思科-第一学期-第二章-章节测验-答案
思科CCNA第一学期期末考试答案
连接
1 -
直通电缆
连接
2 -
交叉电缆
连接
3 -
交叉电缆
连接
1 -
直通电缆
连接
2 -
交叉电缆
连接
3 -
直通电缆
连接
1 -
交叉电缆
连接
2 -
直通电缆
连接
3 -
交叉电缆
-
忌
请参见图示。I
主机的默认网关。
主机的IP地址
主机的首选域名服务器。
主机的主页IP地址
请参见图示。对图示拓扑可以得出哪两项结论?(选择两项)
下列哪个端口号范围为服务器上运行的应用程序常用的服务而保留?
0到255
0到1023
1024到49151
49152到65535
以下哪组
.0
以下哪个OSI协议层提供面向连接的可靠数据通信服务? 应用层
演示文稿
会话
传输层
n etwork
何时必须使用clock rate命令配置路由器串行接口?
当该接口充当DTE设备时闭时
当该接口充当DCE设备时
下列哪些是私有IP地址的地址范围?(选择三项。)
10.0.0
请参见图示。每条介质链路都已标记。应该使用哪种类型的电缆连接不同设备?
连接
1 -
全反电缆
连接
2 -
直通电缆
连接
3 -
交叉电缆
连接
1 -
交叉电缆
连接
2 -
全反电缆
连接
3 -
思科练习题2(带参考答案)
1第 3 层头部包含的哪一项信息可帮助数据传输?端口号设备物理地址目的主机逻辑地址虚拟连接标识符标题描述最高分值1 correctness of response2 points for Option 30 points for any other option2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识∙ 2.5.3 数据通过网际网络2IP 依靠 OSI 哪一层的协议来确定数据包是否已丢失并请求重传?应用层表示层会话层传输层标题描述最高分值1 correctness of response2 points for Option 40 points for any other option2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识∙ 5.1.4 IPv4 协议 - 尽力3请参见图示。
图中所示为在各层添加的头部。
哪一层会添加目的进程号和源进程号以确保将数据传递到正确的应用程物理层数据链路层网络层传输层标题描述最高分值1 correctness of response2 points for Option 4 20 points for any other option此试题参考以下领域的内容:CCNA Exploration: 网络基础知识∙ 2.5.1 网络中的编址4下列哪一个 OSI 层使用头部信息将数据段重组为数据流?应用层网络层表示层会话层传输层标题描述最高分值1 correctness of response2 points for Option 50 points for any other option2此试题参考以下领域的内容:CCNA Exploration: 网络基础知识∙ 4.1.2 控制会话5请参见图示。
图中所示为客户端之间发送电子邮件的过程。
从下列选项中选择正确标识图中各编号阶段使用的组件或1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA标题描述最高分值1 correctness of response2 points for Option 50 points for any other option2此试题参考以下领域的内容: CCNA Exploration: 网络基础知识∙3.3.3 电子邮件服务及 SMTP/POP 协议6某主机正在网络上传输视频。
思科第二章
1静态路由较之动态路由有哪两项优点(请选择两项。
)正确响应您的响应o由于静态路由不通过网络进行通告,因此比较安全。
o静态路由随着网络不断发展而进行扩展。
o正确实施静态路由所需的网络知识很少。
o静态路由比动态路由使用的路由器资源少。
o静态路由更容易进行大型网络配置。
静态路由需要充分了解整个网络才能正确实施。
它非常容易出错,且不能针对大型网络扩展。
静态路由使用更少的路由器资源,因为更新路由不需要计算。
由于它不通过网络通告,静态路由也比较安全。
此试题参考以下领域的内容:Routing and Switching Essentials静态路由2 请参见图示。
允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么2请参见图示。
允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么正确响应您的响应o配置一条从 R1 到 Edge 的静态路由和一条从 Edge 到 R1 的动态路由。
o配置一条从 R1 到 Edge 的静态默认路由、一条从 Edge 到互联网的默认路由以及一条从 Edge 到 R1 的路由。
o配置一条从 R1 到 Edge 的动态路由和一条从 Edge 到 R1 的静态路由。
o配置 R1 和 Edge 间的动态路由协议,并通告所有路由。
必须创建两个路由:在 R1 中创建默认路由来访问“边缘”,在“边缘”中创建静态路由以访问返回流量的 R1。
PC A 和 PC B 属于末端网络后,这就是最佳解决方案。
而且,静态路由使用的带宽少于动态路由。
此试题参考以下领域的内容:Routing and Switching Essentials静态路由3 浮动静态路由的正确语法是什么3浮动静态路由的正确语法是什么正确响应您的响应o ip route serial 0/0/0o ip route 120o ip route serial 0/0/0o ip route将浮动静态路由用作备用路由,常常是从动态路由协议学习的路由。
思科网院考试题库
思科网院考试题库CCNA1 - Module 2CCNA1 - Module 21Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)NetworkTransportPhysical**Data Link**Session2What is a primary function of the trailer information added by the data link layer encapsulation?supports error detection**ensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection3During the encapsulation process, what occurs at the data link layer? No address is added.The logical address is added.The physical address is added.**The process port number is added.4What device is considered an intermediary device?file serverIP phonelaptopprinterswitch**5Which layer encapsulates the segment into packets?physicaldata link**networktransport6Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for data**initiate data communicationsretime and retransmit data signals**originate the flow of datamanage data flows**final termination point for data flow7What can be identified by examining the network layer header?the destination device on the local mediathe path to use to reach the destination host**the bits that will be transferred over the mediathe source application or process creating the data8What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physical**presentation, data link, session, transport, network, physical, application9Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) Network A -- WANNetwork B -- WAN**Network C -- LAN**Network B -- MANNetwork C -- WANNetwork A -- LAN**10What are the key functions of encapsulation? (Choose three.)allows modification of the original data before transmissionidentifies pieces of data as part of the same communication**enables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end