CCNA(200-301)题库及答案

合集下载

CCNA(200-301)题库及答案

CCNA(200-301)题库及答案

Exam AQUESTION 1A network engineer must create a diagram of a multivendor network.which command must be configured on the Cisco devices so that the topology of the network can be mapped?A.Device(config)#lldp runB.Device(config)#cdp runC.Device(config)# cdp enableD.Device(config)# flow-sampler-map topologyCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 2Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?A.CPU ACLB.TACACSC.Flex ACLD.RADIUSCorrect Answer: ASection: (none)ExplanationExplanation/Reference:Reference:https:///c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.htmlQUESTION 3When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A.IKEv2B.IKEv1C.IPsecD.MD5Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 4How do TCP and UDP differ in the way that they establish a connection between two endpoints?A.TCP use the three-way handshake,and UDP dose no guarantee message deliveryB.TCP use synchronization packets,and UDP uses acknowledgement packetsC.UDP provides reliable message transfer,and TCP is a connectionless protocol.D.UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.Correct Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 5What are two reasons that cause late collisions to increment on an Ethernet interface?(choose two)A.when the sending device waits 15 seconds before sending the frame againB.when the cable length limits are exceededC.when one side of the connection is configured for half-duplexD.when Carner Sense Multiple Access/Collision Detection is usedE.when a collision occurs after the 32nd byte of a frame has been transmittedCorrect Answer: BDSection: (none)ExplanationExplanation/Reference:QUESTION 6A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A.It allows the traffic to pass through unchangedB.It drops the trafficC.It tags the traffic with the default VLAND.It tags the traffic with the native VLANCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 7Refer to the exhibit. The show ip ospf interface command has been executed on R1 How is OSPF configured?A.The interface is not participating in OSPFB.A point-to-point network type is configuredC.The default Hello and Dead timers are in useD.There are six OSPF neighbors on this interfaceCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 8What benefit does controller-based networking provide versus traditional networking?A.provides an added layer of security to protect from DDoS attacksbines control and data plane functionality on a single device to minimize latencyC.moves from a two-tier to a three-tier network architecture to provide maximum redundancyD.allows configuration and monitoring of the network from one centralized pointCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 9When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?A.The floating static route must have a higher administrative distance than the primary route so it is used as a backupB.The administrative distance must be higher on the primary route so that the backup route becomes secondary.C.The floating static route must have a lower administrative distance than the primary route so it is used as a backupD.The default-information originate command must be configured for the route to be installed into the routing tableCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 10Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?A.onB.autoC.activeD.desirableCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 11What are two descriptions of three-tier network topologies? (Choose two.)A.The distribution layer runs Layer 2 and Layer 3 technologies.B.The network core is designed to maintain continuous connectivity when devices fail.C.The core layer maintains wired connections for each host.D.The core and distribution layers perform the same functionsE.The access layer manages routing between devices in different domains.Correct Answer: ABSection: (none)ExplanationExplanation/Reference:QUESTION 12Refer to the exhibit.which statement explains the configuration error message that is received?A.it belongs to a private IP address rangeB.the router dose not support /28 maskC.it is a network IP addressD.it is a broadcast IP addressCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 13what is the expected outcome when an EUI-64 address is generated?A.The seventh bit of original MAC address of the interface is invertedB.The interface ID is configured as a random 64-bit valueC.The characters FE80 are inserted at the beginning of the MAC address of the interfaceD.The MAC address of the interface is used as the interface ID without modificationCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 14Which function does an SNMP agent perform?A.It manages routing between Layer 3 devices in a network,B.It coordinates user authentication between a network device and a TACACS+ or RADIUS server.C.It sends information about MIB variables in response to requests from the NMS.D.It requests information from remote network nodes about catastrophic system events.Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 15Refer to the exhibit.The default-information originate command is configured under the R1 OSPF configuration.After testing,workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet.wihch action corrects the configuration issue?A.Add the default-information originate command on R2B.Add the always keyword to the default-information originate command on R1C.Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1D.Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 16What are two benefits of network automation? (Choose two)A.reduced operational costsB.reduced hardware footprintC.faster changes with more reliable resultsD.fewer network failuresE.increased network securityCorrect Answer: ACSection: (none)ExplanationExplanation/Reference:QUESTION 17Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-standard protocol?