CCNA第二学期练习答案chapter9

合集下载

ccna第二章答案

ccna第二章答案

1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for data 确定数据通路initiate data communicationsretime and retransmit data signals 重分发originate the flow of datamanage data flows 管理数据final termination point for data flow2. Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layers limit the need for hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors3. What are two functions of encapsulation? (Choose two.)tracks delay between end devicesenables consistent network paths for communicationallows modification of the original data before transmissionidentifies pieces of data as part of the same communicationensures that data pieces can be directed to the correct receiving end device4. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detection 支持错误检测‘ensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection5. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow6. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation 一个具体的封装层7. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flow 原数据流retime and retransmit data signalsdetermine pathways for data8.Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination devicean end devicean intermediate devicea media device9.Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown?(Choose three.)Network A -- WANNetwork B -- WANNetwork C -- LANNetwork B -- MANNetwork C -- WANNetwork A -- LAN10. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).11.Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexingencapsulation12. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating to identify the processes or services that are communicating within the end devices13. What device is considered an intermediary device?1.file serve2.IP phone ptop 4.printer 5.switch14.Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? sourceendtransferintermediary 中间设备15.Refer to the exhibit. What type of network is shown?WANMANLANWLAN16. Which layer encapsulates the segment into packets?physicaldata linknetwork 网络层封装的是数据包transport17. What can be identified by examining the network layer header?the destination device on the local mediathe destination host address 网络层头部封装目的主机的地址the bits that will be transferred over the mediathe source application or process creating the data18. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata presentationreliability, flow control, and error detectionnetwork media control 接入层控制网络媒体the division of segments into packets19. During the encapsulation process, what occurs at the data link layer? No address is added.The logical address is added.The physical address is added. 数据链路层添加一个物理地址The process port number is added.20.Refer to the exhibit. Which set of devices contains only end devices? A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?4physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application22. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)34NetworkTransportPhysicalData Link TCP/IP 工作在第一层和第二层Session。

ccna第二章练习答案.docx

ccna第二章练习答案.docx

yy1 ・ Refer to the exhibit・ Identify the devices labeled A, B, C, and D in the network physical documentation. 匚A=bridge, B=switch, C=router, D=hubK A=bridge, B=hub, C=router, D=switchC A=bridge, B=router, C=hub, D=switchc A=hub, B=bridge, C=router, D=switch2 The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented?匚busE starC ring匚mesh3. A switch has failed in the network. As a result, only one segment of the network is down. Which type of physical network topology is implemented?C busC ring匚starE extended star4. Which three features apply to LAN connections? (Choose three.)厂operate using serial in terfacesV make network connection using a hubV limited to operation over small geographic areas厂 provide part-time connectivity to remote servicesV typically operate under local administrative control厂provide lower bandwidth services compared to WANs5. What is one advantage of defining network communication by the seven layers of the OSI model? 【:It in creases the ban dwidth of a n etwork.E It makes networking easier to learn and understand・It eliminates many protocol restrictions.匚It increases the throughput of a network.c It reduces the need for testing network connectivity.6. What makes it easier for different networking vendors to design software and hardware that willin teroperate?E OSI modelc proprietary desig ns匚IP addressing schemec standard logical topologies匚standard physical topologies7. Which term describes the process of adding headers to data as it moves down OSI layers?匚division匚encoding匚separation匚segmentationE encapsulation8. What is the term used to describe the transport layer protocol data unit?匚bits c packetsE segments匚framesc data streams9. Which of the following are layers of the TCP/IP model? (Choose three.)▽ Applicati onr PhysicalV Internet0 Network Access厂Prese ntation10. Which of the following are data link layer encapsulation details? (Choose two.)0 A header and trailer are added・厂Data is con verted into packets ・V Packets are packaged into frames・厂Frames are divided into segments.厂Packets are changed into bits for Internet travel.11. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs?匚data link匚transport匚n etworkE application12. Which two features apply to WAN connections? (Choose two.)V operate using serial interfacesP make network connection using a hub厂limited to operation over small geographic areasI- typically operate under local administrative control▽provide lower bandwidth services compared to LANs13. Which of the following are ways that bandwidth is commonly measured? (Choose three.)厂GHzps▽kbpsV Mbps厂Nbps厂MHzpsV Gbps14. Refer to the following list. Choose the correct order of data encapsulation when a device sends information. segments bits packetsdata frames匚1 -3-5-4-2C 2- 1-3-5-4C 2-4-3-5-1匚4-3-1-2-5E 4-1 -3-5-2C 3-5-1-2-415. Which of the following are factors that determine throughput? (Choose two.)厂types of passwords used on servers厂type of Layer 3 protocol usedV n etwork topologywidth of the network cable0 number of users on the network16. Refer to the exhibit・ Which column shows the correct sequenee of OSI model layers?E D17. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?c physical layer匚data link layerE network layer匚transport layer18. Which best describes the function of the physical layer?E Defines the electrical and functional specifications for the link between end systems・匚Provides reliable transit of data across a physical link.匚Provides connectivity and path selection between two end systems・匚Concerned with physical addressing, network topology and media access.。

