CCNA第一学期第八章答案

合集下载

思科 CCNA 学习试题 答案!!!

思科 CCNA 学习试题 答案!!!

思科 CCNA 学习试题答案思科ccna学习试题答案CCNA课程测试一、单项选择题:1.媒体100BaseT的最大传输距离为:()a:10MB:100mc:1000md:500M2、路由器下,由一般用户模式进入特权用户模式的命令是:()a:enableb:configc:interfaced:router3、哪个命令可以成功测试网络:()a:router>ping192.5.5.0b:router#ping192.5.5.30c:router>ping192.5.5.256d:router#ping192.5.5.2554、介质工作在osi的哪一层()a:物理层B:数据链路层C:网络层D:传输层5。

100BaseT的速率为()Mbit/SA:1b:10C:100D:10006、在启用igrp协议时,所需要的参数是:()a:网络掩码b:子网号c:自治系统号d:跳数7、基本ip访问权限表的表号范围是:()a:1―100b:1-99c:100-199d:800-8998、查看路由表的命令是:()a:ShowInterface B:showrunc:showiprouted:showtable9、工作在osi第三层的设备是:()a:网卡b:路由器c:交换机d:集线器10、osi第二层数据封装完成后的名称是:()a:比特b:包c:帧d:段11.为了禁止网络210.93.105.0 FTP到网络223.8.151.0并允许其他信息传输,可以实现此功能的选项有:()a:access-list1deny210 93.105.0.0.0.0.0.0b:access-list100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpc:access-List100Permitipanyd:access-list100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpaccess-list100permitipanyany12.路由器下“特权用户模式”的标识符为:()a:>b:!c:#d:#配置如果)#13。

思科CCNA1第八章试题及答案英文版

思科CCNA1第八章试题及答案英文版

1. 1. QuestionWhat is a result of connecting two or more switches together?o The number of broadcast domains is increased.o The size of the broadcast domain is increased.o The number of collision domains is reduced.o The size of the collision domain is increased.2. 2. QuestionRefer to the exhibit. How many broadcast domains are there?CCNA1 v6.0 Chapter 8 Exam 005o 1o 2o 3o43. 3. QuestionWhat are two reasons a network administrator might want to create subnets?(Choose two.)o simplifies network designo improves network performanceo easier to implement security policieso reduction in number of routers neededo reduction in number of switches needed4. 4. QuestionRefer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?CCNA1 v6.0 Chapter 8 Exam 007o 255.255.255.0o 255.255.255.128o 255.255.255.192o 255.255.255.224o 255.255.255.2405. 5. QuestionRefer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has beensubnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the newnetwork (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?CCNA1 v6.0 Chapter 8 Exam 004o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46o IP address: 192.168.10.254 subnet mask: 255.255.255.0, defaultgateway: 192.168.10.16. 6. QuestionIf a network device has a mask of /28, how many IP addresses are available for hosts on this network?o 256o 254o 62o 32o 16o 147. 7. QuestionWhich subnet mask would be used if 5 host bits are available?o 255.255.255.0o 255.255.255.128o 255.255.255.224o 255.255.255.2408. 8. QuestionHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?o 510o 512o1022o 1024o 2046o 20489. 9. QuestionHow many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?o twoo threeo fouro five10. 10. QuestionA network administrator wants to have the same network mask for allnetworks at a particular small site. The site has the following networks and number of devices:IP phones – 22 addressesPCs – 20 addresses neededPrinters – 2 addresses neededScanners – 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?o 255.255.255.0o 255.255.255.192o 255.255.255.224o 255.255.255.240o 255.255.255.248o 255.255.255.25211. 11. QuestionA company has a network address of 192.168.1.64 with a subnet mask of255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks wouldachieve that? (Choose two.)o 192.168.1.16/28o 192.168.1.64/27o 192.168.1.128/27o 192.168.1.96/28o 192.168.1.192/2812. 12. QuestionA network administrator is variably subnetting a network. The smallestsubnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?o 4o 6o 8o 10o 1213. 13. QuestionRefer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?CCNA1 v6.0 Chapter 8 Exam 001o 56o 60o 64o 68o7214. 14. QuestionRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?CCNA1 v6.0 Chapter 8 Exam 002o 10.16.10.160/26o 10.16.10.128/28o 10.16.10.64/27o 10.16.10.224/26o 10.16.10.240/27o 10.16.10.240/2815. 15. QuestionA network administrator needs to monitor network traffic to and fromservers in a data center. Which features of an IP addressing scheme should be applied to these devices?o random static addresses to improve securityo addresses from different subnets for redundancyo predictable static IP addresses for easier identificationo dynamic addresses to reduce the probability of duplicate addresses 16. 16. QuestionWhich two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)o It eliminates most address configuration errors.o It ensures that addresses are only applied to devices that require apermanent address.o It guarantees that every device that needs an address will get one.o It provides an address only to devices that are authorized to be connected to the network.o It reduces the burden on network support staff.17. 17. QuestionA DHCP server is used to assign IP addresses dynamically to the hosts on anetwork. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?o 254o251o 252o 25318. 18. QuestionRefer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the s ite subsection to represent multiple geographical sites of the company, the s ub-site section to represent multiple campuses at each site, and thes ubnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achievedper sub-site?CCNA1 v6.0 Chapter 8 Exam 003o 0o 4o16o 25619. 19. QuestionWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?o 2001:DB8:BC15o 2001:DB8:BC15:Ao 2001:DB8:BC15:A:1o 2001:DB8:BC15:A:1220. 20. QuestionConsider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is /6021. 21. QuestionMatch the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 0122. 22. QuestionRefer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 006。

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案描述载波侦听多路由访问/冲突检测(CSMA/CD)的工作原理。

CSMA/CD是一种帮助设备均衡共享带宽的协议,可避免两台设备同时在网络介质上传输数据。

虽然他不能消除冲突,但有助于极大的减少冲突,进而避免重传,从而提高所的设备的数据传输效率。

区分半双工和全双工通信。

并指出两种方法的需求。

与半双工以太网使用一对导线不同,全双工以太网使用两队导线,全双工使用不同的导线来消除冲突,从而允许同时发送和接收数据,而半双工可接收或发送数据,但不能同时接收和发送数据,且仍会出现冲突。

要使用全双工,电缆两端的设备都必须支持全双工,并配置成一全双模式运行。

描述MAC地址的组成部分以及各部分包含的信息。

MAC(硬件)地址时一种使用十六进制表示的地址,长48位(6B)。

其中前24位(3B)称为OUI(Organizationally Unique Idebtifier,组织唯一表示符),有IEEE分配给NIC制造商;余下的部分呢唯一地标识了NIC识别十进制数对应的二进制值和十六进制值。

