2010年最近鸿鹄论坛cisco题库卷四

合集下载

鸿鹄论坛_单选1-50

鸿鹄论坛_单选1-50

1.Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.)参考图示。

位于会怎么做当它接收到数据帧显示吗?(选择三个)。

2.Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)参考图示。

这三个报表正确描述网络设备?(选择三3.Which layer in the OSI reference model is responsible for determining the availability of the receivingprogram and checking to see if enough resources exist for that communication?在OSI参考模型层负责确定接收的可用性程序和检查是否足够的资源存在的沟通吗?4.Which of the following describes the roles of devices in a WAN? (Choose three.下列哪个描述的角色在广域网设备?(选择三个。

5.Refer to the exhibit, Host A pings interface S0/0 on router 3, what is the TTL value for that ping? 参考图示,主机ping路由器界面S0/0 3,萍的TTL值是什么?6.A network administrator is verifying the configuration of a newly installed host by establishing an FTPconnection to a remote server. What is the highest layer of the protocol stack that the nework administratoris using for this operation?网络管理员验证的配置是一个新安装的主机通过建立FTP连接到远程服务器。

CISCOCCNA网络工程师题库

CISCOCCNA网络工程师题库

培训大讲堂官方YY 频道:3660mCCNA题库考试代号: 640-802考试时间:英文110+30=140分钟通过分数: 825鸿鹄论坛招募CCNA、CCNP答疑讲师答疑地点:鸿鹄官方YY频道3660V104系列是官方的终结版本,以后不会再出V105 V106 V108等等========================================更新内容:增加5道新题,分别是519、520、521、522、523题修改176题、375题、443题、482题答案错误修改59题、88题、453题、107题、270题注释错误增加个别疑难拖图题注释,优化实验题=============================================QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode(当您登录到交换机,哪种提示表明你在特权模式?)A. %B. @C. >D. $E. #Answer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:特权模式就是#提示符QUESTION 2Which command shows system hardware and software version information(哪些命令显示系统硬件和软件的版本信息?)A. show configurationB. show environmentC. show inventoryD. show platformE. show versionAnswer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:查看系统的软件和硬件信息使用的命令是show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the(思科Catalyst 交换机CAT1 和CAT2 有它们之间的连接使用端口FA0/13。

鸿鹄论坛_CCNA题库V104[1].3_93Q(题库改版后新题目)

鸿鹄论坛_CCNA题库V104[1].3_93Q(题库改版后新题目)

培训大讲堂官方YY 频道:3660鸿鹄论坛:CCNA 题库考试代号:640-802考试时间:英文110+30=140分钟通过分数:825题库版本:V104.3鸿鹄联合百家权威培训机构共同开展公益性技术讲座,百家培训机构名师将循环开讲,针对重要的知识点,针对工作中的技术应用,针对以后的人生规划,都将进行权威和详细的讲解。

鸿鹄希望通过鸿鹄大讲堂的活动,为迷茫的学员指点迷津,激发起学员的求知欲望,同时搭建起网络技术的交流平台,让更多的人了解思科,了解网络,走向IE 。

鸿鹄大讲堂:/thread-46172-1-1.html 培训大讲堂官方YY 频道:3660CCNA 题库战报交流QQ 群:5704060(500人超级群)CCNA 题库战报交流区:/forum-261-1.html 1000G 视频教程免费下载:/forum-228-1.htmlb bs .h h010.c o mExam AQUESTION 1Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12on a switch?(choose two)A.SW1#show swithport port-security interface FastEthernet 0/12B.SW1# show swithport port-secure interface FastEthernet 0/12C.SW1# show port-secure interface FastEthernet 0/12D.SW1#show running-configAnswer: CDQUESTION 2Which component of VPN technology ensures that data can be read only by its intended recipient?A.data integrity B.encryption C.key exchange D.authenticationAnswer: DQUESTION 3Refer to the exhibit.What is the effect of the configuration that is shown?A.It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B.Itconfigures a cisco network device to use the SSH protocol on incoming communications via the virtualterminal ports.C.It allows seven failed login attempts before the VTY lines are temporarily shutdown.D.It configures the virtual terminal lines with the password 030752180500.E.It configures SSH globally for all logins.Answer: BQUESTION 4Which IPV6 routing protocol uses multicast group FF02::8 to send updates?A.RIPng B.OSPFv3C.IS-IS for IPv6D.staticAnswer: Cb b s .h h 010.co m完整正确地组件接受者Which of the following are true regarding the debug output shown in the graphic?(choose two)A.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#version 2RtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0B.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0work 10.0.0.0 will be displayed in the routing table.work 192.168.168.0 will be displayed in the routing table.E.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 192.168.1.0RtrA(config-router)#network 10.0.0.0RtrA(config-router)#network 192.168.168.0F.split-horizon was disabled on this router.Answer: BCQUESTION 6The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?A.10.10.0.0/18 subnetted with mask 255.255.255.252B.10.10.0.0/25 subnetted with mask 255.255.255.252C.10.10.0.0/24 subnetted with mask 255.255.255.252D.10.10.0.0/23 subnetted with mask 255.255.255.252E.10.10.0.0/16 subnetted with mask 255.255.255.252Answer: Db b s .h h 010.co mVLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3commmand interface configuration mode?A.The command is accepted and the respective VLAN is added to vlan dat.B.The command is rejected.C.The command is accepted and you must configure the VLAN manually.D.The port turns amber.Answer: AQUESTION 8Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?A.link bandwidth B.hop count C.link costD.administrative distanceE.link delayAnswer: DQUESTION 9Refer to the exhibit. In the Frame Relay network, which ip address would be assigned to the interfaces with point-to-poin PVCs?A.DLCI 16:192.168.10.1/24DLCI 17:192.168.10.2/24DLCI 99:192.168.10.3/24DLCI 28:192.168.10.4/24b b s .h h 010.co m已接受B.DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.11.2/24C.DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.12.1/24DLCI 28:192.168.13.1/24D.DLCI 16:192.168.10.1/24DLCI 17:192.168.10.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.10.3/24Answer: BQUESTION 10Why will a switch never learn a broadcast address?A.Broadcast frames are never sent to swiches.B.Broadcast addresses use an incorrect format for the switching table.C. A broadcast address will never be the source address of a frame.D.Broadcasts only use network layer addressing.E.A broadcast frame is never forwarded by a switch.Answer: CQUESTION 11Wich command can you use to manually assign a static IPV6 address to a router interface?A.ipv6 address PREFIX_1::1/64B.ipv6 autoconfig 2001:db8:2222:7272::72/64C.ipv6 autoconfigD.ipv6 address 2001:db8:2222:7272::72/64Answer: DQUESTION 12The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?b b s .h h 010.co m手动的work 172.26.168.0 area 478work 172.26.0.0work 172.26.168.128 0.0.0.127work 172.26.168.128 area 478Answer: BQUESTION 13Which IPsec security protocol should be used when confidentiality is required?A.AHB.MD5C.PSKD.ESPAnswer: DQUESTION 14What is the function of the command switchport trunk native vlan 999 on a…(此处文字不清楚).?A.It designates VLAN 999 for untagged traffic.B.It blocks VLAN 999 traffic from passing on the trunk.C.It creates a VLAN 999 interface.D.It designates VLAN 999 as the default for all unkown tagged traffic.Answer: DQUESTION 15Which command can be used from a PC to verfy the connectivity between host that connect thro…(字体不清)…?A.tracert address B.ping address C.arp addressD.traceroute addressAnswer: AQUESTION 16In which solution is a router ACL used?A.protecting a server frome unauthorized accesB.controlling path selection,based on the route metricC.reducing router CPU utilizationD.filterring packets that are passing through a routerAnswer: DQUESTION 17Which statement is true, as relates to classful or classless routing?b b s .h h 010.co m安全机密性与...有关A.RIPV1 and OSPF are classless routing protocols.B.Classful routing protocols send the subnet mask in routing updates.C.Automatic summarization at classful boundaries can cause problems on disc……D.EIGRP and OSPF are classful routing protocols and summarize routes by def……Answer: CQUESTION 18A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How can you accomplish this task,using the fewest physical interfaces and without decreasing networkperformance?A.Add two more FastEthernet interfaces.B.Add a second router to handle the vlan traffic.e a hub to connect the four vlans with a FastEthernet interface on router.D.Implement a router-on-a-stick configuration.Answer: DQUESTION 19Refer to the exhibit.How many broadcast domains are configured on switch2?A.5B.20C.4D.1Answer: CQUESTION 20What is the effect of using the service password-encryption command?A.nly passwords configured after the command has been entered will be encrypted.B.Only the enable password will be encrypted.C.Only the enable secret password will be encryptedD.It will encrypt the secret password and remove the enable secret password from the configuration.E.It will encrypt all current and future passwords.Answer: Eb b s .h h 010.co m边界性能减少现在的QUESTION 21Refer to the exhibit.A technician has installed SwithchB and needs to configure it for remote access from the management workstation connected SwitchA Which set of commands is required to accomplish this task?A.SwitchB(config)#interface FastEthernet 0/1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdownB.SwitchB(config)#ip default-gateway 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdown C.SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0SwitchB(config)#no shutdownD.SwitchB(config)#ip default-network 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdownAnswer: BQUESTION 22Refer to the exhibit.The speed of all serial links is E1 and the speed of the all Ethernet links is 100Mb/s.A static route will be established on the Manchester router to the direct traffic toward the internet over the most direct path available.What configuration on the Manchester router will establish a router toward the internet for traffic that originates from workstation on the Manchester LAN?b b s .h h 010.co mA.ip route 0.0.0.0 255.255.255.0 172.16.100.2B.ip route 0.0.0.0 255.255.255.252 128.107.1.1C.ip route 0.0.0.0 0.0.0.0 128.107.1.1D.ip route 0.0.0.0 0.0.0.0 172.16.100.1E.ip route 0.0.0.0 255.255.255.255 172.16.100.2F.ip route 0.0.0.0 0.0.0.0 172.16.100.2Answer: FQUESTION 23What Frame Relay mechanism is used to build the map illustrated in the accompanying graphic?A.inverse multiplexingB.LMI mapingC.Inverse ARPD.ARPE.Proxy ARPAnswer: CQUESTION 24Refer to the exhibit.A network engineer is troubleshooting an internet connectivity problem on the computer.What is causing the problem?b b s .h h 010.co m机制阐明多路复用A.wrong DNS serverB.wrong default gatewayC.incorrect IP addressD.incorrect subnet maskAnswer: CQUESTION 25How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?b b s .h h 010.co mA.oneB.sixC.twelveD.twoAnswer: AQUESTION 26How dose a DHCP server dynamically assign IP address to host?A.Addresses are allocated after a negotiation between the server and the host to determine the length ofthe agreement.B.Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address mustbe made ,and another address is then assigned.C.Addresses are leased to host.A host will usually keep the same address by periodically contacting theDHCP sever to renew the lease.D.Addresses are permanently assigned so that the host uses the same address at all times.Answer: CQUESTION 27Which type of EIGRP route entry describes a feasible successor?A. a primary route,stored in the routing tableB. a backup route,stored in the routing tableC. a backup route,stored in the topology tableD. a primary route,stored in the topology tableAnswer: CQUESTION 28What is the purpose of the inverse ARP?A.to map a known DLCI to an IP addressB.to map a known IP address to a MAC addressC.to map known SPID to a MACaddressD.to map a known DLCI to a MAC addressE.to map a known IP address to a SPID.F.to map a known MAC address to an IP addressAnswer: AQUESTION 29What is the default maximum number of equal-cost paths that can be placed into the routing of a ciscoOSPF router?A.16B.2C.unlimitedD.4Answer: Db b s .h h 010.co m永久地条目主要的用途放置无限制的QUESTION 30Which IPV6 routing protocol uses multicast group FF02::9 to send updates?A.RIPng B.OSPFv3C.staticD.IS-IS for IPv6Answer: AQUESTION 31What are two benefits of using NAT?(choose two)A.NAT protects network security because private networks are not advertised.B.NAT accelerates the routing process because no modifications are made on the packets.C.Dynamic NAT facilitates connections from the outside of the network.D.NAT facilitates end-to-end communication when IPsec is enable.E.NAT eliminates the need to re-address all host that require extemal access.F.NAT conserves addresses through host MAC-level multiplexing.Answer: AEQUESTION 32Which three statements about RSTP are true?(choose three)A.RSTP significantly reduces topology reconverging time after a link failure.B.RSTP expends the STP port roles by adding the alternate and backup roles.C.RSTP port atates are blocking,discarding,learing,or forwarding.D.RSTP also uses the STP proprsal-agreement sequence.E.RSTP use the same timer-baseed process as STP on point-to-point links.F.RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.Answer: ABFQUESTION 33Refer to the exhibit.The serial0/0 interface of the Tampa router connects the Oriando router.Which two statements are true about the connection between these two routers?(choose two)b b s .h h 010.co m消除使加快A.The only device with which the Tampa router will negotiate a data link is the Orlando router.B.The link is addressed on the *zero*subnet 10.0.0.0 network.C.The link uses a three-way handshake for authentication.D.The link uses a two-way handshake for authentication.E.Data exchanges between the Oriando and Tampa routers are encrypted.Answer: BCQUESTION 34A switch is configured as a vtp sever with a domain name of CCNA.Which cisco ios privileged modecommand,followed by a reload of the swith,will reset the VTP management domain name of the switch to a NULL value?A.#vtp domain unset B.#delete vlan.dat C.#no vtp domain D.#vtp domain nullAnswer: BQUESTION 35If an Ethernet port on a router was assigned an IP address of 172.1.1.1/20,what is the maximum number of hosts allowed on this subnet?A.4094B.1024C.8190D.2046b b s .h h 010.co mE.4096Answer: AQUESTION 36Which two statements about static NAT translations are true?(choose two)A.They are always present in the NAT table.B.They allow connection to be initiated from the outside.C.They can be configured with access lists, to allow two or more connections to be initiated from theoutside.D.They require no inside or outside interface markings because addresses are statically defined.Answer: ABQUESTION 37Which of these represents an IPv6 link-local address?A.FE08::280e:611:a:f14f:3d69B.FE81::280f:512b:e14f:3d69C.FE80::380e:611a:e14f:3d69D.FEFE:0345:5f1b::e14d:3d69Answer: CQUESTION 38What are three features of the IPV6 protocol?(choose three)plicated header B.plug-and-play C.no broadcasts D.checksums E.optional IPsec F.autoconfigurationAnswer: BCFQUESTION 39Assuming default setting,how can you erase the VTP database of VLANs on a CISCO IOS switch running in VTP server mode?A.Enable VTP pruningB.From privileged mode ,erase the startup configuration file,then reload.C.From privileged mode ,erase the vlan date file, then reload.D.Cycle the switch power.Answer: CQUESTION 40Refer to the exhibit.which address and mask combination a summary of the routes learned by EIGRP?b b s .h h 010.co m出现A.192.168.25.0 255.255.255.240B.192.168.25.16 255.255.255.252C.192.168.25.0 255.255.255.252D.192.168.25.28 255.255.255.240E.192.168.25.16 255.255.255.240F.192.168.25.28 255.255.255.240Answer: EQUESTION 41Refer to the exhibit A frame on vlan 1on switch s1 is sent to switch s2 when the frame is received on vlan 2,what causes this behavior?A.trunk mode mismatchesb b s .h h 010.co mB.vlans that do not correspond to a unique IP subnetC.native vlan mismatchesD.allowing only vlan 2 on the destination.Answer: CQUESTION 42Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator ′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.Answer: BQUESTION 43What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A.lowest port MAC addressB.port priority number and MAC address.C.VTP revision numberD.highest port priority number.E.path costAnswer: EQUESTION 44Refer to the exhibit.Router 1 was just successfully rebooted.identify the current OSPF router ID for Router 1.b b s .h h 010.co m适当的Answer: AEQUESTION 48A company has a small network,consisting of a single switch and a single router.The switch has been configured with two vlans,and route-on-a-stick is being configured on the router for inter-vlan routing.A trunk is configured to connect the switch to the router.What is the minimum number of router subinterfaces that are required for all the vlans to communicate?A.one B.three C.two D.zeroAnswer: CQUESTION 49Which command can be a router to verify the layer 3 path to a host?A.traceroute address B.tracert address C.ssh address D.telnet addressAnswer: AQUESTION 50Which dose the frame-relay interface-dlc i command configure?A.remote DLCI on the main interface B.local DLCI on the main interface C.local DLCI on the subinterface D.remote DLCI on the subinterfaceAnswer: CQUESTION 51What is the OSPF default frequency,in seconds,at which a cisco router sends hello packets on a multi-access network?A.10B.40C.30D.20Answer: AQUESTION 52Refer to the exhibt.Host A has tested connectivity to a remote network.What is the default gateway for host A?b b s .h h 010.co m频率A.172.16.182.1B.192.168.1.1C.10.16.176.1D.192.168.1.6Answer: AQUESTION 53Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?A.transport type allB.transport output allC.transport preferred allD.transport input allAnswer: DQUESTION 54Which command shows your active Telnet connections?A.show sessionB.show cdp neighborsC.show usersD.show queueAnswer: AQUESTION 55Which two states are the port states when RSTP has converged?(choose two)A.blocking B.learning C.disabled D.forwarding E.listeningAnswer: ADb b s .h h 010.co m另外的活动的队列QUESTION 56There are no boot system commands in a router configuration in NVRAM.What is the fallback sequence that router will use to find an ios during reload?A.Flash,TFTP server,ROM B.Flash,NVRAM,ROMC.ROM,NVRAM,TFTP serverD.NVRAM,TFTP server,ROME.TFTP server,Flash,NVRAMAnswer: A QUESTION 57Refer to the graphic.A host is connected to switch port Fa0/3 with a crossover cable.The host and switch have…as shown.However,the port indicator on switch port Fa0/3 is not on,and the host can notcommunicate with…to vlan 2 on the same switch.Based on the information given.what is the problem?A.The switch has been assigned an incorrect subnet mask.B.Switch port FA0/3 is not configured as a trunk port C.Switch port FA0/3 has been blocked by STPD.The switch and the hosts must be in the same subnetE.The cable is the wrong typeAnswer: E QUESTION 58Refer to the exhibit.Which user-mode password has just been set?A.Telnet B.Auxiliary C.SSH D.Consoleb b s .h h 010.co mAnswer: AQUESTION 59DNS servers provide what service?A.they run a spell check on host names to ensure accurate routing B.they map individual hosts to their specific IP address C.they convert domain names into IP addressD.Given an IP address,they determine the name of the host that is…Answer: CQUESTION 60Which command enables RSTP on a switch?A.spanning-tree mode rapid-pvst B.spanning-tree uplinkfast C.spanning-tree backbonefast D.spanning-tree mode mstAnswer: AQUESTION 61Which two are features of IPv6?(choose two)A.multicast B.broadcast C.allcast D.podcast E.anycastAnswer: AEQUESTION 62Which statement about access lists that are applied to an interface is true?A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocol C.you can place as many access lists as you want on any interface D.you can apply ony one access list on any interfaceAnswer: DQUESTION 63Which item represents the standard IP ACL?A.access-list 50 deny 192.168.1.1 0.0.0.255B.access-list 110 permit ip any anyC.access-list 2500 deny tcp any host 192.168.1.1 eq 22D.access-list 101 deny tcp any host 192.168.1.1b b s .h h 010.co m精确的Answer: AQUESTION 64What is one benefit of PVST+?A.PVST+reduces the CPU cycles for all the switches in the networkB.PVST+automatically selects the root bridge location,to provide optimiz…C.PVST+allow the root switch location to be optimized per vlan.D.PVST+supports Layer 3 load balancing without loops.Answer: CQUESTION 65The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router.Which of the following statement is true concering this command?A.The broadcast option allows packets,such as RIP updates,to be forwarded access the PVC.B.The command shoud be executed from the goble configuration mode.C.102 is he remote DLCI that will recive the information.D.The ip address 10.121.16.8 is the local router port used to forward date.E.This command is required for all Frame Rely configurationsAnswer: A QUESTION 66Refer to the exhibit,how many interfaces on R1 should be configured as ip nat inside to grant external access to the entire….?A.1B.3C.4D.5b b s .h h 010.co m就...而言Answer: CQUESTION 67Which can be done to secure the virtual terminal interfaces on a router?(choose two)A.Administratively shut down the interfaces.B.Physically secure the interfaces.C.Configure a virtual terminal password and login process.D.Enter an access list and apply it to the terminal interfaces using the access-class command.E.Create an access list and apply it to the terminal interfaces using the access-group command. Answer: CDQUESTION 68moc.1hh.sbbRefer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?A. A level 5 password is not setB.The vty password is missingC.The console password is missingD.An ACL is blocking Telnet access Answer: BQUESTION 69Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?A.L2TP B.IPsec C.PPTP D.RSAAnswer: BQUESTION 70Your boss is learning a CCNA training course, refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two)access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnet access-list 101 permit ip any any A.source ip address: 192.168.15.5; destination port: 21B.source ip address:, 192.168.15.37 destination port: 21C.source ip address:, 192.168.15.41 destination port: 21D.source ip address:, 192.168.15.36 destination port: 23E.source ip address: 192.168.15.46; destination port: 23F.source ip address:, 192.168.15.49 destination port: 23Answer: DEQUESTION 71Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? (Choose two)b b s .h h 010.co mA.Router(config)# interface fa0/0Router(config-if)# ip access-group 101 out B.Router(config)# interface fa0/0Router(config-if)# ip access-group 101 inC.Router(config)# access-list 101 deny ip host 172.16.161.150 host 172.16.162.163Router(config)# access-list 101 permit ip any anyD.Router(config)# access-list 101 deny ip 172.16.161.150 0.0.0.255 172.16.162.163 0.0.0.0Router(config)# access-list 101 permit ip any any Answer: BCQUESTION 72An access list was written with the four statements shown in the graphic. Which single access liststatement will combine all four of these statements into a single statement that will have exactly the same effect?A.access-list 10 permit 172.29.16.0 0.0.0.255B.access-list 10 permit 172.29.16.0 0.0.1.255C.access-list 10 permit 172.29.16.0 0.0.3.255D.access-list 10 permit 172.29.16.0 0.0.15.255E.access-list 10 permit 172.29.0.0 0.0.255.255Answer: CQUESTION 73A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?A.access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23access-list 101 permit ip any anyB.access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23access-list 101 permit ip any anyC.access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21access-list 1 permit ip any anyD.access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23access-list 1 permit ip any any Answer: Ab b s .h h 010.co m完全正确作用QUESTION 74As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?A.access-list 101 inB.access-list 101 outC.ip access-group 101 inD.ip access-group 101 outAnswer: CQUESTION 75The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN:access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be deniedAnswer: DQUESTION 76The access control list shown in the graphic has been applied to the Ethernet interface of router R1 using the ip access-group 101 in command. Which of the following Telnet sessions will be blocked by this ACL?(Choose two)b b s .h h 010.co m外出的A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8Answer: BDQUESTION 77The following configuration line was added to router R1Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?A.ermit all packets matching the first three octets of the source address to all destinationsB.permit all packet matching the last octet of the destination address and accept all source addressesC.permit all packet matching the host bits in the source address to all destinationsD.permit all packet from the third subnet of the network address to all destinationsAnswer: AQUESTION 78Refer to the exhibit. Which statement describes DLCI 17?A.DLCI 17 describes the ISDN circuit between R2 and R3.B.DLCI 17 describes a PVC on R2. It cannot be used on R3 or R1.C.DLCI 17 is the Layer 2 address used by R2 to describe a PVC to R3.D.DLCI 17 describes the dial-up circuit from R2 and R3 to the service provider.Answer: CQUESTION 79A default Frame Relay WAN is classified as what type of physical network?A.point-to-pointB.broadcast multi-accessC.nonbroadcast multi-accessD.nonbroadcast multipointE.broadcast point-to-multipointAnswer: Cb b s .h h 010.co m。

