CCNA Final E am CCNA第一学期期末考试
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit。
Which set of devices contains only intermediary devices?A,B,D, GA,B,E,FC,D, G,IG, H,I, J3Refer to the exhibit。
The headers added at each layer are shown。
Which layer adds the destination and source process ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full—duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1。
CCNA第一学期各章习题及答案.doc
诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14 第四章 OSI 传输层 P15-20第五章 OSI 网络层 P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章 OSI 物理层 P41-45第九章以太网P46-51第十章网络规划和布线P52-61 第十一章配置和测试网络P62-70 第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包2下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003 下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层6请参见图示。
所示网络属于哪一类型WANMANLANWLAN7以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第 4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务9请参见图示。
CCNA第一学期各章习题及答案
诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61第十一章配置和测试网络P62-70第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用?路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网 (LAN) 最准确的描述?(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商 (TSP)。
004 什么是 PDU?传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与 TCP/IP 模型的网络接入层相同?(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。
所示网络属于哪一类型?WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备?管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第 4 层端口指定的主要作用是什么?标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit。
Which Layer 2 protocol could be used inside nework A and network C?I PT CPU DPE thernet2Refer to the exhibit。
Which set of devices contains only intermediary devices?A,B,D,GA,B,E, FC, D,G,IG, H, I,J3Refer to the exhibit。
The headers added at each layer are shown。
Which layer adds the destination and source process ensure that data is delivered to the correct application?p hysical layerd ata link layern etwork layert ransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?s ervice port numberh ost logical addressd evice physical addressv irtual connection identifier5Which fiber connector supports full—duplex Ethernet?6Which device should be used for routing a packet to a remote network?a ccess switchD HCP serverh ubr outer7Refer to the exhibit。
最新版本CCNA考试第一章期末考试答案b
最新版本CCNA考试第一章期末考试答案本文提供了最新版本的CCNA考试第一章期末考试答案,以供考生参考。
第一部分:单项选择题1. 以下哪种设备可用于实现广域网?A. 路由器B. 交换机C. 防火墙D. 网桥正解:A2. 哪一个网络层协议是用于将MAC地址转换为IP地址?A. ARP协议B. TCP协议C. UDP协议D. ICMP协议正解:A3. 网络安全中,以下哪项是确保数据在传输过程中不被窃取或修改的安全措施?A. 机密性B. 完整性C. 可用性D. 可验证性正解:B4. 在OSI模型中,下列哪层负责对收到的数据进行重新组装和排序?A. 传输层C. 数据链路层D. 物理层正解:A5. 哪种类型的地址可以用于从源到目的地的识别和路由?A. 物理地址B. MAC地址C. IP地址D. 逻辑地址正解:C第二部分:多项选择题1. 选择下列关于TCP传输协议的正确说法。