CCNA2 题库

CCNA2 题库

CCNA 2 - Chapter 11What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?has a positive impact on bandwidth by dropping most of the invalid framesmakes a fast forwarding decision based on the source MAC address of the framehas a lower latency appropriate for high-performance computing applications*provides the flexibility to support any mix of Ethernet speeds2A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)reduced cost for equipment and user trainingless required equipment to provide the same performance levelssimpler deployment for additional switch equipment*easier to provide redundant links to ensure higher availability*lower bandwidth requirements3What are two advantages of modular switches over fixed-configuration switches? (Choose two.)availability of multiple ports for bandwidth aggregationlower forwarding ratesneed for fewer power outlets*lower cost per switchincreased scalability*4Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?to Fa0/1, Fa0/2, and Fa0/4 onlyto Fa0/1, Fa0/2, Fa0/3, and Fa0/4to Fa0/1 and Fa0/2 onlyto Fa0/1, Fa0/2, and Fa0/3 only*to Fa0/1 only5What is one function of a Layer 2 switch?forwards data based on logical addressinglearns the port assigned to a host by examining the destination MAC addressduplicates the electrical signal of each frame to every portdetermines which interface is used to forward a frame based on the destination MAC address*6Refer to the exhibit. Fill in the blank.There are ” 12” collision domains in the topology.7What is a collapsed core in a network design?a combination of the functionality of the access, distribution, and core layersa combination of the functionality of the access and core layersa combination of the functionality of the distribution and core layers*a combination of the functionality of the access and distribution layers 8What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)to enhance user bandwidth*to eliminate virtual circuitsto create more broadcast domainsto isolate traffic between segments*to isolate ARP request messages from the rest of the networkto create fewer collision domains9Refer to the exhibit.How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.*SW1 drops the frame because it does not know the destination MAC address.10Place the options in the following order:[+] appropriate for high performance computing applications[+] forwarding process can begin after receiving the destination address [+] may forward invalid frames[#] error checking before forwarding[#] forwarding process only begin after receiving the entire frame [#] only forward valid frames[+] Order does not matter within this group.[#] Order does not matter within this group.11What is a basic function of the Cisco Borderless Architecture distribution layer?aggregating Layer 3 routing boundaries*aggregating all the campus blocksacting as a backboneproviding access to the user12ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?hubhostNICswitch*13What does the term “port density” represent for an Ethernet switch?the numbers of hosts that are connected to each switch portthe speed of each portthe memory space that is allocated to each switch portthe number of available ports*14Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?anycastunicastbroadcast*multicast15What is a basic function of the Cisco Borderless Architecture access layer?aggregates Layer 3 routing boundariesprovides high availabilityaggregates Layer 2 broadcast domainsprovides access to the user*16What information is added to the switch table from incoming frames?source MAC address and incoming port number*destination MAC address and incoming port numberdestination IP address and incoming port numbersource IP address and incoming port number17Fill in the blank.A “converged” network is one that uses the same infrastructure to carry voice, data, and video signals.18An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?It enables many switches to be connected with a special fiber-optic power cable to provide higher bandwidth.It enables the sharing of power among multiple stackable switches.*It enables many switches to be connected to increase port density.It enables many switches to be physically stacked in an equipment rack.It enables AC power for a switch to be provided from a powered patch panel.19Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?fixed-configuration switchmodular switchstackable switch*rackable 1U switch20Refer to the exhibit. Fill in the blank.There are ” 5 ”CCNA 2 - Chapter 2Posted by beotron at 8:59 PM1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?• administrative distance of 0 and metric of 0• administrative distance of 0 and metric of 1• administrative distance of 1 and metric of 0• administrative distance of 1 and metric of 12. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?• 172.16.0.0/21• 172.16.1.0/22• 172.16.0.0 255.255.255.248• 172.16.0.0 255.255.252.03. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?• 192.1.1.0/26 and 192.1.1.64/27• 192.1.1.128/25• 192.1.1.0/23 and 192.1.1.64/23• 192.1.1.0/24• 192.1.1.0/25• 192.1.1.0/24 and 192.1.1.64/244. Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?• It indicates that there are 8 hops between this router and the 10.0.0.0 network.• It represents the time, in milliseconds, it takes for a ping to reply when sent to the 10.0.0.0 network.• It indicates that there are 8 subnets in the destination network to which the router can forward packets.• It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.5. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded?• Router1 will perform recursive lookup and packet will exit S0/0.• Router1 will perform recursive lookup and packet will exit S0/1.• There is no matching interface associated with network 172.16.0.0 so packets will be dropped.• There is no matching interface associated with network 172.16.0.0 so packets will take gateway of last resort and exit out S0/2.6. A network administrator enters the following command into Router1: ip route 192.168.0.0255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet? • drops the packet because the destination host is not listed in the routing table• looks up the MAC address of the S0/1/0 interface to determine the destination MAC address of the new frame• performs a recursive lookup for the IP address of the S0/1/0 interface before forwarding the packet• encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface7. Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link? • The rate would be negotiated by both routers.• A rate would not be selected due to the DCE/DTE connection mismatch.• The rate configured on the DTE determines the clock rate.• The rate configured on the DCE determines the clock rate.8. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet? • WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/09. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)• ping• show arp• traceroute• show ip route• show interface• show cdp neighbor d etail10. Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2• R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.2.1R2(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.111. Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.) • load• platform• reliability• holdtime• local interface12. Refer to the exhibit. What two commands are required to provide connectivity between the192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)• A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0• A(config)# ip route 10.0.0.0 255.0.0.0 172.16.40.2• A (config)# ip route 10.0.0.0 255.0.0.0 s 0/0/0• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0• B (config)# ip route 192.168.1.0 255.255.255.0 172.16.40.1• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/1/013. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)• A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2• A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0• A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.214. What happens to a static route entry in a routing table when the outgoing interface is not available? • The route is removed from the table.• The router polls neighbors for a replacement route.• The route remains in the table because it was defined as static.• The router redirects the static route to compensate for the loss of the next hop device.15. A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)• The destination network no longer exists.• The destination network is moved to a different interface on the same router.• The path between the source and destination is upgraded with a higher bandwidth link.• A topology change occurs where the exi sting next-hop address or exit interface is not accessible.• The remote destination network interface has to be down for 15 minutes of maintenance.16. Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?• Adding the next-hop address eliminates the need for the router to do any lookups in the routing table before forwarding a packet.• In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.• Using a next-hop address in a static route provides a route with a lower metric.• In multi-access networks, using a next-hop address in a static route makes that route a candidate default route.17. The output of the Router# show interfaces serial 0/1 command displays the following:• Serial0/1 is up, line protocol is down.• What is the most likely cause for the line protocol being down?• Serial0/1 is shutdown.