201003全国计算机等级考试四级网络工程师试题及答案

201003全国计算机等级考试四级网络工程师试题及答案

2010年3月计算机等级考试四级网络工程师笔试真题一、选择题(1)TTC标准OC-3的传输速率为A) 512.4 MbpsB)155.52 MbpsC)622.08 MbpsD)…. Mbps(2)102.11n将传输速率提高到A)11 MbpsB)22 MbpsC)54 MbpsD)100 Mbps(3)下列不属于宽带城域网QaS保证技术的是A)RSVPB)DoffServC)MPLSD)WIMAY(4)下列关于城域网技术的描述正确的是A)建设同样规模的宽带城域网,采用10G光以太网的造价高于..B)RoR是一种用于直接在…..上高效传输IP分组的传输技术C)早期的 SONETSDH不适合于传输IP分组D)DPT由Cisco公司提出(5)下列关于路由器技术的描述中,错误的是A)路由器的包转发能力与路由器的…端口速率、包长度、..B)转化率通常是衡量路由器中传输效率的性能C)突发处理能力是以最大的速率传送数据包而不引起丢失的最大传输速率来衡量D)路由器的冗余是为了保证设备的可靠性与可用性(6)一台交换机具有24个10/100Mbps端口和2个1000Mbps端口,如果所有端口都工作在全双工方式,那么交换机总带宽应为A)60 GbpsB)64 GbpsC)68 GbpsD)88 Gbps(7)(8)一下IP地址中,不属于专用IP地址的是A)10.1.8.1B)172.12.8.1C)172.30.8.1D)192.168.8.1(9)下图是网络地址转换NAT的一个示例根据图中信息。

标号为②的方格中的内容为A)S=59.171.1,1234D=133.2.1.1,80B)S=59.67.1.1,1234D=10.0.1.1,80C)S=135.2.1.1,80D=10.0.1.1,1435D)S=10.0.1.1,1406D=59.67.1.1,1234(10)某公司拥有IP地址块202.113.77.0/24。

