CCNA考试题库中英文翻译版及答案
CCNA中英对照题库(0-10.pdf

CCNA中英对照题库(0-10.pdfCCNA (200-120)题库中英对照整理于:2015 年 3 月 31 日版本:1.2 声明:本题库来源互联网(鸿鹄论坛)本题库为英文考试原版左右选择题中文考试为随机抽取英文题的中译版此题库非中文考试题库,而是英文题库手动翻译此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。
如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。
QUESTION 001 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做? A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. R1会剥离源MAC地址,以 0000:0C36.6965 代替。
B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源 IP 地址,1/ 10以 192.168.40.1 代替。
C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. R1会剥离源MAC地址,以 0000:0C36.6965 代替。
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. R1会剥离目的 IP 地址,以 192.168.40.1 代替。
CCNA第三学期中英文对照练习3

1、下列哪两种说法正确描述了VLAN的优点?(选择两项。
)45Which two statements describe the benefits of VLANs? (Choose two.)VLAN通过调节流量控制和窗口大小来提升网络性能。
VLANs improve network performance by regulating flow control and window size.VLAN使交换机可通过VLAN ID过滤将数据包路由到远程网络。
VLANs enable switches to route packets to remote networks via VLAN ID filtering.VLAN通过减少交换机上所需的物理端口数量来降低网络开销。
VLANs reduce network cost by reducing the number of physical ports required on switches. VLAN通过识别有权访问敏感数据和应用程序的用户来提升网络安全性。
VLANs improve network security by isolating users that have access to sensitive data and applications.VLAN将网络划分为较小的逻辑网络,这降低了网络对广播风暴的敏感性。
VLANs dividea network into smaller logical networks, resulting in lower susceptibility to broadcast storms.2、默认交换机配置中的VLAN1有哪两项特点?(选择两项。
)23What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)VLAN1应重命名。
CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。
)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。
你应该使用什么协议来完成这?A. SMTP简单邮件传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4. What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A. RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。
思科CCNA1第八章试题及答案英文版

1. 1. QuestionWhat is a result of connecting two or more switches together?o The number of broadcast domains is increased.o The size of the broadcast domain is increased.o The number of collision domains is reduced.o The size of the collision domain is increased.2. 2. QuestionRefer to the exhibit. How many broadcast domains are there?CCNA1 v6.0 Chapter 8 Exam 005o 1o 2o 3o43. 3. QuestionWhat are two reasons a network administrator might want to create subnets?(Choose two.)o simplifies network designo improves network performanceo easier to implement security policieso reduction in number of routers neededo reduction in number of switches needed4. 4. QuestionRefer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?CCNA1 v6.0 Chapter 8 Exam 007o 255.255.255.0o 255.255.255.128o 255.255.255.192o 255.255.255.224o 255.255.255.2405. 5. QuestionRefer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has beensubnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the newnetwork (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?CCNA1 v6.0 Chapter 8 Exam 004o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46o IP address: 192.168.10.254 subnet mask: 255.255.255.0, defaultgateway: 192.168.10.16. 6. QuestionIf a network device has a mask of /28, how many IP addresses are available for hosts on this network?o 256o 254o 62o 32o 16o 147. 7. QuestionWhich subnet mask would be used if 5 host bits are available?o 255.255.255.0o 255.255.255.128o 255.255.255.224o 255.255.255.2408. 8. QuestionHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?o 510o 512o1022o 1024o 2046o 20489. 9. QuestionHow many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?o twoo threeo fouro five10. 10. QuestionA network administrator wants to have the same network mask for allnetworks at a particular small site. The site has the following networks and number of devices:IP phones – 22 addressesPCs – 20 addresses neededPrinters – 2 addresses neededScanners – 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?o 255.255.255.0o 255.255.255.192o 255.255.255.224o 255.255.255.240o 255.255.255.248o 255.255.255.25211. 11. QuestionA company has a network address of 192.168.1.64 with a subnet mask of255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks wouldachieve that? (Choose two.)o 192.168.1.16/28o 192.168.1.64/27o 192.168.1.128/27o 192.168.1.96/28o 192.168.1.192/2812. 12. QuestionA network administrator is variably subnetting a network. The smallestsubnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?o 4o 6o 8o 10o 1213. 13. QuestionRefer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?CCNA1 v6.0 Chapter 8 Exam 001o 56o 60o 64o 68o7214. 14. QuestionRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?CCNA1 v6.0 Chapter 8 Exam 002o 10.16.10.160/26o 10.16.10.128/28o 10.16.10.64/27o 10.16.10.224/26o 10.16.10.240/27o 10.16.10.240/2815. 15. QuestionA network administrator needs to monitor network traffic to and fromservers in a data center. Which features of an IP addressing scheme should be applied to these devices?o random static addresses to improve securityo addresses from different subnets for redundancyo predictable static IP addresses for easier identificationo dynamic addresses to reduce the probability of duplicate addresses 16. 16. QuestionWhich two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)o It eliminates most address configuration errors.o It ensures that addresses are only applied to devices that require apermanent address.o It guarantees that every device that needs an address will get one.o It provides an address only to devices that are authorized to be connected to the network.o It reduces the burden on network support staff.17. 17. QuestionA DHCP server is used to assign IP addresses dynamically to the hosts on anetwork. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?o 254o251o 252o 25318. 18. QuestionRefer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the s ite subsection to represent multiple geographical sites of the company, the s ub-site section to represent multiple campuses at each site, and thes ubnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achievedper sub-site?CCNA1 v6.0 Chapter 8 Exam 003o 0o 4o16o 25619. 19. QuestionWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?o 2001:DB8:BC15o 2001:DB8:BC15:Ao 2001:DB8:BC15:A:1o 2001:DB8:BC15:A:1220. 20. QuestionConsider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is /6021. 21. QuestionMatch the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 0122. 22. QuestionRefer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 006。
CCNA第三学期中文答案期末考试