device**enables the reassembly of complete messages**tracks delay between end devices11Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexing**encapsulation12What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communication**a layer specific encapsulation13Refer to the exhibit. "Cell A" at IP address has established an IP session with "IP Phone 1" at IP address Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination device**an end devicean intermediate devicea media device14Refer to the exhibit. Which set of devices contains only end devices? A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, J**E, F, H, I, J15Refer to the exhibit. Which term correctly identifies the device type thatis included in the green area?sourceendtransfer**intermediary16Which three statements best describe a Local Area Network (LAN)? (Choose three.)**A LAN is usually in a single geographical area.**The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.**A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).17Refer to the exhibit. What type of network is shown?WANMAN**LANWLAN18What is the purpose of the TCP/IP Network Access layer?path determination and packet switching**data representation, encoding, and controlreliability, flow control, and error detectiondetailing the components that make up the physical link and how to access itthe division of segments into packets19Which characteristic correctly refers to end devices in a network? manage data flowsoriginate data flow**retime and retransmit data signalsdetermine pathways for data20What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating **to identify the processes or services that are communicating within the end devices21Select the statements that are correct concerning network protocols.(Choose three.)**define the structure of layer specific PDU'sdictate how to accomplish layer functions**outline the functions necessary for communications between layers limit hardware compatibility**require layer dependent encapsulationseliminate standardization among vendorsCCNA1 - Module 3CCNA1 - Module 31. What is the purpose of resource records in DNS?used by the server to resolve names2. What are two forms of application layer software?applicationssyntax3. What application layer protocol is commonly used to support for file transfers between a client and a server?FTP4. What are two characteristics of peer-to-peer networks? decentralized resourcesresource sharing without a dedicated server5. Which layer of the OSI model supplies services that allow user to interface with the network?application6. What are three properties of peer-to-peer applications?acts as both a client and server within the same communicationhybrid mode includes a centralized directory of filesdoes not require specialized software7. What is the role of the OSI application layer?provides the interface between the applications on either end of the network8. What three protocols operate at the Application layer of the OSI model? DNS, SMTP, POP9. Which email components are used to forward mail between servers? MDA, MTA10. Which two protocols are used to control the transfer of web resources from a web server to a client browser?HTTPSHTTP11. Which statements are correct concerning the role of the MTA in handling email?receives email from the client's MUApasses email to the MDA for final deliveryuses SMTP to route email between servers12. As compared to SSH, what is the primary disadvantage of telnet?does not support encryption13. Which application layer protocols correctly match a corresponding function?DNS dynamically allocates IP addresses to hostsTelnet provides a virtual connection for remote access14. What is the automated service that matches resource names with the required IP address?DNS15. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?8016. What are two characteristics of clients in data networks?initiate data exchangesmay upload data to servers17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?SMB18. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model?centralized administrationsecurity is easier to enforce19. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type?User accounts are centralized.Security is difficult to enforce.20. How does the application layer on a server usually process multiple client request for services?uses support from lower layer functions to distinguish between connections to the serviceCCNA1 - Module 4CCNA1 - Module 41Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)The local host is using well-known port numbers to identify the source ports.**A termination request has been sent toCommunication with is using HTTP Secure.**The local computer is accepting HTTP requests.is performing the three-way handshake with2After a web browser makes a request to a web server that is listening tothe standard port, what will be the source port number in the TCP header of the response from the server?1353**80102417283Which information is found in both the TCP and UDP header information? sequencingflow control**acknowledgmentssource and destination4Which is an important characteristic of UDP?acknowledgement of data delivery**minimal delays in data deliveryhigh reliability of data deliverysame order data delivery5Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. Whataction will Server 1 take as a result?create a Layer 1 jam signal**reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the hostchange the window size in the Layer 4 header6Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?**session establishmentsegment retransmitdata transfersession disconnect7Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost? 236**1850343134758Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical order**to prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts9During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? The packets will not be delivered.The packets will be retransmitted from the source.**The packets will be delivered and reassembled at the destination. The packets will be delivered and not reassembled at the destination.10With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?0 to 255256 to 1022**0 to 10231024 to 204749153 to 6553511Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?TCPIP**UDPHTTPDNS12What are two features of the User Datagram Protocol (UDP)? (Choose two.) **flow control**low overheadconnectionlessconnection-orientedsequence and acknowledgements13What mechanism is used by TCP to provide flow control as segments travel from source to destination?sequence numberssession establishment**window sizeacknowledgments14What is dynamically selected by the source host when forwarding data? destination logical addresssource physical addressdefault gateway address**source port15Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data **to enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order16Which two options represent Layer 4 addressing? (Choose two.) identifies the destination network**identifies source and destination hostsidentifies the communicating applications**identifies multiple conversations between the hostsidentifies the devices communicating over the local media17Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?**encapsulationflow controlconnectionless services**session establishment**numbering and sequencingbest effort delivery18Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? applicationpresentationsession**transportnetwork19Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.) This is a UDP header.**This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of 43693.**This is a TCP header.20Which event occurs during the transport layer three-way handshake? The two applications exchange data.TCP initializes the sequence numbers for the sessions.**UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client. CCNA1 - Module 5CCNA1 - Module 51In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?**destination network addresssource network addresssource MAC addresswell known port destination address2What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port number**source and destination IP address3In a connectionless system, which of the following is correct?The destination is contacted before a packet is sent.