鸿鹄论坛_整理后的832题库

鸿鹄论坛_整理后的832题库

FCAPSFault Management ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ FConfiguration Management ‐‐‐‐‐‐‐ CAccounting Management ‐‐‐‐‐‐‐‐‐‐ AQuestion 2FCAPS–model defined by the International Organization for Standardization (ISO).ITIL–framework for it profTNM–network management model is the Telecommunications Standardization Sector’s (ITU-T) Cisco lifecycle–model is often referred to as the PPDIOO modelQuestion 3EEM .IP SLA‐‐‐‐‐‐‐‐‐‐‐‐‐‐ CLISDM .CNA‐‐‐‐‐‐‐‐‐‐‐‐‐‐ GUIFTP ,TFTP,SCP‐‐‐‐‐‐‐‐‐‐‐‐‐‐ BackupCLI(command-line interface,命令行界面)GUI(Graphical User Interface,图形用户界面)SDM(Security Device Manager)是Cisco公司提供的全新图形化路由器管理工具;EEM(Embeded Event Manager)是Cisco IOS的嵌入式事件管理器;1)FCAPS (network maintenance model defined by the ISO)F – FaultC – ConfigA – Accounting2) What happens when running the command: logging console warnings.1- ????2- warning, notification, error, debugging…3- just warning logging4- warning, critical, alert, emergenciesAnswer:warning, critical, alert, emergencies(Notice this line doesn’t have the word ―error‖)3) what will be alternative for:ip ftp username xxxxxxip ftp password yyyyyyAnswer:ip http client username xxxxxxip http client password yyyyyy4) Network Maintenance: Choose from the list 2 network maintaining types.Answer:Structured and Interrupt Driven5) access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1debug ip packet 199What would be the output shown on the console?Only communication between host 10.1.1.1 and host 172.16.1.16) what will happen if u configure two router as NTP server (something like that )Answer:The router will choose the best reliable server and will synchronise with it.7) The interface is up and protocol is up. When do u get these messages.%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/14, changed state to up %LINKDOWN‐3‐SERIAL:Answer:“the first message is a severity 3 log message”8)Serial line is up,protocol is also up?But cdp neighbor not working?Answer:Data link layer.9). What will happen if you configure 2 routers to be NTP servers?Answer ——– NTP preffered10). FTP username password: something like a substitute/alternative for ftp username and ftp. I didn’t understand that question about FTP. They showed y ou this:ip ftp user ciscoip ftp password ciscoT1:ospf authentication1.Client is unable to ping R1’s serial interface from the client.Problem was disable authentification on R1, check where authentication is not given under router ospf of R1. (use ipv4 Layer 3)conf R1 was:interface Serial0/0.12 point-to-pointip address 10.1.1.1 255.255.255.252ip nat insideip ospf message-digest-key 1 md5 TSHOOTrouter ospf 1log-adjacency-changesnetwork 10.1.1.0 0.0.0.3 area 12default-information originate alwaysconf R2 was:interface Serial0/0.12 point-to-pointip address 10.1.1.2 255.255.255.252ip ospf authentication message-digestip ospf message-digest-key 1 md5 TSHOOTAnswer: on R1 need comand in router modearea 12 authentication message-digestAns1) R1Ans2) ipv4 OSPFAns3) ip ospf authentication message-digest command must be given on s0/0/0T2:HSRP TRACKHSRP: DSW1 does not become active.conf on dw1:track 1 ip route 10.1.21.128 255.255.0.0 metric thresholdthreshold metric up 1 down 2track 10 ip route 10.2.21.128 255.255.255.0 metric thresholdthreshold metric up 63 down 64interface Vlan10ip address 10.2.1.1 255.255.255.0standby 10 ip 10.2.1.254standby 10 priority 200standby 10 preemptstandby 10 track 1 decrement 60Answer: (use IPv4 Layer 3 Topology)On dsw 1 interface vlan 10 mode run:no standby 10 track 1 decrement 60standby 10 track 10 decrement 60(ip for track command not exact for real exam)Ans1) DSW1Ans2) HSRPAns3) delete the command with track 1 and enter the command with track 10.T3:BGP NeighborProblem: R1 is not able to ping 209.65.200.226.configuration on R1:router bgp 65001no synchronizationbgp log-neighbor-changesnetwork 209.65.200.224 mask 255.255.255.252neighbor 209.56.200.226 remote-as 65002no auto-summarycheck bgp neighborship. **** show ip bgp sum****The neighbor’s address in the neighbor command is wrong under router BGP. (use ipv4 Layer 3)Answer: need change on router mode on R1 neighbor 209.65.200.226Ans1) R1Ans2) BGPAns3) delete the wrong neighbor statement and enter the correct neighbor address in the neighbor command (change 209.56.200.226 to 209.65.200.226)T4:NAT ACLClient is not able to ping the web server, but the routers can ping the server. NAT problem. (use ipv4 Layer 3)problem on R1 Nat aclAnswer:add to acl 1 permit ip 10.2.1.0 0.0.0.255Ans1) R1Ans2) IP NATAns3) under NAT access list, enter the command permit 10.2.0.0 0.0.255.255T5:R1 ACLClient is not able to ping the server. Except for R1, no one else can ping the server. (use ipv4 Layer 3)Problem:on R1 acl blocking ipacl something like this:deny 10.2.1.0deny 10.1.4.0deny 10.1.1.0Answer: add permit 209.65.200.224 0.0.0.3command to R1′s ACLAns1) R1Ans2) IPv4 Layer3 SecurityAns3) Add permit 209.65.200.224 0.0.0.3 to R1′s ACLT6: VLAN filterClient 1 is not able to ping the server. Unable to ping DSW1(Use L2 Diagram).Vlan Access map is applied on DSW1 blocking the ip address of client 10.2.1.3Ans1) DSW1Ans2) Vlan access mapAns3)No vlan filter 10T7:Port SecurityClient 1 is not able to ping the serverSituation: Unable to ping DSW1(User layer 2).On ASW1 portsecurity mac 0000.0000.0001, interface in err-disable stateAnswer:on asw1 delele portsecurity & do on interfaces shutdown, no shutdownAns1)ASW1Ans2)Port securityAns3)On fa1/0/1 and fa1/0/2 do disable port security and do shut, no shut.T8:SWItchport vlan 10Client 1 is not able to ping the serverSituation: Unable to ping DSW1 & in port channel configuratioin of ASW1 vlan 10 is not allowed. (Use L2 Diagram)On ASW1, on interfaces fa0/1, fa0/2 switchport access vlan 1Answer: on ASW1 change switchport access vlan 1 to switchport access vlan 10Ans1)ASW1Ans2)Access vlanAns3)give command: interface range fa1/0/1-/2 switchport access vlan 10T9:Switchport trunk.cant ping to web server 209.65.200.241Situation: Unable to ping DSW1 & in port channel configuratioin of ASW1 vlan 10 is not allowed. (Use L2 Diagram)question was about EtherChanelclient can’t obtain ip address(169.x.x.x)on ASW1 trunks allow vlan 20,200Answ: on port channel 13, 23 disables all vlans and give switchport trunk allowed vlan 10,200 Ans1)ASW1Ans2)Switch to switch connectivityAns3)int range portchannel13,portchannel23switchport trunk allowed vlan noneswitchport trunl allowed vlan 10,200T10:Eigrp asClient 1 is not able to ping the serverSituation: Unable to ping R4 fast ethernet port from dsw1.Check ip eigrp neighbors from DSW1 you will not see R4 as neighbor.(use ipv4 Layer 3)On DSW1 & DWS2 the EIGRP AS number is 10 (router eigrp 10) but on R4 it is 1 (router eigrp 1)Answ: change router AS on R4 from 1 to 10Ans1) R4Ans2) IP4 EIGRPAns3) Change eigrp AS number from 1 to 10T11:eitrp to ospfClient 1 is not able to ping the serverSituation: Unable to ping serial interface of R4 from the clients.On R4 in router eigrp:redistribute ospf 1 route-map EIGRP_to_OSPFBUT route-map was named:route-map EIGRP->OSPFAnswer:change in router eigrp router-map nameAns1) R4Ans2) route redistributionAns3) change the name of the route-map under the router EIGRP or router OSPF process from ‘to’to ‘->’.T12:IPV6 ospfIPV6 loopback of R2 cannot be pinged from DSW1’s loopback.Situation: ipv6 ospf was not enabled on R2’s serial interface connecting to R3. (use ipv6 Layer 3) Answer:interface configuration mode:ipv6 ospf 6 area 12Ans1) R2Ans2) IPV6 ospfAns3) on the serial interface of R2, enter the command ipv6 ospf 6 area 0 (make sure to check the IPV6 topology before choose Answer 3 because the options look similar)Device Error DescriptionASW11. Access port not in VLAN 102. Port Channel not allowing VLAN 103. Port SecurityDSW1 1. HSRP track 102. VLAN filterR1 1. Wrong IP of BGP neighbor2. NAT – Access list3. Redistribute access-listR2 1. IPv6: enable OSPF2. OSPF AuthenticationR4 1. EIGRP – wrong AS2. Redistribute (―to‖ & -> )1、access vlan的vlan 给错了2、port-security导致端口被errdisable3、V ACL4、EIGRP的AS号配置错误5、OSPF的authentication有问题,6、OSPF到EIGRP的redistribut的route-map名字写过了7、NA T的inside pool没有包含client的网段8、BGP的neighbor ip写错了,209.65.200.226写成了209.56.200.2269、到ISP的出接口的ACL少了一条permit10、其中一台接入交换机的Trunk allowed的VLAN少了VLAN 1011、HSRP的track语句指定有问题12、IPV6,R2的其中一个接口没有enable IPV6 OSPF1 -IPv62 -OSPF3- OSPFv34 -Frame Relay5 – GRE6 – EtherChannel7 -RIPng8 -EIGRP9 -Redistribution10 -NTP11 -NAT12 -BGP13 -HSRP14-STP15-DHCP。

0Qwceba2010年9月全国计算机四级数据库工程师试题及参考答案

0Qwceba2010年9月全国计算机四级数据库工程师试题及参考答案

七夕,古今诗人惯咏星月与悲情。

吾生虽晚,世态炎凉却已看透矣。

情也成空,且作“挥手袖底风”罢。

是夜,窗外风雨如晦,吾独坐陋室,听一曲《尘缘》,合成诗韵一首,觉放诸古今,亦独有风韵也。

乃书于纸上。

毕而卧。

凄然入梦。

乙酉年七月初七。

-----啸之记。

2010年9月计算机四级数据库工程师笔试试题及答案一、选择题(1)视图是数据库中的重要对象,下列有关视图的说法错误的是A)一般情况下,数据库只存储视图的定义,其数据仍存放在相关的基本表中B)可以将复杂的查询语句封装在视图中以简化相关查询语句的编写C)通过视图可以屏蔽不希望用户看到的敏感数据,提高数据库数据的安全性D)可以在视图的基础上建立新的视图,但这样定义的视图会导致数据库性能下降,一般不推荐使用(2)在概念数据模型中,联系用于描述现实世界中事物之间的关联关系。

一阿d关于联系的说法错误的是A)联系可用于描述一个实体集内记录之间的关联关系B)联系可用于描述两个实体集属性之间的关联关系C)ER模型通过1:1、1:n和m:n三种联系描述现实世界中各类事物之间的关联关系D)最终的IDEFIX模型中只能出现I:1和1:n两种类型的联系(3)在关系数据库中,NULL是一个特殊值,在很多数据操作中都需要对NULL进行特殊处理。

关于NULL,下列说法正确的是A)判断元组的某一列是否为NULL一般使用“=NULL”B)NULL在数据库中表示尚不确定的值C)在SQL Server 2000中执行“SELECT NULL+5”将会出现异常D)NULL只适用于字符和数值类型(4)某教务管理系统包含选课模块、成绩录入模块和学籍管理模块。

选课模块面向学校几万名学生,成绩录入模块面向学校上千名任课教师,学籍管理模块面向少量有一定权限的管理人员。

该系统是上世纪用C/S结构和相关技术开发的,为了方便用户使用,需要对系统进行升级和改造。

设有下列技术改造方案:I.选课模块和成绩录入模块采用B/S结构进行改造,学籍管理模块仍采用C/S结构II.选课模块采用B/S结构进行改造,成绩录入模块和学籍管理模块仍采用C/S结构III.选课模块、成绩录入模块和学籍管理模块均采用B/S结构进行改造Ⅳ.成绩录入模块采用B/S结构进行改造,选课模块和学籍管理模块仍采用C/S结构上述方案中,较为合理的是A)仅I和IIB)仅I、II和IIIC)仅I和IIID)仅II、III和IV(5)数据库在外存中是以文件形式组织的,组织文件记录方法的不同就形成了不同的文件结构。

鸿鹄论坛_640-802-3

鸿鹄论坛_640-802-3

A. Thetwo FastEthernet interfaces will require NAT configured on two outside serial interfaces.B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.C.The fa0/1 IP address overlaps with the space used by s0/0.D. The fa0/1 IP address is invalid for the IP subnet on which it resides.E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is shown. Answer: BE39. Refer to the exhibit. Two routers have just been configured by a new technician. All interfaces are up. However, the routers are not sharing their routing tables. What is the problem?A. Split horizon is preventing Router2 from receiving routing information from Router1.B. Router1 is configured for RIP version 2, and Router2 is configured for RIP version 1.C. Router1 has an ACL that is blocking RIP version 2.D. There is a physical connectivity problem between Router1 and Router2.E.Router1 is using authentication and Router2 is not.Answer: B40. A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have40 hosts in each of the three subnets?A. Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and198.133.219.92/27 as the new subnetworks.B. Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and198.133.219.92/27 as the new subnetworks.C. Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and198.133.219.192/26 as the new subnetworks.D. Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and198.133.219.192/26 as the new subnetworks.E. Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.F. Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and198.133.219.48/28 as the new subnetworks.Answer: D41. Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?(Choose two.)A. alternateB. backupC. designatedD. disabledE. rootAnswer: CE42. Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?A. It has more than one interface that is connected to the root network segment.B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.C. It has a higher MAC address than the elected root bridge.D. It has a higher bridge ID than the elected root bridge.Answer: D43. Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?A. Switch3, port fa0/1B. Switch3, port fa0/12C. Switch4, port fa0/11D. Switch4, port fa0/2E. Switch3, port Gi0/1F. Switch3, port Gi0/2Answer: C44. Refer to the exhibit. How many paths can the EIGRP routing process use to forward packets from HQ_Router to a neighbor router?A. two equal-cost pathsB. two unequal-cost pathsC. three equal-cost pathsD. three unequal-cost pathsE. four equal-cost pathsF. four unequal-cost pathsAnswer: F45. Select the action that results from executing these commands.Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyA. A dynamically learned MAC address is saved in the startup-configuration file.B. A dynamically learned MAC address is saved in the running-configuration file.C.A dynamically learned MAC address is saved in the VLAN database.D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.Answer: B46. Refer to the exhibit. This command is executed on 2960Switch:2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1Which two of these statements correctly identify results of executing the command? (Choose two.)A. Port security is implemented on the fa0/1 interface.B. MAC address 0000.00aa.aaaa does not need to be learned by this switch.C. Only MAC address 0000.00aa.aaaa can source frames on the fa0/1 segment.D. Frames with a Layer 2 source address of 0000.00aa.aaaa will be forwarded out fa0/1.E. MAC address 0000.00aa.aaaa will be listed in the MAC address table for interface fa0/1 only.Answer: BE47. Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.2950Switch(config-if)# switchport port-security2950Switch(config-if)# switchport port-security mac-address sticky2950Switch(config-if)# switchport port-security maximum 1The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frameis received by 2950Switch? (Choose two.)A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.B.Only host A will be allowed to transmit frames on fa0/1.C. This frame will be discarded when it is received by 2950Switch.D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not beforwarded out fa0/1.F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will beforwarded out fa0/1.Answer: BD48. Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations. What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use?A. Configure static entries in the switch MAC address table to include the range of addresses used byvisiting employees.B. Configure an ACL to allow only a single MAC address to connect to the switch at one time.C. Use the mac-address-table 1 global configuration command to limit each port to one source MACaddress.D. Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.E. Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address.F. Implement Port Security at global configuration mode and use the port-security maximum 1 command to allow each switch only one attached hub.Answer: D49. Which of the following describes the roles of devices in a WAN? (Choose three.) A.A CSU/DSU terminates a digital local loop.B. A modem terminates a digital local loop.C. A CSU/DSU terminates an analog local loop.D. A modem terminates an analog local loop.E. A router is commonly considered a DTE device.F. A router is commonly considered a DCE device.Answer: ADE50. What are two characteristics of Telnet? (Choose two.)A. It sends data in clear text format.B. It is no longer supported on Cisco network devices.C. It is more secure than SSH.D. It requires an enterprise license in order to be implemented.E. It requires that the destination device be configured to support Telnet connections.Answer: AE51. What are two security appliances that can be installed in a network? (Choose two.)A. ATMB. IDSC. IOSD. IOXE. IPSF. SDMAnswer: BE52. Running both IPv4 and IPv6 on a router simultaneously is known as what?A. 4to6 routingB. 6to4 routingC. binary routingD. dual-stack routingE. NextGen routingAnswer: D53. What are three IPv6 transition mechanisms? (Choose three.)A. 6to4 tunnelingB. VPN tunnelingC. GRE tunnelingD. ISATAP tunnelingE. PPP tunnelingF. Teredo tunnelingAnswer: ADF54. Identify the four valid IPv6 addresses. (Choose four.)A. ::B. ::192:168:0:1C. 2000::D. 2001:3452:4952:2837::E. 2002:c0a8:101::42F. 2003:dead:beef:4dad:23:46:bb:101Answer: ABEF55. Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2Answer: B56. A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.)A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF57. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port securitymac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.Answer: C58. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)A. The area of overlap of the two cells represents a basic service set (BSS).B. The network diagram represents an extended service set (ESS).C. Access points in each cell must be configured to use channel 1.D. The area of overlap must be less than 10% of the area to ensure connectivity.E. The two APs should be configured to operate on different channels.Answer: BE59. Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)A. copierB. microwave ovenC. toasterD. cordless phoneE. IP phoneF. AM radioAnswer: BD60. Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)A. Global addresses start with 2000::/3.B. Link-local addresses start with FE00:/12.C. Link-local addresses start with FF00::/10.D. There is only one loopback address and it is ::1.E. If a global address is assigned to an interface, then that is the only allowable address for the interface. Answer: AD61. Which two of these statements are true of IPv6 address representation? (Choose two.)A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.B.A single interface may be assigned multiple IPv6 addresses of any type.C. Every IPv6 interface contains at least one loopback address.D. The first 64 bits represent the dynamically created interface ID.E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.Answer: BC62. What are three basic parameters to configure on a wireless access point? (Choose three.)A. SSIDB. RTS/CTSC. AES-CCMPD. TKIP/MICE. RF channelF. authentication methodAnswer: AEF63. Which two of these statements regarding RSTP are correct? (Choose two.) A.RSTP cannot operate with PVST+.B. RSTP defines new port roles.。

2010 年下半年 网络工程师上下午真题及标准答案资料

2010 年下半年 网络工程师上下午真题及标准答案资料

2010 年下半年网络工程师上午试卷(考试时间9 : 00~11 : 30 共150 分钟)请按下述要求正确填写答题卡在答题卡的指定位置上正确写入你的姓名和准考证号,并用正规2B 铅笔在你写入的准考证号下填涂准考证号。

本试卷的试题中共有75 个空格,需要全部解答,每个空格 1 分,满分75 分。

每个空格对应一个序号,有A、B、C、D 四个选项,请选择一个最恰当的选项作为解答,在答题卡相应序号下填涂该选项。

解答前务必阅读例题和答题卡上的例题填涂样式及填涂注意事项。

解答时用正规2B 铅笔正确填涂选项,如需修改,请用橡皮擦干净,否则会导致不能正确评分。

例题●2010 年下半年全国计算机技术与软件专业技术资格(水平)考试日期是88)月(89)日。

(88)A. 12 B. 11 C. 10 D. 9(89)A. 10 B. 11 C. 12 D. 13因为考试日期是“11 月13 日”,故(88)选B,(89)选D,应在答题卡号88 下对 B 填涂,在序号89 下对 D 填涂(参看答题卡)。

