ccna第五章考试题
CCNA-Exploration-网络基础知识-第五章练习及答案
○10.10.10.26○127.0.0.1○10.10.10.6○10.10.10.1○224.0.0.0
□R1使用192.168.0.1作为下一跳地址将数据包从192.168.12.0网络路由到172.16.0.0网络。
□R3使用172.16.0.1作为下一跳地址将数据包从10.0.0.0网络路由到172.16.0.0网络。
□R2使用192.168.0.1作为下一跳地址将数据包从172.16.0.0网络路由到192.168.12.0网络。
15.请参见图示。图中显示的所有设备均为出厂默认设置。图示拓扑代表多少个广播域?
○3○4○5○7○8○11Otion 216.下列关于路由及其用途的陈述,哪三项是正确的?(选择三项)
□如果找不到通往目的网络的路由,则将数据包返回前一个路由器。
□如果目的网络直接连接的网络,路由器会将数据包转发到目的主机。
○路由器发送ARP请求以确定所需的下一跳地址。
○路由器丢弃数据包。
○路由器将数据包转发到ARP表所示的下一跳。
○路由器将数据包转发到源地址所示的接口。
○路由器将数据包从默认路由条目所确定的接口发出。
Option 2 and Option 5 are correct.
11.将主机分组到同一个网络时应考虑哪些关键因素?(选择三项)
□网关□用途□物理编址□软件版本□地理位置□所有权
Option 2, Option 5, and Option 6 are correct.
12.以下哪一项是路由表条目的组成部分?
CCNA第一学期第五章答案
C C N A第一学期第五章答案集团文件版本号:(M928-T898-M248-WU2669-I2896-DQ586-M1988)最新CCNA第一学期第五章答案一个 MAC 地址包含 6 个字节。
前 3 个字节用于供应商标识,最后 3 个字节必须在同一 OUI 中分配唯一的值。
MAC 地址在硬件中实施。
网卡需要使用 MAC 地址来通过 LAN 通信。
IEEE 规范了 MAC 地址。
争用方法具有不确定性,没有受控访问方法中遇到的开销。
因为设备不需要轮流访问介质,所以无需跟踪次序。
争用方法在介质使用率高的情况下无法很好地扩展。
逻辑链路控制在软件中实施,能够让数据链路层与协议簇的上层协议通信。
网卡驱动程序软件直接与网卡上的硬件交互,可在 MAC 子层和物理介质之间传输数据。
逻辑链路控制在 IEEE 802.2 标准中指定。
IEEE 802.3 是定义不同以太网类型的一组标准。
MAC(介质访问控制)子层负责定位和检索介质上和介质外的帧。
组播 MAC 地址是一个特殊的十六进制数值,以 01-00-5E 开头。
然后将IP 组播组地址的低 23 位换算成以太网地址中剩余的 6 个十六进制字符,作为组播 MAC 地址的结尾。
MAC 地址的剩余位始终为“0”。
在此例中:224(十进制)=> 01-00-5E34(十进制)= 00100010(二进制)= 22(十六进制)56(十进制)= 00111000(二进制)= 38(十六进制)综合结果:01:00:5E:0B:22:38如果整个路径都基于以太网,则目的和源 MAC 地址将随着每个路由器跳数发生变化。
除非网络地址转换处于活动状态,否则目的 IP 地址在整个路径中保持不变。
请参见图示。
由于 PC1 需要向 PC2 发送数据包,因此 PC1 发出一个ARP 请求。
在这种情况下,接下来将发生什么?当一台网络设备要与相同网络中的另一台设备通信时,它会发送广播ARP 请求。
完整版CCNA测试题库及答案
完整版CCNA测试题库及答案描述载波侦听多路由访问/冲突检测(CSMA/CD)的工作原理。
CSMA/CD是一种帮助设备均衡共享带宽的协议,可避免两台设备同时在网络介质上传输数据。
虽然他不能消除冲突,但有助于极大的减少冲突,进而避免重传,从而提高所的设备的数据传输效率。
区分半双工和全双工通信。
并指出两种方法的需求。
与半双工以太网使用一对导线不同,全双工以太网使用两队导线,全双工使用不同的导线来消除冲突,从而允许同时发送和接收数据,而半双工可接收或发送数据,但不能同时接收和发送数据,且仍会出现冲突。
要使用全双工,电缆两端的设备都必须支持全双工,并配置成一全双模式运行。
描述MAC地址的组成部分以及各部分包含的信息。
MAC(硬件)地址时一种使用十六进制表示的地址,长48位(6B)。
其中前24位(3B)称为OUI(Organizationally Unique Idebtifier,组织唯一表示符),有IEEE分配给NIC制造商;余下的部分呢唯一地标识了NIC识别十进制数对应的二进制值和十六进制值。
用这三种格式之一表示的任何数字都可以转换为其他两种格式,能够执行这种转换对理解IP地址和子网划分至关重要。
识别以太网帧中与数据链路层相关的字段。
在以太网中,与数据链路层相关的字段包括前导码,帧其实位置分隔符,目标MAC地址,源MAC地址,长度或者类型以及帧校验序列。
识别以太网布线相关的IEEE标准。
这些标准描述了各种电缆类型的功能和物理特征,包括(但不限于)10Base2、10Base5和10BaseT。
区分以太网电缆类型及其用途。
以太网电缆分3种:直通电缆,用于将PC或路由器的以太网接口连接到集线器或交换机;交叉电缆。
用于将集线器连接到集线器,集线器连接到交换机,交换机连接到交换机以及PC连接到PC;反转电缆,用于PC和路由器或交换机之间建立控制台连接。
描述数据封装过程及其在分组创建中的作用。
数据封装指的是在OSI模型各层给数据添加信息的过程,也成为分组创建。
CCNA认证基础课程-课后作业.习题答案
CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。
CCNABRAINDUMP5(1)-思科认证试题
CCNABRAINDUMP5(1)-思科认证试题WELL I PASSED THIS TEST WITH A 82% HOPE MY STUDY TIPS AND PRACTICE QUESTIONS HELP!!??DON CCNA, MCSE1. If you wanted to find out which commands where available that started with the letter “T”Help T*Help T?T ?T?? T2. type the command to instruct the router to load the IOS from the file named "ios11.2.img" saved on flash?Load boot flash ios.11.2.imgboot system flash ios11.2.imgload flash ios11.2.imgrun flash ios.11.2.img3. Identify the true statements (2)Store and forward switching creates variable latency through the switchCut through switching creates variables latency through the switchStore and forward switching works at wire speedCut through switching works at wire speed4. Choose the best answers: Which of the following is the session layer concerned with?