**The destination is not contacted before a packet is sent.The destination sends an acknowledgement to the source that indicates the packet was received.The destination sends an acknowledgement to the source that requests the next packet to be sent.4Which IP packet field will prevent endless loops?type-of-serviceidentificationflags**time-to-liveheader checksum5Which portion of the network layer address does a router use to forward packets?host portionbroadcast address**network portiongateway address6Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the network?**7If the default gateway is configured incorrectly on the host, what is the impact on communications?The host is unable to communicate on the local network.**The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.There is no impact on communications.8What is the purpose of a default gateway?physically connects a computer to a networkprovides a permanent address to a computeridentifies the network to which a computer is connectedidentifies the logical address of a networked computer and uniquely identifies it to the rest of the network**identifies the device that allows local network computers to communicate with devices on other networks9What type of routing uses information that is manually entered into the routing table?dynamicinterior**staticstandard10When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)**The router sends an ARP request to determine the required next hop address.The router discards the packet.The router forwards the packet toward the next hop indicated in the ARP table.**The router forwards the packet to the interface indicated by the source address.The router forwards the packet out the interface indicated by the default route entry.11What are the key factors to consider when grouping hosts into a common network? (Choose three.)**gatewayspurposephysical addressingsoftware version**geographic location**ownership12What is a component of a routing table entry?the MAC address of the interface of the routerthe destination Layer 4 port numberthe destination host address**the next-hop address13Which intermediary devices could be used to implement security between networks? (Choose two.)**routerhubswitch**firewallaccess pointbridge14What are three common problems with a large network? (Choose three.) too few broadcasts**performance degradation**security issues**limited management responsibilityhost identificationprotocol compatibility15Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?3**45781116Which three statements are true about routes and their use? (Choose three.) If no route to the destination network is found, the packet is returned to the previous router.If the destination network is directly connected, the router forwards the packet to the destination host.**If multiple network entries exist for the destination network, the most general route is used to forward the packet.**If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.**If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.If a host does not have a route manually configured for the destination network, the host will drop the packet.17Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to whichall hosts send packets that are destined for an outside network?**18Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.)**Replace S2 with a router.Place all servers on S1.Disable TCP/IP broadcasts.**Subnet the /24 network.Disable all unused interfaces on the switches.19Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two.)** is the next-hop address that is used by R3 to route a packet from the network to the network.is the next-hop address that is used by R1 to route a packet from thenetwork to the network.** is the next-hop address that is used by R1 to route a packet from the network to the network.is the next-hop address that is used by R3 to route a packet from the to the network.is the next-hop address that is used by R2 to route a packet from the network to the network.is the next-hop address that is used by R2 to route a packet from the network to the network.20What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)require no device configuration**provide routers with up-to-date routing tablesrequire less processing power than static routes requireconsume bandwidth to exchange route information**prevent manual configuration and maintenance of the routing table21What statement describes the purpose of a default route?A host uses a default route to transfer data to another host on the same network segment.A host uses a default route to forward data to the local switch as the next hop to all destinations.A host uses a default route to identify the Layer 2 address of an end device on the local network.