ccna2答案第二章

合集下载

CCNA2 题库

CCNA2 题库

CCNA 2 - Chapter 11What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?has a positive impact on bandwidth by dropping most of the invalid framesmakes a fast forwarding decision based on the source MAC address of the framehas a lower latency appropriate for high-performance computing applications*provides the flexibility to support any mix of Ethernet speeds2A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)reduced cost for equipment and user trainingless required equipment to provide the same performance levelssimpler deployment for additional switch equipment*easier to provide redundant links to ensure higher availability*lower bandwidth requirements3What are two advantages of modular switches over fixed-configuration switches? (Choose two.)availability of multiple ports for bandwidth aggregationlower forwarding ratesneed for fewer power outlets*lower cost per switchincreased scalability*4Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?to Fa0/1, Fa0/2, and Fa0/4 onlyto Fa0/1, Fa0/2, Fa0/3, and Fa0/4to Fa0/1 and Fa0/2 onlyto Fa0/1, Fa0/2, and Fa0/3 only*to Fa0/1 only5What is one function of a Layer 2 switch?forwards data based on logical addressinglearns the port assigned to a host by examining the destination MAC addressduplicates the electrical signal of each frame to every portdetermines which interface is used to forward a frame based on the destination MAC address*6Refer to the exhibit. Fill in the blank.There are ” 12” collision domains in the topology.7What is a collapsed core in a network design?a combination of the functionality of the access, distribution, and core layersa combination of the functionality of the access and core layersa combination of the functionality of the distribution and core layers*a combination of the functionality of the access and distribution layers 8What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)to enhance user bandwidth*to eliminate virtual circuitsto create more broadcast domainsto isolate traffic between segments*to isolate ARP request messages from the rest of the networkto create fewer collision domains9Refer to the exhibit.How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.*SW1 drops the frame because it does not know the destination MAC address.10Place the options in the following order:[+] appropriate for high performance computing applications[+] forwarding process can begin after receiving the destination address [+] may forward invalid frames[#] error checking before forwarding[#] forwarding process only begin after receiving the entire frame [#] only forward valid frames[+] Order does not matter within this group.[#] Order does not matter within this group.11What is a basic function of the Cisco Borderless Architecture distribution layer?aggregating Layer 3 routing boundaries*aggregating all the campus blocksacting as a backboneproviding access to the user12ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?hubhostNICswitch*13What does the term “port density” represent for an Ethernet switch?the numbers of hosts that are connected to each switch portthe speed of each portthe memory space that is allocated to each switch portthe number of available ports*14Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?anycastunicastbroadcast*multicast15What is a basic function of the Cisco Borderless Architecture access layer?aggregates Layer 3 routing boundariesprovides high availabilityaggregates Layer 2 broadcast domainsprovides access to the user*16What information is added to the switch table from incoming frames?source MAC address and incoming port number*destination MAC address and incoming port numberdestination IP address and incoming port numbersource IP address and incoming port number17Fill in the blank.A “converged” network is one that uses the same infrastructure to carry voice, data, and video signals.18An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?It enables many switches to be connected with a special fiber-optic power cable to provide higher bandwidth.It enables the sharing of power among multiple stackable switches.*It enables many switches to be connected to increase port density.It enables many switches to be physically stacked in an equipment rack.It enables AC power for a switch to be provided from a powered patch panel.19Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?fixed-configuration switchmodular switchstackable switch*rackable 1U switch20Refer to the exhibit. Fill in the blank.There are ” 5 ”CCNA 2 - Chapter 2Posted by beotron at 8:59 PM1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?• administrative distance of 0 and metric of 0• administrative distance of 0 and metric of 1• administrative distance of 1 and metric of 0• administrative distance of 1 and metric of 12. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?• 172.16.0.0/21• 172.16.1.0/22• 172.16.0.0 255.255.255.248• 172.16.0.0 255.255.252.03. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?• 192.1.1.0/26 and 192.1.1.64/27• 192.1.1.128/25• 192.1.1.0/23 and 192.1.1.64/23• 192.1.1.0/24• 192.1.1.0/25• 192.1.1.0/24 and 192.1.1.64/244. Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?• It indicates that there are 8 hops between this router and the 10.0.0.0 network.• It represents the time, in milliseconds, it takes for a ping to reply when sent to the 10.0.0.0 network.• It indicates that there are 8 subnets in the destination network to which the router can forward packets.• It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.5. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded?• Router1 will perform recursive lookup and packet will exit S0/0.• Router1 will perform recursive lookup and packet will exit S0/1.• There is no matching interface associated with network 172.16.0.0 so packets will be dropped.• There is no matching interface associated with network 172.16.0.0 so packets will take gateway of last resort and exit out S0/2.6. A network administrator enters the following command into Router1: ip route 192.168.0.0255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet? • drops the packet because the destination host is not listed in the routing table• looks up the MAC address of the S0/1/0 interface to determine the destination MAC address of the new frame• performs a recursive lookup for the IP address of the S0/1/0 interface before forwarding the packet• encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface7. Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link? • The rate would be negotiated by both routers.• A rate would not be selected due to the DCE/DTE connection mismatch.• The rate configured on the DTE determines the clock rate.• The rate configured on the DCE determines the clock rate.8. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet? • WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/09. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)• ping• show arp• traceroute• show ip route• show interface• show cdp neighbor d etail10. Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2• R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.2.1R2(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.111. Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.) • load• platform• reliability• holdtime• local interface12. Refer to the exhibit. What two commands are required to provide connectivity between the192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)• A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0• A(config)# ip route 10.0.0.0 255.0.0.0 172.16.40.2• A (config)# ip route 10.0.0.0 255.0.0.0 s 0/0/0• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0• B (config)# ip route 192.168.1.0 255.255.255.0 172.16.40.1• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/1/013. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)• A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2• A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0• A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.214. What happens to a static route entry in a routing table when the outgoing interface is not available? • The route is removed from the table.• The router polls neighbors for a replacement route.• The route remains in the table because it was defined as static.• The router redirects the static route to compensate for the loss of the next hop device.15. A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)• The destination network no longer exists.• The destination network is moved to a different interface on the same router.• The path between the source and destination is upgraded with a higher bandwidth link.• A topology change occurs where the exi sting next-hop address or exit interface is not accessible.• The remote destination network interface has to be down for 15 minutes of maintenance.16. Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?• Adding the next-hop address eliminates the need for the router to do any lookups in the routing table before forwarding a packet.• In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.• Using a next-hop address in a static route provides a route with a lower metric.• In multi-access networks, using a next-hop address in a static route makes that route a candidate default route.17. The output of the Router# show interfaces serial 0/1 command displays the following:• Serial0/1 is up, line protocol is down.• What is the most likely cause for the line protocol being down?• Serial0/1 is shutdown.• There is no cable connecting the routers.• The remote rout er is using serial 0/0.• No clock rate has been set.18. Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network?• ip route 192.168.0.0 172.16.0.0 255.255.0.0• ip rou te 172.16.0.0 255.255.0.0 192.168.0.1• ip route 172.16.0.0 255.255.0.0 S0/0/1• ip route 172.16.0.0 255.255.0.0 S0/0/019. What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).• the serial port of the router• a modem• a switch• the ethernet port of the router• a CSU/DSU device• a DTE device20. Which of the following is true regarding CDP and the graphic shown?• CDP running on Router D will gather information about routers A, B, C, and E.• By default, Router A will receive CDP advertisements from routers B and C.• If routers D and E are running different routing protocols, they will not exchange CDP information.• Router E can use CDP to identify the IOS running on Router B.21. Which two statements describe functions or characteristics of CDP? (Choose two.)• It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.• It operates at the network layer and allows two systems to learn about each other.• It creates a topology map of the entire network.• It allows systems to learn about each other even if different network layer protocols are configured.• It forwards advertisements about routes for faster convergence.22. Which piece of information is available from examining the output of the command show ip interface brief?• Interface speed and duplex• Interface MTU• Errors• Interface MAC address• Interface IP addressCCNA 2 - Chapter 31A network administrator is determining the best placement of VLAN trunklinks. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)between two switches that share a common VLANbetween a switch and a server that has an 802.1Q NIC*between a switch and a client PCbetween a switch and a network printerbetween two switches that utilize multiple VLANs*2What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?The port automatically associates itself with the native VLAN. The port creates the VLAN again.The port goes back to the default VLAN.The port becomes inactive.*3Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used f or anything on the network.Disable autonegotiation and set ports to either static access or static trunk.Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.*4Which command is used to remove only VLAN 20 from a switch?no switchport access vlan 20delete flash:vlan.datno vlan 20*delete vlan.dat5A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?Erase the startup configuration and reboot the switch.Erase the running configuration and reboot the switch.Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*Delete the IP address that is assigned to the management VLAN and reboot the switch.6What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?VLAN 20 will be created automatically.*The command will have no effect on the switch.Port Fa0/18 will be shut down.An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?show mac address-table interface Fa0/1show interfaces Fa0/1 switchport*show interfaces trunkshow vlan brief8Place the options in the following order:- not scored -dynamic autononegotiatedynamic desirabletrunk9Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?Port Fa0/11 will be returned to VLAN 1.*VLAN 30 will be deleted.An error message would be displayed.Port Fa0/11 will be shutdown.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.*Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.11Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)Disable DTP autonegotiation on end-user ports.*Change the management VLAN to a distinct VLAN that is not accessible by regular users.Statically configure all ports that connect to end-user host devices to be in trunk mode.Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*Use SSH for all remote management access.12In a basic VLAN hopping attack, which switch feature do attackers take advantage of?automatic encapsulation negotiationthe default automatic trunking configuration*an open Telnet connectionforwarding of broadcasts13A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?It allows only VLAN 30 on Fa0/5.*It allows a native VLAN of 30 to be implemented on Fa0/5.It allows VLANs 1 to 30 on Fa0/5.It allows VLANs 10, 20, and 30 on Fa0/5.14Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?No VLAN tag is added to the frame.*A VLAN tag is added when the frame is accepted by the switch.A VLAN tag is added when the frame is forwarded out the port to PC-B.A VLAN tag is added when the frame leaves PC-A.15Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?The native VLAN is being pruned from the link.The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*The trunk has been configured with the switchport nonegotiate command. The native VLAN should be VLAN 60.16What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?All VLANs will be allowed across the trunk.*Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk. Only VLAN 1 will be allowed across the trunk.17Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)on links that should not be trunking*when connecting a Cisco switch to a non-Cisco switch*on links that should dynamically attempt trunkingwhen a neighbor switch uses a DTP mode of dynamic autowhen a neighbor switch uses a DTP mode of dynamic desirable18Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which PCs will receive the broadcast sent by PC-C?PC-D, PC-E*PC-A, PC-B, PC-D, PC-EPC-A, PC-BPC-A, PC-B, PC-D, PC-E, PC-FPC-A, PC-B, PC-E19Which two statements are true about VLAN implementation? (Choose two.)The network load increases significantly because of added trunking information.Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*The size of the collision domain is reduced.VLANs logically group hosts, regardless of physical location.*The number of required switches in a network decreases.20Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?switchport trunk allowed vlan add 99switchport trunk native vlan 66*switchport mode dynamic autoswitchport nonegotiate21Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?switch port securityPVLAN protected port*ACLVLAN22Fill in the blank. Use the full command syntax.The ” show vlan brief” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.23Which three statements accurately describe VLAN types? (Choose three).An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*A management VLAN is any VLAN that is configured to access management features of the switch.*A data VLAN is used to carry VLAN management data and user-generated traffic.Voice VLANs are used to support user phone and e-mail traffic on a network. VLAN 1 is always used as the management VLAN.After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*24Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?S1(config-if)# switchport mode trunkS1(config-if)# switchport mode accessS1(config-if)# switchport nonegotiate*S1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport trunk allowed vlan noneCCNA 2 - Chapter 41What type of IPv6 address is required as a minimum on IPv6 enabled interfaces?staticglobal unicastlink-local*loopbackunique local2In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)default gateway*hostnameDNS server addressDHCP server addressIP address*subnet mask*3What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)MAC addressesLayer 1 statuses*IP addresses*next-hop addressesinterface descriptionsspeed and duplex settings4Place the options in the following order:next hopdestination networkmetric- not scored -administrative distanceroute timestamproute source protocol- not scored -5Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)destination MAC addressnetwork numberdestination IP address*source MAC addresssubnet mask*6Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)Packets that are destined for the network 2001:DB8:ACAD:2::/64 will be forwarded through Fa0/1.R1 does not know a route to any remote networks.*The interface Fa0/1 is configured with IPv6 address2001:DB8:ACAD:A::12.*Packets that are destined for the network 2001:DB8:ACAD:2::54/128 will be forwarded through Fa0/0.The network FF00::/8 is installed through a static route command.7Refer to the exhibit. What is the purpose of the highlighted field in the line that is displayed from the show ip route command?It indicates that this is a directly connected route.It indicates that this route has been deleted from the routing table. It indicates that this route was learned via EIGRP.*It indicates that this is a default route.8Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)The metric varies depending which Layer 3 protocol is being routed, such as IP.A router first installs routes with higher administrative distances. The value of the administrative distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.* Administrative distance refers to the trustworthiness of a particular route.*The metric is always determined based on hop count.9What are two functions of a router? (Choose two.)It manages the VLAN database.It increases the size of the broadcast domain.It controls the flow of data via the use of Layer 2 addresses.It determines the best path to send packets.*It connects multiple IP networks.*10A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination? (Choose two.)destination MAC addresssource ARP tablesource IP address*destination IP address*source MAC addressLayer 2 header11。

ccna第二学期练习答案

ccna第二学期练习答案

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念 (版本1口令可用于限制对 Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项。

