CCNA第三学期英文答案chapter3

合集下载

CCNA中英对照题库(0-10.pdf

CCNA中英对照题库(0-10.pdf

CCNA中英对照题库(0-10.pdfCCNA (200-120)题库中英对照整理于:2015 年 3 月 31 日版本:1.2 声明:本题库来源互联网(鸿鹄论坛)本题库为英文考试原版左右选择题中文考试为随机抽取英文题的中译版此题库非中文考试题库,而是英文题库手动翻译此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。

如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。

QUESTION 001 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做? A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. R1会剥离源MAC地址,以 0000:0C36.6965 代替。

B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源 IP 地址,1/ 10以 192.168.40.1 代替。

C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. R1会剥离源MAC地址,以 0000:0C36.6965 代替。

D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. R1会剥离目的 IP 地址,以 192.168.40.1 代替。

CCNA考试自测题第3卷及答案

CCNA考试自测题第3卷及答案

CCNA考试自测题第3卷及答案下面的问题将帮助你评价你在本章中学习到的内容。

仔细阅读所有的选项,因为正确答案可能多于1个。

选择每个问题中所有的正确答案。

1) The service provided by IPX is (IPX提供的服务是):A. Guaranteed deliveryB. DatagramC. Connection-orientedD. Sequenced2) The Transport Control field in the IPX header holds what information? (IPX报头中的传输控制字段保留何种信息)?A. The age of the packet.B. Protocol typeC. Router hop countD. Level of service required.3) What is the length of an IPX network number (IPX网络编号的长度是多少)?A. 16 bitsB. VariableC. 48 bitsD. 32 bits4) In the IPX address 0102.0000.8045.1700, what is the node address ( 在I P X地址0 1 0 2 . 0 0 0 . 8 0 4 5 . 1 7 0 0中,节点地址是多少)?A. 1700B. 0102.0000.8045C. 0102.0000D. 0000.8045.1700A. It is the address of a NetWare print serverB. It is an internal network addressC. The included socket number is 0001D. Nothing6) The Checksum field in the IPX header is normally set to (IPX报头中的校验和字段通常设置为):A. A checksum of the entire IPX packetB. A checksum of the IPX header fields onlyC. 0xFFFFD. 07) If an IPX node is configured to use the Ethernet_802.2 encapsulation, which other machines can it communicate with directly (without going through a router) on the same network (如果一个I P X节点配置为使用E t h e r n e t _ 8 0 2 . 3封装,它可以和相同网络上其他哪一个设备直接通信(不经过路由器) )?A. Machines running any encapsulationB. Machines running either Ethernet_802.2 or Ethernet_802.3C. Machines running Ethernet_IID. Machines running Ethernet_802.28) To run multiple encapsulations on a single physical interface, a router has to (为在一个物理接口上运行多个封装,路由器必须):A. Use a different network number for each encapsulationB. Use subinterfaces, not secondary networksC. Enable NLSP routingD. Use an access list9) Which protocol does a workstation use to locate a server providing a particular type of service (工作站使用哪一个协议来找到提供特定类型服务的服务器)?B. NCPC. SAPD. EIGRP10) Periodic SAP updates are sent by (定期S A P更新由谁发出):A. Routers and serversB. NetWare servers onlyC. Workstations and routersD. Workstations only11) The RIP protocol is used by (RIP协议由谁使用)?A. Routers onlyB. Servers onlyC. Workstations, servers, and routersD. Print servers12) Which command which must be given first to enable IPX (在启用I P X时,必须首先给出哪一个命令)?A. CISCO(CONFIG)#ENABLE IPX ROUTINGB. cisco>ipx routingC. cisco(config-if)#ipx routing onD. cisco(config)#ipx routing13) Which of the following allow you to use multiple IPX networks on a single physical interface (下面哪一个允许你在单个物理接口上使用多个I P X网络)?A. Secondary networksB. Dynamic frame typesC. Subinterfaces14) Which IOS command allows you to view the router’s internal SAP database (哪一个I O S 命令允许你查看路由器的内部S A P数据库)?A. SHOW SERV E R SB. show ipx serversC. serversD. ipx servers15) Which of the following kinds of information do you need to collect before you can configure IPX using IOS (你需要在用I O S配置I P X之前搜集下面各种信息中的哪一个)?A. The number of NetWare servers on the networkB. The encapsulations in useC. IPX network numbersD. The IPX address of another router16) What does this command do:CISCO(CONFIG-IF)#IPX NETWORK 3 (这个命令的作用是什么:C I S C O ( C O N F I G -IF)#IPX NETWORK3):A. Nothing. It is incomplete.B. Sets up a static route to Network 3C. Configures IPX Network 3 on this interface with the default frame typeD. Nothing. The router is in the wrong configuration mode.17) What does this IOS command do?IPX ROUTE 4 5.0000.8004.4563 FLOAT I N G - S TATIC (这个I O S命令的作用是什么I P X ROUTE 45.0000.8004.4563 FLOAT I N G - S TAT I C )?A. Configures 4 static routesB. Configures static SAP entries for servers of type 4D. Says that to get to network 5, you must go via network 418) In the command IPX ROUTE 4 5.0000.8004.4563 FLOAT I N G - S TATIC, what does the F L O AT I N G - S TATIC keyword on the end mean? ( 在命令IPX ROUTE 45.0000.8004.4563F L O AT I N G.S TAT I C中,最后的F L O AT I N G.S TA T I C意味着什么)?A. Set all static routes to floatingB. Allow this route to be overridden by a route received dynamicallyC. Apply this route to all network numbers from 1 to 4D. Lock this route so that it cannot be changed19) The IPX MAXIMUM-PATHS command does what (IPX MAXIMUM.PAT H S命令的作用是什么)?A. Allows IOS to share traffic to a given network over multiple pathsB. Allows a slow link to be used as a backup for a faster oneC. Sets the maximum number of router hops a packet can travelD. Sets the maximum number of interfaces IPX can be configured on20) Which command is used to show a concise list of the configured IPX interfaces (哪一个命令用于显示配置的I P X接口上的简明列表)?A. SHOW CONFIGB. show ipx interfaceC. show ipx interface briefD. show interface21) If two devices are plugged into the same physical network, but are using diff e r e n t encapsulations, what it required before they can communicate (如果在相同的物理网络中加入了两个设备,但是使用不同的封装,在它们通信之前需要完成什么)?A. A cross-over cableB. A repeaterC. A router configured for the appropriate encapsulations22) When does a workstation normally send a GNS request (工作站一般在什么时候发出G N S请求)?A. When trying to communicate with another workstationB. When trying to locate the nearest routerC. When it needs to send a SAP updateD. When trying to locate a server at initialization23) How many router hops does a GNS request travel (一个G N S请求经过多少个路由器跳)?A. 16B. NoneC. 4D. Unlimited24) In a SAP update packet, what does the Server Address field contain (在S A P更新数据包中,服务器地址字段中包含什么)?A. The network the server is onB. The server’s node numberC. The socket number the server is listening onD. All of the above.25) Which of the following protocols is used by servers to advertise their services to the clients (下面协议中的哪一个由服务器使用,以向客户通告它们的服务)?A. Routing Information protocol (RIP)B. Sequenced Packet Exchange (SPX)C. Network Core Protocol (NCP)D. Service Advertising Protocol (SAP)26) On an Ethernet LAN how many IPX encapsulation types are supported (在一个E t h e r n e t局域网上,可以支持多少个I P X封装)?B. 3C. 2D. 127) The frame check sequence checks with which fields in an Ethernet_802.3 frame (帧校验序列校验E t h e r n e t - 8 0 2 . 3帧中的哪一个字段)?A. The Source Address and Destination AddresB. The packet dataC. Everything from the Destination Address onD. Source Service Access Point (SSAP)28) Which of the following fields is not common to both Ethernet_802.3 and Ethernet_802.2 frames (下面字段中的哪一个不是E t h e r e n e t 8 0 2 . 3和E t h e r n e t 8 0 2 . 3帧所共有的)?A. Source AddressB. LengthC. DSAPD. Data29) In SAP packets, the numbers in the Service Type field are assigned by (在一个S A P数据包中,服务类型字段中的数字由谁给定)?A. The system administratorB. The end userC. NovellD. Server30) SAP requests, responses, or broadcasts can be recognized by which value of source or destination socket number (SAP 请求,响应或广播可以通过源或目的套接字数字中的哪一个值来识别)?A. 0x0452C. 0x03D. 0x045331) In RIP Packets, the Hops Away and Time Ticks fields are valid both for request and response packets (在R I P数据包中,“跳距离”和“时间嘀嗒数”字段对于请求和响应数据包都是合法的)。

CCNA Exploration 3 LAN Switching and Wireless Final Exam

CCNA Exploration 3 LAN Switching and Wireless Final Exam

Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)23A new VLAN can be added to Switch1 and that information will be added only to Switch2.A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.2Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?3Disable VTP pruning on SW2.Configure SW2 in VTP transparent mode.Configure SW2 with the VTP domain password.Configure SW2 as a VTP server with a higher revision number.3Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?3QoSroutingtrunkingVPN4Which parameter is used to uniquely identify one wireless network from another?1SSIDOFDMWEPDSSS5Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)134The switch ports are on different VLANs.The switch IP address is on the wrong subnet.The hosts are configured on different logical networks.A router is required to forward traffic between Host1 and Host2.The VLAN port assignments must be contiguous for each VLAN.The host default gateway addresses must be on the same logical network.6Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?3The SSH version number is wrong.SSH has been configured on the wrong line.Telnet and SSH cannot be configured simultaneously.The transport input command is configured incorrectly.7Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied to the switch?4Switch(config)# interface vlan 1Switch(config-if)# ip address 10.1.1.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 1Switch(config-if)# ip address 10.1.50.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.50.254Switch(config)# interface vlan 5Switch(config-if)# ip address 10.1.5.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.5.254Switch(config)# interface vlan 10Switch(config-if)# ip address 10.1.10.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 10Switch(config-if)# ip address 10.1.1.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 50Switch(config-if)# ip address 10.1.10.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.2548What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)126Select the correct VTP mode and version.Configure the switch with the name of the new management domain.Download the VTP database from the VTP server in the new domain.Configure the VTP server in the new domain to recognize the BID of the switch.Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.Verify that the switch has a lower configuration revision number than the other switches in the new domain.9Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?3computer Bcomputer B and Router1computer C and Router1computer B, computer D, computer E and Router1computer B, computer C, computer D, computer E and Router1computer A, computer B, computer C, computer D, computer E and Router110Which three statements are correct concerning the default configuration of a new switch? (Choose three.)346Spanning Tree Protocol is disabled.Enable password is configured as cisco.All switch ports are assigned to VLAN1.The flash directory contains the IOS image.VLAN1 is configured with a management IP address.All interfaces are set to auto-negotiation of speed and duplex.11Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?3All the VLANs were pruned from the trunk port between SW1 and SW2. SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.12In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?4clientrootservertransparent13Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?2Configure VLANs with different VLAN IDs on switch SW2.Reconfigure the trunk port on switch SW2 with static trunk configuration.Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.14Refer to the exhibit. What does STATIC indicate in the output that is shown?2The switch will not allow any other device to connect to port Fa0/15.Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.This entry will be removed and refreshed every 300 seconds to keep it in the table.The switch learned this MAC address from the source address in a frame received on Fa0/15.When processing a frame, the switch does not have to perform a lookup to determine the final destination port.15Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?4Allow all VLANs on the trunk link.Remove the native VLAN from the trunk.Include a router or switch with Layer 3 capabilities.Configure the same native VLAN on both ends of the trunk.16What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)35requires less equipmentprovides improved rangepermits increased data rateshas a single-input and a single-outputneeds no hardware upgrade for compatibility17Refer to the exhibit. How does SW1 manage traffic coming from Host A?4SW1 drops the traffic because it is untagged.SW1 leaves the traffic untagged and forwards it over the trunk.SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.18Refer to the exhibit. Which two statements are true regarding what the cost value of 23 represents for Switch4? (Choose two.)13This cost represents the lowest cost path for Switch4 to the root switch.A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.19Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?2The network diameter limitation is 9.BPDUs may be discarded because of expiring timers.The cabling distance between the switches is 100 meters.The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.20Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?2The trunk is established, but no VLANs have been configured to use it.The trunk has not been established because the router does not support dynamic trunking protocol.The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.The router is missing the dynamic trunking protocol statements necessary to form a trunk.21Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?2192.168.1.11 /28192.168.1.22 /28192.168.1.33 /28192.168.1.44 /28192.168.1.55 /2822Which statement regarding the service password-encryption command is true?3The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.23What is the purpose of issuing the command switchport mode access on a switch interface?4disable port securitymake the port operationaloverride the default port behaviorforce the port to be a part of a single vlan24Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)25S1 Gi0/1 becomes a root port.S2 Gi0/2 becomes a non-designated port.S3 Gi0/1 becomes a non-designated port.S4 Gi0/1 becomes a root port.S4 Gi0/2 becomes a designated port.25What two radio frequency bands are designated by the ITU-R as unlicensed for industrial, scientific, and medical (ISM) communities and are therefore supported by IEEE 802.11? (Choose two.)359 MHz750 MHz2.4 GHz7.7 GHz5 GHz900 GHz26Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?1forward the frame out all interfaces except Interface3add station 00-00-3D-1F-11-05 to Interface2 in the forwarding tableforward the frame out Interface3discard the frameforward the frame out all interfacesforward the frame out Interface227Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?1Switch port Fa0/1 is not trunking.Router interface Fa0/0 is possibly down.No routing protocol is configured on Router1.One of the router subinterfaces is possibly down.28Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. What two commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)35S1-Central# reloadS1-Central# erase flash:S1-Central(config)# no vlan 2S1-Central# delete flash:vlan.datS1-Central(config-if)# switchport access vlan 329Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)136requires the use of subinterfaces on the routerrequires an access link between the router and Layer 2 switchmore cost-efficient and scalable than using multiple physical interfacesrequires each subinterface to be configured with the no shutdown commandcan impact performance if many VLANs compete for bandwidth on a single router interfacemakes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces30Refer to the exhibit. Which statement is true regarding the information shown?1Only one VLAN is currently configured to use the trunk links.The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1. Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.31Refer to the exhibit. What does "FORWARDING" mean in the command output shown?1The switch is sending and receiving data frames.The switch is receiving BPDUs, but not sending data frames.The switch is participating in an election process by forwarding the BPDUs it receives.The switch is receiving BPDUs and populating the MAC address table, but not sending data.32Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?6switch Aswitch Bswitch Cswitch Dswitch Eswitch F33Which two statements describe Spanning Tree Protocol? (Choose two.)13 It eliminates Layer 2 loops in network topologies.It eliminates the need for redundant physical paths in network topologies. It can only be used in networks in which Layer 2 switching is in use.It can only be used in networks where both routers and switches are used together.It can only be used in networks where routers are installed.34Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?2SW1 port F0/1 transitions to the learning state.SW1 port F0/1 can generate a temporary loop.SW1 port F0/1 becomes a non-designated port.SW1 port F0/2 no longer passes BPDUs to SW4.35Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)123Interface FastEthernet3/0/0 is subinterfaced.A non-proprietary trunking protocol is in use.The configuration is appropriate for a router-on-a-stick network design.A shutdown command has been applied to interface FastEthernet3/0/0.Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.An IP address should be applied to FastEthernet3/0/0 for correct data routing.36Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?1S1 port Fa0/11 is in the wrong VLAN.R1 does not have an active routing protocol.The IP address of computer 1 is in the wrong logical network.Router interface Fa0/0 has the wrong trunk encapsulation type configured.37Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3?1VLAN 10 and VLAN 20VLAN 1, VLAN 10, and VLAN 20VLAN 1, VLAN 1002 through 1005VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 100538Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)45This switch shows no configuration revision errors.This switch has established two-way communication with the neighboring devices.This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.This switch will cause no disruption in the VTP domain operations if therest of the switches in the same VTP domain have a higher configuration revision number.39Refer to the exhibit. A network administrator needs to implementinter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?2AS1 and AS2DS1 and DS2Gateway and CS1Gateway, CS1, DS1, and DS240Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?3Associate with the access point and then open a HyperTerminal session with the access point.Physically connect to the access point and then reboot the computer to launch the configuration software.From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.41What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?1All VLANs will be allowed across the trunk.Only VLAN 1 will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk.42Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?2A syslog message will be logged.Fa0/24 will become error-disabled.The incoming frames will be dropped.The security violation count will be incremented.43Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?3Cat-ACat-BCat-CCat-D44What are three benefits of a hierarchical network model? (Choose three.)136reduced contention for bandwidthreduced size of the physical layoutincreased fault tolerance of the networkelimination of the need for wiring closetselimination of the need for layer three functionalitysimplification of management and troubleshooting45Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.85. What will the router do with this packet?5The router will forward the packet out interface FastEthernet 0/1.1.The router will forward the packet out interface FastEthernet 0/1.2.The router will forward the packet out interface FastEthernet 0/1.3.The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.The router will ignore the packet because the source and destination are on the same broadcast domain.The router will drop the packet since no network that includes the source address is attached to the router.46Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)15After the end of the jam signal, a backoff algorithm is invoked.Hosts 1 and 4 are operating full duplex so no collision will exist. The hub will block the port connected to Host 4 to prevent a collision.Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.47Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?2only hosts A and Bonly hosts A, B, and Conly hosts A, B, C, and Donly hosts A, B, C, and E48Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?3hub HB1switch SW1router R1switch SW2router R2switch SW449Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)25Incoming traffic with VLAN ID 0 is processed by interface fa0/0.Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.50Which identifier is used to keep track of frames that are destined for a particular wireless client?2AIDSSIDBSSIDESSID51Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?3802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.52What two methods can be used to remove MAC address table entries from a switch? (Choose two.)13Power cycle the switch to clear all dynamically learned addresses.The clear switching-tables command will remove statically configured entries.The clear mac-address-table command will remove statically and dynamically configured table entries.The erase flash command will clear all statically configured table entries.Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.53What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?4A new RSA key pair is created.The switch defaults to allowing Telnet connections only.The switch is no longer able to make SSH connections as an SSH client.The switch allows remote connections only after a new RSA key pair is generated.Date Exam was Taken: 05/17/2008。