●在输入输出控制方法中,采用(1)可以使得设备与主存间的数据块传送无需CPU 干预。

(1)A. 程序控制输入输出 B. 中断C. DMAD. 总线控制●若计算机采用8 位整数补码表示数据,则(2)运算将产生溢出。

(2)A. -127+1 B. -127-1 C. 127+1 D. 127-1●编写汇编语言程序时,下列寄存器中,程序员可访问的是(3)。

(3)A. 程序计数器(PC) B. 指令寄存器(IR)C. 存储器数据寄存器(MDR)D. 存储器地址寄存器(MAR)● 使用PERT 图进行进度安排,不能清晰地描述(4),但可以给出哪些任务完成后才能开始另一些任务。

下面PERT 图所示工程从 A 到K 的关键路径是(5),(图中省略了任务的开始和结束时刻)。

(4)A. 每个任务从何时开始 B. 每个任务到何时结束C. 各任务之间的并行情况D. 各任务之间的依赖关系(5)A. ABEGHIK B. ABEGHJK C. ACEGHIK D. ACEGHJK●某项目组拟开发一个大规模系统,且具备了相关领域及类似规模系统的开发经验。

2010年9月计算机四级数据库工程师笔试试题及答案

2010年9月计算机四级数据库工程师笔试试题及答案

2010年9月计算机四级数据库工程师笔试试题及答案一、选择题(1)视图是数据库中的重要对象,下列有关视图的说法错误的是A)一般情况下,数据库只存储视图的定义,其数据仍存放在相关的基本表中B)可以将复杂的查询语句封装在视图中以简化相关查询语句的编写C)通过视图可以屏蔽不希望用户看到的敏感数据,提高数据库数据的安全性D)可以在视图的基础上建立新的视图,但这样定义的视图会导致数据库性能下降,一般不推荐使用(2)在概念数据模型中,联系用于描述现实世界中事物之间的关联关系。

一阿d关于联系的说法错误的是A)联系可用于描述一个实体集内记录之间的关联关系B)联系可用于描述两个实体集属性之间的关联关系C)ER模型通过1:1、1:n和m:n三种联系描述现实世界中各类事物之间的关联关系D)最终的IDEFIX模型中只能出现I:1和1:n两种类型的联系(3)在关系数据库中,NULL是一个特殊值,在很多数据操作中都需要对NULL进行特殊处理。

关于NULL,下列说法正确的是A)判断元组的某一列是否为NULL一般使用“=NULL”B)NULL在数据库中表示尚不确定的值C)在SQL Server2000中执行“SELECT NULL+5”将会出现异常D)NULL只适用于字符和数值类型(4)某教务管理系统包含选课模块、成绩录入模块和学籍管理模块。

选课模块面向学校几万名学生,成绩录入模块面向学校上千名任课教师,学籍管理模块面向少量有一定权限的管理人员。

该系统是上世纪用C/S结构和相关技术开发的,为了方便用户使用,需要对系统进行升级和改造。

设有下列技术改造方案:I.选课模块和成绩录入模块采用B/S结构进行改造,学籍管理模块仍采用C/S结构II.选课模块采用B/S结构进行改造,成绩录入模块和学籍管理模块仍采用C/S结构III.选课模块、成绩录入模块和学籍管理模块均采用B/S结构进行改造Ⅳ.成绩录入模块采用B/S结构进行改造,选课模块和学籍管理模块仍采用C/S结构上述方案中,较为合理的是A)仅I和IIB)仅I、II和IIIC)仅I和IIID)仅II、III和IV(5)数据库在外存中是以文件形式组织的,组织文件记录方法的不同就形成了不同的文件结构。

鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

1、请参见图示。

当收到下列帧将会怎么做?(选择三项。

)ACFA. Router1的将剥离的源MAC地址,并将其与MAC地址0000.0c36.6965取代。

B. Router1的将剥离的源IP地址,并将其与IP地址192.168.40.1取代。

C.router1将剥离的目的MAC地址,并将其与MAC地址代替0000.0c07.4320。

D.router1将剥离的目的IP地址,并将其与192.168.40.1的IP地址替换。

E. Router1的将转发数据包输出接口的FastEthernet0/1。

F.router1将转发数据包输出接口的FastEthernet0/2。

2、请参见图示。

哪三种说法正确描述了网络设备A?(选择三项。

)BDEA.使用255.255.255.128子网掩码时,在各接口不需要的IP地址。

B.使用255.255.255.128子网掩码时,在各接口确实需要一个唯一的IP地址IP子网。

C.为255.255.255.0的子网掩码时,必须是一个二层设备的电脑进行通信彼此。

D.为255.255.255.0的子网掩码时,必须是一个三层设备的电脑进行通信彼此。

E.使用255.255.254.0的子网掩码时,每个接口并不需要一个IP地址。

3、OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?EA.传输B.网络D.会话E.应用4、以下哪项描述了WAN设备的角色?(选择三项。

)A.CSU/ DSU用于端接本地数字环路B.调制解调器端接本地数字环路C.一个CSU/ DSU终止模拟本地环路D.调制解调器终止模拟本地环路E.路由器通常被视为DTE设备F.路由器通常被视为DCE设备注:SU/DSU是用于连接终端和数字专线的设备,属于DCE设备modem用于数字信号和模拟信号的转换,属于DCE设备路由器一般是DTE设备5、请参见图示,主机A ping接口S0/0的router3,什么是该ping的TTL值?A. 253B. 252C. 255D. 2546、网络管理员可以通过建立一个FTP连接到远程服务器验证新安装的主机的配置。