)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去第 2 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的 IP 地址。

从路由器 ping 相连网络上的主机口之间相互 ping 都会遭到失败。

此问题最可能的原因是什么必须使用no shutdown命令启用接口。

4请参见图示。

主机 A ping 主机 B。

当 R4 收到对以太网接口的 ping 时,哪两块报头信息包括在内(选择两项。

)目的 IP 地址:目的 MAC 地址:5网络管理员刚把新配置输入 Router1。

要将配置更改保存到 NVRAM,应该执行哪一条命令Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在 Sydney 路由器上发出以下哪条配置命令才能与 Melbourne 站点建立连接(选择三Sydney(config-if)# ip addressSydney no shutdownSydney(config-if)# clock rate 560007请参见图示。

从路由器的运行配置输出可得出什么结论显示的命令决定了路由器的当前运行情况。

8请参见图示。

在主机 2 连接到 LAN 上的交换机后,主机 2 无法与主机 1 通信。

导致此问题的原因是什么主机 1 和主机 2 位于不同的网络中。

9输入以下命令的作用是什么R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过 Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序加载 bootstrap、加载 IOS、应用配置11加载配置文件时的默认顺序是怎样的NVRAM、TFTP、CONSOLE12请参见图示。

CCNA02-final3

CCNA02-final3

1Which of the following are required when adding a network to the OSPF routing process conf iguration? (Choose three.)network addressloopback addressautonomous system numbersubnet maskwildcard maskarea ID2Using default settings, what is the next step in the router boot sequence after t he IOS loads from flash?Perf orm the POST routine.Search for a backup IOS in ROM.Load the bootstrap program f rom ROM.Load the running-config file from RAM.Locate and load the startup-config file from NVRAM.3Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1?198.18.0.0/16198.18.48.0/21198.18.32.0/22198.18.48.0/23198.18.49.0/23198.18.52.0/224Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statem (Choose three.)The missing information f or Blank 1 is the command show ip route .The missing information f or Blank 1 is the command debug ip route .The missing information f or Blank 2 is the number 100.The missing information f or Blank 2 is the number 120.The missing information f or Blank 3 is the letter R.The missing information f or Blank 3 is the letter C.5Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose t wo.)10.0.0.0/864.100.0.0/16128.107.0.0/16172.16.40.0/24192.168.1.0/24192.168.2.0/246When presented with multiple valid routes to a destination, what criteria does a router use to determine which routes to add to the routing table?The router selects the routes with the best metric. All routes that hav e the same best metric are added to the routing table.The router f irst selects routes with the lowest administrative distance. The resulting routes are then prioritized by metric and the routes with the best metric arouting table.The router selects the routes with the lowest administrativ e distance. All routes with the same lowest administrative distanc e are added to the routing table.The router installs all routes in the routing table but uses the route with the best metric most when load balancing.7Refer to the exhibit. All routers in the network are running RIPv2 and EIGRP with default routing protocol settings and have interfaces configured with the bandwidths t exhibit. Which protocol will be used and how will traffic between the Router1 LAN and Router5 LAN be routed through the network?RIPv2 will load balance across both paths between Router1 and Router5.EIGRP will load balance across both paths between Router1 and Router5.RIPv2 traffic will use the path Router1, Router2, Router5 because it has the least hops.EIGRP traffic will use the path Router1, Router3, Router4, Router5 because it has the best metric.8Of the listed routing protocols, which two will propogate LSPs to all neighbors? (Choose two.)IS-ISEIGRPOSPFRIPv1RIPv29Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are f ailing between the two routers. W hat change by the administrator will correctSet the encapsulation on both routers to PPP.Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544.Change the cable that connects the routers to a crossover cable.Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.10Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)The route to network 172.16.0.0 has an AD of 156160.Network 192.168.0.16 can best be reached using FastEthernet0/0.The AD of EIGRP routes has been manually changed to a value other than the default value.Router1 is running both the EIGRP and OSPF routing process.Network 172.17.0.0 can only be reached using a default route.No default route has been conf igured.11Which statement correctly describes a feasible successor in EIGRP?It is a primary route that is stored in the routing table.It is a backup route that is stored in the routing table.It is a primary route that is stored in the topology table.It is a backup route that is stored in the topology table.12Refer to the exhibit. A ping from R1 to 10.1.1.2 is successful, but a ping from R1 to 192.168.2.0 fails. What is the cause of this problem?There is no gateway of last resort at R1.The serial interf ace between the two routers is down.A default route is not configured on R1.The static route for 192.168.2.0 is incorrectly conf igured.13Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required toSwitch the cable with a known working cable.Issue the no shutdown command on the interface.Configure the interf ace as a loopback interface.Set the encapsulation for the interface.14Which two locations can be the source of the Cisco IOS that is used by a router during the bootup process? (Choose two.)flash memoryRAMNVRAMTFTP serverconfiguration register15All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been set on any of the routers. Which secondrouters use to determine the router ID?The highest MAC address among the active interfaces of the network will be used.There will be no router ID until a loopback interf ace is configured.The highest IP address among the activ e FastEthernet interfaces that are running OSPF will be used.The highest IP address among the activ e interfaces will be used.16Refer to the exhibit. A network administrator has conf igured OSPF using the following command:network 192.168.1.32 0.0.0.31 area 0Which router interf ace will participate in OSPF?FastEthernet0/0FastEthernet0/1Serial0/0/0Serial0/0/117Refer to the exhibit. All routers are properly configured with default configurations and are running the OSPF routing protocol. The network is f ully converged. A host on th with a host on the 192.168.2.0/24 network.Which path will be used to transmit the data?The data will be transmitted v ia R3-R2.The data will be transmitted v ia R3-R1-R2.The traffic will be load-balanced between two paths — one via R3-R2, and the other via R3-R1-R2.The data will be transmitted v ia R3-R2, and the other path via R3-R1-R2 will be retained as the backup path.18Which two situations require the use of a link-state protocol? (Choose two.)Fast convergence of the network is critical.The network is very large.The network administrator has limited knowledge to configure and troubleshoot routing protocols.The network is a flat network.The capacity of the router is low.19Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the v alue that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.20In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this nD 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/021Which statement is true about the RIPv1 protocol?It is a link-state routing protocol.It excludes subnet information from the routing updates.It uses the DUAL algorithm to insert backup routes into the topology table.It uses classless routing as the default method on the router.22Refer to the exhibit. The 10.4.0.0 network f ails. What mechanism prevents R2 f rom receiving false update information regarding the 10.4.0.0 network?split horizonhold-down timersroute poisoningtriggered updates23Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.24Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undef ined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.16 What is the reason for the ping f ailure?The serial interf ace between two routers is down.R2 is not forwarding the routing updates.The 192.168.4.0 network is not included in the RIP configuration of R2.RIPv1 needs to be configured.25Which statement correctly describes a feature of RIP?RIP is a link-state routing protocol.RIP uses only one metric—hop count— for path selection.Adv ertised routes with hop counts greater than 10 are unreachable.Messages are broadcast every 10 seconds.26Refer to the exhibit. When the show cdp neighbors command is issued f rom router C, which devices will be displayed in the output?B, DA, B, DD, SWH-2SWH-1, A, BSWH-1, SWH-2A, B, D, SWH-1, SWH-227Refer to the exhibit. Although R2 is conf igured correctly, host A is unable to access the Internet. What are two static routes that can be c onfigured on R1, either of which w (Choose two.)ip route 0.0.0.0 0.0.0.0 Fa0/0ip route 0.0.0.0 0.0.0.0 Fa0/1ip route 0.0.0.0 0.0.0.0 10.1.1.1ip route 0.0.0.0 0.0.0.0 10.1.1.2ip route 209.165.202.0 255.255.255.0 10.1.1.128Which component is typically used to connect the WIC interface of a router to a CSU/DSU?V.35 cableRJ-45 adaptercrossover cablestraight-through cable29Refer to the exhibit. Which combination of IP address and subnet mask can be used on the serial interf ace of Router2 in order to put the interf ace in the same networ interface of Router1?IP 172.16.0.18, subnet mask 255.255.255.0IP 172.16.32.15, subnet mask 255.255.255.240IP 172.16.0.18, subnet mask 255.255.255.252IP 172.16.32.18, subnet mask 255.255.255.25230Refer to the exhibit. Which host has a combination of IP address and subnet mask on the same network as Fa0/0 of Router1?host Ahost Bhost Chost D31Refer to the exhibit. OSPF is used f or the routing protocol and all interf aces are configured with the correct IP addresses and subnet masks. During testing, it is foun unable to form an adjacency with R2. What is the cause of this problem?Both routers have been configured with incorrect router IDs.Both routers have been configured in different OSPF areas.Both routers have been configured with an incorrect network type.Both routers have been configured with different hello and dead intervals.32You hav e been asked to explain converged networks to a trainee. How would you accurately describe a converged network?A network is converged when all routers have f ormed an adjacency.A network is converged immediately after a topology change has occurred.A network is converged when all routers flush the unreachable networks from their routing tables.A network is converged after all routers share the same information, calculate best paths, and update their routing tables.33 A network administrator is in charge of two separate networks that share a single building. What dev ice will be required to connect the two networks and add a comthe Internet that can be shared?hubrouteraccess pointEthernet switch34Which port should a terminal emulator be connected to in order to access a router without network connectivity?T1serialconsoleFastEthernet35Refer to the exhibit. What needs to be done to allow these two routers to connect successf ully?Add a clock rate to S0/0/0 on R1.Add an interface description to S0/0/1 on R2.Change the serial interface on R2 to S0/0/0 so that it matches R1.Change the IP address of S0/0/1 on R2 so that it is in the same subnet as R1.36Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router without entering a password?The login command was not entered on the console line.The enable password should be an enable secret password.No username and password combination has been configured.Console connections cannot be conf igured to require users to provide passwords.37Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway?10.1.1.110.1.1.2172.16.1.1192.168.1.138Refer to the exhibit. The entire 192.168.1.0 network has been allocated to address hosts in the diagram. Utilizing VLSM with contiguous address blocks, which set of pref ixes could be used to create an addressing solution with a minimum waste of IP addresses?39What is a function of a router?It extends the Layer 2 broadcast domain.It eliminates collisions among PCs on the same local network.It provides connectivity among PCs on the same physical segment.It forwards packets to different IP networks based on Layer 3 inf ormation.40Refer to the exhibit. Which solution provides the most efficient use of router resources for forwarding traffic between BR and HQ?RIPRIPv2EIGRPstatic routes41Refer to the exhibit. A network administrator configures a static route on router R1 to reach the 192.168.1.0/24 network. Which IP address should be used as the next ip route command?192.168.1.1192.168.2.1192.135.250.1192.135.250.242Refer to the exhibit. The network is conf igured with RIPv2. However, network administrators notice that communication cannot be successfully completed f rom one L network administrator issues the show ip route command on the HQ router. Based on the output, what should be done to correct the problem?Disable the load balancing feature of RIPv2.Issue the no auto-summary command for RIPv2.Replace RIPv2 with EIGRP which supports VLSM.Make sure that the network statements include the correct subnet mask.43Which protocol is used by EIGRP to deliver and receive update packets?FTPRTPTCPTFTPUDP44Refer to the exhibit. What OSPF network statements are required for the router B to adv ertise the three networks that are attached?router ospf 1network 10.0.0.0 0.0.0.255 area 0router ospf 1network 10.1.1.0 0.3.255.255 area 0network 10.10.1.0 0.255.255.255 area 0network 10.20.1.0 0.255.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.255.255 area 0network 10.20.1.0 0.0.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.0.255 area 0network 10.20.1.0 0.0.0.255 area 045Which two v alues are used by default to calculate a metric in EIGRP? (Choose two.) loaddelayreliabilityhop countbandwidth46Refer to the exhibit. Which statement is true concerning the routing configuration?Using dy namic routing instead of static routing would hav e required f ewer configuration steps.The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.Packets routed to the R2 Fast Ethernet interface require two routing table lookups.The static route will not work correctly.47Refer to the exhibit. On the basis of the show running-config output, which option correctly ref lects the routes that will be listed in the R2 routing table?48Refer to the exhibit. Which command should be issued to configure the address of the router interface that is attached to this computer?Router(config-if)# ip address 192.168.2.1 255.255.255.0Router(config-if)# ip address 192.168.2.2 255.255.255.0Router(config-if)# ip address 192.168.0.1 255.255.255.0Router(config-if)# ip address 192.168.0.2 255.255.255.049Refer to the exhibit. Which route will be removed from the routing table if manual EIGRP summarization is disabled on the Serial0/0/0 interface of Router3?0.0.0.0/0172.16.0.0/16172.16.1.0/24172.16.3.0/3050Refer to the exhibit. All interfaces are addressed and f unctioning correctly. The network administrator runs the tracert command on host A. Which two f acts could be output of this command? (Choose two.)The gateway for Host A is missing or improperly conf igured.The gateway for Host B is missing or improperly conf igured.The entry for 192.168.1.0/24 is missing f rom the routing table of R1.The entry for 192.168.1.0/24 is missing f rom the routing table of R2.The entry for 192.168.2.0/24 is missing f rom the routing table of R1.The entry for 192.168.2.0/24 is missing f rom the routing table of R2.。