用这三种格式之一表示的任何数字都可以转换为其他两种格式,能够执行这种转换对理解IP地址和子网划分至关重要。

识别以太网帧中与数据链路层相关的字段。

在以太网中,与数据链路层相关的字段包括前导码,帧其实位置分隔符,目标MAC地址,源MAC地址,长度或者类型以及帧校验序列。

识别以太网布线相关的IEEE标准。

这些标准描述了各种电缆类型的功能和物理特征,包括(但不限于)10Base2、10Base5和10BaseT。

区分以太网电缆类型及其用途。

以太网电缆分3种:直通电缆,用于将PC或路由器的以太网接口连接到集线器或交换机;交叉电缆。

用于将集线器连接到集线器,集线器连接到交换机,交换机连接到交换机以及PC连接到PC;反转电缆,用于PC和路由器或交换机之间建立控制台连接。

描述数据封装过程及其在分组创建中的作用。

数据封装指的是在OSI模型各层给数据添加信息的过程,也成为分组创建。

最新 CCNA第二学期章节测试 第八章 答案

最新 CCNA第二学期章节测试  第八章 答案

参加考试- ERouting Chapter 8 - CCNA Exploration: 路由协议和概念(版本 4.0) 1请参见图示。

下列哪项陈述能够正确描述该网络?错误!未找该网络使用EIGRP到引用源。

错误!未找至少包含一条父路由和一条子路由到引用源。

错误!未找192.168.2.0、192.168.3.0 和192.168.4.0 网络是子路由到引用源。

错误!未找发往172.16.3.0 的流量将被引导至s 0/0/1到引用源。

2请参见图示。

路由器 B 接收到目的地址为10.16.1.97 的数据包。

路由器 B 将会做什么?错误!未找丢弃数据包到引用源。

错误!未找使用默认路由到引用源。

错误!未找通过到10.16.1.0 的路由转发该数据包到引用源。

错误!未找通过到10.16.1.64 的路由转发该数据包到引用源。

3请参见图示。

Router1 将对172.16.0.0/24 网络的子路由应用什么子网掩码?错误!未找0.0.0.0到引用源。

错误!未找255.255.0.0到引用源。

错误!未找255.255.255.0到引用源。

错误!未找255.255.255.255到引用源。

4请参见图示。

Router1 正在运行IOS 第12.2 版。

网络管理员需要做什么工作才能确保发往172.16.0.0/24 未知子路由的数丢弃?错误!未找使用ip default-network命令到引用源。

错误!未找使用RIPv1 之类的有类路由协议到引用源。

错误!未找启用OSPF 或ISIS 作为路由协议到引用源。

错误!未找使用ip classless命令到引用源。

错误!未找什么都不用做,默认会启用ip classless到引用源。

5路由表中显示以下条目:R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1这是哪种类型的路由?错误!未找1 级父路由到引用源。

CCNA认证基础课程-课后作业.习题答案

CCNA认证基础课程-课后作业.习题答案

CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。

2023年CCNA考试真题答案分析

2023年CCNA考试真题答案分析

2023年CCNA考试真题答案分析作为全球性的IT认证考试之一,CCNA(Cisco Certified Network Associate)考试一直以来都备受关注。

2023年CCNA考试的真题是许多考生关注的焦点。

下面将对2023年CCNA考试的真题答案进行分析,旨在帮助考生更好地了解考试的内容和要求。

一、第一题:在OSPF协议中,下面哪个区域是Stub区域?答案:区域0(Area 0)分析:OSPF(Open Shortest Path First)是一种广泛使用的内部网关协议(IGP)。

在OSPF中,区域被用于划分网络,Stub区域是指一个没有外部路由进入的区域。

在OSPF中,区域0通常被称为Backbone区域,是所有其他区域的集线器。

因此,区域0是Stub区域。

二、第二题:在TCP/IP协议栈中,下面哪个协议负责将IP地址转换为MAC地址?答案:ARP(Address Resolution Protocol)分析:ARP是一种用于将IP地址转换为MAC地址的协议,它工作在TCP/IP协议栈的网络层和数据链路层之间。

当一个主机需要发送数据包到目标主机时,它首先会查询ARP缓存表,如果找不到目标主机的MAC地址,则会发送ARP请求广播,请求目标主机回应其MAC地址。

三、第三题:在VLAN中,下面哪个协议用于实现不同VLAN之间的通信?答案:路由协议或三层交换机分析:VLAN(Virtual Local Area Network)是一种实现逻辑隔离的技术,可以将物理上的网络划分为多个逻辑上的网络。

不同VLAN之间的通信需要通过路由器或三层交换机来实现。

路由器可以实现不同VLAN之间的互联,而三层交换机具备路由功能,可以在交换机内部实现不同VLAN之间的通信。

四、第四题:以下哪种网络攻击会使用大量的伪造的IP数据包来淹没目标网络?答案:DDoS(Distributed Denial of Service)分析:DDoS是一种分布式拒绝服务攻击,攻击者会利用多个主机发送大量的伪造IP数据包到目标网络,造成网络堵塞、服务不可用等问题。

CCNA第一学期各章习题及答案

CCNA第一学期各章习题及答案

诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61第十一章配置和测试网络P62-70第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。

此类网络由由一个组织管理。

LAN 中的不同网段之间一般通过租用连接的方式连接。

此类网络的安全和访问控制由服务提供商控制。

LAN 为同一个组织内的用户提供网络服务和应用程序访问。

此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。

所示网络属于哪一类型WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。

下列哪组设备仅包含终端设备A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I、J010 选择关于网络协议的正确陈述。

(完整版)ccna1章节与期末答案

(完整版)ccna1章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。

ccna1章节与期末答案

ccna1章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

最新CCNA第一学期第八章答案

最新CCNA第一学期第八章答案

最新CCNA第一学期第八章答案最新CCNA第一学期第八章答案最新CCNA第一学期第八章答案IPv4 地址分为两个部分:网络部分- 用于识别主机所在的特定网络,主机部分- 用于识别网络中的特定主机。

子网掩码用于识别各个部分的长度。

255.255.255.224 的二进制格式为***-*****.***-*****.***-*****.***-*****。

前缀长度是掩码中连续的1 的个数。

因此,前缀长度为/27。

最新CCNA第一学期第八章答案定向广播是将消息发送到特定网络中的所有主机。

它适用于将广播发送到非本地网络中的所有主机。

组播消息是将消息发送到订阅组播组中的一组选定主机。

有限广播只限于将消息发送到本地网络中的主机。

单播消息是将消息从一台主机发送到另一台主机。

许多协议使用广播,因此无法避免。

路由器不转发广播,因此会在其每个接口形成一个广播域。

IPv6 中没有广播。

如果交换机收到广播数据包,它将通过除入站接口以外的所有接口转发此数据包。

6、DHCP 服务器用于为网络上的主机动态分配IP 地址。

地址池配置为192.168.10.0/24。

该网络中有3 台打印机需要使用池中保留的静态IP 地址。

池中有多少IP 地址分配给其他主机?如果分配给池的地址块是192.168.10.0/24,则网络上的主机可分配到254 个IP 地址。

由于有3 台打印机需要静态分配地址,则剩余251 个IP 地址可供分配。

最新CCNA第一学期第八章答案7、下列哪种网络迁移技术可以把IPv6 数据包封装在IPv4 数据包中,以便通过IPv4 网络基础架构进行传输?隧道迁移技术可将IPv6 数据包封装在IPv4 数据包中。