CCNA 3 Final Exam

CCNA 3 Final Exam

1. Which address is used by an IPv6 EIGRP router as thesource for hello messages?o the 32-bit router IDo the IPv6 global unicast address that is configured on the interfaceo the all-EIGRP-routers multicast addresso the interface IPv6 link-local address2. Which two statements are correct about EIGRPacknowledgment packets? (Choose two.)o The packets are sent in response to hello packets.o The packets are used to discover neighbors that are connected on an interface.o The packets are sent as unicast.o The packets require confirmation.o The packets are unreliable.3. When are EIGRP update packets sent?o only when necessaryo when learned routes age outo every 5 seconds via multicasto every 30 seconds via broadcast4. Refer to the exhibit. Which two conclusions can be derivedfrom the output? (Choose two.)o There is one feasible successor to network 192.168.1.8/30.o The network 192.168.10.8/30 can be reached through 192.168.11.1.o The reported distance to network 192.168.1.0/24 is 41024256.o The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.o Router R1 has two successors to the 172.16.3.0/24 network.5. Refer to the exhibit. Which route or routes will beadvertised to the router ISP if autosummarization isenabled?o10.0.0.0/8o10.1.0.0/16o10.1.0.0/28o10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 10.1.4.0/286. Refer to the exhibit. What can be concluded about network192.168.1.0 in the R2 routing table?o This network has been learned from an internal router within the same area.o This network was learned through summary LSAs from an ABR.o This network is directly connected to the interface GigabitEthernet0/0.o This network should be used to forward traffic toward external networks.7. Refer to the exhibit. A company has migrated from singlearea OSPF to multiarea. However, none of the users fromnetwork 192.168.1.0/24 in the new area can be reached by anyone in the Branch1 office. From the output in theexhibit, what is the problem?o There are no interarea routes in the routing table for network 192.168.1.0.o The OSPF routing process is inactive.o The link to the new area is down.o The router has not established any adjacencies with other OSPF routers.8. When does an OSPF router become an ABR?o when the router has interfaces in different areaso when the router is configured as an ABR by the network administratoro when the router has the highest router IDo when the router has an OSPF priority of 09. What is a difference between the Cisco IOS 12 and IOS 15versions?o The IOS 12 version has commands that are not available in the 15 version.o The IOS version 15 license key is unique to each device, whereas the IOS version 12 license key is not device specific.o Every Cisco ISR G2 platform router includes a universal image in the IOS12 versions, but not the IOS 15 versions.o IOS version 12.4(20)T1 is a mainline release, whereas IOS version15.1(1)T1 is a new feature release.10. A network administrator issues the command R1(config)#license boot module c1900 technology-package securityk9 on a router. What is the effect of this command?o The IOS will prompt the user to reboot the router.o The features in the Security package are available immediately.o The IOS will prompt the user to provide a UDI in order to activate the license.o The Evaluation Right-To-Use license for the Security technology package is activated.11. A network administrator is troubleshooting slowperformance in a Layer 2 switched network. Uponexamining the IP header, the administrator notices that the TTL value is not decreasing. Why is the TTL value notdecreasing?o This is the normal behavior for a Layer 2 network.o The MAC address table is full.o The VLAN database is corrupt.o The inbound interface is set for half duplex.12. A network administrator enters the spanning-tree portfastbpduguard default command. What is the result of thiscommand being issued on a Cisco switch?o Any switch port will be error-disabled if it receives a BPDU.o Any trunk ports will be allowed to connect to the network immediately, rather than waiting to converge.o Any switch port that has been configured with PortFast will be error-disabled if it receives a BPDU.o Any switch port that receives a BPDU will ignore the BPDU message.13. An STP instance has failed and frames are flooding thenetwork. What action should be taken by the networkadministrator?o A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network.o Spanning tree should be disabled for that STP instance until the problem is located.o Broadcast traffic should be investigated and eliminated from the network.o Redundant links should be physically removed until the STP instance is repaired.14. A network engineer is configuring a LAN with a redundantfirst hop to make better use of the available networkresources. Which protocol should the engineerimplement?o FHRPo GLBPo HSRPo VRRP15. Which mode configuration setting would allow formationof an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?o SW1: on SW2: ono SW1: desirable SW2: desirableo SW1: auto SW2: auto trunking enabled on both switcheso SW1: auto SW2: auto PortFast enabled on both switcheso SW1: passive SW2: active16. What are two requirements to be able to configure anEtherChannel between two switches? (Choose two.)o The interfaces that are involved need to be contiguous on the switch.o All the interfaces need to work at the same speed.o All the interfaces need to be working in the same duplex mode.o All interfaces need to be assigned to different VLANs.o Different allowed ranges of VLANs must exist on each end.17. When should EIGRP automatic summarization be turnedoff?o when a router has not discovered a neighbor within three minuteso when a router has more than three active interfaceso when a network contains discontiguous network addresseso when a router has less than five active interfaceso when a network addressing scheme uses VLSM18. What two conditions have to be met in order to form acluster that includes 5 access points? (Choose two.)o Clustering mode must be enabled on the APs.o At least two controllers are needed to form the cluster.o The APs have to be connected on the same network segment.o The APs must all be configured to use different radio modes.o The APs must use different cluster names.19. A network engineer is troubleshooting a newly deployedwireless network that is using the latest 802.11 standards.When users access high bandwidth services such asstreaming video, the wireless network performance ispoor. To improve performance the network engineerdecides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services.Why might this solution improve the wireless networkperformance for that type of service?o The 5 GHz band has a greater range and is therefore likely to be interference-free.o Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.o The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.o The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.20. What method of wireless authentication is dependent ona RADIUS authentication server?o WEPo WPA Personalo WPA2 Personalo WPA2 Enterprise21. Refer to the exhibit. What two pieces of information couldbe determined by a network administrator from thisoutput? (Choose two.)o R1 is participating in multiarea OSPF.o The OSPF process number that is being used is 0.o Interface Fa0/1 is not participating in the OSPF process.o R1 is the distribution point for the routers that are attached to the 10.0.0.4 network.o The metric that will be installed in the routing table for the 10.0.0.0 route will be 65 (64+1).22. A remote classroom can successfully access video-intensive streaming lectures via wired computers.However, when an 802.11n wireless access point isinstalled and used with 25 wireless laptops to access the same lectures, poor audio and video quality isexperienced. Which wireless solution would improve the performance for the laptops?o Decrease the power of the wireless transmitter.o Add another access point.o Upgrade the access point to one that can route.o Adjust the wireless NICs in the laptops to operate at 10GHz to be compatible with 802.11n.23. What are the two methods that are used by a wireless NICto discover an AP? (Choose two.)o sending an ARP requesto delivering a broadcast frameo transmitting a probe requesto initiating a three-way handshakeo receiving a broadcast beacon frame24. When will a router that is running EIGRP put a destinationnetwork in the active state?o when the EIGRP domain is convergedo when there is outgoing traffic toward the destination networko when there is an EIGRP message from the successor of the destination networko when the connection to the successor of the destination network fails and there is no feasible successor available25. Which wireless network topology is being configured by atechnician who is installing a keyboard, a mouse, andheadphones, each of which uses Bluetooth?o ad hoc modeo hotspoto infrastructure modeo mixed mode26. What is a wireless modulation technique used by 802.11WLAN standards that can implement MIMO?o BSSo DSSSo FHSSo OFDM27. Refer to the exhibit. A network administrator issues theshow ipv6 eigrp neighbors command. Which conclusion can be drawn based on the output?o The link-local addresses of neighbor routers interfaces are configured manually.o R1 has two neighbors. They connect to R1 through their S0/0/0 and S0/0/1 interfaces.o The neighbor with the link-local address FE80::5 is the first EIGRP neighbor that is learned by R1.o If R1 does not receive a hello packet from the neighbor with the link-local address FE80::5 in 2 seconds, it will declare the neighbor router is down.28. A network engineer is troubleshooting a single-areaOSPFv3 implementation across routers R1, R2, and R3.During the verification of the implementation, it is noted that the routing tables on R1 and R2 do not include theentry for a remote LAN on R3. Examination of R3 shows the following:1.that all interfaces have correct addressing2.that the routing process has been globally configured3.that correct router adjacencies have formedWhat additional action taken on R3 could solve the problem?o Enable the OSPFv3 routing process on the interface connected to the remote LAN.o Use the network command to configure the LAN network under the global routing process.o Force DR/BDR elections to occur where required.o Restart the OPSFv3 routing process.29. A network administrator in a branch office is configuringEIGRP authentication between the branch office router and the headquarters office router. Which security credential is needed for the authentication process?o a randomly generated key with the crypto key generate rsa commando the username and password configured on the headquarters office router o the hostname of the headquarters office router and a common passwordo a common key configured with the key-string command inside a key chain30. For troubleshooting missing EIGRP routes on a router,what three types of information can be collected using the show ip protocols command? (Choose three.)o any interfaces that are enabled for EIGRP authenticationo any interfaces on the router that are configured as passiveo the IP addresses that are configured on adjacent routerso any ACLs that are affecting the EIGRP routing processo networks that are unadvertised by the EIGRP routing protocolo the local interface that is used to establish an adjacency with EIGRP neighbors31. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commando There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.32. A network engineer is implementing security on allcompany routers. Which two commands must be issued to force authentication via the password 1C34dE for allOSPF-enabled interfaces in the backbone area of thecompany network? (Choose two.)o ip ospf message-digest-key 1 md5 1C34dEo area 1 authentication message-digesto username OSPF password 1C34dEo enable password 1C34dEo area 0 authentication message-digest33. Which port role is assigned to the switch port that has thelowest cost to reach the root bridge?o root porto non-designated porto designated porto disabled port34. Refer to the exhibit. A network administrator is attemptingto upgrade the IOS system image on a Cisco 2901 router.After the new image has been downloaded and copied to the TFTP server, what command should be issued on the router before the IOS system image is upgraded on theo dir flash:o ping 10.10.10.1o copy tftp: flash0:o ping 10.10.10.235. A set of switches is being connected in a LAN topology.Which STP bridge priority value will make it least likely for the switch to be selected as the root?o4096o32768o61440o6553536. What are two features of OSPF interarea routesummarization? (Choose two.)o ASBRs perform all OSPF summarization.o Routes within an area are summarized by the ABR.o ABRs advertise the summarized routes into the backbone.o Type 3 and type 5 LSAs are used to propagate summarized routes by default.o Route summarization results in high network traffic and router overhead.37. Refer to the exhibit. What are two results of issuing thedisplayed commands on S1, S2, and S3? (Choose two.)o S1 will automatically adjust the priority to be the lowest.o S1 will automatically adjust the priority to be the highest.o S3 can be elected as a secondary bridge.o S2 can become root bridge if S3 fails.o S2 can become root bridge if S1 fails.38. Refer to the exhibit. Which two conclusions can be drawnfrom the output? (Choose two.)o The EtherChannel is down.o The port channel ID is 2.o The port channel is a Layer 3 channel.o The bundle is fully operational.o The load-balancing method used is source port to destination port. 39. Refer to the exhibit. Interface FastEthernet 0/1 on S1 isconnected to Interface FastEthernet 0/1 on S2, andInterface FastEthernet 0/2 on S1 is connected to Interface FastEthernet 0/2 on S2. What are two errors in the presentEtherChannel configurations? (Choose two.)o The trunk mode is not allowed for EtherChannel bundles.o Two auto modes cannot form a bundle.o Desirable mode is not compatible with on mode.o The channel group is inconsistent.o The interface port channel ID should be different in both switches. 40. Which technology is an open protocol standard thatallows switches to automatically bundle physical ports into a single logical link?o Multilink PPPo DTPo LACPo PAgP41. A network administrator has configured an EtherChannelbetween two switches that are connected via four trunk links. If the physical interface for one of the trunk linkschanges to a down state, what happens to theEtherChannel?o The EtherChannel will transition to a down state.o Spanning Tree Protocol will recalculate the remaining trunk links.o The EtherChannel will remain functional.o Spanning Tree Protocol will transition the failed physical interface into forwarding mode.42. Refer to the exhibit. Based on the command outputshown, what is the status of the EtherChannel?o The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports.o The EtherChannel is down as evidenced by the protocol field being empty.o The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports.o The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.43. Refer to the exhibit. If router B is to be configured forEIGRP AS 100, which configuration must be entered?o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)#network 192.168.10.1280.0.0.63o B(config-router)# network 192.168.10.4 255.255.255.248 B(config-router)# network 192.168.10.8 255.255.255.248 B(config-router)#network192.168.10.128 255.255.255.192o B(config-router)# network 192.168.10.0 255.255.255.0o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)# network 192.168.10.640.0.0.63 B(config-router)# network 192.168.10.128 0.0.0.63 B(config-router)# network 192.168.10.192 0.0.0.63o B(config-router)# network 192.168.10.0 0.0.0.25544. Refer to the exhibit. When the show ip ospf neighborcommand is given from the R1# prompt, no output isshown. However, when the show ip interface briefcommand is given, all interfaces are showing up and up.What is the most likely problem?o R2 has not brought the S0/0/1 interface up yet.o R1 or R2 does not have a loopback interface that is configured yet.o The ISP has not configured a static route for the ABC Company yet.o R1 or R2 does not have a network statement for the 172.16.100.0 network.o R1 has not sent a default route down to R2 by using the default-information originate command.45. Refer to the exhibit. Which destination MAC address isused when frames are sent from the workstation to thedefault gateway?o MAC address of the forwarding routero MAC addresses of both the forwarding and standby routerso MAC address of the standby routero MAC address of the virtual router46. If a company wants to upgrade a Cisco 2800 router fromIOS 12.4T, what IOS should be recommended for a stable router platform?o12.5To13.1To14.0o15.1M47. What is the purpose of the Cisco PAK?o It is a key for enabling an IOS feature set.o It is a proprietary encryption algorithm.o It is a compression file type used when installing IOS 15 or an IOS upgrade.o It is a way to compress an existing IOS so that a newer IOS version can be co-installed on a router.48. What are two reasons to implement passive interfaces inthe EIGRP configuration of a Cisco router? (Choose two.)o to provide increased network securityo to shut down unused interfaceso to avoid unnecessary update traffico to mitigate attacks coming from the interfaceso to exclude interfaces from load balancing49. Fill in the blank.EIGRP keeps feasible successor routes inthe topology table.50. Fill in the blank.The backbone area interconnects with all other OSPF area types.51. Fill in the blank. Use the acronym.Which encryptionprotocol is used by the WPA2 shared key authentication technique? AES52. Match each OSPF LSA description with its type. (Not alloptions are used.)53. Match the CLI command prompt with the command orresponse entered when backing up Release 15 IOS imageto an IPv6 TFTP server. (Not all options are used.)54. Which characteristic would most influence a networkdesign engineer to select a multilayer switch over a Layer2 switch?o ability to build a routing tableo ability to aggregate multiple ports for maximum data throughputo ability to provide power to directly-attached devices and the switch itself o ability to have multiple forwarding paths through the switched network based on VLAN number(s)55. A network designer is considering whether to implementa switch block on the company network. What is theprimary advantage of deploying a switch block?o A single core router provides all the routing between VLANs.o The failure of a switch block will not impact all end users.o This is a security feature that is available on all new Catalyst switches.o This is network application software that prevents the failure of a singleo network device.56. Which action should be taken when planning forredundancy on a hierarchical network design?o immediately replace a non-functioning module, service or device on a networko continually purchase backup equipment for the networko implement STP portfast between the switches on the networko add alternate physical paths for data to traverse the network57. Which technological factor determines the impact of afailure domain?o the number of layers of the hierarchical networko the number of users on the access layero the role of the malfunctioning deviceo the forwarding rate of the switches used on the access layer58. What are three access layer switch features that areconsidered when designing a network? (Choose three.)o broadcast traffic containmento failover capabilityo forwarding rateo port densityo Power over Etherneto speed of convergence59. What are two requirements when using out-of-bandconfiguration of a Cisco IOS network device? (Choosetwo.)o HTTP access to the deviceo a terminal emulation cliento Telnet or SSH access to the deviceo a direct connection to the console or AUX porto a connection to an operational network interface on the device60. In a large enterprise network, which two functions areperformed by routers at the distribution layer? (Choosetwo.)o connect remote networkso provide Power over Ethernet to deviceso connect users to the networko provide data traffic securityo provide a high-speed network backboneUpdated 05 April 20151. Refer to the exhibit. Which switch will be the root bridgeafter the election process is complete?CCNA3 Final Exam updated 001o S1o S2o S3o S42. Refer to the exhibit. What are the possible port roles forports A, B, C, and D in this RSTP-enabled network?CCNA3 Final Exam updated 002o alternate, root, designated, rooto designated, root, alternate, rooto alternate, designated, root, rooto designated, alternate, root, root3. Refer to the exhibit. A network administrator is configuringPVST+ for the three switches. What will be a result ofentering these commands?CCNA3 Final Exam updated 003o S1 will set the priority value for VLAN 10 to 0.o S2 will set the priority value for VLAN 10 to 24576.o S3 will set the priority value for VLAN 30 to 8192.o S1 will set the priority value for VLAN 20 to 24596.4. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement is a feature that is associated with GLBP?o GLBP allows load balancing between routers.o It is nonproprietary.o It uses a virtual router master.o It works together with VRRP.5. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement describes a feature that isassociated with HSRP?o HSRP uses active and standby routers.o It uses ICMP messages in order to assign the default gateway to hosts.o It allows load balancing between a group of redundant routers.o HSRP is nonproprietary.6. Which function is provided by EtherChannel?o spreading traffic across multiple physical WAN linkso dividing the bandwidth of a single link into separate time slotso enabling traffic from multiple VLANs to travel over a single Layer 2 linko creating one logical link by using multiple physical links between two LAN switches7. Which two channel group modes would place an interfacein a negotiating state using PAgP? (Choose two.)o ono desirableo activeo autoo passive8. At a local college, students are allowed to connect to thewireless network without using a password. Which mode is the access point using?o networko openo passiveo shared-key9. Which wireless encryption method is the most secure?o WPAo WEPo WPA2 with TKIPo WPA2 with AES10. Users on an IEEE 801.11n network are complaining ofslow speeds. The network administrator checks the APand verifies it is operating properly. What can be done to improve the wireless performance in the network?o Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.o Change the authentication method on the AP.o Switch to an 802.11g AP.o Set the AP to mixed mode.11. What are two methods to make the OSPF routing protocolmore secure? (Choose two.)o Use only OSPFv3.o Use MD5 authentication.o Use the enable secret command.o When feasible, create a VPN tunnel between each OSPF neighbor adjacency.o Use the passive-interface command on LAN interfaces that areconnected only to end-user devices.12. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commandoutput?CCNA3 Final Exam updated 004o There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.13. Which type of OSPF LSA represents an external route andis propagated across the entire OSPF domain?o type 1o type 2o type 3o type 4o type 514. An administrator issues the router eigrp 100 command ona router. What is the number 100 used for?o as the autonomous system numbero as the number of neighbors supported by this routero as the length of time this router will wait to hear hello packets from a neighboro as the maximum bandwidth of the fastest interface on the router15. A network administrator wants to verify the default delayvalues for the interfaces on an EIGRP-enabled router.Which command will display these values?o show ip protocolso show running-configo show interfaceso show ip route16. Which two parameters does EIGRP use by default tocalculate the best path? (Choose two.)o delayo MTUo reliabilityo transmit and receive loado bandwidth17. By default, how many equal cost routes to the samedestination can be installed in the routing table of a Cisco router?o 2o4o16o3218. When a Cisco router is configured with fast-switching,how are packets distributed over equal-cost paths?o on a per-packet basiso on a per-interface basiso on a per-path-load basiso on a per-destination basis19. Refer to the exhibit. Router CiscoVille has been partiallyconfigured for EIGRP authentication. What is missing that would allow successful authentication between EIGRPneighbors?。