cisco 642-631最新题库85题

cisco 642-631最新题库85题

A c t u al T es t s .c omWhich service component in the wireless operate phase helps isolate and resolve an incident?A. Change ManagementB. Configuration ManagementC. Incident ManagementD. Acceptance Test PlanAnswer: CQUESTION NO: 2On a Cisco Aironet 1240AG Series standalone access point, the radio LED is dark blue and blinking,but the status LED and Ethernet LED are both off. What does this indicate?A. A firmware upgrade is in progress.B. An access point buffer overflow is occurring.C. The access point is booting.D. The internal radio has failed.Answer: AQUESTION NO: 3You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?(Choose two.)A. 083 Tunnel-PreferenceB. 066 Tunnel-Client-EndpointC. 064 Tunnel-TypeD. 082 Tunnel-Assignment-IDE. 081 Tunnel-Private-Group-IDF. 067 Tunnel-Server-EndpointAnswer: C,EA ct u al T es t s .c omYou are charged with implementing a secure wireless installation which will provide Internetaccess to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?A. Implement a Cisco Secure IPS sensor.B. Implement 802.1X on the switch ports.C. Take no action, you have achieved your goal.D. Implement a protected port on the access switches.Answer: DQUESTION NO: 5A mobility group is created by a Cisco WLCM and 4402 Series Wireless LAN Controller. A client that isanchored on the Cisco WLCM roams to an access point on the 4402 controller. You then run a debugcommand on the 4402 controller.Which message would best describe the establishment of the tunnel from the foreign controller's perspective?A. Received Mobile Anchor Export messageB. Transmit Plumbing duplex mobility tunnel messageC. Received Plumbing duplex mobility tunnel messageD. Transmit Mobile Anchor Export messageAnswer: DQUESTION NO: 6In order for a controller-based access point to be allowed to participate in aggressive load balancing, itmust have heard the client within how many seconds?A. 15B. 10C. 1D. 5A ct u al T es t s .c omQUESTION NO: 7Which command will enable DHCP debugging on a WLAN controller?A. debugdhcp enableB. debugdhcp packet enableC. enabledebugdhcp packetD. debugdhcp status enableAnswer: BQUESTION NO: 8Choose the service component in the optimize phase which assesses the WLAN system and drivescontinuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, and quality issue resolution.A. Technology AssessmentB. Operations AssessmentC. Security AssessmentD. Security AdministrationE. Change ManagementF. Operations Readiness AssessmentAnswer: AQUESTION NO: 9In the operate phase, providing and maintaining reliable, current information about the WLAN systemhardware, software, and applications pertinent to the system's individual components and attributes is part of which service component?A. Problem ManagementB. Configuration ManagementC. Incident ManagementD. Change ManagementA ct u al T es t s .c omQUESTION NO: 10The IOS of a North American Cisco Aironet 1130AG Series standalone access point has become corrupt. You must therefore reload the TFTP firmware. Before you press and hold the MODE button, youshould verify that the file name is which of the following?A. c1130-k9w7-tar.bootB. c1130-k9w7-tar.123-7.JA1.tarC. c1130-k9w7-tar.defaultD. c1130-k9w7-tar.recoverAnswer: CQUESTION NO: 11Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?A. Clients connected to the rogue access point must be able to connect to the containment controller-based access point.B. Multiple controller-based access points will load-balance the containment task using fewer resourcesthan a single access point.C. Clients connected to the rogue access point may be out of the range of the controller-based access pointproviding containment.D. Each controller-based access point can handle only a limited amount of clients connected to the rogueaccess points.Answer: CQUESTION NO: 12By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones,A ct u al T es t s .c omB. 85 percentC. 56 percentD. 55 percentAnswer: AQUESTION NO: 13You are installing a Cisco 4402 Series Wireless LAN Controller. Which type of interface should you useon the controller's distribution port?A. 1000BASE-SX SFPB. 10/100/1000 Mbps RJ45C. 10/100 Mbps RJ45D. 10000BASE-SXAnswer: AQUESTION NO: 14When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,whichtwo general control settings should you select? (Choose two.)A. Multicast onB. Aggressive Load Balancing offC. Multicast offD. AP Fallback onE. Aggressive Load Balancing onF. AP Fallback offAnswer: B,CQUESTION NO: 15You are configuring an RF group of controllers that coordinate Radio Resource Management calculations. What is the maximum number of WLAN controllers that you can add?A ct u al T es t s .c omB. 20C. 12D. 24Answer: BQUESTION NO: 16During the installation of the Cisco WCS version 4.0, an error occurs. Where would you look for theinstallation log, in order to learn more about this error?A. at the root of the installation driveB. in the Cisco WCS installation directoryC. on the desktop of the serverD. in the Cisco WCS\Logs directoryAnswer: CQUESTION NO: 17You review the Failed Attempts logs on an AAA server and find: "unknown network access server error."Which failure could produce this error?A. AAA client and AAA server handshake failureB. supplicant authentication failureC. wrong password used by the supplicantD. failure of the wireless client and AAA server handshakeAnswer: AQUESTION NO: 18When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges,whichof the following RTS threshold and CWmin settings would be correct for the non-root bridges?A. RTS threshold = 1,CWmin = 4B. RTS threshold = 4000,CWmin = 5A ct u al T es t s .c omD. RTS threshold = 1,CWmin = 5Answer: DQUESTION NO: 19Which service component in the implement phase is typically performed prior to the handover of a wireless solution to the customer's operations organization?A. Systems IntegrationB. Skill AssessmentC. Systems Acceptance TestingD. Wireless CheckE. Project Close OutAnswer: CQUESTION NO: 20Which parameter, when enabled on a standalone access point, gives the highest priority to a voice packet even when QoS is not enabled?A. IGMP SnoopingB. WMMC. QoS Element for Wireless PhonesD. AVVID Priority MappingAnswer: CQUESTION NO: 21One of your customers has decided to deploy location-based services in addition to existing wirelessservices. The customer requires that the additional access points to be deployed in monitor-only mode. The most likely reason for this requirement is that the customer has which of these existing wireless devices?A. Data CollectionB. 802.11b/g VoIPC. 802.11b and g clientsA ct u al T es t s .c omQUESTION NO: 22When assigning a standalone access point a non-root role, which two parameters, other than Role inthe radio network settings, must be configured on the SSID Manager page? (Choose two.)A. Force Infrastructure Devices to associate only to this SSIDB. Set Infrastructure SSIDC. Multiple BSSIDD. Set Data Beacon RateE. Enable IP redirection on this SSIDAnswer: A,BQUESTION NO: 23Which definition best describes the staff training service component within the wireless implement phase?A. develops a training plan and delivers via a custom workshop or e-learningB. helps improve the performance and functionality of the infrastructure operations and network management systemC. reduces the risk of downtime caused by facilities-related problemsD. provides a step-by-step plan detailing the installation and service-commission requirement tasks to bestaged in a controlled implementation environment that emulates a customer networkAnswer: AQUESTION NO: 24Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticate theclient when one-time passwords are in use?A. GTCB. MD5C. MS-CHAP v2A ct u al T es t s .c omQUESTION NO: 25What is the recommended distance between controller-based access points for support of roaming?A. 50 feet [15 meters]B. 200 feet [60 meters]C. 150 feet [45 meters]D. 100 feet [30 meters]Answer: DQUESTION NO: 26A Cisco 4404 WLAN controller is being connected to a Cisco 6500 Catalyst Series Switch. How wouldyou interconnect and configure LAG for connectivity and ensure redundancy?A. All four ports from the Cisco WLC terminated to the same Catalyst gigabit module and channel group.B. Ports 1 and 2 from Cisco WLC to Catalyst gigabit module slot 1 channel group 10 and Cisco WLC ports3 and4 to Catalyst gigabit module slot 2 channel group 10.C. All four ports from the Cisco WLC terminated to the same Catalyst gigabit module using twochannel groups.D. Ports 1 and 2 from Cisco WLC to Catalyst gigabit module slot 1 channel group 20 and Cisco WLC ports 3 and 4 to Catalyst gigabit module slot 2 channel group 40.Answer: BQUESTION NO: 27How many WLANs can a Cisco Aironet 1242 in H-REAP mode support when actively connected to awireless controller? A. 4A ct u al T es t s.c omC. 8D. 16Answer: CQUESTION NO: 28Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.You use an access point scan to determine if the Location Appliance has been deployed correctly.Making which change to warehouse deployment location services will most likely correct the problem?A. ensure channels are deployed such that they do not overlapB. allow for the automatic containment of rogue access pointsC. ensure each area is covered by a minimum of three access pointsD. ensure a minimum RSSI value of -50Answer: CQUESTION NO: 29Cisco WCS version 4.0 is supported on which operating system?A. Windows 2000 SP4B. Windows Server 2003C. Solaris 10D. VistaE. Windows XP ProAnswer: BQUESTION NO: 30You have very few Cisco 7920 wireless IP phones on your network, but lots of wireless laptops.Youwant to increase the bandwidth available for the laptops by decreasing the bandwidth reserved for theA ct u al T es t s .c omWLAN controller?A. 55 percentB. 75 percentC. 40 percentD. 25 percentAnswer: CQUESTION NO: 31On a Cisco Aironet 802.11 a/b/g wireless LAN client adapter, the status LED and activity LED are alternating on and off. What does this indicate?A. The client card is not associated to the network.B. The client card has awakened from power-save mode.C. The driver has been installed incorrectly.D. The client card has failed.Answer: AQUESTION NO: 32Which Cisco Aironet Series has a built-in digital thermometer designed to protect the radio?A. CiscoAironet 1500 SeriesB. CiscoAironet 1400 SeriesC. CiscoAironet 1200 SeriesD. CiscoAironet 1300 SeriesAnswer: DQUESTION NO: 33Which of the following wireless service components occur in the implement phase?A. Project Kickoff, Staging, Systems Acceptance Testing, Ongoing Support Handoff MeetingB. WLAN Change Management, Security Administration, Technology Assessment, Operations PlanC. Security Assessment, Operations Assessment, Supplier ManagementD. Operations Readiness Assessment, Systems Requirements Validation, Planning Project Kickoff, ServiceA ct u al T es t s .c omAssuranceAnswer: AQUESTION NO: 34Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution?A. Create a more effective sales strategy for partners.B. Reinforce customer confidence in partners selling products.C. Provide a consistent, repeatable, and proven method to ensure the network solution that is deployeddelivers upon the customer's goals for reliability and availability.D. Maximize the number of services required to support advanced technologies.E. More clearly define the roles of account managers, systems engineers, and field engineers.Answer: CQUESTION NO: 35You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you applyto voice applications? A. 3B. 6C. 4D. 1Answer: BQUESTION NO: 36Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wireless network, but clients using PEAP are failing to log on. Which situation would result in this type of problem?A. Posture validation has not been enabled.B. The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.A ct u al T es t s .c omC. Clients and server are not using certificates.D. Clients have been set to validate the server identity.Answer: CQUESTION NO: 37Which three of these user groups are available on Cisco WCS version 4.0? (Choose three.)A. AdminB. Users AssistantC. System MonitoringD. Power UsersE. AdministratorsF. Network OperatorAnswer: A,B,CQUESTION NO: 38On a Cisco 1000 Series controller-based access point, the alarm LED is flashing red, but the other LEDs are off. What is this access point indicating?A. Its IP address already exists.B. It is operating normally.C. It requires a code upgrade.D. It has lost contact with the controller.Answer: AQUESTION NO: 39In which service component of the wireless operate phase are incident trends analyzed to identify patterns and systemic conditions?A. System MonitoringB. Security AdministrationC. Operations SetupD. Problem ManagementAnswer: DA ct u al T es t s .c omYou are trying to change the polling parameters used by the location manager via the Cisco WCS,andyour request is being denied. What is wrong?A. Polling values can be changed only in the maintenance window.B. Polling values can be changed only on the location server.C. Your login does not have the correct permissions.D. You must wait for the location server to become available.Answer: CQUESTION NO: 41A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2.H-REAP AP2 has six other clients associated to it, which continue to pass traffic. What has caused this problem?A. H-REAP AP1 has reached its client limit.B. H-REAP AP2 has reached its client limit.C. H-REAP AP2 lost its connection to the controller.D. H-REAP AP1 lost its connection to the controller.Answer: CQUESTION NO: 42If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a network when you select which of the following modes from the AP Mode drop-down menu on the controller?A. MirrorB. Rogue DetectorC. SnifferD. MonitorAnswer: BA ct u al T es t s .c omThe tag timeout value for a Cisco Wireless Location Appliance should be set to which tag beacon rate?A. 4 to 6 times the tag beaconing rateB. 10 to 12 times the tab beaconing rateC. 8 to 10 times the tag beaconing rateD. 6 to 8 times the tag beaconing rateAnswer: CQUESTION NO: 44Which two service components are performed during the wireless implement phase? (Choose two.)A. Project PlanningB. Configuration ManagementC. Wireless Readiness AssessmentD. Systems Acceptance TestingE. Site Readiness SpecificationAnswer: A,DQUESTION NO: 45The WLAN controller maintains up to how many controller crash files?A. 10B. 5C. 15D. 20Answer: BQUESTION NO: 46What is the maximum number of WLAN controllers that can join a single mobility group?A ct u al T es t s .c omD. 24Answer: DQUESTION NO: 47When configuring Cisco Secure ACS to support wireless EAP authentication, which device must beconfigured as a AAA client?A. Location ApplianceB. controller-based access pointsC. wireless clientsD. Wireless Control SystemE. wireless controllersAnswer: EQUESTION NO: 48How many RADIUS servers can be added to a controller and thereafter assigned to the authentication oraccounting of individual WLAN IDs?A. 14B. 15C. 17D. 16Answer: CQUESTION NO: 49When configuring QoS on a wireless controller, the per-user, real-time bandwidth contract is enforced forwhich of the following protocols?A. IPXA ct u al T es t s .c omAnswer: CQUESTION NO: 50You are installing a Cisco Aironet 1000 Series controller-based access point. When you boot it, all theLEDs on the access point blink together. What does this indicate about the access point?A. duplicate IP addressB. code upgrade in progressC. normal operationD. searching for primary controllerAnswer: BQUESTION NO: 51Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value.Where and how should the RFID value be changed?A. on the Cisco WCS, to 95 secondsB. on the wireless controller, to 45 secondsC. on the wireless controller, to 95 secondsD. on the Cisco WCS, to 45 secondsAnswer: CQUESTION NO: 52EAP-FAST provides a secure tunnel during Phase One to protect the user's authentication credentials.Which of these entities initializes the secure tunnel?A ct u al T es t s .c omA. x.509 certificateB. generic token cardC. preshared keyD. Protected Access CredentialAnswer: DQUESTION NO: 53Which of the following settings will reduce packet overhead and overall latency in a standalone point-to-point bridge deployment?A. enable concatenation on the non-root bridge onlyB. enable concatenation on the root bridge onlyC. enable concatenation on both the root bridge and non-root bridgeD. enable concatenation on the root bridge and set it as desirable on the non-root bridgeE. set concatenation as desirable on the root bridge and enable it on the non-root bridgeAnswer: CQUESTION NO: 54When configuring a Cisco 3845 Integrated Services Router to support 802.11b and g clients,which of the following commands would be correct?A. router (config-if)# speed basic-1.0 2.0 5.5 6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0B. router (config-if)# speed 1.0 2.0 5.5 6.0 9.0 basic-11.0 12.0 basic-18.0 24.0 36.0 48.0 54.0C. router (config-if)# speed basic-1.0 2.0 5.5 basic-6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0D. router (config-if)# speed 1.0 2.0 5.5 basic-6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0Answer: AQUESTION NO: 55You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-pointwireless link between two buildings. Which distance setting should you use for the bridge configured as the root?A. 20 km [12.4 miles]A ct u al T es t s .c omB. 10 km [6.2 miles]C. 5 km [3.1 miles]D. 25 km [15.5 miles]E. 15 km [9.3 miles]Answer: EQUESTION NO: 56Which authentication types are allowed with the Cisco ADU when selecting WPA/WPA2/CCKM underthe security options?A. Cisco-LEAP, EAP-FAST, EAP-PEAP (GTC), EAP-TLSB. Cisco-LEAP, EAP-PSK, EAP-PEAP (MS-CHAP v2), EAP-TLSC. Cisco-LEAP, EAP-FAST, EAP-PEAP (MS-CHAP v2), EAP-TTLSD. Cisco-LEAP, EAP-MD5, EAP-PEAP (GTC), EAP-TTLSAnswer: AQUESTION NO: 57If all client exclusion policies are enabled, on which number of tries will 802.1X authentications be excluded using controller-based access points?A. fiveB. threeC. sixD. fourAnswer: DQUESTION NO: 58The Cisco Lifecycle Services approach for wireless solutions provides a framework for which of thefollowing opportunities?A. partners having a discussion with customers about the minimum service components needed to successfully deploy a wireless solutionB. customers determining a competitor's strategy for adopting advanced technologiesA ct u al T es t s.c omC. partners choosing the right products for their customersD. customers choosing the right products for their networkE. customers defining the correct strategy for advanced technology adoptionAnswer: AQUESTION NO: 59Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFID tags.The RFID tag data is not being collected.On which device would you verify that RFIDs have been enabled?A. access pointB. location managerC. wireless controllerD. Cisco WCSAnswer: CQUESTION NO: 60Which of the following commands on the wireless interface of a Cisco 3845 Integrated Services Routerallows the SSID to broadcast?A. router (config-ssid)# guest-modeB. router (config-ssid)# advertiseC. router (config-ssid)# enableD. router (config-ssid)# broadcastAnswer: AQUESTION NO: 61In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP or EAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts report onthe Cisco Secure ACS, you find this error: "Unknown network access server NAS." Which problemA ct u al T es t s .c omhave caused this failure?A. misconfigured IP address of the AAA server on the access pointB. misconfigured EAP type on the access pointC. misconfigured IP address of the access point on the AAA serverD. misconfigured EAP type on the AAA serverAnswer: CQUESTION NO: 62On a Cisco Aironet 1130AG Series standalone access point, the status LED is dark blue and blinking.What does this indicate?A. The internal radio has failed.B. A firmware upgrade is in progress.C. An access point buffer overflow is occurring.D. The access point is booting.Answer: BQUESTION NO: 63Which Cisco Aironet Series devices can be powered using 802.3af inline power?A. CiscoAironet 1400 SeriesB. CiscoAironet 1300 SeriesC. CiscoAironet 1100 SeriesD. CiscoAironet 1240AG SeriesAnswer: DQUESTION NO: 64Which three wireless service components belong to the operate phase? (Choose three.)A. Operations PlanB. Operations AssessmentC. Security AdministrationA ct u al T es t s .c omE. Operations ImplementationF. Incident ManagementAnswer: C,D,FQUESTION NO: 65You are troubleshooting a one-way call problem with a Cisco 7920 wireless IP phone on a standaloneWLAN. What may have caused this problem?A. The minimum data rate is not set to 11 Mbps.B. Publicly Secure Packet forwarding is enabled.C. The access point is set to the least congested channel.D. An address resolution protocol has been disabled.Answer: DQUESTION NO: 66How does a controller-based access point configured to operate in sniffer mode behave?A. allows client traffic, captures data on all channelsB. allows client traffic, captures data on a single channelC. allows no client traffic, captures data on all channelsD. allows no client traffic, captures data on a single channelAnswer: DQUESTION NO: 67Which of these statements is true about SSIDs configured in Cisco ADU?A. SSIDs are not case-sensitive.B. SSIDs must be listed in the same order in the ADU as they are in the access point.C. A maximum of three SSIDs may be configured.D. SSIDs may have a maximum of 16 characters.Answer: CA ct u al T es t s .c omYou have just finished aligning a Cisco Aironet 1400 Series Wireless Bridge link using installation mode.When you set the link back to operational mode you loose association to the root bridge. Which action will correct the problem?A. Configure the bridge to force infrastructure devices to associate only to the SSID parameter.B. Enable passwords on both bridges.C. Configure the distance parameter value.D. Configure the proper channel.Answer: CQUESTION NO: 69On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point to correct this issue?A. network EAPB. open authentication plus MACC. open authentication plus EAPD. a shared keyAnswer: AQUESTION NO: 70Select the wireless service component in the implement phase in which operations responsibilities aredefined and transferred to the operate phase team.A. Ongoing Support Handoff MeetingB. Staff TrainingC. Detailed Design DevelopmentD. Staging and System MigrationAnswer: AA ct u al T es t s .c omWhich wireless service component is associated with maintaining historical and current informationabout the WLAN solution?A. Acceptance Test PlanB. Change ManagementC. Incident ManagementD. Configuration ManagementAnswer: DQUESTION NO: 72A Cisco Aironet 1020 controller-based access point has been connected to a Catalyst 3550-24PWRSwitch. However, when it is powered up, the access point fails. What has caused this problem?A. access point does not support 802.11hB. incorrect switch power supplyC. switch port is not enabledD. switch does not support 802.3afE. access point has not been initialized with the primary controllerAnswer: DQUESTION NO: 73You have been called upon to add location-based services into an existing controller-based wireless design which primarily encompasses handheld devices such as barcode scanners and Cisco 7920 wireless IP phones. In which mode should you deploy the additional access points to achieve the density required without excessive co-channel interference?A. tracking modeB. monitor modeC. location modeD. sniffer modeAnswer: BA ct u al T es t s .c omWhich of the following parameter sets must be configured on the Cisco Wireless Location Appliance?A. network connectionsB. location viewsC. access pointsD. object definitionsAnswer: AQUESTION NO: 75A Cisco Wireless Location Appliance has been added to track RFID tags placed on laptops being usedin a school. Classrooms at the school have concrete block walls. During testing, you discover that theaccuracy of the system needs to be improved. You decide to edit the map in the Cisco WCS to add theinterior walls.How many interior walls can you add to improve the accuracy of the location appliance?A. 50B. 150C. 100D. 200Answer: AQUESTION NO: 76You are using ADU and are authenticated and associated to an access point. However, you are unableto obtain an IP address. Which of these has caused this problem?A. invalid SSIDB. invalid WEP keyC. invalid encryption typeD. invalid 802.1X authentication type。

CISCOCCNA网络工程师题库

CISCOCCNA网络工程师题库

培训大讲堂官方YY 频道:3660mCCNA题库考试代号:640-802考试时间:英文110+30=140分钟通过分数:825题库版本:V104.4鸿鹄论坛招募CCNA、CCNP答疑讲师答疑地点:鸿鹄官方YY频道3660CCNA(640-802)题库V104.4CCNA(640-802)题库V104.4(情人节版)V104系列是官方的终结版本,以后不会再出V105 V106 V108等等========================================更新内容:V104.1修正V104中错误题目,确定经典争议题目答案;V104.2增加拖图题并可完美模拟考试,VCE题库增加中文注释;V104.3针对思科CCNA考试变题,更新考试新增题目93Q,更新V104.2实验题;V104.4增加全文中文注释,汇总V104.3九次更新,删除部分旧题目,为目前最新官方正版题库;2011.8.1 增加每日新题,修订部分错误。

增加5道新题,分别是519、520、521、522、523题修改176题、375题、443题、482题答案错误修改59题、88题、453题、107题、270题注释错误增加个别疑难拖图题注释,优化实验题=============================================QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?(当您登录到交换机,哪种提示表明你在特权模式?)A. %B. @C. >D. $E. #Answer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:特权模式就是#提示符QUESTION 2Which command shows system hardware and software version information?(哪些命令显示系统硬件和软件的版本信息?)A. show configurationB. show environmentC. show inventoryD. show platformE. show versionAnswer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:查看系统的软件和硬件信息使用的命令是show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?(思科Catalyst 交换机CAT1 和CAT2 有它们之间的连接使用端口FA0/13。

四级软考网工真题与详细答案(2010年上半年)2222

四级软考网工真题与详细答案(2010年上半年)2222

参考答案与解析●计算机指令一般包括操作码和地址码两部分,为分析执行一条指令,其(1)。

(1)A.操作码应存入指令寄存器(IR),地址码应存入程序计数器(PC)。

B.操作码应存入程序计数器(PC),地址码应存入指令寄存器(IR)。

C.操作码和地址码都应存入指令寄存器。

D.操作码和地址码都应存入程序计数器。

试题解析:指令寄存器(IR)用来保存当前正在执行的一条指令。

当执行一条指令时,先把它从内存取到数据寄存器(DR)中,然后再传送至IR。

指令划分为操作码和地址码字段,由二进制数字组成。

为了执行任何给定的指令,必须对操作码进行测试,以便识别所要求的操作。

指令译码器就是做这项工作的。

指令寄存器中操作码字段的输出就是指令译码器的输入。

操作码一经译码后,即可向操作控制器发出具体操作的特定信号。

答案:(1)C● 进度安排的常用图形描述方法有GANTT图和PERT图。

GANTT图不能清晰地描述(2);PERT图可以给出哪些任务完成后才能开始另一些任务。

下图所示的PERT图中,事件6的最晚开始时刻是(3)。

(图略,后补)(2)A.每个任务从何时开始 B.每个任务到何时结束C.每个任务的进展情况 D.各任务之间的依赖关系(3)A.0 B.1 C.10 D.11试题解析:甘特图的优点是直观表明各个任务的计划进度和当前进度,能动态地反映软件开发进展的情况,是小型项目中常用的工具。