**A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.CCNA1 - Module 6CCNA1 - Module 61How many bits make up an IPv4 address?128644832 **2Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?**3Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?IP address: subnet mask: default gateway:IP address: subnet mask: default gateway:IP address: subnet mask: default gateway: **IP address: subnet mask: default gateway:IP address: subnet mask: default gateway:4Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic./24/16/20/27 **/25/285Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?The router has an incorrect gateway.Host A has an overlapping network address.Host A has an incorrect default gateway configured.Host A has an incorrect subnet mask.NAT is required for the host A network. **6What subnet mask would a network administrator assign to a network address of if it were possible to have up to 254 hosts?**7Given the IP address and subnet mask of , which of the following would describe this address?This is a useable host address.This is a broadcast address.This is a network address. **This is not a valid address.8What three facts are true about the network portion of an IPv4 address? (Choose three.)identifies an individual deviceis identical for all hosts in a broadcast domainis altered as packet is forwarded **varies in length **is used to forward packets **uses flat addressing9What is the network address of the host /23 in binary?... **.. 00010001.01000011. 01100010.10A router interface has been assigned an IP address of with a mask of To which subnet does the IP address belong?**11Refer to the exhibit. Why would the response shown be displayed after issuing the command ping on a PC?The IP settings are not properly configured on the host. **Internet Protocol is not properly installed on the host.There is a problem at the physical or data link layer.The default gateway device is not operating.A router on the path to the destination host has gone down.12What two things will happen if a router receives an ICMP packet which hasa TTL value of 1 and the destination host is several hops away? (Choose two.)The router will discard the packet.The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.The router will send a time exceeded message to the source host. **The router will increment the TTL value and forward the packet to the next router on the path to the destination host.The router will send an ICMP Redirect Message to the source host. ** 13Refer to the exhibit. An administrator is designing security rules for the /24 network. Each security rule requires an address and mask pair to represent the machines that will be affected by the rule. Which two address and mask pairs will be the most precise way to reference the servers and hosts separately. (Choose two.)****14Which of the following are features of IPv6? (Choose three.)larger address space **faster routing protocolsdata types and classes of service **authentication and encryption **improved host naming conventionssame addressing scheme as IPv415Which process do routers use to determine the subnet network address basedupon a given IP address and subnet mask?binary addinghexadecimal andingbinary divisionbinary multiplicationbinary ANDing **16What is the primary reason for development of IPv6? securityheader format simplificationexpanded addressing capabilities **addressing simplification17Which three IP addresses are private? (Choose three.)