思科第二学期第八章答案
思科第二学期期末试题及答案
Close WindowAssessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment 1Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2? 192.168.1.0/24 192.168.0.0/24 192.168.0.0/22 192.168.1.0/22 2If a router is booting with its default configuration register setting and its NVRAM lacks boot system commands, from try to load the IOS image first? ROM RAM NVRAM f lash flash TFTP server 3Refer to the exhibit. A network administrator adds this command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0. result of adding this command? This route is automatically propagated throughout the network. The traffic for network 172.16.1.0 is forwarded to network 192.168.2.0. A static route is established. A static route is established. The traffic for all Class C networks is forwarded to 172.16.1.2. 4Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.) authentication link-state advertisements h old-down timers hold-down timers Spanning Tree Protocol split horizon 5Refer to the exhibit. What information can be determined from the displayed output? E IGRP packets are waiting to be sent to the neighbors. EIGRP packets are waiting to be sent to the neighbors. The adjacencies between the routers are yet to be established. The IP address 192.168.10.10 is configured at serial interface S0/0/1 of router R2. Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interf6Which statement is true about the metrics used by routing protocols? A metric is a value used by a particular routing protocol to compare paths to remote networks. A metric is a value used by a particular routing protocol to compare paths to remote networks. A common metric is used by all routing protocols. The metric with the highest value is installed in the routing table. The router may use only one parameter at a time to calculate the metric. 7Which feature of RIPv2 enables it to function as a classless routing protocol? Subnet masks are included in routing updates. Routing updates are triggered by topology changes. Next-hop addresses are included in routing updates. N ext-hop addresses are included in routing updates. Multicast addresses are used to send routing updates. 8Refer to the exhibit. The hosts on the R1 LAN are unable to access the Internet. What is incorrectly configured? the IP address of the Fa0/0 interface at R1 t he IP address of the Fa0/0 interface at R1 the IP address of the S0/0/1 interface at R2 the IP address of the S0/0/0 interface at R1 the subnet mask of the S0/0/1 interface at R2 9Which prompt is used to allow a user to change the IP address of an interface on a router? Router> R outer> Router# Router(config)# Router(config-if)# 10Refer to the exhibit. The interfaces of all routers are configured for OSPF area 0. R3 can ping R1, but the two routeestablish a neighbor adjacency. What should the network administrator do to troubleshoot this problem? Check if the interfaces of the routers are enabled. Check the hello and dead intervals between the routers. C heck the hello and dead intervals between the routers. Check the process ID of both routers. Check if CDP is enabled on all the routers. 11Refer to the exhibit. Which combination of IP address and subnet mask can be used on the serial interface of Route interface in the same network as the serial interface of Router1? IP 172.16.0.18, subnet mask 255.255.255.0 IP 172.16.32.15, subnet mask 255.255.255.240 I P 172.16.32.15, subnet mask 255.255.255.240 IP 172.16.0.18, subnet mask 255.255.255.252 IP 172.16.32.18, subnet mask 255.255.255.252 12Refer to the exhibit. A network engineer has run the show version command on R3. Upon rebooting, R3 does not load configuration settings. What could be the cause of this problem? There is insufficient NVRAM. There is insufficient flash memory. The configuration register is not configured with the default setting. The system image file is not located in NVRAM. 13Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will b routing table? 14Refer to the exhibit. Host A is having problems accessing server A. All routers have the same EIGRP configuration a What should be done so that host A can access server A? Add the command n ono auto-summary on all routers. Change the network statements to include a wildcard mask. Adjust the EIGRP hello timers to account for the network delay. Add the command e igrpeigrp log-neighbor-changes on all routers. 15Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is the routers in this topology will respond to this event? Router4 will learn about the failed route 30 seconds later in the next periodic update. Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expire Router5 immediately flushes the unreachable route from its routing table. Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0. 16A network administrator is in charge of two separate networks that share a single building. What device will be require networks and add a common connection to the Internet that can be shared? hub router access point Ethernet switch E thernet switch 17Refer to the exhibit. A network administrator has configured OSPF using the following command: network 192.168.1.32 0.0.0.31 area 0Which router interface will participate in OSPF? FastEthernet0/0 FastEthernet0/1 Serial0/0/0 Serial0/0/1 18Refer to the exhibit. R1 is configured properly for a single area OSPF, and R2 has been recently installed in the netcommands is required to configure a single area OSPF for the networks that are connected to R2? R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config)# router ospf 2R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 1R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.0.0.0 0.0.0.3 area 119Which two statements are true for link-state routing protocols? (Choose two.) Routers that run a link-state protocol can establish a complete topology of the network. Routers in a multipoint network that run a link-state protocol can exchange routing tables. Routers use only hop count for routing decisions. The shortest path first algorithm is used. Split horizon is used to avoid routing loops. 20Which candidate route has the longest match for a packet with a destination address of 10.30.16.48? 10.30.0.0/16 10.30.15.0/23 10.30.16.0/24 10.30.16.32/27 10.30.16.32/30 21Which statement is true about the RIPv1 protocol? It is a link-state routing protocol. It excludes subnet information from the routing updates. It uses the DUAL algorithm to insert backup routes into the topology table. It uses classless routing as the default method on the router. 22Which of the following are primary functions of a router? (Choose two.) packet switching microsegmentation domain name resolution path selection flow control 23Refer to the exhibit. Partial results of the show running-config and s how show ip route commands are displayed. Router B rec with a destination address of 10.16.1.97. What will router B do? drop the packet forward the packet via the route to 10.16.1.0 f orward the packet via the route to 10.16.1.64 forward the packet via the route to 10.16.1.64 use the default route 24 What are two ways that a router can learn of the paths to destination networks? (Choose two.) updates from other routers DHCP information broadcasts m anual configuration of routes manual configuration of routes ARP requests from connected routers inspection of the destination IP address in data packets updates from the SMTP management information base 25Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this? The IP address of host A is incorrect. The default gateway of host A is incorrect. The Fa0/1 interfaces of the two routers are configured for different subnets. T he Fa0/1 interfaces of the two routers are configured for different subnets. The subnet mask for the Fa0/0 interface of R1 is incorrect. 26A network administrator is analyzing routing update behavior on a network that has both EIGRP and OSPF configured protocols appear in the output of show ip protocols. However, only EIGRP internal routes appear in the routing tables. correctly explains the scenario? The OSPF protocol has a higher cost than EIGRP. T he OSPF protocol has a higher cost than EIGRPThe EIGRP protocol has a lower metric than OSPF. The EIGRP protocol was configured first on the router. The EIGRP protocol has a lower administrative distance than OSPF. 27Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are d are operational and pings are not blocked on this network. Which ping will fail? from R1 to 172.16.1.1 from R1 to 192.168.3.1 from R2 to 192.168.1.1 from R2 to 192.168.3.1 28Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two de this? (Choose two.) a CSU/DSU device a modem a n Ethernet switch an Ethernet switch a hub a bridge 29 In which situation would a default static route be recommended? when connecting an edge router to the Internet w hen variable length subnet masking is in effect when variable length subnet masking is in effect when there is more than one valid route for a destination network when a destination network has a larger mask than any routes in the routing table 30 Two routers need to be configured within a single OSPF area. Which two components need to be configured on boththis? (Choose two.) t he same process ID the same process ID the same area ID network addresses and wildcard masks the same router ID the same loop back address 231Refer to the exhibit. What is the meaning of the highlighted value 120? It is the metric that is calculated by the routing protocol. It is the value that is used by the DUAL algorithm to determine the bandwidth for the link. It is the administrative distance of the routing protocol. It is the hold-down time, measured in seconds, before the next update. 32Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database However, upon running the show ip route command, the network administrator sees that the router has installed a diff command, the network administrator sees that the router has installed a diffe 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route? Compared to RIP, EIGRP has a lower administrative distance. Compared to EIGRP , RIP has a higher metric value for the route. Compared to RIP , the EIGRP route has fewer hops. Compared to RIP , EIGRP has a faster update timer. 33 Which mechanism helps to avoid routing loops by advertising a metric of infinity? route poisoning split horizon hold-down timer triggered updates 34 A network administrator must use the subnet 172.16.128.0/18 to create 6 additional subnets each containing up to 20LANs. Which subnet mask should the administrator use to create the new subnets? 255.255.224.0 255.255.240.0 255.255.248.0 255.255.252.0 35 A technician configures the Fa0/0 interface on a router with ip address 192.168.3.5 255.255.255.252. What additional com. What additional com issued by the technician to activate the interface to forward traffic? Router(config-if)# exitRouter(config-if)# no shutdownRouter(config-if)# clock rateRouter# copy running-config startup-config36 Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a altered to accommodate a topology change? Keep the existing static route and configure a new static route with the correct next hop IP address. Negate the existing static route and configure a new static route with the correct next hop IP address. D o nothing. The existing static route will automatically update the next hop entry with the new IP address. Do nothing. The existing static route will automatically update the next hop entry with the new IP address. Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP a37Refer to the exhibit. What needs to be done to allow these two routers to connect successfully? Add a clock rate to S0/0/0 on R1. Add an interface description to S0/0/1 on R2. C hange the serial interface on R2 to S0/0/0 so that it matches R1. Change the serial interface on R2 to S0/0/0 so that it matches R1. Change the IP address of S0/0/1 on R2 so that it is in the same subnet as R1. 38Refer to the exhibit. The network administrator has run the following command on R1. R1(config)# ip route 192.168.2.0 255.255.255.0 172.16.1.2What is the result of running this command? Traffic for network 192.168.2.0 is forwarded to 172.16.1.2. This route is automatically propagated throughout the entire network. Traffic for all networks is forwarded to 172.16.1.2. The command invokes a dynamic routing protocol for 192.168.2.0. 39 Why is fast convergence desirable in networks that use dynamic routing protocols? Hosts are unable to access their gateway until the network is converged. Routers will not allow packets to be forwarded until the network is converged. Routers may make incorrect forwarding decisions until the network has converged. Routers will not allow configuration changes to be made until the network has converged. 40Refer to the exhibit. When all of the commands that are shown in the exhibit are entered at the correct router promp the router? name cisco router hostname 41Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (C10.0.0.0/8 64.100.0.0/16 128.107.0.0/16 172.16.40.0/24 192.168.1.0/24 192.168.2.0/24 42Refer to the exhibit. A router interface is configured with the command ip address 172.16.3.31 255.255.192.0. Which set o. Which set o values would allow a computer that is connected to the router interface to communicate with remote networks? A: 172.16.3.254 A: 172.16.3.254 B: 255.255.192.0 C: 172.16.3.31 A: 172.16.3.31 B: 255.255.192.0 C: 172.16.3.255 A: 172.16.3.254 B: 255.255.255.0 C: 172.16.3.31 A: 172.16.3.31 B: 255.255.255.0 C: 172.16.3.1 43Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through three.) The router modifies the TTL field, decrementing it by one. The router changes the source IP to the IP of the exit interface. The router maintains the same source and destination IP. The router changes the source physical address to the physical address of the exit interface. The router changes the destination IP to the IP of the exit interface. The router sends the packet out all other interfaces, besides the one it entered the router on. 44Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.) The route to network 172.16.0.0 has an AD of 156160. Network 192.168.0.16 can best be reached using FastEthernet0/0. The AD of EIGRP routes has been manually changed to a value other than the default value. Router1 is running both the EIGRP and OSPF routing process. Network 172.17.0.0 can only be reached using a default route. No default route has been configured. N o default route has been configured. 45Refer to the exhibit. Which route will be installed in the routing table on R1 to forward traffic from PC1 to the web s the static route the route learned via OSPF the route learned via EIGRP both routes learned via OSPF and EIGRP 46Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this r a password? The login command was not entered on the console line. The enable password should be an enable secret password. No username and password combination has been configured. Console connections cannot be configured to require users to provide passwords. 47Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network? ADC ABC It will load balance the traffic between ADC and ABC It will send the traffic via ABC, and will use ADC as a backup path only when ABC fails. 48A router learns about network 192.168.10.128/27 from multiple sources. Which option represents the best route and w routing table? S 192.168.10.128/27 [1/0] via 192.168.10.226 R 192.168.10.128/27 [120/2] via 192.168.10.226, 00:00:14, Serial0/0/0 O 192.168.10.128/27 [110/1563] via 192.168.10.226, 00:00:09, Serial0/0/0 D 192.168.10.128/27 [90/21026560] via 192.168.10.226, 00:00:16, Serial0/0/0 49Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly cothe routing table. What is the likely cause? The adjacent interfaces are passive. The distance of 120 exceeds 15 hops. R2 will not accept version 1 updates from R1. Routes are being summarized by R1 but not by R2. 50It is saved in the topology table for use if the primary route fails. It may be backed up by a feasible successor route. It is used by EIGRP to forward traffic to the destination. It is flagged as active in the routing table. After the discovery process has occurred, the successor route is stored in the neighbor table. 51Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem? An incorrect IP address is configured between the two routers. No static route is configured on Router2. A routing loop has occurred. No routing protocol is configured on either of the two routers. 52Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that inte FastEthernet0/1 is not functioning. Which action will most likely correct the problem with FastEthernet0/1? A clock rate should be added to the interface configuration. The subnet mask should be added to the interface configuration. An interface description needs to be added to the interface configuration. The no shutdown command needs to be added to the interface configuration. 。
思科第2学期答案
1下列哪两种网络设计功能需要生成树协议 (STP)来确保正确的网络操作?(请选择两项。
)静态默认路由实施 VLAN 以包含广播第 2 层交换机之间的冗余链路提供冗余路由的链路状态动态路由消除多个第 2 层交换机的单点故障答案 说明 最高分值correctness of response Option 3 and Option 5 are correct. 22第 2 层环路有什么特征?广播帧转发回发送方交换机。
帧的生存时间属性设置为无限。
路由器连续向其他路由器转发数据包。
交换机连续转发相同的单播帧。
答案 说明 最高分值correctness of response Option 123第 2 层广播风暴的结果是什么?交换机拥塞时,路由器将接管转发帧的角色。
新的流量将会被交换机因无法处理而丢弃。
CSMA/CD 将使每台主机继续传输帧。
ARP 广播请求返回发送方主机。
答案 说明 最高分值correctness of response Option 224哪种信息包含 BPDU 中的 12 位扩展系统 ID ?MAC 地址VLAN IDIP 地址端口 ID答案 说明 最高分值correctness of response Option 225下列哪三个部分可以组合形成网桥 ID ?端口IDIP 地址扩展系统IDMAC 地址网桥优先级开销答案说明最高分值 correctness ofresponse Option 3, Option 4, and Option 5 are correct.36哪个 STP 优先级配置可以确保交换机始终是根交换机?spanning-tree vlan 10 priority 0spanning-tree vlan 10 priority 61440spanning-tree vlan 10 root primaryspanning-tree vlan 10 priority 4096答案 说明 最高分值correctness of response Option 127下列哪种协议提供多达 16 个 RSTP 实例,能将具有相同物理和逻辑拓扑的多个 VLAN 结合为实例,并为 PortFast 、BPDU 防护和 BPDU 过滤、根防护和环路防护提供支持?STP快速PVST+PVST+ MST答案 说明 最高分值correctness of response Option 428由于假设整个桥接网络中只有一个生成树实例,哪两种生成树协议可能导致不理想的数据流?项。
思科网络课件计算机网络双语教程第八章
Physical Layer Signaling and Encoding
Describe the role of encoding as it applies to the transmission of bits and explain the value of treating a collection of bits as a code.
