CCNA第一学期期末考试1

合集下载

ccna章节与期末答案

ccna章节与期末答案

第一章:正确答案:2.4.5解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线 LAN 会受 BYOD(自带设备)影响。

使用大学无线 LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线 WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过 Internet 可以联系在线供应商,所以家庭用户通过 Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用 LAN 来访问 Internet。

例如,PC 可以通过调制解调器直接连接到 ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和 DSL 均能实现高带宽、始终联网,并提供到主机计算机或 LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

思科第一学期期末考试最新答案CCNA1

思科第一学期期末考试最新答案CCNA1

要将数据包发送到远程网络,应使用哪种设备?访问交换机DHCP 服务器集线器路由器OSI 哪一层使用面向连接的协议来确保数据的可靠传输?应用层表示层会话层传输层请参见图示。

根据显示的IP 配置回答,主机 A 和主机 B 无法在本地网络外通信的原因是什么?对主机 A 分配了网络地址。

对主机 B 分配了组播地址。

主机 A 和主机 B 属于不同的网络。

对网关地址分配了广播地址。

请参见图示。

包含路由器 B 的网络遇到问题。

助理网络工程师已确定此网络的问题出在路由行什么操作可以纠正该网络问题?在接口Serial 0/0/0 上发出clock rate命令在接口Serial 0/0/1 上发出description命令在接口FastEthernet 0/0 上发出ip address命令在接口FastEthernet 0/1 上发出no shutdown命令请参见图示。

对于从主机 A 向Web 服务器发出的网页请求,正确的目的套接字数字是什么00-08-a3-b6-ce-46198.133.219.25:80C 172.18.0.0/24 is directly connected, FastEthernet0/0在Cisco IOS 设备中,启动配置文件存储于何处?闪存NVRAMRAMROM在配置路由器时,网络技术人员想要命名路由器。

输入hostname命令后,技术人员会看到下列示?Router>Router#Router(config)#Router(config-line)#下列哪三个IPv4 地址代表子网的广播?(选择三项)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /27网络管理员想要限制访问路由器的特权执行模式。

管理员应该使用哪一种口令?使能aux控制台VTY请参见图示。

ccna章节与期末答案

ccna章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题C C N A11Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfacnetwork card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423the IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 491 assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254 statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server.application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

CCNA网络第一期期末测试答案

CCNA网络第一期期末测试答案

参加考试- ENetwork Final Exam - CCNA Exploration: 网络基础知识(版本4.0)1请参见图示。

路由器已启用NAT 功能以供PC 访问Internet,但是PC 仍然让PC 能够访问Internet,应将哪一项IP 地址更改为209.165.201.1?192.168.1.191192.168.1.101192.168.1.1192.168.1.2542请参见图示。

图中所示为客户端之间发送电子邮件的过程。

以下哪一列表正确使用的组件或协议?1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA3数据链路层有哪两项功能?(选择两项)分割和记录数据。

