ccna考试题库101-125

合集下载

Cisco CCNA 认证考试最新真题

Cisco CCNA 认证考试最新真题

Cisco CCNA 认证考试最新真题体验1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A.This command should be executed from the global configuration mode.B.The IP address 10.121.16.8 is the local router port used to forward data.C.102 is the remote DLCI that will receive the information.D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?A.the session layerB.the network layerC.the data link layerD.the access layer3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?A.router(config)# line console 0router(config-line)# enable password ciscoB.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# loginC.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# loginD.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login4. On point-to-point networks, OSPF hello packets are addressed to which address?A.127.0.0.1B.192.168.0.5C.224.0.0.5D.254.255.255.2555. What should be part of a comprehensive network security plan?A.Allow users to develop their own approach to network security.B.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported6. During startup, the router displays the following error message:boot: cannot open "flash:" What will the router do next?A.Because of damaged flash memory, the router will fail the POST.B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialogC.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog7. At which OSI layer is a logical path created between two host systems?A.sessionB.transportworkD.physical8. A routing protocol is required that supports:1) routing update authentication2) an addressing scheme that conserves IP addresses3) multiple vendors4) a network with over 50 routersWhich routing protocol fulfills these requirements?A.RIPv1B.RIPv2C.EIGRPD.OSPF9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A.no VLANsB.all VLANsC.only VLANs 1 - 6D.only the VLANs that are specified when creating the trunk10. Which protocol provides a method of sharing VLAN configuration information between switches?A.VTPB.STPC.ISLD.802.1QDBDCB CCDBA博主的更多文章>>CCNA第一学期《Final Examination》2009-02-27 08:58:47 标签:CCNA[推送到技术圈]1请参见图示。

新10月CCNA题库word版1~100题

新10月CCNA题库word版1~100题

QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?A. %B. @C. >D. $E. #QUESTION 2Which command shows system hardware and software version information?A. show configurationB. show environmentC. show inventoryD. show platformE. show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Qtrunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 thenative VLAN is not specified.What will happen in this scenario?A. 802.1Q giants frames could saturate the link.B. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.C. A native VLAN mismatch error message will appear.D. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.QUESTION 4Which command would correctly configure a serial port on a router with the last usable host address in the192.216.32.32/29 subnet?A. Router(config-if)# ip address 192.216.32.38 255.255.255.240B. Router(config-if)# ip address 192.216.32.39 255.255.255.224C. Router(config-if)# ip address 192.216.32.63 255.255.255.248D. Router(config-if)# ip address 192.216.32.39 255.255.255.248E. Router(config-if)# ip address 192.216.32.63 255.255.255.248F. Router(config-if)# ip address 192.216.32.38 255.255.255.248QUESTION 5The network default gateway applying to a host by DHCP is 192.168.5.33/28. Which option is the valid IPaddress of this host?A. 192.168.5.55B. 192.168.5.47C. 192.168.5.40D. 192.168.5.32E. 192.168.5.14QUESTION 6Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0? (Choose two.)A. 113.10.4.0B. 186.54.3.0C. 175.33.3.255D. 26.35.2.255E. 17.35.36.0QUESTION 7The network administrator has asked you to check the status of the workstation's IP stack by pinging theloopback address. Which address would you ping to perform this task?A. 10.1.1.1B. 127.0.0.1C. 192.168.0.1D. 239.1.1.1QUESTION 8Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IPaddress of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts toping between the hosts are unsuccessful. What two things can be done to allow communications betweenthe hosts? (Choose two.)A. Replace the straight-through cable with a crossover cable.B. Change the subnet mask of the hosts to /25.C. Change the subnet mask of the hosts to /26.D. Change the address of Workstation A to 192.0.2.15.E. Change the address of Workstation B to 192.0.2.111.QUESTION 9Your ISP has given you the address 223.5.14.6/29 to assign to your router's interface. They have alsogiven you the default gateway address of 223.5.14.7. After you have configured the address, the router isunable to ping any remote devices. What is preventing the router from pinging remote devices?A. The default gateway is not an address on this subnet.B. The default gateway is the broadcast address for this subnet.C. The IP address is the broadcast address for this subnet.D. The IP address is an invalid class D multicast address.QUESTION 10Which command is used to copy the configuration from RAM into NVRAM?A. copy running-config startup-configB. copy startup-config: running-config:C. copy running config startup configD. copy startup config running configE. write terminalQUESTION 11Which command is used to load a configuration from a TFTP server and merge the configuration intoRAM?A. copy running-config: TFTP:B. copy TFTP: running-configC. copy TFTP: startup-configD. copy startup-config: TFTP:QUESTION 12A system administrator types the command to change the hostname of a router. Where on the Cisco IFS isthat change stored?A. NVRAMB. RAMC. FLASHD. ROME. PCMCIAQUESTION 13Which command is used to configure a default route?A. ip route 172.16.1.0 255.255.255.0 0.0.0.0B. ip route 172.16.1.0 255.255.255.0 172.16.2.1C. ip route 0.0.0.0 255.255.255.0 172.16.2.1D. ip route 0.0.0.0 0.0.0.0 172.16.2.1QUESTION 14If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?(Choose two.)A. ip default-gateway 0.0.0.0B. ip route 172.16.2.1 0.0.0.0 0.0.0.0C. ip default-network 0.0.0.0D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1E. ip route 0.0.0.0 0.0.0.0 172.16.2.1QUESTION 15Which command would you configure globally on a Cisco router that would allow you to view directlyconnected Cisco devices?A. enable cdpB. cdp enableC. cdp runD. run cdpQUESTION 16Which command is used to see the path taken by packets across an IP network?A. show ip routeB. show routeC. tracerouteD. trace ip routeQUESTION 17Which command is used to debug a ping command?A. debug icmpB. debug ip icmpC. debug tcpD. debug packetQUESTION 18Which command displays CPU utilization?A. show protocolsB. show processC. show systemD. show versionQUESTION 19When configuring a serial interface on a router, what is the default encapsulation?A. atm-dxiB. frame-relayC. hdlcD. lapbE. pppQUESTION 20What must be set correctly when configuring a serial interface so that higher-level protocols calculate thebest route?A. bandwidthB. delayC. loadD. reliabilityQUESTION 21A company implements video conferencing over IP on their Ethernet LAN. The users notice that thenetwork slows down, and the video either stutters or fails completely. What is the most likely reason forthis?A. minimum cell rate (MCR)B. quality of service (QoS)C. modulationD. packet switching exchange (PSE)E. reliable transport protocol (RTP)QUESTION 22Which layer in the OSI reference model is responsible for determining the availability of the receivingprogram and checking to see if enough resources exist for that communication?A. transportB. networkC. presentationD. sessionE. applicationQUESTION 23Data transfer is slow between the source and destination. The quality of service requested by the transportlayer in the OSI reference model is not being maintained. To fix this issue, at which layer should thetroubleshooting process begin?A. presentationB. sessionC. transportD. networkE. physicalQUESTION 24Which protocols are found in the network layer of the OSI reference model and are responsible for pathdetermination and traffic switching?A. LANB. routingC. WAND. networkQUESTION 25Which command reveals the last method used to powercycle a router?A. show reloadB. show bootC. show running-configD. show versionQUESTION 26Which three options are valid WAN connectivity methods? (Choose three.)A. PPPB. WAPC. HDLCD. MPLSE. L2TPv3CCNA考试报名1700元7F. ATMQUESTION 27Refer to the exhibit. Which WAN protocol is being used?A. ATMB. HDLCC. Frame RelayD. PPPQUESTION 28What is the difference between a CSU/DSU and a modem?A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signalsfrom a router to a leased line.B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signalsfrom a router to a leased line.C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signalsfrom a router to a phone line.D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signalsfrom a router to a phone line.QUESTION 29A network administrator must configure 200 switch ports to accept traffic from only the currently attachedCCNA考试报名1700元8host devices. What would be the most efficient way to configure MAC-level security on all these ports?A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port securitymac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port securitymac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have enddevices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and thenenter the commands on each switch for MAC address port-security.QUESTION 30When troubleshooting a Frame Relay connection, what is the first step when performing a loopback test?A. Set the encapsulation of the interface to HDLC.B. Place the CSU/DSU in local-loop mode.C. Enable local-loop mode on the DCE Frame Relay router.D. Verify that the encapsulation is set to Frame Relay.What occurs on a Frame Relay network when the CIR is exceeded?A. All TCP traffic is marked discard eligible.B. All UDP traffic is marked discard eligible and a BECN is sent.C. All TCP traffic is marked discard eligible and a BECN is sent.D. All traffic exceeding the CIR is marked discard eligible.QUESTION 32What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)A. They create split-horizon issues.B. They require a unique subnet within a routing domain.C. They emulate leased lines.D. They are ideal for full-mesh topologies.E. They require the use of NBMA options when using OSPF.QUESTION 33Refer to the exhibit. Addresses within the range 10.10.10.0/24 are not being translated to the 1.128.0/16range. Which command shows if 10.10.10.0/24 are allowed inside addresses?A. debug ip natB. show access-listC. show ip nat translationD. show ip nat statisticsQUESTION 34A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card. The client sectionof theaccess point does not list any active WLAN clients. What is a possible reason for this?A. The incorrect channel is configured on the client.B. The client's IP address is on the wrong subnet.C. The client has an incorrect pre-shared key.D. The SSID is configured incorrectly on the client.QUESTION 35Which two features did WPAv1 add to address the inherent weaknesses found in WEP? (Choose two.)CCNA考试报名1700元10艾迪飞论坛艾迪飞论坛A. a stronger encryption algorithmB. key mixing using temporal keysC. shared key authenticationD. a shorter initialization vectorE. per frame sequence countersQUESTION 36Which two wireless encryption methods are based on the RC4 encryption algorithm? (Choose two.)A. WEPB. CCKMC. AESD. TKIPE. CCMPQUESTION 37What are two characteristics of RIPv2? (Choose two.)A. classful routing protocolB. variable-length subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to compute pathQUESTION 38Which two Ethernet fiber-optic modes support distances of greater than 550 meters?A. 1000BASE-CXCCNA考试报名1700元11艾迪飞论坛艾迪飞论坛艾迪飞论坛B. 100BASE-FXC. 1000BASE-LXD. 1000BASE-SXE. 1000BASE-ZXQUESTION 39What two things will a router do when running a distance vector routing protocol? (Choose two.)A. Send periodic updates regardless of topology changes.B. Send entire routing table to all routers in the routing domain.C. Use the shortest-path algorithm to the determine best path.D. Update the routing table based on updates from their neighbors.E. Maintain the topology of the entire network in its database.QUESTION 40Refer to the exhibit. According to the routing table, where will the router send a packet destined for10.1.5.65?A. 10.1.1.2B. 10.1.2.2C. 10.1.3.3D. 10.1.4.4QUESTION 41Which command shows if an access list is assigned to an interface?A. show ip interface [interface] access-listsB. show ip access-lists interface [interface]C. show ip interface [interface]D. show ip access-lists [interface]QUESTION 42Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?A. The address is removed from the pool until the conflict is resolved.B. The address remains in the pool until the conflict is resolved.C. Only the IP detected by Gratuitous ARP is removed from the pool.D. Only the IP detected by Ping is removed from the pool.E. The IP will be shown, even after the conflict is resolved.QUESTION 43Refer to the exhibit. You are connected to the router as user Mike. Which command allows you to seeoutput from the OSPF debug command?A. terminal monitorB. show debuggingC. show sessionsD. show ip ospf interfaceQUESTION 44Refer to the exhibit. If number 2 is selected from the setup script, what happens when the user runs setupfrom a privileged prompt?A. Setup is additive and any changes will be added to the config script.B. Setup effectively starts the configuration over as if the router was booted for the first time.C. Setup will not run if an enable secret password exists on the router.D. Setup will not run, because it is only viable when no configuration exists on the router.QUESTION 45Refer to the exhibit. Which (config-router) command will allow the network represented on the interface tobe advertised by RIP?A. redistribute ethernet0B. network ethernet0CCNA考试报名1700元14艾迪飞论坛艾迪飞论坛C. redistribute 10.12.0.0D. network 10.12.0.0QUESTION 46Refer to the exhibit. What information can be gathered from the output?A. One router is running RIPv1.B. RIP neighbor is 224.0.0.9.C. The network contains a loop.D. Network 10.10.1.0 is reachable.QUESTION 47Refer to the exhibit. What type of connection would be supported by the cable diagram shown?A. PC to routerB. PC to switchC. server to routerD. router to routerQUESTION 48Refer to the exhibit. What type of connection would be supported by the cable diagram shown?A. PC to routerB. PC to switchC. server to switchD. switch to routerQUESTION 49Which two statements describe the Cisco implementation of VLANs? (Choose two.)A. VLAN 1 is the default Ethernet VLAN.B. CDP advertisements are only sent on VLAN 1002.C. By default, the management VLAN is VLAN 1005.D. By default, the switch IP address is in VLAN 1005.E. VLAN 1002 through 1005 are automatically created and cannot be deleted.QUESTION 50Refer to the exhibit. What can be determined about the router from the console output?A. No configuration file was found in NVRAM.B. No configuration file was found in flash.C. No configuration file was found in the PCMCIA card.D. Configuration file is normal and will load in 15 seconds.QUESTION 52Refer to the exhibit. Which command would allow the translations to be created on the router?A. ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 19B. ip nat outside mynats 1.1.128.1 1.1.135.254 prefix-length 19C. ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 18D. ip nat outside mynats 1.1.128.1 1.1.135.254 prefix-length 18QUESTION 53Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output asshown. At which OSI layer is the problem?A. data link layerB. application layerC. access layerD. session layerE. network layerQUESTION 54Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?A. 10.0.0.0B. 10.0.0.254C. 192.223.129.0D. 192.223.129.254QUESTION 55Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?A. The IP address for Server A is a broadcast address.B. The IP address for Workstation B is a subnet address.C. The gateway for Workstation B is not on the same subnet.D. The gateway for Server A is not on the same subnet.QUESTION 56Refer to the exhibit. What does the (*) represent in the output?A. Packet is destined for a local interface to the router.B. Packet was translated, but no response was received from the distant device.C. Packet was not translated, because no additional ports are available.D. Packet was translated and fast switched to the destination.QUESTION 57Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB. (config-if) ip nat outside overloadC. (config) ip nat inside source list 1 interface ethernet1 overloadD. (config-if) ip nat inside overloadQUESTION 58Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for172.16.12.10 if the traffic is processed by this ACL?A. Traffic will be dropped per line 30 of the ACL.B. Traffic will be accepted per line 40 of the ACL.C. Traffic will be dropped, because of the implicit deny all at the end of the ACL.D. Traffic will be accepted, because the source address is not covered by the ACL.QUESTION 59Refer to the exhibit. Which statement describes the effect that the Router1 configuration has on devices inthe 172.16.16.0 subnet when they try to connect to SVR-A using Telnet or SSH?A. Devices will not be able to use Telnet or SSH.B. Devices will be able to use SSH, but not Telnet.C. Devices will be able to use Telnet, but not SSH.D. Devices will be able to use Telnet and SSH.QUESTION 60What are three advantages of VLANs? (Choose three.)A. VLANs establish broadcast domains in switched networks.B. VLANs utilize packet filtering to enhance network security.C. VLANs provide a method of conserving IP addresses in large networks.D. VLANs provide a low-latency internetworking alternative to routed networks.E. VLANs allow access to network services based on department, not physical location.F. VLANs can greatly simplify adding, moving, or changing hosts on the network.QUESTION 61An administrator would like to configure a switch over a virtual terminal connection from locations outsideof the local LAN. Which of the following are required in order for the switch to be configured from a remotelocation? (Choose two.)A. The switch must be configured with an IP address, subnet mask, and default gateway.B. The switch must be connected to a router over a VLAN trunk.C. The switch must be reachable through a port connected to its management VLAN.D. The switch console port must be connected to the Ethernet LAN.E. The switch management VLAN must be created and have a membership of at least one switchport.F. The switch must be fully configured as an SNMP agent.QUESTION 62Which of the following host addresses are members of networks that can be routed across the publicInternet? (Choose three.)A. 10.172.13.65B. 172.16.223.125C. 172.64.12.29D. 192.168.23.252E. 198.234.12.95F. 212.193.48.254QUESTION 63Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to networkhosts? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.192QUESTION 64Which of the following are benefits of VLANs? (Choose three.)A. They increase the size of collision domains.B. They allow logical grouping of users by function.C. They can enhance network security.D. They increase the size of broadcast domains while decreasing the number of collision domains.E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.F. They simplify switch administration.Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three.)A. pingB. tracertC. ipconfigD. show ip routeE. winipcfgF. show interfacesQUESTION 67。