• There is no cable connecting the routers.• The remote rout er is using serial 0/0.• No clock rate has been set.18. Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network?• ip route 192.168.0.0 172.16.0.0 255.255.0.0• ip rou te 172.16.0.0 255.255.0.0 192.168.0.1• ip route 172.16.0.0 255.255.0.0 S0/0/1• ip route 172.16.0.0 255.255.0.0 S0/0/019. What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).• the serial port of the router• a modem• a switch• the ethernet port of the router• a CSU/DSU device• a DTE device20. Which of the following is true regarding CDP and the graphic shown?• CDP running on Router D will gather information about routers A, B, C, and E.• By default, Router A will receive CDP advertisements from routers B and C.• If routers D and E are running different routing protocols, they will not exchange CDP information.• Router E can use CDP to identify the IOS running on Router B.21. Which two statements describe functions or characteristics of CDP? (Choose two.)• It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.• It operates at the network layer and allows two systems to learn about each other.• It creates a topology map of the entire network.• It allows systems to learn about each other even if different network layer protocols are configured.• It forwards advertisements about routes for faster convergence.22. Which piece of information is available from examining the output of the command show ip interface brief?• Interface speed and duplex• Interface MTU• Errors• Interface MAC address• Interface IP addressCCNA 2 - Chapter 31A network administrator is determining the best placement of VLAN trunklinks. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)between two switches that share a common VLANbetween a switch and a server that has an 802.1Q NIC*between a switch and a client PCbetween a switch and a network printerbetween two switches that utilize multiple VLANs*2What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?The port automatically associates itself with the native VLAN. The port creates the VLAN again.The port goes back to the default VLAN.The port becomes inactive.*3Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used f or anything on the network.Disable autonegotiation and set ports to either static access or static trunk.Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.*4Which command is used to remove only VLAN 20 from a switch?no switchport access vlan 20delete flash:vlan.datno vlan 20*delete vlan.dat5A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?Erase the startup configuration and reboot the switch.Erase the running configuration and reboot the switch.Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*Delete the IP address that is assigned to the management VLAN and reboot the switch.6What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?VLAN 20 will be created automatically.*The command will have no effect on the switch.Port Fa0/18 will be shut down.An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?show mac address-table interface Fa0/1show interfaces Fa0/1 switchport*show interfaces trunkshow vlan brief8Place the options in the following order:- not scored -dynamic autononegotiatedynamic desirabletrunk9Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?Port Fa0/11 will be returned to VLAN 1.*VLAN 30 will be deleted.An error message would be displayed.Port Fa0/11 will be shutdown.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.*Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.11Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)Disable DTP autonegotiation on end-user ports.*Change the management VLAN to a distinct VLAN that is not accessible by regular users.Statically configure all ports that connect to end-user host devices to be in trunk mode.Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*Use SSH for all remote management access.12In a basic VLAN hopping attack, which switch feature do attackers take advantage of?automatic encapsulation negotiationthe default automatic trunking configuration*an open Telnet connectionforwarding of broadcasts13A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?It allows only VLAN 30 on Fa0/5.*It allows a native VLAN of 30 to be implemented on Fa0/5.It allows VLANs 1 to 30 on Fa0/5.It allows VLANs 10, 20, and 30 on Fa0/5.14Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?No VLAN tag is added to the frame.*A VLAN tag is added when the frame is accepted by the switch.A VLAN tag is added when the frame is forwarded out the port to PC-B.A VLAN tag is added when the frame leaves PC-A.15Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?The native VLAN is being pruned from the link.The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*The trunk has been configured with the switchport nonegotiate command. The native VLAN should be VLAN 60.16What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?All VLANs will be allowed across the trunk.*Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk. Only VLAN 1 will be allowed across the trunk.17Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)on links that should not be trunking*when connecting a Cisco switch to a non-Cisco switch*on links that should dynamically attempt trunkingwhen a neighbor switch uses a DTP mode of dynamic autowhen a neighbor switch uses a DTP mode of dynamic desirable18Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which PCs will receive the broadcast sent by PC-C?PC-D, PC-E*PC-A, PC-B, PC-D, PC-EPC-A, PC-BPC-A, PC-B, PC-D, PC-E, PC-FPC-A, PC-B, PC-E19Which two statements are true about VLAN implementation? (Choose two.)The network load increases significantly because of added trunking information.Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*The size of the collision domain is reduced.VLANs logically group hosts, regardless of physical location.*The number of required switches in a network decreases.20Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?switchport trunk allowed vlan add 99switchport trunk native vlan 66*switchport mode dynamic autoswitchport nonegotiate21Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?switch port securityPVLAN protected port*ACLVLAN22Fill in the blank. Use the full command syntax.The ” show vlan brief” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.23Which three statements accurately describe VLAN types? (Choose three).An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*A management VLAN is any VLAN that is configured to access management features of the switch.*A data VLAN is used to carry VLAN management data and user-generated traffic.Voice VLANs are used to support user phone and e-mail traffic on a network. VLAN 1 is always used as the management VLAN.After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*24Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?S1(config-if)# switchport mode trunkS1(config-if)# switchport mode accessS1(config-if)# switchport nonegotiate*S1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport trunk allowed vlan noneCCNA 2 - Chapter 41What type of IPv6 address is required as a minimum on IPv6 enabled interfaces?staticglobal unicastlink-local*loopbackunique local2In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)default gateway*hostnameDNS server addressDHCP server addressIP address*subnet mask*3What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)MAC addressesLayer 1 statuses*IP addresses*next-hop addressesinterface descriptionsspeed and duplex settings4Place the options in the following order:next hopdestination networkmetric- not scored -administrative distanceroute timestamproute source protocol- not scored -5Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)destination MAC addressnetwork numberdestination IP address*source MAC addresssubnet mask*6Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)Packets that are destined for the network 2001:DB8:ACAD:2::/64 will be forwarded through Fa0/1.R1 does not know a route to any remote networks.*The interface Fa0/1 is configured with IPv6 address2001:DB8:ACAD:A::12.*Packets that are destined for the network 2001:DB8:ACAD:2::54/128 will be forwarded through Fa0/0.The network FF00::/8 is installed through a static route command.7Refer to the exhibit. What is the purpose of the highlighted field in the line that is displayed from the show ip route command?It indicates that this is a directly connected route.It indicates that this route has been deleted from the routing table. It indicates that this route was learned via EIGRP.*It indicates that this is a default route.8Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)The metric varies depending which Layer 3 protocol is being routed, such as IP.A router first installs routes with higher administrative distances. The value of the administrative distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.* Administrative distance refers to the trustworthiness of a particular route.*The metric is always determined based on hop count.9What are two functions of a router? (Choose two.)It manages the VLAN database.It increases the size of the broadcast domain.It controls the flow of data via the use of Layer 2 addresses.It determines the best path to send packets.*It connects multiple IP networks.*10A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination? (Choose two.)destination MAC addresssource ARP tablesource IP address*destination IP address*source MAC addressLayer 2 header11。