在源主机和目的主机上运行的程序之间进行数据交换。

控制数据如何传递到介质中。

生成信号以表示每个帧中的比特。

使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。

4请参见图示。

PC 已连接到网络。

下列哪一项操作将验证PC 能够与其默认网关通信?使用ping 127.0.0.1命令。

使用ipconfig命令。

使用ipconfig/all命令。

使用ping 10.0.0.254命令。

5一位技术人员必须通过要求提供口令来确保交换机特权执行模式的安全。

哪种类型的口令能满录的需要并可视为最安全的口令?控制台电缆使能使能加密口令VTY6请参见图示。

下列关于图中所示IP 配置的陈述,哪三项是正确的?(选择三项)分配给该计算机的地址代表私有地址。

该计算机无法在本地网络外通信。

此计算机的网络可支持126 台主机。

该计算机地址的前缀是/27。

分配给该计算机的IP 地址可在Internet 上路由。

网络管理员考核试题

网络管理员考核试题

ccna 第一学期期末考试试题与答案1网络管理员想要限制访问路由器的特权执行模式。

管理员应该使用哪一种口令?使能aux控制台VTY2请参见图示。

主机已与交换机 2 断开连接并连接到交换机1。

为了让该主机在网络中正常工作,应该为其分配怎样的IP 地址、子网掩码和默认网关?IP 地址:10.10.9.37,子网掩码:255,255,255,240,默认网关:10.10.9.35IP 地址:10.10.9.37,子网掩码:255.255.255.224,默认网关:10.10.9.35IP 地址:10.10.9.29,子网掩码:255,255,255,248,默认网关:10.10.9.35IP 地址:10.10.9.32,子网掩码:255.255.255.224,默认网关:10.10.9.35IP 地址:10.10.9.37,子网掩码:255.255.255.224,默认网关:196.1.105.6IP 地址:10.10.9.63,子网掩码:255.255.255.224,默认网关:10.10.9.353下列哪两种介质可用于连接相距500 米的两台设备?(选择两项)10 BASE-T1000 BASE-TX10 BASE-21000 BASE LX1000 BASE-SX4请参见图示。

为了使此网络中的主机接入Internet,路由器RT_A 需要提供哪种功能?地址转换DHCP 服务ftpWeb 服务器5请参见图示。

技术人员正在处理网络问题,需要验证路由器的LAN 接口。

要确认路由器接口工作正常,应该从此主机ping 哪个地址?127.0.0.1192.168.64.196192.168.254.1192.168.254.9192.168.254.2546请参见图示。

主机 A 正在向主机 B 传输数据。

数据离开Router1 的Fa0/1 接口时将使用哪一种地址组合?目的IP:192.168.72.2,源MAC:0007.C2B4.3421目的IP:192.168.10.4,源MAC:0030.8596.DE81目的IP:192.168.10.4,源MAC:0007.C2B4.3421目的IP:192.168.72.2,源MAC:0030.8596.DE817请参见图示。