请参见图示。
以下哪一项可以让交换机X 上VLAN 40 中的Y 上VLAN 40 中的主机通信?QoS路由(routing)中继VPN请参见图示。
每台交换机的MA 示。
如果为每台交换机配置了默认的优先级值,则哪台交换机会当选为生成树根桥?交换机A交换机B交换机C交换机D交换机E交换机 F请参见图示。
网络管理员输入图中所示的配置以SSH 和Telnet 连接访问交换机。
但Telnet 连接失败。
此问题最可能的原因是什么?SSH 版本号错误。
SSH 被配置在错误的线路上。
不能同时配置Telnet 和SSH。
transport input命令配置不正确。
请参见Switch4 的意义的说法中哪两项正确?(选择两项。
)此开销代表从Switch4 到根交换机的最低开销路径。
一台上游(更接近根交换机)交换机的端口16 正在向根交换机通告开销值23。
Switch4 将快速以太网链路的开销加到23 上来确定到根交换机的总开销。
Switch4 通过快速以太网链路连接到上游交换机,该上游交换机则通过千兆以太网链路连接到根交换机。
根交换机通告的开销值是23,该值比VLAN0001 生成树域内的其它任何交换机的值都低。
为什么网络管理员在选择根桥时必须考虑生成树网络直径?网络直径限制是9。
可以因为计时器到期而放弃BPDU。
交换机之间的布线距离是100 米。
必须将网络直径设置为根桥和与其相连的距离最远的交换机之间的电缆米数。
下列关于单臂路由器VLAN 间路由的说法中哪三项正确?(选择三项。
)需要使用路由器上的子接口需要在路由器和第 2 层交换机之间采用接入链路与采用多个物理接口相比,更经济且更具可扩展性需要在每个子接口上配置no shutdown命令如果许多VLAN 争夺单个路由器接口的带宽,则会影响性能与采用多个物理接口相比,排除VLAN 间路由配置故障简单得多请参见图示。
下列哪三项正确地描述了可能与此输出相关择三项)接口FastEthernet3/0/0 包含子接口。
鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

1、请参见图示。
当收到下列帧将会怎么做?(选择三项。
)ACFA. Router1的将剥离的源MAC地址,并将其与MAC地址0000.0c36.6965取代。
B. Router1的将剥离的源IP地址,并将其与IP地址192.168.40.1取代。
C.router1将剥离的目的MAC地址,并将其与MAC地址代替0000.0c07.4320。
D.router1将剥离的目的IP地址,并将其与192.168.40.1的IP地址替换。
E. Router1的将转发数据包输出接口的FastEthernet0/1。
F.router1将转发数据包输出接口的FastEthernet0/2。
2、请参见图示。
哪三种说法正确描述了网络设备A?(选择三项。
)BDEA.使用255.255.255.128子网掩码时,在各接口不需要的IP地址。
B.使用255.255.255.128子网掩码时,在各接口确实需要一个唯一的IP地址IP子网。
C.为255.255.255.0的子网掩码时,必须是一个二层设备的电脑进行通信彼此。
D.为255.255.255.0的子网掩码时,必须是一个三层设备的电脑进行通信彼此。
E.使用255.255.254.0的子网掩码时,每个接口并不需要一个IP地址。
3、OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?EA.传输B.网络D.会话E.应用4、以下哪项描述了WAN设备的角色?(选择三项。
)A.CSU/ DSU用于端接本地数字环路B.调制解调器端接本地数字环路C.一个CSU/ DSU终止模拟本地环路D.调制解调器终止模拟本地环路E.路由器通常被视为DTE设备F.路由器通常被视为DCE设备注:SU/DSU是用于连接终端和数字专线的设备,属于DCE设备modem用于数字信号和模拟信号的转换,属于DCE设备路由器一般是DTE设备5、请参见图示,主机A ping接口S0/0的router3,什么是该ping的TTL值?A. 253B. 252C. 255D. 2546、网络管理员可以通过建立一个FTP连接到远程服务器验证新安装的主机的配置。
CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。
CCNA中文版本题库_1