Identify types of safety issues when working with copper cabling
Charact eristics & Uses of Networ k Media
Identify several primary characteristics of fiber cabling and its main advantages over other media
Identify hardware components associated with the Physical layer that are governed by standards
Physical Layer Signaling and Encoding
1
Explain that network communication at this layer consists of individual bits encoded onto the Physical layer and describe the basic encoding techniques.
Summary
单击添加副标题
感谢您的 欣赏
202X CIICK HERE TO ADD A TITLE
- Describe the role of signals used to represent bits as a frame as the frame is transported across the local media
CISCO第二学期期末考试答案
客户向ISP 技术人员反映连通性问题。
技术人员就相关问题询问客户之后,发现除了FTP 外,所有网络应用程序都正常。
技术人员怀疑出现了什么问题?防火墙配置有误/ 交换机或集线器端口损坏)/I n t e r n e t服务器将把数据发送至客户端端口8547。
/ 端口过滤和访问列表通过什么方式来增强网络安全?防止特定类型的通信到达特定网络主机。
/遭受各类拒绝服务攻击时提醒网络管理员。
防止病毒、蠕虫和特洛伊木马感染主机计算机和服务器。
可对机密数据通信进行加密和身份认证。
某黑客尝试获取存储在公司网络内部某台服务器上的机密信息。
网络安全解决方案检测完整的数据包,确定这是一个威胁,所以阻止该数据包进入内部网络。
这一过程中哪项安全措施保护了网络?IDSIPS /基于主机的防火墙此命令是从哪一台路由器执行的?ABC /D请参见图示。
网络管理员使用以下命令在RTB 上配置了一条默认路由:RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0PC3 可以成功ping 通RTB。
但是当从PC3 发出的回应请求数据包到达PC1 后,却没有应答返回PC3。
怎样解决此问题?必须对RTA 进行配置,使其可以将数据包转发至192.168.2.0 网络。
需要修改ip route 命令,以便将下一跳地址设置为10.1.1.5。
/OSPFEIGRPRIPBGP /下列关于FTP 协议被动数据连接的说法中哪一项正确?服务器发起数据传输连接。
服务器将其IP 地址和一个随机端口号通过控制流转发给FTP 客户端。
/防火墙不会允许与网络内的主机进行被动数据连接。
客户端将数据转发至服务器的端口21。
下列关于反向查找DNS 区域的说法中哪一项正确?将会降低网络速度。
可对传输中的数据进行加密。
当路由协议交换有关直连网络的信息时,哪种路由将自动添加到邻居路由器的路由表中?动态路由/静态路由默认路由直连路由哪项网络地址和子网掩码的组合可使每个子网连接62 台主机?网络地址10.1.1.4 子网掩码255.255.255.240网络地址10.1.1.0 子网掩码255.255.255.252网络地址10.1.1.0 子网掩码255.255.255.192 /是一种可靠的传输协议。
思科CCNA1第八章试题及答案英文版
1. 1. QuestionWhat is a result of connecting two or more switches together?o The number of broadcast domains is increased.o The size of the broadcast domain is increased.o The number of collision domains is reduced.o The size of the collision domain is increased.2. 2. QuestionRefer to the exhibit. How many broadcast domains are there?CCNA1 v6.0 Chapter 8 Exam 005o 1o 2o 3o43. 3. QuestionWhat are two reasons a network administrator might want to create subnets?(Choose two.)o simplifies network designo improves network performanceo easier to implement security policieso reduction in number of routers neededo reduction in number of switches needed4. 4. QuestionRefer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?CCNA1 v6.0 Chapter 8 Exam 007o 255.255.255.0o 255.255.255.128o 255.255.255.192o 255.255.255.224o 255.255.255.2405. 5. QuestionRefer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has beensubnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the newnetwork (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?CCNA1 v6.0 Chapter 8 Exam 004o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46o IP address: 192.168.10.254 subnet mask: 255.255.255.0, defaultgateway: 192.168.10.16. 6. QuestionIf a network device has a mask of /28, how many IP addresses are available for hosts on this network?o 256o 254o 62o 32o 16o 147. 7. QuestionWhich subnet mask would be used if 5 host bits are available?o 255.255.255.0o 255.255.255.128o 255.255.255.224o 255.255.255.2408. 8. QuestionHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?o 510o 512o1022o 1024o 2046o 20489. 9. QuestionHow many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?o twoo threeo fouro five10. 10. QuestionA network administrator wants to have the same network mask for allnetworks at a particular small site. The site has the following networks and number of devices:IP phones – 22 addressesPCs – 20 addresses neededPrinters – 2 addresses neededScanners – 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?o 255.255.255.0o 255.255.255.192o 255.255.255.224o 255.255.255.240o 255.255.255.248o 255.255.255.25211. 11. QuestionA company has a network address of 192.168.1.64 with a subnet mask of255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks wouldachieve that? (Choose two.)o 192.168.1.16/28o 192.168.1.64/27o 192.168.1.128/27o 192.168.1.96/28o 192.168.1.192/2812. 12. QuestionA network administrator is variably subnetting a network. The smallestsubnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?o 4o 6o 8o 10o 1213. 13. QuestionRefer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?CCNA1 v6.0 Chapter 8 Exam 001o 56o 60o 64o 68o7214. 14. QuestionRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?CCNA1 v6.0 Chapter 8 Exam 002o 10.16.10.160/26o 10.16.10.128/28o 10.16.10.64/27o 10.16.10.224/26o 10.16.10.240/27o 10.16.10.240/2815. 15. QuestionA network administrator needs to monitor network traffic to and fromservers in a data center. Which features of an IP addressing scheme should be applied to these devices?o random static addresses to improve securityo addresses from different subnets for redundancyo predictable static IP addresses for easier identificationo dynamic addresses to reduce the probability of duplicate addresses 16. 16. QuestionWhich two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)o It eliminates most address configuration errors.o It ensures that addresses are only applied to devices that require apermanent address.o It guarantees that every device that needs an address will get one.o It provides an address only to devices that are authorized to be connected to the network.o It reduces the burden on network support staff.17. 17. QuestionA DHCP server is used to assign IP addresses dynamically to the hosts on anetwork. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?o 254o251o 252o 25318. 18. QuestionRefer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the s ite subsection to represent multiple geographical sites of the company, the s ub-site section to represent multiple campuses at each site, and thes ubnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achievedper sub-site?CCNA1 v6.0 Chapter 8 Exam 003o 0o 4o16o 25619. 19. QuestionWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?o 2001:DB8:BC15o 2001:DB8:BC15:Ao 2001:DB8:BC15:A:1o 2001:DB8:BC15:A:1220. 20. QuestionConsider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is /6021. 21. QuestionMatch the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 0122. 22. QuestionRefer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 006。
思科ITE章考试原题及答案图文稿
思科ITE章考试原题及答案图文稿思科I T E章考试原题及答案集团文件版本号:(M928-T898-M248-WU2669-I2896-DQ586-M1988)清洁计算机内部可以减少以下哪种负面环境因素?灰尘在清洁计算机机箱内部时,直接喷射压缩空气容易损坏下列哪种组件?风扇在生产车间,一个家具工厂用笔记本电脑来实现进程监控和报告。
生产车间的环境温度大约为27 摄氏度(80 华氏度)。
湿度相当高,大约为70%。
风扇安装在通风口顶部。
这里的木屑灰尘非常多。
以下哪个条件最可能对在这一环境中使用的笔记本电脑产生不利影响?灰尘蔬菜罐头工厂使用笔记本电脑来监控生产线。
生产环境的环境温度大约是 24 摄氏度(75 华氏度)。
湿度约为 30%。
由于装罐设备的使用,因此噪音很高。
笔记本电脑放在一个木箱中,木箱三面距离笔记本电脑较近。
以下哪个因素最可能对在这一环境中使用的笔记本电脑产生不利影响?放置笔记本电脑的木箱科考队正在用笔记本电脑工作。
科学家们工作地点的温度范围为 -13 华氏度(-25 摄氏度)到 80 华氏度(27 摄氏度)。
湿度约为 40%。
噪声水平较低,但地形崎岖,风速可达每小时 45 英里(每小时 72 公里)。
在需要时,科学家们会停下脚步,用笔记本电脑输入数据。
下列哪一项条件最有可能对于在此环境下使用的笔记本电脑造成负面影响?温度以下哪一项是制定预防性维护计划的一部分?记录每项维护任务的详细信息和频率技术人员正在施工现场执行 PC 硬件维护。
作为预防性维护计划的一部分,技术人员应该执行什么任务?进气风扇除尘。
以下哪项任务应作为硬件维护例行程序的一部分?检查并固定任何松动的电缆。
在测试导致某个问题的若干可能原因时,应该首先测试哪类原因?最容易最明显的原因在解决计算机问题时可以使用下列哪两项物品来帮助制定行动计划(选择两项。
)计算机手册计算机维修历史记录日志为客户排除计算机故障之前应该备份哪两类数据(选择两项。
思科网络第二学期Final考试及答案
思科网络第二学期Final考试及答案思科网络第二学期Final考试及答案1.请参见图示。
对于发往 192.168.2.0的数据包,R2会采取什么操作?它会丢弃数据包。
2.请参见图示。
R1会使用哪一总结地址来向 R2通告其网络?192.168.0.0/223.请参见图示。
尽管R2已配置正确,但主机A还是无法访问Internet。
可以在R1上配置哪两条可让主机A访问Internet的静态路由?(选择两项。
ip route 0.0.0.0 0.0.0.0 Fa0/1ip route 0.0.0.0 0.0.0.0 10.1.1.24.请参见图示。
网络管理员已按图示配置了R1,并且所有接口都运作正常。
但从R1 ping 172.16.1.1时失败。
造成此问题的原因可能是什么?默认路由配置有误。
5.请参见图示。
所有接口都已编址,并且运行正常。
网络管理员在主机A上运行了tracert命令。
得到这种输出的原因可能是什么?(选择两项。
)R2的路由表中缺少 192.168.1.0/24的条目。
R1的路由表中缺少 192.168.2.0/24的条目。
6.请参见图示。
从主机 A到主机 B的 ping成功,但从主机 A ping 在Internet上正常运行的主机却失败了。
此问题的原因是什么?未在这两台路由器上配置路由协议。
7.网络管理员使用 RIP路由协议在一个自治系统内实施路由。
下列哪两项是该协议的特征?(选择两项。
使用贝尔曼-福特算法确定最佳路径。
定期将完整的路由表发送给所有连接的设备。
8.请参见图示。
两台路由器无法建立相邻关系。
此问题的原因可能是什么?这两台路由器上的 hello间隔和 dead间隔不同9.在两台路由器能够使用 OSPF形成邻居邻接关系之前必须完成哪两项任务?(选择两项。
)路由器必须在网络类型方面达成一致。
路由器必须使用相同的 dead时间间隔。
10.下列关于链路状态路由协议的陈述,哪两项是正确的?(选择两项。
最新思科第二学期第八章答案
1.请参见图示。
从该图的输出中可以确定什么?该路由器需要执行递归查找才能转发目的地为192.168.2.213/24 的数据包。
这些网络的父路由已从路由表中删除。
到192.168.0.0/25 的路由将被分类为路由表中所列路由的超网路由。
所列出的所有路由都是网络路由2.请参见图示。
JAX 路由器正在处理目的地为主机128.107.0.5/16 的数据包。
在路由表中搜索匹配此数据包目的网络的静态路由之后,路由器下一步将做什么?搜索默认路由以转发此数据包丢弃此数据包,因为该静态路由没有送出接口执行递归查找以找出用于转发此数据包的送出接口请求邻居路由器告知128.107.0.0 网络的位置3.请参见图示。
当在Router1 上配置了图中的三个子网时,哪个父网络将自动包含到路由表中?172.16.0.0/16172.16.0.0/24172.16.0.0/30172.16.1.0/16172.16.1.0/244.路由表中显示以下条目:R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1这是哪种类型的路由?1 级父路由1 级超网路由1 级最终网络路由2 级子路由2 级最终子路由5.请参见图示。
Router1 正在运行IOS 第12.2 版。
网络管理员需要做什么工作才能确保发往172.16.0.0/24 未知子路由的数据包不会被丢弃?使用ip default-network命令使用RIPv1 之类的有类路由协议启用OSPF 或ISIS 作为路由协议使用ip classless命令什么都不用做,默认会启用ip classless6.请参见图示。