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。

ccna1期末考试题

ccna1期末考试题

Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? (Choose two.)The initial window size is determined via the two-way handshake.The window size for the TCP session that is represented is initially set to 3000 bytes.Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001.Host B expects that the next received segment number will be 3000.No more acknowledgments will be exchanged.2Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.)10.1.1.6310.1.1.3710.1.1.3910.1.1.3210.1.1.6010.1.1.23determines the correct destination application?timing and synchronization bitsdestination and source physical addressesdestination and source logical network addressesdestination and source process numbers4Which password restricts Telnet access to the router?enableenable secretconsoleVTY5Refer to the exhibit. To create the initial configuration, a network technician connected host A to the router using the connection that is shown. Which statement is true about this connection?It terminates at the Ethernet port of the router.It provides out-of-band console access.It terminates at the serial interface of the router.It requires a Telnet client on host A to access the router.6Which three addresses belong to the category of public IP addresses? (Choose three.)127.0.0.1196.1.105.6132.11.9.9910.0.0.1172.16.9.1046.1.1.977Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology?234568Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network?IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.359Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?0060.7320.D6320060.7320.D6310040.8517.44C30009.B2E4.EE030010.C2B4.342110What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13012Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server configured at the host? (Choose two.)192.168.1.99192.168.2.10010.10.10.32192.168.1.5the IP address of the website resolver1.xyz.local13Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server?MAC address of the server and port number of the serviceIP address of the host and port number of the serviceMAC address of the host and port number of the serviceIP address of the server and port number of the serviceRouter>Router(config-if)#Router#Router(config)#15What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.17Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?Configure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.18Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/119Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)10.1.12.79/2810.1.12.113/2810.1.12.32/2810.1.11.5/2710.1.11.97/2710.1.11.128/2720Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Three networks are needed.Two logical address ranges are required.A single broadcast domain is present.Three collision domains are present.Four networks are needed.21Refer to the exhibit. Communication between hosts X and Y is restricted to the local network. What is the reason for this?The gateway addresses are broadcast addresses.Host Y is assigned a multicast address.Host X and host Y belong to different networks.Host X is assigned a network address.22Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access23Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be connected to modem 2 to enable this access?consoleEthernetauxiliaryserial24Which statement is true about the running configuration file in a Cisco IOS device?It affects the operation of the device immediately when modified.It is stored in NVRAM.It should be deleted using the erase running-config command.It is automatically saved when the router reboots.25Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)This exchange is part of the three-way handshake.The destination port indicates that a Telnet session has been initiated.The source port does not support communication with the destination port that is listed.The destination port indicates that an SMTP session has been initiated.The protocol is a connection-oriented protocol.26Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.)Router(config)# line vty 0 4Router(config-line)# password arj15Router(config-line)# loginThis configuration allows users to connect by using a modem.Users must specify which line, 0 or 4, they wish to connect to when making a connection.This configuration allows users to connect to the router via the use of the telnet command.This configuration allows five users to make simultaneous connections to this router.The configured password is automatically encrypted on the router.27Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layertransport layer28Refer to the exhibit. Which list refers only to end devices?D,E,F,GA,H,B,CA,D,E,FA,D,E,G29Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA30192.168.1.191192.168.1.101192.168.1.1192.168.1.254Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cableConnection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cableConnection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cableConnection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - rollover cableConnection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - straight-through cable 32What is the effect of using the Router# copy running-config startup-config command on a router?The contents of ROM will change.The contents of RAM will change.The contents of NVRAM will change.The contents of flash will change.33Which three statements are true about transport layer protocols? (Choose three.)TCP and UDP manage communication between multiple applications.TCP retransmits the packets for which the acknowledgment is not received.TCP acknowledges received data.UDP exchanges frames between the nodes of the network.TCP has no mechanism to acknowledge transmission errors.UDP uses windowing and sequencing to provide reliable transfer of data.34Which two types of media are useful for connecting two devices separated by a distance of 500 meters? (Choose two.)10 BASE-T1000 BASE-TX10 BASE-21000 BASE LX1000 BASE-SX35Which information is used by the router to determine the path between the source and destination hosts?the host portion of the IP addressthe network portion of the IP addresshost default gateway addressthe MAC address36The network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this application to make it accessible by clients?0 to 25549152 to 655351024 to 491510 to 102337Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?10.0.0.254192.168.0.249192.168.0.25010.0.1.25438Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements. Which three segments use Cable 2?(Choose three.)Segment 1Segment 2Segment 3Segment 4Segment 5Segment 639An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?10.10.128.0 to 10.10.160.25510.10.128.0 to 10.10.159.25510.10.128.0 to 10.10.192.25510.10.128.0 to 10.10.0.15910.10.128.0 to 10.10.159.040Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers.Which action will help to identify the path between the hosts?Use the ipconfig command at the host.Use the ipconfig/all command at the destination.Use the tracert command at the host.Use the ping command at the destination.41Which OSI layer offers ordered data reconstruction services?application layernetwork layerpresentation layersession layertransport layer42A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?It uses error control mechanisms.It uses a connectionless protocol only for multiple simultaneous transmissions.It uses multiple Layer 2 source addresses.It uses multiple port numbers.43What are two functions of the data link layer? (Choose two.)It segments and reorders the data.It exchanges data between programs that are running on the source and destination hosts.It controls how data is placed onto the media.It generates signals to represent the bits in each frame.It encapsulates each packet with a header and a trailer to transfer it across the local media.44Refer to the exhibit. Which three statements are true about the IP configuration that is displayed? (Choose three.)The assigned address is a private address.The PC cannot communicate with the DNS server.The network can have 126 hosts.The prefix of the computer address is /26.The IP address is routable on the Internet.The IP address is a multicast address.45Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable. Which two statements are true about this connection? (Choose two.)The cable that is used is an Ethernet crossover cable.The transmit pin of the cable is terminated to the receive pin.The maximum distance between the switch and the PC can be 100 m.The maximum supported bandwidth is 1000 Mb/s.The Category 6 cable simulates a point-to-point WAN link and is unusable for this type of connection.Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19 immediately.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.47Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter48An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12849Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization.What is the likely cause of the problem?Hosts A and B are not on the same subnet as host C.The IP addresses on the router serial interfaces are wrong.The subnet mask on host C is improperly configured.The FastEthernet interface fa0/0 of router 1 is wrongly configured.50Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.1。