封装过程中会组装消息并向每一层添加信息,以便通过网络传输数据。

转换迁移技术允许支持IPv6 的设备与支持IPv4 的设备使用类似于IPv4 中NAT 的转换技术进行通信。

双堆栈迁移技术允许IPv4 和IPv6 协议栈在同一网络中同时共存。

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案第二章网络通信1、TCP/IP网络接入层有何作用?A路径确定和数据包交换B数据表示、编码和控制C可靠性、流量控制和错误检测E将数据段划分为数据包2、下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)B发起数据通信D发送数据流F数据流最后的终止点3、下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)C LAN 中的不同网段之间一般通过租用连接的方式连接。

D此类网络的安全和访问控制由服务提供商控制。

F此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU?A传输期间的帧损坏B在目的设备上重组的数据C因通信丢失而重新传输的数据包005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)018哪个应用层协议通常用于支持客户端与服务器之间的文件传输?A HTMLB HTTP D Telnet019哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?A DHCPB DNS D SMTP E Telnet020服务器上的应用层通常如何处理多客户端服务请求?A终止与服务的所有连接B拒绝与单一守护程序的多个连接C暂停当前连接,建立新连接第四章OSI传输层001下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)A流量控制 D 面向连接E 序列和确认002请参见图示。

此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?A会话创建B 数据段重传C 数据传输D 会话断开003数据段的TCP 报头中为什么包含端口号?A指示转发数据段时应使用的正确路由器接口B 标识接收或转发数据段时应使用的交换机端口C确定封装数据时应使用的第3 层协议让接收主机转发数据到适当的应用程序E让接收主机以正确的顺序组装数据包004OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?A应用层 B 表示层 C 会话层传输层 E 网络层005请参见图示。

CCNA第一学期各章知识题及答案解析

CCNA第一学期各章知识题及答案解析

诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14 第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61 第十一章配置和测试网络P62-70 第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用?路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)LAN 通常位于一个地域内。

此类网络由由一个组织管理。

LAN 中的不同网段之间一般通过租用连接的方式连接。

此类网络的安全和访问控制由服务提供商控制。

LAN 为同一个组织内的用户提供网络服务和应用程序访问。

此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU?传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。

所示网络属于哪一类型?WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备?管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么?标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。

(完整版)CCNA第一学期第一章答案

(完整版)CCNA第一学期第一章答案

CCN/第一学期第一章答案1选择网络介质时应遵循珈两个标准?(请进择两项。

)正确您的响应响应需要优宪处理的埶据樂型网络上使用的终端设毎的成末4仲质可以成功倍送信号的拒葛安装在网络中的中i可设备的敎里/ 要安装介质的环愷2网络上的中间设备有哪两项功能?(请选择两项*)G应G应它们是址终端设备提供:信息和服务的主娶来源和提仪者。

匚它们运行应用程序来支持业务协作。

它们冊咸T以人为本的冋络与底层通信网络之间的界页。

它们在发生議路故障时按照备用路筈转发数摇4V 它们根捋安全设蛊过澹敎据淙。

3哪种设备的功能退确定消息在网麻网络中传输的路径?正确您的“ 路由器防火埴Web服势3!DSL调制晞调器Io IB G请参见图示。

下列哪组设备仅包含中间设备?正确您的响应响应G O A.B、D、GAx B\ E\ FC \D \ G、IG、H、I、J5下列有关LAN和WAN两者关系的说法,哪两项是正确的?(请选择两项。

)正咅您的LAN和W2I均能连接终端设备。

丿匚与LAN连接内部终训i殳旨%比,WAN连擾LAN於注觅速厦较低。

Inta mot 届于WAUWAN必须呈扯牡的・而L AN可囚由公有或私有实休拥有。

“ 匚WAN進常通过多个ISP运营.面LAN通常由一个组狽或个人运昏6曰于许多学生芒者自己的平仮电胞和智能手机去学校访问学校资源,大学里的IT人员最冇可能路要亘新设计的网络区域是什么?EM有线LAN孜LAN7家庭用户必须要有哪种网络类型访问才能进行网上购物?正确您的响应响应c內部网" Internet外联网局域网8下列哪两个Internet连接选项不斋要建筑物铺设物理电缆?(请选择两项。

)正确酗匚DSL'L移动电活丿匚卫星匚抜号专用村斟线洛9哪两个Internet 决方案可以为LAN上的计算机畫供始终在线的高带宽连接?(请选择两顼,)响应G应饲冼话4OD3L电用蝎10下列哪项描述正确定义了融合网络?正确您的响应昭应J单个网络信道能够传输多种通信节纽允许用户通过多个信道直接互动的网络视频和语音胆务使用独立信道的专用网络仅限于交换宇苻信息的网络11下列哪种说法正确摘述了支持QoS的网络?正场您的响应响应❸故障影响尽可能少的设备。

ccna考试题及答案

ccna考试题及答案

ccna考试题及答案1. 以下哪项是网络层的功能?A. 路由选择B. 错误检测C. 流量控制D. 封装数据包答案:A2. 在OSI模型中,哪一层负责在网络中传输数据?A. 应用层B. 传输层C. 会话层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中发现网络设备的?A. ARPB. RARPC. ICMPD. OSPF答案:A4. 在TCP/IP模型中,哪一层与OSI模型的传输层相对应?A. 应用层B. 互联网层C. 网络接口层D. 传输层答案:D5. 以下哪个地址是一个有效的IPv4地址?A. 192.168.1.256B. 192.168.1.1C. 10.0.0.0D. 172.16.300.1答案:B6. 在配置路由器时,以下哪个命令用于进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B7. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show configD. show current-config答案:A8. 在Cisco设备上,以下哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. save startup-config答案:A9. 以下哪个命令用于在Cisco设备上查看所有接口的状态?A. show interfacesB. show ip interface briefC. show interface statusD. show running-config interface答案:B10. 在Cisco设备上,以下哪个命令用于关闭接口?A. shutdownB. no shutdownC. disableD. no enable答案:A11. 以下哪个命令用于在Cisco设备上启用接口?A. shutdownB. no shutdownC. disableD. no enable答案:B12. 在配置静态路由时,以下哪个命令用于指定下一跳地址?B. ip static-routeC. route ipD. static-route ip答案:A13. 以下哪个命令用于在Cisco设备上清除ARP表?A. clear arp-cacheB. clear arpC. clear arp tableD. clear ip arp答案:D14. 在配置动态路由协议时,以下哪个命令用于在接口上启用RIP?A. ip rip enableB. ip rip receiveD. network rip答案:C15. 以下哪个命令用于在Cisco设备上查看RIP路由表?A. show ip ripB. show ip route ripC. show ripD. show ip protocols答案:B16. 在配置EIGRP时,以下哪个命令用于指定自动汇总?A. metric weightsB. auto-summaryC. network auto-summaryD. no auto-summary答案:B17. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. show ip eigrp neighborsB. show eigrp neighborsC. show ip eigrpD. show eigrp interfaces答案:A18. 在配置OSPF时,以下哪个命令用于指定路由器ID?A. router-idB. router ospfC. networkD. area答案:A19. 以下哪个命令用于在Cisco设备上查看OSPF路由表?A. show ip ospfB. show ip ospf databaseC. show ospfD. show ip route ospf答案:D20. 在配置VLAN时,以下哪个命令用于创建一个新的VLAN?A. vlan databaseB. configure terminalC. vlan [vlan-id]D. new-vlan答案:C21. 以下哪个命令用于将接口分配给VLAN?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:C22. 在配置交换机时,以下哪个命令用于将接口设置为Trunk 模式?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:B23. 以下哪个命令用于在Cisco设备上查看VLAN配置?A. show vlanB. show vlan briefC. show vlan detailD. show vlan all答案:B24. 在配置VTP时,以下哪个命令用于将交换机设置为VTP服务器模式?A. vtp mode serverB. vtp mode clientC. vtp mode transparentD. vtp mode off答案:A25. 以下哪个命令用于在Cisco设备上查看VTP状态?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A26. 在配置STP时,以下哪个命令用于设置根桥?A. spanning-tree root primaryB. spanning-tree root secondaryC. spanning-tree root primary [priority]D. spanning-tree root secondary [priority]答案:C27. 以下哪个命令用于在Cisco设备上查看STP状态?A. show spanning-treeB. show spanning-tree detailC. show spanning-tree summaryD. show spanning-tree interface答案:A28. 在配置VLAN Trunking Protocol (VTP) 时,以下哪个命令用于设置VTP域名?A. vtp domain [domain-name]B. vtp password [password]C. vtp mode [mode]D. vtp version [version]答案:A29. 以下哪个命令用于在Cisco设备上查看当前的VTP版本?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A30. 在配置端口安全时,以下哪个命令用于限制接口上可以学习到的最大MAC地址数量?A. switchport port-security maximum [mac-count]B. port-security maximum [mac-count]C. switchport port-security violation restrictD. port-security violation shutdown答案:A这些题目和答案仅供学习和参考之用,实际的CCNA考试内容和形式可能会有所不同。