CCNA第2期 2a DsmbISP Fina

CCNA第2期 2a DsmbISP  Fina

下列有关FTP 运作的说法中哪一项正确?在DTP(数据传输过程)功能完成后随即启用PI(协议解释程序)功能。

DTP 功能负责控制登录序列。

FTP 需要两条连接,一条用于发送控制信息,一条用于文件数据传输。

传输完成后,PI 和DTP 将自动关闭。

哪种路由协议使用DUAL 算法计算到达目的地的最短路径?OSPFEIGRPRIPBGP请参见图示。

如果主网地址为192.168.25.0/24,那么下列哪项子网掩码能容纳所有子网指示的主机数?255.255.0.0255.255.224.0255.255.255.0255.255.255.224255.255.255.240255.255.255.248请参见图示。

网络管理员使用以下命令在RTB 上配置了一条默认路由:RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0PC3 可以成功ping 通RTB。

但是当从PC3 发出的回应请求数据包到达PC1 后,却没有应答返回PC3。

怎样解决此问题?必须对RTA 进行配置,使其可以将数据包转发至192.168.2.0 网络。

需要修改ip route 命令,以便将下一跳地址设置为10.1.1.5。

需要修改ip route 命令,以便将下一跳地址设置为192.168.2.1。

需从RTB 路由器配置中删除ip route 命令。

需要在RTA 上另外配置一条下一跳地址为10.1.1.6 的默认路由。

在图中所示的其中一台路由器上执行show ip route 命令,显示下列输出:C 192.168.4.0/24 is directly connected, Serial0/0R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1C 192.168.3.0/24 is directly connected, Serial0/1此命令是从哪一台路由器执行的?ABCD192.168.17.111/28 属于哪一类地址?主机地址网络地址广播地址组播地址某黑客尝试获取存储在公司网络内部某台服务器上的机密信息。

CCNA02-final2

CCNA02-final2

1 Which of the following are primary functions of a router? (Choose two.)packet switchingmicrosegmentationdomain name resolutionpath selectionflow control2Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)The router modifies the TTL field, decrementing it by one.The router changes the source IP to the IP of the exit interface.The router maintains the same source and destination IP.The router changes the source physical address to the physical address of the exit interface.The router changes the destination IP to the IP of the exit interface.The router sends the packet out all other interfaces, besides the one it entered the router on.3Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network?ADCABCIt will load balance the traffic between ADC and ABCIt will send the traffic via ABC, and will use ADC as a backup path only when ABC fails.4Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is true regarding how the routers in this topology event?Router4 will learn about the failed route 30 seconds later in the next periodic update.Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires.Router5 immediately flushes the unreachable route from its routing table.Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.5Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)The route to network 172.16.0.0 has an AD of 156160.Network 192.168.0.16 can best be reached using FastEthernet0/0.The AD of EIGRP routes has been manually changed to a value other than the default value.Router1 is running both the EIGRP and OSPF routing process.Network 172.17.0.0 can only be reached using a default route.No default route has been configured.6If a router is booting with its default configuration register setting and its NVRAM lacks boot system commands, from where will the router try to load the IOS imageROMRAMNVRAMflashTFTP server7Two routers need to be configured within a single OSPF area. Which two components need to be configured on both routers to achieve this? (Choose two.)the same process IDthe same area IDnetwork addresses and wildcard masksthe same router IDthe same loop back address8Refer to the exhibit. The hosts on the R1 LAN are unable to access the Internet. What is incorrectly configured?the IP address of the Fa0/0 interface at R1the IP address of the S0/0/1 interface at R2the IP address of the S0/0/0 interface at R1the subnet mask of the S0/0/1 interface at R29Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?192.168.1.0/24192.168.0.0/24192.168.0.0/22192.168.1.0/2210Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?The IP address of host A is incorrect.The default gateway of host A is incorrect.The Fa0/1 interfaces of the two routers are configured for different subnets.The subnet mask for the Fa0/0 interface of R1 is incorrect.11Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicea modeman Ethernet switcha huba bridge12Refer to the exhibit. A network engineer has run the show version command on R3. Upon rebooting, R3 does not load the start-up configuration settings.What could be the cause of this problem?There is insufficient NVRAM.There is insufficient flash memory.The configuration register is not configured with the default setting.The system image file is not located in NVRAM.13Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the sh command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for th route?Compared to RIP, EIGRP has a lower administrative distance.Compared to EIGRP, RIP has a higher metric value for the route.Compared to RIP, the EIGRP route has fewer hops.Compared to RIP, EIGRP has a faster update timer.14Refer to the exhibit. R1 is configured properly for a single area OSPF, and R2 has been recently installed in the network. Which set of commands is required to confi OSPF for the networks that are connected to R2?R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config)# router ospf 2R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 1R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.0.0.0 0.0.0.3 area 115Refer to the exhibit. What information can be determined from the displayed output?EIGRP packets are waiting to be sent to the neighbors.The adjacencies between the routers are yet to be established.The IP address 192.168.10.10 is configured at serial interface S0/0/1 of router R2.Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interface.16Refer to the exhibit. The interfaces of all routers are configured for OSPF area 0. R3 can ping R1, but the two routers are unable to establish a neighbor adjacency. W network administrator do to troubleshoot this problem?Check if the interfaces of the routers are enabled.Check the hello and dead intervals between the routers.Check the process ID of both routers.Check if CDP is enabled on all the routers.17Refer to the exhibit. A network administrator has configured OSPF using the following command:network 192.168.1.32 0.0.0.31 area 0Which router interface will participate in OSPF?FastEthernet0/0FastEthernet0/1Serial0/0/0Serial0/0/118Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.19Refer to the exhibit. A network administrator adds this command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0. What is the result of adding this commandThis route is automatically propagated throughout the network.The traffic for network 172.16.1.0 is forwarded to network 192.168.2.0.A static route is established.The traffic for all Class C networks is forwarded to 172.16.1.2.20Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.21Which statement is true about the RIPv1 protocol?It is a link-state routing protocol.It excludes subnet information from the routing updates.It uses the DUAL algorithm to insert backup routes into the topology table.It uses classless routing as the default method on the router.22Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)authenticationlink-state advertisementshold-down timersSpanning Tree Protocolsplit horizon23Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?An incorrect IP address is configured between the two routers.No static route is configured on Router2.A routing loop has occurred.No routing protocol is configured on either of the two routers.24Which mechanism helps to avoid routing loops by advertising a metric of infinity?route poisoningsplit horizonhold-down timertriggered updates25Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.26Which two statements are true about the EIGRP successor route? (Choose two.)It is saved in the topology table for use if the primary route fails.It may be backed up by a feasible successor route.It is used by EIGRP to forward traffic to the destination.It is flagged as active in the routing table.After the discovery process has occurred, the successor route is stored in the neighbor table.27In which situation would a default static route be recommended?when connecting an edge router to the Internetwhen variable length subnet masking is in effectwhen there is more than one valid route for a destination networkwhen a destination network has a larger mask than any routes in the routing table28Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that interface FastEthernet0/1 is not functioning. Which ac correct the problem with FastEthernet0/1?A clock rate should be added to the interface configuration.The subnet mask should be added to the interface configuration.An interface description needs to be added to the interface configuration.The no shutdown command needs to be added to the interface configuration.29Refer to the exhibit. Which combination of IP address and subnet mask can be used on the serial interface of Router2 in order to put the interface in the same networ interface of Router1?IP 172.16.0.18, subnet mask 255.255.255.0IP 172.16.32.15, subnet mask 255.255.255.240IP 172.16.0.18, subnet mask 255.255.255.252IP 172.16.32.18, subnet mask 255.255.255.25230 A network administrator is analyzing routing update behavior on a network that has both EIGRP and OSPF configured on all routers. Both protocols appear in the oprotocols. However, only EIGRP internal routes appear in the routing tables. Which statement correctly explains the scenario?The OSPF protocol has a higher cost than EIGRP.The EIGRP protocol has a lower metric than OSPF.The EIGRP protocol was configured first on the router.The EIGRP protocol has a lower administrative distance than OSPF.31Which prompt is used to allow a user to change the IP address of an interface on a router?Router>Router#Router(config)#Router(config-if)#32Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configured and operational. Both routers are configu connected interfaces in routing updates. R2 is not showing any routes from R1 in the routing table. What is the likely cause?The adjacent interfaces are passive.The distance of 120 exceeds 15 hops.R2 will not accept version 1 updates from R1.Routes are being summarized by R1 but not by R2.33 A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a comthe Internet that can be shared?hubrouteraccess pointEthernet switch34 A network administrator must use the subnet 172.16.128.0/18 to create 6 additional subnets each containing up to 2000 hosts for local LANs. Which subnet mask sadministrator use to create the new subnets?255.255.224.0255.255.240.0255.255.248.0255.255.252.035Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a static route entry be altered to accommodate aKeep the existing static route and configure a new static route with the correct next hop IP address.Negate the existing static route and configure a new static route with the correct next hop IP address.Do nothing. The existing static route will automatically update the next hop entry with the new IP address.Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP address.36Refer to the exhibit. What needs to be done to allow these two routers to connect successfully?Add a clock rate to S0/0/0 on R1.Add an interface description to S0/0/1 on R2.Change the serial interface on R2 to S0/0/0 so that it matches R1.Change the IP address of S0/0/1 on R2 so that it is in the same subnet as R1.37Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router without entering a password?The login command was not entered on the console line.The enable password should be an enable secret password.No username and password combination has been configured.Console connections cannot be configured to require users to provide passwords.38Refer to the exhibit. Host A is having problems accessing server A. All routers have the same EIGRP configuration as router RTR_A. What should be done so that ho server A?Add the command no auto-summary on all routers.Change the network statements to include a wildcard mask.Adjust the EIGRP hello timers to account for the network delay.Add the command eigrp log-neighbor-changes on all routers.39Refer to the exhibit. The network administrator has run the following command on R1.R1(config)# ip route 192.168.2.0 255.255.255.0 172.16.1.2What is the result of running this command?Traffic for network 192.168.2.0 is forwarded to 172.16.1.2.This route is automatically propagated throughout the entire network.Traffic for all networks is forwarded to 172.16.1.2.The command invokes a dynamic routing protocol for 192.168.2.0.40What are two ways that a router can learn of the paths to destination networks? (Choose two.)updates from other routersDHCP information broadcastsmanual configuration of routesARP requests from connected routersinspection of the destination IP address in data packetsupdates from the SMTP management information base41Why is fast convergence desirable in networks that use dynamic routing protocols?Hosts are unable to access their gateway until the network is converged.Routers will not allow packets to be forwarded until the network is converged.Routers may make incorrect forwarding decisions until the network has converged.Routers will not allow configuration changes to be made until the network has converged.42A router learns about network 192.168.10.128/27 from multiple sources. Which option represents the best route and will be placed in the routing table?S 192.168.10.128/27 [1/0] via 192.168.10.226R 192.168.10.128/27 [120/2] via 192.168.10.226, 00:00:14, Serial0/0/0O 192.168.10.128/27 [110/1563] via 192.168.10.226, 00:00:09, Serial0/0/0D 192.168.10.128/27 [90/21026560] via 192.168.10.226, 00:00:16, Serial0/0/043Which candidate route has the longest match for a packet with a destination address of 10.30.16.48?10.30.0.0/1610.30.15.0/2310.30.16.0/2410.30.16.32/2710.30.16.32/3044Which feature of RIPv2 enables it to function as a classless routing protocol?Subnet masks are included in routing updates.Routing updates are triggered by topology changes.Next-hop addresses are included in routing updates.Multicast addresses are used to send routing updates.45Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. All routers are operational and pings are network.Which ping will fail?from R1 to 172.16.1.1from R1 to 192.168.3.1from R2 to 192.168.1.1from R2 to 192.168.3.146 A technician configures the Fa0/0 interface on a router with ip address 192.168.3.5 255.255.255.252. What additional command must be issued by the technicianinterface to forward traffic?Router(config-if)# exitRouter(config-if)# no shutdownRouter(config-if)# clock rateRouter# copy running-config startup-config47Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?48Refer to the exhibit. A router interface is configured with the command ip address 172.16.3.31 255.255.192.0. Which set of addressing values would allow a compute to the router interface to communicate with remote networks?A: 172.16.3.254 B: 255.255.192.0 C: 172.16.3.31A: 172.16.3.31 B: 255.255.192.0 C: 172.16.3.255A: 172.16.3.254 B: 255.255.255.0 C: 172.16.3.31A: 172.16.3.31 B: 255.255.255.0 C: 172.16.3.149Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)10.0.0.0/864.100.0.0/16128.107.0.0/16172.16.40.0/24192.168.1.0/24192.168.2.0/2450Refer to the exhibit. When all of the commands that are shown in the exhibit are entered at the correct router prompt, what is the name of the router?nameciscorouterhostname。