ccna 章节与期末答案

ccna 章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

版本ccna考试第一章期末考试答案b

版本ccna考试第一章期末考试答案b

最新版本C C N A考试第一章期末考试答案bPDU 封装的正确顺序是什么?答案说明最高分值2correctness of response 2 points for Option 10 points for any other option此试题参考以下领域的内容:Introduction to Networks3.3.1 数据封装建立融合网络有何用途?为所有终端设备提供高速连接确保平等对待所有类型的数据包实现数据网络基础架构设备的容错能力和高可用性降低部署和维护通信基础设施的成本随着技术的发展,各个公司现在可以将不同的网络整合到一个平台之上,称为融合网络。

在融合网络中,语音、视频和数据通过同一网络传输,从而使人们不必再创建和维护各个单独的网络。

这也降低了提供和维护通信网络基础设施相关的成本。

答案说明最高分值2 correctness of response 2 points for Option 40 points for any other option此试题参考以下领域的内容:Introduction to Networks• 1.3.1 融合网络请参见图示。

哪个区域最有可能是图中所示的公司网络的外联网?区域 A区域 B区域 C区域 D外联网是外部实体访问其他公司的数据的平台。

其形式可能是产品供应商所使用的库存服务器,也可能是外部实体用来访问当天客户数量的当前信息的 Web 服务器。

Internet 用云和区域 A 表示。

内部网通常仅供内部人员使用。

区域 B 和 D 均是内部网的示例。

答案说明最高分值2 correctness of response 2 points for Option 30 points for any other option此试题参考以下领域的内容:Introduction to Networks• 1.2.3 Internet主机正在访问远程网络的 FTP 服务器。

版本ccna考试第一章期末考试答案b

版本ccna考试第一章期末考试答案b

PDU 封装的正确顺序是什么答案说明最高分值2correctness of response 2 points for Option 10 points for any other option此试题参考以下领域的内容:Introduction to Networks数据封装建立融合网络有何用途为所有终端设备提供高速连接确保平等对待所有类型的数据包实现数据网络基础架构设备的容错能力和高可用性降低部署和维护通信基础设施的成本随着技术的发展,各个公司现在可以将不同的网络整合到一个平台之上,称为融合网络。

在融合网络中,语音、视频和数据通过同一网络传输,从而使人们不必再创建和维护各个单独的网络。

这也降低了提供和维护通信网络基础设施相关的成本。

答案说明最高分值correctness of response 2 points for Option 420 points for any other option此试题参考以下领域的内容:Introduction to Networks融合网络请参见图示。

哪个区域最有可能是图中所示的公司网络的外联网区域A区域B区域C区域D外联网是外部实体访问其他公司的数据的平台。

其形式可能是产品供应商所使用的库存服务器,也可能是外部实体用来访问当天客户数量的当前信息的Web 服务器。

Internet 用云和区域 A 表示。

内部网通常仅供内部人员使用。

区域 B 和 D 均是内部网的示例。

答案说明最高分值correctness of response 2 points for Option 320 points for any other option此试题参考以下领域的内容:Introduction to NetworksInternet主机正在访问远程网络的FTP 服务器。

中间网络设备在此对话中起到哪三个作用(请选择三项。

)重新生成数据信号充当客户端或服务器提供传输消息的通道应用安全设置来控制数据流出现错误时通知其他设备用作消息的源或目标中间设备负责管理数据传输,包括跟踪数据路径,出现故障时寻找备用路径并通知其他设备,以及应用安全和优先级策略。

思科第一学期期末考试考题CCNA1

思科第一学期期末考试考题CCNA1

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration before reloading. Which action will cause the unmodified data to be saved on the T?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the mausers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhthe IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 491 assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254 statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server.application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?ana Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

思科第一学期期末考试考题CCNA

思科第一学期期末考试考题CCNA

1Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configurationserver before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfac York router, what is the likely cause of the problem?network card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhib IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 4915 to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine whic device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