路由器B 接收到目的地址为10.16.1.97 的数据包。
路由器B 将会做什么?丢弃数据包使用默认路由通过到10.16.1.0 的路由转发该数据包通过到10.16.1.64 的路由转发该数据包7.请参见图示。
cisco packet tracer 答案
不添加地址。 添加逻辑地址。 添加物理地址。 添加进程的端口号。
20. TCP/IP 网络接入层有何作用?
选择两项任何站点在发送另一帧前必须等待的最短时间间隔以比特时间为测量单位任何站点在发送另一帧前必须等待的最长时间间隔以比特时间为测量单位插入帧中的96位负载填充位用于使其达到合法的帧大小帧之间传输的96位帧填充位用于实现正确同步可以让速度较慢的站点处理帧并准备下一帧的时间站点在发送另一帧前不得超过的最长时间间隔否则将视其为无法到达采用csmacd的网络中发生冲突时需要传输数据的主机在回退时间到期后做何反应
分组交换 网段扩展 广播域分段 根据逻辑编址选择最佳路径 根据物理编址选择最佳路径
8. 当路由器收到从一个网络发往另一个网络的数据包时,它会执行哪三个过程?(选择三项。)
通过解开第 2 层帧报头来解封第 3 层数据包 通过 IP 报头中的目的 MAC 地址在路由表中查找下一跳地址 解封第 3 层数据包时将第 2 层帧报头保持原样 通过 IP 报头中的目的 IP 地址在路由表中查找下一跳地址 将第 3 层数据包封装成新的第 2 层帧,并将该帧从送出接口转发出去 将第 3 层数据包封装成特殊的第 1 层帧,并将该帧转发到送出接口
第 3/84页
12.
请参见图示。从图中的路由表输出可得出什么结论?(选择两项。) 此路由器只有两个接口。 路由器接口尚未进入工作状态。 此路由器配置为将数据包转发到远程网络。 此路由器的 FastEthernet0/0 接口和 Serial0/0/0 接口配置了 IP 地址和 no shutdown 命令。 路由器收到的目的地址为 198.18.9.1 的 IP 数据包后,将从 Serial0/0/0 接口转发出去。
思科 cisco 课后习题答案
分界点:
19. 调制解调器: 语音调制解调器将计算机生成的数字信号转换为可通过公共电话网络的模拟线路传输的语音 频率; 速度越快的调制解调器(如有线电视调制解调器和 DSL 调制解调器)在传输时使用的带宽频 率也越高。 CSU/DSU: 数字线路(如 T1 或 T3 线路)需要信道服务单元(CSU)和数据服务单元(DSU) ; 这两者经常合并到一台设备中,名为 CSU/DSU; CSU 端接数字信号, 并通过纠错和线路监视确保连接的完整性; DSU 在 T 载波线路帧和 LAN 能够解释的帧之间进行转换。 接入服务器: 集中处理拨入和拨出用户通信。接入服务器可同时有模拟和数字接口,能够同时支持数百名 用户。 WAN 交换机: 运营商网络中使用的多端口互连设备。这些设备通常交换帧中继、ATM 或 X.25 等数据流。 路由器: 提供用于连接服务提供商网络的网络互联接口和 WAN 接入接口。 这些接口可以是串行接口或其他 WAN 接口。有些类型的 WAN 接口需要通过 DSU/CSU 或调制 解调器(模拟、有线电视或 DSL)等外部设备将路由器连接到服务提供商。 20. X.25: 一种低带宽的老式 WAN 技术,最大速度为 48kbit/s,读卡器通常使用拨号模式 X.25 向中央 计算机验证事务; 对这些应用来说,低带宽和高延时并不是问题,而低成本让 X.25 成为众家之选; 很多服务提供商已使用帧中继代替 X.25。 一种第 2 层 WAN 协议,通常提供 4Mbit/s 或更高的数据速度; 使用虚电路提供永久、共享的中等带宽连接,可同时传输语音和数据; VC 由 DLCI 唯一标识,这确保两台 DTE 设备之间能够进行双向通信。 异步传输模式(ATM)技术是一种基于信元而不是帧的架构,使用 53 字节的定长信元; 这些小型定长信元非常适合传输对延迟敏感的语音和视频数据流。
大二思科考试题库和答案
大二思科考试题库和答案一、单项选择题(每题2分,共20分)1. 思科公司(Cisco)成立于哪一年?A. 1984年B. 1990年C. 1995年D. 2000年答案:A2. 以下哪个协议是用于在IP网络中传输数据的?A. HTTPB. FTPC. TCPD. IP答案:D3. 在OSI模型中,哪一层负责建立、维护和终止通信会话?A. 应用层B. 传输层C. 会话层D. 网络层答案:C4. 以下哪个设备不是网络交换机?A. Layer 2 SwitchB. Layer 3 SwitchC. RouterD. Hub答案:D5. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show interfaceD. show ip interface brief答案:A6. 在Cisco设备上,哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. write memory答案:A7. 以下哪个命令用于在Cisco设备上创建一个新的VLAN?A. vlan databaseB. configure terminalC. enableD. show vlan答案:A8. 以下哪个命令用于在Cisco设备上将接口配置为Trunk模式?A. switchport mode accessB. switchport mode dynamicC. switchport mode trunkD. switchport mode static答案:C9. 以下哪个协议用于在IP网络中自动分配IP地址?A. DHCPB. DNSC. FTPD. HTTP答案:A10. 在Cisco设备上,哪个命令用于查看设备的接口状态?A. show interfacesB. show ip interface briefC. show running-configD. show vlan答案:B二、多项选择题(每题3分,共15分)11. 以下哪些协议属于TCP/IP模型的应用层协议?A. HTTPB. FTPC. SNMPD. IP答案:A, B, C12. 在Cisco设备上,以下哪些命令用于配置接口?A. interfaceB. ip addressC. no shutdownD. enable答案:A, B, C13. 以下哪些设备可以作为网络的核心设备?A. SwitchB. RouterC. FirewallD. Hub答案:A, B14. 以下哪些命令用于在Cisco设备上查看网络信息?A. show ip routeB. show running-configC. show interfaceD. ping答案:A, C, D15. 以下哪些因素可以影响网络的性能?A. 带宽B. 延迟C. 丢包率D. 网络拓扑结构答案:A, B, C, D三、填空题(每题2分,共20分)16. 在Cisco设备上,使用________命令可以进入特权模式。
思科CCNA考试答案(全)
CCNA思科考试答案(全)第 1 章考试1一家拥有10 名员工的小型公司使用单个LAN 在计算机之间共享信息。
哪种类型连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如DSL)答案:4解析:对于这种小型办公室,比较适合通过被称为数字用户线路(DSL) 的常见宽带服务实现Internet 连接,这种服务由当地的电话服务提供商提供。
由于员工人数很少,带宽的问题并不突出。
如果公司较大,在远程站点有分支机构,则专用线路会更加适合。
如果公司员工需要通过Internet 与公司联系,则采用虚拟专用网。
2哪种网络情况需要使用WAN?员工工作站需要获取动态分配的IP 地址。
员工在出差时需要通过VPN 连接到公司电子邮件服务器。
分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。
员工需要访问托管在其建筑物内DMZ 中的公司Web 服务器上的网页。
答案:2解析:当出差的员工需要通过WAN 连接到公司电子邮件服务器时,VPN 将通过WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。
通过DHCP 获取动态IP 地址是LAN 通信的功能。
在企业园区的不同建筑物之间共享文件可通过LAN 基础设施来实现。
DMZ 是企业LAN 基础设施内一个受保护的网络。
3以下哪项描述了WAN 的特征?WAN 和LAN 在同一地理范围内运行,但有串行链路。
WAN 网络归运营商所有。
所有串行链路均被视为WAN 连接。
WAN 可提供到园区主干网的终端用户网络连接。
答案:2解析:WAN 可用于将企业LAN 互连到远程分支机构站点LAN 和远程工作人员站点。
WAN 归运营商所有。
虽然WAN 连接一般通过串行接口实现,但并不是所有串行链路均连接至WAN。