(choose two) A.interface GigabitEthernet0/0/1Channel-group 10 mode activeB.interface GigabitEthernet0/0/1Channel-group 10 mode autoC.interface GigabitEthernet0/0/1Channel-group 10 mode onD.interface port-channel 10no switchportip address 172.16.0.1 255.255.255.0E.interface port-channel 10switchportSwitchport mode trunkCorrect Answer: ADSection: (none)ExplanationExplanation/Reference:QUESTION 18Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A.enable secretB.service password-encryptionername Cisco password encryptD.enable passwordCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 19R1 has learned route 10.10.10.0/24 via numerous routing protocols,which route is installed?A.route with the lowest costB.route with the shortest prefix lengthC.route with the next hop that has the highest IPD.route with the lowest administrative distanceCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 20which network allows devices to communicate without the need to access the internet?A.172.9.0.0/16B.172.28.0.0/16C.192.0.0.0/18D.209.165.201.0/24Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 21Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?A.dual algorithmB.metricC.administrative distanceD.hop countCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 22which command must be entered when a device is configured as an NTP server?A.ntp masterB.ntp severC.ntp authenticateD.ntp peerCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 23When OSPF learns multiple paths to a network, how does it select a route?A.It multiple the active K value by 256 to calculate the route with the lowest metric.B.For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowestbandwidth.C.It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowestcost.D.It count the umber of hops between the source router and the destination to determine the router with the lowest metricCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 24What is a characteristic of spine-and-leaf architecture?A.It provides variable latency.B.Each link between leaf switches allows for higher bandwidth.C.Each device is separated by the same number of hops.D.It provides greater predictability on STP blocked ports.Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 25Which two outcomes are predictable behaviors for HSRP? (Choose two)A.The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.B.The two routers negotiate one router as the active router and the other as the standby routerC.Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced betweenthem.D.The two routers synchronize configurations to provide consistent packet forwardingE.The two routed share the same IP address, and default gateway traffic is load-balanced between themCorrect Answer: ABSection: (none)ExplanationExplanation/Reference:QUESTION 26Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?A.explicitly assign a link-local addressB.disable the EUI-64 bit processC.enable SLAAC on an interfaceD.configure a stateful DHCPv6 server on the networkCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 27Refer to the exhibit. What is the effect of this configuration?A.The switch port interface trust state becomes untrustedB.The switch port remains administratively down until the interface is connected to another switchC.Dynamic ARP inspection is disabled because the ARP ACL is missingD.The switch port remains down until it is configured to trust or untrust incoming packetsCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 28In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?A. A spine switch and a leaf switch can be added with redundant connections between themB. A spine switch can be added with at least 40 GB uplinksC. A leaf switch can be added with connections to every spine switchD. A leaf switch can be added with a single connection to a core spine switchCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 29Refer to the exhibit.Router R1 is running three different routing protocols.Which route characteristic is used by the router to forward the packet that receives fordestination IP 172.16.32.1?A.metricB.longest prefixC.costD.administrative distanceCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 30Which configuration is needed to generate an RSA key for SSH on a router?A.Configure the version of SSHB.Configure VTY access.C.Create a user with a passwordD.Assign a DNS domain nameCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 31Which API is used in controller-based architectures to interact with edge devices?A.overlayB.northboundC.underlayD.southboundCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 32Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1.which configuration accomplishes this task?A.R1# config tR1(config)# ip routingR1(config)# ip route default-route 192.168.1.1B.R1# config tR1(config)# ip routingR1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1C.R1# config tR1(config)# ip routingR1(config)# ip route 192.168.1.1 0.0.0.0 0.0.0.0D.R1# config tR1(config)# ip routingR1(config)# ip default-gateway 192.168.1.1Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 33What is a benefit of using a Cisco Wireless LAN Controller?A.Central AP management requires more complex configurationsB.Unique SSIDs cannot use the same authentication methodC.It supports autonomous and lightweight APsD.It eliminates the need to configure each access point individuallyCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 34An engineer must configure a /30 subnet between two routers.which usable IP address and subnet mask combination meets this criteria?A.interface e0/0description to HQ-A370:98968ip address 10.2.1.3 255.255.255.252B.interface e0/0description to HQ-A370:98968ip address 192.168.1.1 255.255.255.248C.interface e0/0description to HQ-A370:98968ip address 172.16.1.4 255.255.255.248D.interface e0/0description to HQ-A370:98968ip address 209.165.201.2 