(2)Managing exchanges of data between presentation layer entitiesFlow Control and windowingEstablishing, managing and and terminating sessionsVerifying data encoding formats5. Which ISDN specification series deals with the concepts and terminology surrounding ISDN? (1)I SeriesQ SeriesE SeriesThere is no specific series6. What does the command “CDP Timer 150” do?Gives CDP a administrative metric of 150Configures the rate at which CDP packets are sentChanges the CDP hold down timerSets the CDP hold down timer to 1507. Which command would set the encrypted secret password to CISCO?Enable secret cisco encryptEnable secret 5 ciscoEnable secret ciscoEnable-secret ciscoEnable password cisco8. How can you get to user exec mode from the console?Type “enable”Type “config terminal”Press the enter key on the keyboard。
ccna2答案第五章
第五章 RIPv1 CCNA2 Exploration: 路由协议和概念 (2010-12-15 18:07:13) 转载▼标签: 杂谈 分类: 2010|CCNA2官方试题--路由 1窗体顶端ERouting Chapter 7 - CCNA Exploration: 路由协议和概念 (版本 4.0)以下行显示在 show ip route 命令的输出中。
R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0该路由度量的值是什么?3122030120 窗体底端2窗体顶端下列关于 RIPv1 特性的陈述中,哪两项是正确的?(选择两项。
)它是一种距离矢量路由协议。
它会在路由更新中通告路由的地址和子网掩码。
RIP 消息的数据部分封装在 TCP 数据段中。
RIP 消息的数据部分封装在 UDP 数据段中。
它每 15 秒广播一次更新。
它最多允许路由域中存在 15 台路由器。
窗体底端3窗体顶端请参见图示。
图中所示的网络运行RIPv1。
不久前其中添加了192.168.10.0/24 网络,该网络将只包含最终要防止向新网络中的最终用户设备发送RIPv1 更新,同时允许将此新网络通告给其它路由器,应该在Rou 什么命令?Router1(config-router)# no router ripRouter1(config-router)# network 192.168.10.0Router1(config-router)# no network 192.168.10.0Router1(config-router)# passive-interface fastethernet 0/0Router1(config-router)# passive-interface serial 0/0/0窗体底端4 窗体顶端请参见图示。
该网络包含多台路由器。
CCNA第二学期练习答案chapter5
1Refer to the exhibit. All routers in the exhibit are running RIP v1. The network administrator i show ip route command on router A. What routes would appear in the routing table output i network is converged? (Choose two).R 192.168.2.0/24 [120/1]C 192.168.2.0/24 [120/1]R 10.10.3.0/24 [120/0]C 10.10.3.0/24 [120/1]R 10.10.1.0/24 [120/2]R 10.10.1.0/24 [120/3]2Refer to the exhibit. Router1 is running RIPv1. What command was entered into Router1 to c the gateway of last resort?no auto-summaryip default-network 0.0.0.0ip default-gateway 10.0.0.0ip route 0.0.0.0 0.0.0.0 S0/0/13Refer to the exhibit. Router1 and Router2 are running the RIPv1 protocol. The network admi configures the command network 10.1.0.0 on Router1. What network will Router1 advertise Router2?10.1.0.0/1610.1.0.0/810.0.0.0/1610.0.0.0/84Which of the following would be the correct command sequence to enable RIP on Router B f connected networks?RouterB# router ripRouterB(router)# network 210.36.7.0RouterB(router)# network 220.17.29.0RouterB(router)# network 211.168.74.0RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 211.168.74.0RouterB(config-router)# network 199.84.32.0RouterB(config)# configure router ripRouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 199.84.32.0RouterB(config-router)# network 211.168.74.0RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 211.168.74.0RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 220.17.29.05 Which command will display RIP activity as it occurs on a router?debug ip ripshow ip routeshow ip