******18Which statements are true regarding IP addressing? (Choose two.)NAT translates public addresses to private addresses destined for the Internet.Only one company is allowed to use a specific private network address space.Private addresses are blocked from public Internet by router. **Network is part of the private address space.IP address can be used for a host to direct traffic to itself. **Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)/26/26 **/26 **/27/27/27 **20What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?an interneta network **an octeta radi **21Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?The host subnet mask is incorrect.The default gateway is a network address.The default gateway is a broadcast address.The default gateway is on a different subnet from the host. **22Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)LAN workstationsservers **network printers **routers **remote workstationslaptopsCCNA1 - Module 7CCNA1 - Module 71Which options are properties of contention-based media access for a shared media? (Choose three.)**non-deterministic**less overheadone station transmits at a time**collisions existdevices must wait their turntoken passing2What is a primary purpose of encapsulating packets into frames? provide routes across the internetworkformat the data for presentation to the user**facilitate the entry and exit of data on mediaidentify the services to which transported data is associated3。
集美大学思科网络技术上级实验题目及答案翻译
实验1:第一章测试1 Which of the following are functions of a web browser without the addition of plug-ins? [Choose three.](cde)下列哪项是一个没有插件的web浏览器的功能?解释:连接、接触服务器,请求、接受信息a. displays Quicktime movies 显示Quicktime电影b. displays flash animation 显示flash动画c. requests information .请求信息d. contacts web servers 接触web服务器e. receives information 接收信息f. updates IRQ…s更新IRQ的2 Why were TCP/IP protocols developed?(a)为什么TCP / IP协议开发?a. To allow cooperating computers to share resources across a network 允许合作的计算机通过网络共享资源b. To insure that error correction of each packet takes place. 对每个数据包发生的误差修正。
c. To allocate resources that are needed for operating a computer on a LAN. 在局域网内分配那些需要操作的电脑的资源d. To determine the "best path" decision making when forwarding packets of data.确定“最佳路径”转发数据包时的决策3 In an 8 bit binary number, what is the total number of combinations of the eight bits?(b)在一个8位二进制数,八个比特的组合的总数吗? 解释:0(0000 0000) - 255(1111 1111)a. 255b. 256c. 512d. 128e. 254f. 10244 Which statements best describe a physical connection? [Choose two.]哪个陈述最好的形容物理连接。
思科第一学期第二章章节测验答案
1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)•确定数据传输路径•发起数据通信•重新定时和重新传输数据信号•发送数据流•管理数据流•数据流最后的终止点2.请选择关于网络协议的正确陈述。
(选择三项。
)•定义特定层PDU 的结构•规定实现协议层功能的方式•概述层与层之间通信所需的功能•限制了对硬件兼容性的需要•需要取决于协议层的封装过程•杜绝厂商之间的标准化3.封装的两个功能是什么?(选择两项)•跟踪终端设备之间的延迟•为通信提供统一的网络路径•在传输前可以修改原始数据•标识属于同一通信的数据片段•确保数据片段可以转发到正确的接收端设备4.数据链路层封装添加的报尾信息有何主要功能?•支持差错校验•确保数据按照顺序到达•确保送达正确目的•标识本地网络中的设备•帮助中间设备进行处理和路径选择5.OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)•网络层•传输层•物理层•数据链路层•会话层6.什么是PDU?•传输期间的帧损坏•在目的设备上重组的数据•因通信丢失而重新传输的数据包•特定层的封装7.以下哪种特征正确代表了网络中的终端设备?•管理数据流•发送数据流•重新定时和重新传输数据信号•确定数据传输路8.请参见图示。
IP 地址为10.0.0.34 的“手机A”已经与IP 地址为172.16.1.103 的“IP电话1”建立了IP 会话。
请根据图示回答,下列哪个设备类型是对无线设备“手机A”功能的最准确描述?•目的设备•终端设备•中间设备•介质设备9.请参见图示。
下列哪三个标签正确标识了图示网段的网络类型?(选择三项)•网络 A -- WAN•网络 B -- WAN•网络 C -- LAN•网络 B -- MAN•网络 C -- WAN•网络 A -- LAN10.下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)•LAN 通常位于一个地域内。
•此类网络由由一个组织管理。
思科 cisco 课后习题答案
分界点:
19. 调制解调器: 语音调制解调器将计算机生成的数字信号转换为可通过公共电话网络的模拟线路传输的语音 频率; 速度越快的调制解调器(如有线电视调制解调器和 DSL 调制解调器)在传输时使用的带宽频 率也越高。 CSU/DSU: 数字线路(如 T1 或 T3 线路)需要信道服务单元(CSU)和数据服务单元(DSU) ; 这两者经常合并到一台设备中,名为 CSU/DSU; CSU 端接数字信号, 并通过纠错和线路监视确保连接的完整性; DSU 在 T 载波线路帧和 LAN 能够解释的帧之间进行转换。 接入服务器: 集中处理拨入和拨出用户通信。接入服务器可同时有模拟和数字接口,能够同时支持数百名 用户。 WAN 交换机: 运营商网络中使用的多端口互连设备。这些设备通常交换帧中继、ATM 或 X.25 等数据流。 路由器: 提供用于连接服务提供商网络的网络互联接口和 WAN 接入接口。 这些接口可以是串行接口或其他 WAN 接口。有些类型的 WAN 接口需要通过 DSU/CSU 或调制 解调器(模拟、有线电视或 DSL)等外部设备将路由器连接到服务提供商。 20. X.25: 一种低带宽的老式 WAN 技术,最大速度为 48kbit/s,读卡器通常使用拨号模式 X.25 向中央 计算机验证事务; 对这些应用来说,低带宽和高延时并不是问题,而低成本让 X.25 成为众家之选; 很多服务提供商已使用帧中继代替 X.25。 一种第 2 层 WAN 协议,通常提供 4Mbit/s 或更高的数据速度; 使用虚电路提供永久、共享的中等带宽连接,可同时传输语音和数据; VC 由 DLCI 唯一标识,这确保两台 DTE 设备之间能够进行双向通信。 异步传输模式(ATM)技术是一种基于信元而不是帧的架构,使用 53 字节的定长信元; 这些小型定长信元非常适合传输对延迟敏感的语音和视频数据流。
大二思科考试题库和答案