CCNA 1 - Chapter 9

CCNA 1 - Chapter 9

CCNA 1 - Chapter 9Posted by beotron at 8:55 PM1. In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do? • Host B can transmit immediately since it is connected on its own cable segment.• Host B must wait to receive a CSMA transmission from the hub, to signal its turn.• Host B must send a request sig nal to Host A by transmitting an interframe gap.• Host B must wait until it is certain that Host A has completed sending its frame.2. Ethernet operates at which layers of the OSI model? (Choose two.)• Network layer• Transport layer• Physical layer• A pplication layer• Session layer• Data-link layer3. Which of the following describe interframe spacing? (Choose two.)• the minimum interval, measured in bit-times, that any station must wait before sending another frame.• the maximum interval, measure d in bit-times, that any station must wait before sending another frame.• the 96-bit payload padding inserted into a frame to achieve a legal frame size• the 96-bit frame padding transmitted between frames to achieve proper synchronization • the time all owed for slow stations to process a frame and prepare for the next frame. • the maximum interval within which a station must send another frame to avoid being considered unreachable4. What three primary functions does data link layer encapsulation provide? (Choose three.) • addressing• error detection• frame delimiting• port identification• path determination• IP address resolution5. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?• The hosts return to a listen-before-transmit mode. <—• The hosts creating the collision have priority to send data.• The hosts creating the collision retransmit the last 16 frames.• The hosts extend their delay period to allow for rapi d transmission.6. What are three functions of the upper data link sublayer in the OSI model? (Choose three.) • recognizes streams of bits• identifies the network layer protocol.• makes the connection with the upper layers.• identifies the source and de stination applications• insulates network layer protocols from changes in physical equipment.• determines the source of a transmission when multiple devices are transmitting7. What does the IEEE 802.2 standard represent in Ethernet technologies?• MAC s ublayer• Physical layer• Logical Link Control sublayer• Network layer8. Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?• A random delay is used to ensure a collision-free link.• A random delay value for each device is assigned by the manufacturer.• A standard delay value could not be agreed upon among networking device vendors.• A random delay helps prevent the stations from experiencing another collision during the transmission.9. Refer to the exhibit. Which option correctly matches the frame field type with the contents that frame field includes?• header field - preamble and stop frame• data field - network layer packet• data field - physical addressing• trailer field - FCS and SoF10. Host A has an IP address of 172.16.225.93 and a mask of 255.255.248.0. Host A needs to communicate with a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on the destination address. What two things will occur? (Choose two.)• Host A will change the destination IP to the IP of the nearest router and forward the packet.• Host A will broadcast an ARP request for the MAC of its default gateway.• A result of 172.16.225.0 will be obtained.• Host A will broadcast an AR P request for the MAC of the destination host.• A result of 172.16.224.0 will be obtained.• A result of 172.16.225.255 will be obtained.11 Which of the following is a drawback of the CSMA/CD access method?• Collisions can decrease network performance.• It is more complex than non-deterministic protocols.• Deterministic media access protocols slow network performance.• CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.12. Ethernet operates at which layer of the TCP/IP network model?• application• physical• transport• internet• data link• network access13. What is the primary purpose of ARP?• translate URLs to IP addresses• resolve IPv4 addresses to MAC addresses• provide dynamic IP configuration to net work devices• convert internal private addresses to external public addresses14. Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link? • No collisions will occur on this link.• Only one of the devices can transmit at a time.• The switch will have priority for transmitting data.• The devices will default back to half duplex if excessive collisions occur.15. Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.) • A packet with the destination IP of Router_B.• A frame with the destination MAC address of Switch_A.• A packet wit h the destination IP of Router_A.• A frame with the destination MAC address of Router_A.• A packet with the destination IP of Server_B.• A frame with the destination MAC address of Server_B.16 Which statements correctly describe MAC addresses? (Choose three.)• dynamically assigned• copied into RAM during system startup• layer 3 address• contains a 3 byte OUI• 6 bytes long• 32 bits long17. Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)• reduction in cross-talk• minimizing of collisions• support for UTP cabling• division into broadcast domains• increase in the throughput of communications18. What are the two most commonly used media types in Ethernet networks today? (Choose two.)• coaxial thick net• copper UTP• coaxial thinnet• optical fiber• shielded twisted pair19. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.• 85• 90• BA• A1• B3• 1C20. After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?• the device involved in the collision with the lowest MAC address• the device involved in the collision with the lowest IP address• any device in the collision domain whose backoff timer expires first• those that began transmitting at the same time。

大学计算机基础第九章课后答案.doc

大学计算机基础第九章课后答案.doc

1.2. 后序遍历结果是DEBFCA5.结点数最多有32个习题九答案图9.13(b)所对应的二叉树前序、中序及后序遍历序列。

前序遍历序列ABDHIEJCFG中序遍历序列HDIBJEAFCG后序遍历序列HIDJEBFGCA3.该二叉树中有14个叶子结点。

4.该二叉树中有19个叶子结点6.线性表的顺序存储结构和链式结构的优缺点。

答:线性表的顺序存储是指在内存中用地址连续的一块存储空间顺序存放线性表的各个元素,用这种存储形式存储的线性表称其为顺序表。

也就是说只要知道顺序表首地址和每个数据元素所占地址单元的个数就可求出第i个数据元素的地址来。

顺序表能实现按数据元素的序号存取的特点。

顺序表的插入元素则需要先将第i个元素后的每个元素向后移动,为新元素让出位置。

最后修改表的长度。

而链式结构不采用地址连续的存储空间,它是通过“链”来建立数据元素之间的逻辑关系,对线性表插入、删除不需要移动数据元素。

7.数据存储结构的类型答:数据存储结构常用的有两种:顺序存储、链式存储,另外还有索引存储和散列存储。

8.栈和队列的主要特征。

答:栈是插入和删除的操作被限制在某一端进行线性表。

允许插入、删除的这一端称为栈顶,另一端称为栈底。

往栈中插入元素称为进栈,删除元素称为出栈。

栈的特点是后进先出。

队列是限定插入元素操作在表一端进行,而删除操作在表的另一端进行的特殊数据结构。

把允许插入元素的一端叫队尾,允许删除元素的一端叫队首。

队列的特点是先进先出。

9.流程图(1)⑸解法1:结束(7)程序流程图程序N-S图for(n=100;n<1000;n++) 换行开始。

计算机网络课后题答案第九章(最新整理)

计算机网络课后题答案第九章(最新整理)

第九章无线网络9-01.无线局域网都由哪几部分组成?无线局域网中的固定基础设施对网络的性能有何影响?接入点AP 是否就是无线局域网中的固定基础设施?答:无线局域网由无线网卡、无线接入点(AP)、计算机和有关设备组成,采用单元结构,将整个系统分成许多单元,每个单元称为一个基本服务组。

所谓“固定基础设施”是指预先建立起来的、能够覆盖一定地理范围的一批固定基站。

直接影响无线局域网的性能。

接入点AP 是星形拓扑的中心点,它不是固定基础设施。

9-02.Wi-Fi 与无线局域网WLAN 是否为同义词?请简单说明一下。

答:Wi-Fi 在许多文献中与无线局域网WLAN 是同义词。

802.11 是个相当复杂的标准。

但简单的来说,802.11 是无线以太网的标准,它是使用星形拓扑,其中心叫做接入点AP(Access Point),在MAC 层使用CSMA/CA 协议。

凡使用802.11系列协议的局域网又称为Wi-Fi(Wireless-Fidelity,意思是“无线保真度”)。

因此,在许多文献中,Wi-Fi 几乎成为了无线局域网WLAN 的同义词。

9-03 服务集标示符SSID 与基本服务集标示符BSSID 有什么区别?答:SSID(Service Set Identifier)AP 唯一的ID 码,用来区分不同的网络,最多可以有32 个字符,无线终端和AP 的SSID 必须相同方可通信。