LAN(而非WAN)可在组织中提供终端用户网络连接。
4电路交换WAN 技术的两个常见类型是什么?(请选择两项。
思科第一学期第8章测试答案
1 Which type of cable run is most often associated with fiber-optic cable?**backbone cablehorizontal cablepatch cablework area cable2 In most business LANs, which connector is used with twisted-pair networking cable?BNCRJ-11**RJ-45Type F3 When is a straight-through cable used in a network?when connecting a router through the console portwhen connecting one switch to another switch**when connecting a host to a switchwhen connecting a router to another router4 With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?**the magnetic field around the adjacent pairs of wirethe use of braided wire to shield the adjacent wire pairsthe reflection of the electrical wave back from the far end of the cablethe collision caused by two nodes trying to use the media simultaneously5 Which OSI layer is responsible for binary transmission, cable specification, and physical aspects of network communication?PresentationTransportData Link**Physical6 An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device?light injector**OTDRTDRmultimeter7 XYZ Company is installing new cable runs on their data network. What two types of cable would most commonly be used for new runs? (Choose two.)coaxCat4 UTP**Cat5 UTP**Cat6 UTPSTP8 What is a possible effect of improperly applying a connector to a network cable? Data will be forwarded to the wrong node.**Data transmitted through that cable may experience signal loss.An improper signaling method will be implemented for data transmitted on that cable.The encoding method for data sent on that cable will change to compensate for the improper connection.9 What are three measures of data transfer? (Choose three.)**goodputfrequencyamplitude**throughputcrosstalk**bandwidth10Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?coax cablerollover cable**crossover cablestraight-through cable11 In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling?coax**fiberCat5e UTPCat6 UTPSTP12 Which fiber connector supports full duplex Ethernet?13 Which method of signal transmission uses radio waves to carry signals? electricaloptical**wirelessacoustic14 Which characteristics describe fiber optic cable? (Choose two.)**It is not affected by EMI or RFI.Each pair of cables is wrapped in metallic foil.It combines the technique of cancellation, shielding and twisting to protect data. It has a maximum speed of 100 Mbps.**It is the most expensive type of LAN cabling.15 Which of the following is a characteristic of single-mode fiber-optic cable? generally uses LEDs as the light sourcerelatively larger core with multiple light pathsless expensive than multimode**generally uses lasers as the light source16 What is considered a benefit of wireless as a media choice?**more host mobilitylower security risksreduced susceptibility to interferenceless impact of the surroundings on the effective coverage area17 What characteristic of UTP cable helps reduce the effects of interference?the metal braiding in the shieldingthe reflective cladding around core**the twisting of the wires in the cablethe insulating material in the outer jacket18 What is a primary role of the Physical layer in transmitting data on the network? **create the signals that represent the bits in each frame on to the mediaprovide physical addressing to the devicesdetermine the path packets take through the networkcontrol data access to the media。
思科ITE章考试原题及答案图文稿
思科I T E章考试原题及答案集团文件版本号:(M928-T898-M248-WU2669-I2896-DQ586-M1988)清洁计算机内部可以减少以下哪种负面环境因素?灰尘在清洁计算机机箱内部时,直接喷射压缩空气容易损坏下列哪种组件?风扇在生产车间,一个家具工厂用笔记本电脑来实现进程监控和报告。
生产车间的环境温度大约为 27 摄氏度(80 华氏度)。
湿度相当高,大约为70%。
风扇安装在通风口顶部。
这里的木屑灰尘非常多。
以下哪个条件最可能对在这一环境中使用的笔记本电脑产生不利影响?灰尘蔬菜罐头工厂使用笔记本电脑来监控生产线。
生产环境的环境温度大约是 24 摄氏度(75 华氏度)。
湿度约为 30%。
由于装罐设备的使用,因此噪音很高。
笔记本电脑放在一个木箱中,木箱三面距离笔记本电脑较近。