CCNA_ERouting_Chapter_3

CCNA_ERouting_Chapter_3

1When multiple routing protocols have a route to the same destination network, what determines route is installed in the routing table?best metriclowest hop countgreatest available bandwidthlowest administrative distancelowest cost2A growing medium-sized manufacturing company recently began to have routing instability issue company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The netw administrator has decided to convert the network to dynamic routing. What characteristics of pro should be considered in this selection process?Distance vector routing protocols, such as RIP, converge more quickly than do link-state rou protocols.EIGRP can be used on all of the routers in the company.OSPF can be used between the routers.An exterior routing protocol, such as BGP, is recommended for growing companies.3An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.25 192.168.1.2 command. What can be concluded about this route?The administrative distance of this route is 1.192.168.1.2 is the address of an interface on this router.This route will display as a directly connected network in the routing table.Packets with a destination IP address of 192.168.1.2 will be forwarded to the 10.0.0.0/24 ne 4W hat is the purpose of a routing protocol?It is used to build and maintain ARP tables.It provides a method for segmenting and reassembling data packets.It allows an administrator to devise an addressing scheme for the network.It allows a router to share information about known networks with other routers.It provides a procedure for encoding and decoding data into bits for packet forwarding.5Which two conditions would create a setting where the use of a distance-vector routing protocol efficient? (Choose two.)the network requires a special hierarchical designfast convergence of the network is crucialthe network is using a hub and spoke topologythe network is using a flat designthere are more than 15 hops between the most distant routers6Which command would the network administrator issue to determine if load balancing is in effect on a router?show ip protocolsshow ip routeshow ip interface briefshow ip interface7W hich of the following best describes the operation of distance vector routing protocols?They use hop count as their only metric.They only send out updates when a new network is added.They send their routing tables to directly connected neighbors.They flood the entire network with routing updates.8Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)Administrative distance refers to the trustworthiness of a particular route.A router first installs routes with higher administrative distances.The value of the administrative distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.The metric is always determined based on hop count.The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.9T he following line of code is present in the routing table:O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1What does the number 129 indicate in this output?The cost for this link has a value of 129.The clock rate on this serial interface is set to 129,000.The next-hop router is 129 hops away from this router.This route has been updated 129 times in this routing table.10Which of the following conditions must be met in order for a network to have converged?The routers in the network are operating with dynamic routing protocols.The routers in the network are operating with compatible versions of IOS.The routers in the network are operating with the same routing tables.The routers in the network are operating with consistent routing knowledge.11Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarde networks. What information will be found in the routing table for Router1?Router1 will have 6 directly connected networks.The administrative distance of the route to network 172.16.0.0 will be 90.The metric for routes to 172.16.0.0 will be 1.The interface that is used to forward packets to 172.16.0.0 will always be the S0/1 interface.12W hich two statements are true regarding the advantages of the use of static routes? (Choose two).increased securityreduced effort in configuring routesthe administrator maintains control over routingeasier to implement in a growing networkreduces the chance of routing errorsincreased router resource usage13The following line of code is displayed in a routing table:R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0What can be concluded from this output?A packet destined for host 192.168.252.2 will be forwarded out the interface connected to network 209.165.201.0/24The value, 120, is used to determine the best path when a router has more than one routing protocol configured for t destination network.This route was manually configured using the ip route command.192.168.252.2 is an interface on the router that produced this output.14W hat will be the result of the following commands?ORL(config)# interface fastethernet 0/0ORL(config-if)# ip address 172.16.3.1 255.255.255.0ORL(config-if)# no shutdownThe 172.16.3.0 network will be routed by any dynamic routing protocol automatically.A routing table entry is made to the 172.16.3.0 network with a code of "C".A static route is required to route traffic to the 172.16.3.0 network.The commands will be saved to the startup-configuration automatically.15Which two statements are true regarding classless routing protocols? (Choose two.)sends subnet mask information in routing updatessends complete routing table update to all neighborsis supported by RIP version 1allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topologyreduces the amount of address space available in an organization16Which two statements are true regarding metrics? (Choose two.)RIP uses bandwidth as a metric.OSPF uses delay as a metric.EIGRP uses bandwidth as a metric.OSPF uses cost based on bandwidth as a metric.RIP uses delay as a metric.EIGRP uses hop count only as a metric.17W hy is fast convergence desirable in networks that use dynamic routing protocols?Routers will not allow packets to be forwarded until the network has converged.Hosts are unable to access their gateway until the network has converged.Routers may make incorrect forwarding decisions until the network has converged.Routers will not allow configuration changes to be made until the network has converged.18Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?R1 will install a RIP route using network A in its routing table because the administrative distance of RIP is higher thaR1 will install a RIP route using network A in its routing table because the path cost from RIP is lower than EIGRP.R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is loR1 will install an EIGRP route using network B in its routing table because the path cost from EIGRP is lower than RR1 will install an EIGRP route and a RIP route in its routing table and load balance between them.19Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?345662472420 A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handlthe destination network?The router will install the first route it learned into the routing table.The router will install both routes in the routing table and load balance between the two.The router will put the first route in the routing table, and denote the second route as a backup route.The router will pick the path with the higher bandwidth and will place it in the routing table.。