(可多选)A. TCP使用可靠性较低的UDP协议B. TCP的流控制指令有多种方式C. TCP在传输层实现D. TCP提供无连接服务正解:B、C2. 在主机间进行通信时,哪个MAC地址首先被使用?A. 源主机的MAC地址B. 目的主机的MAC地址C. 网关的MAC地址D. 路由器的MAC地址正解:C3. 下列哪个网络拓扑结构最好的容错性?A. 星形拓扑C. 总线型拓扑D. 带环形拓扑正解:A4. 以下哪个选项是网络安全的最佳实践?A. 使用复杂的密码并定期更改B. 允许所有用户访问系统C. 共享所有文件和文件夹D. 手动分配IP地址正解:A5. 哪种网络协议可以在发送方和接收方之间创建安全的数据连接?A. SSLB. HTTPC. FTPD. SMTP正解:A第三部分:简答题1. 请简要解释网络拓扑结构。
网络拓扑结构指的是计算机网络中设备的布局方式。
常见的网络拓扑包括星型、环状、总线型和带环型等。
其中,星型拓扑结构最为常见,它由多台计算机通过中心节点相连而组成。
ccna1章节及期末试题答案
第一章:正确答案:2.4.5解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。
而且对等网络也没有集中管理。
这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。
正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。
正确答案:1和4解析:终端设备会发出通过网络传输的数据。
中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。
网络介质提供网络消息的传输通道。
正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。
内部网只描述通常仅供内部人员访问的网络区域。
当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。
使用大学无线LAN 的设备多为平板电脑和智能手机。
大学生主要使用无线WAN 来访问他们的手机运营商网络。
.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。
内联网基本上是仅供内部使用的局域网。
外联网是外部合作伙伴访问组织内部特定资源的网络。
家庭用户并不一定使用LAN 来访问Internet。
例如,PC 可以通过调制解调器直接连接到ISP。
正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。
内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。
正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。
10正确答案:2和3解析:移动电话连接需要使用移动电话网络。
卫星连接通常用于家庭或企业外部不便使用物理布线的位置。
11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。
思科第一学期期末试题目及答案
1请参见图示。
主机 A 用户向主机 B 用户发送了一封电子邮件。
主机 A 发送了哪种类型的信息?广播组播同播单播2为了将PC 加入到网络环境中,应通过软件配置哪两个组件?(选择两项。
)MAC 地址IP 地址内核外壳(shell)子网掩码3哪两项是MAC 地址的特征?(选择两项。
)指示网络中主机的物理位置。
由DHCP 服务器动态分配。
以十六进制格式显示。
是物理地址。
是一种基于电缆的地址。
4哪种连接需要使用直通电缆?PC 端口至PC 端口PC 端口至路由器接口交换机端口至路由器端口交换机端口至交换机端口5路由器在收到包含广播MAC 地址的帧时会执行什么操作?它不会将该帧转发给另一个网络。
它会以其IP 地址作为回复将该帧转发回发送主机。
它会将帧从除该帧所在接口的其它所有接口转发出去。
它会将该帧转发回接收接口,以确保局域网中的所有主机都能收到。
6DNS 服务器的功能是什么?将IP 地址映射为MAC 地址。
将计算机或域名转换为相应的IP 地址。
管理客户端所在的域。
接收从客户端发来的HTTP 请求。
7哪两种网络故障与物理层相关?(选择两项。
)电缆和接头损坏编址不正确子网掩码不正确组件过热默认网关不正确8哪一层是主机进入网络的第一个进入点?核心层接入层网络层分布层9下列哪些是私有IP 地址的地址范围?(选择三项。
)10.0.0.0 到10.255.255.255200.100.50.0 到200.100.25.255150.150.0.0 到150.150.255.255172.16.0.0 到172.31.255.255192.168.0.0 到192.168.255.255127.16.0.0 到127.31.255.25510请参见图示。
一家组织的安全策略允许员工在家里连接办公室内部网。
这是一种什么安全策略?合理使用事件处理网络维护远程访问11请参见图示。
将Linksys 集成路由器上的安全模式设置为WEP 有什么作用?WEP 安全模式能够使接入点向客户端告知它的存在。
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source pro to ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for h in the MAC table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last bee modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved c on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Althou 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled interface of the New York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolutioapplication layer services should be added to the server to allow these needs to be satisfied dynamically? (CDNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 enable this access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 usersoffice, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the