2.计算机网络原理第二章课后习题及答案

2.计算机网络原理第二章课后习题及答案

第二章1. (Q2)For a communication session between a pair of processes, which process is the client and which is the server?Answer:The process which initiates the communication is the client; the process that waits to be contacted is the server..2. (Q3) What is the difference between network architecture and application architecture?Answer:Network architecture refers to the organization of the communication processintolayers (e.g., the five-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates the broadstructure of the application (e.g., client-server or P2P)3. (Q4) What information is used by a process running on one host to identify a process running on another host?Answer: The IP address of the destination host and the port number of the destinationsocket.4. (Q6) Referring to Figure 2.4, we see that none of the application listed in Figure 2.4 requires both no data loss and timing. Can you conceive of an application that requires no data loss and that is also highly time-sensitive?Answer: There are no good example of an application that requires no data loss and timing.If you know of one, send an e-mail to the authors5. (Q9) Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP?Answer: The applications associated with those protocols require that all application databe received in the correct order and without gaps. TCP provides this servicewhereas UDP does not.6. (Q11) What is meant by a handshaking protocol?Answer: A protocol uses handshaking if the two communicating entities first exchangecontrol packets before sending data to each other. SMTP uses handshaking at theapplication layer whereas HTTP does not.7. (Q13) Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Answer: Issued the following command (in Windows command prompt) followed by theHTTP GET message to the “” web server:> telnet 80Since the index.html page in this web server was not modified since Fri, 18 May2007 09:23:34 GMT, the following output was displayed when the abovecommands were issued on Sat, 19 May 2007. Note that the first 4 lines are theGET message and header lines input by the user and the next 4 lines (startingfrom HTTP/1.1 304 Not Modified) is the response from the web server.8. (Q14) Consider an e-commerce site that wants to keep a purchase record for each of its customers. Describe how this can be done with cookies.Answer: When the user first visits the site, the site returns a cookie number. This cookie number is stored on the user’s host and is managed by the browser. During each subsequent visit (and purchase), the browser sends the cookie number back to the site. Thus the site knows when this user (more precisely, this browser) is visiting the site.9. (Q15) Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.Answer: Message is sent from Alice’s host to her mail server over HTTP. Alice’s mail server then sends the message to Bob’s mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3.10. (Q10) Recall that TCP can be enhanced with SSL to provide process-to-process securityservices, including encryption. Does SSL operate at the transport layer or the application layer? If the application developer wants TCP to be enhanced with SSL, what does the developer have to do?Answer: SSL operates at the application layer. The SSL socket takes unencrypted data fromthe application layer, encrypts it and then passes it to the TCP socket. If theapplication developer wants TCP to be enhanced with SSL, she has to include theSSL code in the application.11. (Q16) Print out the header of an e-mail message you have recently received. How manyReceived: header lines are there? Analyze each of the header lines in the message.Answer: from 65.54.246.203 (EHLO )Received:(65.54.246.203) by with SMTP; Sat, 19 May 2007 16:53:51 -0700from ([65.55.135.106]) by Received: with Microsoft SMTPSVC(6.0.3790.2668); Sat, 19 May 2007 16:52:42 -0700 Received: from mail pickup service by with Microsoft SMTPSVC; Sat,19 May 2007 16:52:41 -0700Message-ID: <*******************************************>Received: from 65.55.135.123 by with HTTP; Sat, 19 May 2007 23:52:36 GMTFrom: "prithuladhungel"<***************************>To: ******************Bcc:Subject: Test mailDate: Sat, 19 May 2007 23:52:36 +0000Mime-Version:1.0Content-Type: Text/html; format=flowedReturn-Path: ***************************Figure: A sample mail message headerReceived: This header field indicates the sequence in which the SMTP serverssend and receive the mail message including the respective timestamps.In this example there are 4 “Received:” header lines. This means the mailmessage passed through 5 different SMTP servers before being delivered to thereceiver’s mail box. The la st (forth) “Received:” header indicates the mailmessage flow from the SMTP server of the sender to the second SMTP server inthe chain of servers. The sender’s SMTP server is at address 65.55.135.123 andthe second SMTP server in the chain is .The third “Received:” header indicates the mail message flow from the secondSMTP server in the chain to the third server, and so on.Finally, the first “Received:” header indicates the flow of the mail message fromthe forth SMTP server to t he last SMTP server (i.e. the receiver’s mail server) inthe chain.Message-id: The message has been given this*************************************************(bybay0-omc3-s3.bay0.hotmail.com. Message-id is a unique string assigned by the mail systemwhen the message is first created.From: This indicates the email address of the sender of the mail. In the givenexample,**************************************To: This field indicates the email address of the receiver of the mail. In theexample, the ****************************Subject: This gives the subject of the mail (if any specified by the sender). In theexample, the subject specified by the sender is “Test mail”Date: The date and time when the mail was sent by the sender. In the example,the sender sent the mail on 19th May 2007, at time 23:52:36 GMT.Mime-version: MIME version used for the mail. In the example, it is 1.0.Content-type: The type of content in the body of the mail message. In theexample, it is “text/html”.Return-Path: This specifies the email address to which the mail will be sent if thereceiver of this mail wants t o reply to the sender. This is also used by the sender’smail server for bouncing back undeliverable mail messages of mailer-daemonerror messages. In the example, the return path is“***************************”.12. (Q18) Is it possible for an organizat ion’s Web server and mail server to have exactly thesame alias for a hostname (for example, )? What would be the type for the RR that contains the hostname of the mail server?Answer: Yes an organization’s mail server and Web server can have the sa me alias for ahost name. The MX record is used to map the mail server’s host name to its IPaddress.13. (Q19) Why is it said that FTP sends control information “out-of-band”?Answer:FTP uses two parallel TCP connections, one connection for sending controlinformation (such as a request to transfer a file) and another connection foractually transferring the file. Because the control information is not sent over thesame connection that the file is sent over, FTP sends control information out ofband.14. (P6) Consider an HTTP client that wants to retrieve a Web document at a given URL. The IPaddress of the HTTP server is initially unknown. What transport and application-layer protocols besides HTTP are needed in this scenario?Answer:Application layer protocols: DNS and HTTPTransport layer protocols: UDP for DNS; TCP for HTTP15. (P9) Consider Figure2.12, for which there is an institutional network connected to theInternet. Suppose that the average object size is 900,000 bits and that the average request rate from the institution’s browsers to the origin servers is 10 requests per second. Also suppose that the amount of time it takes from when the router on the Internet side of the access link forwards an HTTP request until it receives the response is two seconds on average (see Section 2.2.5).Model the total average response times as the sum of the average access delay (that is, the delay from Internet router to institution router) and the average Internet delay. For the average access delay, use △/(1-△β), where △is the average time required to send an object over the access link and βis the arrival rate of objects to the access link.a. Find the total average response time.b. Now suppose a cache is installed in the institutional LAN. Suppose the hit rate is 0.6. Findthe total response time.Answer:a.The time to transmit an object of size L over a link or rate R is L/R. The average timeisthe average size of the object divided by R:Δ= (900,000 bits)/(1,500,000 bits/sec) = 0.6 secThe traffic intensity on the link is (1.5 requests/sec)(0.6 sec/request) = 0.9. Thus, theaverage access delay is (0.6 sec)/(1 - 0.9) = 6 seconds. The total average response timeis therefore 6 sec + 2 sec = 8 sec.b.The traffic intensity on the access link is reduced by 40% since the 40% of therequestsare satisfied within the institutional network. Thus the average access delayis(0.6 sec)/[1–(0.6)(0.9)] = 1.2 seconds. The response time is approximately zero iftherequest is satisfied by the cache (which happens with probability 0.4); the averageresponse time is 1.2 sec + 2 sec = 3.2 sec for cache misses (which happens 60% of thetime). So the average response time is (0.4)(0 sec) + (0.6)(3.2 sec) = 1.92 seconds.Thusthe average response time is reduced from 8 sec to 1.92 sec.16. (P12) What is the difference between MAIL FROM: in SMTP and From: in the mail messageitself?Answer: The MAIL FROM: in SMTP is a message from the SMTP client that identifies the senderof the mail message to the SMTP server. TheFrom: on the mail message itself is NOTanSMTP message, but rather is just a line in the body of the mail message.17. (P16) Consider distributing a file of F = 5 Gbits to N peers. The server has an upload rate ofu s = 20 Mbps, and each peer has a download rate of d i =1 Mbps and an upload rate of u. For N = 10, 100, and 1,000 and u = 100 Kbps, 250 Kbps, and 500 Kbps, prepare a chart giving the minimum distribution time for each of the combinations of N and u for both client-server distribution and P2P distribution.Answer:For calculating the minimum distribution time for client-server distribution, we use thefollowing formula:D cs = max {NF/u s , F/d min }Similarly, for calculating the minimum distribution time for P2P distribution, we use thefollowing formula:D P 2P = max {F /u s ,F /d min ,NF /( u s + u i n i =1 )} Where,F = 5 Gbits = 5 * 1024 Mbits u s = 20 Mbps d min = d i = 1 MbpsClient Server:N 10 100 1000 200 Kbps10240 51200 512000 u 600 Kbps10240 51200 512000 1Mbps10240 51200 512000Peer to Peer:N 10 100 1000 200 Kbps10240 25904.3 47559.33 U 600 Kbps10240 13029.6 16899.64 1 Mbps10240 10240 10240。

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。

)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。

你应该使用什么协议来完成这?A. SMTP简单传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4.What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A.RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。

CCNA第二学期第二章考试答案

CCNA第二学期第二章考试答案

以下是针对您未获得满分的试题给出的反馈。

某些交互式试题可能不显示您的答案。

分项分数:1哪个接口是包含用于管理24 个端口以太网交换机的IP 地址的默认位置?正确响应您的响应VLAN 1Fa0/0Fa0/1连接到默认网关的接口VLAN 99此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.1 使用初始设置配置交换机2下列关于使用全双工快速以太网的陈述中,哪三项是正确的?(请选择三项。

)正确响应您的响应通过双向数据流改善了性能。

由于禁用了设备上的冲突检测功能,因此性能得到了改善。

节点以全双工单向数据流运行。

由于网卡可以检测到冲突,因此性能得到了改善。

全双工快速以太网在两个方向上提供100% 的效率。

由于网卡能更快速地处理帧,因此延迟减少了。

此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.2 配置交换机端口3使用mdix auto 配置命令会对交换机上的以太网接口产生什么影响?正确响应您的响应自动检测双工设置自动检测接口速度自动检测铜电缆类型自动将第一个检测到的MAC 地址分配给接口此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.2 配置交换机端口4在Cisco IOS 软件无法加载的情况下,网络管理员需要哪种类型的电缆将PC 与交换机连接才能恢复它?正确响应您的响应同轴电缆控制台电缆交叉电缆直通电缆因为交换机上没有运行Cisco IOS 软件,所以管理员需要使用控制台电缆将PC 连接到交换机控制台端口,比便将来自PC 的软件转移到交换机。

此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.1 使用初始设置配置交换机5在对连接问题进行故障排除时,网络管理员发现交换机端口状态LED 在绿色和琥珀色之间跳转。