无线网卡设置了不同的SSID 就可以进入不同网络,SSID 通常由AP 广播出来,通过XP 自带的扫描功能可以相看当前区域内的SSID。

出于安全考虑可以不广播SSID,此时用户就要手工设置SSID 才能进入相应的网络。

简单说,SSID 就是一个局域网的名称,只有设置为名称相同SSID 的值的电脑才能互相通信。

BSS 是一种特殊的Ad-hoc LAN 的应用,一个无线网络至少由一个连接到有线网络的AP 和若干无线工作站组成,这种配置称为一个基本服务装置BSS (Basic Service Set)。

ccna第二学期练习答案中文

ccna第二学期练习答案中文

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念(版本4.0)1口令可用于限制对Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项。

)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去?第 2 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的IP 地址。

从路由器ping 相连网络上的主机口之间相互ping 都会遭到失败。

此问题最可能的原因是什么?必须使用no shutdown命令启用接口。

4请参见图示。

主机 A ping 主机B。

当R4 收到对以太网接口的ping 时,哪两块报头信息包括在内?(选择两项。

)目的IP 地址:192.168.10.134目的MAC 地址:9999.DADC.12345网络管理员刚把新配置输入Router1。

要将配置更改保存到NVRAM,应该执行哪一条命令?Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在Sydney 路由器上发出以下哪条配置命令才能与Melbourne 站点建立连接?(选Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# clock rate 560007请参见图示。

从路由器的运行配置输出可得出什么结论?显示的命令决定了路由器的当前运行情况。

8请参见图示。

在主机 2 连接到LAN 上的交换机后,主机2 无法与主机 1 通信。

导致此问题的原因是什么?主机 1 和主机2 位于不同的网络中。

9输入以下命令的作用是什么?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序?加载bootstrap、加载IOS、应用配置11加载配置文件时的默认顺序是怎样的?NVRAM、TFTP、CONSOLE12请参见图示。

ccna第二学期练习答案

ccna第二学期练习答案

c c n a第二学期练习答案(总45页)--本页仅作为文档封面,使用时请直接删除即可----内页可以根据需求调整合适字体及大小--ERouting Chapter 1 - CCNA Exploration: 路由协议和概念(版本1口令可用于限制对 Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项。

)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去第 2 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的 IP 地址。

从路由器 ping 相连网络路由器接口之间相互 ping 都会遭到失败。

此问题最可能的原因是什么必须使用no shutdown命令启用接口。

4请参见图示。

主机 A ping 主机 B。

当 R 网接口的 ping 时,哪两块报头信息包括在内(选择两项。

)目的 IP 地址:目的 MAC 地址:5网络管理员刚把新配置输入 Router1。

要将配置更改保存到 NVRAM,应该执行哪一条命令Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在 Sydney 路由下哪条配置命令才能与 Melbourne 站点建立连接(选择三项)Sydney(config-if)# ip addressSydney(config-if)# no shutdownSydney(config-if)# clock rate 560007请参见图示。

从路由器的运行配置输出可得出什么结论显示的命令决定了路由器的当前运行情况。

8请参见图示。

在主机 2 连接到 LAN 上的交换机后,主主机 1 通信。

导致此问题的原因是什么主机 1 和主机 2 位于不同的网络中。

9输入以下命令的作用是什么?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过 Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序加载 bootstrap、加载 IOS、应用配置11加载配置文件时的默认顺序是怎样的NVRAM、TFTP、CONSOLE12请参见图示。

第九章思科测试答案

第九章思科测试答案

1以下哪两项是当今以太网络中最常用的介质类型?(选择两项)同轴粗缆UTP 铜缆同轴细缆光纤屏蔽双绞线2OSI 模型中的数据链路上子层有哪三项功能?(选择三项)识别比特流确定网络层协议建立与上层的连接标识源应用程序和目的应用程序使网络层协议不受物理设备变化的影响在多台设备同时传输时确定传输来源3发生以太网冲突之后调用回退算法时,哪种设备优先传输数据?涉入冲突的设备中MAC 地址最小的设备涉入冲突的设备中IP 地址最小的设备冲突域中回退计时器首先过期的任何设备同时开始传输的设备4以下哪些选项描述的是帧间隙?(选择两项)任何站点在发送另一帧前必须等待的最短时间间隔,以比特时间为测量单位任何站点在发送另一帧前必须等待的最长时间间隔,以比特时间为测量单位插入帧中的96 位负载填充位,用于使其达到合法的帧大小帧之间传输的96 位帧填充位,用于实现正确同步可以让速度较慢的站点处理帧并准备下一帧的时间站点在发送另一帧前不得超过的最长时间间隔,否则将视其为无法到达5采用CSMA/CD 的网络中发生冲突时,需要传输数据的主机在回退时间到期后做何反应?主机恢复传输前侦听模式。

造成冲突的主机优先发送数据。

造成冲突的主机重新传输最后16 个帧。

主机延长其延迟时间以便快速传输。

6请参见图示。

下列哪个选项对帧字段类型与帧字段中所含内容的匹配是正确的?报头字段- 前导码和帧尾数据字段- 网络层数据包数据字段- 物理编址报尾字段- FCS 和SoF7以下哪两项特性使交换机在以太网中比集线器更加适合?(选择两项)串扰减少冲突减少支持UTP 电缆分割成多个广播域通信吞吐量增长8在图示中,当主机 B 希望向主机 C 传输帧时,主机 A 向主机 D 发送 1 KB 以太网帧的过了50%。

主机B 必须执行什么操作?主机 B 可以立即传输,因为它连接到自己的电缆部分中。

主机 B 必须等待接收从集线器传输的CSMA,这表示轮到它传输。

主机 B 必须通过传输帧间隙向主机 A 发送请求信号。

CCNA第二学期考试答案

CCNA第二学期考试答案

以下是针对您未获得满分的试题给出的反馈。

某些交互式试题可能不显示您的答案。

分项分数:1与固定配置的交换机相比,模块化交换机具有哪两个优点?(请选择两项。

)正确响应您的响应每台交换机的成本更低可扩展性更高转发率更低需要的电源插座数目更少带宽聚合可以使用多个端口固定配置交换机价格较低,但是它具有指定数量的端口且不能添加端口。

它们提供的高速端口通常比较少。

为了在包含固定配置交换机的网络上扩展交换,需要购买更多的交换机。

这增加了需要使用的电源插座数量。

模块化交换机只需要购买额外的线卡便可以扩展。

带宽聚合也更容易,因为机箱的背板可以为交换机端口线卡提供所需的带宽。

此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.2 交换网络2思科无边界架构接入层的基本功能是什么?正确响应您的响应聚合第 2 层广播域聚合第 3 层路由边界为用户提供访问权提供高可用性思科无边界架构接入层的功能是为用户提供网络访问。

第 2 层广播域聚合、第 3 层路由边界聚合和高可用性是分布层的功能。

也有说答案是聚合第 3 层路由边界此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络3思科无边界架构分布层的基本功能是什么?正确响应您的响应充当主干聚合所有园区块聚合第 3 层路由边界为用户提供访问权思科无边界架构的分布层的一项基本功能是在不同的VLAN 之间路由。