以下哪个因素最可能对在这一环境中使用的笔记本电脑产生不利影响?放置笔记本电脑的木箱科考队正在用笔记本电脑工作。
科学家们工作地点的温度范围为 -13 华氏度(-25 摄氏度)到 80 华氏度(27 摄氏度)。
湿度约为 40%。
噪声水平较低,但地形崎岖,风速可达每小时 45 英里(每小时 72 公里)。
在需要时,科学家们会停下脚步,用笔记本电脑输入数据。
下列哪一项条件最有可能对于在此环境下使用的笔记本电脑造成负面影响?温度以下哪一项是制定预防性维护计划的一部分?记录每项维护任务的详细信息和频率技术人员正在施工现场执行 PC 硬件维护。
作为预防性维护计划的一部分,技术人员应该执行什么任务?进气风扇除尘。
以下哪项任务应作为硬件维护例行程序的一部分?检查并固定任何松动的电缆。
在测试导致某个问题的若干可能原因时,应该首先测试哪类原因?最容易最明显的原因在解决计算机问题时可以使用下列哪两项物品来帮助制定行动计划(选择两项。
)计算机手册计算机维修历史记录日志为客户排除计算机故障之前应该备份哪两类数据(选择两项。
)Internet Explorer 收藏夹文件客户创建的文档一位客户反映最近有几个文件无法访问。
思科答案
ESwitching F.一台新交换机将加入远程办公室的现有网络。
网络管理员希望远程办公室的技术人员无法将新VLAN 添加到该交换机,但又希望交换机接收来自VTP 域的VLAN 更新。
要满足这些条件,必须在新交换机上执行哪两个VTP 配置步骤?(选择两项。
)1.在新交换机上配置IP 地址。
2.在新交换机上配置现有VTP 域名。
3.将两台交换机的所有端口都配置为接入模式。
4.将新交换机配置为VTP 客户端。
5.启用VTP 修剪。
2.下列关于无线基础架构组件的说法中哪两项正确?(选择两项。
)1.AP 将TCP/IP 数据包从802.11 帧封装格式转换为802.3 以太网帧格式(有线以太网络中)。
2.无线AP 不需要任何物理连接即可让无线客户端接入Internet。
3.AP 与交换机类似,是第2 层设备,为相连的每台无线主机提供专用带宽。
4.无线网卡和AP 之间不会发生冲突。
5.无线路由器兼具AP 和路由器的作用。
3.将Linksys 集成路由器上的安全模式设置为WEP 有什么作用?1.WEP 可标识无线LAN。
2.WEP 允许该接入点通知客户端它的存在。
3.WEP 将IP 地址转换为容易记忆的域名。
4.WEP 可加密无线客户端与接入点之间的数据。
5.WEP 可确保只有授权用户可以访问该WLAN。
6.WEP 将一个或一组内部地址转换为外部公有地址。
4.将路由器配置为SSH 服务器时,发出crypto key generate rsa 命令之前应先配置什么?1安全的域名2.VTP 域名3.IP 域名4.主机名5.VLAN 中继有何用途?1.通过减少广播流量提高网络性能。
2.选择在交换网络中传输数据的最佳路径。
3.通过一条链路传送多个VLAN 的流量。
4.避免交换网络中出现生成树环路。
2下列哪种说法正确描述了生成树路径开销?根据环路中连接的交换机总数计算。
根据给定路径上所有交换机的使用率计算。
根据给定路径上交换机的网桥优先级计算。
思科_第二学期_答案_1-4章
1请参见图示。
下列哪组设备仅包含中间设备?A、B、D、GA、B、E、FC、D、G、IG、H、I、J2您所在的网际网络发生了路由问题。
要鉴别此错误,应该检查以下哪种类型的设备?接入点主机集线器路由器交换机3请参见图示。
技术人员正在处理网络问题,需要验证路由器的LAN 接口。
要确认路由器接口工作正常,应该从此主机ping 哪个地址?127.0.0.1192.168.64.196192.168.254.1192.168.254.9192.168.254.2544下列哪三项陈述说明了传输层协议的特征?(选择三项)应用层协议使用TCP 端口号和UDP 端口号。
TCP 使用端口号提供可靠的IP 数据包传输。
UDP 使用窗口和确认获得可靠的数据传输。
TCP 使用窗口和定序提供可靠的数据传输。
TCP 是面向连接的协议。
UDP 是无连接协议。
5OSI 模型的哪两项功能在第2 层实现?(选择两项)物理编址编码路由布线介质访问控制6由于发生安全规规事件,必须更改路由器口令。
从以下配置项可获知什么信息?(选择两项。
)Router(config)#line vty 0 3Router(config-line)# password c13c0Router(config-line)#login这些配置项对远程访问指定了三条Telnet 线路。
这些配置项对远程访问指定了四条Telnet 线路。
这些配置项将控制台口令和Telnet 口令设置为"c13c0"。
因为Telnet 配置不完整,所以Telnet 访问将遭到拒绝。
允许使用"c13c0" 作为口令访问Telnet。
7请参见图示。
电缆1 和电缆2 的两端分别按照特定的物理层要求接线。
表中按编号列出了每个网段以及网络技术人员在该网段不同网络组件之间已经安装的电缆。
根据给定的数据回答,哪些网段的电缆安装正确?(选择三项)网段1网段2网段3网段4网段58下列哪种提示符代表适合copy running-config startup-config命令使用的模式?Switch-6J>Switch-6J#Switch-6J(config)#Switch-6J(config-if)#Switch-6J(config-line)#9请参见图示。
思科网络课件计算机网络双语教程第八章
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
3
Physical Layer Protocols & Services
▪ Describe the role of bits in representing a frame as it is transported across the local media.
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
10
Characteristics & Uses of Network Media
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
4
Physical Layer Protocols & Services
▪ Describe the role of signaling in the physical media.
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
8
Physical Layer Signaling and Encoding
▪ Describe the role of encoding as it applies to the transmission of bits and explain the value of treating a collection of bits as a code.
思科第一学期第八章试题+答案
1为了让广告通过即时消息或电子邮件发送给尽可能多的用户,哪种互联网营销方法最为广泛使用?暴力攻击垃圾邮件间谍软件跟踪 cookie2安全策略在哪一部分规定了允许或拒绝的应用程序和用途?标识和身份验证远程访问可接受的使用事件处理3某用户上网时,屏幕上弹出一对话框声称其中奖。
该用户打开这个对话框后,计算机就被暗中安装了一个者现在可以访问该计算机并且检索到此用户的个人信息。
这是一种什么类型的攻击?蠕虫病毒特洛伊木马拒绝服务4Linksys 集成路由器的无线接入点部分连接到网络的哪一部分?DMZ外部内部除有线网络以外的其它网络5选择在社会工程攻击中使用的三种方法。
(选择三项。
)钓鱼语音网络钓鱼网络钓鱼滥发假托垃圾邮件6双防火墙网络设计最适合于哪种环境?大型企业环境包含 10 台或更少主机的家庭环境需要安全 VPN 访问的家庭环境遭到持续 DDoS 攻击的小型企业环境7蠕虫的主要特征是什么?不断在其它可执行程序中自我复制的一种恶意软件诱骗用户运行感染病毒的软件出现特定事件时才会被触发的一组计算机指令利用漏洞在网络中自我传播8哪个缩写词表示可同时供内部(即受信任的)设备以及外部(即不受信任的)设备访问的网络区域?SPIDMZISRISP9下列关于反病毒软件的陈述,哪一个是正确的?只有电子邮件程序需要保护。
只有硬盘可以保护。
只有在知道病毒后才能针对它创建反病毒更新。
只有直接连接 Internet 的计算机才需要安装反病毒软件。
10在网络假托过程中,行骗者通常采用什么方式联系目标?通过电子邮件通过电话亲身通过他人11下列哪个术语用于描述提供防火墙服务的专用硬件设备?基于服务器集成式个人基于设备12下列关于 Linksys 集成路由器中端口转发的陈述,哪一项是正确的?仅允许外网到特定内网端口的通信,其它通信均会被拒绝。