255.255.255.252Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 35Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?A.snifferB.meshC.flexconnectD.localCorrect Answer: CSection: (none)ExplanationExplanation/Reference:https:///c/en/us/td/docs/wireless/controller/8-5/configguide/b_cg85/flexconnect.htmlQUESTION 36Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A.passiveB.mode onC.autoD.activeCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 37which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?IP encryptionB.SAE encryptionC.AES encryptionD.scrambled encryption keyCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 38Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1.The new circuit uses eBGP and teams the route to VLAN25 from the BGP path. What is the expected behavior for the traffic flow for route10.10.13.0/25?A.Traffic to 10.10.13.0.25 is load balanced out of multiple interfacesB.Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.C.Traffic to 10.10.13.0/25 is a symmetricalD.Route 10.10.13.0/25 learned via the Gi0/0 interface remains in the routing tableCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 39Refer to the exhibit.How does router R1 handle traffic to 192.168.10.16?A.It selects the EIGRP route because it has the lowest administrative distanceB.It selects the RIP route because it has the longest prefix inclusive of the destination addressC.It selects the OSFP route because it has the lowest costD.It selects the IS-IS route because it has the shortest prefix inclusive of the destination addressCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 40Which two actions influence the EIGRP route selection process? (Choose two)A.The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.B.The router calculates the best backup path to the destination route and assigns it as the feasible successor.C.The router calculates the feasible distance of all paths to the destination routeD.The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the linkE.The router must use the advertised distance as the metric for any given routeCorrect Answer: BCSection: (none)ExplanationExplanation/Reference:QUESTION 41Refer to the exhibit.which two commands were used to create port channel 10?(choose two)A.int range g0/0-1Channel-group 10 mode activeB.Bint range g0/0-1Channel-group 10 mode desirableC.int range g0/0-1Channel-group 10 mode passiveD.int range g0/0-1Channel-group 10 mode autoE.int range g0/0-1Channel-group 10 mode onCorrect Answer: ACSection: (none)ExplanationExplanation/Reference:QUESTION 42What is a difference between RADIUS and TACACS+?A.TACACS+ encrypts only password information and RADIUS encrypts the entire payloadB.RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commandsC.RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authenticationD.TACACS+ separates authentication and authorization, and RADIUS merges themCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 43Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server.Which configuration when applied to switch A accomplishes this task?A.B.C.D.Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 44Refer to the exhibit. How does the router manage traffic to 192.168.12.16?A.It selects RIP route because it has the longest prefix inclusive of the destination addressB.It chooses the EIGRP route because it has the lowest administrative distanceC.It load-balances traffic between all three routesD.It chooses the OSPF route because it has the longest prefix inclusive of the destination address Correct Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 45What is an advantage of Cisco DNA Center versus traditional campus device management?A.It supports numerous extensibility options including cross-domain adapters and third-party SDKs.B.It supports high availability for management functions when operating in cluster mode.C.It enables easy autodiscovery of network elements m a brownfield deployment.D.It is designed primarily to provide network assuranceCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 46While examining excessive traffic on the network,it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two)A.The packets fail to match any permit statementB.A matching permit statement is too high in the access testC.A matching deny statement is too high in the access listD.A matching permit statement is too broadly definedE.The ACL is emptyCorrect Answer: BDSection: (none)ExplanationExplanation/Reference:QUESTION 47Which design element is a best practice when deploying an 802.11b wireless infrastructure?A.disabling TPC so that access points can negotiate signal levels with their attached wireless devices.B.setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC.allocating non overlapping channels to access points that are in close physical proximity to one anotherD.configuring access points to provide clients with a maximum of 5 MbpsCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 48How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?A.Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management optionsB.Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management.C.Cisco DNA Center device management can deploy a network more quickly than traditional campus device managementD.Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management.Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 49Which two actions are performed by the Weighted Random Early Detection mechanism?(Choose two)A.It drops lower-priority packets before it drops higher-priority packetsB.It can identify different flows with a high level of granularityC.It guarantees the delivery of high-priority packetsD.It can mitigate congestion by preventing the queue from filling upE.IT supports protocol discoveryCorrect Answer: ADSection: (none)ExplanationExplanation/Reference:加权随机先期检测(WRED:Weighted Random Early Detection)是将随机先期检测与优先级排队结合起来,这种结合为高优先级分组提供了优先通信处理能力。