充当主干和聚合园区块是核心层的功能。

为用户提供访问是接入层的功能。

此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络4若将大端口密度、容错和低价作为重要指标,应使用哪个交换机外形因素?正确响应您的响应固定配置交换机模块化交换机可配备机架的1U 交换机可堆叠式交换机堆叠式交换机可以使用特殊电缆实现互联,从而在交换机之间提供高带宽的吞吐量,并像单个大型交换机一样运行。

CCNA ENetwork Chapter 9

CCNA ENetwork Chapter 9

ENetwork Chapter 9 - CCNA Exploration: Network(2009-05-10 12:32:43)转载分类:CCNA.CISCO.ANSWERS标签:itPosted by Space on Sunday, May 10, 20091In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?Host B can transmit immediately since it is connected on its own cable segment.Host B must wait to receive a CSMA transmission from the hub, to signal its turn.Host B must send a request signal to Host A by transmitting an interframe gap.**Host B must wait until it is certain that Host A has completed sending its frame.2 Ethernet operates at which layers of the OSI model? (Choose two.)Network layerTransport layer**Physical layerApplication layerSession layer**Data-link layer3 Which of the following describe interframe spacing? (Choose two.)**the minimum interval, measured in bit-times, that any station must wait before sending another framethe maximum interval, measured in bit-times, that any station must wait before sending another framethe 96-bit payload padding inserted into a frame to achieve a legal frame sizethe 96-bit frame padding transmitted between frames to achieve proper synchronization**the time allowed for slow stations to process a frame and prepare for the next framethe maximum interval within which a station must send another frame to avoid being considered unreachable4 What three primary functions does data link layer encapsulation provide? (Choose three.)**addressing**error detection**frame delimitingport identificationpath determinationIP address resolution5 When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?**The hosts return to a listen-before-transmit mode. <—The hosts creating the collision have priority to send data.The hosts creating the collision retransmit the last 16 frames.The hosts extend their delay period to allow for rapid transmission.6 What are three functions of the upper data link sublayer in the OSI model? (Choose three.)recognizes streams of bits**identifies the network layer protocol**makes the connection with the upper layersidentifies the source and destination applications**insulates network layer protocols from changes in physical equipmentdetermines the source of a transmission when multiple devices are transmitting7 What does the IEEE 802.2 standard represent in Ethernet technologies?MAC sublayerPhysical layer**Logical Link Control sublayerNetwork layer8 Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?A random delay is used to ensure a collision-free link.A random delay value for each device is assigned by the manufacturer.A standard delay value could not be agreed upon among networking device vendors.**A random delay helps prevent the stations from experiencing another collision during the transmission.98Refer to the exhibit. Which option correctly identifies content that the frame data field may contain?preamble and stop framenetwork layer packetphysical addressingFCS and SoF10Host A has an IP address of 172.16.225.93, a mask of 255.255.248.0, and a default gateway of 172.16.224.1. Host A needs to to a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on its address and subnet mask. What two thin (Choose two.)Host A will get a result of 172.16.224.0 from the AND process.Host A will send on to the media a broadcast frame that contains the packet.Host A will broadcast an ARP request for the MAC of the host 172.16.231.78.Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet.Host A will encapsulate the packet in a frame with a destination MAC that is the MAC address associated with 172.16.224.11 Which of the following is a drawback of the CSMA/CD access method?**Collisions can decrease network performance.It is more complex than non-deterministic protocols.Deterministic media access protocols slow network performance.CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.12 Ethernet operates at which layer of the TCP/IP network model?applicationphysicaltransportinternetdata link**network access10Ethernet operates at which layers of the OSI model? (Choose two.)Network layerTransport layerPhysical layerApplication layerSession layerData-link layer13 What is the primary purpose of ARP?translate URLs to IP addresses**resolve IPv4 addresses to MAC addressesprovide dynamic IP configuration to network devicesconvert internal private addresses to external public addresses14Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?**No collisions will occur on this link.Only one of the devices can transmit at a time.The switch will have priority for transmitting data.The devices will default back to half duplex if excessive collisions occur.15Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)A packet with the destination IP of Router_B.A frame with the destination MAC address of Switch_A.A packet with the destination IP of Router_A.**A frame with the destination MAC address of Router_A.**A packet with the destination IP of Server_B.A frame with the destination MAC address of Server_B.16 Which statements correctly describe MAC addresses? (Choose three.)dynamically assigned**copied into RAM during system startuplayer 3 address**contains a 3 byte OUI**6 bytes long32 bits long17 Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)reduction in cross-talk**minimizing of collisionssupport for UTP cabling**division into broadcast domainsincrease in the throughput of communications18 What are the two most commonly used media types in Ethernet networks today? (Choose two.)**coaxial thicknetcopper UTPcoaxial thinnetoptical fiber**shielded twisted pair19 Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.8590**BAA1B31C20 After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?the device involved in the collision with the lowest MAC addressthe device involved in the collision with the lowest IP address**any device in the collision domain whose backoff timer expires first those that began transmitting at the same time。

CCNA第二学期第九章答案.

CCNA第二学期第九章答案.

1 哪两项功能描述了访问控制列表的用途?(请选择两项。

)正确响应您的响应ACL 可以根据路由器上的始发 MAC 地址来允许或拒绝流量。

ACL 可以控制主机能够访问网络中的哪些区域。

ACL 可以帮助路由器确定到目的地的最佳路径。

标准 ACL 可限制对特定应用程序和端口的访问。

ACL 提供基本的网络安全性。

2 访问控制列表在企业网络中的可能用途是下列哪两项?(选择两项。

)正确响应您的响应控制路由器接口的物理状态控制调试输出允许通过路由器过滤第 2 层流量降低路由器上的处理负载控制虚拟终端对路由器的访问3 哪两个特征是标准 ACL 和扩展 ACL 共有的特征?(请选择两项。