CCNA2. 2014 Chapter 2 (Form A).Answer

CCNA2. 2014 Chapter 2 (Form A).Answer

CCNA2.Chapter 2 (Form A)1What are two advantages of static routing over dynamic routing? (Choose two.)Static routing is more secure because it does not advertise over the network.Static routing scales well with expanding networks.Static routing requires very little knowledge of the network for correct implementation.Static routing uses fewer router resources than dynamic routing.Static routing is relatively easy to configure for large networks.Static routing requires a thorough understanding of the entire network for proper implementation. It can be prone to errors and does not scale well for large networks. Static routing uses fewer router resources, because no computing is required for updating routes. Static routing can also be more secure because it does not advertise over the network.This item references content from the following areas: Routing Protocols2.1.1 Static Routing2Refer to the exhibit.Which is the best way for PC A and PC B to successfully communicate with sites on theInternet?Configure a static route from R1 to ISP and a dynamic route from ISP to R1.Configure a default route from R1 to ISP and a static route from ISP to R1.Configure a dynamic route from R1 to ISP and a static route from ISP to R1.Configure a routing protocol between R1 and ISP and advertise all the routes.Two routes have to be created: a default route in R1 to reach ISP and a static route in ISP to reach R1 for the return traffic. This is abest solution once PC A and PC B belong to stub networks. Moreover, static routing consumes less bandwidth than dynamic routing.This item references content from the following areas:Routing Protocols∙ 2.1.1 Static Routing3 What type of route allows a router to forward packets even though its routing table containsno specific route to the destination network?dynamic routedefault routedestination routegeneric routeThis item references content from the following areas:Routing Protocols∙ 2.1.2 Types of Static Routes4 Why would a floating static route be configured with an administrative distance that is higherthan the administrative distance of a dynamic routing protocol that is running on the same router?to be used as a backup routeto load-balance the trafficto act as a gateway of last resortto be the priority route in the routing tableBy default, dynamic routing protocols have a higher administrative distance than static routes. Configuring a static route with a higher administrative distance than that of the dynamic routing protocol will result in the dynamic route being used instead of the static route. However, should the dynamically learned route fail, then the static route will be used as a backup.This item references content from the following areas:Routing Protocols∙ 2.1.2 Types of Static Routes5 Which type of static route that is configured on a router uses only the exit interface?recursive static routedirectly connected static routefully specified static routedefault static routeWhen only the exit interface is used, the route is a directly connected static route. When the next-hop IP address is used, the route is a recursive static route. When both are used, it is a fully specified static route.This item references content from the following areas:Routing Protocols∙ 2.2.1 Configure IPv4 Static Routes6Refer to the graphic. Whichcommand would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?A(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2A(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2A(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1A(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0The destination network on LAN C is 192.168.4.0 and the next-hop address from the perspective of router A is 192.168.3.2.This item references content from the following areas:Routing Protocols∙ 2.2.1 Configure IPv4 Static Routes7 The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0172.16.2.2 command. How will this route appear in the routing table?C 172.16.1.0 is directly connected, Serial0/0S 172.16.1.0 is directly connected, Serial0/0C 172.16.1.0 [1/0] via 172.16.2.2S 172.16.1.0 [1/0] via 172.16.2.2This item references content from the following areas:Routing Protocols∙ 2.2.1 Configure IPv4 Static Routes8Refer to the exhibit. What two commands willchange the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2?(Choose two.)A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2This item references content from the following areas: Routing Protocols2.2.1 Configure IPv4 Static Routes9 The output of the show ip routecommand contains the following entry:S 10.2.0.0 [1/0] via 172.16.2.2.What value is indicated by the 1 in the [1/0] portion of the output?metricnumber of hopsadministrative distanceinterface ID through which the network can be reachedIn the routing table entry, S 10.2.0.0 [1/0] via 172.16.2.2, the numbers inside the bracket indicate the administrative distance and metric respectively.This item references content from the following areas:Routing Protocols∙ 2.2.1 Configure IPv4 Static Routes10Refer to the exhibit. The network administrator needs to configure a default route on the Border router. Whichcommand would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets?Border(config)# ip route 0.0.0.0 0.0.0.0 198.133.219.5Border(config)# ip route 0.0.0.0 0.0.0.0 198.133.219.6Border(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1Border(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0The default route configured with the next-hop option requires a recursive lookup.This item references content from the following areas:Routing Protocols∙ 2.2.2 Configure IPv4 Default Routes11Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?ipv6 route ::/0 serial0/0/0ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::1ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2ipv6 route 2001:db8:1::/65 2001:db8:1:3::1To configure an IPv6 static route, use the ipv6 route command followed by the destination network. Then add either the IP address ofthe adjacent router or the interface R1 will use to transmit a packet to the 2001:db8:1:4::/64 network.This item references content from the following areas:Routing Protocols2.2.3 Configure IPv6 Static Routes12Refer to the exhibit. Whichdefault static route command would allow R1 to potentially reach all unknown networks onthe Internet?R1(config)# ipv6 route 2001:db8:32::/64 G0/0R1(config)# ipv6 route ::/0 G0/0 fe80::2R1(config)# ipv6 route ::/0 G0/1 fe80::2R1(config)# ipv6 route 2001:db8:32::/64 G0/1 fe80::2To route packets to unknown IPv6 networks a router will need an IPv6 default route. The static route ipv6 route ::/0 G0/1 fe80::2 will match all networks and send packets out the specified exit interface G0/1 toward R2.This item references content from the following areas: Routing Protocols∙ 2.2.4 Configure IPv6 Default Routes13 Which two statements describe classful IP addresses? (Choose two.)It is possible to determine which class an address belongs to by reading the first bit.The number of bits used to identify the hosts is fixed by the class of the network.Only Class A addresses can be represented by high-order bits 100.Up to 24 bits can make up the host portion of a Class C address.All subnets in a network are the same size.Three of the five classes of addresses are reserved for multicasts and experimental use.This item references content from the following areas: Routing Protocols∙ 2.3.1 Classful Addressing14 A company has several networks with the following IP address requirements: IP phones - 50 PCs - 70IP cameras - 10wireless access points - 10 network printers - 10network scanners - 2Which block of addresses would be the minimum to accommodate all of these devices if each type of device was on its own network?172.16.0.0/25172.16.0.0/24172.16.0.0/23172.16.0.0/22The network for the PCs would require a subnet mask of /25 in order to accommodate 70 devices. That network could use IP addresses 0 through 127. Phones require a subnet mask of /26 for 50 devices (addresses 128-191). Three /28 networks are needed in order to accommodate cameras, APs, and printers. The network scanner network can use a /30. A block of addresses with a mask of/24 will accommodate this site as the minimum amount needed.This item references content from the following areas:Routing Protocols∙ 2.3.3 VLSM15 What does VLSM allow a network administrator to do?utilize one subnet mask throughout a hierarchical networkutilize multiple routing protocols within an autonomous systemutilize one dynamic routing protocol throughout the entire networkutilize multiple different subnet masks in the same IP address spaceutilize one public IP address to translate multiple private addressesThis item references content from the following areas:Routing Protocols∙ 2.3.3 VLSM16 What would be the best summary route for the following networks?10.50.168.0/2310.50.170.0/2310.50.172.0/2310.50.174.0/2410.50.160.0/2210.50.164.0/2310.50.168.0/1610.50.168.0/2110.50.168.0/2210.50.168.0/23Write 168, 170, 172, and 174 (the third octet where things start changing) in binary. Look at the 1s and 0s pattern. Notice the digits on the right where the change occurs. Draw a line after the column of 1s or 0s that is the last column that remains constant (exactly the same) to the left of that line. This would be immediately after the "8s" column, meaning that the 128, 64, 32, 16, and 8 columns all have the same pattern of 1s and 0s. Because this is in the third octet and the mask is /16 for the first two octets, add 5 more to the mask for the columns that are consistently the same in the third octet (/21).This item references content from the following areas:Routing Protocols2.4.1 Configure IPv4 Summary Routes17 What is a valid summary route for IPv6 networks 2001:0DB8:ACAD:4::/64,2001:0DB8:ACAD:5::/64, 2001:0DB8:ACAD:6::/64, and 2001:0DB8:ACAD:7::/64?2001:0DB8:ACAD:0000::/632001:0DB8:ACAD:0000::/642001:0DB8:ACAD:0004::/622001:0DB8:ACAD:0004::/63The IPv6 networks with the fourth octet of hex characters converted to binary are:2001:0DB8:ACAD:0000000000000100::/642001:0DB8:ACAD:0000000000000101::/642001:0DB8:ACAD:0000000000000110::/642001:0DB8:ACAD:0000000000000111::/64The common bits are 2001:0DB8:ACAD:00000000000001. Then add zeros to determine the network summarized address, giving 2001:0DB8:ACAD:0000000000000100. Convert this to hexadecimal and count the number of left-most matching bits. The summarized address will be 2001:0DB8:ACAD:0004::/62.This item references content from the following areas:Routing Protocols∙ 2.4.2 Configure IPv6 Summary Routes18Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?ip route 198.133.219.24 255.255.255.252ip route 64.100.210.80 255.255.255.252ip route 198.133.219.24 255.255.255.252ip route 64.100.210.80 255.255.255.252 10ip route 0.0.0.0 0.0.0.0 s0/0/0ip route 0.0.0.0 0.0.0.0 s0/1/0ip route 0.0.0.0 0.0.0.0 s0/0/0ip route 0.0.0.0 0.0.0.0 s0/1/0 10A static route that has no administrative distance added as part of the command has a default administrative distance of 1. The backuplink should have a number higher than 1. The correct answer has an administrative distance of 10. The other quad zero route wouldload balance packets across both links and both links would appear in the routing table. The remaining answers are simply static routes (either a default route or a floating static default route).This item references content from the following areas:Routing Protocols∙ 2.4.3 Configure Floating Static Routes19 Which three IOS troubleshooting commands can help to isolate problems with a static route?(Choose three.)show versionpingtracertshow ip routeshow ip interface briefshow arpThe ping, show ip route, and show ip interface brief commands provide information to help troubleshoot static routes. Showversion does not provide any routing information. The tracert command is used at the Windows command prompt and is not an IOS command. The show arp command displays learned IP address to MAC address mappings contained in the Address ResolutionProtocol (ARP) table.This item references content from the following areas:Routing Protocols2.5.2 Troubleshoot IPv4 Static and Default Route Configuration20Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?R2 needs a static route to the R1 LANs.R1 and R2 must use a dynamic routing protocol.R1 needs a default route to R2.R1 needs a static route to the R2 LAN.R2 needs a static route to the Internet.R1 has a default route to the Internet. R2 has a default route to R1. R1 is missing a static route for the 10.0.60.0 network. Any trafficthat reached R1 and is destined for 10.0.60.0/24 will be routed to the ISP.This item references content from the following areas:Routing Protocols∙ 2.5.2 Troubleshoot IPv4 Static and Default Route Configuration21 What happens to a static route entry in a routing table when the outgoing interface is notavailable?The route is removed from the table.The router polls neighbors for a replacement route.The route remains in the table because it was defined as static.The router redirects the static route to compensate for the loss of the next hop device.This item references content from the following areas:Routing Protocols∙ 2.5.2 Troubleshoot IPv4 Static and Default Route Configuration22 The PT initialization was skipped. You will not be able to view the PT activity.Open the PT activity. Perform the tasks in the activity instructions and then answer the question. What is the name of the web server that is displayed in the webpage?Main-WebserverWWW-ServerWebserver10MNSRVStatic routes can be configured by using the syntax router(config)# ip route prefix mask {ip-address | exit-intf}. In this case, the command to be issued would be router(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2.This item references content from the following areas:Routing Protocols∙ 2.2.1 Configure IPv4 Static Routes23 The PT initialization was skipped. You will not be able to view the PT activity.Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.What IPv6 static route can be configured on router R1 to make a fully converged network?ipv6 route 2001:db8:10:12::/64 S0/0/1ipv6 route 2001:db8:10:12::/64 S0/0/0ipv6 route 2001:db8:10:12::/64 2001:db8:10:12::1ipv6 route 2001:db8:10:12::/64 2001:db8:32:77::1To reach the remote network, R1 will need a static route with a destination IPv6 address of 2001:db8:10:12::/64 and an exit interface ofS0/0/1. The correct static route configuration will be as follows:ipv6 route 2001:db8:10:12::/64 S0/0/1.This item references content from the following areas:Routing Protocols∙ 2.2.3 Configure IPv6 Static Routes。

ccna第二学期练习答案中文

ccna第二学期练习答案中文

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念(版本4.0)1口令可用于限制对Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项。

)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去?第 2 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的IP 地址。

从路由器ping 相连网络上的主机口之间相互ping 都会遭到失败。

此问题最可能的原因是什么?必须使用no shutdown命令启用接口。

4请参见图示。

主机 A ping 主机B。

当R4 收到对以太网接口的ping 时,哪两块报头信息包括在内?(选择两项。

)目的IP 地址:192.168.10.134目的MAC 地址:9999.DADC.12345网络管理员刚把新配置输入Router1。

要将配置更改保存到NVRAM,应该执行哪一条命令?Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在Sydney 路由器上发出以下哪条配置命令才能与Melbourne 站点建立连接?(选Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# clock rate 560007请参见图示。

从路由器的运行配置输出可得出什么结论?显示的命令决定了路由器的当前运行情况。

8请参见图示。

在主机 2 连接到LAN 上的交换机后,主机2 无法与主机 1 通信。

导致此问题的原因是什么?主机 1 和主机2 位于不同的网络中。

9输入以下命令的作用是什么?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序?加载bootstrap、加载IOS、应用配置11加载配置文件时的默认顺序是怎样的?NVRAM、TFTP、CONSOLE12请参见图示。