interfaceshow ip protocolsdebug ip rip configshow ip rip database6 Which command or set of commands will stop the RIP routing process?RouterB(config)# router ripRouterB(config-router)# shutdownRouterB(config)# router ripRouterB(config-router)# network no 192.168.2.0RouterB(config)# no router ripRouterB(config)# router no rip7Refer to the output from the show ip route command. What can be concluded from the outp router command?A preferred route to the destination has not been set.There are two equal cost paths to network 1.0.0.0.Both interfaces are being used equally to route traffic.A variance must be set to load-balance across multiple paths.8 The following line was displayed in the output of the show ip route command.R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0What is the value of the routing metric?31220301209 Which of the following is considered a limitation of RIP v1?RIP v1 does not send subnet mask information in its updates.RIP v1 is not widely supported by networking hardware vendors.RIP v1 consumes excessive bandwidth by multicasting routing updates using a Class DRIP v1 requires enhanced router processors and extra RAM to function effectively.RIP v1 does not support load balancing across equal-cost paths.RIP v1 authentication is complicated and time-consuming to configure.10 What are three characteristics of the RIPv1 routing protocol? (Choose three.)supports the use of VLSMuses hop count as a metricconsiders a metric of 16 as infinityhas an administrative distance of 110 by defaultincludes the destination IP address and subnet mask in routing updatescalculates metrics using the Bellman Ford algorithm11 What will happen if an interface IP address is entered for the address portion of the networkin a RIPv1 configuration instead of a network address?The router will reject the command.A route to the host address will be added to outgoing RIP updates.A route to the host address will be added to the routing table.All interfaces in the same classful network as the configured address will be included in t routing process.12Refer to the exhibit. All routers that are shown are running the RIP routing protocol. All unkno traffic must be forwarded to the ISP. What router or set of routers are recommended to have default route and the default-information originate command issued to implement this forw policy?only Router1only the gateway routerall routers in the networkonly the routers with LANs needing Internet access13Refer to the exhibit. All routers are configured with valid interface addresses in the indicated and are running RIPv1. The network is converged. Which routes are present in the routing ta All routers have all routes in their routing table.All routers have all /30 routes, but do not have /24 routes in their routing table.All routers have all /30 routes. Routers A and E also have some of the /24 routes in their table.All routers have all /30 routes. Routers B and D also have some of the /24 routes in their table.Routers A and E have all routes. Routers B and D have only /30 routes in their routing taRouters A and E have only /24 routes. Routers B and D have only /30 routes in their rout 14Refer to the exhibit. A network consists of multiple routers. What can be verified when the