大二思科考试题库和答案一、单项选择题(每题2分,共20分)1. 思科公司(Cisco)成立于哪一年?A. 1984年B. 1990年C. 1995年D. 2000年答案:A2. 以下哪个协议是用于在IP网络中传输数据的?A. HTTPB. FTPC. TCPD. IP答案:D3. 在OSI模型中,哪一层负责建立、维护和终止通信会话?A. 应用层B. 传输层C. 会话层D. 网络层答案:C4. 以下哪个设备不是网络交换机?A. Layer 2 SwitchB. Layer 3 SwitchC. RouterD. Hub答案:D5. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show interfaceD. show ip interface brief答案:A6. 在Cisco设备上,哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. write memory答案:A7. 以下哪个命令用于在Cisco设备上创建一个新的VLAN?A. vlan databaseB. configure terminalC. enableD. show vlan答案:A8. 以下哪个命令用于在Cisco设备上将接口配置为Trunk模式?A. switchport mode accessB. switchport mode dynamicC. switchport mode trunkD. switchport mode static答案:C9. 以下哪个协议用于在IP网络中自动分配IP地址?A. DHCPB. DNSC. FTPD. HTTP答案:A10. 在Cisco设备上,哪个命令用于查看设备的接口状态?A. show interfacesB. show ip interface briefC. show running-configD. show vlan答案:B二、多项选择题(每题3分,共15分)11. 以下哪些协议属于TCP/IP模型的应用层协议?A. HTTPB. FTPC. SNMPD. IP答案:A, B, C12. 在Cisco设备上,以下哪些命令用于配置接口?A. interfaceB. ip addressC. no shutdownD. enable答案:A, B, C13. 以下哪些设备可以作为网络的核心设备?A. SwitchB. RouterC. FirewallD. Hub答案:A, B14. 以下哪些命令用于在Cisco设备上查看网络信息?A. show ip routeB. show running-configC. show interfaceD. ping答案:A, C, D15. 以下哪些因素可以影响网络的性能?A. 带宽B. 延迟C. 丢包率D. 网络拓扑结构答案:A, B, C, D三、填空题(每题2分,共20分)16. 在Cisco设备上,使用________命令可以进入特权模式。
ccna1章节与期末答案
第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。
而且对等网络也没有集中管理。
这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。
正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。
正确答案:1和4解析:终端设备会发出通过网络传输的数据。
中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。
网络介质提供网络消息的传输通道。
正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。
内部网只描述通常仅供内部人员访问的网络区域。
当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。
使用大学无线LAN 的设备多为平板电脑和智能手机。
大学生主要使用无线WAN 来访问他们的手机运营商网络。
.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。
内联网基本上是仅供内部使用的局域网。
外联网是外部合作伙伴访问组织内部特定资源的网络。
家庭用户并不一定使用LAN 来访问Internet。
例如,PC 可以通过调制解调器直接连接到ISP。
正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。
内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。
正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。
10正确答案:2和3解析:移动电话连接需要使用移动电话网络。
卫星连接通常用于家庭或企业外部不便使用物理布线的位置。
11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。
思科第一学期第二单元考试题目及答案
参加考试 - DHomesb Chapter 2 - CCNA Discovery: 家庭和小型企业网络 (版本4.0)剩余时间:00:15:401用户可以通过哪两种方式与操作系统外壳进行交互? (选择两项。
)CLI OS GUI NIC内核2企业级环境中使用哪种 Windows 文件系统的可能性比较大?ext2 ext3 NTFS FAT16FAT323默认网关有何作用?用于物理连接计算机和网络为计算机提供永久位置标识计算机所连接的网络标识网络计算机的逻辑位置,并且是网络中的唯一标识允许本地网络计算机和其它网络中的设备通信的设备标识4对于同一网络上的各台计算机而言,哪两项必须是唯一而不能重复的?(选择两项。
)分区文件系统计算机名称IP 位置操作系统5根据GPL(GNU 通用公共许可证)发行的操作系统有哪三个特征?(选择三项。
)对源代码的访问完全开放软件通常免费提供结构化的开发周期价格可能很昂贵限制最终用户可以对代码执行的操作支持一般由用户免费提供6为确保操作系统按照设计正常执行,制造商会指定哪三种资源规格?(选择三项)键盘类型打印机要求所需的显存所需的硬盘空间处理器类型和速度建议的RAM 容量7资源管理器的哪个菜单选项用于确定计算机上安装的Windows XP 版本?(得1分)编辑帮助视图工具收藏8将计算机配置为动态接收其网络配置时,其结果是什么?每台计算机都获得一个永久的IP 位置。
网络管理员在每台计算机上输入信息。
每台计算机都从服务器请求配置信息。
NIC 自动向计算机提供配置信息,并存储该配置信息。
9操作系统受到严重损坏。
分区中的所有数据都需要删除,所有应用程序软件都必须重新安装。
应使用哪种安装方法来解决全新安装升级多重引导虚拟10下列关于驱动器分区的陈述,哪两项是正确的?(选择两项。
)多重引导安装必须采用不同的分区。
硬盘可以分为操作系统分区和数据分区。
对驱动器进行分区时,永远不会覆盖用户数据。
计算机网络智慧树知到课后章节答案2023年下内蒙古科技大学
计算机网络智慧树知到课后章节答案2023年下内蒙古科技大学内蒙古科技大学第一章测试1. 1 下面哪两项是点对点网络的缺点?()。
A:可扩展性不佳B:配置起来非常复杂C:不能集中管理D:组建与维护费用高昂答案:可扩展性不佳;不能集中管理2. 2 下面哪4种设备属于网络终端设备?( )A:打印机B:平板电脑C:服务器D:无线接入点E:IP电话F:交换机答案:打印机;平板电脑;服务器;IP电话3.逻辑拓扑图中包含下面哪项信息?( )A:IP编址方案B:各种电缆的长度和类型C:部门打印机的位置D:部门交换机的位置答案:IP编址方案4.下面哪种网络基础设施让你能够跨越广阔的地理区域访问其他网络?( )A:SANB:LANC:WLAND:MANE:WAN答案:WAN5.下面哪两种是服务提供商提供的企业级Internet接入技术?( )A:宽带有线电视B:城域以太网C:租用线D:移动服务E:蜂窝答案:城域以太网;租用线6.什么是融合网络?()A:混合使用卫星和陆地链接来传输数据的网络B:混合使用光纤和铜缆连接的网络C:混合使用有线和无线技术的网络D:通过相同的基础设施传输语音、视频和数据的网络答案:通过相同的基础设施传输语音、视频和数据的网络7.将一个组织的私有局域网与广域网连接,且只有该组织的成员、员工或其他获得授权的人员可以访问的访问,是以下哪种网络形式?( )A:城域网B:互联网C:内联网D:外联网答案:内联网8.%1,下列哪些特性是作为满足用户期望的可靠网络的网络底层架构所应具备的基本特性?( )A:可扩展性B:有效性C:服务质量(QoS)D:容错能力E:稳定性F:安全G:效率答案:可扩展性;服务质量(QoS);容错能力;安全9.为满足特定行业需求而构建的云资源类型是以下哪一种?( )A:私有云B:公共云C:定制云D:混合云答案:定制云10.人群可共同编辑和查看的网页被称为什么?( )A:网络日志(博客)B:播客C:即时消息D:维基答案:维基第二章测试1.网络管理员与交换机建立远程CLI 连接对其实施管理时,需要确保用户ID、密码和会话内容的保密性。
思科 DCompNtwk第二章
1 在评估当前网络的过程中,IT 人员执行差距分析以确定现有网络基础架构是否可支持所需的新功能。