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案描述载波侦听多路由访问/冲突检测(CSMA/CD)的工作原理。

CSMA/CD是一种帮助设备均衡共享带宽的协议,可避免两台设备同时在网络介质上传输数据。

虽然他不能消除冲突,但有助于极大的减少冲突,进而避免重传,从而提高所的设备的数据传输效率。

区分半双工和全双工通信。

并指出两种方法的需求。

与半双工以太网使用一对导线不同,全双工以太网使用两队导线,全双工使用不同的导线来消除冲突,从而允许同时发送和接收数据,而半双工可接收或发送数据,但不能同时接收和发送数据,且仍会出现冲突。

要使用全双工,电缆两端的设备都必须支持全双工,并配置成一全双模式运行。

描述MAC地址的组成部分以及各部分包含的信息。

MAC(硬件)地址时一种使用十六进制表示的地址,长48位(6B)。

其中前24位(3B)称为OUI(Organizationally Unique Idebtifier,组织唯一表示符),有IEEE分配给NIC制造商;余下的部分呢唯一地标识了NIC识别十进制数对应的二进制值和十六进制值。

用这三种格式之一表示的任何数字都可以转换为其他两种格式,能够执行这种转换对理解IP地址和子网划分至关重要。

识别以太网帧中与数据链路层相关的字段。

在以太网中,与数据链路层相关的字段包括前导码,帧其实位置分隔符,目标MAC地址,源MAC地址,长度或者类型以及帧校验序列。

识别以太网布线相关的IEEE标准。

这些标准描述了各种电缆类型的功能和物理特征,包括(但不限于)10Base2、10Base5和10BaseT。

区分以太网电缆类型及其用途。

以太网电缆分3种:直通电缆,用于将PC或路由器的以太网接口连接到集线器或交换机;交叉电缆。

用于将集线器连接到集线器,集线器连接到交换机,交换机连接到交换机以及PC连接到PC;反转电缆,用于PC和路由器或交换机之间建立控制台连接。

描述数据封装过程及其在分组创建中的作用。

数据封装指的是在OSI模型各层给数据添加信息的过程,也成为分组创建。

思科CCNA学习试题答案!!!

思科CCNA学习试题答案!!!