CCNA全部实验说明

CCNA全部实验说明

CCNA全部实验说明第一部分 CISCO基础 (2)第一章 互联网概述 (2)第二章 Cisoc设备安装和连线 (3)第三章 Cisco IOS设备操作和配置 (5)第四章 管理网络环境 (11)第二部分CATALYST交换机 (14)第五章 Catalyst1900交换机操作 (14)第六章 使用VLAN扩展交换网络............................................. .. (15)第三部分互联CISCO路由器 (17)第七章 使用TCP/IP进行网络互联 (17)第八章 确定IP路由 (18)第九章 用访问控制列表管理基本IP流量 (21)第十章 配置Novell IPX (23)第四部分用WAN扩展网络 (24)第十一章建立串行点对点连接 (24)第十二章建立ISDN BRI按需动态拨号连接 (26)第十三章建立帧中继PVC连接 (31)总结 (33)第一部分 CISCO基础第一章 互联网概述[实验] 本章讲述的是互联网概述,因此没有实验说明 1. 7层协议框架2. CISCO设备在7层协议的位置3. 数据封装概念4. 识别集线器交换机路由器的功能及符号注解第二章 Cisoc设备安装和连线[实验]实验一连接Cisco网络设备[目的]识别网络设备及各种接口连线连接Cisco的网络设备熟悉本章的实验环境[环境][参数]清认真理解这些参数的含义并在以后的实验中采用这些参数的设定值表一计算机配置信息表IP子网掩码255.255.255.0学员组号计算机名计算机IP地址计算机缺省网关01Cisco01192.168.1.1192.168.1.10002Cisco02192.168.2.1192.168.2.100表一交换机配置信息表IP子网掩码255.255.255.0学员组号交换机名IP地址Password密码Secret密码01S01192.168.1.1002S02192.168.2.10Easthome Cisco 表一路由器配置信息表IP子网掩码255.255.255.0学员组号路由器名快速以太网口IP地址串行口IP地址Password密码Secret密码01R01192.168.1.100192.168.100.102R02192.168.2.100192.168.100.2Easthome Cisco [步骤]任务 1完成交换机与计算机的连接1.检查线缆类型和数量每组直连线1条专用百兆连线1条控制线1条转换线1条DTE DCE线缆各1条两组共用一套2.用直连线将交换机的任一端口语计算机连接起来3.用控制线连接交换机Console口和计算机COM口COM1或COM2均可4.建立超级终端加电交换机确定控制台上出现文字输出任务2完成路由器与其它设备的连接1.用随Cisco设备提供的专用百兆线缆将交换机的百兆端口AX或BX与路由器的FastEthernet口连接起来2.将控制线连接道路由器的Console口上3.利用DTE DCE线缆连接两台路由器的串行口每两组学员互联路由器4.检查所有的线路确保连接正确5.建立超级终端加电路由器确定控制台上出现了文字输出注意1.路由器连线2.路由器模块第三章 Cisco IOS 设备操作和配置[实验]实验一交换机的启动和初始设置[目的]观察交换机的启动过程及其指示灯状态(自检报错时的指示灯状态)察看交换机的初始配置信息设置交换机的简单参数[环境][步骤]任务 1观察交换机的自检过程连接交换机电源观察交换机的指示灯交换机加电自检期间LED的变化过程1.港启动时所有端口LED变绿2.相应段口自检完成后对应的LED关闭3.如果端口自检失败对应的LED成琥珀色4.如果有任何自检失败导致系统LED成琥珀色5.全部自检通过后LED闪烁随即关闭如果交换机运行了当按下MODE按钮时将出发其他LED显示模式1.端口状态2.交换机带宽利用3.双工模式任务2配置交换机1.拔掉交换机电源将控制线与交换机相连接并建立超级终端在Windows XX中超级终端这个命令加电运行2.出现控制菜单选项后键入k选择命令行模式注意用户模式提示符>3.在用户模式下键入enable en为简化命令命令进入特权模式注意特权模式提示符#4.在特权模式下键入config termina conf t l命令进入全局配置模式注意全局配置模式提示符config#5.在全局配置模式下使用ip address命令设置交换机IP地址config#ip address 192.168.1.10 255.255.255.06.在全局配置模式下使用hostname命令为交换机命名config#hostname S01host主机名注意此时交换机提示符变成S01(config)#7.在全局配置模式下键入exit退回到特权模式下8.在特权模式下键入show ip命令查看刚才的IP设置注意实验二 Cisco路由器的启动和初始设置[目的]观察路由器最初的启动过程查看路由器的初始设置信息进入setup模式对路由器进行最小设置[环境][步骤]任务 1启动路由器并观察面板灯的状况1.加岔路由器的电源连接情况确定路由器的电源没有打开2.用控制线连接路由器Console口并建立超级终端3.打开电源开关观察路由器的启动信息任务2通过Setup对路由器进行最小配置当路由器第一次启动时会自动进入Setup设置程序在Setup状态下完成以下配置1.根据以下提示进入Setup设置模式Would you like to enter the initial configuration dialog[yes/no]yesWoule you like to enter basic management setup[yes/no]no2.回答下列问题后检查端口信息First would you like to see the current interface summary[yes/no]yes3.根据提示键入路由器的名称R014.根据提示设置路由器的各个密码5.在出现Configure SNMP Network Management的问题回答no6.接下来的步骤出了IP以外的其他问题一律回答no进入IP配置过程7.回答no不进入IGRP RIP路由协议配置8.Do you want to configure Bir0 Interface回答no出了Ethernet以外的素有端口设置均回答no9.Do you want to configure Ethernet 0 interface[no]yConfigure IP on this interface[no]yIP address for this interface192.168.1.100……Subnet mask for this interface255.255.255.010.检查以上的配置信息11.如果初始配置是正确的选择[2]将配置信息存入NVRAM并退出注意如果在路由器和交换机中已经有配置信息为了今后实验的方便先备份NVRAM中的配置信息备份方法见第四章实验二然后清楚NVRAM具体方法1. 路由器config#erase startuo清除路由器NVRAM的配置信息config#reload从新启动路由器2. 交换机config#delete nvram清除交换机NVRAM的配置信息实验三熟悉路由器的配置]命令[目的]熟悉路由器的帮助命令纠正错误的命令查看路由器的状态[环境][命令]命令描述或help在用户模式下Cisco ISO软件会列出该模式可用的的命令在特权模式下Cisco ISO软件会列出该模式可用的的命令Clock管理系统时钟Copy run startup将配置的信息存入NVRAM中wr也可以Enable进入特权模式Show clock显示系统时钟Show history显示最近输入的命令Show interface显示路由器所有的端口状态信息Show running-config显示配置信息Show startup-config显示启动信息Show version显示路由器的硬件配置情况和软件版本Terminal history size设置存储历史命令的缓冲区的大小[步骤]任务 1熟悉帮助命令1.打开路由器提示信息后按enthr键进入用户模式2.键入帮助命令R01>分别在后面用回车空格其他键会出现什么状况3.进入特权模式R01>en4.在特权模式下键入帮助命令R01#5.键入clock 命令,系统有何反应6.合理运用帮助命令来设置正确的时钟R01# clokTranslating CLOCK%Unknown command or computer name or unable to find computer addressR01# clClear clockR01# clock%Incomplete commandR01# clockSet set the time and dateR01# clock set%Incomplete commandR01# clock setHh mm ss carrent Time7.在特权模式下键入sh 命令查看结果8.键入sh后按Tab键会出现什么现象9.键入show clock命令查看结果任务2纠正错误的命令1.由字符引导的句子是注解语句键入下列语句对比结果wyj is giant! wyj is giant2.按Ctrl-P或者按向上键查看结果3.按Ctrl-A Ctrl-F Ctrl-E Ctrl-B任务3查看路由器的状态信息1.键入show history命令查看结果R01# show history2.键入show version命令查看结果R01# show version3.键入show interface命令查看结果R01# show interface4.键入show running-config命令查看结果R01# show running-config5.键入terminal history size 20命令将缓冲区大写设为20R01# terminal history size 206.键入show terminal命令查看缓冲区的大小R01# show terminal7.