听力教程第三册标准答案UNIT3

听力教程第三册标准答案UNIT3

Unit 3Section One Tactics for listeningPart 1 Spot DictationWildlifeEvery ten minutes, one kind of animal, plant or insect (1) dies out for ever. If nothing is done about it, one million species that are alive today will have become (2) extinct twenty years from now.The seas are in danger. They are being filled with (3) poison: industrial and nuclear waste, chemical fertilizers and (4) pesticides, sewage. If nothing is done about it, one day soon nothing will be able to (5) live in the seas.The tropical rain (6) forests, which are the home of half the earth's living things are (7) being destroyed. If nothing is done about it, they will have (8) nearly disappeared in twenty years. The effect on the world's (9) climate - and on our agriculture and food (10) supplies - will be disastrous.(11) Fortunately, somebody is trying to do something about it. In 1961, the (12) World Wildlife Fund was founded - a small group of people who wanted to (13) raise money to save animals and plants (14) from extinction. Today, the World Wildlife Fund is a large (15) international organization. It has raised over (16) £35 million for (17) conservation projects, and has created or given support to the National Parks in (1 8) five continents. It has helped 30 (19) mammals and birds - including the tiger - to (20) survive.Part 2 Listening for GistMrs. Bates: Hullo. Is that Reception? .Reception: Yes, madamMrs. Bates: This is Mrs. Bates. Room 504. I sent some clothes to the laundry this morning, two of my husband's shirts and three of my blouses. But they're not back yet. You see, we're leaving early tomorrow morning.Reception: Just a moment, madam. I'll put you through to the housekeeper.Housekeeper: Hullo. Housekeeper.Mrs. Bates: Oh, hullo. This is ... I'm phoning from Room 504. It's about some clothes I sent to the laundry this morning. They're not back yet and you see ...Housekeeper: They are, madam. You'll find them in your wardrobe. They're in the top drawer on the left.Mrs. Bates: Oh, I didn't look in the wardrobe. Thank you very much.Sorry to trouble you. Housekeeper: That's quite all right. Goodbye.Mrs. Bates: Goodbye.ExerciseDirections: Listen to the dialogue and write down the gist and the key words that help you decide. This dialogue is about making an inquiry about the laundry.The key words are reception. laundry. shirts. blouses. wardrobe.Section Two Listening ComprehensionPart 1 DialogueA UN InterpreterInterviewer: ... so perhaps you could tell us how exactly you became so proficient at language learning, Suzanne.Suzanne: Well, I think it all started with a really fortunate accident of birth. You know I was born in Lausanne*, Switzerland。

CISCO_CCNA网络工程师题库

CISCO_CCNA网络工程师题库

培训大讲堂官方YY 频道:3660mCCNA题库考试代号: 640-802考试时间:英文110+30=140分钟通过分数: 825题库版本: V104.4鸿鹄论坛招募CCNA、CCNP答疑讲师答疑地点:鸿鹄官方YY频道3660鸿鹄大讲堂:bbs.hh010./thread-46172-1-1.htmlCCNA题库战报交流QQ群:144288127 (500人超级群)CCNA题库战报交流区: bbs.hh010./forum-261-1.html1000 G视频教程免费下载:bbs.hh010./forum-228-1.htmlCCNA(640-802)题库V104.4CCNA(640-802)题库V104.4(情人节版)CCNA 题库战报500人超级QQ群 144288127V104系列是官方的终结版本,以后不会再出V105 V106 V108等等CCNA 最新题库/最新战报发布区: bbs.hh010./forum-261-1.html下载官方正版题库、看最新考试战报,请随时关注鸿鹄论坛 bbs.hh010.CCNA考试报名1900,详情请联系鸿鹄全国区十七名客服 QQ 71202306========================================更新容:V104.1修正V104中错误题目,确定经典争议题目答案;V104.2增加拖图题并可完美模拟考试,VCE题库增加中文注释;V104.3针对思科CCNA考试变题,更新考试新增题目93Q,更新V104.2实验题;V104.4增加全文中文注释,汇总V104.3九次更新,删除部分旧题目,为目前最新官方正版题库;2011.8.1 增加每日新题,修订部分错误。

2012.2.14 情人节版增加5道新题,分别是519、520、521、522、523题修改176题、375题、443题、482题答案错误修改59题、88题、453题、107题、270题注释错误增加个别疑难拖图题注释,优化实验题=============================================QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?(当您登录到交换机,哪种提示表明你在特权模式?)A. %B.C. >D. $E. #Answer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:特权模式就是#提示符QUESTION 2Which command shows system hardware and software version information?(哪些命令显示系统硬件和软件的版本信息?)A. show configurationB. show environmentC. show inventoryD. show platformE. show versionAnswer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:查看系统的软件和硬件信息使用的命令是show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?(思科 Catalyst 交换机 CAT1 和 CAT2 有它们之间的连接使用端口FA0/13。

CCNA第三学期中文答案第三章

CCNA第三学期中文答案第三章

下列哪两种说法正确描述了VLAN 的优点?(选择两项。

)VLAN 通过调节流量控制和窗口大小来提升网络性能。

VLAN 使交换机可通过VLAN ID 过滤将数据包路由到远程网络。

VLAN 通过减少交换机上所需的物理端口数量来降低网络开销。

VLAN 通过识别有权访问敏感数据和应用程序的用户来提升网络安全性。

VLAN 将网络划分为较小的逻辑网络,这降低了网络对广播风暴的敏感性。

默认交换机配置中的VLAN1 有哪两项特点?(选择两项。

)VLAN1 应重命名。

VLAN 1 是管理VLAN。

所有交换机端口都是VLAN1 的成员。

仅交换机端口0/1 被分配给VLAN1。

交换机之间的链路必须是VLAN1 的成员。

请参见图示。

SW1 和SW2 是将要安装到图中所示拓扑中的新交换机。

交换机SW1 的Fa0/1 接口已将中继模式配置为“打开”。

下列关于交换机SW1 和SW2 之间形成中继链路的说法中哪项正确?交换机SW2 的Fa0/2 接口如果支持DTP,则会协商成为中继链路。

交换机SW2 的Fa0/2 接口只有在静态配置为中继接口的情况下才能成为中继链路。

如果相邻接口被配置为不协商模式,则Fa0/1 接口会自动将相邻交换机上的相邻链路转换为中继链路。

Fa0/1 接口会自动将相邻交换机上的相邻链路转换为中继链路,而不会考虑相邻接口的配置。

请参见图示。

计算机1 向计算机4 发送了一个帧。

在计算机1 与计算机4 之间路径的哪些链路上会将VLAN ID 标记添加到该帧中?AA、BA、B、D、GA、D、FC、EC、E 和F网络管理员希望将大楼A 中的主机划分到编号分别为20 和30 的VLAN 中,下列关于VLAN 配置的说法中哪两项正确?(选择两项。

)可以为这些VLAN 命名。

VLAN 信息保存在启动配置中。

手动创建的非默认VLAN 必须使用扩展范围的VLAN 编号。

网络管理员可在全局配置模式或VLAN 数据库模式下创建VLAN。

CCNA第三学期英文答案chapter3

CCNA第三学期英文答案chapter3

1.Which two statements describe the benefits of VLANs? (Choose two.)VLANs improve network performance by regulating flow control and window size.VLANs enable switches to route packets to remote networks via VLAN ID filtering.VLANs reduce network cost by reducing the number of physical ports required on switches.VLANs improve network security by isolating users that have access to sensitive data andapplications.VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms2.What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)VLAN1 should renamed.VLAN 1 is the management VLAN.All switch ports are members of VLAN1.Only switch port 0/1 is assigned to VLAN1.Links between switches must be members of VLAN13.Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if theneighboring interface is configured in nonegotiate mode.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration of the configuration on the neighboring interface4.Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and computer 4 will a VLAN ID tag be included with the frame?AA, BA, B, D, GA, D, FC, EC, E, F5.The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two statements are true concerning VLAN configuration? (Choose two.)The VLANs may be named.VLAN information is saved in the startup configuration.Non-default VLANs created manually must use the extended range VLAN numbers.The network administrator may create the VLANs in either global configuration mode or VLAN database mode.Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations6.Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the outputshown? (Choose two.)The network administrator configured VLANs 1002-1005.The VLANs are in the active state and are in the process of negotiating configuration parameters.A FDDI trunk has been configured on this switch.The command switchport access vlan 20 was entered in interface configuration mode for FastEthernet interface 0/1.Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to portsfa0/9 through fa0/12 without the use of a Layer 3 device7.What happens to the member ports of a VLAN when the VLAN is deleted?The ports cannot communicate with other ports.The ports default back to the management VLAN.The ports automatically become a part of VLAN1.The ports remain a part of that VLAN until the switch is rebooted. They then become members ofthe management VLAN.8.A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1 command,received. Why did this command generate an error?VLAN 1 can never be deleted.VLAN 1 can only be deleted by deleting the vlan.dat file.VLAN 1 can not be deleted until all ports have been removed from it.VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities9.What is the effect of the switchport mode dynamic desirable command?DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and b up as needed.A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switctrunk commands.10.Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?Cisco switches only support the ISL trunking protocol.The trunk cannot be negotiated with both ends set to auto.By default, Switch1 will only allow VLAN 5 across the link.A common native VLAN should have been configured on the switches11.Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?Disable DTP.Delete any VLANs currently being trunked through port Fa0/1.Administratively shut down and re-enable the interface to return it to default.Enter the switchport mode access command in interface configuration mode.12.Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem?The link between the switches is up but not trunked.VLAN 3 is not an allowed VLAN to enter the trunk between the switches.The router is not properly configured to route traffic between the VLANs.Computer D does not have a proper address for the VLAN 3 address space13.Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?There is a native VLAN mismatch.The link between Switch1 and Switch2 is up but not trunked.The router is not properly configured for inter-VLAN routing.VLAN 50 is not allowed to entering the trunk between Switch1 and Switch214.Refer to the exhibit. Which statement is true concerning interface Fa0/5?The default native VLAN is being used.The trunking mode is set to auto.Trunking can occur with non-Cisco switches.VLAN information about the interface encapsulates the Ethernet frames15.What statements describe how hosts on VLANs communicate?Hosts on different VLANs use VTP to negotiate a trunk.Hosts on different VLANs communicate through routers.Hosts on different VLANs should be in the same IP network.Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network16.Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LANdomain?none of the computers will receive the broadcast framecomputer A, computer B, computer Ccomputer A, computer D, computer Gcomputer B, computer Ccomputer D, computer Gcomputer A, computer B, computer C, computer D, computer E, computer F, computer G, computerH, computer I17.What is a valid consideration for planning VLAN traffic across multiple switches?Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VA trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.Carrying all required VLANs on a single access port will ensure proper traffic separation18.Which two statements about the 802.1q trunking protocol are true? (Choose two.)802.1q is Cisco proprietary.802.1q frames are mapped to VLANs by MAC address.If 802.1q is used on a frame, the FCS must be recalculated.802.1q will not perform operations on frames that are forwarded out access ports.802.1q allows the encapsulation of the original frame to identify the VLAN from which a frameoriginated19.What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in "dynamic d mode?dynamic desirable modeon or dynamic desirable modeon, auto, or dynamic desirable modeon, auto, dynamic desirable, or nonegotiate mode20.Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a newcompany office. The company will add a switch, S3, connected via a trunk link to S2, another switch. Forsecurity reasons the new PC will reside in the HR VLAN, VLAN 10. The new office will use the172.17.11.0/24 subnet. After installation, the existing PCs are unable to access shares on PC4. What isthe likely cause?The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.PC4 must use the same subnet as the other HR VLAN PCs.A single VLAN cannot span multiple switches.21.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3。