1、请参见图示。
当收到下列帧将会怎么做?(选择三项。
)ACFA. Router1的将剥离的源MAC地址,并将其与MAC地址0000.0c36.6965取代。
B. Router1的将剥离的源IP地址,并将其与IP地址192.168.40.1取代。
C.router1将剥离的目的MAC地址,并将其与MAC地址代替0000.0c07.4320。
D.router1将剥离的目的IP地址,并将其与192.168.40.1的IP地址替换。
E. Router1的将转发数据包输出接口的FastEthernet0/1。
F.router1将转发数据包输出接口的FastEthernet0/2。
2、请参见图示。
哪三种说法正确描述了网络设备A?(选择三项。
)BDEA.使用255.255.255.128子网掩码时,在各接口不需要的IP地址。
B.使用255.255.255.128子网掩码时,在各接口确实需要一个唯一的IP地址IP子网。
C.为255.255.255.0的子网掩码时,必须是一个二层设备的电脑进行通信彼此。
D.为255.255.255.0的子网掩码时,必须是一个三层设备的电脑进行通信彼此。
E.使用255.255.254.0的子网掩码时,每个接口并不需要一个IP地址。
3、OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?EA.传输B.网络D.会话E.应用4、以下哪项描述了WAN设备的角色?(选择三项。
)A.CSU/ DSU用于端接本地数字环路B.调制解调器端接本地数字环路C.一个CSU/ DSU终止模拟本地环路D.调制解调器终止模拟本地环路E.路由器通常被视为DTE设备F.路由器通常被视为DCE设备注:SU/DSU是用于连接终端和数字专线的设备,属于DCE设备modem用于数字信号和模拟信号的转换,属于DCE设备路由器一般是DTE设备5、请参见图示,主机A ping接口S0/0的router3,什么是该ping的TTL值?A. 253B. 252C. 255D. 2546、网络管理员可以通过建立一个FTP连接到远程服务器验证新安装的主机的配置。
CCNA第三学期中英文对照练习6

1请参见图示。
下列哪三种说法正确描述了图中所示的网络设计?(选择三项。
)136Refer to the exhibit. Which three statements describe the network design shown in the exhibit?此设计不易扩展。
This design will not scale easily.路由器将VLAN合并到单个广播域内。
The router merges the VLANs into a single broadcast domain.此设计使用了一些不必使用的交换机端口或路由器端口。
This design uses more switch and router ports than are necessary.此设计超出了交换机可连接的VLAN的最大数量。
This design exceeds the maximum number of VLANs that can be attached to a switch.此设计需要在交换机与路由器之间的链路上使用ISL或802.1q协议。
This design requires the use of the ISL or 802.1q protocol on the links between the switch and the router.如果交换机与路由器之间的物理接口可以正常工作,则不同VLAN中的设备可通过路由器通信。
If the physical interfaces between the switch and router are operational, the devices on the different VLANs can communicate through the router.2、某路由器有两个快速以太网接口,需要连接到本地网络中的四个VLAN。
在不降低网络必要性能的情况下,如何才能使用数量最少的物理接口达到此要求?1A router has two FastEthernet interfaces and needs to connect to four VLANs in the local network. How can this be accomplished using the fewest number of physical interfaces without unnecessarily decreasing network performance?实施单臂路由器配置。
CCNA中文试题