CCNA中英对照题库(选择题)

CCNA中英对照题库(选择题)

CCNA(200-120)题库中英对照整理于:2015年3月31日版本:1.2声明:本题库来源互联网(鸿鹄论坛)本题库为英文考试原版左右选择题中文考试为随机抽取英文题的中译版此题库非中文考试题库,而是英文题库手动翻译此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。

如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。

QUESTION001Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做?Router1 will strip off the source MAC address and replace it with the MACaddress 0000.0c36.6965.R1会剥离源MAC地址,以0000:0C36.6965代替。

Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源IP地址,以192.168.40.1代替。

Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.R1会剥离源MAC地址,以0000:0C36.6965代替。

Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.R1会剥离目的IP地址,以192.168.40.1代替。

CCNA第二 部分考试题

CCNA第二 部分考试题

1、解决路由环问题的方法有____ABD_____A. 水平分割B. 路由保持法C. 路由器重启D. 定义路由权的最大值2、下面哪一项正确描述了路由协议_______C__A. 允许数据包在主机间传送的一种协议B. 定义数据包中域的格式和用法的一种方式C. 通过执行一个算法来完成路由选择的一种协议D. 指定MAC地址和IP地址捆绑的方式和时间的一种协议3、以下哪些内容是路由信息中所不包含的_____A____A. 源地址B. 下一跳C. 目标网络D. 路由权值4、以下说法那些是正确的_____BD____A. 路由优先级与路由权值的计算是一致的B. 路由权的计算可能基于路径某单一特性计算,也可能基于路径多种属性C. 如果几个动态路由协议都找到了到达同一目标网络的最佳路由,这几条路由都会被加入路由表中D. 动态路由协议是按照路由的路由权值来判断路由的好坏,并且每一种路由协议的判断方法都是不一样的5、IGP的作用范围是________C_A. 区域内B. 局域网内C. 自治系统内D. 自然子网范围内6、距离矢量协议包括____AB___A. RIPB. IGRPC. IS-ISD. OSPF7、关于矢量距离算法以下那些说法是错误的___A____A. 矢量距离算法不会产生路由环路问题B. 矢量距离算法是靠传递路由信息来实现的C. 路由信息的矢量表示法是(目标网络,metric)D. 使用矢量距离算法的协议只从自己的邻居获得信息8、如果一个内部网络对外的出口只有一个,那么最好配置_____A____A. 缺省路由B. 主机路由C. 动态路由10、在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有_____A_C_A. 路由的优先级B. 路由的发布者C. 路由的metirc值D. 路由的生存时间9、在RIP协议中,计算metric值的参数是_D________A. MTUB. 时延C. 带宽D. 路由跳数10、路由协议存在路由自环问题______A___A. RIPB. BGPC. OSPFD. IS-IS11、下列关于链路状态算法的说法正确的是: ___D______A. 链路状态是对路由的描述B. 链路状态是对网络拓扑结构的描述C. 链路状态算法本身不会产生自环路由D. OSPF和RIP都使用链路状态算法12、在OSPF同一区域(区域A)内,下列说法正确的是____D_____A. 每台路由器生成的LSA都是相同的B. 每台路由器根据该最短路径树计算出的路由都是相同的C. 每台路由器根据该LSDB计算出的最短路径树都是相同的D. 每台路由器的区域A的LSDB(链路状态数据库)都是相同的13、在一个运行OSPF的自治系统之内: _AD________A. 骨干区域自身也必须是连通的B. 非骨干区域自身也必须是连通的C. 必须存在一个骨干区域 ( 区域号为0 )D. 非骨干区域与骨干区域必须直接相连或逻辑上相连14、下列静态路由配置正确的是__D_______A. ip route 129.1.0.0 16 serial 0B. ip route 10.0.0.2 16 129.1.0.0C. ip route 129.1.0.0 16 10.0.0.2D. ip route 129.1.0.0 255.255.0.0 10.0.0.215、以下不属于动态路由协议的是______B___A. RIPB. ICMPC. IS-ISD. OSPf16、三种路由协议RIP 、OSPF 、BGP和静态路由各自得到了一条到达目标网络,路由器默认情况下,最终选选定____D____作为最优路由A. RIPB. OSPFC. BGPD.