思科CCNA学习试题答案CCNA课程测试一、单项选择题:1、介质100BaseT的最大传输距离是:( )A: 10m B:100m C:1000m D:500m2、路由器下,由一般用户模式进入特权用户模式的命令是:()A:enable B:config C: interface D:router3、哪个命令可以成功测试网络:( )A: Router> ping 192.5.5.0B: Router# ping 192.5.5.30C: Router> ping 192.5.5.256D: Router# ping 192.5.5.2554、介质工作在OSI的哪一层()A:物理层 B:数据链路层 C:网络层 D:传输层5、100baseT的速率是( )Mbit/sA: 1 B:10 C:100 D:10006、在启用IGRP协议时,所需要的参数是:( )A:网络掩码 B:子网号C:自治系统号 D:跳数7、基本IP访问权限表的表号范围是:( )A: 1—100 B:1-99 C:100-199 D:800-8998、查看路由表的命令是:( )A:show interface B:show run C:show ip route D:show table9、工作在OSI第三层的设备是:( )A:网卡B:路由器 C: 交换机 D:集线器10、OSI第二层数据封装完成后的名称是:( )A:比特 B: 包C:帧 D:段11、为了禁止网络210.93.105.0 ftp到网络223.8.151.0,允许其他信息传输,则能实现该功能的选项是:( )A:access-list 1 deny 210.93.105.0.0.0.0.0.0B:access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.00.0.0.255 eq ftpC:access-list 100 permit ip any anyD:access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq ftpaccess-list 100 permit ip any any12、路由器下“特权用户模式”的标识符是:( )A: > B:! C:# D: (config-if)#13、把指定端口添加到VLAN的命令是:( )A: vlan B: vlan-membership C: vtp D:switchport14、交换机工作在OSI七层模型的哪一层( )A:物理层B:数据链路层C:网络层 D:传输层15、在OSI七层模型中,介质工作在哪一层( )A:传输层 B:会话层C:物理层 D:应用层16、交换机转发数据到目的地依靠( )A:路由表B:MAC地址表 C:访问权限表 D:静态列表17、为了使配置私有IP的设备能够访问互联网,应采用的技术是( )?A:NAT B:VLAN C:ACCESS-LIST D:DDR18、VLAN主干协议VTP的默认工作模式是( )A:服务器模式B:客户端模式C:透明模式D:以上三者都不是19、路由器的配置文件startup-config存放在( )里A:RAM B:ROM C:FLASH D:NVRAM20、配置路由器特权用户“加密密码”的命令是:( )A:password B:enable password C:enable secretD:passwd21、某网络中,拟设计10子网,每个子网中放有14台设备,用IP 地址段为199.41.10.X ,请问符合此种规划的子网掩码是( ) A: 255.255.255.0 B:255.255.240.0C: 255.255.255.240 D:255.248.0.022、在路由表中到达同一网络的路由有:静态路由、RIP路由、IGRP 路由,OSPF路由,则路由器会选用哪条路由传输数据:( ) A:静态路由 B: RIP路由 C:IGRP路由 D:OSPF路由23、扩展IP访问权限表的表号范围是:( )A: 1—100 B:1-99 C:100-199 D:800-89924、把访问权限表应用到路由器端口的命令是:( )A: permit access-list 101 out B: ip access-group 101 out C: apply access-list 101 out D: access-class 101 out 25、混合型协议既具有“距离矢量路由协议”的特性,又具有“链路状态路由协议”的特性,下列协议中属于混合型协议的是:( ) A: RIP B: OSPF C:EIGRP D: IGRP26、在路由器上,命令show access-list的功能是():A:显示访问控制列表内容 B:显示路由表内容C:显示端口配置信息 D:显示活动配置文件27、RIP路由协议认为“网络不可到达”的跳数是:( )A: 8 B:16 C:24 D:10028、查看E0端口配置信息的命令是:( )A:show access-list B:show ip routeC:show version D:show interface e029、配置路由器时,封装PPP协议的命令是:( )A:encap ppp B:ppp C: group ppp D: int ppp30、路由器上“水平分割”的功能是:( )A:分离端口B:阻止路由环路C:简化配置D:方便故障处理31、OSI七层模型中,“包”是哪一层数据封装的名称()A:物理层 B:数据链路层C:网络层 D:传输层32、OSI七层模型中,“段”是哪一层数据封装的名称()A:物理层 B:数据链路层 C:网络层 D:传输层33、备份路由器IOS的命令是:( )A: copy flash tftpB: copy running-config tftpC: copy IOS tftpD: copy startup-config tftp34、PPP工作在OSI的哪一层()A:物理层B:数据链路层 C:网络层 D:传输层35、FTP工作在OSI哪一层()A:会话层 B:表示层 C:传输层D:应用层36、TELNET工作在OSI哪一层()A:会话层 B:表示层 C:传输层D:应用层37、SMTP工作在OSI哪一层()A:会话层 B:表示层 C:传输层D:应用层38、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的子网号为()A:192.168.50.32 B:192.168.80.64C:192.168.50.96 D:192.168.50.7139、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的广播地址为()A:192.168.50.32 B:192.168.80.64C:192.168.50.96 D:192.168.50.7140、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的子网有效IP为()A:192.168.50.33---192.168.50.39B:192.168.50.41---192.168.50.50C:192.168.50.65---192.168.50.70D:192.168.50.66---192.168.50.7541、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP和掩码结合,共划分了多少个子网(不包括全0子网和全1子网)()A: 8 B:30 C:6 D:1442、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP和掩码结合划分子网时,每个子网的容量为()A:8 B:4 C:12 D:643、网络172.12.0.0需要划分子网,要求每个子网中有效IP数为458个,为了保证子网数最大,则掩码应为()A:255.255.255.0 B:255.255.254.0 C:255.255.0.0D:255.255.248.044、哪一个命令可以设置路由器特权用户的“明文密码”()A:enable password B:password C:enable secretD: secret45、RIP协议的管理距离是()A:100 B:110 C:120 D:15046、下列路由协议中,属于链路状态路由协议的是()A:RIP B:EIGRP C:IGRP D:OSPF47、默认情况下,RIP定期发送路由更新的时间是()A:15S B:30S C:60S D:90S48、如果网络中的路由器都是cisco路由器,则优先选择哪一个路由协议()A:RIP B:EIGRP C:IGRP D:OSPF49、下列对RIP的配置中,合法的命令是()A: router rip 100network 10.12.0.0B: router rip 100network 10.0.0.0C: router ripnetwork 10.12.0.0D: router rip 100network 10.0.0.050、为了查看路由器的E0端口上,是否挂接了访问权限表,应该使用的命令是()A:show access-list B:show interface e0C: show ip interface e0 D:show e051、关于帧中继的说法,正确的是()A:速率最大为1Mbit/s B: 不提供差错校验功能C:可以偷占带宽 D:数据传输质量高于DDN52、关于PPP和HDLC的说法中,错误的是()A:PPP是通用协议,HDLC是CISCO私有协议B:PPP有验证功能,HDLC无验证功能C:PPP效率低,HDLC效率高D:在配置ISDN时,广域网协议不能封装成PPP,但可以封装成HDLC 53、对交换机的描述,正确的是()A:单广播域,单冲突域的设备B:单广播域,多冲突域的设备C:多广播域,单冲突域的设备D:多广播域,多冲突域的设备54、对路由器的描述,正确的是()A:单广播域,单冲突域的设备B:单广播域,多冲突域的设备C:多广播域,单冲突域的设备D:多广播域,多冲突域的设备55、交换机上VLAN的功能描述中,正确的是()A:可以减少广播域的个数B:可以减少广播对网络性能的影响C: 可以减少冲突域的个数D: 可以减小冲突域的容量56、两个VLAN之间要想通信,应该使用的设备是()A:集线器 B:二层交换机C:路由器 D:PC机57、要把交换机的配置文件保存到tftp服务器,应使用的命令为()A:copy ios tftp B:copy running-config tftpC: copy flash tftp D:copy config tftp58、命令“ping 127.0.0.1”的功能是()A:测试网卡是否正常 B:测试网关是否正常C:测试TCP/IP协议是否正常 D:测试介质是否正常59、路由器上的命令“show version”的功能是()A:显示版本信息 B:显示端口配置信息 C:显示路由表D:显示路由协议信息60、路由器上激活端口的命令是()A:shutdown B:no shutdown C: up D:no up61、某台PC,能ping通路由器,但不能telnet到路由器,可能的原因是(D )A:PC的IP地址设置错误 B:路由器端口IP设置错误C:路由器端口处于关闭状态D:telnet密码未设置62、OSI七层模型中,网络层的数据封装名称为()A:比特 B:帧C:包 D:段63、OSI七层模型中,物理层的数据封装名称为()A:比特 B:帧 C:包 D:段64、OSI七层模型中,数据链路层的数据封装名称为()A:比特B:帧 C:包 D:段65、OSI七层模型中,传输层的数据封装名称为()A:比特 B:帧 C:包D:段66、帧中继环境下,为了区分虚电路,应该使用的地址是()A:IP地址 B:MAC地址 C:DLCI D:IPX地址67、路由器“路由模式”的提示符号是()A: # B: (config)# C:(config-if)# D:(config-router)# 68、EIGRP 的管理距离()A:90 B:100 C:110 D:12069、RIP协议负载均衡的路径数量为()A:无限制B:最多4条C:最多5条D:最多6条70、下面有关交换机的描述中,正确的是()A:所有交换机都支持VLAN功能B:交换机端口数量最多为48口C:交换机独占带宽D:交换机端口的最大速率为100Mbit/s71、为了阻止交换机环路,交换机上所采用的技术为()A:水平分割B:生成树协议C:触发更新D:地址学习72、帧中继环境中,CIR的含义是()A:提高线路速率B:保证线路速率C:降低线路速率D:配置线路速率73、路由器上端口fa0/0,其最大传输速率是()Mbit/sA:128 B: 10 C:100 D: 100074、帧中继环境中,在物理端口上,建立子接口的命令是()A:create B:interface C:encapsulation D:ip address 75、路由器上,命令“show int s0”的显示结果为:Serial0 is up , line protocol is down出现该结果的可能原因是()A:端口处于关闭状态 B:物理端口被烧毁C:两端设备协议不一致 D:路由表中无路由76、如果把路由器的某个端口的IP配置为:192.168.10.64,掩码配置为:255.255.255.248,则该端口()A:能和其他设备正常通信B:会变成“administratively down”状态C:端口被烧毁D:出现错误提示,配置命令执行失败77、网关的功能()A:过滤数据包B:不同网段通信 C:校验数据帧D:把数据封装成“段”78、能够分配给设备的IP,应该是()A:网络有效IP B:网络号 C:网络广播地址 D:任意IP 79、路由器“全局模式”的提示符为()A: > B: # C: (config)# D: (config-router)#80、路由器当前的模式为“端口模式”,要退回到“特权模式”,应该使用的快捷键为()A:ctrl+b B: ctrl+z C:ctrl+c D:ctrl+p81、下列命令中,无法正确执行的是()A:Router(config)#show runB: Router#ping 127.0.0.1C: Router(config)#hostname ciscoD: Router#reload82、路由器上,设置端口速率的命令是()A:clock rate B:bandwidth C:set D:encap83、路由器上,清空路由表的命令是()A:clear ip B:delete ip route C:delete routeD: clear ip route *84、路由表中,某条路由的“路由代码为D”,则表明该路由为()A:直连路由 B:静态路由 C:IGRP路由 D:EIGRP路由85、两台路由器直连到一起,应该使用的线缆为()A:交叉线缆B:直通线缆C:反转线缆D:任意线缆86、通过路由器的“配置端口console”对路由器进行配置,应该使用的线缆为()A:交叉线缆B:直通线缆C:反转线缆D:任意线缆87、下面对Cisco2621路由器和Cisco2501路由器描述中,错误的是()A:Cisco2621路由器的可扩展性优于Cisco2501路由器B:Cisco2621是模块化路由器C:Cisco2501上提供一个100Mbit/s的快速以太网端口D:Cisco2501是固定端口的路由器88、为了连接“帧中继”线路,网络中的路由器需要提供的端口类型为()A:FastEthernet B:Serial C:BRI D:Ethernet89、路由器“特权模式”的提示符是:()A:> B:# C:(config)# D: (config-if)#90、下列关于路由器和交换机的描述中,错误的是()A:路由器可以用来连接internetB:二层交换机可以用来实现“异地网络”互连C:路由器可以用来做路径选择D:交换机可以转发广播二、多项选择题:正确答案的个数在每题的题后括号中有说明91、在路由器上,可以使用的命令有:( ) [选3个]A:ping B:show interfaces C:show ip route D:ipconfig E:wincfg92、在配置帧中继子接口时,在物理接口上应该配置的内容是:( )[选3个]A:配置IP地址B:封装帧中继协议C:指定子接口类型D:设定子接口 E:配置密码93、请选出交换机处理帧的三种模式:( )[选3个]A:直通模式 B:存储转发模式 C:侦测模式 D:分段模式E:阻塞模式94、对于IP为199.41.27.0,子网掩码为255.255.255.240,则该IP地址和子网掩码相作用会得到一系列IP,从下列选项中选出属于“有效IP”的选项:( ) [选3个]A:199.141.27.33 B:199.141.27.112 C:199.141.27.119D:199.141.27.126 E:199.141.27.175 F:199.141.27.208 95、属于私有IP段的是( )[选3个]A:10.0.0.0-10.255.255.255B:172.16.0.0-172.31.255.255 C:202.110.100.0-202.110.100.255D:192.168.0.0-192.168.255.255E:126.0.0.0-126.255.255.25596、下列哪一设备工作时,要用到OSI的七个层(一层到七层)()[选3个]A:PC B:网管机 C:WEB服务器 D:交换机 E:路由器97、网络中经常使用DDN服务,请选出DDN的优点()[选3个] A:传输质量高 B:接入方式灵活 C:偷占带宽D:使用虚电路E:专用线路98、网络中经常使用“帧中继”服务,请选出帧中继的优点()[选3个]A:偷占带宽B:提供拥塞管理机制C:可以使用任意广域网协议D:灵活的接入方式99、默认情况下,IGRP衡量路径好坏时,考虑的因素为()[选2个]A:带宽 B:可靠性 C:最大传输单元D:延时100、交换机的三大功能为()[选3个]A:地址学习 B:转发过滤 C:消除回路 D:发送数据包。