CCNASecurityChap2答案

CCNASecurityChap2答案

Which three services on a router does Cisco SDM One-Step Lockdown enable? (Choose three.)SNMPTCP interceptsSSH access to the routerCisco Discovery Protocolpassword encryption servicefirewall on all outside interfacesWhich statement describes the operation of the Cisco SDM Security Audit wizard?The wizard configures a router to prevent unauthorized access.The wizard compares a router configuration against recommended settings.The wizard monitors network data and logs possible unauthorized or malicious traffic.The wizard logs the effectiveness of network security measures for baselinecomparisons.Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?HTTPCDPFTPNTPTFTPRefer to the exhibit. What two facts can be determined from the output? (Choose two.)The Cisco IOS image and configuration files have been properly secured.ROMmon mode will be inaccessible upon entering the privileged EXEC reloadcommand.The Cisco IOS Resilient Configuration feature is enabled.The Cisco IOS Resilient Configuration feature has detected an image versionmismatch.The Cisco IOS configuration files have been erased.An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?privilege exec level 0privilege exec level 1privilege exec level 2privilege exec level 15What is the minimum recommended modulus key length for keys generated to use with SSH?25651276810242048Which three options can be configured by Cisco AutoSecure? (Choose three.)CBACSNMPsyslogsecurity bannerinterface IP addressenable secret passwordWhich three commands are required to restore a primary bootset from a secure archive on a router on which Cisco IOS resilience is enabled? (Choose three.)Restart the router in ROM monitor mode and display the secure bootset Cisco IOS image name using the dir command.Restart the router, enter privileged EXEC mode, and display the secure bootset Cisco IOS image name using the show flash command.Boot the secure bootset Cisco IOS image using the boot command with the filename.Copy the secure bootset Cisco IOS image to flash using the copy IOS-backup-image flash command.Restore the secure configuration file using the copy config-backup flash command.Restore the secure configuration file using the secure boot-config restore filename command.Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)Both routers are configured to use NTPv2.Router R1 is the master, and R2 is the client.Router R2 is the master, and R1 is the client.The IP address of R1 is 192.168.1.2.The IP address of R2 is 192.168.1.2.What are two characteristics of SNMP community strings? (Choose two.)A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the communitystrings in plaintext.Commonly known community strings should be used when configuring secure SNMP.If the manager sends one of the correct read-only community strings, it can getinformation and set information in an agent.SNMP read-only community strings can be used to get information from anSNMP-enabled device.SNMP read-write community strings can be used to set information on anSNMP-enabled device.What are three requirements that must be met if an administrator wants to maintain device configurations via secure in-band management? (Choose three.)network devices configured to accommodate SSHa separate network segment connecting all management devicesat least one router acting as a terminal serverencryption of all remote access management trafficconnection to network devices through a production network or the Internetdirect access to the console ports of all network devicesIf AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)assign a secret password to the viewassign commands to the viewassign users who can use the viewassociate the view with the root viewcreate a superview using the parser view view-name commandcreate a view using the parser view view-name commandWhich two characteristics apply to Role-Based CLI Access superviews? (Choose two.)CLI views have passwords, but superviews do not have passwords.Users logged in to a superview can access all commands specified within the associatedCLI views.A single superview can be shared among multiple CLI views.Commands cannot be configured for a specific superview.Deleting a superview deletes all associated CLI views.Refer to the exhibit. Based on the output of the show running-config command, which type of view is SUPPORT?secret view, with a level 5 encrypted passwordroot view, with a level 5 encrypted secret passwordsuperview, containing SHOWVIEW and VERIFYVIEW viewsCLI view, containing SHOWVIEW and VERIFYVIEW commandsRefer to the exhibit. Which statement regarding the JR-Admin account is true?JR-Admin can issue show, ping, and reload commands.JR-Admin can issue ping and reload commands.JR-Admin can issue only ping commands.JR-Admin can issue debug and reload commands.JR-Admin cannot issue any command because the privilege level does not match one ofthose defined.Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?Keep a secure copy of the router Cisco IOS image and router configuration file as abackup.Disable all unused ports and interfaces to reduce the number of ways that the router canbe accessed.Configure secure administrative control to ensure that only authorized personnel canaccess the router.Locate the router in a secure locked room that is accessible only to authorized personnel.Provision the router with the maximum amount of memory possible.An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)configure the IP domain name on the routerenable inbound vty Telnet sessionsgenerate the SSH keysconfigure DNS on the routerenable inbound vty SSH sessionsgenerate two-way pre-shared keysBy default, how many seconds of delay between virtual login attempts is invoked when the loginblock-for command is configured?onetwothreefourfiveWhich set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?R1(config)# username admin password Admin01pa55R1(config)# line con 0R1(config-line)# login localR1(config)# username admin password Admin01pa55R1(config)# line con 0R1(config-line)# login internalR1(config)# username admin Admin01pa55 encr md5R1(config)# line con 0R1(config-line)# login localR1(config)# username admin secret Admin01pa55R1(config)# line con 0R1(config-line)# login localR1(config)# username admin secret Admin01pa55R1(config)# line con 0R1(config-line)# login internalWhich three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)physical securityflash securityoperating system securityremote access securityrouter hardeningzone isolationRefer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.)This message is a level five notification message.This message appeared because a minor error occurred requiring further investigation.This message appeared because a major error occurred requiring immediate action.This message indicates that service timestamps have been globally enabled.This message indicates that enhanced security was configured on the vty ports.Refer to the exhibit. Which two statements describe the current SDM logging setup? (Choose two.)Buffered logging will be enabled on the router for Logging Level 7 messages.Buffered logging will be enabled on the syslog server for Logging Level 7 messages.All messages with a trap level of 4 and higher (less critical) will be logged.All messages with a trap level of 4 and lower (more critical) will be logged.The router interface IP address that is connected to the syslog server is 192.168.1.3.The syslog server IP address is 192.168.1.3.Refer to the exhibit. What is the significance of secret 5 in the generated output?The ADMIN password is encrypted using DH group 5.The ADMIN password is encrypted via the service password-encryption command.The ADMIN password is hashed using MD5.The ADMIN password is hashed using SHA.Which two operations are required to implement Cisco SDM One-Step Lockdown? (Choosetwo.)Choose the One-Step Lockdown feature.Apply the documented network policies.Deliver the configuration changes to the router.Compare the router configuration against recommended settings.Select the Firewall and ACL task on the SDM Configuration screen.Which statement matches the CLI commands to the SDM wizard that performs similar configuration functions?aaa configuration commands and the SDM Basic Firewall wizardauto secure privileged EXEC command and the SDM One-Step Lockdown wizardclass-maps, policy-maps, and service-policy configuration commands and the SDM IPSwizardsetup privileged EXEC command and the SDM Security Audit wizardWhat are two characteristics of the SDM Security Audit wizard? (Choose two.)It uses interactive dialogs and prompts to implement AAA.It automatically enables Cisco IOS firewall and implements Cisco IOS IPS security configurations to secure the router.It displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement.It requires users to first identify which router interfaces connect to the inside network and which connect to the outside network.It is initiated from CLI and executes a script in which the managment plane functions and forwarding plane services are tested against known vulnerabilities.。