sh protocols command is issued on one of the routers in the network?whether all routes in the network have been properly added to the routing tablerouting protocol configuration in use for IP on this routeroperational status of routing protocols in use on all routers in the networkrouting metric of each network that is listed in the routing table15Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator noti the route is still valid in the routing table of Router1. How much longer will it take for Router1 the route invalid by setting the metric to 16?30 seconds90 seconds155 seconds180 seconds255 seconds16 What is the default update period in seconds for the RIP routing protocol?10121520306017Refer to the exhibit. What can be concluded from the routing table output of router B?A static default route has been configured on B.The default-information originate command has been entered on A.All traffic that is destined for 192.168.1.1 will be sent to address 0.0.0.0.Hosts on the 10.16.1.0/27 network have 192.168.1.1 configured as the default gateway a 18 Which two statements are true regarding the characteristics of RIPv1? (Choose two).It is a distance vector routing protocol.It advertises the address and subnet mask for routes in routing updates.The data portion of a RIP message is encapsulated into a TCP segment.The data portion of a RIP message is encapsulated into a UDP segment.It broadcasts updates every 15 seconds.It allows a maximum of 15 routers in the routing domain.19Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 netwo recently added and will only contain end users. What command or set of commands should b on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new net still allowing this new network to be advertised to other routers?Router1(config-router)# no router ripRouter1(config-router)# network 192.168.10.0Router1(config-router)# no network 192.168.10.0Router1(config-router)# passive-interface fastethernet 0/0Router1(config-router)# passive-interface serial 0/0/0。
ccna章节与期末答案
第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。
而且对等网络也没有集中管理。
这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。
正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。
正确答案:1和4解析:终端设备会发出通过网络传输的数据。
中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。
网络介质提供网络消息的传输通道。
正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。
内部网只描述通常仅供内部人员访问的网络区域。
当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。
使用大学无线LAN 的设备多为平板电脑和智能手机。
大学生主要使用无线WAN 来访问他们的手机运营商网络。
.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。
内联网基本上是仅供内部使用的局域网。
外联网是外部合作伙伴访问组织内部特定资源的网络。
家庭用户并不一定使用LAN 来访问Internet。
例如,PC 可以通过调制解调器直接连接到ISP。
正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。
内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。
正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。
10正确答案:2和3解析:移动电话连接需要使用移动电话网络。
卫星连接通常用于家庭或企业外部不便使用物理布线的位置。
11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。
ccna2答案第五章共10页
第五章 RIPv1 CCNA2 Exploration: 路由协议和概念(2019-12-15 18:07:13)转载▼标签:杂谈分类: 2010|CCNA2官方试题--路由1 窗体顶端ERouting Chapter 7 - CCNA Exploration: 路由协议和概念(版本 4.0)以下行显示在 show ip route 命令的输出中。
R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0该路由度量的值是什么?3122030120 窗体底端2 窗体顶端下列关于 RIPv1 特性的陈述中,哪两项是正确的?(选择两项。