静态路由17、IGP 包括如下哪些协议_ABD________A. RIPB. BGPC. IS-ISD. OSPF18、路由环问题会引起_______A_A. 慢收敛B. 广播风暴C. 路由器重起D. 路由不一致19、以下哪些路由表项要由网络管理员手动配置_A_______A. 静态路由B. 直接路由C. 动态路由D. 以上说法都不正确20、关于RIP协议,下列说法正确的有: ________AC_A. RIP协议是一种IGPB. RIP协议是一种EGPC. RIP协议是一种距离矢量路由协议D. RIP协议是一种链路状态路由协议21、RIP协议是基于_____A____A. UDPB. TCPC. ICMPD. Raw IP22、RIP协议的路由项在多少时间内没有更新会变为不可达? __C_______A. 90sB. 120sC. 180sD. 240s23、解决路由环路的方法有______ABCDA. 水平分割B. 抑制时间C. 毒性逆转D. 触发更新24、RIP协议在收到某一邻居网关发布而来的路由信息后,下述对度量值的正确处理有哪些?_AD________A. 对本路由表中没有的路由项,只在度量值少于不可达时增加该路由项B. 对本路由表中已有的路由项,当发送报文的网关相同时,只在度量值减少时更新该路由项的度量值C. 对本路由表中已有的路由项,当发送报文的网关不同时,只在度量值减少时更新该路由项的度量值D. 对本路由表中已有的路由项,当发送报文的网关相同时,只要度量值有改变,一定会更新该路由项的度量值25、关于RIP V1和RIP V2,下列说法哪些正确? _BC_______A. RIP V1报文支持子网掩码B. RIP V2报文支持子网掩码C. RIP V2缺省使用路由聚合功能D. RIP V1只支持报文的简单口令认证,而RIP V2支持MD5认证26、在rip中metric等于_____D____为不可达A. 8B. 10C. 15D. 1627、RIP协议引入路由保持机制的作用是____B_____A. 节省网络带宽B. 防止网络中形成路由环路C. 将路由不可达信息在全网扩散D. 通知邻居路由器哪些路由是从其处得到28、与动态路由协议相比,静态路由有哪些优点? AB_______A. 带宽占用少B. 简单C. 路由器能自动发现网络拓扑变化D. 路由器能自动计算新的路由29、在RIP路由协议中,以下有关减少路由自环的方法正确的是__ABC__D_____A. 触发更新是从减少路由自环发生的概率方面来考虑问题的B. 水平分割的方法只对消除两台路由器之间的自环有作用C. 设置抑制时间的方法可能导致路由的慢收敛D. 为了减轻路由自环产生的后果,RIP协议规定了最大跳数30、路由协议在收到某一邻居发布而来的路由信息后,下述对度量值的正确处理有哪些? __BD_______A. 对本路由表中已有的路由项,当发送该路由信息的邻居相同时,只在度量值减少时更新该路由项的度量值B. 对本路由表中已有的路由项,当发送该路由信息的邻居相同时,只要度量值有改变,一定会更新该路由项的度量值C. 对本路由表中已有的路由项,当发送该路由信息的邻居不同时,只要度量值有改变,一定会更新该路由项的度量值D. 对本路由表中没有的路由项,只在度量值少于不可达时增加该路由项31、下面哪些协议是可路由协议(routed protocol)? ____AB_____A. IPB. IPXC. RIPD. NETBEUI32、以下协议属于路由协议的是_____ABCG____A. RIPB. IS-ISC. OSPFD. PPPE. IPF. IPXG. BGP33、下列哪些技术有助于避免路由环路? ___BCDEF______A. 直通交换B. 采用链路状态路由协议C. 水平分割D. 路由保持(holddown)E. 定义最大跳计数F. 路由中毒(poison reverse)34、静态路由的优点包括: ___AD______A. 管理简单B. 自动更新路由C. 提高网络安全性D. 节省带宽E. 收敛速度快35、以下对于缺省路由描述正确的是: ___BC______A. 缺省路由是优先被使用的路由B. 缺省路由是最后一条被使用的路由C. 缺省路由是一种特殊的静态路由D. 缺省路由是一种特殊的动态路由36、对路由器A配置RIP协议,并在接口S0(IP地址为10.0.0.1/24)所在网段使能RIP路由协议,在全局配置模式下使用的第一条命令是: ______A___A. Router ripB. rip 10.0.0.0C. network 10.0.0.1D. network 10.0.0.037、支持可变长子网掩码的路由协议有: __BCD_______A. RIP v1B. RIP v2C. OSPFD. IS-IS38、以下对路由优先级的说法,正确的是____BC_____A. 仅用于RIP和OSPF之间B. 用于不同路由协议之间C. 是路由选择的重要依据D. 直接路由的优先级缺省为039、您认为下列说法哪些是不正确的? ____CD__A. 每条静态路由的优先级也可以不相同B. 缺省情况下路由优先级的次序是 OSPF > RIPC. 路由算法产生一种权值来表示路由的好坏。