CCNA第二学期

CCNA第二学期

CCNA 2 - Module 1If a router cannot find a valid configuration file during the startup sequence, what will occur?The router will prompt the user for a response to enter setup mode.Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?The interfaces must be enabled with the no shutdown command.Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.) The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface.Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.)The router will change the frame type to one supported by the WAN link before forwarding the frame.The frame was received on the Fa0/0 interface of the router and will be s witched to the S0/0/0 interface.Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)VTY interfaceconsole interfaceprivileged EX EC modeWhich two statements correctly describe the components of a router? (Choose two.)ROM contains diagnostics executed on hardware modules.Flash memory does not lose its contents during a reboot.Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?The subnet mask of host 2 is incorrect.Host 1 and host 2 are on different networks.The switch needs an IP address that is not configured.The router LA N interface and host 1 are on different networks.The IP address of host 1 is on a different network than is the LAN interface of the router.Which are functions of a router? (Choose three.)packet s witchingsegmentation of broadcast domainsselection of best path based on logical addressingRefer to the exhibit. A ll routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# clock rate 56000Refer to the exhibit. What can be concluded from the output of the running-configuration of a router? The commands that are dis played determine the current operation of the router.Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)destination IP address: 192.168.10.134destination MAC address: 9999.DADC.1234What is the outcome of entering these commands?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# loginsets the password to be used for connecting to this router via T elnetWhich of the following is the correct flow of routines for a router startup?load bootstrap, load IOS, apply configurationWhat three processes does a router execute when it receives a packet from one network that is destinedfor another network? (Choose three.)decapsulates the Layer 3 packet by stripping off the Layer 2 frame headeruses the destination IP Address in the IP header to look up the next-hop address in the routing tableencapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interfaceThe network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?cross-overWhich two statements describe characteristics of load balancing? (Choose two.)Load balancing allows a router to forward packets over multiple paths to the same destination network.Unequal cost load balancing is supported by EIGRP.What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)the last restart methodthe configuration register settingsthe location from where the IOS loadedWhich interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)14From what location can a router load the Cisco IOS during the boot process? (Choose two.)TFTP serverFlash memoryA network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?Router1# copy running-config startup-configWhat is the default sequence for loading the configuration file?NVRAM, TFTP, CONSOLEWhat header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?the Layer 2 source and destination addressCCNA 2 - Module 2Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.)platformholdtimelocal interfaceWhy is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.The output of the Router# show interfaces serial 0/1 command displays the following: Serial0/1 is up, line protocol is down.What is the most likely cause for the line protocol being down?No clock rate has been set.A static route that points to the next hop IP will have what administrative distance and metric in the routing table?administrative distance of 1 and metric of 0Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1Refer to the exhibit. Which static route should be configured on Router1 so that hostA will be able to reach hostB on the 172.16.0.0 network?ip route 172.16.0.0 255.255.0.0 S0/0/0Which address can be used to summarize networks 172.16.0.0/24 thru 172.16.7.0/24?172.16.0.0/21Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).a modema CSU/DSU deviceA network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet?encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interfaceWhich piece of information is available from examining the output of the command show ip interface brief?Interface IP addressWhich of the following is true regarding CDP and the graphic shown?By default, Router A will receive CDP advertisements from routers B and C.Which two statements describe functions or characteristics of CDP? (Choose two.)It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.It allows systems to learn about each other even if different network layer protocols are configured.Hosts on two separate subnets cannot communicate. The network administrator suspectsa missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)pingtracerouteshow ip routeWhat happens to a static route entry in a routing table when the outgoing interface is not available?The route is removed from the table.The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?192.1.1.0/25Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0.A router has one static route configured to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)The destination network no longer exists.A topology change occurs where the existing next-hop address or exit interface is not accessible.Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link?The rate configured on the DCE determines the clock rate.Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet?WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1Refer to the exhibit. What two commands are required to provide connectivity betw een the 192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0CCNA 2 - Module 3Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)Administrative distance refers to the trustworthiness of a particular route.Routes with the smallest metric to a destination indicate the best path.Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.Which two statements are true regarding classless routing protoc ols? (Choose two.) sends subnet mask information in routing updatesallows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topologyWhich command would the network administrator issue to determine if load balancing is in effect on a router?show ip routeWhich statement is true regarding routing protocols?EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing.Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.)the network is using a hub and spoke topologythe network is using a flat designWhat is the purpose of a routing protocol?It allows a router to share information about known networks with other rou ters.Which of the following best describes the operation of distance vector routing protocols? They send their routing tables to directly connected neighbors.Which of the following is associated with link-state routing protocols?shortest-path first calculationsWhy is fast convergence desirable in networks that use dynamic routing protocols? Routers may make incorrect forwarding decisions until the network has converged.Which of the following conditions must be met in order for a network to have con verged The routers in the network are operating with consistent routing knowledge.Which two statements are true regarding metrics? (Choose two.)EIGRP uses bandwidth as a metric.OSPF uses cost based on bandwidth as a metric.Which two statements are true regarding the advantages of the use of static routes? (Choose two).increased securitythe administrator maintains control over routingThe following line of code is displayed in a routing table:R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0What can be concluded from this output?The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network.What will be the result of the following commands?ORL(config)# interface fastethernet 0/0ORL(config-if)# ip address 172.16.3.1 255.255.255.0ORL(config-if)# no shutdownA routing table entry is made to the 172.16.3.0 network with a code of "C".An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route?The administrative distance of this route is 1.Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1?The administrative distance of the route to network 172.16.0.0 will be 90.The following line of code is present in the routing table:O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1What does the number 129 indicate in this output?The cost for this link has a value of 129.A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?OSPF can be used between the routers.Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?3A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network?The router will install both routes in the routing table and load balance between the two.CCNA 2 - Module 4Which event will cause a triggered update?a route is installed in the routing tableThree routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers reload, what will happen?They will send updates that include only directly connected routes to their directly connected neighbors.What does the RIP holddown timer do?instructs routers to ignore updates, for a specified time or event, about possible inaccessible routesWhich two statements are true regarding the function of the RIPv1 routing updates? (Choose two).updates are broadcast at regular intervalsbroadcasts are sent to 255.255.255.255Which of the following statements are correct about RIP?will send out an update if there is a failure of a linkWhich two statements describe EIGRP? (Choose two.)EIGRP sends triggered updates whenever there is a change in topology that influences the routing information.EIGRP sends a partial routing table update, which includes just routes that have been changed.Which statement is true regarding cisco’s RIP_JITTER variable?It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of the specified interval time from the next routing update interval.What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.Which of the following methods does split horizon use to reduce incorrect routing information?Information learned from one source is not distributed back to that source.The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?route poisoningWhat is the purpose of the TTL field in the IP header?limits the time or hops that a packet can traverse through the network before it should be discardedWhich of the following can exist in a distance vector network that has not converged? (Choose three.)routing loopsinconsistent traffic forwardinginconsistent routing table entriesRefer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A respond?The Invalid timer will mark the route as unusable if an update has not been received in 180 seconds.A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion and must respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (Choose two.)EIGRP only updates affected neighbors.EIGRP updates are partial.Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is the active routing protocol?The path will be router A -> router D -> router E.Which three routing protocols are distance vector routing proto cols? (Choose three).RIPv1EIGRPRIPv2What is a routing loop?a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destinationWhich two conditions are most likely to cause a routing loop? (Choose two.)inconsistent routing tablesincorrectly configured static routesWhat metric does the RIP routing protocol consider to be infinity?16What does a router running RIP do first with a new route that is received from an advertisement?adjusts the metric for the new route to show the added distance for the routeRefer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks?3CCNA 2 - Module 5Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers?Router1(config-router)# passive-interface fastethernet 0/0The following line was displayed in the output of the show ip route command.R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0What is the value of the routing metric?3Which of the following is considered a limitation of RIP v1?RIP v1 does not send subnet mask information in its updates.Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator notices that the route is still in the Router1 routing table. How much longer will Router1 keep the down network in its routing table before marking it as possibly down?155 secondsRefer to the exhibit. Router1 is running RIPv1. What command was entered into Router1 to configure the gateway of last resort?ip route 0.0.0.0 0.0.0.0 S0/0/1What are three characteristics of the RIPv1 routing protocol? (Choose three.)uses hop count as a metricconsiders a metric of 16 as infinitycalculates metrics using the Bellman Ford algorithmWhich of the following would be the correct command sequence to enable RIP on Router B for all connected networks?RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 220.17.29.0What is the default update period in seconds for the RIP routing protocol?30Refer to the exhibit. What can be concluded from the routing table output of router B? The default-information originate command has been entered on A.Refer to the exhibit. A network consists of multiple routers. What can be verified when the show ip protocols command is issued on one of the routers in the network? routing protocol configuration in use for IP on this routerRefer to the exhibit. All routers are configured with valid interface addresses in the indicated networks and are running RIPv1. The network is converged. Which routes are present in the routing tables?All routers have all /30 routes. Routers A and E also have some of the /24 routes in their routing table.Which two statements are true regarding the characteristics of RIPv1? (Choose two). It is a distance vector routing protocol.The data portion of a RIP message is encapsulated into a UDP segment.Which command or set of commands will stop the RIP routing process?RouterB(config)# no router ripRefer to the exhibit. All routers in the exhibit are running RIP v1. The network administrator issues the show ip route command on router A. What routes would ap pear in the routing table output if the network is converged? (Choose two).R 192.168.2.0/24 [120/1]R 10.10.1.0/24 [120/2]Which command will display RIP activity as it occurs on a router?debug ip ripRefer to the output from the show ip route command. What can be concluded from the output of this router command?There are two equal cost paths to network 1.0.0.0.Refer to the exhibit. Router1 and Router2 are running the RIPv1 protocol. The network administrator configures the command network 10.1.0.0 on Router1. What network will Router1 advertise to Router2?10.0.0.0/8Refer to the exhibit. Pings between the serial interfaces of the routers are successful. Hosts on each LAN can ping the Fa0/0 interface of the router to which they are directlyconnected through the switch. However, pings between hosts on the 10.1.1.0/24 and 10.1.2.0/24 networks are unsuccessful. What is a likely cause of this problem?RIP is configured incorrectly on R1.What will happen if an interface IP address is entered for the address portion of the network command in a RIPv1 configuration instead of a network address?All interfaces in the same classful network as the configured address will be included in the RIPv1 routing process.Refer to the exhibit. All routers that are shown are running the RIP routing protocol. All unknown IP traffic must be forwarded to the ISP. What router or set of routers are recommended to have both a default route and the default-information originate command issued to implement this forwarding policy?only the gateway routerCCNA 2 - Module 6What two advantages does CIDR provide to a network? (Choose two.)reduced routing table sizereduced routing update trafficRefer to the exhibit. The network administrator wants to create a subnet for the po int-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?255.255.255.252Refer to the exhibit. A network engineer is summarizing the two groups of routes on router R1 shown in the exhibit. Which summarization will work for all the subnets?192.168.0.0/21Which of the following are contained in the routing updates of classless routing protocols? (Choose two.)32-bit addresssubnet maskWhich of the following problems does VLSM help to alleviate?the shortage of IP addressesWhat does VLSM allow a network administrator to do?utilize multiple subnet masks in the same IP address spaceRefer to the exhibit. What subnet mask will be applied if Router A sends a RIPv1 update for the network 172.16.1.0 to Router B?24Refer to the exhibit. The network administrator wants to minimize the number of entries in Router1’s routing table. What should the administrator implement on the network?CIDRA router has a summary route to network 192.168.32.0/20 installed in its routing table. What range of networks are summarized by this route?192.168.32.0 – 192.168.47.0/24A network administrator is tasked with dividing up a class C network among the QA, Sales, and Administration departments. The QA department is made up of 10 people, the Sales is made up of 28 people, and the Administration has 6. Which two subnets masks adequately address the QA and Sales departments? (Choose two.)255.255.255.224 for Sales255.255.255.240 for QAIn the network shown in the graphic, three bits were borrowed from the host portion of a Class C address. How many valid host addresses will be unused on the three point-to-point links combined if VLSM is not used?84A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses?/27An additional subnet is required for a new Ethernet link between Router1 and Router2 as shown in the diagram. Which of the following subnet addresses can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses?192.1.1.224/28Which three interior routing protocols support VLSM? (Choose three.)OSPFRIP v2EIGRPRefer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address requirements for all router ports and hosts on that subnet. After all device and router port address assignments are determined, what will be the total number of unused host addresses available?29Refer to the exhibit. In the network that is shown, the router interfaces are assigned the first address ineach subnet. Which IP address would be usable for a host on one of the LANs in this network?192.168.2.130/25Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?192.168.4.15/29Refer to the exhibit. A network administrator needs to create two subnetworks from 10.0.0.0/8 for a router running RIPv2. The Admin subnet requires 120 hosts and the Sales subnet requires 58 hosts. The network administrator assigned 10.0.1.128/25 to the Admin subnet. The Sales subnet i s given 10.0.1.192/26. What will be the result of this addressing scheme?Because RIPv2 does not support VLSM, the subnet masks will not be allowed.The subnets overlap and will be rejected by the router.Refer to the exhibit. A network technician enters the static route in R1 needed to reach network 10.1.1.0/24. A ping from the S0/0/0 interface on R1 to host B fails. The technician begins testing the network and has the following results:1. pings from R1 to the S0/0/0 interface on R2....successful2. pings from R1 to the Fa0/0 interface on R2....successful3. pings from host B to hosts on the 10.1.1.0/24 network....successful4. pings from host B to the Fa0/0 interface on R2....successful5. pings from R2 to host B....successful.The default gateway on host B is not correctly set.What is a supernet?a summarization of classful addressesCCNA 2 - Module 7Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?Rip version 2 will auto summarize routes by default.Refer to the exhibit. Which two statements are true? (Choose two.)Router1 will install a route to 192.168.0.0/20Router2 will not install a route to 192.168.16.0/20Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?Router2(config-router)# version 2What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)RIP version 2 supports VLS M.。

CCNA_ENetwork_Chapter_2

CCNA_ENetwork_Chapter_2

ENetwork Chapter 2 - CCNA Exploration :Network(2009-05-10 11:32:50)分类:CCNA.CISCO.ANSWERS标签:itPosted by Space on Sunday, May 10, 20091 What are the key functions of encapsulation? (Choose three.)*allows modification of the original data before transmission*identifies pieces of data as part of the same communication*enables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end deviceenables the reassembly of complete messagestracks delay between end devices2 Which layer encapsulates the segment into packets?physicaldata link*networktransport3 Which three statements best describe a Local Area Network (LAN)? (Choose three.) *A LAN is usually in a single geographical area.*The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.*A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).4 What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, network*application, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application5 During the encapsulation process, what occurs at the data link layer?No address is added.The logical address is added.*The physical address is added.The process port number is added.6 Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU's*dictate how to accomplish layer functions*outline the functions necessary for communications between layerslimit hardware compatibility*require layer dependent encapsulationseliminate standardization among vendors7Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)Network A -- WAN*Network B -- WAN*Network C -- LANNetwork B -- MANNetwork C -- WAN*Network A -- LAN8 Which statements correctly identify the role of intermediary devices in the network? (Choose three.)*determine pathways for datainitiate data communications*retime and retransmit data signalsoriginate the flow of data*manage data flowsfinal termination point for data flow9 Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)* NetworkTransport* PhysicalData LinkSession10 What can be identified by examining the network layer header?the destination device on the local media* the path to use to reach the destination hostthe bits that will be transferred over the mediathe source application or process creating the data11Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination device* an end devicean intermediate devicea media device12Refer to the exhibit. Which set of devices contains only end devices?* A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J13 What is the purpose of the TCP/IP Network Access layer?* path determination and packet switchingdata representation, encoding, and controlreliability, flow control, and error detectiondetailing the components that make up the physical link and how to access it the division of segments into packets14 What device is considered an intermediary device?file serverIP phonelaptopprinter* switch15 What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communication* a layer specific encapsulation16 What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the networkto identify the source and destination end devices that are communicating* to identify the processes or services that are communicating within the end devices17 What is a primary function of the trailer information added by the data link layer encapsulation?* supports error detectionensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection18Refer to the exhibit. Which term correctly identifies the device type that is included in the green area?sourceendtransfer* intermediary19Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreaming* multiplexingencapsulation20 Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flowretime and retransmit data signalsdetermine pathways for data21Refer to the exhibit. What type of network is shown?WANMAN* LANWLAN。

ccna第二章章节习题加答案

ccna第二章章节习题加答案

第1章路由和数据包转发介绍1.下面哪些路由器的组成和它的功能是匹配的?DA.Flash:永久的储存bootstrap程序B.ROM:永久地存储启动配置文件C.NVRAM:永久地存储操作系统镜像D.RAM:存储路由表和ARP缓存2.哪两个命令可以用来检查给路由器串行接口分配的IP地址?A、EA.show interfacesB.show interfaces ip briefC.show controllers allD.show ip configE.show ip interface brief3.下面哪些命令可以设置特权模式口令为“quiz”?AA.R1(config)# enable secret quizB.R1(config)# password secret quizC.R1(config)# enable password secret quizD.R1(config)# enable secret password quiz4.哪个路由原理是正确的?CA.如果一个路由器在它的路由表中具有确定的信息,那么所有邻接的路由也拥有同样的信息B.从一个网络到另外一个网络路径的路由信息意味着存在着反向(或返回)路径的路由信息C.每个路由器根据它自己路由表中的信息,独立作出路由判断D.每个路由器根据它自己和邻居路由表中的信息,独立作出路由判断5.动态路由协议执行哪两个任务?B、DA.发现主机B.更新和维护路由表C.传播主机默认网关D.网络发现E.分配IP地址6.网络工程师正在配置一个新的路由器。

接口已经配置好了IP地址,并且已经激活。

但是还没有配置路由协议或静态路由。

这时路由表中出现的是什么路由?CA.默认路由B.广播路由C.直接路由D.没有路由,路由表也是空的7.下面哪两个对于路由器转发数据包的描述是正确的?B、DA.如果数据包是去往远程网络的,那么路由器会向所有到这个网络的下一跳接口发送该数据包B.如果数据包是去往直连网络的,那么路由器会向路由表中所指示的外出接口发送C.如果数据包是去往远程网络的,那么路由器会根据路由主机表来发送该数据包D.如果数据包是去往远程网络的,那么路由器会向路由表中所指示下一跳IP发送E.如果数据包是去往直连网络的,那么路由器会根据目的MAC地址发送该数据包F.如果数据包是去往直连网络的,那么路由器会转发数据包到下一跳VLAN的交换机8.关于路由协议使用的度量的哪个描述是正确的?AA.度量是路由协议用来检测给定路由的一个测量值B.度量是思科专有的用来转换距离到标准单元的方法C.度量表示了对于所有路由协议中发生的数据包丢失的数量的一个统计值D.路由器使用度量lai 决定哪些包是错误的和要被丢失的9.网络管理员在路由器上配置了ip rout 0.0.0.0 0.0.0.0 serial 0/0/0命令。