ccna考试试题库

ccna考试试题库

ccna考试试题库CCNA(Cisco Certified Network Associate)考试是思科认证网络专家的初级认证,主要测试考生在网络基础、路由、交换、无线和安全等方面的知识。

以下是一些模拟CCNA考试的试题和答案:1. 什么是子网掩码,它有什么作用?答案:子网掩码是一种IP地址的附加信息,用于指定IP地址中网络部分和主机部分的界限。

它的作用是允许路由器区分IP地址中的网络地址和主机地址,从而实现不同网络之间的路由。

2. 描述静态路由和动态路由的区别。

答案:- 静态路由:由网络管理员手动配置的路由信息,不随网络结构的变化而自动调整。

- 动态路由:由路由器根据网络拓扑的变化自动生成和更新的路由信息。

3. 什么是VLAN,它有什么好处?答案: VLAN(虚拟局域网)是一种在交换机上划分不同网络的技术,即使物理上连接在同一交换机上,也可以属于不同的VLAN。

VLAN的好处包括提高安全性、减少广播域、提高网络管理的灵活性等。

4. 简述TCP和UDP的区别。

答案:- TCP(传输控制协议):提供可靠的、面向连接的传输服务,有流量控制和拥塞控制机制。

- UDP(用户数据报协议):提供不可靠的、无连接的传输服务,适用于对实时性要求高的应用。

5. 什么是DHCP,它的作用是什么?答案: DHCP(动态主机配置协议)是一种网络管理协议,用于自动分配IP地址和其他网络配置信息给网络中的设备。

它的作用是简化网络配置,避免IP地址冲突。

6. 什么是NAT,它在网络中扮演什么角色?答案: NAT(网络地址转换)是一种技术,允许多个设备共享一个公共IP地址与互联网通信。

它在网络中扮演的角色是节省IP地址资源,隐藏内部网络结构。

7. 什么是STP(生成树协议)?答案: STP(生成树协议)是一种网络协议,用于在局域网中防止网络环路的产生。

通过创建一个无环的逻辑拓扑,STP确保网络的稳定性和可靠性。

8. 描述OSPF(开放最短路径优先)协议的工作原理。

思科认证CCNP经典试题

思科认证CCNP经典试题

思科认证CCNP经典试题CCNP经典题目第一部分填空题1、在Cico体系的IGP协议中,RIP的A-D管理距离是,EIGRP的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。

BGP从EBGP学习到的路由学到路由的A-D管理距离是;BGP从IBGP学习到的路由学到路由的A-D管理距离是。

2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP的默认本地优先级为:。

3、BGP的邻居分为和。

4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。

如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。

5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是;本地站点地址是。

(没有/10的写法)8、在选择STP的角色(身份)有哪些?,默认STP的收敛时间为。

配置了portfat后,收敛时间会小于。

9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP发送hello包组播地址是;VRRP发送hello包的组播地址是。

10、目前以太通道最多可以使用条物理线缆逻辑捆绑成一个以太通道接口?形成以太通道方式有。

11、BGP在EBGP中使用属性避免AS间的环路(确保无环),该属性属于BGP的必遵属性,其中还有哪两个是BGP公认必遵属性为和。

第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IPCEFFIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2BK3,K4C、K1,K5D、K1,K33、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。

CCNA复习题

CCNA复习题

CCNA复习题⼀、选择题(每题2分,共80分,请将答案填⼊答题卡)1、客户端使⽤哪种协议来浏览web 服务器?A.FTPB.HTTPC.POPD.SMTP2、DNS 服务器的功能是什么?A.将IP 地址映射为MAC 地址。

B.将计算机或域名转换为相应的IP 地址。

C.管理客户端所在的域。

D.接收从客户端发来的HTTP 请求。

3、在源主机和⽬的主机之间传输的TCP/IP 数据通过以下四个步骤解包:A. 去除TCP 报头。

B.解码⽐特流,识别出⽬的MAC 地址。

C. 去除IP 报头,将数据包内容发送给下⼀层。

D. 去除以太⽹帧头和帧尾。

这些步骤的正确顺序是什么?A.A, B, C, DB.A, C, B, DC.B, C, D, AD.B, D, C, AE.C, A, B, D4、当某个域内其中⼀台主机发送帧时,域内的所有其它主机都会收到该帧。

并且,路由器限定了该域的边界。

该域属于哪⼀类型?A.⼴播B.冲突C.本地D.组播5、客户端使⽤哪种协议通过TCP/IP 连接从远程服务器检索电⼦邮件?A.DNSB.FTPC.POPD.HTTP6、哪两项陈述正确描述了MAC 地址?(选择两项。

)A.MAC 地址⽤于标识特定的NIC。

B.MAC 地址包含⽹络号和唯⼀的主机标识。

C.MAC 地址是物理地址。

D.MAC 地址始终由⽹络管理员分配给⽹络设备。

E.MAC 地址是第3 层地址。

7、下⾯哪些是TCP/IP 模型的传输层协议?(选择两项。

)A.FTPB.UDPC.SMTPD.TFTPE.TCP8、以下哪两项是DHCP 服务的特性?(选择两项。

)A.DHCP 客户端确定使⽤由DHCP 服务器提供的IP 地址的租期。

B.集成路由器充当DHCP 服务器向ISP 提供IP 地址。

C.DHCP 客户端向⽬的IP 地址255.255.255.255 发送DHCP 发现消息。

D.DHCP 服务器将IP 地址映射到主机名。

E.集成路由器充当本地⽹络中内部主机的DHCP 服务器。

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案第二章网络通信1、TCP/IP网络接入层有何作用?A路径确定和数据包交换B数据表示、编码和控制C可靠性、流量控制和错误检测E将数据段划分为数据包2、下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)B发起数据通信D发送数据流F数据流最后的终止点3、下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)C LAN 中的不同网段之间一般通过租用连接的方式连接。

D此类网络的安全和访问控制由服务提供商控制。

F此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU?A传输期间的帧损坏B在目的设备上重组的数据C因通信丢失而重新传输的数据包005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)018哪个应用层协议通常用于支持客户端与服务器之间的文件传输?A HTMLB HTTP D Telnet019哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?A DHCPB DNS D SMTP E Telnet020服务器上的应用层通常如何处理多客户端服务请求?A终止与服务的所有连接B拒绝与单一守护程序的多个连接C暂停当前连接,建立新连接第四章OSI传输层001下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)A流量控制 D 面向连接E 序列和确认002请参见图示。