键入exit命令退出特权模式R01#exitR01>实验四 IOS的操作和配置[目的]修改运行配置文件和启动配置文件配置端口[环境][命令]命令描述Show显示路由器各种状态利用show 命令查看更多的信息show history显示最近输入的命令Show interface显示路由器所有的端口状态信息Show running显示配置信息完全命令为show running-configExec-timeout 0 0将Console控制设为无时间限制disable从特权模式回到用户模式简化命令为disquit从控制会话退出[步骤]任务 1修改运行配置文件并保存1.路由器启动后按回车进入用户模式R01>enableR01#2.R01#configure terminal ‘进入全局配置模式R01(config)#3.R01(config)#line consol 0 ‘进入Console口的行设置模式R01(config-line)#4.R01(config-line)#exec-timeout 0 0 ‘将Console控制设无为无时间限制R01(config-line)#logging synchronous ‘设置同步显示不会因为显示系统信息而打断输入命令的连续性可不用5.设置Console口的密码R01(config-line)#loginR01(config-line)#password ciscoR01(config-line)#exit6.设置Terminal口telnet密码R01(config#line vty 0 4R01(config-line)#loginR01(config-line)#password ciscoR01(config-line)#exit7.R01(config)#enable password easthome ‘设置明文密码8.R01(config)#enable secret cisco ‘设置加密密码9.退回到用户模式,R01>logout ‘退出会话重新进入用户模式验证密码是不是生效10.R01#show running-config查看明文密码加密密码Console口设置exec-timeout11.R01#show startup-config查看startup-config NVRAM配置文件的明文密码加密密码Console口设置exec-timeout是否与running-config相同12.R01#copy running-config startup-config ‘将running-config中当前配置参数拷贝到startup-config13.R01#show startup-config再次查看明文密码加密密码Console口设置exec-timeout是否改变任务2设置串口1.两组学员利用DTE DCE线正确互连两台路由器见第二章实验环境图2.分别在两台路由器的特权模式下R01#show controller serial 0/0 ‘查看串口的配置信息0/0为串口号查看自己所在的路由器是否是DCE如果是DCE进行以下操作R01#conf tR01(config)#int s0/0R01(config-if)#clock rate 64000 ‘配置时钟速率R01(config-if)#bandwidth 643.R01(config-if)#no shutdown ‘激活串口R01(config-if)#shutdown ‘关闭端口R01(config-if)#exit4.R01# copy running-config startup-config注意1.如果忘记密码用以下方法可更改密码关闭路由器重新启动路由器60秒内按Ctal-Breakconfreg 0x2142 ‘0x2142这个参数可以绕开密码验证reset ‘重新启动路由器R01#copy startup runR01#conf tR01(config)#enable password easthomeR01(config)#enable secret ciscoR01(config)#exitR01#copy run startupR01#confreg 0x21022.定义以太网接口介质类型在以太网接口上可能需要设置介质类型以太接口有不同种物理连接例如在Cisco4000系列路由器中有AUI一般用作远程连接控制路由器和10BaseT连接器这种系列路由器在网络接口模块上两种物理连接器默认的是AUI一些路由器对连接自适应但有些需要在配置中选择配置方法R01#conf tR01(config)#interface ethernet 2R01(config-if)#media-type 10baset第四章 管理网络环境实验一查看相邻的网络设备[目的]在交换机上查看直接相连的网络设备在路由器上查看直接相连的网络设备查看网络拓扑结构[环境][命令]命令描述Copy running-config tftp将当前的配置文件拷贝到TFTP server中Copy tftp startup-config将配置文件从TFTP server拷贝到NVRAM中Disconnect切断telnet会话Enable激活特权模式Erase startup-config擦除NVRAM的内容Ping验证连接Show cdp ?列出show cdp命令后所有能带的各项参数Show cdp neighbors显示从每一个本地端口上获得的cdp信息Show cdp neighbors dettail显示从每一个本地端口上获得的cdp的详细信息Show session显示建立telnet连接的所有主机名称telnet ip-address通过IP地址建立一个telnet连接会话[步骤]任务 1从加还击上查看直接相连的网络设备1.利用交叉线将两台交换机连接起来2.S01>show cdp ? 查看与cdp相关的参数3.S01>show cdp neighbors 查看直接相连的交换机的参数4.S01>show cdp neighbors detail 查看直接相连的交换机的详细参数任务 2从路由器上查看直接相连的网络设备1. R01#show cdp ? 查看与cdp相关的参数2. R01#show cdp neighbors 查看直接相连的路由器的参数3. R01#show cdp neighbors detail 查看直接相连的路由器的详细参数任务 3用telnet访问远程主机1.检查直连路由器的串口快速以太网口交换机接口的连接和配置情况注意相关端口是否已经激活是否已经配置适当的IP地址DCE线缆对应的串口下是否已经设置时钟速率详细配置参见第三章实验四2.R01#telnet ip-address telnet主机的IP地址3.R01#show session 查看所建立的会话4.R01#show user 查看有多少用户telnet进来5.使用Ctrl-Shift-6加x命令切换telnet会话6.R01#resume 1(会话的连接号) 回到会话7.R01#disconnect 退出telnet会话8.R01#clear line 1(会话的连接号) 关闭telnet进来的会话9.用ping traceroute查看网络的拓扑结构任务 4查看Image 文件1. R01#show flash 查看IOS image文件并查看以下信息路由器硬件平台Cisco IOS image文件名称Cisco IOS软件版本Flash大小实验二管理配置文件和IOS映象文件[目的]在设备与TFTP server间备份与恢复配置文件在设备与TFTP server间备份与恢复IOS image文件[环境][步骤]任务 1在路由器与TFTP server间备份与恢复配置文件1.在计算机上正确安装TFTP server并启动观察TFTP server的IP地址是否是网卡上配置的IP地址2.R01#ping TFTP server ip-address 用ping验证与TFTP server通讯是否正常R01#copy startup-config tftp 将启动配置文件备份到TFTP server上操作过程中有如下提示提示address or name of the remote host [] ? 回答TFTP server的IP地址提示Source/Destination filename [] 回答对应的文件名3.R01#erase startup-config 删除启动配置文件R01#show startup-config 查看启动配置文件是否删除4.R01#copy tftp startup-config 从TFTP server上恢复到NVRAMR01# show startup-config 查看启动配置文件是否恢复成功5.R01#copy run tftp 备份运行配置文件R01#copy tftp run 恢复运行配置文件R01#copy run startup-config 将运行配置文件参数传给启动配置文件任务 2在路由器与TFTP server间备份与恢复IOS映象文件1. R01#show flash 查看IOS映象文件的完整文件名含扩展名2. R01#copy flash tftp 备份映象IOS文件3.R01#copy tftp flash 恢复映象IOS文件注意1.当IOS不小心被删除时如何恢复那1如果路由器还没有从新启动可以用copy tftp flash命令恢复2路由器被从新启动后NVRAM的配置信息被清空了所以需要用 Mini IOS中的命令连接TFTP不过每个型号的路由器的命令是不同的下面以2600系列为例(其他型号的具体方法参见)rommon 2 >IP_ADDRESS=ip-address 给路由器添加IPrommon 2 >IP_SUBNET_MASK= 路由器的子网掩码rommon 2 >DEFAULT_GATEWAY= 路由器的缺省网管一般为自己的IPrommon 2 >TFTP_SERVER= TFTP server的IPrommon 2 >TETP_FILE=IOS文件名BIN IOS文件名rommon 2 >tftpdnld 开始从TFTP下载IOS映象文件3该种方式下载不需要以太口电缆只需超级终端即可缺点是花费时间太多速度太慢Xmodem 是个人计算机通信中广泛使用的异步文件传输协议以128字节块的形式传输数据并且每个块都进行校验如果接受方校验正确则发送认可信息发送方发送下一个字块Ymodem 异步传输协议传输字块大小为1024增加了批处理的功能用超级终端与路由器连接好后启动路由器路由器进入监控模式状态Rommon1>Rommon2>xmodem –cx ? 