)它是一种距离矢量路由协议。
它会在路由更新中通告路由的地址和子网掩码。
RIP 消息的数据部分封装在 TCP 数据段中。
RIP 消息的数据部分封装在 UDP 数据段中。
它每 15 秒广播一次更新。
它最多允许路由域中存在 15 台路由器。
窗体底端3 窗体顶端请参见图示。
图中所示的网络运行 RIPv1。
不久前其中添加了192.168.10.0/24 网络,该网络将只包含最终用户。
如果要防止向新网络中的最终用户设备发送 RIPv1 更新,同时允许将此新网络通告给其它路由器,应该在 Router1 上输入什么命令?Router1(config-router)# no router ripRouter1(config-router)# network 192.168.10.0Router1(config-router)# no network 192.168.10.0Router1(config-router)# passive-interface fastethernet 0/0Router1(config-router)# passive-interface serial 0/0/0窗体底端4 窗体顶端请参见图示。
CCNA第一学期各章习题及答案
诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61第十一章配置和测试网络P62-70第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。
所示网络属于哪一类型WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。
下列哪组设备仅包含终端设备A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I、J010 选择关于网络协议的正确陈述。
CCNA考试题
C C N A考试题(总9页) -CAL-FENGHAI.-(YICAI)-Company One1-CAL-本页仅作为文档封面,使用请直接删除第一部分:选择题1:提供可靠数据传输、流控的是OSI的第几层()A、表示层B、网络层C、传输层D、会话层E、链路层2:子网掩码产生在那一层()A、表示层B、网络层C、传输层D、会话层3:当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是()A、丢掉该分组B、将该分组分片C、转发该分组D、以上答案均不对4:当一台主机从一个网络移到另一个网络时,以下说法正确的是()A、必须改变它的IP地址和MAC地址B、必须改变它的IP地址,但不需改动MAC地址C、必须改变它的MAC地址,但不需改动IP地址D、MAC地址、IP地址都不需改动5:ISO提出OSI的关键是()A、系统互联B、提高网络速度C、为计算机制定标准D、经济利益6:OSI参考模型按顺序有哪些层()A、应用层、传输层、网络层、物理层B、应用层、表示层、会话层、网络层、传输层、数据链路层、物理层C、应用层、表示层、会话层、传输层、网络层、数据链路层、物理层D、应用层、会话层、传输层、物理层7:LAN的拓扑形式一般以()为主。
A、总线型B、环型C、令牌环D、载波侦听与冲突检测CSMA/CD8:网段地址154.27.0.0的网络,若不做子网划分,能支持()台主机A、254B、1024C、65,534D、16,777,2069:路由器网络层的基本功能是()。
A、配置IP地址B、寻找路由和转发报文C、将MAC地址解释成IP地址10:选出基于TCP协议的应用程序()。
A、PINGB、TFTPC、TELNETD、OSPF11:某公司申请到一个C类IP地址,但要连接6个的子公司,最大的一个子公司有26台计算机,每个子公司在一个网段中,则子网掩码应设为()。
A、255.255.255.0B、255.255.255.128C、255.255.255.192D、255.255.255.22412:B类地址的缺省掩码是()。
CCNA第三学期Chapter5(附答案)
CCNA第三学期Chapter5(附答案)1窗体顶端请参见图示。
从图中所示的输出可得出什么结论?在Fa0/2 和Fa0/4 之间通信的两台主机的开销为38。
已经静态配置了优先级,目的在于确定根。
此交换机上禁用了STP。
已经更改了计时器,目的在于缩短收敛时间。
窗体底端2窗体顶端下列哪两种说法正确描述了生成树拓扑中所用的BID?(选择两项。
)只有在下级BPDU 被发送出去后,它们才会被根桥发送出去。
它们包含网桥优先级和MAC 地址。
只有根桥会发送出BID。
它们被生成树拓扑中的交换机用来选举根桥。
具有最快处理器的交换机将具有最低的BID。
窗体底端3窗体顶端RSTP 边缘端口收到BPDU 时会进行哪两项操作?(选择两项。
)立即失去边缘状态防止产生TCN马上转换到学习状态禁用自身成为普通的生成树端口窗体底端4窗体顶端交换机通过哪两种方式使用BPDU 中的信息?(选择两项。
)用于在交换机之间协商中继链路用于设置冗余链路的双工模式用于确定到达根桥的最短路径用于通过在相连的交换机间共享桥接表来防止环路用于确定将哪些端口作为生成树的一部分转发帧窗体底端5窗体顶端下列关于RSTP 和STP 的说法中哪三项准确?(选择三项。
)RSTP 使用更快的算法来确定根端口。
RSTP 引入扩展系统ID 以允许超过4096 个VLAN。
RSTP 和STP 都使用portfast命令来允许端口立即转换到转发状态。
与STP PortFast 一样,RSTP 边缘端口收到BPDU 后也会立即失去边缘端口状态并成为普通的生成树端口。
STP 用于建立主根桥和辅助根桥的命令与RSTP 所用的相同。
因为BPDU 数据包的格式,RSTP 向下兼容STP。
窗体底端6窗体顶端下列关于spanning-tree portfast命令的说法中哪两项正确?(选择两项。
)PortFast 是Cisco 的专有技术。
PortFast 会对DHCP 服务造成负面影响。
CCNA第一学期各章习题和参考答案.doc
CCNA第一学期各章习题和参考答案第二章网络通信1、TCP/IP网络接入层有何作用?A路径确定和数据包交换B数据表示、编码和控制C可靠性、流量控制和错误检测E将数据段划分为数据包2、下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)B发起数据通信D发送数据流F数据流最后的终止点3、下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)C LAN 中的不同网段之间一般通过租用连接的方式连接。
D此类网络的安全和访问控制由服务提供商控制。
F此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU?A传输期间的帧损坏B在目的设备上重组的数据C因通信丢失而重新传输的数据包005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)018哪个应用层协议通常用于支持客户端与服务器之间的文件传输?A HTMLB HTTP D Telnet019哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?A DHCPB DNS D SMTP E Telnet020服务器上的应用层通常如何处理多客户端服务请求?A终止与服务的所有连接B拒绝与单一守护程序的多个连接C暂停当前连接,建立新连接第四章OSI传输层001下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)A流量控制 D 面向连接E 序列和确认002请参见图示。