此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?A会话创建B 数据段重传C 数据传输D 会话断开003数据段的TCP 报头中为什么包含端口号?A指示转发数据段时应使用的正确路由器接口B 标识接收或转发数据段时应使用的交换机端口C确定封装数据时应使用的第3 层协议让接收主机转发数据到适当的应用程序E让接收主机以正确的顺序组装数据包004OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?A应用层 B 表示层 C 会话层传输层 E 网络层005请参见图示。

最新CCNA认证考试真题

最新CCNA认证考试真题

最新CCNA认证考试真题小编为大家收集整理了《最新CCNA认证考试真题》供大家参考,希望对大家有所帮助!!!(1)TCP/IP Addressing and Protocol1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?A. 255.0.0.0B. 255.255.0.0C. 255.245.255.0D. 255.255.255.0E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?A. TCPB. UDPC. IPD. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?A. 255.255.0.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?A. 172.16.12.33/28B. 172.16.12.32/27C. 172.16.12.33/27D. 172.16.12.34/27E. 172.16.12.35/28F. 172.16.12.38/28G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A.172.16.176.0–255.255.240.0B. 172.16.192.0–255.255.240.0C. 172.16.208.0–255.255.240.0D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants toknow how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?A. One network with 254 hostsB. Two networks with 128 hostsC. Four networks with 64 hostsD. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)A. 201.168.27.33B. 201.168.27.112C. 201.168.27.119D. 201.168.27.126E. 201.168.27.175F. 201.168.27.208 9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?A. 201.100.5.0B. 201.100.5.32C. 201.100.5.64D. 201.100.5.65E. 201.100.5.31F. 201.100.5.1 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?A. TCPB. IPC. UDPD. IPXE. Frame relay 11: Which of the following protocols is connection-oriented? A. TCPB. IPC. IPXD. Frame relay 12: You are using an application on your Windows 2000 client machines that provides errorcorrection. You need a protocol to provide fast transport. Which protocol should your application use?A. TCPB. IPC. UDPD. SPXE. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.A. MTU adjustmentB. WindowingC. Flexible Send PathD. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information?A. The ACK received will not include the segment number that was not received.B. The ACK received will include the segment number that was not received.C. The sending host will send a PACK to verify segment receipt.D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?A. Class AB. Class BC. Class CD. Class DE. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)A. 10.23.45.67B. 126.21.34.56C. 172.16.32.1D. 172.31.234.55E. 192.169.4.5 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?Department Number of Users Corporate 7 Customer Support 15 Financial 13 HR 7 Engineering 16 A. 255.255.255.0B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correctioncapabilities of the application itself?A. UDPB. TCPC. SNMPD. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)A. MAC address resolutionB. Sequence numbersC. AcknowledgmentsD. PingE. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?A. Increased throughputB. Decreased throughputC. Increased latencyD. Decreased reliability21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.224E. 255.255.255.240F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?A. ARPB. RARPC. SLARPD. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?A. The host's default gateway is down.B. The destination host is not powered on.C. The IP address of the router interface is incorrect.D. The IP address of the switch to which the destination host connects is incorrect.E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting?A. Class AB. Class BC. Class CD. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork.B. It represents the number of subnetworks that are being used.C. It represents the class of IP address being used.D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.224E. 255.255.255.240 27: Which of the following would a Class A network be assigned to?A. Government agencyB. Small-to-medium sized corporationC. SOHOD. An individual 28: A client has the IP address192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)A. 192.168.5.95B. 192.168.5.100C. 192.168.5.128D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet?A. 2.3.4.5B. 11.12.13.14C. 165.23.224.2D. 172.31.45.34E. 203.33.45.22 30: You are given a Class B network. Whatis the default subnet mask assigned to the Class B network?A. 255.255.255.255B. 255.255.0.0D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address?A. Class C addresses cannot be assigned to Ethernet interfaces.B. The /27 is an invalid mask.C. It is a broadcast address.D. It is a public IP address.E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?A. 255.255.255.254C. 255.255.240.254D. 255.255.0.0 33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of255.255.255.248?A. 192.168.2.24/192.168.2.31B. 192.168.2.32/192.168.2.39C. 192.168.2.40/192.168.2.47D. 192.168.2.48/192.168.2.55E. 192.168.2.56/192.168.2.63 34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?A. 218B. 219C. 220D. 221E. 222 35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?A. 75B. 83C. 90D. 97 36: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?A. 198B. 214C. 252D. 255 37: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?A. 182B. 192C. 202D. 212 38: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.192 39: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?A. 62 networks and 2 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 16 networks and 14 hosts 40: What is a disadvantage of using a connection-oriented protocol such as TCP?A. Packet acknowledgment might add overhead.B. Packets are not tagged with sequence numbers.C. Loss or duplication of data packets is more likely to occur.D. The application layer must assume responsibility for the correct sequencing of the data packets. 41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?A. 62 networks and 2 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 14 networks and 14 hosts 42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)A. 165.203.2.0B. 165.203.5.192C. 165.203.6.63D. 165.203.6.191E. 165.203.8.255 43: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)A. 192.168.32.33B. 192.168.32.112C. 192.168.32.119D. 192.168.32.126E. 192.168.32.175F. 192.168.32.208 44: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?A. 198.57.78.33B. 198.57.78.64C. 198.57.78.97D. 198.57.78.97E. 198.57.78.159F. 198.57.78.254 45: What is the subnetwork address for a host with IP address 165.100.5.68/28?A. 165.100.5.0B. 165.100.5.32C. 165.100.5.64D. 165.100.5.65E. 165.100.5.31F. 165.100.5.1 46: Your boss wants to know what TCP stands for. What do you tell him?A. Transmission Check ProtocolB. Transport Check ProtocolC. Transmission Control ProtocolD. Transport Control Protocol 47: Your boss wants to know what UDP stands for. What do you tell him?A. Unreliable Data ProtocolB. Unreliable Data ProgramC. User-Defined ProtocolD. User Datagram Protocol 48: Which of the following statements accurately describes UDP?A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP). 49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)A. 10.20.12.64B. 172.16.32.129C. 172.64.32.34D. 192.168.23.252E. 196.104.12.95F. 214.192.48.254 50: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)A. Assign a public IP address.B. Use the shutdown command.C. Use the no shutdown command.D. Make sure the interface is running in full-duplex.(2)Basic IOS Configuration1: In which of the following modes in Cisco's IOS can you issue show commands? (Choose two.)A. UserB. PrivilegedC. Line ConfigurationD. Global Configuration 2: Yo u are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose two.)A. FTPB. TFTPC. SQLD. Oracle 3: You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?A. pingB. IPConfigC. tracerouteD. Show interface Ethernet 0 4: Which command would you use at the CLI in User mode to enter Privileged EXEC mode?A. PrivilegeB. AdminC. EnableD. Disable 5: You have just received 14 Catalyst switches for your network. You would like to install these switches into your production network to provide separate collision domains for each of the connected devices. What configuration is required to provide this functionality? A. No configuration is required.B. You must set up an IP address on the switch.C. You must configure unique VLANs on the switches.D. You must install the Cisco IOS. 6: Which of the following prompts indicates your router is in Privileged EXEC mode?A. Router>B. Router#C. Router&D. Router$ 7: You have made a console connection to your Cisco Catalyst switch and you see the > symbol in HyperTerminal. What does it mean?A. You are in Privileged EXEC mode.B. You are in User EXEC mode.C. The switch has not been configured.D. The switch is in need of repairs. 8: You would like to assign a meaningful name to your Catalyst switch. What command should you use?A. enableB. host nameC. hostnameD. name 9: You need to assign an IP address to your Catalyst 2950 switch. You are at the HQ_SW1> prompt. What is the correct series of commands? (cr = carriage return)A. enable ip address 10.1.1.1B. enable ip address 10.1.1.1 255.255.255.0C. enable configure terminal ip address 10.1.1.1255.255.255.0D. enable configure terminal interface vlan 1 ip address10.1.1.1 255.255.255.0 10: Which of the following commands displays the syntax for the clock command?A. cl?B. clock?C. clock ?D. cl ?11: Which of the following commands allows you to configure a welcoming message whenever you log in to a router?A. Router(config)# banner messageB. Router(config)# banner motd &C. Router# banner motd #D. Router# banner message ! 12: You need to connect to your 2621XM router to configure an interface. Which of the following methods allows you to connect to and issue commands on the router? (Choose three.) A. TelnetB. FTPC. Console connectionD. AUX connection 13: You want to prevent unauthorized users from plugging their laptops into the router. What type of password helps prevent this issue?A. vtyB. InterfaceC. ConsoleD. Enable 14: You have connected to the console port and are running HyperTerminal. You see only scrambled characters and symbols. What is the most likely solution to this problem?A. Change the connectors.B. Use a different Terminal program.C. Reset the router.D. Adjust the baud rate of your COM port.