一、为了提高(加强)企业网的安全性,网络管理员使用ACL(访问控制列表)。
下列哪两个原因将使网络管理员使用访问控制列表?1.控制vty访问路由器时To control vty access into a router2.当数据包流过路由器时,对数据包进行过滤的时候。
To filter traffic as it passes through a router.二、当你是某网站的管理员时,为了提高交换网络的安全性,请参考下面意见,哪两个方法可以在思科交换机上的第二层协议上安全实现?1.禁止交换机建立协商通路。
disable trunk negotation on the switch2.为交换机连接主机的接口进行适当的配置。
configure a switch port host where appropriate三、一个802.11g的AP已经被配置并且安装在一个正方形的办公室中央,一些无线用户有丢包和性能下降现象,而大多使用户工作正常。
从下面列表中找出哪三个是可能的原因?1.无线电话(手机)cordlee phones;2.金属文件橱柜metal file cabinets;3.无线类型或天线指向antenna type or direction;四、参考图示,连接在交换机上的两个接口没有变黄或者变绿,下面哪些方法是最有效的调试物理层问题的方法?(选3个)1.确保电缆A,B是直通线Ensure that cables A and B are straight-through cables2.重做所有电缆Reseat all cables3.确保交换机有电工作正常Ensure the P4S-S has power五、一个网络管理员正在配置一个路由器,使他成为一个帧中继中星型的布局中的集线器。
下面那个是在路由器上使用点到点子接口代替多点接口的优点?1.它可以避免距离矢量路由协议中的负载平衡问题It avoids split-horizon issues with distance vector routing protocols六、如图所示,图中无线局域网运行了哪两个设备管理系统?(选2)1、网络图中显示的一个长期运行的一套系统是ESS(主管支持系统)The network diagram represents an extended service set(ESS)2、两个APS(辅助推进系统)应该被配置在不同的通道起作用。
ccna中文试题及详解

1.对于MSFC(多层交换功能卡)的说法不正确的是A. MSFC只能运行IOS系统B. MSFC可运行IOS系统,或者CatOS系统C. 如果交换机管理引擎(Supervisor Engine)上运行的是CatOS系统,则所安装的MSFC必须D. 在管理引擎和MSFC上可同时运行IOS系统2. ROMmon模式恢复丢失映象的IOS交换机中,用来加载新的启动映射的命令是A. boot bootflash:B. boot system flash bootflash:C. boot tftp:D. copy tftp flash:3.现要把一个cisco交换机端口添加到多个VLAN中,则需要把该端口设置成()模式A. access portB. trunk portC. routed portD. tunnel port4.如下图所示的网络拓扑结构中,cisco交换机4的根路径开销(Root Path Cost)为A. 4B. 19C. 23D. 275.下面关于端口属性的说法不正确的是A. 快速以太网(10/100 Mbps)端口支持10 Mbps或者100 Mbps速率和所有双工选项B. 仅工作在1000 Mbps的千兆以太网端口不支持半双工模式C. 100BASE-x 和1000BASE-x SFP模块端口支持所有双工选项,但不支持速率自动协商D. 不能为10G以太网端口配置速率和双工模式6.有两台交换机想要通过两个普通RJ-45交换端口实现级联,并且支持直通和交叉电缆,则下面()配置步骤描述是不正确的A. 要在相连的两端口上分别配置auto-MDIX设置B. 可只在相连的任一端口上配置auto-MDIX设置C. 在启用auto-MDIX功能后,必须设置接口速率和双工模式为“auto”(自动)D. 不能使用1000BASE-SX /-LX SFP模块端口,但可使用10/100/1000BASE-TX SFP模块端口7.下面()不是Cisco设备VLAN间路由的可选方案A. 网关B. RSMC. RSFCD. 路由器8.下面是在Cisco交换机上一个把gigabitethernet0/1接口添加到VLAN 10的配置步骤,但其中少了关键的一步。
思科CCNA1第七章试题及答案英文版