此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?A会话创建B 数据段重传C 数据传输D 会话断开003数据段的TCP 报头中为什么包含端口号?A指示转发数据段时应使用的正确路由器接口B 标识接收或转发数据段时应使用的交换机端口C确定封装数据时应使用的第3 层协议让接收主机转发数据到适当的应用程序E让接收主机以正确的顺序组装数据包004OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?A应用层 B 表示层 C 会话层传输层 E 网络层005请参见图示。
CCNA第一学期各章知识题及答案解析
诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14 第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61 第十一章配置和测试网络P62-70 第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用?路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU?传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。
所示网络属于哪一类型?WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备?管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么?标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。
ccna考试题及答案
ccna考试题及答案1. 以下哪项是网络层的功能?A. 路由选择B. 错误检测C. 流量控制D. 封装数据包答案:A2. 在OSI模型中,哪一层负责在网络中传输数据?A. 应用层B. 传输层C. 会话层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中发现网络设备的?A. ARPB. RARPC. ICMPD. OSPF答案:A4. 在TCP/IP模型中,哪一层与OSI模型的传输层相对应?A. 应用层B. 互联网层C. 网络接口层D. 传输层答案:D5. 以下哪个地址是一个有效的IPv4地址?A. 192.168.1.256B. 192.168.1.1C. 10.0.0.0D. 172.16.300.1答案:B6. 在配置路由器时,以下哪个命令用于进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B7. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show configD. show current-config答案:A8. 在Cisco设备上,以下哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. save startup-config答案:A9. 以下哪个命令用于在Cisco设备上查看所有接口的状态?A. show interfacesB. show ip interface briefC. show interface statusD. show running-config interface答案:B10. 在Cisco设备上,以下哪个命令用于关闭接口?A. shutdownB. no shutdownC. disableD. no enable答案:A11. 以下哪个命令用于在Cisco设备上启用接口?A. shutdownB. no shutdownC. disableD. no enable答案:B12. 在配置静态路由时,以下哪个命令用于指定下一跳地址?B. ip static-routeC. route ipD. static-route ip答案:A13. 以下哪个命令用于在Cisco设备上清除ARP表?A. clear arp-cacheB. clear arpC. clear arp tableD. clear ip arp答案:D14. 在配置动态路由协议时,以下哪个命令用于在接口上启用RIP?A. ip rip enableB. ip rip receiveD. network rip答案:C15. 以下哪个命令用于在Cisco设备上查看RIP路由表?A. show ip ripB. show ip route ripC. show ripD. show ip protocols答案:B16. 在配置EIGRP时,以下哪个命令用于指定自动汇总?A. metric weightsB. auto-summaryC. network auto-summaryD. no auto-summary答案:B17. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. show ip eigrp neighborsB. show eigrp neighborsC. show ip eigrpD. show eigrp interfaces答案:A18. 在配置OSPF时,以下哪个命令用于指定路由器ID?A. router-idB. router ospfC. networkD. area答案:A19. 以下哪个命令用于在Cisco设备上查看OSPF路由表?A. show ip ospfB. show ip ospf databaseC. show ospfD. show ip route ospf答案:D20. 在配置VLAN时,以下哪个命令用于创建一个新的VLAN?A. vlan databaseB. configure terminalC. vlan [vlan-id]D. new-vlan答案:C21. 以下哪个命令用于将接口分配给VLAN?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:C22. 在配置交换机时,以下哪个命令用于将接口设置为Trunk 模式?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:B23. 以下哪个命令用于在Cisco设备上查看VLAN配置?A. show vlanB. show vlan briefC. show vlan detailD. show vlan all答案:B24. 在配置VTP时,以下哪个命令用于将交换机设置为VTP服务器模式?A. vtp mode serverB. vtp mode clientC. vtp mode transparentD. vtp mode off答案:A25. 以下哪个命令用于在Cisco设备上查看VTP状态?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A26. 在配置STP时,以下哪个命令用于设置根桥?A. spanning-tree root primaryB. spanning-tree root secondaryC. spanning-tree root primary [priority]D. spanning-tree root secondary [priority]答案:C27. 