新标准大学英语3第三单元课后答案

新标准大学英语3第三单元课后答案

Unit 3 Art for Art’s SakeActive reading (1)Reading and understanding2 Choose the best answer to the questions.1 Why does the writer divide listening to music into three types of experience(a) It is important to keep the different types of experience separate.(b) It makes it easier to understand what is happening when we listen to music.(c) It is the traditional way of referring to the experience of listening.(d) Different people listen on different planes, according to the type of person they are.2 What is the main characteristic of the sensuous plane(a) It is the sort of feeling we get when listening to music on the radio.(b) It can only be experienced by people who aren’t musicians.(c) It is a reaction we have which is generated by the sound of the music.(d) It does not give us any real sense of pleasure. (It does give us pleasure.)3 What is the main characteristic of the expressive plane(a) It can only be experienced by intelligent people.(b) It is when we believe the composer is communicating something to us.(c) It is a controversial concept; some composers don’t think it exists.(d) It is most obviously apparent in the music of Stravinsky.4 What is the main characteristic of the musical plane(a) It can only be experienced by people who have studied to read music.(b) It is the ability to experience different musical elements.(c) It is the plane that we experience instinctively, without realizing it.(d) It is the easiest of the three planes to appreciate.5 How do most people usually listen to music(a) On only one plane at any given moment.(b) On all three planes at the same time.(c) Without paying enough attention.(d) Without understanding what they are doing.6 Why does the writer end the passage by referring to the theatre(a) The theatre also offers three types of experience.(b) Composers are like the characters in a play.(c) Theatre is the form of art which is most similar to music.(d) The audience in a theatre are like musicians in an orchestra.3 Match the listeners’ activities with the planes they are on.1 They understand the way the composer is thinking.(c) musical plane2 They are doing something else at the same time.(a) sensuous plane3 They recognize different elements in the music.(c) musical plane4 They just want to escape from everyday reality.(a) sensuous plane5 They feel sad or happy because of the music.(b) expressive plane6 They think the music they are listening to has a meaning.(b) expressive planeDealing with unfamiliar words4 Match the words in the box with their definitions.1 to make up or form something (constitute)2 happening or done at the same time (simultaneously)3 able to do something because you have the knowledge, skill, or experience that is needed (qualified)4 a regular pattern of sounds in music that you can show by moving, hitting your hands together, or hitting a drum or other surface (rhythm)5 to receive or obtain something from something else (derive)6 someone who writes music, especially classical music (composer)7 as much as is needed (sufficiently)5 Complete the paragraph with the correct form of the words in Activity 4.Johann Sebastian Bach is possibly the greatest (1) composer the world has ever known. His Well- Tempered Clavichord (2) constitutes one of the most complete works for keyboard ever written. It is (3) simultaneously both a series of technical exercises which explore the possibilities of the keyboard, and a masterpiece of expressive feeling. Although he was a highly (4) qualified musician (as an organist and a choirmaster), he was not considered to be (5) sufficiently “modern” by the generation which followed him, and he was soon forgotten. But his music was rediscovered in the 19th century, for its perfect sense of (6) rhythm and harmony. Indeed, many of the great composers of the 20th century, such as Stravinsky, (7) derived a lot of their musical ideas from him.6 Replace the underlined words with the correct form of the words and expressions in the box. You may need to make other changes.1 Shh! The y’re about to announce the winner of this year’s International Piano Competition. (proclaim)2 It’s quite easy to make a comparison between poetry and music. (analogy) It’s quite easy to make an analogy between poetry and music.3 We are amazed by her ability to express herself with great clearness and simplicity. (clarity)4 How many artists have given up everything for the cause of their art (for the sake of)5 Internet emerges as a powerful and effective force in advertising new products. (potent)6 I enjoyed the performance, but I thought the clothes the actors were wearing were a bit silly. (costumes)7 Answer the questions about the words and expressions.1 If you split something up, do you (a) divide it into parts, or (b) put the parts together2 If you do something absent-mindedly, are you (a) thinking about what you are doing, or (b) thinking about something else3 Do you look for consolation (a) after a piece of bad news, or (b) aftera piece of good news4 If you are treading on controversial ground, are you (a) taking a risk, or (b) making everybody happy5 If you shy away from something, do you (a) keep close to it, or (b) keep your distance from it6 If you pin something down, are you (a) able to examine it carefully,or (b) unable to examine it carefully7 If you know the melody of a piece of music, are you familiar with (a) the tune, or (b) the meaning of the music8 Is an instinctive reaction to something (a) automatic, or (b) one which follows a lot of thoughtReading and interpreting8 Work in pairs and choose the best answer to the questions.1 Which is the writer’s main purpose(a) To show how complex listening to music is.(b) To get people to listen to music more.(c) To discourage some people from listening to music.(d) To get people to think about how they listen to music.2 Who does the writer address as you(a) Musicians.(b) Theatregoers.(c) Composers.(d) Intelligent music lovers.Active reading (2)Reading and understanding3 Answer the questions.1 What type of painting is Girl with a Pearl EarringIt’s a world-famous portrait painted by Vermeer around 1665.2 Who was the model for the paintingGriet, a young girl who is thought to work in Vermeer’s house.3 How much of the novel is based on factThe setting and some of the main ideas are factual but the details of the story are speculation and fiction.4 What was the relationship between Griet and VermeerGriet was a maid in Vermeer’s household and she became his model. Vermeer thought she had some artistic talent.5 Why did Griet leave the Vermeer householdVermeer’s daughter and wife found out that Griet was modeling for Vermeer. Griet got embarrassed when the wife stormed into the studio, so she left.6 What differences are there between the book and the filmAccording to the film, the earrings are finally delivered to Griet and the audience is left wondering if she marries Pieter. The novel does not talk about it.4 Match the events with their sources.1 Griet gets a job with the Vermeer family.(b) in the novel by Tracy Chevalier2 Vermeer makes a hole in Griet’s ear.(c) in the film version of the novel3 Vermeer marries a Catholic girl called Catharina.(a) known fact4 Catharina is jealous of Griet.(b) in the novel by Tracy Chevalier5 Vermeer becomes a Catholic.(a) known fact6 Van Ruijven wants to be painted with Griet.(b) in the novel by Tracy Chevalier7 Vermeer grows up in Delft.(a) known fact8 Somebody sends the earrings to Griet after Vermeer’s death.(c) in the film version of the novel9 Griet becomes Vermeer’s assistant.(b) in the novel by Tracy Chevalier10 Griet is embarrassed when Vermeer sees her hair.(b) in the novel by Tracy ChevalierDealing with unfamiliar words5 Match the words in the box with their definitions.1 someone who looks at a picture, photograph, or piece of art (viewer)2 a painting, drawing or photograph of someone, especially of their face only (portrait)3 relating to people’s homes and family life (domestic)4 the inside part of something, especially a building or vehicle (interior)5 as a result (consequently)6 to start to employ someone or use their services (engage)7 to officially ask for a piece of work to be done for you (commission)6 Complete the paragraph with the correct form of the words in Activity 5.In the beginning it was only the rich and famous who had their (1) portraits painted. But from the Renaissance onwards things changed. Firstly, the growing importance of the middle classes led many ordinary people to (2) commission paintings, often of members of their family. Secondly, artists became interested in showing scenes of (3) domestic life,set in the (4) interiors of ordinary houses, and (5) consequently they began to (6) engage ordinary people, such as servant girls, as models. Part of the mystery for (7) viewers today concerns the identity of these models, in masterpieces such as Leonardo’s Mona Lisa and Vermeer’s Girl with a Pearl Earring.7 Replace the underlined words with the correct form of the words and expressions in the box.1 He changed his religion from Protestantism and became a Catholic. (converted)2 One of the assistant’s jobs was to break into a powder the paints. (grind)3 The newspaper started to change the fact so that it was no longer true ever since it existed, and the local government was definitely one of the victims. (distort)4 You don’t have to make a hole in your ears to be able to wear these earrings. (pierce)5 The lives of artists have often been linked to shocking events and situations. (scandals)6 One of the most striking aspects of the painting is the turban she is wearing on her head. (features)7 I’ll finish the painting this evening, so from now until then you can have a break. (in the meantime)8 Answer the questions about the words and expressions.1 Are exotic clothes likely to be (a) ordinary, or (b) unusual2 Is a sitter someone who (a) is being painted, or (b) spends a lot oftime sitting down3 Is a conventional sense of beauty one which is (a) shared and understood by most people, or (b) different from what is shared and understood by most people4 Is an enigmatic expression one which is full of (a) good humour, or (b) mystery5 If you have a volatile personality, do you get angry (a) quickly, or(b) only when you can’t tolerate6 If you are wary of something, are you (a) excited about it, or (b) careful and nervous about it7 If you show something explicitly, do you (a) make its meaning very clear so there is no doubt about it, or (b) leave its meaning unclear8 If a woman tries to keep her modesty, does she (a) cover her hair and body to avoid any sexual feeling in men, or (b) talk and act with good grace9 Is jealousy the feeling you get when you think someone you love (a) is attracted to somebody else, or (b) doesn’t love you any moreLanguage in useword formation: compound nouns1 Form compound nouns to indicate:1 a writer of songs (songwriter)2 a director of films (film director)3 a scarf you wear around your head (headscarf)4 a pack you carry on your back (backpack)5 a stick you use to make your lips red (lipstick)6 a lace you use to tie up your shoe (shoelace)7 polish that you put on your nails (nail polish)might have been / done2 Rewrite the sentences using might have been / done .1 It’s possible that the artist and the model became lovers.The artist and the model might have been lovers.2 It’s possible that Catharina was never jealous of the model. Catharina might never have been jealous of the model.3 It’s possible that the model became Vermeer’s assistant.The model might have become Vermeer’s assist ant.4 It’s possible that Vermeer painted other masterpieces which have since been lost.Vermeer might have painted other masterpieces which have since been lost.5 It’s possible that Vermeer died in poverty.Vermeer might have died in poverty.may be due to the fact that …3 Complete the sentences with your own ideas using may be due to the fact that …1 The young pianist’s musical genius may be due to the fact that his mother played the piano a lot while she was pregnant, so he has always heard music from day one.2 The late arrival of the train may be due to the fact that there were severe storms last night.3 The misunderstanding may be due to the fact that she speaks very little Chinese and I don’t speak much Spanish.4 The book’s enormous popularity may be due to the fact that it has beenaggressively marketed on TV and it was discussed in several prime time TV shows.5 His dislike of music may be due to the fact that he was exposed to loud rock music for many hours a day when he was quite small.insi st that …4 Rewrite the sentences using insist that …1 I met an old friend who refused to let me go before I had a drink with him.I met an old friend, who insisted that I have a drink with him before he let me go.2 The customs people refused to let me through unless I signed a document they gave me.The customs people insisted that I sign a document they gave me before they let me through.3 We refused to let him start the concert before having an hour’s rest. We insisted that he have an hour’s rest befo re he started the concert.4 They refused to publish the book until he changed some of the things he had written.They insisted that he change some of the things he’d written before they published the book.5 She refused to let me see the painting until I apologized for what I had done.She insisted that I apologize for what I had done before she let me see the painting.6 Translate the paragraphs into Chinese.1 Listen, if you can, to the 48 fugue themes of Bach’s Well-Tempered Clavichord. Listen to each theme, one after another. You will soon realize that each theme mirrors a different world of feeling. You will also soon realize that the more beautiful a theme seems to you the harder it is to find any word that will describe it to your complete satisfaction. Yes, you will certainly know whether it is a gay theme or a sad one. You will be able, in other words, in your own mind, to draw a frame of emotional feeling around your theme. Now study the sad one a little closer. Try to pin down the exact quality of its sadness. Is it pessimistically sad or resignedly sad; is it fatefully sad or smilingly sad可能的话,你不妨听听巴赫的《平均律钢琴曲集》中的48个赋格主题。

Unit 3 2023级大学英语III 新视野及新思路Test 3 答案

Unit 3 2023级大学英语III 新视野及新思路Test 3 答案

Test for Unit 3 (Keys for reference)Part I. Listening ComprehensionLong conversation 11-5 B A C B CScript:Sandra: Tim, how's your new job going?Tim: Pretty well, thanks, Sandra.Sandra: How are you finding your new boss?Tim: He's quite energetic, determined and always knows how to bring competitive drive to the team. Sandra: Would you rather have him or your old boss back?Tim: My former boss never knew how to listen to her team members. She's always so bossy. This boss is much better. He always recognizes the skill of each member and how they can be used.Sandra: That's really a born leader.Tim: I can't agree with you more.Sandra: How about your new co-workers? Are they friendly to you?Tim: They are all pretty easy-going. We know the importance of getting along with each other. Sandra: Do you miss your old co-workers?Tim: Of course. I spent so much time at my old workplace that I got to know them all very well. They were like family to me.Sandra: Do people in different departments get along with each other?Tim: Definitely. Since we work together in teams, we have to get along with each other.Sandra: Do you like working with people from different departments?Tim: Yes, it helps me appreciate different opinions, especially when there is a conflict of ideas. Sandra: Do you like this teamwork?Tim: Sure! It's much better than my last one.Long Conversation 26-10 D C A B DScriptM: If you were looking for a flatmate, what would you like to know about them?W: For me, an important question is, "Do you keep yourself to yourself, or do you tend to be around alot?"M: What are you trying to find out?W: I suppose I'm seeking a balance. The last thing I want is a person who comes in and goes straight up to their room, and whom I never see again until the next morning. You know, I'm quite sociable, and I like having friends around.M: Yeah.W: But on the other hand, I don't want a flatmate who's always there, not giving me any personal space. So yeah, I'd like someone who is quite sociable but not overly so.M: I can understand that, and I suppose another important question is about cleanliness.W: Yes, something like, "Are you a tidy person?"M: What answer would you like to hear?W:I'd like them to say, "Oh yes, extremely!" I really don't want to live with someone who is untidy, someone who just leaves their stuff all over the place. That would drive me crazy.M: What about money?W: It can be a problem. I had a flatmate who used to say, "I know I have to pay the electricity bill, but can I pay it next week?" She always promised to pay, but then she never did.M: Oh yeah. You need to know whether they can afford the rent.W: But I wouldn't ask, "Could you tell me how much you earn?" I think I'd mention that the rent needs to be paid in advance. So, I'd ask,"Can you pay three months' rent in advance?" and then see what they say. M: That sounds like a good idea!Section BPassage 111-15 C D B C ANow, sports teams win because they practice. But you can only practice if you have the same members over time. And so you can think of teaming. Sports teams embody the definition of a team, the formal definition. It's a stable, bounded, reasonably small group of people who are interdependent in achieving a shared outcome. You can think of teaming as a kind of pickup game in the park, in contrast to the formal, well-practiced team. Now, which one is going to win in a playoff? The answer is obvious.So why do I study teaming? It's because it's the way more and more of us have to work today. With 24/7 global fast-paced operations, crazy shifting schedules and ever-narrower expertise, more and more ofus have to work with different people all the time to get our work done. We don't have the luxury of stable teams. Now, when you can have that luxury, by all means do it. But increasingly for a lot of the work we do today, we don't have that option.One place where this is true is hospitals. This is where I've done a lot of my research over the years. So it turns out hospitals have to be open 24/7. And patients, they're all different. They're all different in complicated and unique ways. The average hospitalized patient is seen by 60 or so different caregivers throughout his stay. They come from different shifts, different specialties, different areas of expertise, and they may not even know each other's name. But they have to coordinate in order for the patient to get great care. And when they don't, the results can be tragic.Passage 216-20 B C C C BScriptsLiving in a community means we're likely to encounter disputes with our neighbors from time to time. Disputes can range from trivial matters, such as noise complaints, to more serious issues like property damage. Here are some tips for handling such situations:Get to know each other. Being a good neighbor doesn't mean you have to take family vacations together. It could be as simple as knowing your neighbors well enough to say "hello" or perhaps occasionally borrowing things like a cup of sugar or a gardening tool. All these actions can help build trust and understanding. Issues are much more likely to occur among strangers than among even casual acquaintances.Head off problems before they become problems.If you are going to throw a party, visit all neighbors who might be affected and offer them a card with your phone number. If they find the noise intolerable or if other problems occur, your neighbors can call you directly instead of involving the police.Communicate your concerns clearly. Tell your neighbors what's bothering you - don't assume they know what the problem is. Be open and direct, not passive-aggressive. Ask for their opinions and, whenever possible, suggest a solution that reaches a middle ground or demonstrates your willingness to compromise. Stay cool and remain positive, even if your neighbors do not.Involve more neighbors. See if anyone else on your block is experiencing similar issues - they may be willing to help you resolve the situation together. If some of your neighbors have a good relationshipwith the person causing problems, consider having them join the conversation when you talk it out.Bottom line? Resolving disputes with our neighbors is all about effective communication.Remember, the goal isn't to win an argument but to live in harmony with those around us.Section C (24年6月第一套真题中的新闻听力news 1 和news 3)News 121-22 B AScriptSix people had to move away from their home to another place after a fire broke out in a building on Main Street Saturday, officials said. Firefighters responded to the three-story building shortly after 1 p.m. for a reported structure fire, according to Norwalk Deputy Fire Chief Adam Markowitz.Markowitz said crews encountered heavy smoke coming from the second floor when they arrived. A team of about 25 firefighters then spent about 25 minutes extinguishing the flames. Officials described the structure as a mixed-use building that features commercial businesses on the first floor and residential on the second and third floors.Town records list four apartments in the building.[21]Due to smoke and heat damage, the four apartments were declared uninhabitable, and the six residents had to move to another place, officials said. No injuries were reported in connection with the fire.[22]The Norwalk Fire Marshal is investigating the cause and origin of the fire.News 223-25 D D DScriptGenetic researchers in China have made a clone of a star police dog. The clone was born in a laboratory in Beijing in December. Tests show that the clone and her mother are almost identical genetically. The mother dog helped solve multiple murders and many other crimes.[23]The clone has already performed better than traditionally bred dogs on several tests[24] If the clone continues to perform as well as expected, it could mean a huge reduction in the training time for police dogs, which usually takes about five years. The ultimate goal of scientists is to produce clones of talented police dogs that can be trained in months instead of years.[25] However, this goal is notyet possible due to the current costs of the technology.This is not the first time a clone has been made of a star police dog. In South Korea, six clones began working with the police in 2008.Part II. Banked Cloze1.C2. E3. B4. D5. A6. J7. E8. C9. G 10. FPart III. Reading ComprehensionPassage 1(24年6月第一套真题第二篇)1-5 B C D A CPassage 2 (选自U校园AI版第三单元的单元测试阅读题)6-10 C B C C APart IV. Translation1. The Old Town of Lijiang, located at the foot of Yulong Snow Mountain, is a town of scenic beauty, known for its history and culture. It is also one of China's well-preserved old towns of ethnic minority groups. With the boom in Lijiang's tourism, the Old Town of Lijiang is receiving a growing number of tourists from home and abroad. In December 1997, the Old Town succeeded in applying to be recognized as a World Cultural Heritage Site, becoming one of the first noted historical and cultural cities in China to be included on the World Cultural Heritage List.2. The most important thing we can learn from the past is that China and America stand to gain from cooperation and lose from confrontation. Although a great deal has changed in the world and in both countries, this valuable lesson still holds true today and must continue to guide our interactions. We must stay the course without any doubts. Exaggerating our competition out of all proportion would squeeze our space for cooperation. The right attitude is to focus on expanding our cooperation, which is in our mutual interest.Part V. Writing (略)。