[View full size image] 15: Which of the following commands would you type to receive this output shown in the figure above?A. Show running-configB. Show startup-configC. Show ip routeD. Show version 16: You are configuring a router named East for authentication with a router named West using CHAP. What username should you configure on East to allow the routers to communicate?A. EastB. WestC. SouthD. North 17: What is the default point-to-point encapsulation protocol used on a Cisco router?A. PPPB. SLIPC. HDLCD. ATM 18: What type of handshake occurs with CHAP authentication?A. One-wayB. Two-wayC. Three-wayD. Mutual 19: You have connected to your Cisco router through a Telnet connection. To test one of your connections, you use a debug ip packet command. Even though you are sure traffic is passing through your router,nothing is reported in your terminal window. What is the most likely cause of this problem?A. There is no debug ip packet command.B. You need to type in the terminal monitor command to see debug output from a Telnet session.C. This command displays information only if the interface experiences trouble. No output indicates that the interface is fine.D. Cisco routers do not allow you to enable debug commands remotely due to security restrictions.[View full size image] 20: Which of the following commands would you type to see this output on your Cisco router shown in the previous figure?A. Show versionB. Show running-configC. Show startup-configD. Show router setup21: Which of the following commands would you type to see this output shown in the figure above?A. Show interface Ethernet 0/0B. Show ip interface detailC. Show interface Serial 0/1D. Show ip interface brief22: Your routers at ACME, Inc., are having someconnectivity issues. You issue show commands for each connecting router's interface. Why are they unable to communicate (see figures above)?A. Incorrect IP addressB. Wrong routing protocolC. Bad cableD. Encapsulation mismatch 23: You need to back up the configurations you just made, but no TFTP servers are available. Which of the following commands are options to back up your currently running configuration? (Choose two.)A. Router1#copy running-config startup-configB. Router1#copy running-config flashC. Router1#copy startup-config running-configD. Router1#copy running-config http 24: You are consulting a small business that is establishing its first WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose three.)A. Frame relayB. EthernetC. Token ringD. PPPE. HDLC 25: Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if he or she happens to view a configuration on your router. What command encrypts all passwords on your router?A. Router1#service password-encryptionB. Router1(config)#service password-encryptionC. Router1#enable secret passwordD. Router1(config)#enable secret password 26: You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?A. Acme1(config)# line console 0 Acme1(config-line)# password acme Acme1(config-line)# loginB. Acme1(config)# line vty 0 Acme1(config-line)# enable password acmeC. Acme1(config)# line vty 0 Acme1(config-line)# enable secret acme Acme1(config-line)# loginD. Acme1(config)# line vty 0 Acme1(config-line)# password acme Acme1(config-line)# login27: When you are setting up your serial interfaces, what does the clockrate command do for your connection?A. Establishes the timing at which you send dataB. Establishes keepalivesC. Establishes the advertised bandwidthD. Establishes the time on the router 28: You need to set up passwords on all your default Telnet lines. What command would you start with?A. Router1(config)#telnet configurationB. Router1(config)#interface Ethernet 0/1C. Router1(config)#line vty 1 5D. Router1(config)#line vty 0 4 29: You can execute show commands at which prompt? (Choose two.)A. Router1#B. Router1(config)#C. Router1(config-router)#D. Router1>E. romon1> 30: You are configuring your router and type in an Enable password and an Enable Secret password. Your fellow network technician asks you why you have two passwords set when you need only one. What do you tell him?A. The Enable password is used by low-level applications.B. If you reverted to an older version of the IOS, it would not understand the Secret password.C. Both passwords are treated the same.D. It is a failsafe method of ensuring that people need to type two passwords instead of just one.31: You need to get back to Privileged EXEC mode from Interface Configuration mode. What is the quickest method?A. Ctrl+Shift+6; then press XB. Ctrl+EscC. Ctrl+ZD. Type exit 32: When you are establishing a PPP link, which of the following would be negotiated? (Choose three.)A. IPCPB. CHAPC. UDPD. Q.931E. Multilink Protocol 33: Which of the following commands returns your router to a previously saved configuration?A. Router1#setupB. Router1#copy running-config startup-configC. Router1#copy startup-config running-configD. Router1#reload 34: You are in Interface Configuration mode and would like to recall the last command you typed, move your cursor to the beginning of the command line, and type no before the recalled command. You notice your up- and down-arrow keys do not function because you are using an older terminal program. What command combinations could you use to recall the previous command and move your cursor to the beginning of the line?Press Ctrl+P to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+L to recall the previous command and Ctrl+B to move to the beginning of the command line.Press Ctrl+D to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+E to recall the previous command and Ctrl+A to move to the beginning of the command line. 35: What is the baud rate setting for your terminal emulation program so that you can communicate through your console port?A. 2400B. 9600C. 14400D. 36300 36: What must be configured on a Cisco device to enable Telnet functionality?A. A management IP addressB. SNMPC. CDPD. vty ports 37: You are configuring your Cisco router and need to go back to User EXEC mode. What command takes you back to User EXEC mode?A. Router1#enableB. Router1#exitC. Router1#configure terminalD. Router1#disable 38: Which of the following commands places an IP address on your Catalyst switch?A. Switch1#ip address 10.2.2.2 255.255.255.0B. Switch1(config)#Set IP 10.2.2.2 255.255.255.0C. Switch1(config-vlan)#ip address 10.2.2.2D. Switch1(config-vlan)#ip address 10.2.2.2 255.255.255.0 39: Which of the following commands would you enter to receive this output shown in the figure above?A. Router1#show NVRAMB. Router1#show FlashC. Router1#show Flash-MemD. Router1#show Version 40: Your senior network administrator is unable to telnet to a Catalyst switch because she forgot the IP address. You have physical access and are able to console in. Which of the following commands is the best to get the IP address on the switch? A.Switch1#show ipB. Switch1#show vlan 1C. Switch1#show ip routeD. Switch1#show interface vlan141: You have powered up your Cisco 3640 router. The first thing you see is this output. Which of the following statements about this screen is accurate (see figure above)?A. Your IOS is corrupt and unable to load.B. Your configuration is missing parameters.C. You do not have a configuration saved in NVRAM.D. You have typed setup in the Privileged mode. 42: You type in a command and are shown the following output:% Ambiguous command: "show con"What does this mean?A. You did not enter enough characters for your device to recognize the command.B. You did not enter all the keywords or values required by this command.C. You entered the command incorrectly.D. Context-sensitive help is unable to help you with this command. 43: You are typing a command into the Cisco IOS.It is more than one terminal line long. What will the IOS do?A. The router automatically moves the cursor to the next line and uses a caret (^) to indicate the line break.B. The router truncates the command because commands longer than one line are not allowed.C. The router automatically scrolls the line to the left and uses a dollar sign ($) to indicate that there is text to the left of the $.D. The router shortens all the commands to squeeze the command on to the screen. 44: You want to change the size of the command history buffer. Which of the following commands will set it permanently to 100?A. Router1#terminal history 100B. Router1#history size 100C. Router1(config)#terminal history 100D. Router1(config-line)#history size 100 45: You have configured a description on your serial interfaces. Which of the following commands displays the description? (Choose two.)A. Show running-configB. Show flashC. Show interfacesD. Show ip protocols 46: You are typing commands into your Cisco IOS on your 3640 router. However, your typing is consistently interrupted by console messages, forcing you to retype. Which of the following commands forces the IOS to retype your original input after it displays the console message?A. Exec-timeoutB. Logging synchronousC. Line consoleD. Exec message readout 47: You are configuring a router and issue the command interface ethernet 1/0/0. What do the numbers represent?A. Slot/port/interfaceB. Slot/interface/portC. Port/slot/port numberD. Slot/port adapter/port number 48: Which of the following commands correctly sets the physical speed of a serial interface to 64Kbps?A. Router1(config-if)#bandwidth 64B. Router1(config-if)#bandwidth 64000C. Router1(config-if)#clockrate 64D. Router1(config-if)#clockrate 64000 49: In what mode do you use the encapsulation command?A. Interface Configuration modeB. Sub-interface Configuration modeC. User modeD. Privileged mode 50: You are configuring your router, and your boss happens to look over your shoulder as you type a show running-config command. She sees one of the lines that says password 7 14361F009A056E7D and asks what this means. What do you tell her?A. It is the actual password.B. It is the result of a service password-encryption command.C. The console output made a mistake.D. It is the result of an enable secret command.。

