态。
传入帧会被丢弃。
Fa0/24端口LED会关闭。
安全违规计数会增加。
可采用哪两种方法删除交换机的MAC地址表中的条目?(选择两项。
)关闭交换机电源并再次打开以清除所有动态获知的地址。
可采用clearswitching-tables命令删除静态配置的条目。
思科 ccna第三册final试题及答案
思科第三册final 试题及答案1请参见图示。
下列哪三种说法描述了 Host1 和 Host2 无法通信的原因?(选择三项。
)交换机端口处于不同的 VLAN 中。
交换机的 IP 地址在错误的子网中。
主机被配置在不同的逻辑网络中。
需要路由器在 Host1 与 Host2 之间转发流量。
每个 VLAN 中的 VLAN 端口必须连续分配。
主机的默认网关地址必须处于同一个逻辑网络中。
2请参见图示。
主机 PC_A 和主机 PC_B 同时发送流量,来自这两台发送站的帧发生了冲突。
最突信号的是哪台设备?集线器 HB1交换机 SW1路由器 R1交换机 SW2路由器 R2交换机 SW43请参见图示。
在生成树协议中,“学习”表示什么意思?交换机正在发送并接收数据帧。
交换机并未接收 BPDU,但正在发送并接收数据。
交换机正在通过转发收到的 BPDU 参与选举过程。
交换机正在接收 BPDU 并填充 MAC 地址表,但并未发送数据。
4请参见图示。
RTB 被配置为进行传统的 VLAN 间路由。
RTB 可以 ping 通计算机 A 但无法 pin 机 B。
此故障的原因可能是什么?Fa0/11 端口处于错误的 VLAN 中。
RTB 上没有有效的路由协议。
计算机 B 的 IP 地址在错误的逻辑网络中。
路由器的 Fa0/1 接口上配置了错误的中继封装类型。
5请参见图示。
网络管理员已将网络划分为两个 VLAN,R1 和 S1 的配置如图所示。
但是,PC1 无法问题很可能出在哪里?R1 上未配置路由协议。
S1 的 Fa0/1 端口不是中继端口。
S1 上未设置默认网关地址。
S1 和 R1 之间只配置了一条物理链路用于 VLAN 间路由。
6单臂路由器 VLAN 间路由有哪三项特征?(选择三项。
)需要使用 VTP需要使用子接口减少广播域的数量使用过多 VLAN 时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于 VLAN 间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口7请参见图示。
思科第三学期期末考试答案
请拜会图示。
所有中继链路工作正常,而且赞同所有VLAN 使用所有中继链路。
计算机 5 发ARP 央求。
哪台或哪些设备会收到此信息?仅计算机 4计算机3和 RTR-A计算机4和 RTR-A计算机1、计算机2、计算机 4 和 RTR-A计算机1、计算机2、计算机3、计算机 4和 RTR-A所有计算机和路由器以下关于在接入点上启用开放式身份考据的陈述,哪一项为哪一项正确的?不需要身份考据使用 64 位加密算法需要使用身份考据服务器需要共同商定的密码精选文库请拜会图示。
该交换机用于让图中所示部门的成员实现连接,但不存在路由。
连接到 Fa0/22 应该能够与 accounting VLAN 中的用户通信。
以下哪项更正可实现所需通信?将该用户连接到Gi0/1 。
将该用户连接到Fa0/6 。
将该用户增加到本征VLAN 。
将该用户增加到默认VLAN 。
分层网络模型拥有哪三项优点?(选择三项。
)Option 1,36 带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障消除工作简化以下关于新交换机默认配置的说法中哪三项正确?(选择三项。
)Option 3,46—2禁用了生成树协议。
使能口令被配置为cisco 。
所有交换机端口都被分配给VLAN1 。
闪存目录中包含IOS 映像。
VLAN1 配置有管理IP 地址。
所有接口均设置为自动协商速度和双工模式。
请拜会图示。
近来安装了 SW1 用于取代集线器。
主机 1 和主机 4 同时传达数据。
网络设备会此事件?(选择两项。
) Option 23当矛盾发生时,会调用回退算法。
由于主机 1 和主机 4 都连接到交换机,因此不会发生矛盾。
交换机将依照交换机MAC 地址表中的信息将数据转发到相应的端口。
主机 2 和主机 3 会获分配更短的回退值,从而获得接见介质的优先权。
为了防范再发生矛盾,交换机遇在设准时间内拥塞与主机2、主机 3 和主机 4 连接的端口以下哪一项正确描述了第 2 层交换机的功能? Option 2它在不相同LAN 网段之间路由数据包。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1Which statement is true when VTP is configured on a switched network that incorporates VL VTP is only compatible with the 802.1Q standard.VTP adds to the complexity of managing a switched network.VTP allows a switch to be configured to belong to more than one VTP domain.VTP dynamically communicates VLAN changes to all switches in the same VTP domain.2 What are two features of VTP client mode operation? (Choose two.)unable to add VLANscan add VLANs of local significanceforward broadcasts out all ports with no respect to VLAN informationcan only pass VLAN management information without adopting changescan forward VLAN information to other switches in the same VTP domain3Refer to the exhibit. Switch S1 is in VTP server mode. Switches S2 and S3 are in client mod administrator accidentally disconnects the cable from F0/1 on S2. What will the effect be on S2 will automatically transition to VTP transparent mode.S2 will remove all VLANs from the VLAN database until the cable is reconnected.S2 will retain the VLANs as of the latest known revision, but will lose the VLANs if it is re S2 will automatically send a VTP request advertisement to 172.17.99.11 when the cable reconnected.4Refer to the exhibit. All switches in the VTP domain are new. Switch SW1 is configured as a server, switches SW2 and SW4 are configured as VTP clients, and switch SW3 is configured transparent mode. Which switch or switches receive VTP updates and synchronize their VLA configuration based on those updates?All switches receive updates and synchronize VLAN information.Only switch SW2 receives updates and synchronizes VLAN information.Only switches SW3 and SW4 receive updates and synchronize VLAN information.SW3 and SW4 receive updates, but only switch SW4 synchronizes VLAN information.5Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VT management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Sw VLAN does not show up on the other switches. What is the reason for this?VLANs cannot be created on transparent mode switches.Transparent mode switches do not forward VTP advertisements.VLANs created on transparent mode switches are not included in VTP advertisements.Server mode switches neither listen to nor forward VTP messages from transparent mod switches.6Refer to the exhibit. S2 was previously used in a lab environment and has been added to the production network in server mode. The lab and production networks use the same VTP dom so the network administrator made no configuration changes to S2 before adding it to the pro network. The lab domain has a higher revision number. After S2 was added to the production many computers lost network connectivity. What will solve the problem?Reset the revision number on S2 with either the delete VTP command or by changing th name and then changing it back.Re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so that they propa throughout the network.Change S1 to transparent VTP mode to reclaim all VLANs in vlan.dat and change back t mode.Change S2 to client mode so the VLANs will automatically propagate.7 What does