Step by step 第三册 Unit 3答案及录音材料

Step by step 第三册 Unit 3答案及录音材料

• 5. Earnings: • Philips Electronics (last year): $ 2.4 billion ($ 300 million) • Royal Dutch Shell (4th quarter): $ 3.6 billion • Electronic Data Systems (4th quarter): $ 0.70 per share ( $ 0.02 up) • 5. Consumer electronics maker Philips Electronics reported a lower than expected profit for last year. The company made about $2.4 billion, more than $300 million below estimates. Oil company Royal Dutch Shell posted its earnings. It made roughly a $3.6 billion profit for its fourth quarter. That was essentially in line with Street expectations. Electronic Data Systems also reported its fourth quarter numbers last night. It posted a 70-cent profit per share, two cents better than expectations.
• • • • • •
3. Share Index: Dow Jones 8,094 ( - 66 ) NASDAQ 1,662 (- 3 ) FT100 ( -36 ) CAC Quarante ( -33, -1% ) DAX ( -1% )

全新版大学进阶英语第三册第三单元答案.doc

全新版大学进阶英语第三册第三单元答案.doc

Key to ExercisesOpenerSuggested answers for reference:1. In China it is a familiar scene that grandparents take their grandchildren to or from school every day, which, however, seldom happens in the West. There parenting responsibility mainly rests with the parents rather than others.2. In general there is not much difference between Western and Chinese tourists. If any, it seems that Chinese like to pose for photos with the scenery as the background, whereas Westerners often just shoot pictures of scenic spots.3. Well, it's true that many Western employees see them and their boss as equals, but anywhere, anytime, you and your boss are never equals in its truest sense. There always exists a gap in between. Compared with Westerners, Chinese employees might tend to be more forbearing (克制) towards their boss and seldom air their grievances publicly.Reading & InteractingI. Understanding the Text1.Text Organization2. Comprehension Check2.1 Digging into detail1. The fact that he wasn't taking on half of the childcare duties, and he thought it was more important to spend time on his work than on his daughter, and his expectation that his mother would do all the housework he was supposed to do.2. Her mother-in-law explained that her role in the family was to lighten the burden of her son, allowing him to keep his former way of life, and to help her daughter-in-law out with parenting and household management.3. She thought it was absolutely unacceptable, because, in her view, her husband is one of two parents, and therefore their daughter should be half his responsibility; and she married her husband, not her mother-in-law.4. He obviously believed that mothers are the primary caregiver of children and this was the normal difference between mothers and fathers.5. She totally rejected the idea, because she thought what her mother-in-law did was fulfilling the parenting responsibility of her husband, therefore it was her husband's responsibility to take care of his own mother when she was old.2.2 Understanding difficult sentences1.B2. B3. A4. A5. BII. Focusing on Language in Context1. Key Words & Expressions1. In a TV interview after the election, the elected congresswoman said repeatedly how grateful she was to all her supporters.2. More and more people now understand the importance of striking a balance between work and family.3. Lots of people enjoy cooking yet hate to wash up.4. In the plane crash over the weekend, the sole survivor was a baby traveling with its parents.5. More and more people are becoming increasingly aware that climate change affects every aspect of our lives.6. He used to enjoy going out to dine with friends, but he started spending more time with family after his wife gave birth to their baby daughter.7. It is a tradition of American universities to invite prominent people from various fields to deliver a speech at their commencement/graduation ceremony.8. Apart from occasional visits to local places of interest, such as art galleries, exhibitions and shopping centres, the old couple generally stayed at home.9. The elder gentleman looked over his shoulder before entering the building, making sure nobody was following him.10. The new product was developed in response to customer demand.11. The young man drank too much at the party and could barelyremember anything when he found himself in the hospital next morning.12. Students should be encouraged to adopt different approaches to problems.13. Politicians always try to avoid expressing in public opinions that are considered extremeor unpopular.14. I love the job, and it's an added bonus that it's so close to home.15. It seemed that the employment opportunities available fell short of what people hoped for that year.16. As some of the issues surrounding climate change are very complex, it will take a long time for the international community to reach consensus.1. negotiation2. hono(u)r3. phase4. maintain5. in the eyes of6. leaving behind7. relieve me of8. work out1.31. The prime minister in the United Kingdom is roughly equivalent to the president of the United States.2. The law requires that a contract has to be signed in the presence of a witness.3. The couple with the new-born baby was looking for someone to help manage the household.4. Children can experience much pressure to live up to the expectations of their parents.5. Growing up means a person learns to take full responsibility for making their own decisions.6. Chinese parents are known to make huge sacrifices to ensure a good education for their children.7. A crime is a crime. You don't have a chance of getting away with it.8. Your analysis put my problems into perspective.2. Usage1. a2. c3. c4. a5. b6. b7. c8. b3. Sentence Patterns1. As I see it, those threatened the most by digital technology should learn to adapt and make a living out of it, rather than constantly complain.2. It's true my wife isn't an excellent cook, but my cooking skill is even worse, so I didn't dare (to) make any comments about what she cooks.3. My girlfriend was seriously ill then, but she didn't dare (to) tell her parents about it.4. It's true that I experienced culture shock when I first worked in a different country, but I gradually learned to appreciate the differences rather than feel angry at them.5. Having worked in a different city for 18 months, the young man was proud of himself for embracing the unknown and making new friends rather than hiding himself in his comfortzone as he used to.6. The job market is at its worst and I consider myself lucky to find a well-paid job, therefore I don't dare (to) ask for more.4. Comprehensive Practice4.1It is easy to get things wrong if you move to live in a new country with a different culture from your own. You may find yourself facing a whole new set of expectations about the proper way to behave. Go out to dine with your new friends and you may find yourself having to adopta whole new set of table manners. Then there is the problem of who is responsible for paying for the meal. This may not be immediately apparent. In some cultures friends share the cost equally at the end of the meal, in others the preference is for friends to take turns, repaying one meal with another at a later date. Working out the details of local customs like these may take time, but, in my view, it is well worth the effort if you want to avoid misunderstandings.4.2To be a grandparent is a big deal in China. Chinese grandparents are widely known for their devotion to the responsibilities of taking care of the third generation. This, however, is a primary cause of the conflict between parents and their adult children, for there existapparent differences in aspectslike lifestyle and parenting approaches between the two generations. You can expect parents to help you manage your household and take on childcare duties, thus relieving you ofyour burden as a parent, but you must know, very often, you have toleave your own parenting ideasbehind. Meanwhile, the adult child simply can't take the kindness of his/her parents for granted. As your parents helped you out when you struggled to balance family and career, you are certainly expected to repay their kindness by taking care of them when they get old.Reading & ComprehendingReading 11. Comprehension Check for Reading 11. T2. F3.F4.T5.T6.F7.F8.T9.T 10. F2. Translation1. 我妈常说,一个孩子挨一次批评就需要5次表扬,在这一点上她也一直身体力行。