以下哪个命令用于在Cisco设备上查看STP状态?A. show spanning-treeB. show spanning-tree detailC. show spanning-tree summaryD. show spanning-tree interface答案:A28. 在配置VLAN Trunking Protocol (VTP) 时,以下哪个命令用于设置VTP域名?A. vtp domain [domain-name]B. vtp password [password]C. vtp mode [mode]D. vtp version [version]答案:A29. 以下哪个命令用于在Cisco设备上查看当前的VTP版本?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A30. 在配置端口安全时,以下哪个命令用于限制接口上可以学习到的最大MAC地址数量?A. switchport port-security maximum [mac-count]B. port-security maximum [mac-count]C. switchport port-security violation restrictD. port-security violation shutdown答案:A这些题目和答案仅供学习和参考之用,实际的CCNA考试内容和形式可能会有所不同。
CCNA路由部分测试题(含答案)
CCNA路由部分测试题(共50题)1.当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是什么?A.丢掉该分组B.将该分组分片C.转发该分组D.以上答案均不对ANSWER:A2.IGP 的作用范围是?A.区域内B.自然子网范围内C.局域网内D.自治系统内ANSWER:D3.距离矢量协议包括?(多选)A.RIPB.IS-ISC.OSPFD.EIGRPANSWER:A D4.解决路由环问题的办法是?(多选)A.定义路由权的最大值B.路由保持法C.水平分割D.路由器重启ANSWER:A B C5.在rip 中metric 等于什么值为不可达?A.8B.10C.15D.16ANSWER:D6.下列关于OSPF 协议的说法正确的是?(多选)A.OSPF 支持基于接口的报文验证B.OSPF 支持到同一目的地址的多条等值路由C.OSPF 是一个基于链路状态算法的边界网关路由协议D.OSPF 发现的路由可以根据不同的类型而有不同的优先级ANSWER:A B D7.如果一个内部网络对外的出口只有一个,那么最好配置?A.缺省路由B.主机路由C.动态路由ANSWER:A8.以下不属于动态路由协议的是?A.RIPB.ICMPC.EIGRPD.OSPFANSWER:B9.关于矢量距离算法以下哪些说法是错误的?A.矢量距离算法不会产生路由环路问题B.矢量距离算法是靠传递路由信息来实现的C.路由信息的矢量表示法是(目标网络,metric)D.使用矢量距离算法的协议只从自己的邻居获得信息ANSWER:A10.以下哪些路由表项要由网络管理员手动配置?(多选)A.静态路由B.直接路由C.缺省路由D.动态路由ANSWER:A C11.关于RIP 协议,下列说法正确的有?(多选)A.RIP 协议是一种IGPB.RIP 协议是一种EGPC.RIP 协议是一种距离矢量路由协议D.RIP 协议是一种链路状态路由协议ANSWER:A C12.下列关于链路状态算法的说法正确的是?(多选)A.链路状态是对路由的描述B.链路状态是对网络拓扑结构的描述C.链路状态算法本身不会产生自环路由D.OSPF 和RIP 都使用链路状态算法ANSWER:B C13.路由器中时刻维持着一张路由表,这张路由表可以是静态配置的,也可以是什么协议产生的?A.生成树协议B.链路控制协议C.动态路由协议D.被承载网络层协议ANSWER:C14.在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有?(多选)A.路由的优先级B.路由的发布者C.路由的metric 值D.路由的生存时间ANSWER:A C15.下面哪一项正确描述了路由协议?A.允许数据包在主机间转送的一种协议B.定义数据包中域的格式和用法的一种方式C.通过执行一个算法来完成路由选择的一个协议D.指定MAC 地址和IP 地址捆绑的方式和时间的一种协议ANSWER:C16.IGP 包括如下哪些协议?(多选)A.RIPB.BGPC.IS-ISD.EIGRPE.OSPFANSWER:A C D E17.RIP 协议引入路由保持机制的作用是?A.节省网络带宽B.防治网络中形成路由环路C.将路由不可达信息在全网扩散D.通知邻居路由器哪些路由是从其处得到ANSWER:B18.对路由理解正确的是?A.路由是路由器B.路由是信息在网络路径的交叉点C.路由是用以配置报文的目的地址D.路由就是指导报文发送的路径信息ANSWER:D19.路由协议RIP,OSPF和静态路由各自得到了条到达目标网络,在CISCO路由器默认情况下,最终选选定哪种路由作为最优路由?A.RIPB.OSPFC.静态路由ANSWER:C20.在RIP 协议中,计算metric 值的参数是?A.MTUB.时延C.带宽D.路由跳数ANSWER:D21.衡量路由算法好坏的原则不包括?A.快速收敛性B.灵活性,弹性C.拓扑结构先进D.选径是否是最佳ANSWER:C22.RIP 协议是基于?A.UDPB.TCPC.ICMPD.Raw IPANSWER:A23.禁止RIP 协议的路由聚合功能的命令是?A.no route ripB.summanyC.no auto summanyD.undo networkANSWER:C24.解决路由环路的方法有?(多选)A.水平分割B.抑制时间C.毒性逆转D.触发更新ANSWER:A B C D25.路由环问题会引起哪些问题?(多选)A.慢收敛B.广播风暴C.路由器重起D.路由不一致ANSWER:A D26.下列哪些路由协议存在路由自环问题?(多选)A.RIPB.IGRPC.OSPFD.IS-ISE.EIGRPANSWER:A B27.关于RIP V1 和RIP V2,下列说法哪些正确?(多选)A.RIP V1 报文支持子网掩码B.RIP V2 报文支持子网掩码C.RIP V2 缺省使用路由聚合功能D.RIP V1 只支持报文的简单口令认证,而RIP V2 支持MD5 认证ANSWER:B C28.在一个运行OSPF 的自治系统之内?(多选)A.骨干区域自身也必须连通的B.非骨干区域自身也必须连通的C.必须存在一个骨干区域(区域号为0)D.非骨干区域与骨干区域必须直接相连或逻辑上相连ANSWER:A C D29.以下关于Rip 路由聚合的说法正确的是?(多选)A.Rip V1 默认支持路由聚合,需要时可以关闭路由聚合功能B.华为Quidway 系列路由器Rip V2 的实现可以关闭路由聚合功能C.Rip V1 不支持子网路由聚合到一个非自然子网路由D.Rip V2 支持子网路由聚合到一个非自然子网路由ANSWER:B C D30.假设有这样的组网实例:两台路由器(假设为RTA 和RTB)通过串口相接,其中RTA 的串口IP 地址是,RTB 的串口IP 地址是,RTA 通过以太口连接的本地局域网的IP 地址是,RTB 通过以太口连接的本地局域网IP 地址是,在上面所有的接口上都启动RIP V1(仅仅RIP V1)协议,那么,下列说法正确的是?(多选)A.