敲入enter键当出现do you wish to continous 时选择y打开超级终端的传送菜单选择传送文件则打开了传送文件窗口输入版本文件的位置并选择xmodem 方式确认后经过几秒后版本文件则会以xmodem的方式从计算机下载到路由器中修改相应命令和选项也可以以ymodem的方式进行传送第二部分互联CATLYST交换机第五章 Catalyst 1900 交换机操作实验一配置交换机[目的]设置端口的安全性管理交换机的MAC地址表[环境]具体连接情况可参见第二章的实验环境图[命令]命令描述Show version显示版本信息Show mac-address-table[security]显示MAC地址表Show interface显示端口信息Port secure[max-mac-count count]设置端口安全性Mac-address-table permanent {mac-address} {type}设置一个永久的MAC地址{modile/port}Mac-address-table restricted static {mac-address} {type}设置一个静态的MAC地址{module/port} {source interface-list}[步骤]任务 1设置交换机的端口安全1.S01(config)#interface e0/3 使用命令interface进入某端口的端口模式是连接到电脑的端口而定interface e0/3)2.S01(config-if)#port secure 启用端口的安全功能3.S01(config-if)#port secure max-mac-count 1 将端口的安全值设为14.S01(config)#show mac-address-table security 查看安全设置5.S01(config-if)#no port secure max-mac-count 取消端口的安全设置任务 2管理交换机的MAC地址表1.S01(config-if)#mac-address-table permanent 2222.2222.2222 ethernet0/3把一个48位的MAC地址2222.2222.2222绑定到某一个端口上如ethernet 0/3在该端口上设置一个永久的MAC地址命令语法可借助于IOS帮助2.S01(config)#show mac-address-table 查看MAC地址表确定第1步配置已经完成3.S01(config)#no mac-address-table permanent 取消MAC绑定第六章 使用VLAN扩展交换网络实验一在单一交换机上设置VLAN[目的]在单一的交换机上设置VLAN验证相同的VLAN内主机的可连接性不同的VLAN间的主机的不可连接性[环境][命令]命令描述Vlan vl an#name vlan-name定义一个VLAN和名称第一章Show vlan显示VLAN信息Vlan-membership static vlan#将一个端口划分到VLAN中[步骤]任务 1设置交换机的端口安全1. S01(config)#vlan 3 name networkS01(config)#vlan 10 name information 建立两个不同的VLAN2.S01(config)#interface e0/3S01(config-if)#vlan-membership static 33.S01(config)#interface e0/4S01(config-if)#vlan-membership static 34.将两台计算机分别接到交换机的端口3和4从一台计算机ping 另一台计算机验证同一VLAN内的两台计算机之间可连接性两台计算机的IP地址在同一网段5.S01(config)#interface e0/10S01(config-if)#vlan-membership static 10建立一个和上面不同的VLAN6.将两台计算机分别接到交换机的端口3和10从一台计算机ping 另一台计算机验证同一VLAN内的两台计算机之间不可连接性两台计算机的IP地址在同一网段实验二在不同的交换机上设置VLAN[目的]在不同的交换机上设置VLAN验证相同的VLAN内主机的可连接性不同的VLAN间的主机的不可连接性[环境][命令]命令描述Vtp domain domain-name[server] [transparent]分配一个VTP域名第二章Show vtp显示VTP状态第三章Trunk on在端口上配置trunkShow spantree vlan#显示VLAN的spanning-tree信息 [步骤]任务 1设置交换机的VTP1.S01(config)#vtp serverS01(config)#vtp domain home 将S001交换机设为VTP服务器域名为home2.S01(config)#vlan 3 name network 建立一个VLAN3.S01(config)#interface e/0/3S01(config-if)#vlan-membership static 34.S01(config)#interface f0/26(或者f0/27) 进入百兆端口配置模式S01(config-if)#trunk on 打开trunk功能5.S02(config)#vlan 3 name networkS02(config)#interface e/0/3S02(config-if)#vlan-membership static 3S02(config)#interface f0/26(或者f0/27) 进入百兆端口配置模式S02(config-if)#trunk on 打开trunk功能6.用交叉先将两台交换机的百兆端口连接起来7.将两台计算机分别接在两台交换机的端口3上从一台计算机ping 另一台计算机验证同一VLAN内的两台计算机之间可连接性两台计算机的IP地址在同一网段8.将两台计算机分别接在两台交换机的端口3和3以外的其他端口从一台计算机ping 另一台计算机验证同一VLAN内的两台计算机之间不可连接性两台计算机的IP地址在同一网段注意1.交换机每个端口默认为VLAN 1所以说VLAN 1是保留的划分VLAN的时候要注意2.上面的实验中S002的VLAN信息是手动添加上的用下面方式可以是交换机之间自动交换VLAN信息两台交换机的IP需要在同一网段中S01(config)#vtp serverS01(config)#vtp domain homeS02(config)#vtp transparentvtp domain home3. S01(config)#no vlan 3 删除VLANS01(config)#interface f0/26S01(config-if)#trunk off 关闭trunk第三部分互联CISCO路由器第七章 使用TCP/IP进行网络互联实验一在单一交换机上设置VLAN[目的]单臂路由器实现不同的VLAN间的计算机通讯[环境][步骤]任务 1单臂路由器实现不同的VLAN间的计算机通讯1.S01(config)#vlan 2 name networkS01(config)#vlan 3 name informationS01(config)#interface e0/5S01(config-if)#vlan-membership static 2S01(config)#interface e0/10S01(config-if)#vlan-membership static 3在同一个交换机上创建VLAN2VLAN3两个不同的VLAN你可以使用其它的VLAN号将交换机的端口e0/5和端口e0/10分别分配两个VLAN注连接两个端口的计算机的IP地址在不同的网段2. S01(config)#interface f0/26(或者f0/27) 进入百兆端口配置模式S01(config-if)#trunk on 打开trunk功能3.R01>enableR01#conf tR01(config)#interface f0/0R01(config-if)#no ip address 删除路由器f0/0端口上的IP地址4.R01(config-if)#interface f0/0.1 进入子端口f0/0.1R01(config-subif)#ip address 192.168.1.100 255.255.255.0 该地址必须与VLAN2所连的计算机的IP地址相同R01(config-subif)#encapsulation isl 2 封装ISL协议并指明该子端口所对用的VLAN5.R01(config-if)#interface f0/0.2 进入子端口f0/0.2R01(config-subif)#ip address 192.168.2.100 255.255.255.0 该地址必须与VLAN3所连的计算机的IP地址相同R01(config-subif)#encapsulation isl 3 封装ISL协议并指明该子端口所对用的VLAN6.分别在连接到VLAN2VLAN3端口的计算机上将对应子端口的IP地址设置为计算机的缺省网关7.