缺点是不能显式地描绘各个任务间的依赖关系,关键任务也不明确。

PERT图中的关键路径是1→2→5→7→9,总共15天。

在不影响关键路径,并考虑到5→8这个任务的前提下,事件6的最晚开始事件是第10天。

答案:(2)D,(3)C● 使用白盒测试方法时,确定测试用例应根据(4)和指定的覆盖标准。

(4)A.程序的内部逻辑 B.程序结构的复杂性C.使用说明书 D.程序的功能试题解析:白盒法全面了解程序内部逻辑结构、对所有逻辑路径进行测试。

白盒法是穷举路径测试。

2010年9月全国计算机等级考试四级(网络工程师)笔试试卷

2010年9月全国计算机等级考试四级(网络工程师)笔试试卷

2010年9月计算机四级网络工程师笔试试题一、选择题(每小题1分,共40分)(1)下列关于RPR技术的描述中,错误的是A)RPR与FDDI一样使用双环结构B)在RPR环中,源节点向目的节点成功发出的数据帧要由源节点从环中收回C)RPR环中每一个节点都执行SRP公平算法D)RPR能够在50ms内隔离出现故障的节点和光纤段(2)下列不属于无线接入技术的是A)APONB)Ad hocC)WiMAXD)WiFi(3)按照ITU标准,传输速率为622.080Mbps的标准是A)OC-3B)OC-12C)OC-48D)OC-192(4)下列关于光纤同轴电缆混合网HFC的描述中,错误的是A)HFC是一个双向传输系统B)Cable Modem利用频分多路复用方法将信道分为上行信道与下行信道C)Cable Modem传输方式分为对称式和非对称式两类D)HFC通过Cable Modem将光缆与同轴电缆连接起来(5)下列关于服务器技术的描述中,错误的是A)热插拔功能允许用户在不切断电源的情况下更换硬盘、板卡等B)集群系统中一台主机出现故障时不会影响系统的正常服务C)服务器的可用性用MTBF描述D)服务器磁盘性能表现在磁盘存储容量与速度(6)一台交换机的总带宽为8.8 Gbps,如果该交换机拥有两个全双工1000Mbps光端口,那么最多还可以提供的全双工10/100Mbps电端口的数量是A)12B)16C)24D)48(7)下列关于典型的高端路由器可靠性与可用性指标的描述中,错误的是A)无故障连续工作时间大于1万小时B)系统故障恢复时间小于30分钟C)主备用系统切换时间小于50毫秒D)SDH接口自动保护切换时间小于50毫秒(8)EP地址块202.192.33:160/28的子网掩码可写为A)255.255.255.192B)255.255.255.224C)255.255.255.240D)255.255.255.248(9)下图是网络地址转换NAT的一个示例。

2008年4月-2010年9月全国计算机等级考试四级网络工程师试题及答案

2008年4月-2010年9月全国计算机等级考试四级网络工程师试题及答案

2008年4月全国计算机等级考试四级网络工程师笔试试卷(考试时间120分钟,满分100分)一、选择题(每小题1分,共40分)。

下列各题A、B、C、D四个选项中,只有一个选项是正确的,将正确的选项涂写在答题卡上。

(1)、设计一个宽带城域网将涉及“三个平台一个出口”,即网络平台、业务平台、管理平台和 cA、广域网出口B、局域网出口C、城市宽带出口D、卫星通道出口(2)、下列关于宽带城域网核心交换层特点的描述中,错误的是 dA、将多个汇聚层连接起来B、为整个城域网提供一个高速、安全与具有QoS保障能力的数据传输环境C、提供宽带城域网的用户访问Internet所需要的路由服务 aD、根据接入层的用户流量进行本地路由、过滤、流量均衡(3)、ADSL上行速率在 A、64Kbps~640 Kbps B、640Kbps~7Mbps C、7Mbps~10Mbps D、10Mbps~20Mbps (4)、下列关于IEEE802.16标准的描述中,错误的是 b A、提供宽带城域网用户访问Internet所需要的路由服务 B、最高传输速率为234Mbps 32-134Mbps C、使用无线频段为10~66GHz D、与IEEE802.16标准工作组对应的论坛组织是WiMAX(5)、在网络需求详细分析中除包括网络总体需求分析、综合布线需求分析、网络可用性与可靠性分析、网络安全性需求分析,还需要做的工作是 a A、网络工程造价估算 B、网络工程进度安排 C、网络硬件设备选型 D、网络带宽接入需求分析(6)、网络系统分层设计中层次之间的上联带宽与下一级带宽之比一般控制在 c A、1:1 B、1:10 C、1:20 D、1:40(7)、一台交换机具有24个10/100Mbps全双工端口和2个1000Mbps全双工端口,如果所有端口都工作在全双工状态,那么该交换机总带宽应为 d A、4.4Gbps B、6.4 Gbps C、6.8 Gbps D、8.8 Gbps(8)、某个IP地址的子网掩码为255.255.255.192,该掩码又可以写为 c A、/22 B、/24 C、/26 D、/28(9)、将内部专用IP地址转换为外部公用IP地址的技术是 b A、RAPR B、NAT C、DHCP D、ARP(10)、若某大学分配给计算机系的IP地址块为202.113.16.128/26,分配给自动化系的IP地址块为202.113.16.192/26,那么这两个地址块经过聚合后的地址为 c A、202.113.16.0/24 B、202.113.16.0/25C、202.113.16.128/25D、202.113.16.128/24(11)、下列对IPv6地址FE80:0:0:0801:FE:0:0:04A1的简化表示中,错误的是 aA、FE8::801:FE:0:0:04A1B、FE80::801:FE:0:0:04A1C、FE80:0:0:801:FE::04A1D、FE80:0:0:801:FE::4A1(12)、下列关于路由信息协议RIP的描述中,错误的是 bA、路由刷新报文主要内容是由若干(V、D)组成的表B、矢量V标识该路由器可以到达的目的网络或目的主机的跳数C、路由器在接收到(V、D)报文后按照最短路径原则更新路由表D、要求路由器周期性地向外发送路由刷新报文(13)、下列关于OSPF协议的描述中,错误的是 d A、OSPF使用分布式链路状态协议 B、链路状态协议“度量”主要是指费用、距离、延时、带宽等 C、当链路状态发生变化时用洪泛法向所有路由器发送信息 D、链路状态数据库中保存一个完整的路由表(14)、在不同AS之间使用的路由协议是 c A、RIP B、OSPF C、BGP-4 D、ISIS (15)下列关于综合布线的描述中,错误的是 b A、终端有高速率要求时,水平子系统可采用光纤直接铺设到桌面B、多介质信息插座是用于连接双绞线C、干线线缆铺设经常采用点对点结合和分支结合两种方式D、采用在管理子系统中更改、增加、交换、扩展线缆的方式来改变线缆路由(16)网桥转发数据的依据是 b A、ARP表 B、MAC地址表 C、路由表 D、访问控制列表(17)一台Cisco交换机和一台3COM交换机相连,相连端口都工作在VLAN trunk模式,这两个端口应使用的VLAN协议是 dA、ISL 和IEEE802.10B、ISL 和ISLC、ISL和 IEEE802.1QD、IEEE802.1Q和IEEE802.1Q(18)有3台交换机分别安装在办公楼的1~3层,同属于财务部门的6台PC机分别连接在这3台交换机的端口上,为了提高网络安全性和易管理性,最好的解决方案是 d A、改变物理连接,将6台PC机全部移动到同一层B、使用路由器,并用访问控制列表(ACL)控制主机之间的数据流C、产生一个VPN,并使用VTP通过交换机的Trunk传播给6台PC机D、在每台交换机上建立一个相同的VLAN,将连接6台PC机的交换机端口都分配到这个VLAN中(19)当交换机到根网桥的间接链路出现失效故障时(如图,链路L1失效),STP协议会将交换机C的阻塞端口的工作状态转换为转发状态,为了省去端口状态转换等待时间,让端口直接由侦听和学习状态转换为转发状态,需配置交换机 STP的可选功能是 cA、PortFastB、UplinkFastC、BackboneFastD、BPDU Filter(20)下列删除VLAN的命令中,无法执行的是 a A、no vlan 1 B、no vlan 2 C、no vlan 500 D、no vlan 1000(21)当路由表中包含多种路由信息源时,根据缺省的管理距离值,路由器在转发数据包时,会选择的路由信息源是dA、RIPB、IGRPC、OSPFD、Static(22)只封禁一台地址为193.62.40.230主机的access-list的正确配置是 bA、access-list 110 permit ip any anyB、access-list 110 deny ip host 193.62.40.230anyaccess-list 110 deny ip host 193.62.40.230 any access-list 110 deny ip any host 193.62.40.230access-list 110 deny ip any host 193.62.40.230 access-list 110 permit ip any anyC、access-list 110 deny ip host 193.62.40.230 anyD、access-list 110 deny ip host 193.62.40.230anyaccess-list 110 deny ip any host 193.62.40.230 access-list 110 permit ip any anyaccess-list 110 deny ip any host 193.62.40.230(23)在某园区网中,路由器R1的GE0/1(212.112.8.5/30)与路由器R2的GE0/1(212.112.8.6/30相连,R2的GE0/2(212.112.8.9/30)与R3的GE0/1(212.112.8.10/30)相连,R3的GE0/2(212.112.8.13/30)直接与Internet 上的路由器相连,路由器R1缺省路由的正确配置是 a A、ip route 0.0.0.0 0.0.0.0 212.112.8.6B、ip route 0.0.0.0 0.0.0.0 212.112.8.9C、ip route 0.0.0.0 0.0.0.0 212.112.8.10D、ip route 0.0.0.0 0.0.0.0 212.112.8.13(24)某局域网用一台路由器互连4个子网。

鸿鹄论坛_H3C-WLAN_GBO-340

鸿鹄论坛_H3C-WLAN_GBO-340

鸿鹄论坛_H3C-WLAN_GBO-3401.(多选题)在使用WLAN双频合路器进行室内分布式系统合路扩容时,以下说法正确的是:A.WLAN合路扩容方案可以通过两个AP采用不同的信道合路来提高整个WLAN系统容量。

B.采用此合路扩容方案时,WLAN合路器引入的插损约为2dB,在计算信号强度时需要考虑在内。

C.目前此扩容方案由于受器件特性限制,只支持channel 1和channel 11合路扩容,但是合路器的两个端口哪个接channel 1的AP,哪个接channel 11的AP并没有严格的限制。

D.项目实施中,如果使用FIT AP进行WLAN双频合路,建议开启无线控制器+FIT AP的负载分担功能,可以使无线用户均匀的连接到两个AP上,避免一个AP上用户很多,而另一个AP上的用户很少的情况发生。

Answer:ABCD2.(多选题)在无线网络勘测过程中,以下说法正确的是:A.在进行无线网络勘测时,需要保证覆盖范围与实际应用需求区域相同,当信号的覆盖受到障碍物的影响而导致无线信号覆盖范围无法满足实际应用需求区域时,则需要及时地调整部署方案。

B.在进行室内的多AP部署时,在满足一定用户密度的无线应用需求下,要选择合适的AP 安装位置、安装方式、发射功率等,以尽可能的减少三维空间中的信号可见数量。

C.当在三维空间内规划信号覆盖时,跨楼层的信号泄漏问题难以避免。

所以,对于信号泄露带来的无线链路质量下降问题需加以考虑和优化。

D.在进行室内的多AP部署时,为保证有较好的信号强度指标,AP应工作在最大发射功率,同时需要注意AP间的信道划分。

Answer:ABC3.(多选题)无线网络的勘测与设计是WLAN项目实施中的关键环节,好的勘测设计方案,可以:A.保证无线网络运行稳定B.提高设备使用效率,从而提高客户投资回报率C.减少无线网络的维护工作量D.彻底解决无线网络中的干扰源问题Answer:ABC4.(多选题)对半径小、并发用户少区域的描述正确的是:A.此类区域一般半径在60m以下,接入的用户不多。

鸿鹄论坛_H3CCE云计算题库

鸿鹄论坛_H3CCE云计算题库

鸿鹄论坛_H3CCE云计算题库1、以下CAS软件版本升级的说法正确的是:A 在进行CAS软件版本升级前,需要做好业务数据的备份工作B 断业务升级时,建议从虚拟机内部正常关闭虚拟机并暂停共享存储池C 升级完成后不清除浏览器缓存会出现CAS页面访问异常的问题D 只要在CVM主机执行升级操作,就可以同时完成CVM主机管理的CVK主机的升级操作2、以下关于配置操作系统信息方式的说法正确的是:A 使用完全初始化方式配置操作系统信息时,要求虚拟机模板中安装了CAS Tools工具B 部署的虚拟机需要加入AD域,则需要使用快速初始化方式配置操作系统信息C 部署的虚拟机需要加入AD域,则需要使用完全初始化方式配置操作系统信息D 使用快速初始化方式配置操作系统信息时,要求虚拟机模板中安装了CAS Tools工具3、以下关于CVM管理功能说法正确的是A 云业务基于CVM组件提供的虚拟化能力,将计算、存储和网络等物理资源抽象成按需提供的弹性虚拟资源池B 主机自动发现任务管理会自动搜索可添加的主机并将其添加到任务所属的集群下C 操作日志详细记录所有操作员对CVM所做的操作,并提供下载功能D 虚拟机视图管理功能使维护人员可以基于实际业务场景自定义虚拟机目录4、关于用户自助平台(svv),下列说法正确的是A 用户提出云主机申请后,需要组织管理员审批虚拟机电子流B 云主机申请电子流审批通过后,系统会自动部署虚拟机C 组织管理员可以通过虚拟机模板部署虚拟机并分配给组织用户D 用户提出云主机申请后,便可以直接获取虚拟机使用权5、某公司包含研发、市场两个部门,并相应分配了组织,如下说法正确的是A 组织管理员只能审批一个组织内的虚拟机电子流B 一个集群只能分配给某一个组织使用C 研发组织中用户申请的虚拟机只占用研发组织的计算和存储资源D 每个组织可以分配多个集群计算资源6、H3Cloud云计算解决方案包含A UIS服务器B UIS存储C UIS网络D CAS云计算管理平台7、以下关于虚拟机高可靠性(High Availability,简称HA)的描述正确的是A 开启HA功能之后,CVM会持续对集群内所有的服务器主机与虚拟机运行状况进行监测。