CCNA期末考试复习题(1)

CCNA期末考试复习题(1)

CCNA期末考试复习题一、选择题1 、图示的网络中有多少个冲突域?A 1B 2C 3D 6E 72、如图所示网络,交换机都是默认配置。

主机A需要和主机D通信,但是主机A没有默认网关的MAC地址。

哪些主机将收到主机A发出的ARP请求?A 只有主机DB 只有路由器R1C 只有主机B和CD 只有主机B,C和DE 只有主机B,C和路由器R13、如图所示,主机A属于哪个子网?A 10.197.0.0B 10.192.0.0C 10.197.184.0D 10.197.187.0E 10.197.187.1684、248表示为二进制形式是:A 11101000B 11110100C 11111000D 111110105、10BASE-T指哪种线缆?A 10Mbit/s传输速度,基带信号,线缆长度500M,同轴线B 10Mbit/s传输速度,宽带信号,线缆长度100M,同轴线C 10Mbit/s传输速度,基带信号,线缆长度100M,双绞线D 10Gbit/s传输速度,宽带信号,线缆长度500M,双绞线6、如图所示,网络管理员希望创建一个子网用于两个路由器点对点连接。

哪个子网掩码可以给点对点连接提供足够的地址,且浪费又最少?A 255.255.255.192B 255.255.255.224C 255.255.255.240D 255.255.255.248E 255.255.255.2527、如图所示,主机A希望发送一个消息给主机B。

请将下列步骤排列为正确的顺序,使得消息能够发送出去。

A——添加网络层地址B——发送比特C——创建应用层数据D——添加数据链路层地址A B—A—D—CB D—A—C—BC A—D—C—BD C—A—D—BE C—D—A—BF C—B—A—D8、一个C类网络192.168.35.0使用/28的掩码划分子网,可用子网个数及每子网的可用主机数分别是多少?A 6 子网/64主机B 14 子网/32主机C 14子网/14主机D 30子网/64主机9、哪种协议用来消灭交换环路?A TCPB RIPC STPD IGRPE IP10、因为无法ping通本地路由器,技术人员决定查看一下路由器。

ccna1章节与期末答案

ccna1章节与期末答案

第一章:正确答案:2.4.5解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

下列哪一个OSI 层负责管理数据段?应用层表示层会话层传输层请参见图示。

图中所示为客户端之间发送电子邮件的过程。

以下哪一列表正确地标识了图中各编号阶段使用的组件或协议?1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA第 4 层报头包含帮助数据传输的哪一类信息?服务端口号主机逻辑地址设备物理地址虚拟连接标识符哪个OSI 层提供面向连接的可靠数据通信服务?应用层表示层会话层传输层网络层当OSI 模型下层执行无连接协议时,通常使用什么来确认数据已收到并请求重传丢失的数据?IPUDP以太网无连接确认面向连接的上层协议或服务下列哪三项是CSMA/CD 的特征?(选择三项。

)设备会侦听介质,并且仅当无法检测到介质上存在其它信号时才会传输数据。

介质上的所有设备均可侦听所有通信。

设备根据配置的优先级来进行通信。

发生冲突后,引起冲突的设备会优先尝试传输数据。

发生冲突时,所有设备会在一段时间内停止传输数据,该段时间的长度随机决定。

CSMA/CD 使用令牌系统来避免冲突。

在封装过程中,传输层添加什么标识符?源IP 地址和目的IP 地址源MAC 地址和目的MAC 地址源端口号和目的端口号源通道标识符和目的通道标识符数据链路层有哪两项功能?(选择两项)分割和记录数据。