利用ping命令测试两台属于不同VLAN的计算机的通讯情况8.S01(config)#no vlan 2S01(config)#no vlan 3 删除VLANS01(config)#interface f0/26S01(config-if)#trunk off 关闭trunkR01(config)#no int f0/0.1R01(config)#no int f0/0.2 删除子端口第八章 确定IP路由实验一静态路有的实现[目的]配置查看和验证静态路由[环境]端口的具体连接情况可参见第二章的实验环境图[步骤]1.检查线缆的连接是否正确2.R01>enableR01#conf tR01(config)#int f0/0R01(config-if)#no shutdownR01(config-if)#ip address 192.168.1.100 255.255.255.0 配置f0/0的IP地址地址分配参见第二章实验列表R01(config)#int s0/0R01(config-if)#no shutdownR01(config-if)#ip address 192.168.100.1 255.255.255.0 配置s0/0的IP地址地址分配参见第二章实验列表3.R01(config)#ip route 192.168.2.0 255.255.255.0 192.168.100.2 配置从192.168.1.0到192.168.2.0网段的静态路由4.R02>enableR02#conf tR02(config)#int f0/0R02(config-if)#no shutdownR02(config-if)#ip address 192.168.2.100 255.255.255.0 配置f0/0的IP地址地址分配参见第二章实验列表R02(config)#int s0/0R02(config-if)#no shutdownR02(config-if)#ip address 192.168.100.2 255.255.255.0 配置s0/0的IP地址地址分配参见第二章实验列表5.R02(config)#ip route 192.168.1.0 255.255.255.0 192.168.100.1 配置从192.168.1.0到192.168.2.0网段的静态路由6.R01(config)#show ip route 查看路由表确定静态路由已经存在7.在两台计算机上设置相应的缺省网关地址参数参见第二章的实验列表8.在计算机上用ping命令验证从该计算机与自己的缺省网关另一台计算机的缺省网关另一台计算机的通讯是否正常实验二动态路由的实现[目的]用RIP路由协议实现动态路由用IGRP路由协议实现动态路由[环境]端口的具体连接情况可参见第二章的实验环境图[命令]命令描述Ip address ip-address subnet-mask设置IP地址第四章Ip default-gateway ip-address设置缺省网关第五章Router tip激活RIP路由协议Network network-number指明直连网段Show ip protocols显示IP路由协议信息Show ip route显示IP路由表Router igrp autonomous-system激活IGRP路由协议Debug ip igrp transactions显示IGRP的处理信息Debug ip igrp events显示IGRP摘要处理信息No debug all (undebug all)停止IGRP信息显示[步骤]任务 1用RIP路由协议实现动态路由1.R01>enR01#conf tR01(config)#no ip rout 取消以前的静态路由2.R01(config)#router rip 启动RIP路由协议3.R01(config-router)#network 192.168.1.0 指明与路由器直连的网段R01(config-router)#network 192.168.2.0 指明与路由器直连的网段4.R01#show ip protocols 查看RIP协议的相关信息5.R01#show ip route 查看动态路由表确定是否已经学习都另一台计算机所在网络信息如果show ip route命令没有能给出由路由器选择协议得到的信息条目在路由器上使用show running-config命令或show ip protocols特权EXEC命令来检查路由器选择协议的配置是否有错误6.R01#debug ip rip 查看RIP路由信息信息输出为滚动方式7.R01#no debug all 停止显示8.确认双方计算机的缺省网关一正确配置9.在计算机上用ping命令验证从该计算机与自己的缺省网关另一台计算机的缺省网关另一台计算机的通讯是否正常任务 2用IGRP路由协议实现动态路由1.R01>enR01#conf tR01(config)#no ip rout 取消以前的动态路由2.R01(config)#router igrp 100 启动IGRP路由协议100为自治系统编号3.R01(config-router)# network 192.168.1.0 指明与路由器直连的网段R01(config-router)#network 192.168.2.0 指明与路由器直连的网段4.R01#show ip protocols 查看IGRP协议的相关信息5.R01#show ip route 查看动态路由表6.R01#debug ip rip 查看IGRP路由信息信息输出为滚动方式R01#debug ip rip transactions 显示详细的IGRP路由信息R01#debug ip rip events 显示粗略的IGRP路由信息7.R01#no debug all 停止显示8.确认双方计算机的缺省网关一正确配置在计算机上用ping命令验证从该计算机与自己的缺省网关另一台计算机的缺省网关另一台计算机的通讯是否正常9.用debug ip rip transactions命令查看路由器断开后IGRP的变化注意1.删除静态路由[ no ] ip route ip-address { mask | mask-length } { interfacce-name | gateway-address }[ preference preference-value ] [ reject | blackhole ]参数说明ip-address和mask为目的IP地址和掩码点分十进制格式由于要求掩码32位中1’必须是连续的因此点分十进制格式的掩码可以用掩码长度mask-length来代替掩码长度为掩码中连续1’的位数interfacce-name指定该路由的发送接口名gateway-address为该路由的下一跳IP地址点分十进制格式preference-value为该路由的优先级别范围0~255reject指明为不可达路由blackhole指明为黑洞路由2.IGRP负载平衡/分担R01(config-router)#variance multipileMultipiler参数制定负载平衡可接受的度量取值范围这个范围是在最小的即最好的度量值与此最小值和variance值的乘积之间这些可接受的值是非零的正整数默认值是1意味着等开销负载平衡R01(config-router)#traffic-share {balanced | min} 控制如何在IGRP负载分担路由中分配通信量Balanced可以依据度量值的比例来按比例的分配通讯量Min确定使用具有最小开销的路由第九章 用访问控制列表管理基本IP 流量 实验一 配置IP 访问列表 [目的]访问列表的建立应用测试和删除建立标准IP 访问列表拒绝特定主机对某些网络的访问 建立扩展IP 网问列表拒绝特定主机telnet 到某些设备 [环境]端口的具体连接情况可参见第二章的实验环境图[命令]命令描述Access-list access-list-number {permit/deny} source [mask]建立标准IP 访问列表第六章Access-list access-list-number {permit/deny} protocol source source-wildcard destination destination-wildcard [protocol-specific-option] [established] [log]建立扩展IP 访问列表第七章Ip access-gtoup access-list-number {in/out}在端口激活访问列表Show ip access-list显示IP 访问列表Show ip interface interface-type interface-number 显示端口的访问列表Ping ip-address 测试IP 访问列表telnet ip-address测试IP 访问列表[步骤]任务 1建立标准IP 访问列表拒绝计算机B 访问计算机A1. 在无访问列表的情况下用ping 命令验证计算机A 和计算机B 之间的通讯是否正常2. R01>en R01#conf tR01(config)#access-list 1 deny 192.168.2.1 0.0.0.0 对计算机B 来的数据包予以拒绝R01(config)#access-list 1 permit 0.0.0.0 255.255.255.255 其他任何数据包允许通过3. R01(config)#int s0/0R01(config-if)#ip access-group 1 in 拒绝来自计算机B 发出的数据包进入4. R01#show ip access-list 查看IP 访问列表的内容 R01#show in interface s0/0 查看端口s0/0的信息5. 从计算机B ping 计算机A 验证访问列表是否已经起作用6. R01(config-if)#no ip access-group 取消IP 访问列表在端口s0/0上的应用7. R01(config)#no access-list 删除访问列表任务 2建立扩展IP 访问列表拒绝计算机B telnet 本地交换机1. 在无访问列表的情况下用ping 命令验证计算机B 和本地路由器之间通讯是否正常2. R01>en。