CCNA路由部分测试题(含答案)

CCNA路由部分测试题(含答案)

CCNA路由部分测试题(共50题)1.当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是什么?A.丢掉该分组B.将该分组分片C.转发该分组D.以上答案均不对ANSWER:A2.IGP 的作用范围是?A.区域内B.自然子网范围内C.局域网内D.自治系统内ANSWER:Dㄨ3.距离矢量协议包括?(多选)A.RIPB.IS-ISC.OSPFD.EIGRPANSWER:A Dㄨ4.解决路由环问题的办法是?(多选)A.定义路由权的最大值B.路由保持法C.水平分割D.路由器重启ANSWER:A B C5.在rip 中metric 等于什么值为不可达?A.8B.10C.15D.16ANSWER:Dㄨ6.下列关于OSPF 协议的说法正确的是?(多选)A.OSPF 支持基于接口的报文验证B.OSPF 支持到同一目的地址的多条等值路由C.OSPF 是一个基于链路状态算法的边界网关路由协议D.OSPF 发现的路由可以根据不同的类型而有不同的优先级ANSWER:A B Dㄨ7.如果一个内部网络对外的出口只有一个,那么最好配置?A.缺省路由B.主机路由C.动态路由ANSWER:A8.以下不属于动态路由协议的是?A.RIPB.ICMPC.EIGRPD.OSPFANSWER:B9.关于矢量距离算法以下哪些说法是错误的?A.矢量距离算法不会产生路由环路问题B.矢量距离算法是靠传递路由信息来实现的C.路由信息的矢量表示法是(目标网络,metric)D.使用矢量距离算法的协议只从自己的邻居获得信息ANSWER:A10.以下哪些路由表项要由网络管理员手动配置?(多选)A.静态路由B.直接路由C.缺省路由D.动态路由ANSWER:A C11.关于RIP 协议,下列说法正确的有?(多选)A.RIP 协议是一种IGPB.RIP 协议是一种EGPC.RIP 协议是一种距离矢量路由协议D.RIP 协议是一种链路状态路由协议ANSWER:A Cㄨ12.下列关于链路状态算法的说法正确的是?(多选)A.链路状态是对路由的描述B.链路状态是对网络拓扑结构的描述C.链路状态算法本身不会产生自环路由D.OSPF 和RIP 都使用链路状态算法ANSWER:B C13.路由器中时刻维持着一张路由表,这张路由表可以是静态配置的,也可以是什么协议产生的?A.生成树协议B.链路控制协议C.动态路由协议D.被承载网络层协议ANSWER:Cㄨ14.在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有?(多选)A.路由的优先级B.路由的发布者C.路由的metric 值D.路由的生存时间ANSWER:A C15.下面哪一项正确描述了路由协议?A.允许数据包在主机间转送的一种协议B.定义数据包中域的格式和用法的一种方式C.通过执行一个算法来完成路由选择的一个协议D.指定MAC 地址和IP 地址捆绑的方式和时间的一种协议ANSWER:Cㄨ16.IGP 包括如下哪些协议?(多选)A.RIPB.BGPC.IS-ISD.EIGRPE.OSPFANSWER:A C D Eㄨ17.RIP 协议引入路由保持机制的作用是?A.节省网络带宽B.防治网络中形成路由环路C.将路由不可达信息在全网扩散D.通知邻居路由器哪些路由是从其处得到ANSWER:B18.对路由理解正确的是?A.路由是路由器B.路由是信息在网络路径的交叉点C.路由是用以配置报文的目的地址D.路由就是指导报文发送的路径信息ANSWER:Dㄨ19.路由协议RIP,OSPF和静态路由各自得到了条到达目标网络,在CISCO路由器默认情况下,最终选选定哪种路由作为最优路由?A.RIPB.OSPFC.静态路由ANSWER:C20.在RIP 协议中,计算metric 值的参数是?A.MTUB.时延C.带宽D.路由跳数ANSWER:D21.衡量路由算法好坏的原则不包括?A.快速收敛性B.灵活性,弹性C.拓扑结构先进D.选径是否是最佳ANSWER:Cㄨ22.RIP 协议是基于?A.UDPB.TCPC.ICMPD.Raw IPANSWER:A23.禁止RIP 协议的路由聚合功能的命令是?A.no route ripB.summanyC.no auto summanyD.undo network 10.0.0.0ANSWER:Cㄨ24.解决路由环路的方法有?(多选)A.水平分割B.抑制时间C.毒性逆转D.触发更新ANSWER:A B C Dㄨ25.路由环问题会引起哪些问题?