此活动发生在 Cisco 生命周期服务方法的哪个阶段?准备阶段规划阶段设计阶段实施阶段运行阶段优化阶段标题描述最高分值1 correctness of response2 points for Option 20 points for any other option 2此试题参考以下领域的内容:CCNA Discovery: 计算机网络设计和支持2.1.3 网络生命周期的规划阶段2 组织在发出征求建议书 (RFP) 或征求报价书 (RFQ) 前,通常完成了 Cisco 生命周期服务策略的哪个阶段?准备阶段规划阶段设计阶段实施阶段运行阶段优化阶段标题描述最高分值1 correctness of response2 points for Option 10 points for any other option 2此试题参考以下领域的内容:CCNA Discovery: 计算机网络设计和支持2.2.1 回应客户的征求建议书或征求报价书3 下列哪项业务制约条件可能影响公司的 WAN 设计?公司政策中关于 LAN 设备上特定操作系统的规定当前在用户设备上实施的监控协议实施过程中最终用户无法使用网络公司政策因合作关系而要求使用特定厂商的网络设备标题描述最高分值1 correctness of response2 points for Option 40 points for any other option 2此试题参考以下领域的内容:CCNA Discovery: 计算机网络设计和支持2.4.2 明确限制条件4 下列有关对 RFQ 的回应的说法中哪两项正确?(选择两项)回应应该简短。
回应应该严格遵守 RFQ 指定的格式要求。
仅应该回答承包公司将负责的项目。
回应有助于客户比较各家潜在承包商提出的价格。
回应不止回复 RFP 这么简单。
思科网院第一学期1-6单元部分试题及答案
第一单元1、应用程序可以分为通用软件和行业专用软件。
下列哪两项属于行业专用软件?(选择两项。
)??教育工具演示文稿电子表格字处理医疗实践管理软件数据库管理2、字处理软件的哪种特征表明它是本地应用程序?该应用程序可以在不同用户之间共享。
该软件存储在本地硬盘上。
该软件可以通过网页访问。
该软件能够处理文本和图片。
3、下列哪三个术语描述了计算机的不同类型?(选择三项。
)操作系统网络笔记本电脑台式计算机Windows大型机4、将笔记本电脑连接到扩展坞有哪两项优点?(选择两项)增强了机动性。
减少了所需电力。
可以使用外部显视器。
可以使用更多无线安全选件。
可以使用备用的连接选件。
5、为何服务器通常配备重复或冗余部件?服务器需要更高功率,因此需要更多组件。
服务器要全天候可供访问。
服务器可设计为独立塔式或机架安装式。
网络标准要求服务器配备重复部件。
6、通常用什么单位来表示计算机的处理速度?位像素赫兹字节7、购买预先组装好的计算机有哪两项优点?(选择两项。
)成本通常比较低可以精确指定组件组装的等待期更长足以执行大多数一般的应用程序适合有特殊需求的客户8、某用户计划在一台计算机上同时运行多个应用程序。
哪个计算机组件是完成此任务的关键?RAMNIC显卡声卡存储设备9、哪种适配卡可让计算机系统与本地网络中的其它系统交换信息?显卡声卡调制解调器卡网络接口卡10、服务器、台式计算机、便携式计算机使用的主要存储设备是什么?磁带驱动器硬盘光盘驱动器 (DVD)软盘驱动器11、哪个组件用于消除来自电源线的高压尖峰,使其不损坏计算机系统?CPU电涌抑制器主板硬盘12、 UPS 可以提供哪两项浪涌保护器所不具备的功能?(选择两项)保护计算机不受电压浪涌的损坏。
用内部电池提供备用电源。
保护计算机不受突然电压尖峰的损坏。
让用户有时间给电力公司打电话。
在电源出现故障时,为用户提供安全关机的时间。
通过墙上插座供电的发电机提供备用电源13、哪个计算机组件是计算机系统的神经中枢,并且负责处理机器中的所有数据?RAMCPU显卡声卡操作系统14、可以通过什么来防止静电放电 (ESD)?干燥、没有湿气的环境铺有地毯的地板接地腕带整洁的工作空间15、哪两种设备可能存在危险电压电平,因此未经专门的操作培训不得打开机体?(选择两项)鼠标打印机显示器键盘硬盘电源16、在当今较新的操作系统中,安装组件后,默认将如何分配系统资源?通过操作系统手动分配由管理员手动分配由组件静态分配给预设置的资源在组件和操作系统之间动态分配17、一位用户反映说,上周为某 PC 正确安装了一台外围设备,但自从今天启动 PC 后,该设备就一直无法正常工作。
CCNA思科网络技术学院教程-第2章_网络技术基础
ICND—2-3
2.1 网络术语
LAN, 局域网 WAN, 广域网 MAN, 城域网 VPN,虚拟专用网 Intranet,企业内部互联网, Extranet SAN, 存储区域网 Data center, 数据中心
开发和网络集成。
ICND—2-11
1、OSI 参考模型
应用层(上层)
Application Presentation
Session
传输层 网络层 数据链路层 物理层
Transport Layer Network Layer
Data Link Physical
应用层 表示层 会话层
数据流层
ICND—2-12
PDU
/
/
/
数据段 segment
数据包 packet
帧 frame
位 bit
举例
Telnet FTP ASCⅡ JPEG,AVI,MPEG
NFS, RPC SQL
TCP UDP SPX
IP IPX
802.3/802.2 HDLC
EIA/TIA-232
V.35
ICND—2-13
2、DoD(TCP/IP)模型
• Security
• Possible point for remote access
ICND—2-27
Core Layer Characteristics
Core Layer
• Fast transport to enterprise services • No packet manipulation
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
思科-第一学期-第二章-章节测验-答案
1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)•确定数据传输路径
•发起数据通信
•重新定时和重新传输数据信号
•发送数据流
•管理数据流
•数据流最后的终止点
2.请选择关于网络协议的正确陈述。
(选择三项。
)
•定义特定层PDU 的结构
•规定实现协议层功能的方式
•概述层与层之间通信所需的功能
•限制了对硬件兼容性的需要
•需要取决于协议层的封装过程
•杜绝厂商之间的标准化
3.封装的两个功能是什么?(选择两项)
•跟踪终端设备之间的延迟
•为通信提供统一的网络路径
•在传输前可以修改原始数据
•标识属于同一通信的数据片段
•确保数据片段可以转发到正确的接收端设备
4.数据链路层封装添加的报尾信息有何主要功能?
•支持差错校验
•确保数据按照顺序到达
•确保送达正确目的
•标识本地网络中的设备
•帮助中间设备进行处理和路径选择
5.OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)
•网络层
•传输层
•物理层
•数据链路层
•会话层
6.什么是PDU?
•传输期间的帧损坏
•在目的设备上重组的数据
•因通信丢失而重新传输的数据包
•特定层的封装
7.以下哪种特征正确代表了网络中的终端设备?
•管理数据流
•发送数据流
•重新定时和重新传输数据信号
•确定数据传输路
8.
请参见图示。
IP 地址为10.0.0.34 的“手机A”已经与IP 地址
为172.16.1.103 的“IP电话1”建立了IP 会话。
请根据图示回答,下列哪个设备类型是对无线设备“手机A”功能的最准确描述?
•目的设备
•终端设备
•中间设备
•介质设备
9.
请参见图示。
下列哪三个标签正确标识了图示网段的网络类型?(选择三
项)
•网络 A -- WAN
•网络 B -- WAN
•网络 C -- LAN
•网络 B -- MAN
•网络 C -- WAN
•网络 A -- LAN
10.下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)
•LAN 通常位于一个地域内。
•此类网络由由一个组织管理。
•LAN 中的不同网段之间一般通过租用连接的方式连接。
•此类网络的安全和访问控制由服务提供商控制。
•LAN 为同一个组织内的用户提供网络服务和应用程序访问。
•此类网络的每个终端通常都连接到电信服务提供商(TSP) 11.
请参见图示。
哪个网络术语描述了图中所示的数据交替发送过程?
•通道
•PDU
•流传输
•多路复用
•封装
12.第 4 层端口指定的主要作用是什么?
•标识本地介质中的设备
•标识源设备和目的设备之间的跳数
•向中间设备标识通过该网络的最佳路径
•标识正在通信的源终端设备和目的终端设备
•标识终端设备内正在通信的进程或服务
13.哪种设备被视为中间设备?
•文件服务器
•IP 电话
•笔记本电脑
•打印机
•交换机
14.
请参见图示。
哪个术语正确判断出了包含于区域 B 中的设备类型?
•源设备
•终端设备
•传输设备
•中间设备
15.
请参见图示。
所示网络属于哪一类型?•WAN
•MAN
•LAN
•WLAN
16.哪一层负责将数据段封装成数据包?•物理层
•数据链路层
•网络层
•传输层
17.
请参见图示。
下列哪组设备仅包含终端设备?•A、C、D
•B、E、G、H
•C、D、G、H、I、J
•D、E、F、H、I、J
•E、F、H、I、J
18.通过检查网络层头部可以确定什么?•本地介质上的目的设备
•目的主机地址
•将要通过介质传输的比特
•创建数据的源应用程序或进程
19.在封装过程中,数据链路层执行什么操作?
•不添加地址。
•添加逻辑地址。
•添加物理地址。
•添加进程的端口号。
20.TCP/IP 网络接入层有何作用?
•路径确定和数据包交换
•呈示数据
•可靠性、流量控制和错误检测
•网络介质控制
•将数据段划分为数据包
21.OSI 模型各层从最高层到最低层的正确顺序如何?
•物理层、网络层、应用层、数据链路层、表示层、会话层、传输层•应用层、物理层、会话层、传输层、网络层、数据链路层、表示层•应用层、表示层、物理层、会话层、数据链路层、传输层、网络层•应用层、表示层、会话层、传输层、网络层、数据链路层、物理层•表示层、数据链路层、会话层、传输层、网络层、物理层、应用层。