)正确响应您的响应两者都可以通过使用描述性名称或号码创建。

两类ACL 都可以根据协议类型进行过滤。

两者都包含隐式 deny 作为最终 ACE。

两者都可以通过端口号允许或拒绝特定服务。

两者都可为特定目的主机 IP 地址过滤数据包。

4 下列哪项描述了标准 IPv4 ACL 的特点?正确响应您的响应创建它们时可以使用数字,但不可以使用名称。

它们是在接口配置模式下配置的。

可以根据源 IP 地址和源端口对过滤流量进行配置。

它们仅根据源 IP 地址过滤流量。

5 网络管理员需要配置标准 ACL,使得只有 IP 地址为 192.168.15.23 的管理员工作站能够访问主要路由器的虚拟终端。

哪两个配置命令可以完成该任务?(请选择两项。

)正确响应您的响应Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.2556 哪一个 IPv4 地址范围包含由 172.16.2.0 指定的、与 ACL 过滤器匹配的、通配符掩码为 0.0.1.255 的所有 IP 地址?正确响应您的响应172.16.2.1 到 172.16.3.254172.16.2.1 到 172.16.255.255172.16.2.0 到 172.16.3.255172.16.2.0 到 172.16.2.2557 如果路由器有两个接口,并且路由 IPv4 和 IPv6 的流量,那么可以在其中创建并应用多少个 ACL?正确响应您的响应12616488 通常认为下列哪三项是安置 ACL 的最佳做法?(请选择三项。

计算机网络(第二版)课后习题答案第九章

计算机网络(第二版)课后习题答案第九章

计算机网络参考答案第九章(高教第二版冯博琴)1. 应用层协议对传输层协议选择的主要考虑因素是哪些?数据丢失、带宽需求、实时性2. 列出五个常用的因特网应用项目以及相关协议。

万维网:HTTP电子邮件:SMTP, POP, IMAP文件传输:FTP远程终端登录:TELNET域名服务:DNS3. 在两个主机的通信会话中,那个主机是服务器,哪个是客户端?答案:在两个主机的通信会话中,首先发起会话的一方为客户端,处于“倾听”状态的为服务器。

但是,通信会话成功的先决条件是服务器必须首先处于开机或“倾听”状态。

4. 一个运行在某台主机中的通信进程,需要那些信息来确定运行在另一台主机中的进程?答案:一个运行在某台主机中的通信进程,需要对方主机的IP地址、对方的端口号或服务访问点(SAP)来确定运行在该主机中的对等通信进程。

5. 列出常见的网络应用的用户代理程序。

答:万维网:IE, FIREFOX电子邮件:OE, FOXMAIL文件传输:IE, cuteFTP远程终端登录:telnet, IE多媒体视频:realplay6. 为什么HTTP、FTP、SMTP、POP和IMAP需要TCP的支持而不是UDP的?答:因为上述协议都是基于“文件”的网络应用,对数据丢失十分敏感,要求数据的完整和可靠、但对带宽需求、实时性的要求并不高,所以,TCP协议可以满足这样的要求。

7. 为什么大部分FTP服务器需要限制同时连接的客户端数量?答:实际上,所有的网络服务器都会对同时可接入的客户数量进行限制,其原因也十分简单,任何网上的服务资源都是有限的,但是这种情况,尤以FTP服务器表现的最为突出。

首先,因为FTP是一种十分普及的网络应用,使用客户众多;其次它是“面向连接”的应用,服务器需要保留登录用户的状态和根据用户权限控制用户对文件的访问,对于每一个FTP连接,一般需要两个通道进行才能进行有效的文件传输。

由于以上原因,FTP对服务器资源的占用是比较多的。

思科网院第二学期第九章答案

思科网院第二学期第九章答案

NAT 的主要目的是什么?•正确响应您的响应••节省IPv4 地址•增强网络性能•提高网络安全•允许对等文件共享开发NAT 以节省IPv4 地址。

一个附带优势是NAT 通过隐藏内部网络编址方案而增加了小等级的安全性。

然而,使用NAT 也有一些缺点。

它不允许真正的对等通信,并且会增加外部链接的延迟时间。

此试题参考以下领域的内容:Routing and Switching Essentials•9.1.1 NAT 的特性2 已启用PAT 的路由器使用哪种方法将传入数据包发送到正确的内部主机?2已启用PAT 的路由器使用哪种方法将传入数据包发送到正确的内部主机?•正确响应您的响应••它在传入数据包上使用源TCP 或UDP 端口号和目的IP 地址的组合。

•它在传入数据包上使用目的TCP 或UDP 端口号。

•它在传入数据包上使用源IP 地址。

它在传入数据包上使用源TCP 或UDP 端口号。

•已启用PAT 的路由器维护由内部本地IP 地址和TCP/UDP 端口号到外部本地地址和TCP/UDP 端口号映射组成的表。

当流量从公共网络返回路由器时,路由器会将目的端口与PAT 映射表进行比较,确定将流量发送到哪台内部主机。

此试题参考以下领域的内容:Routing and Switching Essentials•9.1.2 NAT 的类型3 技术人员必须配置边缘路由器,才能将每个会话的不同TCP 端口号用于互联网上的服务器。

应实现哪种类型的网络地址转换(NAT)?3技术人员必须配置边缘路由器,才能将每个会话的不同TCP 端口号用于互联网上的服务器。

应实现哪种类型的网络地址转换(NAT)?•正确响应您的响应••在本地地址和全局地址之间实现多对一地址映射•在本地地址和全局地址之间实现一对多地址映射•在本地地址和全局地址之间实现多对多地址映射•在本地地址和全局地址之间实现一对一地址映射端口地址转换也称为NAT 过载。

PAT 使用端口作为附加参数来实现乘数效应,从而可以将10 个内部全局地址中的任何一个最多重复使用65,536 次。

最新CCNA认证试题及答案「中文版」

最新CCNA认证试题及答案「中文版」

最新CCNA认证试题及答案「中文版」1、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ( )(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位192.168.19.255/20划为二进制为:11000000.10101000.00010011.1111111111111111.11111111.11110000.00000000主机位变成全0表示这个IP的网络地址主机槐涑扇?表示这个IP的广播地址RFC1918文件规定了保留作为局域网使用的私有地址:10.0.0.0 - 10.255.255.255 (10/8 prefix)172.16.0.0 - 172.31.255.255 (172.16/12 prefix)192.168.0.0 - 192.168.255.255 (192.168/16 prefix)2、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。

IEEE制定的IEEE 802.3标准给出了以太网的技术标准。

它规定了包括物理层的连线、电信号和介质访问层协议的内容。

CCNA第二学期期末练习题

CCNA第二学期期末练习题

1如图所示的网络在路由流量时存在问题,怀疑这可能是编址方案所造成。

该图中使用的编址方案存在什么问题?指定给Router1 的Ethernet0 接口的地址是该子网的广播地址。

在Router1 和Router2 之间的串行链路上配置的子网与指定给Router3 上Ethernet0 的子网有重叠。

Router1 的Serial0 接口与Router2 的Serial0 位于不同的子网。

指定给Router2 上Ethernet0 的子网与指定给Router3 上Ethernet0 的子网有重叠。

2 points for Option 22请参见图示。

网络管理员要将一个带有50 台主机的新子网添加至R3。

要保证新子网可获得足够地址,同时尽量减少地址浪费,应为其分配哪个子网地址?192.168.1.0/24192.168.1.48 /28192.168.1.32/27192.168.1.64/262 points for Option 43出现路由环路的两个原因是什么?(选择两项)收敛速度缓慢静态路由配置错误路由通过两种路由协议获知在同一台路由器上同时使用静态路由和动态路由连接到Internet 的路由器上缺少默认路由Option 1 and Option 2 are correct.4下列哪两项是路由器的功能?(选择两项。