(多选)A.慢收敛B.广播风暴C.路由器重起D.路由不一致ANSWER:A D26.下列哪些路由协议存在路由自环问题?(多选)A.RIPB.IGRPC.OSPFD.IS-ISE.EIGRPANSWER:A B27.关于RIP V1 和RIP V2,下列说法哪些正确?(多选)A.RIP V1 报文支持子网掩码B.RIP V2 报文支持子网掩码C.RIP V2 缺省使用路由聚合功能D.RIP V1 只支持报文的简单口令认证,而RIP V2 支持MD5 认证ANSWER:B Cㄨ28.在一个运行OSPF 的自治系统之内?(多选)A.骨干区域自身也必须连通的B.非骨干区域自身也必须连通的C.必须存在一个骨干区域(区域号为0)D.非骨干区域与骨干区域必须直接相连或逻辑上相连ANSWER:A C Dㄨ29.以下关于Rip 路由聚合的说法正确的是?(多选)A.Rip V1 默认支持路由聚合,需要时可以关闭路由聚合功能B.华为Quidway 系列路由器Rip V2 的实现可以关闭路由聚合功能C.Rip V1 不支持子网路由聚合到一个非自然子网路由D.Rip V2 支持子网路由聚合到一个非自然子网路由ANSWER:B C D30.假设有这样的组网实例:两台路由器(假设为RTA 和RTB)通过串口相接,其中RTA 的串口IP 地址是10.110.0.1/30,RTB 的串口IP 地址是10.110.0.2/30,RTA 通过以太口连接的本地局域网的IP 地址是11.110.0.0/16,RTB 通过以太口连接的本地局域网IP 地址是11.111.0.0/16,在上面所有的接口上都启动RIP V1(仅仅RIP V1)协议,那么,下列说法正确的是?(多选)A.在RTA 的本地局域网上的计算机可以访问在RTB 本地局域网上的计算机B.在RTB 的本地局域网上的计算机可以访问在RTA 本地局域网上的计算机C.在RTA 的本地局域网上的计算机不能访问在RTB 本地局域网上的计算机D.在RTB 的本地局域网上的计算机不能访问在RTA 本地局域网上的计算机ANSWER:C Dㄨ31.根据路由的目的地不同,路由表可被划分为?(多选)A.子网路由B.直连路由C.缺省路由D.主机路由E.静态路由ANSWER:A D32.对路由器A 配置RIP 协议,并在接口S0(IP 地址为10.0.0.1/24)所在网段使能RIP 路由协议,在全局配置模式下使用的第一条命令是?A.router ripwork allwork 10.0.0.1work 10.0.0.0ANSWER:Aㄨ33.当接口运行在RIP-2 广播方式时,它可以接受的报文有?(多选)A.RIP-1 广播报文B.RIP-1 组播报文C.RIP-2 广播报文D.RIP-2 组播报文ANSWER:A Cㄨ34.RIP 协议的路由项在多少时间内没有更新会变为不可达?A.90sB.120sC.180sD.240sANSWER:Cㄨ35.VLSM 的含义是?A.Variable Length Subnet MaskingB.Variable Length Shortest MaskingC.Very Long/Shortest MaskingD.Variable Long Subnet MaskingE.Variable Length Short MeasurementANSWER:Aㄨ36.距离矢量路由协议使用水平分割(split horizon)技术的目的是什么?(多选)A.避免在毗邻路由器之间产生路由环路B.确保路由更新数据报文沿着接收路线方向发送C.与保持间隔(holddown)机制协同工作,为保持间隔的计算提供更多的可靠性D.代替路由中毒(poison reverse)算法ANSWER:A Cㄨ37.作为一个网络维护人员,对于OSPF 区域体系机构的原则必须有清楚地了解,下面的论述表达正确的是?(多选)A.所有的OSPF 区域必须通过边界路由器与区域0 相连,或采用OSPF 虚链路B.所有区域间通信必须通过骨干区域0,因此所有区域路由器必须包含到区域0 的路由C.单个区域不能包含没有物理链路的两个区域边界路由器D.虚链路可以穿越stub 区域ANSWER:A Bㄨ38.支持可变长子网掩码的路由协议有?(多选)A.RIP v1B.RIP v2C.OSPFD.EIGRPANSWER:B C Dㄨ39.因为在生成路由表的过程中,OSPF 协议需要进行复杂的SPF 算法来计算网络拓扑结构,所以相对距离矢量路由选择协议来说,它需要更大的开销,更多的延迟,更高的CPU 占用率。