最新CCNA认证试题及答案「中文版」

最新CCNA认证试题及答案「中文版」

最新CCNA认证试题及答案「中文版」1、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ( )(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位192.168.19.255/20划为二进制为:11000000.10101000.00010011.1111111111111111.11111111.11110000.00000000主机位变成全0表示这个IP的网络地址主机槐涑扇?表示这个IP的广播地址RFC1918文件规定了保留作为局域网使用的私有地址:10.0.0.0 - 10.255.255.255 (10/8 prefix)172.16.0.0 - 172.31.255.255 (172.16/12 prefix)192.168.0.0 - 192.168.255.255 (192.168/16 prefix)2、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。

IEEE制定的IEEE 802.3标准给出了以太网的技术标准。

它规定了包括物理层的连线、电信号和介质访问层协议的内容。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

C C N A第一学期第八章
答案
集团文件版本号:(M928-T898-M248-WU2669-I2896-DQ586-M1988)
最新CCNA第一学期第八章答案
IPv4 地址分为两个部分:网络部分 - 用于识别主机所在的特定网络,主机部分 - 用于识别网络中的特定主机。

子网掩码用于识别各个部分的长度。

定向广播是将消息发送到特定网络中的所有主机。

它适用于将广播发送到非本地网络中的所有主机。

组播消息是将消息发送到订阅组播组中的一组选定主机。

有限广播只限于将消息发送到本地网络中的主机。

单播消息是将消息从一台主机发送到另一台主机。

许多协议使用广播,因此无法避免。

路由器不转发广播,因此会在其每个接口形成一个广播域。

IPv6 中没有广播。

如果交换机收到广播数据包,它将通过除入站接口以外的所有接口转发此数据包。

6、
7、下列哪种网络迁移技术可以把 IPv6 数据包封装在 IPv4 数据包中,以便通过 IPv4 网络基础架构进行传输?
隧道迁移技术可将 IPv6 数据包封装在 IPv4 数据包中。

封装过程中会组装消息并向每一层添加信息,以便通过网络传输数据。

转换迁移技术允许支持 IPv6 的设备与支持 IPv4 的设备使用类似于 IPv4 中 NAT 的转换技术进行通信。

双堆栈迁移技术允许 IPv4 和 IPv6 协议栈在同一网络中同时共存。

组播、任播和单播属于 IPv6 地址类型。

IPv6 中没有广播地址。

环回和本地链路是单播地址的特定类型。

IPv6 全局单播地址包括三个要素。

由 ISP 提供的全局路由前缀,由组织确定的子网 ID,以及唯一标识主机接口的接口 ID。

12、支持 IPv6 的设备发送一个目的地址为 FF02::1 的数据包。

该数据包的目标是什么?
FF02::1 是本地链路范围内的全节点组播组。

所有支持 IPv6 的接口将接收和处理具有此目的地址的数据包。

13、当思科路由器从 IPv4 环境完全迁移到 IPv6 环境时,哪组命令可以正确启用 IPv6 转发和接口寻址?
ICMPv4 和 ICMPv6 通用的 ICMP 消息包括:主机确认、目标(网络、主机、协议、端口)或服务不可达、超时和路由重定向。

路由器请求、邻居请求和路由器通告是 ICMPv6 中实施的新协议。

15、当支持 IPv6 的主机需要发现预期 IPv6 目标的 MAC 地址时,源主机将在 NS 消息中使用下列哪个目的地址?
当主机需要查找目的主机的 MAC 地址时,则使用地址解析。

IPv6 主机设备将发送邻居请求 (NS) 消息到请求节点组播地址。

此地址包括两个部分,共同构成了 128 位的地址。

前半部分是 FF02::1:FF00/104,后半部分是目的主机的本地链路地址或全球单播地址的最右边 24 位。

当路由器收到一个 traceroute 数据包时,TTL 字段的值递减 1。

当该字段中的值达到零时,接收路由器不会转发数据包,并会向源发送 ICMP 超时消息。

IPv6 地址 ::1 是环回地址。

对该地址成功执行 ping 操作意味着
TCP/IP 协议栈已正确安装。

但并不意味着所有地址配置正确。

相关文档
最新文档