25. QuestionWhat is the binary equivalent of the decimal number 232?o 11101000o 11000110o 10011000o 1111001026. QuestionWhat is the decimal equivalent of the binary number 10010101?o149o 157o 168o 1921. QuestionHow many bits are in an IPv4 address?o32o 64o 128o 2562. QuestionWhich two parts are components of an IPv4 address? (Choose two.)o subnet portiono network portiono logical portiono host portiono physical portiono broadcast portion3. QuestionWhat does the IP address 172.17.4.250/24 represent?o network addresso multicast addresso host addresso broadcast address4. QuestionWhat is the purpose of the subnet mask in conjunction with an IP address?o to uniquely identify a host on a networko to identify whether the address is public or privateo to determine the subnet to which the host belongso to mask the IP address to outsiders5. QuestionWhat subnet mask is represented by the slash notation /20?o 255.255.255.248o 255.255.224.0o 255.255.240.0o 255.255.255.0o 255.255.255.1926. QuestionA message is sent to all hosts on a remote network. Which type of message isit?o limited broadcasto multicasto directed broadcasto unicast7. QuestionWhat are three characteristics of multicast transmission? (Choose three.)o The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.o A single packet can be sent to a group of hosts.o Multicast transmission can be used by routers to exchange routing information.o The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.o Computers use multicast transmission to request IPv4 addresses.o Multicast messages map lower layer addresses to upper layer addresses.8. QuestionWhich three IP addresses are private ? (Choose three.)o 10.1.1.1o 172.32.5.2o 192.167.10.10o 172.16.4.4o 192.168.5.5o 224.6.6.69. QuestionWhich two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.)o trunkingo dual stacko encapsulationo tunnelingo multiplexing10. QuestionWhich of these addresses is the shortest abbreviation for the IP address:3FFE:1044:0000:0000:00AB:0000:0000:0057?o 3FFE:1044::AB::57o 3FFE:1044::00AB::0057o 3FFE:1044:0:0:AB::57o 3FFE:1044:0:0:00AB::0057o 3FFE:1044:0000:0000:00AB::57o 3FFE:1044:0000:0000:00AB::005711. QuestionWhat type of address is automatically assigned to an interface when IPv6 is enabled on that interface?o global unicasto link-localo loopbacko unique local12. QuestionWhat are two types of IPv6 unicast addresses? (Choose two.)o multicasto loopbacko link-localo anycasto broadcast13. QuestionWhat are three parts of an IPv6 global unicast address? (Choose three.)o an interface ID that is used to identify the local network for a particular hosto a global routing prefix that is used to identify the network portion of the address that has been provided by an ISPo a subnet ID that is used to identify networks inside of the local enterprise siteo a global routing prefix that is used to identify the portion of the network address provided by a local administratoro an interface ID that is used to identify the local host on the network14. QuestionAn administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?o SLAACo stateless DHCPv6o stateful DHCPv6o RA and EUI-6415. QuestionWhich protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?o ARPv6o DHCPv6o ICMPv6o UDP16. QuestionWhich two things can be determined by using the ping command? (Choose two.)o the number of routers between the source and destination deviceo the IP address of the router nearest the destination deviceo the average time it takes a packet to reach the destination and for theresponse to return to the sourceo the destination device is reachable through the networko the average time it takes each router in the path between source and destination to respond17. QuestionWhat is the purpose of ICMP messages?o to inform routers about network topology changeso to ensure the delivery of an IP packeto to provide feedback of IP packet transmissionso to monitor the process of a domain name to IP address resolution 18. QuestionWhat is indicated by a successful ping to the ::1 IPv6 address?o The host is cabled properly.o The default gateway address is correctly configured.o All hosts on the local link are available.o The link-local address is correctly configured.o IP is properly installed on the host.19. QuestionA user is executing a tracert to a remote device. At what point would a router,which is in the path to the destination device, stop forwarding the packet?o when the router receives an ICMP Time Exceeded messageo when the RTT value reaches zeroo when the host responds with an ICMP Echo Reply messageo when the value in the TTL field reaches zeroo when the values of both the Echo Request and Echo Reply messages reach zero20. QuestionWhat field content is used by ICMPv6 to determine that a packet has expired?o TTL fieldo CRC fieldo Hop Limit fieldo Time Exceeded field21. QuestionFill in the blank.The decimal equivalent of the binary number 10010101is 149 .22. QuestionFill in the blank.The binary equivalent of the decimal number 232 is 1110100023. QuestionFill in the blank.What is the decimal equivalent of the hex number 0x3F? 63。
鸿鹄论坛_CCNA中文版本题库(谷歌翻译,有错误自行纠正)

1、请参见图示。
当收到下列帧将会怎么做?(选择三项。
)ACFA. Router1的将剥离的源MAC地址,并将其与MAC地址0000.0c36.6965取代。
B. Router1的将剥离的源IP地址,并将其与IP地址192.168.40.1取代。
C.router1将剥离的目的MAC地址,并将其与MAC地址代替0000.0c07.4320。
D.router1将剥离的目的IP地址,并将其与192.168.40.1的IP地址替换。
E. Router1的将转发数据包输出接口的FastEthernet0/1。
F.router1将转发数据包输出接口的FastEthernet0/2。
2、请参见图示。
哪三种说法正确描述了网络设备A?(选择三项。
)BDEA.使用255.255.255.128子网掩码时,在各接口不需要的IP地址。
B.使用255.255.255.128子网掩码时,在各接口确实需要一个唯一的IP地址IP子网。
C.为255.255.255.0的子网掩码时,必须是一个二层设备的电脑进行通信彼此。
D.为255.255.255.0的子网掩码时,必须是一个三层设备的电脑进行通信彼此。
E.使用255.255.254.0的子网掩码时,每个接口并不需要一个IP地址。
3、OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?EA.传输B.网络D.会话E.应用4、以下哪项描述了WAN设备的角色?(选择三项。
)A.CSU/ DSU用于端接本地数字环路B.调制解调器端接本地数字环路C.一个CSU/ DSU终止模拟本地环路D.调制解调器终止模拟本地环路E.路由器通常被视为DTE设备F.路由器通常被视为DCE设备注:SU/DSU是用于连接终端和数字专线的设备,属于DCE设备modem用于数字信号和模拟信号的转换,属于DCE设备路由器一般是DTE设备5、请参见图示,主机A ping接口S0/0的router3,什么是该ping的TTL值?A. 253B. 252C. 255D. 2546、网络管理员可以通过建立一个FTP连接到远程服务器验证新安装的主机的配置。
CCNA认证试题(中文+答案)