)连接多个IP 网络。

通过使用第2 层地址控制数据流。

确定发送数据包的最佳路径。

管理VLAN 数据库。

扩大广播域。

Option 1 and Option 3 are correct.5哪三项是CDP 的特性?(选择三项。

)测试第2 层连通性提供安全层工作在OSI 第2 层和第3 层默认在每个接口上启用用于调试第4 层连通性问题提供关于已启用CDP 的直连设备的信息Option 1, Option 4, and Option 6 are correct.6下列有关路由器上的启动配置的说法,哪两项是正确的?(选择两项)路由器使用启动配置文件来启动POST。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1On a router running EIGRP, what database would maintain a list of feasible successors?routing tableneighbor tabletopology tableadjacency table2Refer to the exhibit. This is the debug output from 2 directly connected EIGRP routers. They forming an adjacency. What is the cause?one router is a non-cisco routerthey have different autonomous-system numbersthey are using difference sequence numbersthey are sending incorrect hello types3Refer to the exhibit. Which command will advertise the 192.168.1.64/30 network but not the 192.168.1.32 network on router A?network 192.168.1.0network 192.168.1.0 255.255.255.0network 192.168.1.64 0.0.0.3network 192.168.1.64 0.0.0.7network 192.168.1.64 0.0.0.2554 What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Chooseput the route into passive modequery neighbors for a new routesearch routing table for a feasible successorrun the SPF algorithm to find a new successorsearch topology table for a feasible successor5Refer to the exhibit. What is indicated by the P at the beginning of the topology entry?the route is in a stable statethe route is a preferred routeDUAL is searching for a better route to this destinationthe exit interface is in passive mode and EIGRP advertisements are blocked6 In which of the following tables does the EIGRP DUAL algorithm store the primary route to adestination? (Choose two.)routingtopologyneighborpathshortest path7 What information is maintained in the EIGRP topology database for a destination route? (Chthree.)the routing protocolthe feasible distance of the routethe highest cost of the routethe SRTT value for the routethe route cost as advertised by the neighboring routerthe physical address of the gateway interface8 Which of the following statements describes the bounded updates used by EIGRP?Bounded updates are sent to all routers within an autonomous system.Partial updates are sent only to routers that need the information.The updates are sent to all routers in the routing table.Updates are bounded by the routers in the topology table.9 Which of the following types of routes will be denoted by EX in EIGRP routing table entries?two.)routes learned from other routing protocolsroutes learned from any non-adjacent EIGRP routersany route with a hop count metric higher than 224EIGRP routes that originate in different autonomous systemsall passive routes in the routing table10Host 192.168.1.66 in the network illustrated is unable to ping host 192.168.1.130. How must configured to enable connectivity between the two hosts? (Choose two.)R1(config-router)# network 192.168.1.128R1(config-router)# auto-summaryR1(config-router)# no auto-summaryR2(config-router)# no auto-summaryR2(config-router)# auto-summaryR2(config-router)# network 192.168.1.6411 Which two statements describe characteristics of EIGRP? (Choose two.)EIGRP is a distance vector routing protocol.EIGRP supports classless routing and VLSM.EIGRP is classified as a link-state routing protocol.EIGRP uses TCP for reliable delivery of EIGRP update packets.With EIGRP, loop-free paths are achieved through the use of hold-down timers.EIGRP sends a periodic update every 30 minutes.12Refer to the exhibit. Based on the output of show ip eigrp neighbors, what are two possible with adjacencies between Router1 and Router2? (Choose two.)The routers are configured with different EIGRP process IDs.Automatic summarization was disabled.The hello timer for R1 was altered.The serial interfaces for both routers are in different networks.No feasible successors were found.13Refer to the exhibit. In the topology table, what do the numbers 3011840 and 3128695 repre the route metric that is applied to those EIGRP routes for this routerthe trustworthiness of the routing information sourcethe composite of the hop count and bandwidth to that destination networkthe total metric for that network as advertised by the EIGRP neighbor14Refer to the exhibit. EIGRP is the only routing protocol enabled on this network. No static rou configured on this router. What can be concluded about network 198.18.1.0/24 from the exh output?A route to network 198.18.1.0/24 is not listed in the routing table.Packets that are destined for 198.18.1.0/24 will be forwarded to 198.18.10.6.EIGRP will perform equal cost load balancing across two paths when forwarding packets 198.18.1.0/24.The router with interface 172.16.3.2 is a successor for network 198.18.1.0/24.15Refer to the exhibit. All interfaces have been configured with the bandwidths that are shown exhibit. Assuming that all routers are using a default configuration of EIGRP as their routing what path will packets take from the 172.16.1.0/16 network to the 192.168.200.0/24 network A,B,EA,C,EA,D,EPackets will load balance across the A,B,E and A,C,E paths.Packets will load balance across the A,B,E and A,D,E paths.Packets will load balance across the A,C,E and A,D,E paths.16 By default, which two metrics are used by EIGRP to determine the best path between netwoMTUloaddelaybandwidthreliability17 Which term defines a collection of networks under the administrative control of a single entitypresents a common routing policy to the Internet?autonomous systemcontiguous networksprocess IDBGPv18Refer to the exhibit. The company is using EIGRP with an autonomous system number of 10 between hosts on networks that are connected to router A and those that are connected to ro successful. However, users on the 192.168.3.0 network are unable to reach users on the 19 network. What is the most likely cause of this problem?IP classless is enabled and is causing the packet to drop.The command network 192.168.1.32 was not issued on router C.The routers are not configured in the same EIGRP routing domain.Automatic summarization of the networks is causing the subnetted routes to be dropped.19 In the command router eigrp 20, what is the purpose of the number 20?specifies the administrative distance for all EIGRP routesidentifies the autonomous system number this EIGRP process will advertisedetermines what metric is added to all advertised routesindicates the number of addresses in the EIGRP routing domain20 The show ip eigrp topology command output on a router displays a successor route and asuccessor route to network 192.168.1.0/24. In order to reduce processor utilization, what doe do when the primary route to this network fails?The router sends query packets to all EIGRP neighbors for a better route to network192.168.1.0/24.The DUAL FSM immediately recomputes the algorithm to calculate the next backup rout Packets that are destined for network 192.168.1.0/24 are sent out the default gateway in The backup route to network 192.168.1.0/24 is installed in the routing table.。

相关文档
最新文档