rese Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wastin addresses?192.168.88.0/26 main192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are show cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician this problem?Configure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. How is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC t Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in What is the IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see w the hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which netwo interface does the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router the problem, which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with gateway?Use the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19. 30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use thto log on from any of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port num is assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.1 Which statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web s client application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configurationan FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the ause?enableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to dete intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuin erase start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.bits set in the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of t shown. Which default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of subnet mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below th identifies the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。
思科第一学期期末考试最新考题CCNA1备课讲稿
思科第一学期期末考试最新考题C C N A11Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfacnetwork card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423the IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 491 assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254 statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server.application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。
CCNA网络第一期期末测试答案
参加考试- ENetwork Final Exam - CCNA Exploration: 网络基础知识(版本4.0)1请参见图示。
路由器已启用NAT 功能以供PC 访问Internet,但是PC 仍然让PC 能够访问Internet,应将哪一项IP 地址更改为209.165.201.1?192.168.1.191192.168.1.101192.168.1.1192.168.1.2542请参见图示。
图中所示为客户端之间发送电子邮件的过程。
以下哪一列表正确使用的组件或协议?1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA3数据链路层有哪两项功能?(选择两项)分割和记录数据。
在源主机和目的主机上运行的程序之间进行数据交换。
控制数据如何传递到介质中。
生成信号以表示每个帧中的比特。
使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。
4请参见图示。
PC 已连接到网络。
下列哪一项操作将验证PC 能够与其默认网关通信?使用ping 127.0.0.1命令。
使用ipconfig命令。
使用ipconfig/all命令。
使用ping 10.0.0.254命令。
5一位技术人员必须通过要求提供口令来确保交换机特权执行模式的安全。
哪种类型的口令能满录的需要并可视为最安全的口令?控制台电缆使能使能加密口令VTY6请参见图示。
下列关于图中所示IP 配置的陈述,哪三项是正确的?(选择三项)分配给该计算机的地址代表私有地址。
该计算机无法在本地网络外通信。
此计算机的网络可支持126 台主机。
该计算机地址的前缀是/27。
分配给该计算机的IP 地址可在Internet 上路由。