CCNA认证试题一(附答案和解析)中文版(一)1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802。
1(B) IEEE 802。
2(C) IEEE 802.3(D)IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802。
3 以太网IEEE 802.4 令牌总线IEEE 802。
5 令牌环IEEE 802.8 FDDIIEEE 802。
11 无线局域网记住IEEE802.1-——-—--IEEE802。
5的定义以太网是一种计算机局域网组网技术.IEEE制定的IEEE 802。
3标准给出了以太网的技术标准.它规定了包括物理层的连线、电信号和介质访问层协议的内容。
以太网是当前应用最普遍的局域网技术.它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。
以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE—T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD介质访问控制方法.电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会.建会于1963年1月1日。
总部在美国纽约市。
在150多个国家中它拥有300多个地方分会。
目前会员数是36万.专业上它有35个专业学会和两个联合会。
IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议。
IEEE定义的标准在工业界有极大的影响.下面列出:IEEE802.3以太网标准802。
3--——---—— 10Base以太网标准802.3u-—------ 100Base-T(快速以太网)802.3z—-—————— 1000Base-X(光纤吉比特以太网)802.3ab———-——-— 1000Base—T(双绞线吉比特以太网)2、对于这样一个地址,192。
CCNA第三学期中文答案第四章

S2会保存已知的最新修订版本的 VLAN ,但如果它重新加载,就会丢失这些 VLAN当包含VLAN 的交换网络中配置了 VTP 时,下列哪种说法正确VTP 仅与标准兼容。
VTP 会向同一 VTP 域内的所有交换机动态通知 VLAN 更改情况。
VTP 以客户端模式工作具有哪两项特点(选择两项。
)无法添加VLAN可添加在本地有效的 VLAN无论VLAN 信息如何,将广播从所有端口转发出去 厂只能传递VLAN 管理信息而无法接受更改可向同一 VTP 域中的其它交换机转发 VLAN 信息17请参见图示。
交换机SVTP 服务器模式。
交换机 S2和S3处于客户端模式。
管理员意外断开了 S2的F0/1接口上的电缆。
这会产生什么后果S2会自动转换到VTP 透明模式。
S2会将所有VLAN 从VLAN 数据库中删除,直到重新接好电缆为止。
Student 1VLAN 99W VLAM 172.17.9S.0/24Student 2F0J1F0/18 172.1^.99.11Student 317217.97.13172.17.99.21FO/18172.17.99.22172.17.99.23172.17-99^2VTP 增大了管理交换网络的复杂性。
通过VTP 可将交换机配置为多个 VTP 域的成员当电缆重新接好时,S2会自动向 发送一个VTP 通告请求。
透明模式中的交换机不会转发 VTP 通告。
On switch 5W1VTP Dantain Mame - MET VTP JI ode = SETViet ConEl^ Revisicn = 5 VLANs = L f 2t 4r 6^f 9置为VTP 服务器,交换机 SW2和SW4被配置为VTP 客户端,交换机 SW3被配置为VTP 透明模式。
哪台 些交换机会收到 VTP 更新并根据更新来同步 VLAN 配置所有交换机均会收到更新并同步 VLAN 信息。
仅交换机SW3和SW4会收到更新并同步 VLAN 信息SW3和SW4会收到更新,但仅交换机 SW4会同步VLAN 信息客户卷请参见图示。
CCNA中英文试题两套

这是我学习过程中遇见的ccna试题,中文一份,英文一份,很经典呀。
1 技术人员需要为某幢已经布设有线以太网络的大厦提供无线连接。
哪三个因素会影响需要的接入点数目?(选择三项。
)大厦的规模大厦中实体内墙的数目多个办公室中有微波炉无线网络中使用的加密方法Windows 和Appletalk 操作系统的同时使用AP 中短波或红外线的使用2 下列关于无线网桥的陈述,哪一项是正确的?通过无线链路连接两个网络连接无线局域网的固定设备允许无线客户端连接到有线网络增强无线信号的强度3 接入点默认使用哪一类身份验证?开放式PSKWEPEAP4请参见图示。
在Linksys 集成路由器的Wireless 菜单选项中,Network Mode 选项Mixed 是什么意思?路由器支持加密和身份验证。
路由器支持有线和无线两种连接。
路由器支持802.11b、802.11g 和802.11n 设备。
路由器支持通过红外和无线电射频连接。
5 接入点可以使用哪两种身份验证方法?(选择两项。
)WEPWPAEAPASCII预共享密钥6 哪项接入点功能允许网络管理员定义可以进入无线网络的数据类型?加密黑客攻击拦截通信过滤MAC 地址过滤身份验证7 下列关于服务集标识符(SSID) 的陈述中,哪两个是正确的?(选择两项。
)标识无线设备所属的WLAN是一个包含32 个字符的字符串,不区分大小写负责确定信号强度同一WLAN 中的所有无线设备必须具有相同的SSID用于加密通过无线网络发送的数据8请参见图示。
在Linksys 集成路由器的Wireless 菜单中,哪个配置选项可用于让附近的客户端知道接入点的存在。
Network ModeNetwork Name (SSID)Radio BandWide ChannelStandard ChannelSSID Broadcast9 下列哪个术语准确描述了为防止黑客读取截取到的数据而进行的无线数据编码?地址过滤身份验证广播加密密码短语编码10 两种WEP 密钥长度分别是多少?(选择两项。
ccna 考试题目