仅拒绝外网到特定内网端口的通信,其它通信均允许。
仅允许内网到特定外网端口的通信,其它通信均会被拒绝。
思科第二学期第八单元
1 在远程管理路由器方面,SSH 较之Telnet 具有什么优点?A加密使用TCP授权使用六条VTY 线路的连接2 SNMP 网络代理使用哪种通信机制向网络管理站提供重要但未经请求的信息?D查询广播ICMP ping陷阱轮询3 下列哪一术语用于边界路由器与防火墙之间的公共网络?C“清洁的”LAN内部网DMZ外联网4 在技术人员升级服务器之前,必须备份所有数据。
为确保所有数据都得到备份,必须使用哪种备份类型?C每天备份差异备份完全备份增量备份部分备份5 一家公司想配置防火墙监控所有通信通道,同时只允许属于已知连接的流量通过。
应部署哪种防火墙配包过滤代理状态包侦测无状态包侦测6 哪三个协议描述了可用于保护数据在Internet 中传输的安全方法?(选择三项。
)BCDSMTPIPSECSSLHTTPSFTPTFTP7 哪种网络层安全协议可用于保护通信所用的任何应用层协议?DHTTPSIMAPFTPSIPSECTLS8 syslog 客户端生成并转发到syslog 服务器的日志消息中通常包含哪三个项目?(选择三项。
)ABD消息的日期和时间发送设备的ID消息的长度消息ID校验和字段社区ID9 AAA 的哪个部分用于向网络资源用户分配不同的权限?C审计授权访问控制身份认证确认10 网络管理员要使用最小权限的原则为几组新用户分配网络权限。
该管理员应采取哪两项措施?(选择两项。
)AB仅提供给用户访问工作所需资源的权限。
提供给用户工作所需的最小的权限级别。
限制用户所有的权限,然后按照用户要求分配权限。
让用户决定完成工作任务需要多少权限。
对用户开放所有权限,然后逐渐加以限制。
11 某个黑客已获取访问敏感网络文件的权限。
通过对此攻击进行分析,发现该黑客通过网络的无线部分获取了访问权限。
进一步分析后发现该无线网络上仅设置有一个安全措施,就是MAC 地址过滤。
该黑客很可能是怎样获取网络访问权限的?B黑客使用软件工具破解了共享的十六进制密钥。
思科章节练习第二章到第七章试题及答案
思科章节练习第二章到第七章试题及答案第二章1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项) (135) 确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点2.请选择关于网络协议的正确陈述。
(选择三项。
135)定义特定层 PDU 的结构规定实现协议层功能的方式概述层与层之间通信所需的功能限制了对硬件兼容性的需要需要取决于协议层的封装过程杜绝厂商之间的标准化3.封装的两个功能是什么?(45选择两项)跟踪终端设备之间的延迟为通信提供统一的网络路径在传输前可以修改原始数据标识属于同一通信的数据片段确保数据片段可以转发到正确的接收端设备4.数据链路层封装添加的报尾信息有何主要功能?1支持差错校验确保数据按照顺序到达确保送达正确目的标识本地网络中的设备帮助中间设备进行处理和路径选择5.OSI 模型哪两层的功能与 TCP/IP 模型的网络接入层相同?(选择两项34)网络层传输层物理层数据链路层会话层6.什么是 PDU?4传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装7.以下哪种特征正确代表了网络中的终端设备? 2管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径8.IP 地址为 10.0.0.34 的“手机A”已经与 IP 地址为 172.16.1.103 的“IP 电话1”建立了 IP 会话。
请根据图示回答,下列哪个设备类型是对无线设备“手机A”功能的最准确描述? 2目的设备终端设备中间设备介质设备9.下列哪三个标签正确标识了图示网段的网络类型?(236选择三项)网络 A -- WAN网络 B -- WAN网络 C -- LAN网络 B -- MAN网络 C -- WAN网络 A -- LAN10.下列哪三项陈述是对局域网 (LAN) 最准确的描述?(选择三项125)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1.
请参见图示。
从该图的输出中可以确定什么?
该路由器需要执行递归查找才能转发目的地为的数据包。
这些网络的父路由已从路由表中删除。
到的路由将被分类为路由表中所列路由的超网路由。
所列出的所有路由都是网络路由
2.
请参见图示。
JAX 路由器正在处理目的地为主机的数据包。
在路由表中搜索匹配此数据包目的网络的静态路由之后,路由器下一步将做什么?
搜索默认路由以转发此数据包
丢弃此数据包,因为该静态路由没有送出接口
执行递归查找以找出用于转发此数据包的送出接口
请求邻居路由器告知网络的位置
3.
请参见图示。
当在 Router1 上配置了图中的三个子网时,哪个父网络将自动包含到路由表中?
4.路由表中显示以下条目:
R [120/2] via 00:00:26, Serial0/0/1
这是哪种类型的路由?
1 级父路由
1 级超网路由
1 级最终网络路由
2 级子路由
2 级最终子路由
5.
请参见图示。
Router1 正在运行 IOS 第版。
网络管理员需要做什么工作才能确保发往未知子路由的数据包不会被丢弃?
使用?ip default-network?命令
使用 RIPv1 之类的有类路由协议
启用 OSPF 或 ISIS 作为路由协议
使用?ip classless?命令
什么都不用做,默认会启用?ip classless
6.
请参见图示。
路由器 B 接收到目的地址为 10.16.1.97 的数据包。
路由器 B 将会做什么?
丢弃数据包
使用默认路由
通过到 10.16.1.0 的路由转发该数据包
通过到 10.16.1.64 的路由转发该数据包
7.
请参见图示。
该输出中有多少条路由可用作最终路由?
3
4
5
6
7
8
8.请参见图示。
使用?ip classless?命令后,路由器 R2 将如何处理目的地为主机的数据包?
丢弃该数据包
从 Serial 0/0/1 送出该数据包
将数据包发送到网络 0.0.0.0
从 FastEthernet 0/0 送出该数据包
9.
请参见图示。
下列哪项陈述能够正确描述该网络?
该网络使用 EIGRP
至少包含一条父路由和一条子路由
、和网络是子路由
发往的流量将被引导至 s 0/0/1
10.
请参见图示。
Router1 已配置?ip classless?命令。
目的地为主机的数据包将发生什么情况?
它们将被丢弃
发送到默认网关
从接口 Serial0/0/1 转发出去
从接口 FastEthernet 0/0 转发出去
11.
请参见图示。
网络管理员发现 Router2 丢弃了目的地为网络上服务器的数据包。
管理员应该使用什么命令来确保这些数据包从“最后选用网关”,即 Serial 0/0/1 发送出去?
ip classless
no ip classless
ip default-network 0.0.0.0
ip default-gateway route 0.0.0.0 Serial 0/0/1
12.决定路由器是否实施无类路由查找过程的因素是什么?
路由表中包含子路由。
路由器上启用了?ip classless?命令。
路由器上已经配置了无类路由协议。
路由表条目中的每条子路由都包含下一跳 IP 地址和送出接口
13.在路由器上使用?no ip classless?后会发生什么情况?
该路由器将只支持有类 IP 地址。
该路由器将只支持有类路由协议。
当路由表中未发现匹配的路由时,该路由器将使用默认路由(若有)。
该路由器将假设自己了解网络中的所有子网,它不会搜索子路由以外的路由以寻找更佳的匹配
14.请参见图示。
该图包含路由器 E 中路由表的部分内容。
路由器 E 运行版本为的 IOS,且已配置了
默认路由行为。
路由器 E 接收到一个需要转发的数据包。
它将首先搜索路由表中的哪条路由?为什么?
,因为它是第一条最终路由
0.0.0.0/0,因为它是最低的网络号
,因为它是第一条 1 级路由
,因为它具有最短的掩码
15.网络已收敛,而且路由表也已扩充完整。
当需要转发数据包时,用于确定路由表中最佳路径的首要标
准是什么?
带宽最高的路由
管理距离最小的路由
地址和掩码与数据包目的地址匹配长度最大的路由
具有最佳管理距离且开销最低的路由
16.
请参见图示。
Router1 将对网络的子路由应用什么子网掩码?
0.0.0.0
请参见图示。
用于分布网络的路由信息的协议是什么?
RIPv1
RIPv2
EIGRP
OSPF
17.路由器从多个路由协议获知到达某个目的网络的路由。
Cisco 路由器将使用什么来选择首选路由(该
路由将安装到路由表中)?
度量
路由前缀
更新计时器
管理距离。