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit。
Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit。
Which set of devices contains only intermediary devices?A, B,D,GA,B,E, FC, D,G,IG,H, I, J3Refer to the exhibit. The headers added at each layer are shown。
Which layer adds the destination and source process n ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit。
Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is n table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame。
CCNA第一学期Finalexam考试英文版答案
CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。
CCNA第一学期各章习题和参考答案.doc
CCNA第一学期各章习题和参考答案第二章网络通信1、TCP/IP网络接入层有何作用?A路径确定和数据包交换B数据表示、编码和控制C可靠性、流量控制和错误检测E将数据段划分为数据包2、下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)B发起数据通信D发送数据流F数据流最后的终止点3、下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)C LAN 中的不同网段之间一般通过租用连接的方式连接。
D此类网络的安全和访问控制由服务提供商控制。
F此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU?A传输期间的帧损坏B在目的设备上重组的数据C因通信丢失而重新传输的数据包005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)018哪个应用层协议通常用于支持客户端与服务器之间的文件传输?A HTMLB HTTP D Telnet019哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?A DHCPB DNS D SMTP E Telnet020服务器上的应用层通常如何处理多客户端服务请求?A终止与服务的所有连接B拒绝与单一守护程序的多个连接C暂停当前连接,建立新连接第四章OSI传输层001下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)A流量控制 D 面向连接E 序列和确认002请参见图示。
此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?A会话创建B 数据段重传C 数据传输D 会话断开003数据段的TCP 报头中为什么包含端口号?A指示转发数据段时应使用的正确路由器接口B 标识接收或转发数据段时应使用的交换机端口C确定封装数据时应使用的第3 层协议让接收主机转发数据到适当的应用程序E让接收主机以正确的顺序组装数据包004OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?A应用层 B 表示层 C 会话层传输层 E 网络层005请参见图示。
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit。
Which Layer 2 protocol could be used inside nework A and network C?I PT CPU DPE thernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A,B, D,GA, B,E, FC,D, G,IG, H, I, J3Refer to the exhibit。
The headers added at each layer are shown。
Which layer adds the destination and source process ensure that data is delivered to the correct application?p hysical layerd ata link layern etwork layert ransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?s ervice port numberh ost logical addressd evice physical addressv irtual connection identifier5Which fiber connector supports full—duplex Ethernet?6Which device should be used for routing a packet to a remote network?a ccess switchD HCP serverh ubr outer7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1。
思科第一学期期末考试考题CCNA
1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configurationserver before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhib IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 4915 to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine whic device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。
CCNA期末考试题及答案试卷A(仅供参考)
1.下列有关网络层编址的陈述中哪三项是正确的?(选择三项。
)网络层编址使用分层式结构。
使用长度为48 位的地址。
以太网交换机可以使用它来作出转发决定。