CCNA认证试题一(附答案和解析)1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准. (A) IEEE 802.1 (B) IEEE 802.2 (C) IEEE 802.3 (D) IEEE 802.5 答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层 IEEE 802.2 逻辑链路控制 IEEE 802.3 以太网 IEEE 802.4 令牌总线 IEEE 802.5 令牌环 IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。
IEEE制定的IEEE 802.3标准给出了以太网的技术标准。
它规定了包括物理层的连线、电信号和介质访问层协议的内容。
以太网是当前应用最普遍的局域网技术。
它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。
以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE-T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD介质访问控制方法。
电气电子工程师协会或IEEE (Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会。
建会于1963年1月1日。
总部在美国纽约市。
在150多个国家中它拥有300多个地方分会。
目前会员数是36万。
专业上它有35个专业学会和两个联合会。
IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议IEEE定义的标准在工业界有极大的影响。
下面列出:IEEE802.3以太网标准 802.3--------- 10Base以太网标准802.3u-------- 100Base-T(快速以太网)802.3z-------- 1000Base-X(光纤吉比特以太网) 802.3ab-------- 1000Base-T(双绞线吉比特以太网)2、对于这样一个地址,192.168.19.255/20,下列说法正确的是: () (A) 这是一个广播地址 (B) 这是一个网络地址 (C) 这是一个私有地址 (D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上 (F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位 192.168.19.255/20划为二进制为:11000000.10101000.00010011.11111111 11111111.11111111.11110000.00000000主机位变成全0表示这个IP的网络地址主机槐涑扇?表示这个IP的广播地址RFC1918文件规定了保留作为局域网使用的私有地址: 10.0.0.0 - 10.255.255.255 (10/8 prefix)172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)3、Quidway系列路由器在执行数据包转发时,下列哪些项没有发生变化(假定没有使用地址转换技术)?() (A) 源端口号 (B) 目的端口号 (C) 源网络地址 (D) 目的网络地址 (E) 源MAC地址 (F) 目的MAC地址答案:ABCD参考知识点:路由功能就是指选择一条从源网络到目的网络的路径,并进行数据包的转发。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
CCNA考试题库中英文翻译版及答案1[1]1. What are two reasons that a network administrator would use access lists? (Choose two.)1.出于哪两种理由,网络管理员会使用访问列表?A. to control vty access into a routerA.控制通过VTY访问路由器B. to control broadcast traffic through a routerB.控制广播流量穿越路由器2.一个默认的帧中继WAN被分类为哪种物理网络类型?A. point-to-pointA.点到点B. broadcast multi-accessB.广播多路访问C. nonbroadcast multi-accessC.非广播多路访问D. nonbroadcast multipointD.非广播多点E. broadcast point-to-multipointE.广播点到多点Answer: C3. A single 802.11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency. What are three likely causes of this problem? (Choose three.)3.一个802.11接入点被部署在一个方形办公室的中央,当大多数用户在大流量传输数一些无线用户发现无线网络变得缓慢和出现丢包A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF4. Refer to the exhibit. How many broadcast domains exist in the exhibited topology?根据下图,图中的拓扑中存在多少个广播域?A. one A.1B. two B.2C. three C.3D. four D.4E. five E.5F. six F.6Answer: C5. Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)5.根据下图,WLAN diagram决定了哪两个事实A. The area of overlap of the two cells represents a basic service set (BSS).A. 两个 cells的overlap的区域描述了一个basic service setB. The network diagram represents an extended service set (ESS).B. 网络描述了一个extended service setC. Access points in each cell must be configured to use channel 1.C. 再每个CELL中的AP必须被配置成使用channel 1D. The area of overlap must be less than 10% of the area to ensure connectivity.D. 为了确保连通性,重叠区域必须小于10%E. The two APs should be configured to operate on different channels.E. 两个访问点应该被配置成工作在不同的频道Answer: BE6. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router.Which of the following statements is true concerning this command?6.路由器上输入命令frame-relay map ip 10.121.16.8 102 broadcast,以下选项正确的是?A. This command should be executed from the global configuration mode.A.该命令应该在全局配置模式下被执行B. The IP address 10.121.16.8 is the local router port used to forward data.B.IP地址10.121.16.8是本地路由器用来转发数据的接口C. 102 is the remote DLCI that will receive the information.C.102是远端的DLCI它将接受信息。