在源主机和目的主机上运行的程序之间进行数据交换。

控制数据如何传递到介质中。

生成信号以表示每个帧中的比特。

使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。

请参见图示。

网络中的主机A 和B 正在传输层交换数据段。

下列关于此交换的陈述,哪两项是正确的?(选择两项)主机A 正在使用FTP 向主机B 传输文件。

主机A 将发送起始字节编号为11 的下一数据段。

目的主机的数据段表示已成功收到11 字节。

主机A 正在发起到主机B 的Telnet 会话。

主机B 可以发送开始字节编号为2 的下一数据段。

下列哪三项陈述说明了传输层协议的特征?(选择三项)应用层协议使用TCP 端口号和UDP 端口号。

TCP 使用端口号提供可靠的IP 数据包传输。

UDP 使用窗口和确认获得可靠的数据传输。

TCP 使用窗口和定序提供可靠的数据传输。

TCP 是面向连接的协议。

UDP 是无连接协议。

下列哪三项陈述说明了传输层协议的特征?(选择三项)应用层协议使用TCP 端口号和UDP 端口号。

TCP 使用端口号提供可靠的IP 数据包传输。

UDP 使用窗口和确认获得可靠的数据传输。

TCP 使用窗口和定序提供可靠的数据传输。

TCP 是面向连接的协议。

UDP 是无连接协议。

当客户端应用程序发出到服务器的连接时,下列哪一个范围的端口号会动态地分配到客户端应用程序?0 到2550 到10231024 到49151大于65535下列有关网络层编址的陈述中哪三项是正确的?(选择三项。

)网络层编址使用分层式结构。

使用长度为48 位的地址。

以太网交换机可以使用它来作出转发决定。

它不支持广播。

其使用的编址方法可以识别地址的网络部分。

网络层编址可以区分每台主机。

请参见图示。

根据显示的IP 配置回答,主机A 和主机B 无法在本地网络外通信的原因是什么?对主机A 分配了网络地址。

对主机B 分配了组播地址。

主机A 和主机B 属于不同的网络。

对网关地址分配了广播地址。

请参见图示。

主机A 发送了一个以FFF.FFFF.FFFF 为目的MAC 地址的帧。

交换机将如何处理该帧?它会丢弃该帧。

它会将该帧送回到主机A。

它会将该帧发送到除主机A 之外的所有主机。

它会将该帧转发到默认网关。

请参见图示。

主机A 尝试与主机B 建立TCP/IP 会话。

尝试期间,捕获了源MAC 地址为0050.7320.D632 而目的MAC 地址为0030.8517.44C4 的帧。

捕获的帧中封装了源IP 地址为192.168.7.5 而目的IP 地址为192.168.219.24 的数据包。

此数据包是在网络中哪一点捕获的?离开主机A离开ATL离开Dallas离开NYC请参见图示。

主机A 要访问电子邮件。

要传达此请求,将使用哪一个目的套接字数字?10.10.1.2:530007.A7B8.0008:2510.10.1.3:2310.10.1.3:25请参见图示。

路由器的路由表如图所示。

该路由器收到以192.168.9.4 为目的地址的数据包。

它将如何处理该数据包?它会丢弃数据包。

它会通过FastEthernet 0/1 转发该数据包。

它会将数据包转发到下一跳地址。

它会将数据包转发到172.16.2.0。

请参见图示。

假设所有设备均使用默认配置。

支持显示的拓扑需要多少个子网?13457请参见图示。

对图示拓扑可以得出哪两项结论?(选择两项)需要三个网络。

需要两个逻辑地址范围。

存在一个广播域。

存在三个冲突域。

需要四个网络。

您所在的网际网络发生了路由问题。

要鉴别此错误,应该检查以下哪种设备?接入点主机集线器路由器交换机请参见图示。

哪种逻辑拓扑是对图示网络最准确的描述?星型环型点对点总线网状请参见图示。

路由器已启用NAT 功能以供PC 访问Internet,但是PC 仍然无法访问Internet。

为了让PC 能够访问Internet,应将哪一项IP 地址更改为209.165.201.1?192.168.1.191192.168.1.101192.168.1.1192.168.1.254请参见图示。