它不支持广播。
其使用的编址方法可以识别地址的网络部分。
网络层编址可以区分每台主机。
2请参见图示。
网络中的所有设备均使用默认配置。
此拓扑中存在多少个广播域?3579113请参见图示。
主机B 已断电。
交换机的MAC 表将发生什么变化?MAC 表不会受影响。
交换机会在Fa0/19 上删除MAC 地址。
交换机会保留MAC 地址,直到主机B 再次通电。
交换机将通过为端口Fa0/19 分配地址FFF.FFFF.FFFF 来重建MAC表。
4.请参见图示。
为了使此网络中的主机接入Internet,路由器RT_A 需要提供哪种功能?地址转换DHCP 服务ftpWeb 服务器5.哪三个地址属于私有IP 地址?(选择三项。
)10.0.0.1127.0.0.1150.0.0.1172.16.0.1192.168.0.1200.100.50.16请参见图示。
电缆1 和电缆2 分别按照特定的物理层要求接线。
表中按编号列出了每个网段以及该网段中用来连接网络组件的电缆。
哪三个网段安装的电缆是正确的?(选择三项。
)网段1网段2网段3网段4网段5网段67.OSI 模型的哪两项功能在第2 层实现?(选择两项)物理编址编码路由布线介质访问控制8.请参见图示。
网络管理员想通过Modem1 从PC1 远程访问路由器的CLI。
要实现此访问,应将路由器的哪一个端口连接到Modem2?控制台端口以太网端口辅助端口串行端口9请参见图示。
某学生对5e 类电缆两端的接线方法如图所示。
结果是什么?(选择两项)电缆无法使用,必须重新接线。
该电缆适合作为全反电缆使用。
该电缆适合作为快速以太网交叉电缆使用。
该电缆适合作为千兆以太网直通电缆使用。
该电缆适合在支持Auto-MDIX 的两台100 Mbps 交换机之间使用。
思科第一学期期末考试最新考题CCNA1
1Refer to the exhibit。
Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit。
Which set of devices contains only intermediary devices?A,B,D,GA, B, E,FC,D, G,IG,H, I,J3Refer to the exhibit。
The headers added at each layer are shown. Which layer adds the destination and source process n ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full—duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
CCNA1ENetworkFinalExam -CCNAExploration: 网络基础知识(版本下列有关网络层编址的陈述中哪三项是正确的?(选择三项。
)网络层编址使用分层式结构。
使用长度为48 位的地址。
以太网交换机可以使用它来作出转发决定。
它不支持广播。
其使用的编址方法可以识别地址的网络部分。
网络层编址可以区分每台主机。
请参见图示。
在PC 上发出所示的命令。
IP 地址代表什么?主机的IP 地址主机的默认网关主机的主页IP 地址主机的首选域名服务器网站的IP 地址。
哪三个地址属于公有IP 地址?(选择三项。
)数据链路层有哪两项功能?(选择两项)分割和记录数据。
在源主机和目的主机上运行的程序之间进行数据交换。
控制数据如何传递到介质中。
生成信号以表示每个帧中的比特。
使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。
请参见图示。
主机A 要访问Internet。
哪项第2 层地址和第3 层地址的组合可以让主机A 实现此访问?目的MAC:,默认网关:目的MAC:,默认网关:目的MAC:,默认网关:目的MAC:,默认网关:下列哪三项是CSMA/CD 的特征?(选择三项。
)设备会侦听介质,并且仅当无法检测到介质上存在其它信号时才会传输数据。
介质上的所有设备均可侦听所有通信。
设备根据配置的优先级来进行通信。
发生冲突后,引起冲突的设备会优先尝试传输数据。
发生冲突时,所有设备会在一段时间内停止传输数据,该段时间的长度随机决定。
CSMA/CD 使用令牌系统来避免冲突。
下列哪三个IPv4 地址代表子网的有效网络地址?(选择三项。
)请参见图示。
用记号来表示每条介质链路。
用来连接不同设备的正确电缆类型是什么?连接1 - 直通电缆,连接2 - 直通电缆,连接3 - 交叉电缆连接1 - 直通电缆,连接2 - 交叉电缆,连接3 - 全反电缆连接1 - 交叉电缆,连接2 - 全反电缆,连接3 - 直通电缆连接1 - 交叉电缆,连接2 - 直通电缆,连接3 - 交叉电缆连接1 - 直通电缆,连接2 - 全反电缆,连接3 - 交叉电缆请参见图示。
主机C 能够成功地ping 通,但无法与组织中的主机A 和B 通信。
此问题的原因可能是什么?主机A 和B 与主机 C 不在同一个子网中。
路由器串行接口上的IP 地址有误。
主机C 配置的子网掩码不正确。
路由器1 的FastEthernet 接口配置有误。
请参见图示。
根据显示的IP 配置回答,主机A 和主机B 无法在本地网络外通信的原因是什么?对主机A 分配了网络地址。
对主机B 分配了组播地址。
主机A 和主机B 属于不同的网络。
对网关地址分配了广播地址。
请参见图示。
假设所有设备均使用默认配置。
支持显示的拓扑需要多少个子网?13457请参见图示。
主机A 发送了一个以为目的MAC 地址的帧。
交换机将如何处理该帧?它会丢弃该帧。
它会将该帧送回到主机A。
它会将该帧发送到除主机A 之外的所有主机。
它会将该帧转发到默认网关。
哪个OSI 层提供面向连接的可靠数据通信服务?应用层表示层会话层传输层网络层当客户端应用程序发出到服务器的连接时,下列哪一个范围的端口号会动态地分配到客户端应用程序?0到2550到10231024 到49151大于65535请参见图示。
路由器的路由表如图所示。
该路由器收到以为目的地址的数据包。
它将如何处理该数据包?它会丢弃数据包。
它会通过FastEthernet 0/1 转发该数据包。
它会将数据包转发到下一跳地址。
它会将数据包转发到。
请参见图示。
对图示拓扑可以得出哪两项结论?(选择两项)需要三个网络。
需要两个逻辑地址范围。
存在一个广播域。
存在三个冲突域。
需要四个网络。
作为网络管理员,假设IP 地址为,能够支持510 台主机的子网掩码是什么?下列有关在Cisco IOS 设备上运行配置文件的陈述,哪一项是正确的?修改配置文件会立即对设备的操作造成影响。