D. This command is required for all Frame Relay configurations.D.这个命令要求被配置为所有的帧中继配置。
E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.E.这个广播选项允许数据包,例如rip更新信息,将会被转发通过PVC.Answer: E7. Which type of attack is characterized by a flood of packets that are requesting a TCP connectionto a server?7.哪种类型的攻击的特点是发大量的TCP请求连接数据包到服务器?A. denial of service A.拒绝服务B. brute force B.强制叠加C. reconnaissance C.监听D. Trojan horse D.木马Answer: A8. Which of the following are associated with the application layer of the OSI model? (Choosetwo.)8.以下两个选项是工作在OSI模型的应用层的?A. pingB. TelnetC. FTPD. TCPE. IPAnswer: BC9. Refer to the exhibit. The network administrator has created a new VLAN on Switch1 and addedhostC and host D. The administrator has properly configured switch interfaces FastEthernet0/13 through FastEthernet0/24 to be members of the new VLAN. However, after the network administrator completed the configuration, host A could communicate with host B, but host A could not communicate with host C or host D. Which commands are required to resolve this problem?9.网络管理员在交换机1上创建一个新VLAN并且将主机C和主机D加入到此VLAN中.管理员配置交换机接口FastEthernet0/13到FastEthernet0/24成为新VLAN成员.但是网络管理员完成配置以后,主机A可以和主机B通信,但是主机A不能和主机C或者主机D通信.哪个命令可以用来解决这个问题A. Router(config)# interface fastethernet 0/1.3Router(config-if)# encapsulation dot1q 3Router(config-if)# ip address 192.168.3.1 255.255.255.0B. Router(config)# router ripRouter(config-router)# network 192.168.1.0Router(config-router)# network 192.168.2.0Router(config-router)# network 192.168.3.0C. Switch1# vlan databaseSwitch1(vlan)# vtp v2-modeSwitch1(vlan)# vtp domain ciscoSwitch1(vlan)# vtp serverD. Switch1(config)# interface fastethernet 0/1Switch1(config-if)# switchport mode trunkSwitch1(config-if)# switchport trunk encapsulation islAnswer: A10. For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?10.出于安全考虑,网络管理员需要去防止外网主机PING内网,下面那个协议应该用access control lists 限制掉A. IPB. ICMPC. TCPD. UDPAnswer: B11. What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)11.哪两种方法被推荐用来保守网络设备的配置文件不受外网的威胁A. Allow unrestricted access to the console or VTY ports.A.允许unrestricted 访问到console或VTY口B. Use a firewall to restrict access from the outside to the network devices.B.用防火墙去限制外网的网络设备访问C. Always use Telnet to access the device command line because its data is automatically encrypted.C.因为数据被自动加密,所以总是允许使用TELNET命令访问网络设备的命令行,D. Use SSH or another encrypted and authenticated transport to access device configurations.D.使用SSH或其他加密、认证机制去访问设备的配置E. Prevent the loss of passwords by disabling password encryption.E.为了避免丢失密码,所以不对密码进行加密(明文)Answer: BD12. Refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two.)12.根据下图,该access list被配置在路由器RTB的S0/0接口上的OUT方向,哪两个数据包会被DENY,如果被路由到该接口上的话?access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnetaccess-list 101 permit ip any anyA. source ip address: 192.168.15.5; destination port: 21B. source ip address:, 192.168.15.37 destination port: 21C. source ip address:, 192.168.15.41 destination port: 21D. source ip address:, 192.168.15.36 destination port: 23E. source ip address: 192.168.15.46; destination port: 23F. source ip address:, 192.168.15.49 destination port: 23Answer: DE13. What are two security appliances that can be installed in a network? (Choose two.)13.以下哪两个安全工具能被安装在一个网络里A. ATMB. IDSC. IOSD. IOXE. IPSF. SDMAnswer: BE14. Refer to the exhibit. Switch1 has just been restarted and has passed the POST routine. HostA sends its initial frame to Host C. What is the first thing the switch will do as regards populating the switching table?14.根据下图, Switch1刚刚完成重启,并完成上电自检。