CSNA笔试题库(含答案)

CSNA笔试题库(含答案)

4.在Rip路由中设置管理距离是衡量一个路由可信度的等级,你可以通中星认证网络工程师CSNA理论试题题库一、单项选择题1.在R2624路由器发出的Ping命令中,“U”代表什么?A.数据包已经丢失B.遇到网络拥塞现象C.目的地不能到达D.成功地接收到一个回送应答2.IP地址是202.114.18.10,掩码是255.255.255.252,其广播地址是多少? 过定义管理距离来区别不同___来源。

路由器总是挑选具有最低管理距离的路由。

A.拓扑信息B.路由信息C.网络结构信息D.数据交换信息5.如何跟踪RIP路由更新的过程?A.show ip routeB.debug ip ripC.show ip ripD.clear ip route *A.202.114.18.255 6.配置了访问列表如下所示:access-list 101 permit 192.168.0.0B.202.114.18.12C.202.114.18.11D.202.114.18.83.IP、Telnet、UDP分别是OSI参考模型的哪一层协议?A.1、2、3B.3、4、5C.4、5、6D.3、7、4 0.0.0.255 10.0.0.0 0.255.255.255最后缺省的规则是什么A.允许所有的数据报通过B.仅允许到10.0.0.0的数据报通过C.拒绝所有数据报通过D.仅允许到192.168.0.0的数据报通过7.以下那一项不是增加VLAN带来的好处?A.交换机不需要再配置B.机密数据可以得到保护C.广播可以得到控制第1页8.静态路由协议的默认管理距离是?;rip路由协议的默认管理距离是?A.1,140B.1,120C.2,140D.2,120 A.A类B.B类C.C类D.D类E.E类9.RIP的最大跳数是:13.在访问列表中,有一条规则如下:access-list 131 permit ip anyA.24B.18C.15D.1210.Ethernet Hub的介质访问协议为?A.CSMA/CAB.Token-BusC.CSMA/CDD.Token-Ring11.IEEE802.1Q VLAN能支持的最大个数为?A.256B.1024C.2048D.4094 192.168.10.0 0.0.0.255 eq ftp在该规则中,any的意思是表示:A.检察源地址的所有bit位B.检查目的地址的所有bit位C.允许所有的源地址D.允许255.255.255.255 0.0.0.014.标准访问控制列表的序列规则范围在A.1-10B.0-100C.1-99D.1-10015.访问列表是路由器的一种安全策略,你决定用一个标准ip访问列表来做安全控制,以下为标准访问列表的例子为:A.access-list standart 192.168.10.23B.access-list 10 deny 192.168.10.23 0.0.0.0C.access-list 101 deny 192.168.10.23 0.0.0.012.192.108.192.0属于哪类IP地址?第2页D.access-list 101 deny 192.168.10.23 255.255.255.25516.交换机工作在OSI七层的哪一层?A.一层B.二层C.三层D.三层以上17.当RIP向相邻的路由器发送更新时,它使用多少秒为更新计时的时间值?A.30B.20C.15D.2518.IEEE的哪个标准定义了RSTP?A.IEEE802.3B.IEEE802.1C.IEEE802.1dD.IEEE802.1w19.如果子网掩码是255.255.255.128,主机地址为195.16.15.14,则在该子网掩码下最多可以容纳多少个主机?A.254B.126C.62D.3020.ip access-group {number} in这句话表示:A.指定接口上使其对输入该接口的数据流进行接入控制B.取消指定接口上使其对输入该接口的数据流进行接入控制C.指定接口上使其对输出该接口的数据流进行接入控制D.取消指定接口上使其对输出该接口的数据流进行接入控制21.IEEE802.1Q数据帧用多少位表示VID?A.10B.11C.12D.1422.S2126G交换机如何将接口设置为TAG VLAN模式?A.switchport mode tagB.switchport mode trunkC.trunk onD.set port trunk on23.在R2624路由器发出的Ping命令中,“!”代表什么?A.数据包已经丢失B.遇到网络拥塞现象C.目的地不能到达D.成功地接收到一个回送应答第3页B.MPEG24.如何在R2624路由器上测试到达目的端的路径?A.tracertB.pathpingC.tracerouteD.ping <IP address>25.下列哪些属于工作在OSI传输层以上的网络设备?A.集线器B.中继器C.交换机D.路由器E.网桥F.服务器26.190.188.192.100属于哪类IP地址?A.A类B.B类C.C类D.D类E.E类27.下列哪些是应用层的例子?A.ASCIIC.JPEGD.HTTP28.RIP对应的端口号是什么?A.25B.23C.520D.6929.建立TCP连接需要几个数据段?A.2B.3C.4D.130.校园网设计中常采用三层结构,S1908主要应用在哪一层?A.核心层B.分布层C.控制层D.接入层31.下列哪个应用既使用TCP又使用UDP?A.telnetB.DNS第4页C.httpD.WINS32.对应OSI参考模型的网络层在TCP/IP定义叫什么名称?A.应用层B.网际层C.会话层D.传输层33.下列哪些属于RFC1918指定的私有地址?A.10.1.2.1B.224.106.9.10C.191.108.3.5D.172.33.10.934.下列哪些访问列表范围符合IP范围的扩展访问控制列表?A.1-99B.100-199C.800-899D.900-99935.如何跟踪RIP路由更新的过程?A.show ip routeB.debug ip ripC.show ip ripD.clear ip route *36.STP交换机缺省的优先级为:A.0B.1C.32767D.3276837.IP报文中,固定长度部分为多少字节?A.10B.20C.30D.4038.IEEE制定实现STP使用的是下列哪个标准?A.IEEE 802.1WB.IEEE 802.3ADC.IEEE 802.1DD.IEEE 802.1X39.下列哪些属于有类路由选择协议?A.RIPV1B.OSPFC.RIPV2D.静态路由第5页40.R2624路由器如何验证接口的ACL应用? D.系统加密A.show int B.show ip int C.show ip D.show access-list 44、设计网络时应控制冲突域的规模,使网段中的(化。

ccna考试题及答案

ccna考试题及答案

ccna考试题及答案1. 以下哪项是网络层的功能?A. 路由选择B. 错误检测C. 流量控制D. 封装数据包答案:A2. 在OSI模型中,哪一层负责在网络中传输数据?A. 应用层B. 传输层C. 会话层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中发现网络设备的?A. ARPB. RARPC. ICMPD. OSPF答案:A4. 在TCP/IP模型中,哪一层与OSI模型的传输层相对应?A. 应用层B. 互联网层C. 网络接口层D. 传输层答案:D5. 以下哪个地址是一个有效的IPv4地址?A. 192.168.1.256B. 192.168.1.1C. 10.0.0.0D. 172.16.300.1答案:B6. 在配置路由器时,以下哪个命令用于进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B7. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show configD. show current-config答案:A8. 在Cisco设备上,以下哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. save startup-config答案:A9. 以下哪个命令用于在Cisco设备上查看所有接口的状态?A. show interfacesB. show ip interface briefC. show interface statusD. show running-config interface答案:B10. 在Cisco设备上,以下哪个命令用于关闭接口?A. shutdownB. no shutdownC. disableD. no enable答案:A11. 以下哪个命令用于在Cisco设备上启用接口?A. shutdownB. no shutdownC. disableD. no enable答案:B12. 在配置静态路由时,以下哪个命令用于指定下一跳地址?B. ip static-routeC. route ipD. static-route ip答案:A13. 以下哪个命令用于在Cisco设备上清除ARP表?A. clear arp-cacheB. clear arpC. clear arp tableD. clear ip arp答案:D14. 在配置动态路由协议时,以下哪个命令用于在接口上启用RIP?A. ip rip enableB. ip rip receiveD. network rip答案:C15. 以下哪个命令用于在Cisco设备上查看RIP路由表?A. show ip ripB. show ip route ripC. show ripD. show ip protocols答案:B16. 在配置EIGRP时,以下哪个命令用于指定自动汇总?A. metric weightsB. auto-summaryC. network auto-summaryD. no auto-summary答案:B17. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. show ip eigrp neighborsB. show eigrp neighborsC. show ip eigrpD. show eigrp interfaces答案:A18. 在配置OSPF时,以下哪个命令用于指定路由器ID?A. router-idB. router ospfC. networkD. area答案:A19. 以下哪个命令用于在Cisco设备上查看OSPF路由表?A. show ip ospfB. show ip ospf databaseC. show ospfD. show ip route ospf答案:D20. 在配置VLAN时,以下哪个命令用于创建一个新的VLAN?A. vlan databaseB. configure terminalC. vlan [vlan-id]D. new-vlan答案:C21. 以下哪个命令用于将接口分配给VLAN?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:C22. 在配置交换机时,以下哪个命令用于将接口设置为Trunk 模式?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:B23. 以下哪个命令用于在Cisco设备上查看VLAN配置?A. show vlanB. show vlan briefC. show vlan detailD. show vlan all答案:B24. 在配置VTP时,以下哪个命令用于将交换机设置为VTP服务器模式?A. vtp mode serverB. vtp mode clientC. vtp mode transparentD. vtp mode off答案:A25. 以下哪个命令用于在Cisco设备上查看VTP状态?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A26. 在配置STP时,以下哪个命令用于设置根桥?A. spanning-tree root primaryB. spanning-tree root secondaryC. spanning-tree root primary [priority]D. spanning-tree root secondary [priority]答案:C27. 以下哪个命令用于在Cisco设备上查看STP状态?A. show spanning-treeB. show spanning-tree detailC. show spanning-tree summaryD. show spanning-tree interface答案:A28. 在配置VLAN Trunking Protocol (VTP) 时,以下哪个命令用于设置VTP域名?A. vtp domain [domain-name]B. vtp password [password]C. vtp mode [mode]D. vtp version [version]答案:A29. 以下哪个命令用于在Cisco设备上查看当前的VTP版本?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A30. 在配置端口安全时,以下哪个命令用于限制接口上可以学习到的最大MAC地址数量?A. switchport port-security maximum [mac-count]B. port-security maximum [mac-count]C. switchport port-security violation restrictD. port-security violation shutdown答案:A这些题目和答案仅供学习和参考之用,实际的CCNA考试内容和形式可能会有所不同。

ccna考试题库

ccna考试题库

ccna考试题库1. OSI参考模型是一种用于计算机网络体系结构设计的理论框架。

该模型将网络通信过程分解为七个不同的层次,从物理传输到应用层。

以下是关于OSI参考模型的一些考试题目:题目1:在OSI参考模型中,哪一层负责物理传输?题目2:在OSI参考模型中,哪一层负责定义传输协议,如TCP和UDP?题目3:在OSI参考模型中,哪一层负责进行错误检测和纠正,以确保数据传输的可靠性?解答1:在OSI参考模型中,物理层负责物理传输。

该层处理物理介质、电流、光信号等与实际传输相关的细节。

解答2:在OSI参考模型中,传输层负责定义传输协议,如TCP和UDP。

该层确保数据能够从源到目的地的可靠传输,并进行流量控制和拥塞控制。

解答3:在OSI参考模型中,数据链路层负责进行错误检测和纠正,以确保数据传输的可靠性。

该层在物理介质上建立连接,并处理数据帧的传输和错误检测。

2. IP地址是一个用于在计算机网络中标识和定位主机或网络设备的数字地址。

以下是一些与IP地址相关的考试题目:题目1:IPv4地址由几个字节组成?题目2:IPv6地址是IPv4地址的新版本,它采用了什么样的地址格式?题目3:在IPv4地址中,私有地址范围是哪些?解答1:IPv4地址由四个字节组成,每个字节用十进制表示,范围从0到255。

解答2:IPv6地址是IPv4地址的新版本,它采用了128位的地址格式,通常采用十六进制表示。

IPv6地址的格式为8个以冒号分隔的四位十六进制数。

解答3:在IPv4地址中,私有地址范围是以下三个:- 10.0.0.0至10.255.255.255- 172.16.0.0至172.31.255.255- 192.168.0.0至192.168.255.2553. VLAN(虚拟局域网)是一种通过逻辑方式将网络划分为多个虚拟局域网的方法。