配置文件存储在NVRAM 中。
可使用erase running-config命令删除配置文件。
路由器重新启动时会自动保存配置文件。
请参见图示。
PC 已连接到网络。
下列哪一项操作将验证PC 能够与其默认网关通信?使用命令。
使用ipconfig命令。
使用ipconfig/all命令。
使用命令。
您所在的网际网络发生了路由问题。
要鉴别此错误,应该检查以下哪种设备?接入点主机集线器路由器交换机请参见图示。
路由器已启用NAT 功能以供PC 访问Internet,但是PC 仍然无法访问Internet。
为了让PC 能够访问Internet,应将哪一项IP 地址更改为?请参见图示。
路由器的串行接口已使用图中所示的命令进行配置。
路由器无法ping 通直接连接到serial 0/0/0 接口的路由器。
网路技术人员应该如何解决此问题?配置Serial 0/0/0 接口的描述。
配置serial 0/0/0 接口的IP 地址。
在serial 0/0/0 接口上删除no shutdown命令重新启动路由器。
请参见图示。
主机X 无法与主机Y 通信。
在主机X 上运行哪一项命令可识别导致此故障的中间设备?t racert网络技术人员想要使用ip命令在路由器接口上配置IP 地址。
输入此命令后,技术人员会看到下列哪一项提示?R outer>R outer(config-if)#R outer#R outer(config)#请参见图示。
下列关于图中所示IP 配置的陈述,哪三项是正确的?(选择三项)分配给该计算机的地址代表私有地址。
该计算机无法在本地网络外通信。
此计算机的网络可支持126 台主机。
该计算机地址的前缀是/27。
分配给该计算机的IP 地址可在Internet 上路由。
分配给该计算机的IP 地址是广播地址。
下列有关网络层编址的陈述中哪三项是正确的?(选择三项。
)唯一标识每台主机。
有助于通过网际网络转发数据包。
使用32 位逻辑IPv4 地址。
是不可配置的地址。
是物理地址。
通过地址的第一部分来标识主机。
当OSI 模型下层执行无连接协议时,通常使用什么来确认数据已收到并请求重传丢失的数据?I PU DP以太网无连接确认面向连接的上层协议或服务请参见图示。
从显示的会话信息中可以得出以下哪两个结论?(选择两项)所用的协议是一种面向连接的协议。
此交换是三次握手的一部分。
S YN 标志代表开始建立会话。
目的端口表示已经发起了FTP 会话。
源端口不支持与列出的目的端口通信。
请参见图示。
主机A 要连接到位于不同网络中的主机B。
为了实现此连接,可以为主机A 分配哪三项IP 地址?(选择三项。
)请参见图示。
某用户要从PC 访问Internet。
路由器的部分运行配置如图所示。
要实现此访问,应该为PC 配置下列哪一个默认网关IP 地址?请参见图示。
网络中的主机A 和B 正在传输层交换数据段。
下列关于此交换的陈述,哪两项是正确的?(选择两项)主机A 正在使用FTP 向主机B 传输文件。
主机A 将发送起始字节编号为11 的下一数据段。
目的主机的数据段表示已成功收到11 字节。
主机A 正在发起到主机B 的Telnet 会话。
主机B 可以发送开始字节编号为2 的下一数据段。
在路由器的串行接口处使用clock rate 56000命令会产生什么结果?接口被配置为DCE 设备。
接口的计时器信息被清除。
通过为FastEthernet 接口分配计时信号,使其模拟串行接口。
串行接口的IP 地址得以配置。
请参见图示。
主机A 要访问电子邮件。
要传达此请求,将使用哪一个目的套接字数字?下列哪一个OSI 层负责管理数据段?应用层表示层会话层传输层由于发生安全规规事件,必须更改路由器口令。
从以下配置项可获知什么信息?(选择两项。
)Router(config)#line vty 0 3Router(config-line)# password c13c0Router(config-line)#login这些配置项对远程访问指定了三条Telnet 线路。
这些配置项对远程访问指定了四条Telnet 线路。
这些配置项将控制台口令和Telnet 口令设置为"c13c0"。
因为Telnet 配置不完整,所以Telnet 访问将遭到拒绝。
允许使用"c13c0" 作为口令访问Telnet。
一位技术人员必须通过要求提供口令来确保交换机特权执行模式的安全。
哪种类型的口令能满足此类登录的需要并可视为最安全的口令?控制台电缆使能使能加密口令请参见图示。
技术人员正在处理网络问题,需要验证路由器的LAN 接口。
要确认路由器接口工作正常,应该从此主机ping 哪个地址?哪种口令在创建时自动加密?v tya ux控制台电缆使能加密口令使能口令请参见图示。
网络管理员使用Telnet 从PC1 远程访问RouterB 的CLI。
下列有关此连接的陈述中哪一项正确?数据经过自动加密。
T elnet 服务器进程正在PC1 上运行。
连接通过路由器上的VTY 会话而进行。
在此会话期间,RouterB 收到要求检索数据的GET 请求。
请参见图示。
图中所示的主机连接到集线器1。
为了让该主机在网络中正常工作,应该为其分配怎样的IP 地址、子网掩码和默认网关?I P 地址,子网掩码:,默认网关:I P 地址,子网掩码:,默认网关:I P 地址,子网掩码:,默认网关:I P 地址,子网掩码:,默认网关:I P 地址,子网掩码:,默认网关:I P 地址,子网掩码:,默认网关:请参见图示。
主机A 尝试与主机B 建立TCP/IP 会话。
尝试期间,捕获了源MAC 地址为而目的MAC 地址为的帧。
捕获的帧中封装了源IP 地址为而目的IP 地址为的数据包。
此数据包是在网络中哪一点捕获的?离开主机A离开ATL离开Dallas离开NYC请参见图示。
哪种逻辑拓扑是对图示网络最准确的描述?星型环型点对点网状请参见图示。
在配置网络时,技术人员采用如图所示的方式对5e 类电缆两端进行接线。
下列关于此设置的陈述,哪两项是正确的?(选择两项)该电缆适用于将交换机连接到路由器的以太网端口。
该电缆适用于连接不同类型的设备。
电缆无法使用,必须重新接线。
该电缆的端接方式为将发送引脚连接到接收引脚。
该电缆模拟了点对点WAN 链路。
下列哪三项陈述说明了传输层协议的特征?(选择三项)应用层协议使用TCP 端口号和UDP 端口号。
T CP 使用端口号提供可靠的IP 数据包传输。
U DP 使用窗口和确认获得可靠的数据传输。
T CP 使用窗口和定序提供可靠的数据传输。
T CP 是面向连接的协议。
UDP 是无连接协议。
请参见图示。
图中所示为客户端之间发送电子邮件的过程。
以下哪一列表正确地标识了图中各编号阶段使用的组件或协议?请参见图示。