鸿鹄论坛HCNA-Storage试题

鸿鹄论坛HCNA-Storage试题

HCNA-StorageNumber: H13-611Passing Score: 800Time Limit: 120 minFile Version: 1.0Exam AQUESTION 1硬盘预拷贝技术的主要特点是(选择3个答案)A. 硬盘错误统计超过设定的阀值后,立即将数据从疑似故障盘中迁移到热备盘B. 降低重构事件发生的概率C. 提高系统的可靠性D. 会导致系统性能的降低Correct Answer: ABCSection: (none)ExplanationExplanation/Reference:QUESTION 2以下有关RAID 0的描述中,错误的是:A. RAID 0是无差错控制的条带化阵列B. RAID 0 的容量是各成员盘的容量之和C. RAID 0 至少要使用3块成员盘——最少2块盘D. RAID 0的数据是并行的写入到每个成员盘中Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 3文件存储是块存储之上构建文件系统,采用目录-目录-- 文件的方式组织数据,不容易管理A. TrueB. False ——文件存储是在块存储之上构建了文件系统,采用目录--目录--文件的方式组织数据,更容易管理;Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 4以下关于DAS和SAN的区别,描述不正确的是A. SAN使用FC或者iscsi协议,具有更好的可扩展性B. DAS和SAN均为外置存储,都非常易于实现存储资源共享——SAN不是外置存储的概念C. DAS主要应用于对外存储容量要求不高,服务器数量很少的中小型局域网D. SAN主要应用于关键数据库、集中存储、海量存储、备份、容灾等中高端存储应用环境Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 5以下文件系统中,属于windows ,文件系统由(选择3个答案)A. FAT16B. FAT32C. NTFSD. NPS ——非文件系统Correct Answer: ABCSection: (none)ExplanationExplanation/Reference:QUESTION 6华为T系列V100R005存储阵列设备中,需要导入license才能使用的功能有(选择3个答案)A. 虚拟快照B. LUN映射——此为存储基本功能,不需要licenseC. 远程复制D. 分裂镜像Correct Answer: ACDSection: (none)ExplanationExplanation/Reference:QUESTION 7针对存储阵列控制器或硬盘框上额级联模块描述正确的是(选择2个答案)A. 硬盘框的级联模块用于实现硬盘框与控制框或硬盘框与硬盘框的通信B. 控制器上硬盘级联模块分为PRI级联模块和EXP级联模块——只有PRI和EXP级联端口的说法C. 级联模块PRI必须与级联端口EXP之间进行连接D. 华为存储阵列设备中通常来用的级联端口为FC端口——级联通过mini SAS线来级联控制器和硬盘框,PRI和EXP端口,非FC端口Correct Answer: ACSection: (none)ExplanationExplanation/Reference:QUESTION 8在redhat linux 5操作系统中,如果要将dev目录下的sdb5挂载到mnt目录下的sdb5,可以采用的命令是A. cat /dev/sdb5 /mnt/sdb5B. in /dev/sdb5 /mnt/sdb5C. mount /deb/sdb5/ mnt/sdb5 ——标准的Linux mount命令D. df /dev/sdb5 /mnt/sdb5Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 9在主机内部应用环境中,一个数据读写IO一定会经过以下哪些环节(选择2个答案)A. FC HBA卡B. IO总线C. 网卡D. 存储介质Correct Answer: BD ——HBA卡、网卡只是IO通道的一部分Section: (none)ExplanationExplanation/Reference:QUESTION 10在华为T系列V100R005存储阵列中,通过ISM管理平台可以将一个启动器添加给多个主机【一个启动器只能添加给一个主机】A. TrueB. FasleCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 11在iSCSI通信中,Initiator 和target 建立连接后,initiator在操作系统中作为主设备控制整个工作过程——target才是主控端,initiator只是作为客户端连接工具A. TrueB. FasleCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 12在由3块磁盘组成的RAID 5中,如果在同一分条中写入两块数据成员盘中的数据分别是101 10110.11010011,则校验盘应写入01100101 ——RAID5校验码采用与计算,相同为0,不同为1【101 10110 和11010011进行与运算,结果正好为011 001 01】A. TrueB. FasleCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 13SCSI设备在经过总线仲裁获取了总线使用权后,利用SCSI体系结构传输层定义的协议在总线上选择目标设备,随后向该目标设备发送诸如读写命令——【SCSI传输流程是?】——SCSI互联网层完成SCSI设备对总线的连接以及发送方和目标方的选择等功能;另外发送命令应为发送方,非SCSI设备A. TrueB. FalseCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 14RAID 组的工作状态中,不包括哪种状态A. RAID 组正常工作B. RAID 组降低C. RAID 组失效D. RAID 组重建——重建已经不属于工作状态了Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 15在对象存储系统中,有关对象的描述错误的是A. 对象是对象存储的基本单位B. 对象包含了对象的数据本身,还包含了对象数据的属性C. 对象不维护自己的属性——数据对象都需要维护自己的属性D. 采用对象技术使数据分布更加灵活Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 16根据对系统的保护程度可将容灾分为(选择3个答案)A. 业务级容灾B. 应用级容灾C. 数据级容灾D. 异地容灾——异地容灾只是属于容灾的一种方式Correct Answer: ABCSection: (none)ExplanationExplanation/Reference:QUESTION 17NAS引擎的作用包括(选择3个答案)A. 提供文件共享接口B. 提供与存储连接接口C. 提供NAS软件运行的硬件平台D. 提供大容量存储空间——这是存储的作用,非NAS独有Correct Answer: ABCSection: (none)ExplanationExplanation/Reference:QUESTION 18数据存储过程中,IO流程顺序正确的是A. 操作系统> 上层业务应用> 文件系统> 设备驱动> 存储设备B. 上层业务应用> 操作系统> 文件系统> 设备驱动> 存储设备——数据存储时正常流程描述C. 操作系统> 上层业务应用> 设备驱动> 文件系统> 存储设备D. 上层业务应用> 操作系统> 设备驱动> 文件系统> 存储设备Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 19存储系统操作分级管理主要包括4个级别,分别为level 0 1 2 3 ,导致系统复位系统重启系统offline的操作属于哪一级A. level 0B. level 1C. level 2D. level 3 ——重启已经达以事故级别,已经造成了损失Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 20以下查看redhat liunx 5操作系统版本的方法正确的是A. show versionB. find versionC. cat versionD. uname –a ——可以正常显示系统内核版本,32或64位等信息,实际上无法查看系统版本Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 21在传统的计算机存储系统中,存储工作通常由计算机内置的硬盘来完成,针对传统的内置存储描述,以下描述正确的是(选择2个答案)A. 数据存储空间可靠性不足B. 存储空间利用率较高——存储阵列的特点C. 存储空间可扩展性好——存储阵列的特点D. 数据分散,不利于信息共享Correct Answer: ADSection: (none)ExplanationExplanation/Reference:QUESTION 22FC协议栈中的FC-2层定义了(选择2个答案)——FC协议有五层,其中FC-0定义承载介质类型,FC-1定义帧编码解码方式,FC-2定义分帧和流控机制,FC3定义通用服务,FC4定义上层协议到FC的映射A. 编码标准FC-1B. 解码标准FC-1C. 流控FC-2D. 服务质量FC-2Correct Answer: CDSection: (none)ExplanationExplanation/Reference:QUESTION 23在IP-SAN组网中,下列哪个设备通常作为iSCSI启动器A. 主机服务器——iSCSI启动器部署于主机上,通过initator客户端工具配置连接iSCSI存储的相应信息B. iSCSI磁盘阵列C. iSCSI磁带库D. 以太网交换机Correct Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 24iFCP协议具有以下哪几个特点(选择3个答案)A. iFCP协议为TCP/IP网络上的光纤通道设备提供光纤通信服务,实现端到端的IP连接B. iFCP协议位于TCP/IP协议和FC协议之间,可以起到连接着两种协议的网络的作用C. iFCP协议中FC设备的24位fabric地址被映射到一个唯一的IP地址上D. iFCP通过FC的底层传输层FC-2实现FC在IP网络上可靠传输——iFCP代替了FC的的底层传输层(FC-2),它使用TCP/IP在IP网络上进行可靠传输【注意是替代FC-2,不是通过FC-2传输】Correct Answer: ABCSection: (none)ExplanationExplanation/Reference:QUESTION 25以下关于IPMI的描述,错误的是A. IPMI是一个开放的标准,用户需要为使用该标准而支付额外的费用——不需要支付费用B. IPMI是为了管理给予intel架构中所使用的外围设备而采用的一种工业标标准C. IPMI的标准由英特尔、惠普、NEC 、美国戴尔电脑和supermicr等公司定制D. 用户可以利用IPMI监视服务器的健康特性,如温度、电压、风扇工作状态、电源状态等。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