计算机英语 第3版 课后习题答案 完整版

计算机英语 第3版 课后习题答案 完整版

Unit 1 Section A(P8)I.Fill in the blanks with the information given in the text:1.Charles Babbage; Augusta Ada Byron2.input; output3.VLSI4.workstations; mainframes5.vacuum; transistors6.instructions; software7.digit; eight; byte8.microminiaturization; chipII.Translate the following terms or phrases from English into Chinese and vice versa:1.artificial intelligence 人工智能2.paper-tape reader 纸空阅读机3.optical computer 光学计算机4.neural network 神经网络5.instruction set 指令集6.parallel processing 平行处理7.difference engine 差分机8.versatile logical element 通用逻辑器件9.silicon substrate 硅基10.vacuum tube 真空管(电子管)11.the storage and handling of data 数据的存储与处理12.very large-scale integrated circuit 超大规模集成电路13.central processing unit 中央处理器14.personal computer 个人计算机15.analogue computer 模拟计算机16.digital computer 数字计算机17.general-purpose computer 通用计算机18.processor chip 处理器芯片19.operating instructions 操作指令20.input device 输入设备III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital. They can be classified as mainframes, minicomputers, workstations, or microcomputers. All else (for example, the age of the machine) being equal, this categorization provides some indication of the computer’s speed, size, cost, and abilities.Ever since the advent of computers, there have been constant changes. First-generation computers of historic significance, such as UNIVAC, introduced in the early 1950s, were based on vacuum tubes. Second-generation computers, appearing in the early 1960s, were those in which transistors replaced vacuum tubes. In third-generation computers, dating from the 1960s, integrated circuits replaced transistors. In fourth-generation computers such as microcomputers, which first appeared in the mid-1970s, large-scale integration enabled thousands of circuits to be incorporated on one chip. Fifth-generation computers are expected to combine very-large-scale integration with sophisticated approaches to computing, including artificial intelligence and true distributed processing.Unit 2 Section A(P34)I.Fill in the blanks with the information given in the text:1.input; output; storage2.Basic Input Output System3.flatbed scanners; hand-held scanners4.LCD-based5.dot-matrix printers; inkjet printers6.disk drives; memory7.Volatile8.serial; parallelII.Translate the following terms or phrases from English into Chinese and vice versa:1.Function key 功能键2.voice recognition module 语音识别模块3.touch-sensitive region 触感区,触摸区4.address bus 地址总线5.flatbed scanner 平板扫描仪6.dot-matrix printer 点阵打印机(针式打印机)7.parallel connection 并行连接8.cathode ray tube 阴极射线管9.video game 电子游戏(港台亦称电玩)10.audio signal 音频信号11.operating system 操作系统12.LCD (liquid crystal display) 液晶显示(器)13.inkjet printer 喷墨打印机14.data bus 数据总线15.serial connection 串行连接16.volatile memory 易失性存储器17.laser printer 激光打印机18.disk drive 磁盘驱动器19.BIOS (Basic Input Output System) 基本输入输出系统20.video display 视频显示器III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:CD-ROM stands for compact disk read-only memory. Unlike floppy and hard disks, which use magnetic charges to represent 1s and 0s, optical disks use reflected light. On a CD-ROM disk, 1s and 0s are represented by flat areas and bumpy areas (called “pits”) on its bottom surface. The CD-ROM disk is read by a laser that projects a tiny beam of light on these areas. The amount of reflected light determines whetherthe area represents a 1 or a 0.Like a commercial CD found in music stores, a CD-ROM is a “read-only” disk. Read-only means it cannot be written on or erased by the user. Thus, you as a user have access only to the data imprinted by the publisher.A single CD-ROM disk can store650 megabytes of data. That is equivalent to 451 floppy disks. With that much information on a single disk, the time to retrieve or access the information is very important. An important characteristic of CD-ROM drives is their access rate.Unit 3 Section A(P57)I.Fill in the blanks with the information given in the text:1.artificial; instructions2.low-level; high-level3.low-level4.Machine5.functional; logic6.Statement7.Module8.digitalII.Translate the following terms or phrases from English into Chinese and vice versa:1.storage register 存储寄存器2.function statement 函数语句3.program statement 程序语句4.object-oriented language 面向对象语言5.assembly language 汇编语言6.intermediate language 中间语言,中级语言7.relational language 关系(型)语言8.artificial language 人造语言9.data declaration 数据声明10.SQL 结构化查询语言11.executable program 可执行程序12.program module 程序模块13.conditional statement 条件语句14.assignment statemen t赋值语句15.logic language 逻辑语言16.machine language 机器语言17.procedural language 过程语言18.programming language 程序设计语言19.run a computer program 运行计算机程序20.computer programmer 计算机程序设计员III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:A programming language is a language used to write instructions for the computer. It lets the programmer express data processing in a symbolic manner without regard to machine-specific details.The difficulty of writing programs in the machine language of 0s and 1s led first to the development of assembly language, which allows programmers to use mnemonics for instructions and symbols for variables. Such programs are then translated by a program known as an assembler into the binary encoding used by the computer. Other pieces of system software known as linking loaders combine pieces of assembled code and load them into the machine’s main memory unit, where they are then ready for execution. The concept of linking separate pieces of code was important, since it allowed “libraries” of programs to be built up to carry out common tasks—a first step toward the increasingly emphasized notion of software reuse. Assembly language was found to be sufficiently inconvenient that higher-level languages (closer to natural languages) were invented in the 1950s for easier, faster programming; alongwith them came the need for compilers, programs that translate high-level language programs into machine code. As programming languages became more powerful and abstract, building efficient compilers that create high-quality code in terms of execution speed and storage consumption became an interesting computer science problem in itself.Unit 4 Section A(P81)I.Fill in the blanks with the information given in the text:1.application; operating2.assemblers3.compiler4.interpreter5.Debugger6.Loop7.device driver8.John von NeumannII.Translate the following terms or phrases from English into Chinese and vice versa:1.inference engine 推理机2.system call 系统调用3.compiled language 编译语言4.parallel computing 平行计算5.pattern matching 模式匹配6.free memory 空闲内存7.interpreter program 解释程序8.library routine 库程序9.intermediate program 中间程序,过渡程序10.source file 源文件11.interpreted language 解释(性)语言12.device driver 设备驱动程序13.source program 源程序14.debugging program 调试程序15.object code 目标代码16.application program 应用程序17.utility program 实用程序18.logic program 逻辑程序19.ink cartridge 墨盒20.program storage and execution 程序的存储与执行III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:A compiler, in computer science, is a computer program that translates source code into object code. Software engineers write source code using high-level programming languages that people can understand. Computers cannot directly execute source code, but need a compiler to translate these instructions into a low-level language called machine code.Compilers collect and reorganize (compile) all the instructions in a given set of source code to produce object code. Object code is often the same as or similar to a computer’s machine code. If the object code is the same as the machine language, the computer can run the program immediately after the compiler produces its translation. If the object code is not in machine language, other programs—such as assemblers, binders (联编程序), linkers (连接程序), and loaders (装入程序)—finish the translation.Most computer languages use different versions of compilers for different types of computers or operating systems, so one language may have different compilers for personal computers (PC) and Apple Macintosh computers. Many different manufacturers often produce versions of the same programming language, so compilers for a language may vary between manufacturers.Unit 7 Section A(P153)I.Fill in the blanks with the information given in the text:1.Telegraph2.dots; dashes3.Media4.point-to-point5.Analog6.Digital7.text-based8.modemII.Translate the following terms or phrases from English into Chinese and vice versa:1.microwave radio 微波无线电2.digital television 数字电视3.DSL 数字用户线路4.analog transmission 模拟传输5.on-screen pointer 屏幕(触摸屏)上的指示(器)6.computer terminal 计算机终端7.radio telephone 无线电话8.cellular telephone 蜂窝电话(移动电话)9.decentralized network 分散的网络10.wire-based internal network 基于普通网线的内部网络11.fiber-optic cable 光缆12.fax machine 传真机13.wireless communications 无线通信14.point-to-point communications 点对点通信15.modulated electrical impulse 调制电脉冲16.communication(s) satellite 通信卫星17.telegraph key 电报电键18.transmission medium 传输媒体19.cordless telephone 无绳电话20.metal conductor 金属导体III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Data communications is the process of transmitting and receiving data in an orderly way so the data that arrives at its destination is an accurate duplication of the data that was sent. When data travels a short distance, such as when you send data from your computer to your printer, it is referred to as local communications. When data travels a long distance, the communication is referred to as telecommunications; the prefix “tele” is derived from a Greek word that means “far” or “far off.”The difference between a short distance and a long distance is somewhat arbitrary (武断的). For example, if your computer sends data to a printer in the next room, it is regarded as local communications; if you phone the person in the next room, you are transmitting data over a telecommunications device. However, the same basic communications concepts apply to both local communications and telecommunications.Basic data communications concepts are the building blocks for understanding how data travels on a communications system. These concepts come in handy (派得上用处) when you install, configure, or upgrade a local area network. In addition, these concepts help you set up modems, fax machines, and cellular data transfers.Unit 12 Section A(P272)I.Fill in the blanks with the information given in the text:1.employees2.Hackers3.Crackers4.damage; manipulation5.Worm6.software piracy7.access; backup8.PasswordsII.Translate the following terms or phrases from English into Chinese and vice versa:1.encryption program 加密程序2.deletion command 删除命令3.authorized user 授权的用户4.backup copy 备份的副本5.voltage surge 电涌,浪涌电压6.circuit breaker 断路器7.electronic component 电子器件8.data-entry error 数据输入错误9.electronic break-in 电路中断10.power line 电力线,输电线11.detection program 检测程序12.power source 电源13.destructive computer program 破坏性计算机程序14.computer virus 计算机病毒15.software piracy 软件侵权16.hard-disk drive 硬盘驱动器17.virus checker 病毒检查程序18.primary storage 主存储器19.electronic bulletin board 电子公告板20.surge protector 浪涌电压保护器III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:A virus or other unwelcome surprise can lurk in your computer system for days or months without discovery. A time bomb is a computer program that stays in your system undetected until it is triggered by a certain event in time, such as when the computer system clock reaches a certain date. A time bomb is usually carried by a virus or Trojan horse. For example, the Michelangelo virus contains a time bomb designed to damage files on your hard disk on March 6, the birthday of artist Michelangelo.A logic bomb is a computer program that is triggered by the appearance or disappearance of specific data. For example, suppose a programmer in a large corporation believes that she is on the list of employees to be terminated during the next cost-cutting campaign. Her hostility (敌意) overcomes her ethical (道德的) judgment, and she creates a logic bomb program that checks the payroll (在职人员名单) file every day to make sure her employment status is still active. If the programmer’s status changes to “terminated,” her logic bomb activates a program that destroys data on the computer.A time bomb or logic bomb might do mischief(祸害) in your computer long before the timer goes off. If the bomb contains a virus, it could replicate and spread to other files. Meanwhile, you might send files from your computer to other computers, not knowing that they are infected.。

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英⽂翻译版及答案CCNA考试题库中英⽂翻译版及答案1[1]1、 What are two reasons that a network administrator would use access lists? (Choose two、)1、出于哪两种理由,⽹络管理员会使⽤访问列表?A、 to control vty access into a routerA、控制通过VTY访问路由器B、 to control broadcast traffic through a routerB、控制⼴播流量穿越路由器2、⼀个默认得帧中继WAN被分类为哪种物理⽹络类型?A、 point-to-pointA、点到点B、 broadcast multi-accessB、⼴播多路访问C、 nonbroadcast multi-accessC、⾮⼴播多路访问D、 nonbroadcast multipointD、⾮⼴播多点E、 broadcast point-to-multipointE、⼴播点到多点Answer: C3、 A single 802、11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency、 What are three likely causes of this problem? (Choose three、)3、⼀个802、11接⼊点被部署在⼀个⽅形办公室得中央,当⼤多数⽤户在⼤流量传输数⼀些⽆线⽤户发现⽆线⽹络变得缓慢与出现丢包A、 mismatched TKIP encryptionB、 null SSIDC、 cordless phonesD、 mismatched SSIDE、 metalF、 antenna type or directionAnswer: CEF4、 Refer to the exhibit、 How many broadcast domains exist in the exhibited topology?根据下图,图中得拓扑中存在多少个⼴播域?A、 one A、1B、 two B、2C、 three C、3D、 four D、4E、 five E、5F、 six F、6Answer: C5、 Refer to the exhibit、 What two facts can be determined from the WLAN diagram? (Choose two、) 5、根据下图,WLAN diagram决定了哪两个事实A、 The area of overlap of the two cells represents a basic service set (BSS)、A、两个 cells得overlap得区域描述了⼀个basic service setB、 The network diagram represents an extended service set (ESS)、B、⽹络描述了⼀个extended service setC、 Access points in each cell must be configured to use channel 1、C、再每个CELL中得AP必须被配置成使⽤channel 1D、 The area of overlap must be less than 10% of the area to ensure connectivity、D、为了确保连通性,重叠区域必须⼩于10%E、 The two APs should be configured to operate on different channels、E、两个访问点应该被配置成⼯作在不同得频道Answer: BE6、 The command frame-relay map ip 10、121、16、8 102 broadcast was entered on the router、Which of the following statements is true concerning this command?6、路由器上输⼊命令frame-relay map ip 10、121、16、8 102 broadcast,以下选项正确得就是?A、 This command should be executed from the global configuration mode、A、该命令应该在全局配置模式下被执⾏B、 The IP address 10、121、16、8 is the local router port used to forward data、B、IP地址10、121、16、8就是本地路由器⽤来转发数据得接⼝C、 102 is the remote DLCI that will receive the information、C、102就是远端得DLCI它将接受信息。

新视野大学英语第三册3(第二版)读写教程课后作文答案

新视野大学英语第三册3(第二版)读写教程课后作文答案

The fight against air pollutionAs is known to us all, that with the development of economy and society, the problem of air pollution becomes more and more serious. Especially, harmful smog polluted the region seriously .This phenomenon caused people’s a ttention and they spent more energy on fighting against air pollution.Some effective actions had been taken, some factories were closed down while others were moved out of the region .In addition, a lot of trees had been planted on hills, fields and so on. The government was truly playing an important role in the fight against air pollution. If not, can it really be succeed only depends on several folk organizations or different sorts of environmental protection associations, even persons?Seeing the obviously changes on the surrounding, breathing more comfortable than ever, people feel pleasant after that, of course, the key thing is to thank for the governments’ measures which encouraged people to support the government so as to reduce the source of air pollution. In conclusion, both of the government, citizen and the factories moved out make a contribution to protect air environment from polluting serious again.Choose the Best UniversityGoing to university after graduating from high school is the wish of every middle school student, and it's considered as one of the most important steps in one's life. Since the moment a child enters school, he is told again and again to study diligently so as to get the permission to university. As a matter of fact, entering college for further education is of great importance in China.But, there are thousands of universities and colleges ,how to choose the best one? That has been a big problem all graduated students have to face. As far as I am concerned, there are two aspects we should consider. One is our interests. As we know, interest is the guide to knowledge, and it differs from student to student, we should choose the university according to our interests. Each university has its key majors which can match a stu dent’s interest. The other is the university must be a key one. For a key university means that it can offer a good education and environment to students, and students can reap more benefits and gain more knowledge from the school.To sum up, the best university should be a key one that matches your interest.Make a good impressionA good impression is very important to every interviewee. However, what we can do to make a good impression.First of all, you must dress neatly and cleanly. As we all know, staffs can represent the company's impression. Secondly, arrive to the interview on time can let the interviewers know that you can go to work on time also. Last but not least, to speak with confidence. Communication plays an important part in the interview. They can know your characters through the words you spoke out.All above are the main points to a successful interview. They will benefic you if you take care of them.The performance of Chinese and American students in their studiesIt is reported that Chinese students are doing far better than American students in their studies. What are the reasons?That Chinese have strong belief in hard work is the first of the two main factors contributing to Chinese students' outstanding performance . Chinese students believe that through hard work and effort, people can perfect themselves and gain a better future for themselves. And they havealso set higher standards for themselves. The second factor is that Chinese students have a strong duty to their families. They work hard not just for themselves but for the honor of their families. They have a high sense of responsibility. They believe that they do not deserve the support of their parents unless they do well in their studies.The two important factors are the major causes why Chinese students do so well in their studies.The Project Hope has been a successAs we all know, with the constant development of economy, our country is becoming more and more prosperous, then The Project Hope has also been a success. There are four reasons. First, we live a happy, wealthy and healthy life nowadays, so we have much more money to support the charity.Second, The Project Hope as a important part of charity, more and more people began to pay attention to The Project Hope.Third, the media have a lot of power today. They can help those children by building a bridge that connects those children and philanthropists.Fourth, star effect. More and more stars begin to pay close attention to The Project Hope. They help those poor kids directly or indirectly. For example, the one foundation of Jet Li helped many people in need.So, we can say that The Project Hope has been a success!SOHO lifestyle is becoming popular"SOHO" stands for small office home office, it means doing your jobs at home or somewhere besides your workplace. as time is so precious in this high speed society, many people prefer working at home, which saves time spent on getting to workplace and more importantly that time is available to work whatever you are doing, for example ,you can make a phone call to one of your important clients about the contacts when you are making meals. Another important reason why people show their great preference to soho is that you don’t need to find a so called workplace to start business, to be a soho businessman, all you need are communicating tools to keep the pace of outside, to get business information.in a word, soho expresses the spirit of working freely, and it is freedom that makes so many people be soho workers.There are serious security problems in Brooklyn, New YorkIt is said that there are serious security problems in Brooklyn, New York. Only a few days ago a young woman was murdered near her residence. It was already ten o’clock in the evening that Marissa Parry was on her way home from company. While walking through the parking lot toward the entrance of her apartment, a man attacked her. It was too sudden for her to realise what was happening. The man stabbed her in the belly with a knife as he seized her bag. Marissa Parry struggled and cried out for help, but no one came to help her. The hateful robber stabbed her again in fury. Then he ran away panicky. Miss Parry fell down and her breath became weaker and weaker. The next morning, people found Marissa Parry lying dead a few feet away from her apartment.Exercise has unexpected benefitsAccording to many medicine experts, exercise has unexpected benefits. Don’t you believe that? Maybe you'll say as same as exercise just has a little disadvantages, it also has not more advantages for us. It doesn't matter, facts will prove it.Have u ever seen a basketball player just do anything without exercise in basketball? have you ever know someone who can get full marks in math without doing homework?Obviously, exercise is one of the best methods to improve our ability, some times we can have unexpected benefits in that.But what should we do about that? As everyone do, every time when we need to do a little more exercise in anything, the lazy idea always pup to our head. It really need confident and self-control, hats how some people can success some can not. The reason why benefits are unexpected is different exercise come out different result. I believe, nothing is impossible if we put our heart in it, just do some exercise to improve our life.Memory can be improvedAs is known to everyone, some people have very good memory and can easily learn quite long poems by heart. There are other people who can only remember things when they have repeated them again and again. Lots of the great people of the world have wonderful memories. good memory is an element of success.However, the memory is not inherent skills and it can be improved .For example, Most of us learned rhymes and acronyms in school that helped us remember things. Do any of the following look familiar to you? We can’t be sure of the answer. But we could do our best to have to invent a rhyme or a poem every time you want to remember something, though -- just think of a picture in your mind that links pieces of information together, preferably something unusual or silly so it is more memorable.When we take a real photo with a camera, there is much to do before the photo is finished and is ready for us to show to our friends. In the same way there is much work to be done before we can keep memory forever in our minds. Therefore, there are all kinds of measures to taken and the memory can be improved.The life of Charlie ChaplinIt was in 1889 that Charlie Chaplin was born in London. His childhood was one of extreme poverty and he didn’t have much schooling. But Charlie showed a gift for acting and wanted to become an actor. In 1910, Charlie Chaplin went to US and started his formal acting career in a troupe. Fortunately, he did a successful act and rose to fame instantly. People have provided a burst of applause of the 80 films which Chaplin acted throughout his life. After Word Wall II , Charlie didn’t sleep in the glory of the past . He gave up Little Tramp character and wanted to grow as artist. Later on, Charlie settled in Switzerland, staying there for the rest of his life. Charlie Chaplin died on December 25, 1977 and he was memorized by the general as one of the greatest film actors of all time.He grew from a salesman to a millionaireHow a salesman who worked tirelessly for ten hours a day and lived from pay check to pay check each month turned his life around by working from a small back room in his house and the techniques, he used to generate over £10 Million pounds in under ten years. He eventually moved into a sales role and used to run up and down the motorways every day getting stuck in traffic and doing an average of a fifty hour week. He explains how he used to think the thought that many of us do and this is that there must be a better way to earn a living than this. He then began to take a look at ways of how he could earn a residual income using other methods. just like many of us Andrew tried out several different methods and a few of which failed miserably. Then he came across an unbelievable idea which was to make him his fortune.The development of our universityIn the past ten years, our university has developed from a small one into a famous and large one. In the past, there were only a few hundred students and a few teachers and professors. Over the past years, our university has drastically changed and improved. Today, our university has a conducive environment for students to study. Professors and teachers are helpful, enthusiastic and knowledgeable. Students also study hard to achieve excellent academic results. Students also have the ability to cooperate with each other in order to accomplish big projects. In addition, our university also have good facilities. Recently built is a large stadium which can contain thousands of students and teachers. Computers and projectors are also facilitated in every classroom and lecture theatre. Such modern technology not only provides convenience for professors and teachers, but also creates an enjoyable learning environment for students.To many people, a cowboy is a heroTo many people, a cowboy is a fantastic hero. A cowboy is a tall and strong man, wearing cowboy hat and boots, riding a horse and with guns around his waist. He remains alert to everything around him all the time. When danger is around, he never fails to sense or detect it, and he is always brave to face the danger. A cowboy is a skilled horseman and good gunman. He is a hero who helps the good people while punishing the bad. He seems like a superman who appears where he is needed. A cowboy does what's right and refuses money for his good actions, because he does not care about money. What he cares about is doing justice.Hangzhou is a beautiful cityIt's known to all that Hangzhou is famous for its beautiful views. The people there are friendly and the environment there is clean and tidy. So it's suitable for people to live in such a city.Every year a lot of tourists come to visit Xizi Lake and the views impress them a lot. They can see the views of the lake by boat. Can you imagine how interesting it is? And the food also tastes yummy. You could go to other places of interest such as Huang long dong, Future World... If you go there ,you will enjoy yourselves and the memory of this pleasant trip will last long. There are some key steps in career planningthere are some key steps in career planning. The first one is to study yourself. Understanding what you are like, what you value, and what you become is the foundation for career planning. In studying yourself, you examine your strengths, your weaknesses and your goals. The second step is to write your career goals down. Write something down may lead to new ideas and may help you see your possibilities. Another step is to review your plans and progress periodically. This may help you see how you have done so far and help you realize what steps to take next. Planning further steps can help you face new changes. Talking with your friends helps you improve your career plans and make them work。