a client mode switch in a VTP management domain do when it receives a summaadvertisement with a revision number higher than its current revision number?It suspends forwarding until a subset advertisement update arrives.It issues an advertisement request for new VLAN information.It increments the revision number and forwards it to other switches.It deletes the VLANs not included in the summary advertisement.It issues summary advertisements to advise other switches of status changes.8 What causes a VTP configured switch to issue a summary advertisement?A five-minute update timer has elapsed.A port on the switch has been shutdown.The switch is changed to the transparent mode.A new host has been attached to a switch in the management domain.9 Which two statements are true about VTP pruning? (Choose two.)Pruning is enabled by default.Pruning can only be configured on VTP servers.Pruning must be configured on all VTP servers in the domain.VLANs on VTP client-mode switches will not be pruned.Pruning will prevent unnecessary flooding of broadcasts across trunks.10 Which three VTP parameters must be identical on all switches to participate in the same VTP(Choose three.)revision numberdomain namepruningmodedomain passwordversion number11Refer to the exhibit. All switches in the network participate in the same VTP domain. What ha when the new switch SW2 with a default configuration and revision number of 0 is inserted in existing VTP domain Lab_Network?The switch operates as a VTP client.The switch operates in VTP transparent mode.The switch operates as a VTP server and deletes the existing VLAN configuration in the The switch operates as a VTP server, but does not impact the existing VLAN configuratio domain.The switch operates as a VTP server in the default VTP domain and does not effect the configuration in the existing VTP domain.12Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to VLAN information. The network administrator issued the show vtp status command to troub the problem. On the basis of the provided command output, what could be done to correct th problem?Switch SW2 must be configured as a VTP client.The switches must be interconnected via an access link.The switches must be configured with the same VTP domain name.Both switches must be configured with the same VTP revision number.13Refer to the exhibit. Switch1 is not participating in the VTP management process with the oth switches that are shown in the exhibit. What are two possible explanations for this? (Choose Switch1 is in client mode.Switch2 is in server mode.Switch2 is in transparent mode.Switch1 is in a different management domain.Switch1 has end devices that are connected to the ports.Switch1 is using VTP version 1, and Switch2 is using VTP version 2.14Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)If this switch is added to an established network, the other VTP-enabled switches in the domain will consider their own VLAN information to be more recent than the VLAN inform advertised by this switch.This switch shows no configuration revision errors.This switch has established two-way communication with the neighboring devices.This switch is configured to advertise its VLAN configuration to other VTP-enabled switch same VTP domain.This switch is configured to allows the network manager to maximize bandwidth by restric to specific network devices.15Refer to the exhibit. What information can be learned from the output provided?It verifies the configured VTP password.It verifies the VTP domain is configured to use VTP version 2.It verifies VTP advertisements are being exchanged.It verifies the VTP domain name is V1.16 Which two statements describe VTP transparent mode operation? (Choose two.)Transparent mode switches can create VLAN management information.Transparent mode switches can add VLANs of local significance only.Transparent mode switches pass any VLAN management information that they receive t switches.Transparent mode switches can adopt VLAN management changes that are received fro switches.Transparent mode switches originate updates about the status of their VLANS and inform switches about that status.17 Which two statements are true about the implementation of VTP? (Choose two.)Switches must be connected via trunks.The VTP domain name is case sensitive.Transparent mode switches cannot be configured with new VLANs.The VTP password is mandatory and case sensitive.Switches that use VTP must have the same switch name.18 A network administrator is replacing a failed switch with a switch that was previously on the nWhat precautionary step should the administrator take on the replacement switch to avoid in VLAN information from propagating through the network?Enable VTP pruning.Change the VTP domain name.Change the VTP mode to client.Change all the interfaces on the switch to access ports.19 What statement describes the default propagation of VLANs on a trunked link?only VLAN 1all VLANsno VLANsthe native VLAN20 How are VTP messages sent between switches in a domain?Layer 2 broadcastLayer 2 multicastLayer 2 unicastLayer 3 broadcastLayer 3 multicastLayer 3 unicast。