主机C 能够成功地ping 通127.0.0.1,但无法与组织中的主机A 和B 通信。

此问题的原因可能是什么?主机A 和B 与主机 C 不在同一个子网中。

路由器串行接口上的IP 地址有误。

主机C 配置的子网掩码不正确。

路由器1 的FastEthernet 接口配置有误。

请参见图示。

技术人员正在处理网络问题,需要验证路由器的LAN 接口。

要确认路由器接口工作正常,应该从此主机ping 哪个地址?127.0.0.1192.168.64.196192.168.254.1192.168.254.9192.168.254.254下列有关网络层编址的陈述中哪三项是正确的?(选择三项。

)唯一标识每台主机。

有助于通过网际网络转发数据包。

使用32 位逻辑IPv4 地址。

是不可配置的地址。

是物理地址。

通过地址的第一部分来标识主机。

请参见图示。

图中所示的主机连接到集线器1。

为了让该主机在网络中正常工作,应该为其分配怎样的IP 地址、子网掩码和默认网关?IP 地址:172.16.31.36,子网掩码:255.255.255.240,默认网关:172.16.31.35IP 地址:172.16.31.63,子网掩码:255.255.255.224,默认网关:172.16.31.35IP 地址:172.16.31.29,子网掩码:255.255.255.248,默认网关:172.16.31.35IP 地址:172.16.31.32,子网掩码:255.255.255.224,默认网关:172.16.31.35IP 地址:172.16.31.29,子网掩码:255.255.255.240,默认网关:172.16.30.1IP 地址:172.16.31.37,子网掩码:255.255.255.224,默认网关:172.16.31.35哪三个地址属于公有IP 地址?(选择三项。

)127.0.0.1196.1.105.6132.11.9.9910.0.0.1172.16.9.1046.1.1.97请参见图示。

主机A 要连接到位于不同网络中的主机B。

为了实现此连接,可以为主机A 分配哪三项IP 地址?(选择三项。

)172.16.11.36172.16.11.95172.16.11.88172.16.11.70172.16.11.64172.16.11.67作为网络管理员,假设IP 地址为172.30.0.0,能够支持510 台主机的子网掩码是什么?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.128请参见图示。

某用户要从PC 访问Internet。

路由器的部分运行配置如图所示。

要实现此访问,应该为PC 配置下列哪一个默认网关IP 地址?10.1.192.110.1.192.210.1.192.54192.31.7.1以下哪组网络ID 和子网掩码正确标识了从172.16.128.0 到172.16.159.255 的所有IP 地址?172.16.128.0 255.255.255.224172.16.128.0 255.255.0.0172.16.128.0 255.255.192.0172.16.128.0 255.255.224.0172.16.128.0 255.255.255.192下列哪三个IPv4 地址代表子网的有效网络地址?(选择三项。

)192.168.9.64/28192.168.9.146/28192.168.9.96/28192.168.9.129/26192.168.9.51/26192.168.9.64/26网络技术人员想要使用ip address 192.168.1.1 255.255.255.0命令在路由器接口上配置IP 地址。

输入此命令后,技术人员会看到下列哪一项提示Router>Router(config-if)#Router#Router(config)#在路由器的串行接口处使用clock rate 56000命令会产生什么结果?接口被配置为DCE 设备。

接口的计时器信息被清除。

通过为FastEthernet 接口分配计时信号,使其模拟串行接口。

串行接口的IP 地址得以配置。

一位技术人员必须通过要求提供口令来确保交换机特权执行模式的安全。

哪种类型的口令能满足此类登录的需要并可视为最安全的口令?控制台电缆使能使能加密口令VTY下列有关在Cisco IOS 设备上运行配置文件的陈述,哪一项是正确的?修改配置文件会立即对设备的操作造成影响。

配置文件存储在NVRAM 中。

可使用erase running-config命令删除配置文件。

路由器重新启动时会自动保存配置文件。

哪种口令在创建时自动加密?vtyaux控制台电缆使能加密口令使能口令由于发生安全规规事件,必须更改路由器口令。

从以下配置项可获知什么信息?(选择两项。

)Router(config)#line vty 0 3Router(config-line)# password c13c0Router(config-line)#login这些配置项对远程访问指定了三条Telnet 线路。

相关文档
最新文档