以下是一些与VLAN相关的考试题目:题目1:VLAN是在哪一层进行的逻辑划分?题目2:VLAN划分可以基于哪些因素?题目3:VLAN之间的通信如何实现?解答1:VLAN是在数据链路层进行的逻辑划分。

2022年CCNA认证试题及答案

2022年CCNA认证试题及答案

2022年CCNA认证试题及答案1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住.1-------.5的定义以太网是一种计算机局域网组网技术。

IEEE制定的IEEE 802.3标准给出了以太网的技术标准。

它规定了包括物理层的连线、电信号和介质访问层协议的内容。

以太网是当前应用最普遍的局域网技术。

它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。

以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE-T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C某某某A/CD介质访问控制方法。

电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会。

建会于1963年1月1日。

总部在美国纽约市。

在150多个国家中它拥有300多个地方分会。

目前会员数是36万。

专业上它有35个专业学会和两个联合会。

IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议。

IEEE定义的标准在工业界有极大的影响。

下面列出:.3以太网标准802.3--------- 10Base以太网标准802.3u-------- 100Base-T(快速以太网)802.3z-------- 1000Base-某(光纤吉比特以太网)802.3ab-------- 1000Base-T(双绞线吉比特以太网)2、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ( )(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位192.168.19.255/20划为二进制为:..00010011. (00000000)主机位变成全0表示这个IP的.网络地址主机槐涑扇?表示这个IP的广播地址文件规定了保留作为局域网使用的私有地址:10.0.0.0 - 10.255.255.255 (10/8 prefi某)172.16.0.0 - 172.31.255.255 (172.16/12 prefi某)192.168.0.0 - 192.168.255.255 (192.168/16 prefi某)3、Quidway系列路由器在执行数据包转发时,下列哪些项没有发生变化(假定没有使用地址转换技术)?( )(A) 源端口号(B) 目的端口号(C) 源网络地址(D) 目的网络地址(E) 源MAC地址(F) 目的MAC地址答案:ABCD参考知识点:路由功能就是指选择一条从源网络到目的网络的路径,并进行数据包的转发。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

QUESTION 101Refer to the exhibit. The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a frame leaving host A. What can be concluded from this informationA. The MAC address of host A isB. The router will forward the packet in this frame to the Internet.C. The switch will only forward this frame to the attached router interface.D. All devices in this LAN except host A will pass the packet to Layer 3.QUESTION 102What is an appropriate use of a default routeA. to provide routing to a local web serverB. to provide routing from an ISP to a stub networkC. to provide routing that will override the configured dynamic routing protocolD. to provide routing to a destination that is not specified in the routing table and which is outside the local networkQUESTION 103Refer to the exhibit. A junior network engineer has prepared the exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1 (Choose two.)A. The two FastEthernet interfaces will require NAT configured on two outside serial interfaces.B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.C. The fa0/1 IP address overlaps with the space used by s0/0.D. The fa0/1 IP address is invalid for the IP subnet on which it resides.E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is shown.QUESTION 104Refer to the exhibit. Two routers have just been configured by a new technician. All interfaces are up. However, the routers are not sharing their routing tables. What is the problemA. Split horizon is preventing Router2 from receiving routing information from Router1.B. Router1 is configured for RIP version 2, and Router2 is configured for RIP version1.C. Router1 has an ACL that is blocking RIP version 2.D. There is a physical connectivity problem between Router1 and Router2.E. Router1 is using authentication and Router2 is not.QUESTION 105A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of /24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have40 hosts in each of the three subnetsA. Convert all the routers to EIGRP and use /27, /27, and/27 as the new subnetworks.B. Maintain the use of RIP version 1 and use /27, /27, and as the new subnetworks.C. Convert all the routers to EIGRP and use /26, /26, and as the new subnetworks.D. Convert all the routers to RIP version 2 and use /26, /26, and as the new subnetworks.E. Convert all the routers to OSPF and use /28, /28, and/28 as the new subnetworks.F. Convert all the routers to static routes and use /28, /28, andQUESTION 106Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1A. It has more than one interface that is connected to the root network segment.B. It is running RSTP while the elected root bridge is running spanning tree.C. It has a higher MAC address than the elected root bridge.D. It has a higher bridge ID than the elected root bridge.QUESTION 107Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding roleA. Switch3, port fa0/1B. Switch3, port fa0/12C. Switch4, port fa0/11D. Switch4, port fa0/2E. Switch3, port Gi0/1F. Switch3, port Gi0/2QUESTION 108Refer to the exhibit. How many paths can the EIGRP routing process use to forward packets from HQ_Router to a neighbor routerA. two equal-cost pathsB. two unequal-cost pathsC. three equal-cost pathsD. three unequal-cost pathsE. four equal-cost pathsF. four unequal-cost pathsQUESTION 109Select the action that results from executing these commands.Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyA. A dynamically learned MAC address is saved in the startup-configuration file.B. A dynamically learned MAC address is saved in the running-configuration file.C. A dynamically learned MAC address is saved in the VLAN database.D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.QUESTION 110Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.2950Switch(config-if)# switchport port-security2950Switch(config-if)# switchport port-security mac-address sticky2950Switch(config-if)# switchport port-security maximum 1The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch (Choose two.)A. The MAC address table will now have an additional entry of fa0/1B. Only host A will be allowed to transmit frames on fa0/1.C. This frame will be discarded when it is received by 2950Switch.D. All frames arriving on 2950Switch with a destination of will be forwarded out fa0/1.E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.F. Only frames from source the first learned MAC address of 2950Switch, will be forwarded out fa0/1.QUESTION 111Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations.What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended useA. Configure static entries in the switch MAC address table to include the range of addresses used by visiting employees.B. Configure an ACL to allow only a single MAC address to connect to the switch at one time.C. Use the mac-address-table 1 global configuration command to limit each port to one source MAC address.D. Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.E. Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address.F. Implement Port Security at global configuration mode and use the port-securitymaximum 1 command to allow each switch only one attached hub.QUESTION 112Running both IPv4 and IPv6 on a router simultaneously is known as whatA. 4to6 routingB. 6to4 routingC. binary routingD. dual-stack routingE. NextGen routingQUESTION 113What are three IPv6 transition mechanisms (Choose three.)A. 6to4 tunnelingB. VPN tunnelingC. GRE tunnelingD. ISATAP tunnelingE. PPP tunnelingF. Teredo tunnelingQUESTION 114Identify the four valid IPv6 addresses. (Choose four.)A. ::B. ::192:168:0:1C. 2000::D. 2001:3452:4952:2837::E. 2002:c0a8:101::42F. 2003:dead:beef:4dad:23:46:bb:101QUESTION 115Which protocol should be used to establish a secure terminal connection to a remote network device Select the best response.A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2QUESTION 116Refer to the exhibit. A network administrator wants Switch3 to be the root bridge. What could be done to ensure Switch3 will be the rootA. Configure the IP address on Switch3 to be higher than the IP addresses of Switch1 and Switch2.B. Configure the priority value on Switch3 to be higher than the priority values of Switch 1 and Switch2.C. Configure the BID on Switch3 to be lower than the BIDs of Switch1 and Switch2.D. Configure the MAC address on Switch3 to be higher than the Switch1 and Switch2 MAC addresses.E. Configure a loopback interface on Switch3 with an IP address lower than any IP address on Switch1 and Switch2.QUESTION 117What is the maximum data rate specified for IEEE WLANsA. 10 MbpsB. 11 MbpsC. 54 MbpsD. 100 MbpsQUESTION 118How does using the service password encryption command on a router provide additional securityA. by encrypting all passwords passing through the routerB. by encrypting passwords in the plain text configuration fileC. by requiring entry of encrypted passwords for access to the deviceD. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE. by automatically suggesting encrypted passwords for use in configuring the routerQUESTION 119Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router BA. The loopback addresses are on different subnets.B. The value of the dead timers on the router are different.C. Route summarization is enabled on both routers.D. The process indentifier on router A is different than the process identifier on router B.QUESTION 120Refer to the exhibit. What statement is true of the configuration for this networkA. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.C. The number 1 referred to in the ip nat inside souce command recerences access-list number 1.D. ExternalRouter must be configured with static routers to network /24QUESTION 121Refer to the exhibit. The network is link-state advertisements are received from Router_A, what information will Router_E contain in its routing table for the subnets andA. [110/13] via , 00:00:00:07, FastEthernet0/0[110/13] via , 00:00:00:16, FastEthernet0/0B. [110/1] via , 00:00:00:07, Serial1/0[110/3] via , 00:00:00:16, FastEthernet0/0C. [110/13] via , 00:00:00:07, Serial1/0[110/13] via , 00:00:00:16, Serial1/0[110/13] via , 00:00:00:16, FastEthernet0/0D. [110/13] via , 00:00:00:07, Serial1/0[110/13] via , 00:00:00:16, Serial1/0QUESTION 122Refer to the exhibit. The company uses EIGRP as the routing protocol. What path will packets take from a host on /26 network to a host on the LAN attached to router R1A. The path of the packets will be R3 to R2 to R1.B. The path of the packets will be R3 to R1 to R2.C. The path of the packets will be both R3 to R2 to R1 and R3 to R1.D. The path of the packets will be R3 to R1QUESTION 123Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE trunk to another switch. Based on the output shown, What is the reason the trunk does not form, even thought the proper cabling has been attachedA. VLANs have not been created yet.B. An IP address must be configured for the port.C. The port is currently configured for access mode.D. The correct encapsulation type has not been configured.E. The no shutdown command has not been entered for the portQUESTION 124Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printersA. Switch1B. Switch2C. Switch3D. Switch4QUESTION 125An administrator issues the command ping from the command line prompt on a PC. If a reply is received, what does this confirmA. The PC has connectivity with a local host.B. The PC has connectivity with a Layer 3 device.C. The PC has a default gateway correctly configuredD. The PC has connectivity up to Layer 5 of the OSI modelE. The PC has the TCP/IP protocol stack correctly installed.。

相关文档
最新文档