在RTA 的本地局域网上的计算机可以访问在RTB 本地局域网上的计算机B.在RTB 的本地局域网上的计算机可以访问在RTA 本地局域网上的计算机C.在RTA 的本地局域网上的计算机不能访问在RTB 本地局域网上的计算机D.在RTB 的本地局域网上的计算机不能访问在RTA 本地局域网上的计算机ANSWER:C D31.根据路由的目的地不同,路由表可被划分为?(多选)A.子网路由B.直连路由C.缺省路由D.主机路由E.静态路由ANSWER:A D32.对路由器A 配置RIP 协议,并在接口S0(IP 地址为路由协议,在全局配置模式下使用的第一条命令是?A.router ripwork allworkworkANSWER:A33.当接口运行在RIP-2 广播方式时,它可以接受的报文有?(多选)A.RIP-1 广播报文B.RIP-1 组播报文C.RIP-2 广播报文D.RIP-2 组播报文ANSWER:A C34.RIP 协议的路由项在多少时间内没有更新会变为不可达?A.90sB.120sC.180sD.240sANSWER:C35.VLSM 的含义是?A.Variable Length Subnet MaskingB.Variable Length Shortest MaskingC.Very Long/Shortest MaskingD.Variable Long Subnet MaskingE.Variable Length Short MeasurementANSWER:A36.距离矢量路由协议使用水平分割(split horizon)技术的目的是什么?(多选)A.避免在毗邻路由器之间产生路由环路B.确保路由更新数据报文沿着接收路线方向发送C.与保持间隔(holddown)机制协同工作,为保持间隔的计算提供更多的可靠性D.代替路由中毒(poison reverse)算法ANSWER:A C37.作为一个网络维护人员,对于OSPF 区域体系机构的原则必须有清楚地了解,下面的论述表达正确的是?(多选)A.所有的OSPF 区域必须通过边界路由器与区域0 相连,或采用OSPF 虚链路B.所有区域间通信必须通过骨干区域0,因此所有区域路由器必须包含到区域0 的路由C.单个区域不能包含没有物理链路的两个区域边界路由器D.虚链路可以穿越stub 区域ANSWER:A B38.支持可变长子网掩码的路由协议有?(多选)A.RIP v1B.RIP v2C.OSPFD.EIGRPANSWER:B C D39.因为在生成路由表的过程中,OSPF 协议需要进行复杂的SPF 算法来计算网络拓扑结构,所以相对距离矢量路由选择协议来说,它需要更大的开销,更多的延迟,更高的CPU 占用率。
最新CCNA第一学期第五章答案(新)
最新CCNA第一学期第五章答案一个MAC 地址包含 6 个字节。
前 3 个字节用于供应商标识,最后 3 个字节必须在同一OUI 中分配唯一的值。
MAC 地址在硬件中实施。
网卡需要使用MAC 地址来通过LAN 通信。
IEEE 规范了MAC 地址。
争用方法具有不确定性,没有受控访问方法中遇到的开销。
因为设备不需要轮流访问介质,所以无需跟踪次序。
争用方法在介质使用率高的情况下无法很好地扩展。
逻辑链路控制在软件中实施,能够让数据链路层与协议簇的上层协议通信。
网卡驱动程序软件直接与网卡上的硬件交互,可在MAC 子层和物理介质之间传输数据。
逻辑链路控制在IEEE 802.2 标准中指定。
IEEE 802.3 是定义不同以太网类型的一组标准。
MAC(介质访问控制)子层负责定位和检索介质上和介质外的帧。
组播MAC 地址是一个特殊的十六进制数值,以01-00-5E 开头。
然后将IP 组播组地址的低23 位换算成以太网地址中剩余的 6 个十六进制字符,作为组播MAC 地址的结尾。
MAC 地址的剩余位始终为“0”。
在此例中:224(十进制)=> 01-00-5E 139(十进制)= 10001011(二进制)==>(23 位)= 0001011(二进制)= 0B(十六进制)34(十进制)= 00100010(二进制)= 22(十六进制)56(十进制)= 00111000(二进制)= 38(十六进制)综合结果:01:00:5E:0B:22:38如果整个路径都基于以太网,则目的和源MAC 地址将随着每个路由器跳数发生变化。
除非网络地址转换处于活动状态,否则目的IP 地址在整个路径中保持不变。
当节点将数据包封装为帧时,需要使用目的MAC 地址。
首先节点会确定目的设备位于本地网络还是远程网络。
然后它会查找ARP 表(而非MAC 表),以确定是否有一对IP 地址和MAC 地址能够用于目的IP 地址(如果目的主机位于本地网络),或者用于默认网关IP 地址(如果目的主机位于远程网络)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1对网络电缆采用的连接器不正确可能产生什么后果?
会将数据转发到错误的节点。
通过该电缆传输的数据可能发生信号丢失。
将对该电缆中传输的数据采用不正确的信号方法。
该电缆中发送的数据所采用的编码方法将更改,用于补偿不当连接。
2大多数企业LAN 中的双绞线网络电缆使用哪种连接器?
BNC
RJ-11
RJ-45
F 型
3在网络中传输数据时,物理层的主要作用是什么?
创建信号以表示介质上每个帧中的比特
为设备提供物理编址
确定数据包的网络通路
控制数据对介质的访问
4数据传输的三种量度标准是什么?(选择三项)
实际吞吐量
频率
幅度
吞吐量
串扰
带宽
5UTP 电缆的哪个特征有助于减少干扰的影响?
屏蔽层中的金属编织
包裹核心的反射涂层
电缆中的线对绕绞
外皮中的绝缘材料
6XYZ 公司正在其数据网络中安装新的电缆。
下列哪两种类型是新架设时最常用的电缆?(选择两项)
同轴
4 类UTP
5 类UTP
6 类UTP
STP
7使用什么设备可以检查安装的光纤是否存在错误并检查其完整性和介质性能?
光注入器
OTDR
TDR
万用表
8以下哪项是单模光缆的特征?
一般使用LED 作为光源
因为有多条光通路,核心相对较粗
价格比多模低
一般使用激光作为光源
9
请参见图示。
哪种 5 类电缆用于在主机 A 和主机 B 之间建立以太网连接?
同轴电缆
全反电缆
交叉电缆
直通电缆
10以下哪项被视为选择无线介质的优点?
主机移动更方便
安全风险更低
减少干扰的影响
环境对有效覆盖面积的影响更小
11如果在网络中使用非屏蔽双绞线铜缆,导致线对内串扰的原因是什么?
相邻线对周围的磁场
使用编织线屏蔽相邻线对
从电缆远端反射回来的电波
因两个节点尝试同时使用介质而导致的冲突
12哪种光纤连接器支持全双工以太网?
13哪种电缆通常与光缆相关联?
主干电缆
水平电缆
跳线电缆
工作区域电缆
14在可能存在电气危险或电磁干扰的LAN 安装中,主干布线建议使用哪种类型的介质?
同轴
光纤
5e 类UTP
6 类UTP
15网络中什么时候使用直通电缆?
通过控制台端口连接路由器时
连接两台交换机时
连接主机与交换机时
连接两台路由器时
16以下哪些特征描述的是光缆?(选择两项)
不受 EMI 或RF I 影响。
每对电缆都包裹在金属箔中。
结合取消、屏蔽和绕绞技术来保护数据。
最高速度为 100 Mbps。
最昂贵的LAN 电缆类型。
17OSI 哪一层负责网络通信的二进制传输、电缆规格和物理方面?
表示层
传输层
数据链路层
物理层
18哪种信号传输方法使用无线电波传送信号?
电
光
无线
参考答案:1、B 2、C 3、A 4、ADF 5、C 6、DE 7、B 8、D 9、C 10、A 11、A 12、C 13、A 14、B 15、C 16、AE 17、D 18、C。