鸿鹄网-----专业的网络技术启蒙学习网站学网络技术去鸿鹄网网络技术从零开始梦想之路鸿鹄开启鸿鹄论坛:鸿鹄团队致力于为每一位网络技术爱好者提供帮助。

有事您发帖,斑竹为您跑腿,给您答疑。

QQ::677633鸿鹄总客服QQ网络讲座,从零开始,永久免费,请加QQ群:76613848(500人超级群)培训详情:/bencandy.php?fid=167&id=4811鸿鹄网-----专业的网络技术启蒙学习网站300.What is the default routing update period for RIPv2?A.15secondsB.30SecondsC.180SecondsD.240SecondsAnswer:B301.What is the maximum data rate specified for IEEE 802.11b WLANs?A.10MbpsB.11MbpsC.54MbpsD.100Mbps鸿鹄网-----专业的网络技术启蒙学习网站.Answer:B302.Which type of attack is characterized by flood of packet that are requesting a TCP connection to a server?A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horseAnswer:A303.Refer to the exhibit.For what two reasons has the router loaded its IOS image from the location that is shown?(Choose two)A.Router1has specific boot system commands that instruct it to load IOS from TFTP server.B.Router1is acting as a TFTP server for other routers.C.Router1cannot locate a valid IOS image in flash memory.D.Router1defaulted to ROMMON mode and loaded the IOS image from a TFTP server.E.Cisco routers will first attempt to load a image from TFTP for management purposes.Answer:A E39Exhibit:Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in theexhibit,but there is no data connectivity between them.The Atlanta router is known to have a correctconfiguration.Given the partial configurations shown in the exhibit,what is the problem on the Brevardrouter that is causing the lack of connectivity?A.A loopback is not set.B.The IP address is incorrect.C.The subnet mask is incorrect.D.The serial line encapsulations are incompatible.E.The maximum transmission unit(MTU)size is too large.F.The bandwidth setting is incompatible with the connected interface.Answer:B304.What is the purpose using the traceroute command?A.to map all the devices on a networkB.to display the current TCP/IP configuration valuesC.to see how a device MAC address is mapped to its IP addressD.to see the path a packet will take when traveling to a specified destinationE.to display the MTU values for each router in a specified network path from source to a destination. Answer:D305.An administrator issues the command ping127.0.1from the command line prompt on a PC.If a reply is received,what does this confirm?A.The PC has connectivity with a local host.B.The PC has connectivity with a Layer3device.C.The PC has a default gateway correctly configured.D.The PC has correctively up to Layer5of the OSI model.E.The PC has the TCP/PC protocol stack correctly installed.Answer:E306.The output of the show frame-relay pvc command shows"PVC STATUS=INACTIVE".What does this mean?A.The PVC is configured correctly and is operating normally,but no data packets have been detected for more than five minutes.B.The PVC is configured correctly,is operating normally,and is no longer actively seeking the address the remote route.C.The PVC is configured correctly,is operating normally,and is waiting for interesting to trigger a call to the remote router.D.The PVC is configured correctly on the local switch,but there is a problem on the remote end of the PVC.E.The PVC is not configured on the switch.Answer:D307.Refer to the exhibit.Which command will created a default route on Router B to reach all networks beyond routerA?A.ip route0.0.0.00.0.0.0192.168.2.2B.ip route192.168.1.0255.255.255.0192.168.2.1C.ip route192.168.1.0255.255.255.0s0/0/0D.ip route10.0.0.0255.255.255.0s0/0/0E.ip route0.0.0.0255.255.255.0192.168.2.2Answer:A308.Which router IOS commands can be used to troubleshoot LAN connectivity problem?(Choose three.)A.pingB.tracertC.ipconfigD.show ip routeE.winipcfgF.show interfacesAnswer A D F309.Which of the following IP addresses can be assigned to host devices?(Choose two)A.205.7.8.32/27B.191.168.10.2/23C.127.0.0.1D.224.0.0.10E.203.123.45.47/28F.10.10.0/13Answer:B F310.What is a vaild reason for a switch to deny port access to new devices when port security is enabled?A.The denied MAC addresses have already been learned or configured on another secure interface in the same VLAN.B.The denied MAC address are statically cofigured on the port.C.The minimum MAC threshold has been reached.D.The absolute aging times for the denied MAC addresses have expired.Answer:B311.Which statement is correct about the intemetwork shown in the diagram?A.Switch2is the root bridge.B.Spanning Tree is not running.C.Host D and Server1are in the same network.D.No conlisions can occur in traffic between Host B and Host C.E.If Fa0/0is down on Router1,Host A cannot access Server1.F.If Fa0/1is down on Switch3,Host C cannot access Server2.Answer:E312.Which statement is correct regarding the operation of DHCP?A.A DHCP client uses a ping to detect address conficts.B.A DHCP server uses a gratuitous ARP to detect DHCP clients.C.A DHCP client uses a gratuitous ARP to detect a DHCP server.D.If an address conflict is detected,the address is removed from the pool and an administrator mustresolve the conflict.E.If an address conflict is detected,the address is removed from the pool for an amount of timeconfigurable by the administrator.F.If an address conflict is detected,the address is removed from the pool and will not be reused until theserver is rebooted.Answer:E313.Refer to the exhibit.Given the output from the show ip eigrp topology command,which router is thefeasible successor?Answer.C314.Refer to the digram.What is the largest configuration file that can be stored on this router?A.191K bytesB.16384K bytesC.31369K bytesD.114688K bytesAnswer:Aers have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded.Based on the partial output of the Router# show frame relay pvc command shown in the graphic,which output value indicates to the loacal router that traffic sent to the corporate site is experiencing congestion?A.DLCI=100st time PVC status changed00:25:40C.in BECN packets192D.in FECN packets147F.in DF packets0Answer:C316.Which statement is correct about the internetwork shown in the diagram?A.Switch2is the root bridge.B.Spaning Tree is not runing.C.Host D and Server1are in the same network.D.No collisions can occur in traffic between Host B and Host C.E.If Fa0/0is down on Router1,Host A cannot access Server1.F.If Fa0/1is down on Switch3,Host C cannot access Server2.Answer:C317.A network administrator needs to allow only one Telnet connection to a router.For anyone viewingthe configuration and issuing the show run command,the password for Telnet access should be encrypted.Which set of commands will accomplish this task?A.service password-encryptionaccess-list1permit192.168.1.0.0.0.0.255loginpassword ciscoaccess-class1B.enable password secretline vty0loginpassword cisco184/187C.service password-encryptionline vty0loginpassword ciscoD.service password-encryptionline vty04loginpassword ciscoAnswer:C318.Refer to the exhibit.What is the meaning of the output MTU1500bytes?A.The maximum number of bytes that can traverse this interface per second is1500.B.The minimum segment size that can traverse this interface is1500bytes.C.The maximum segment size that can traverse this interface is1500bytes.D.The minimum packet size that can traverse this interface is1500bytes.E.The maximum packet size that can traverse this interface is1500bytes.F.The maximum frame size that can traverse this interface is1500bytes.Answer:E319.Refer to the exhibit.A network administrator configures a new router and enters the copystarup-config running-config command on the router.The network administrator powers down the routerand sets it up at a remote location.When the router starts,it enters the system configuration dialog asshown.What is the cause of the problem?185/187A.The network administrator failed to save the configuration.B.The configuration register is set to0*2100.C.The boot system flash command is missing from the configuration.D.The configuration register is set to0*2102.E.The router is configured with the boot system startup command.Answer:A320.Refer to the exhibit.An organization connects two locations,supporting two VLANs,through twoswitches as shown.Inter-VLANs communication is not required.The network is working properly andthere is full connectivity.The organization needs to add additional VLANs,so it has been decided toimplement VTP.Both switches are configured as VTP servers in the same VTP domain.VLANs added toSwitch1are not learned by Switch2.Based on this information and the partial configurations in the exhibit,what is the problem?186/187A.Switch2should be configured as a VTP client.B.VTP is Cisco proprietary and requires a different trunking encapsulation.C.A router is required to route VTP advertisements between the switches.D.STP has blocked one of the links between the switches,limiting connectivity.E.The links between the switches are access links.Answer:DE.The links betw321.An administrator is trying to ping and telnet from Switch to Router with the results shown below:Switch>Switch>ping10.4.4.3Type escape sequence to abort.Sending5,100-byte ICMP Echos to10.4.4.3,timeout is2seconds:.U.U.USuccess rate is0percent(0/5)Switch>Switch>telnet10.4.4.3Trying10.4.4.3...%Destination unreachable;gateway or host downSwitch>Click the console connected to Router and issue the appropriate commands to answer the questions.For this question we only need to use the show running-config command to answer all the questionsbelowRouter>enableRouter#show running-configQuestion1:Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?A-Correctly assign an IP address to interface fa0/1B-Change the ip access-group command on fa0/0from"in"to"out"C-Remove access-group106in from interface fa0/0and add access-group115in.D-Remove access-group102out from interface s0/0/0and add access-group114inE-Remove access-group106in from interface fa0/0and add access-group104in Answer:EQuestion2:What would be the effect of issuing the command ip access-group114in to the fa0/0 interface?A-Attempts to telnet to the router would failB-It would allow all traffic from the10.4.4.0networkC-IP traffic would be passed through the interface but TCP and UDP traffic would notD-Routing protocol updates for the10.4.4.0network would not be accepted from the fa0/0interfaceAnswer:BQuestion3:What would be the effect of issuing the command access-group115in on the s0/0/1interface? A-No host could connect to Router through s0/0/1B-Telnet and ping would work but routing updates would fail.C-FTP,FTP-DATA,echo,and www would work but telnet would failD-Only traffic from the10.4.4.0network would pass through the interface322.Case Study#1:Scenario:The diagram represents a small network with a single connection to the ing the informationshown,answer the following questions.Refer to the topology.Case Study#1(5Questions)1.If the router R1has a packet with a destination address192.168.1.255,what describes the operation of the network?A-R1will forward the packet out all interfaces.B-R1will drop this packet because this it is not a valid IP address.C-As R1forwards the frame containing this packet,Sw-A will add192.168.1.255to its MAC table.D-R1will encapsulate the packet in a frame with a destination MAC address of FF-FF-FF-FF-FF-FF.E-As R1forwards the frame containing this packet,Sw-A will forward it to the device assigned the IPaddress of192.168.1.255.Answer:Bers on the192.168.1.0/24network must access files located on the Server1.What route couldbe configured on router R1for file requests to reach the server?A-Ip route0.0.0.00.0.0.0s0/0/0B-Ip route0.0.0.00.0.0.0209.165.200.226C-Ip route209.165.200.0255.255.255.0192.168.1.250D-Ip route192.168.1.0255.255.255.0209.165.100.250Answer:A324.When a packet is sent from Host1to Server1,in how many different frames will the packet beencapsulated as it is sent across the internetwork?A-0B-1C-2D-3E-4Answer:D325.What must be configured on the network in order for users on the Internet to view web pageslocated on Web Server2?A-On router R2,configure a default static route to the192.168.1.0network.B-On router R2,configure DNS to resolve the URL assigned to Web Server2to the192.168.1.10address.C-On router R1,configure NAT to translate an address on the209.165.100.0/24network to 192.168.1.10.D-On router R1,configure DHCP to assign a registered IP address on the209.165.100.0/24 networkto Web Server2.Answer:C326.The router address192.168.1.250is the default gateway for both the Web Server2and Host1What is the correct subnet mask for this network?A-255.255.255.0B-255.255.255.192C-255.255.255.250D-255.255.255.252Answer:A327.Case Study#2:Refer to the topology.Scenario:Case Study#2(4Questions)1.What destination Layer2address will be used in the frame header containing a packet for host172.30.4.4?A-704B-196C-702D-344Answer:C328.A static map to the S-AMER location is required.Which command should be used to create thismap?A-frame-relay map ip172.30.0.3704broadcastB-frame-relay map ip172.30.0.3196broadcastC-frame-relay map ip172.30.0.3702broadcastD-frame-relay map ip172.30.0.3344broadcastAnswer:B329.Which connection uses the default encapsulation for serial interfaces on Cisco routers?A-The serial connection to the MidEast branch office.B-The serial connection to the DeepSouth branch office.C-The serial connection to the NorthCentral branch office.D-The serial connection to the Multinational branch office.Answer:A330.If required,what password should be configured on the router in the MidEast branch office to allowa connection to be established with the Dubai router?A-No password is requiredB-EnableC-ScraD-T1netE-ConsoleAnswer:A331.Case Study#3Refer to the topology:Case Study#3(4Questions)1.Refer to the exhibit.Using the information shown,answer the question.All hosts in the networks have been operational for several hours when the DHCP server goes down.What happens to the hosts that have obtained service from the DHCP server?A-The hosts will not be able to communicate with any other hosts.B-The hosts will continue to communicate normally for a period of timE:C-The hosts will be able to communicate with hosts outsides their own networkD-The hosts wll only be able to communicate with other hosts by IP address not by hostnameAnswer:B332.Refer to the exhibit.Using the information shown.What is the purpose of the DHCP server?A-To provide storage for emailB-To translate URLs to IP addressesC-To translate IPv4addresses to MAC addressesD-To provide an IP configuration information to hostsAnswer:D333.Refer to the exhibit.Using the information shown How is the message sent from a PC2when is first powers on andattempts to contact the DHCP Server?A-Layer3unicastB-Layer3broadcastC-Layer3multicastD-Without any Layer3encapsulationAnswer:B334.Refer to the exhibit.Using the information shown What is the default behavior of1when PC1requests service from DHCPserver?A-Drop the request.B-Broadcast the request to2and3C-Forward the request to2D-Broadcast the request to2,3and ISPAnswer:A335..This task requires you to use the CLI of Sw-AC3to answer five multiple-choice questions. This doesnot require any configuration.To answer the multiple-choice questions,click on the numbered boxes in the right panel. There are five multiple-choice questions with this task.Be sure to answer all five questions beforeleaving this item.Question1:What interface did Sw-AC3associate with source MAC address0010.5a0c.ffba?a)Fa0/1b)Fa0/3c)Fa0/6d)Fa0/8e)Fa0/9f)Fa0/12Answer:d)Question2:What ports on Sw-AC3are operating has trunks(choose three)?a)Fa0/1b)Fa0/3c)Fa0/4d)Fa0/6e)Fa0/9f)Fa0/12Answer:b),e)and f)Question3:What kind of router is VLAN-R1?a)1720b)1841c)2611d)2620Answer:d)Question4:Which switch is the root bridge for VLAN1?Answer:Sw-DS1Question5:What address should be configured as the default-gateway for the host connected to interface fa0/4ofSW-Ac3?Answer:192.168.44.254Question6:From which switch did Sw-Ac3receive VLAN information?Answer:Sw-AC2Question7:Refer to the exibit,SwX was taken out of the production network for maintenance.It will be reconnected to the Fa0/16port of Sw-Ac3.What happens to the network when it is reconnected and atrunk exists between the two switches?A-All VLANs except the default VLAN win be removed from all switchesB-All existing switches will have the students,admin,faculty,Servers,Management,Production,andno-where VLANsC-The VLANs Servers,Management,Production and no-where will replace the VLANs on SwXD-The VLANs Servers,Management,Production and no-where will be removed from existingswitchesAnswer and Explanation:First we should view the VTP configuration of switch Sw-Ac3by using the show vtp status commandon Sw-Ac3Notice that its configuration revision number is5and VTP Domain Name is home-office Next,from the exhibit we know that SwX has a revision number of6,which is greater than that of Sw-Ac3switch,and both of them have same VTP Domain Name called"home-office".Therefore SwX will replace vlan information on other switches with its own information. We should check vlan information of Sw-Ac3switch with show vlan commandSo the correct answer is D-The VLANs Servers,Management,Production and no-where will beremoved from existing switchesPlease notice that in the real CCNA exam you may see a different configuration revision of Sw-Ac3orof SwX.In general,which switch has a higher revision number it will become the updater and otherswitches will overwrite their current databases with the new information received from the updater(provided that they are on the same domain and that switch is not in transparent mode). Question8:Out of which ports will a frame be forwarded that has source mac-address0010.5a0c.fd86 anddestination mac-address000a.8a47.e612?(Choose three)A-Fa0/8B-Fa0/3C-Fa0/1D-Fa0/12Answer:B C DQuestion9:If one of the host connected to Sw-AC3wants to send something for the ip190.0.2.5(or any ip that isnot on the same subnet)what will be the destination MAC addressAnswer and Explanation:Because the destination address is not on the same subnet with the switch,it will forward the packet toits default gateway.So we have to find out who is the default gateway of this switch by using the showrunning-config commandFrom the output,we notice that its default-gateway is192.168.1.254.In fact,we can easily guess thatits default gateway should be a layer3device like a router;and in this case,the VLAN-R1 router.Toverify our theory,use the show cdp neighbor detail command and focus on the description of VLANR1routerFrom this output,we can confirm the switch's default gateway is VLAN-R1router(with the IP addressof192.168.1.254).And"the interface:FastEthernet0/3"tells us that the switch is connected to VLANR1router through Fa0/3port(Fa0/3is the port on the switch).Finally we just need to use the show mac-address-table command to find out which MAC address isassociated with this interfaceAnd we find out the corresponding MAC address is000a.b7e9.8360.Although there are some entriesof port Fa0/3with different Vlans but they have the same MAC address336.This topology contains3routers plete the topology.Drag the appropriate device icons to the labeled DeviceDrag the appropriate connections to the locations labeled Connections.Drag the appropriate IP addresses to the locations labeled IP address(Hint:use the given host addresses and Main router information)To remove a device or connection,drag it away from the topology.Use information gathered from the Main router to complete the configuration of any additional routers.No passwords are required to access the Main router.The config terminal command has beendisabled for the HQ router.The router does not require any configuration.Configure each additional router with the following:Configure the interfaces with the correct IP address and enable the interfaces.Set the password to allow console access to consolepwSet the password to allow telnet access to telnetpwSet the password to allow privilege mode access to privpwNote:Because routes are not being added to the configurations,you will not be able to ping throughthe internetwork.All devices have cable autosensing capabilities disabled.All hosts are PC’sA.Specify appropriate devices and drag them on the"Device"boxesFor the device at the bottom-right box,we notice that it has2interfaces Fa0/2and Fa0/4; moreoverthe link connects the PC on the right with the device on the bottom-right is a straight-through link->itis a switchThe question stated that this topology contains3routers and1switch->two other devices are routersPlace them on appropriate locations as following:(Host D and host E will be automatically added after placing two routers.Click on them to accessneighboring routers)Specify appropriate connections between these devices:+The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable+The router on the right is connected with the Main router through Serial interfaces:use a serial cable+The router on the right and the Switch:use a straight-through cable+The router on the left and the computer:use a crossover cable(To remember which type of cable you should use,follow these tips:-To connect two serial interfaces of2routers we use serial cable-To specify when we use crossover cable or straight-through cable,we should remember: Group1:Router,Host,ServerGroup2:Hub,SwitchOne device in group1+One device in group2:use straight-through cableTwo devices in the same group:use crossover cableFor example:we use straight-through cable to connect switch to router,switch to host,hub to host,hub to server...and we use crossover cable to connect switch to switch,switch to hub,router to router,host to host...)Assign appropriate IP addresses for interfaces:From Main router,use show running-config command:(Notice that you may see different IP addresses in the real CCNA exam,the ones shown above arejust used for demonstration)From the output we learned that the ip address of Fa0/0interface of the Main router is 192.168.152.177/28.This address belongs to a subnetwork which has:Increment:16(/28=255.255.255.240or11111111.11111111.11111111.11110000) Network address:192.168.152.176(because176=16*11and176<177)Broadcast address:192.168.152.191(because191=176+16-1)And we can pick up an ip address from the list that belongs to this subnetwork:192.168.152.190andassign it to the Fa0/0interface the router on the leftUse the same method for interface Serial0/0with an ip address of192.168.152.161 Increment:16Network address:192.168.152.160(because160=16*10and160<161)Broadcast address:192.168.152.175(because176=160+16-1)->and we choose192.168.152.174for Serial0/0interface of the router on the right Interface Fa0/1of the router on the leftIP(of the computer on the left):192.168.152.129/28Increment:16Network address:192.168.152.128(because128=16*8and128<129)Broadcast address:192.168.152.143(because143=128+16-1)->we choose192.168.152.142from the listInterface Fa0/0of the router on the rightIP(of the computer on the left):192.168.152.225/28Increment:16Network address:192.168.152.224(because224=16*14and224<225) Broadcast address:192.168.152.239(because239=224+16-1)->we choose192.168.152.238from the listLet's have a look at the picture below to summarizeConfigure two routers on the left and right with these commands:Router1=router on the leftAssign appropriate IP addresses to Fa0/0&Fa0/1interfaces:Router1>enableRouter1#configure terminalRouter1(config)#interface fa0/0Router1(config-if)#ip address192.168.152.190255.255.255.240Router1(config-if)#no shutdownRouter1(config-if)#interface fa0/1Router1(config-if)#ip address192.168.152.142255.255.255.240Router1(config-if)#no shutdownSet passwords(configure on two routers)+Console password:Router1(config-if)#exitRouter1(config)#line console0Router1(config-line)#password consolepwRouter1(config-line)#loginRouter1(config-line)#exit+Telnet password:Router1(config)#line vty04Router1(config-line)#password telnetpwRouter1(config-line)#loginRouter1(config-line)#exit+Privilege mode password:Router1(config)#enable password privpwSave the configuration:Router1(config)#exitRouter1#copy running-config startup-configConfigure IP addresses of Router2(router on the right)Router2>enableRouter2#configure terminalRouter2(config)#interface fa0/0Router2(config-if)#ip address192.168.152.238255.255.255.240Router2(config-if)#no shutdownRouter2(config-if)#interface serial0/0Router2(config-if)#ip address192.168.152.174255.255.255.240Router2(config-if)#no shutdownand set console,telnet and privilege mode passwords for Router2as we did for Router1, remember tosave the configuration when you finishedAnswer:A337.A dental firm is redesigning the network that connects its three locations.The administrator gave the networkingteam192.168.164.0to use for addressing the entire netwok.After subnetting the address,the team is ready toassign the addresses.The administrator plans to configure ip subnet-zero and use RIP v2as the routing protocol.As a member of the networking team,you must address the network and at the same time conserver unusedaddresses for future growth.With those goals in mind,drag the host addresses on the left to the correct routerinterface.Once of the routers is partially configured.Move your mouse over a router to view its configuration.Notall of the host addresses on the left are necessary.A.338.The Missouri branch office router is connected through its s0interface to the Alabama Headquartersrouter s1interface.The Alabama router has two LANs.Missouri users obtain Internet access throughthe Headquarters router.The network interfaces in the topology are addressed as follows: Missouri:e0-192.168.35.17/28;s0-192.168.35.33/28;Alabama:e0-192.168.35.49/28;e1-192.168.35.65/28;s1-192.168.35.34/28.The accounting server has the address of192.168.35.66/28.Match the access list conditions on the leftwith the goals on the right.(Not all options on the left are used.)A.。

相关文档
最新文档