ccna第三学期1-7套练习题答案(最新)

ccna第三学期1-7套练习题答案(最新)

ESwitching Chapter 1 - CCNA Exploration: LAN 交换和无线(版本4.0)1、分层网络设计模型中的哪一层称为互连网络的高速主干层,其中高可用性和冗余性是该层的关键?A.接入层B. 核心层C. 数据链路层D. 分布层E. 网络层F. 物理层2、分层网络设计模型中的哪一层提供了将设备接入网络的途径并控制允许那些设备通过网络进行通信?A. 应用层B. 接入层C. 分布层D. 网络层E. 核心层3、分层设计模型中的哪一层使用策略来控制网络流量的流动并通过在虚拟局域网 (VLAN) 之间执行路由功能来划定广播域的边界?A. 应用层B. 接入层C. 分布层D. 网络层E. 核心层4、从传统的公司网络架构迁移到完全融合网络后,很可能产生什么影响?A. 可将本地模拟电话服务完全外包给收费更低的提供商B. 以太网 VLAN 结构会简化C. 会形成共享的基础架构,因此只需管理一个网络。

D. QoS 问题会大大减轻5、语音数据流和视频数据流争夺带宽的问题会减轻。

应该在分层网络的哪一层或哪几层实现链路聚合?A. 仅核心层B. 分布层和核心层C. 接入层和分布层D. 接入层、分布层和核心层6、下列哪种说法正确描述了模块化交换机?A. 外形纤细B. 允许通过冗余背板进行交换机互连C. 物理特性固定D. 特性灵活多变7、下列哪项功能可在交换网络中通过合并多个交换机端口来支持更高的吞吐量?A. 收敛B. 冗余链路C. 链路聚合D. 网络直径8、在处于不同的 VLAN 中的设备间配置通信需要使用 OSI 模型中的哪个层?A. 第 1 层B. 第 3 层C. 第 4 层D. 第 5 层9、企业级交换机有哪两项特点?(选择两项。

)A. 端口密度低B. 转发速度高C. 延时水平高D. 支持链路聚合E.端口数量预先确定10、Cisco 三层式分层模型中的三层都支持哪两项功能?(选择两项。

)A. 以太网供电B. 在冗余中继链路之间进行负载均衡C. 冗余组件D. 服务质量E. 链路聚合11、网络管理员选择的交换机将在网络核心层工作。

2009年CCNA最新中文版题库第三学期第五单元到final3全部答案

2009年CCNA最新中文版题库第三学期第五单元到final3全部答案

参加考试- ESwitching Chapter 5 - CCNA Exploration: LAN 交换和无线(版本 4.0)第5 章节练习1请参见图示。

服务器发送了一个ARP 请求,询问其默认网关的MAC 地址。

如果未启用STP,则此ARP 请求的结果是什Router_1 会丢弃该广播并使用下一跳路由器的MAC 地址来回应。

Switch_A 会使用Router_1 的E0 接口的MAC 地址来回应。

Switch_A 和Switch_B 会将该消息持续泛洪到网络中。

该消息会在网络中反复传输,直到超出其TTL 为止。

2有关STP 与RSTP 的比较,以下哪一句或哪一组(两句)说法正确?STP 和RSTP 使用同一种BPDU 格式。

STP 会指定备份端口。

RSTP 只有根端口、替换端口和指定端口。

STP 的端口状态与端口相互独立。

RSTP 的端口状态与端口角色绑定在一起。

STP 会等待网络收敛后再将端口设置为转发状态。

RSTP 会立即将替换端口设置为转发状态。

3在交换机间存在冗余连接的第2 层交换环境中,下列有关STP 的默认运行情况的说法中哪两项正确?(选择两项。

)根交换机是具有最高速端口的交换机。

当两个端口开销相等时,有关阻塞哪个端口的决策取决于端口优先级和身份标识。

所有中继端口均为指定端口,不会被阻塞。

根交换机上的所有端口均被设置为根端口。

每台非根交换机仅拥有一个根端口。

4在具有一个生成树实例的已收敛的网络中,将存在哪两项要素?(选择两项。

)每个网络有一个根桥所有非指定端口转发每个非根桥有一个根端口每个网段有多个指定端口每个网络有一个指定端口5每个交换以太网LAN 网段选举出的转发端口会被指派什么快速生成树协议(RSTP) 角色?备用备份指定根6当开发PVST+ 时,修改了网桥ID 是为了加入什么信息?网桥的优先级MAC 地址协议VLAN ID7端口处于哪种STP 状态下时会记录MAC 地址但不转发用户数据?阻塞学习禁用侦听转发8交换机通过哪两种方式使用BPDU 中的信息?(选择两项。

思科 ccna第三册final试题及答案

思科 ccna第三册final试题及答案

思科第三册final 试题及答案1请参见图示。

下列哪三种说法描述了 Host1 和 Host2 无法通信的原因?(选择三项。

)交换机端口处于不同的 VLAN 中。

交换机的 IP 地址在错误的子网中。

主机被配置在不同的逻辑网络中。

需要路由器在 Host1 与 Host2 之间转发流量。

每个 VLAN 中的 VLAN 端口必须连续分配。

主机的默认网关地址必须处于同一个逻辑网络中。

2请参见图示。

主机 PC_A 和主机 PC_B 同时发送流量,来自这两台发送站的帧发生了冲突。

最突信号的是哪台设备?集线器 HB1交换机 SW1路由器 R1交换机 SW2路由器 R2交换机 SW43请参见图示。

在生成树协议中,“学习”表示什么意思?交换机正在发送并接收数据帧。

交换机并未接收 BPDU,但正在发送并接收数据。

交换机正在通过转发收到的 BPDU 参与选举过程。

交换机正在接收 BPDU 并填充 MAC 地址表,但并未发送数据。

4请参见图示。

RTB 被配置为进行传统的 VLAN 间路由。

RTB 可以 ping 通计算机 A 但无法 pin 机 B。

此故障的原因可能是什么?Fa0/11 端口处于错误的 VLAN 中。

RTB 上没有有效的路由协议。

计算机 B 的 IP 地址在错误的逻辑网络中。

路由器的 Fa0/1 接口上配置了错误的中继封装类型。

5请参见图示。

网络管理员已将网络划分为两个 VLAN,R1 和 S1 的配置如图所示。

但是,PC1 无法问题很可能出在哪里?R1 上未配置路由协议。

S1 的 Fa0/1 端口不是中继端口。

S1 上未设置默认网关地址。

S1 和 R1 之间只配置了一条物理链路用于 VLAN 间路由。

6单臂路由器 VLAN 间路由有哪三项特征?(选择三项。

)需要使用 VTP需要使用子接口减少广播域的数量使用过多 VLAN 时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于 VLAN 间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口7请参见图示。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1.Which two statements describe the benefits of VLANs? (Choose two.)VLANs improve network performance by regulating flow control and window size.VLANs enable switches to route packets to remote networks via VLAN ID filtering.VLANs reduce network cost by reducing the number of physical ports required on switches.VLANs improve network security by isolating users that have access to sensitive data andapplications.VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms2.What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)VLAN1 should renamed.VLAN 1 is the management VLAN.All switch ports are members of VLAN1.Only switch port 0/1 is assigned to VLAN1.Links between switches must be members of VLAN13.Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if theneighboring interface is configured in nonegotiate mode.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration of the configuration on the neighboring interface4.Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and computer 4 will a VLAN ID tag be included with the frame?AA, BA, B, D, GA, D, FC, EC, E, F5.The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two statements are true concerning VLAN configuration? (Choose two.)The VLANs may be named.VLAN information is saved in the startup configuration.Non-default VLANs created manually must use the extended range VLAN numbers.The network administrator may create the VLANs in either global configuration mode or VLAN database mode.Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations6.Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the outputshown? (Choose two.)The network administrator configured VLANs 1002-1005.The VLANs are in the active state and are in the process of negotiating configuration parameters.A FDDI trunk has been configured on this switch.The command switchport access vlan 20 was entered in interface configuration mode for FastEthernet interface 0/1.Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to portsfa0/9 through fa0/12 without the use of a Layer 3 device7.What happens to the member ports of a VLAN when the VLAN is deleted?The ports cannot communicate with other ports.The ports default back to the management VLAN.The ports automatically become a part of VLAN1.The ports remain a part of that VLAN until the switch is rebooted. They then become members ofthe management VLAN.8.A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1 command,received. Why did this command generate an error?VLAN 1 can never be deleted.VLAN 1 can only be deleted by deleting the vlan.dat file.VLAN 1 can not be deleted until all ports have been removed from it.VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities9.What is the effect of the switchport mode dynamic desirable command?DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and b up as needed.A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switctrunk commands.10.Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?Cisco switches only support the ISL trunking protocol.The trunk cannot be negotiated with both ends set to auto.By default, Switch1 will only allow VLAN 5 across the link.A common native VLAN should have been configured on the switches11.Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?Disable DTP.Delete any VLANs currently being trunked through port Fa0/1.Administratively shut down and re-enable the interface to return it to default.Enter the switchport mode access command in interface configuration mode.12.Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem?The link between the switches is up but not trunked.VLAN 3 is not an allowed VLAN to enter the trunk between the switches.The router is not properly configured to route traffic between the VLANs.Computer D does not have a proper address for the VLAN 3 address space13.Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?There is a native VLAN mismatch.The link between Switch1 and Switch2 is up but not trunked.The router is not properly configured for inter-VLAN routing.VLAN 50 is not allowed to entering the trunk between Switch1 and Switch214.Refer to the exhibit. Which statement is true concerning interface Fa0/5?The default native VLAN is being used.The trunking mode is set to auto.Trunking can occur with non-Cisco switches.VLAN information about the interface encapsulates the Ethernet frames15.What statements describe how hosts on VLANs communicate?Hosts on different VLANs use VTP to negotiate a trunk.Hosts on different VLANs communicate through routers.Hosts on different VLANs should be in the same IP network.Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network16.Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LANdomain?none of the computers will receive the broadcast framecomputer A, computer B, computer Ccomputer A, computer D, computer Gcomputer B, computer Ccomputer D, computer Gcomputer A, computer B, computer C, computer D, computer E, computer F, computer G, computerH, computer I17.What is a valid consideration for planning VLAN traffic across multiple switches?Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VA trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.Carrying all required VLANs on a single access port will ensure proper traffic separation18.Which two statements about the 802.1q trunking protocol are true? (Choose two.)802.1q is Cisco proprietary.802.1q frames are mapped to VLANs by MAC address.If 802.1q is used on a frame, the FCS must be recalculated.802.1q will not perform operations on frames that are forwarded out access ports.802.1q allows the encapsulation of the original frame to identify the VLAN from which a frameoriginated19.What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in "dynamic d mode?dynamic desirable modeon or dynamic desirable modeon, auto, or dynamic desirable modeon, auto, dynamic desirable, or nonegotiate mode20.Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a newcompany office. The company will add a switch, S3, connected via a trunk link to S2, another switch. Forsecurity reasons the new PC will reside in the HR VLAN, VLAN 10. The new office will use the172.17.11.0/24 subnet. After installation, the existing PCs are unable to access shares on PC4. What isthe likely cause?The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.PC4 must use the same subnet as the other HR VLAN PCs.A single VLAN cannot span multiple switches.21.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3。

相关文档
最新文档