CCNA_ESwitching _Chapter_2_答案

CCNA_ESwitching _Chapter_2_答案

1请参见图示。

当主机 1 试图发送数据时会发生什么情况?来自主机 1 的帧会导致接口关闭。

会丢弃来自主机 1 的帧,且不发送日志消息。

来自主机 1 的帧会在运行配置中创建MAC 地址条目。

来自主机 1 的帧会删除地址表中的所有MAC 地址条目。

2启动配置存储在哪里?DRAMNVRAMROMstartup-config.text3下列关于执行模式口令的说法中哪两项正确?(选择两项。

)使能加密口令命令采用明文存储所配置的口令。

使能加密口令命令的安全性比使能口令高。

使能口令和使能加密口令用于保护对特权执行模式的访问。

需要采用命令service password-encryption来加密使能加密口令。

最佳做法是要求同时配置并使用使能口令和使能加密口令。

4请参见图示。

网络管理员尝试通过安全外壳连接到Switch1 但失败了。

最可能的原因是什么?配置的vty 线路不正确默认网关地址不正确安全外壳版本不兼容vty 线路被配置为只允许Telnet 连接5请参见图示。

图中显示网络中存在多少个冲突域?1246786请参见图示。

图中显示了show running-config命令的部分输出。

此交换机的使能口令是"cisco"。

从图中所示的输出可得默认情况下会加密使能口令。

所有加密口令均采用MD5 哈希算法加密。

在此配置中,已配置的所有线路模式口令都会被加密。

此行代表最安全的特权执行模式口令。

7请参见图示。

如果SW1 的MAC 地址表为空,SW1 会对从PC_A 发送到PC_C 的帧采取以下哪项操作?SW1 会丢弃该帧。

SW1 会将该帧从除端口Fa0/1 之外的所有端口泛洪出去。

SW1 会将该帧从该交换机上除端口Fa0/23 和Fa0/1 之外的所有端口泛洪出去。

SW1 会采用CDP 协议同步两台交换机的MAC 地址表,然后将帧转发到SW2 上的所有端口。

8可采用哪两种方法来使交换机不易受MAC 地址泛洪、CDP 攻击和Telnet 攻击等攻击的影响?(选择两项。

(完整版)CCNA-ITN-第-2-章考试

(完整版)CCNA-ITN-第-2-章考试

第2章 配置网络操作系统1 下列哪两项是闪存的特征?(请选择两项。

)闪存提供非易失性存储。

当设备启动时,闪存接收来自 RAM 的 IOS 副本。

重新启动时闪存中的内容可能会丢失。

闪存是思科交换机的组件,但不是思科路由器的组件。

闪存的内容可以被覆盖。

当设备启动时,闪存会保存 IOS ,并将 IOS 副本传输到 RAM 中。

尽管闪存可以升级和覆盖,但它是非易失性存储器。

设备重新启动或断开电源时,闪存内容仍会保留。

答案 说明 最高分值correctness of response Option 1 and Option 5 are correct.1 point for each correct option. 0 points if more options are selected than required.22 网络管理员计划在总部的几个路由器和交换机上升级 IOS 。

继续选择和升级 IOS 之前必须回答哪三个问题?(请选择三项。

)设备是否位于同一 LAN ?设备是否有足够的 NVRAM 来存储 IOS 映像?什么型号的路由器和交换机需要升级?路由器和交换机上安装了哪些端口?路由器和交换机是否有足够的 RAM 和闪存来用于提议的 IOS 版本?设备需要哪些功能?启动配置文件存储在 NVRAM 中,而不是 IOS 中。

升级到新 IOS 版本时应考虑的重要因素包括可用 RAM 和闪存数量、设备类型和型号以及所需功能。

答案 说明 最高分值correctness of response Option 3, Option 5, and Option 6 are correct.1 point for each correct option. 0 points if more options are selected than required.33 当在安全环境下执行初始配置时,下列哪个程序可用来访问 Cisco 2960 交换机?使用 Telnet 通过网络远程访问交换机。

CCNA思科网络技术学院教程-第2章_网络技术基础

CCNA思科网络技术学院教程-第2章_网络技术基础
限定网络规则的国际组织: IEEE 电气和电子工程师协会 ANSI 美国国家标准协会 EIA/TIA 电子工业协会/电信工业协会 ITU 国际电信联盟
ICND—2-3
2.1 网络术语
LAN, 局域网 WAN, 广域网 MAN, 城域网 VPN,虚拟专用网 Intranet,企业内部互联网, Extranet SAN, 存储区域网 Data center, 数据中心
开发和网络集成。
ICND—2-11
1、OSI 参考模型
应用层(上层)
Application Presentation
Session
传输层 网络层 数据链路层 物理层
Transport Layer Network Layer
Data Link Physical
应用层 表示层 会话层
数据流层
ICND—2-12
PDU
/
/
/
数据段 segment
数据包 packet
帧 frame
位 bit
举例
Telnet FTP ASCⅡ JPEG,AVI,MPEG
NFS, RPC SQL
TCP UDP SPX
IP IPX
802.3/802.2 HDLC
EIA/TIA-232
V.35
ICND—2-13
2、DoD(TCP/IP)模型
• Security
• Possible point for remote access
ICND—2-27
Core Layer Characteristics
Core Layer
• Fast transport to enterprise services • No packet manipulation
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

第二章静态路由CCNA2 Exploration: 路由协议和概念(版本(2010-12-19 13:03:52)标签:分类:窗体顶端ERouting Chapter 2 - CCNA Exploration: 路由协议和概念(版本哪两项说法描述了CDP 的功能或特点?(选择两项。

)它会自动启动,允许设备检测使用CDP 的直连邻居设备。

它运行在网络层,允许两个系统彼此获知对方。

它会创建整个网络的拓扑图。

它允许系统彼此之间相互了解,而无论它们所配置的网络层协议是否相同。

它转发有关路由的通告,以加速收敛过程。

窗体顶端两个独立子网上的主机之间无法通信。

网络管理员怀疑其中一个路由表中缺少路由。

可以使用哪三条命令来3 层连通性问题?(选择三项。

)pingshow arptracerouteshow ip routeshow controllersshow cdp neighbor窗体顶端路由器配置有到达每个目的网络的静态路由。

下列哪两种情况需要管理员变更该路由器上配置的静态路由项。

)目的网络不再存在。

目的网络移到同一路由器的不同接口。

源和目的之间的路径已升级为带宽更高的链路。

出于维护目的,远程目的网络接口需要关闭15 分钟。

拓扑结构发生变化,导致现有的下一跳地址或送出接口无法访问。

窗体底端窗体顶端网络管理员在Router1 中输入了以下命令:ip route S0/1/0。

Router1 随后收到发往的数据包。

在路由表刚配置的静态路由之后,Router1 接下来将如何处理该数据包?丢弃该数据包,因为路由表中未列出目的主机查找S0/1/0 接口的MAC 地址以确定新帧的目的MAC 地址在转发该数据包之前递归查找S0/1/0 接口的IP 地址将该数据包封装到适合该WAN 链路的帧中,并将其从S0/1/0 接口转发出去窗体底端窗体顶端请参见图示。

目的地为网络的数据包会被如何转发?Router1 会执行递归查找,数据包将从S0/0 接口发出。

Router1 会执行递归查找,数据包将从S0/1 接口发出。

没有与网络关联的匹配接口,因此数据包将被丢弃。

没有与网络关联的匹配接口,因此数据包将采用“最后选用网关”,从S0/2 接口发出。

窗体底端窗体顶端请参见图示。

根据如图所示的输出,该链路的时钟频率会如何确定?此频率将由两台路由器协商得出。

由于DCE/DTE 连接错误,因此不会选择任何频率。

DTE 上配置的频率决定了时钟频率。

DCE 上配置的频率决定了时钟频率。

窗体底端窗体顶端Router# show cdp neighbors 命令会显示下列哪些内容?(选择三项。

)负载平台可靠性保持时间本地接口窗体底端窗体顶端为什么在创建送出接口为以太网络的静态路由时输入下一跳IP 地址是明智之举?添加下一跳地址将使路由器在转发数据包时不再需要在路由表中进行任何查找。

在多路访问网络中,如果没有下一跳地址,路由器将无法确定以太网帧的下一跳MAC 地址。

在静态路由中使用下一跳地址可以为路由提供较低的度量。

在多路访问网络中,在静态路由中使用下一跳地址可以使该路由成为候选默认路由。

窗体底端窗体顶端当外发接口不可用时,路由表中的静态路由条目有何变化?该路由将从路由表中删除。

路由器将轮询邻居以查找替用路由。

该路由将保持在路由表中,因为它是静态路由。

路由器将重定向该静态路由,以补偿下一跳设备的缺失。

窗体底端窗体顶端指向下一跳IP 的静态路由在路由表中会显示怎样的管理距离和度量?管理距离为0,度量为0管理距离为0,度量为1管理距离为1,度量为0管理距离为1,度量为1窗体底端窗体顶端以下有关CDP 和图示的说法中,哪项是正确的?路由器D 上运行的CDP 会收集有关路由器A、B、C 和E 的信息。

默认情况下,路由器A 将从路由器B 和 C 接收CDP 通告。

如果路由器D 和E 运行的路由协议不同,那么它们不会交换CDP 信息。

路由器E 可以使用CDP 来识别路由器B 上运行的IOS。

窗体底端窗体顶端哪一个地址可以用来总结从到的所有网络?窗体底端窗体顶端图中的路由器使用如图所示的子网分配。

对Router3 而言,要将内部网络通告给网云,最有效的路由总结是和和和窗体底端窗体顶端请参见图示。

要使WinterPark 和Altamonte 路由器能够传送来自每个LAN 的数据包并将所有其它流量转应该使用哪一组命令来配置静态路由?WinterPark(config)# ip route 0.0.0.0 Altamonte(config)# ip routeAltamonte(config)# ip route s0/1WinterPark(config)# ip route 0.0.0.0 Altamonte(config)# ip routeAltamonte(config)# ip route s0/1WinterPark(config)# ip route WinterPark(config)# ip route 0.0.0.0 Altamonte(config)# ip routeip routeAltamonte(config)# ip routeAltamonte(config)# ip route 0.0.0.0 s0/0窗体底端窗体顶端请参见图示。

公司的网络工程师收到任务,要在两个以太网之间建立连通性,使10.1.1.0/24 子网上的主机上的主机通信。

该工程师被告知公司路由器只能使用静态路由。

使用下列哪一组命令可以在这两个以太网接?R1(config)# ip route 10.1.2.0R2(config)# ip routeip route 10.1.2.0R2(config)# ip routeip route 10.1.1.0R2(config)# ip routeip route 10.1.1.0R2(config)# ip routeip route 0.0.0.0R2(config)# ip route窗体底端窗体顶端请参见图示。

下列哪两条命令会将10.0.0.0/8 网络的下一跳地址从更改为?(选择两项。

)A(config)# no network 10.0.0.0no ip address 10.0.0.1no ip route 10.0.0.0ip route 10.0.0.0 s0/0/0A(config)# ip route 10.0.0.0窗体底端窗体顶端通过检查show ip interface brief 命令的输出可得到什么信息?接口速度和双工设置接口MTU错误接口MAC 地址接口IP 地址窗体底端窗体顶端请参见图示。

在到达10.0.0.0 网络的路由中,/8 表示什么意思?它表示该路由器与10.0.0.0 网络之间有8 跳。

它表示发送到10.0.0.0 网络的ping 得到应答所需的时间(毫秒)。

它表示路由器可将数据包转发到带有8 个子网的目的网络。

它表示在数据包目的IP 地址中,从左开始有多少个连续比特位必须与10.0.0.0 匹配才能使用这条路由窗体底端窗体顶端Router# show interfaces serial 0/1 命令的输出显示了如下内容:Serial0/1 is up, line protocol is down.线路协议为down(关闭)的原因最可能是什么?Serial0/1 为关闭状态。

路由器未连接电缆。

远程路由器正在使用serial 0/0 接口。

尚未设置时钟频率。

窗体底端窗体顶端请参见图示。

要使和10.0.0.0 网络之间连通并且无需递归查找,需要使用下列哪两条命令?(选择两项。

A (config)# ip route 10.0.0.0 s 0/1/0A(config)# ip route 10.0.0.0(config)# ip route 10.0.0.0 s 0/0/0B(config)# ip route s 0/0/0B (config)# ip routeip route s 0/1/0窗体底端窗体顶端请参见图示。

为使主机A 能够连接到网络上的主机B,应在Router1 上配置哪种静态路由?ip routerouteroute S0/0/1百度文库- 让每个人平等地提升自我11ip route S0/0/0窗体底端窗体顶端哪两种设备负责将来自W AN 服务提供商的数据转换为路由器可以接受的形式?(选择两项。

)路由器的串行端口调制解调器交换机路由器的以太网端口CSU/DSU 设备DTE 设备窗体底端。

相关文档
最新文档