CCNA认证精彩试题中文+问题详解

CCNA认证精彩试题中文+问题详解

CCNA认证试题一(附答案和解析)中文版(一)1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802.1(B) IEEE 802.2(C) IEEE 802.3(D) IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDIIEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5的定义以太网是一种计算机局域网组网技术。

IEEE制定的IEEE 802.3标准给出了以太网的技术标准。

它规定了包括物理层的连线、电信号和介质访问层协议的内容。

以太网是当前应用最普遍的局域网技术。

它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。

以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE-T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD介质访问控制方法。

电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会。

建会于1963年1月1日。

总部在美国纽约市。

在150多个国家中它拥有300多个地方分会。

目前会员数是36万。

专业上它有35个专业学会和两个联合会。

IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议。

IEEE定义的标准在工业界有极大的影响。

下面列出:IEEE802.3以太网标准802.3--------- 10Base以太网标准802.3u-------- 100Base-T(快速以太网)802.3z-------- 1000Base-X(光纤吉比特以太网)802.3ab-------- 1000Base-T(双绞线吉比特以太网)2、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ()(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE注:IP地址中关键是看她的主机位,将子网掩码划为二进制,1对应上面的地址是网络位,0对应的地址是主机位192.168.19.255/20划为二进制为:11000000.10101000.00010011.1111111111111111.11111111.11110000.00000000主机位变成全0表示这个IP的网络地址主机槐涑扇?表示这个IP的广播地址RFC1918文件规定了保留作为局域网使用的私有地址:10.0.0.0 - 10.255.255.255 (10/8 prefix)172.16.0.0 - 172.31.255.255 (172.16/ 12 prefix)192.168.0.0 - 192.168.255.255 (192.168/16 prefix)3、Quidway系列路由器在执行数据包转发时,下列哪些项没有发生变化(假定没有使用地址转换技术)?()(A) 源端口号(B) 目的端口号(C) 源网络地址(D) 目的网络地址(E) 源MAC地址(F) 目的MAC地址答案:ABCD参考知识点:路由功能就是指选择一条从源网络到目的网络的路径,并进行数据包的转发。

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案

完整版CCNA测试题库及答案描述载波侦听多路由访问/冲突检测(CSMA/CD)的工作原理。

CSMA/CD是一种帮助设备均衡共享带宽的协议,可避免两台设备同时在网络介质上传输数据。

虽然他不能消除冲突,但有助于极大的减少冲突,进而避免重传,从而提高所的设备的数据传输效率。

区分半双工和全双工通信。

并指出两种方法的需求。

与半双工以太网使用一对导线不同,全双工以太网使用两队导线,全双工使用不同的导线来消除冲突,从而允许同时发送和接收数据,而半双工可接收或发送数据,但不能同时接收和发送数据,且仍会出现冲突。

要使用全双工,电缆两端的设备都必须支持全双工,并配置成一全双模式运行。

描述MAC地址的组成部分以及各部分包含的信息。

MAC(硬件)地址时一种使用十六进制表示的地址,长48位(6B)。

其中前24位(3B)称为OUI(Organizationally Unique Idebtifier,组织唯一表示符),有IEEE分配给NIC制造商;余下的部分呢唯一地标识了NIC识别十进制数对应的二进制值和十六进制值。

用这三种格式之一表示的任何数字都可以转换为其他两种格式,能够执行这种转换对理解IP地址和子网划分至关重要。

识别以太网帧中与数据链路层相关的字段。

在以太网中,与数据链路层相关的字段包括前导码,帧其实位置分隔符,目标MAC地址,源MAC地址,长度或者类型以及帧校验序列。

识别以太网布线相关的IEEE标准。

这些标准描述了各种电缆类型的功能和物理特征,包括(但不限于)10Base2、10Base5和10BaseT。

区分以太网电缆类型及其用途。

以太网电缆分3种:直通电缆,用于将PC或路由器的以太网接口连接到集线器或交换机;交叉电缆。

用于将集线器连接到集线器,集线器连接到交换机,交换机连接到交换机以及PC连接到PC;反转电缆,用于PC和路由器或交换机之间建立控制台连接。

描述数据封装过程及其在分组创建中的作用。

数据封装指的是在OSI模型各层给数据添加信息的过程,也成为分组创建。

新10月CCNA题库word版1~100题共24页

新10月CCNA题库word版1~100题共24页

QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?A. %B. @C. >D. $E. #QUESTION 2Which command shows system hardware and software version information?A. show configurationB. show environmentC. show inventoryD. show platformE. show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Qtrunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 thenative VLAN is not specified.What will happen in this scenario?A. 802.1Q giants frames could saturate the link.B. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.C. A native VLAN mismatch error message will appear.D. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.QUESTION 4Which command would correctly configure a serial port on a router with the last usable host address in the192.216.32.32/29 subnet?A. Router(config-if)# ip address 192.216.32.38 255.255.255.240B. Router(config-if)# ip address 192.216.32.39 255.255.255.224C. Router(config-if)# ip address 192.216.32.63 255.255.255.248D. Router(config-if)# ip address 192.216.32.39 255.255.255.248E. Router(config-if)# ip address 192.216.32.63 255.255.255.248F. Router(config-if)# ip address 192.216.32.38 255.255.255.248QUESTION 5The network default gateway applying to a host by DHCP is 192.168.5.33/28. Which option is the valid IPaddress of this host?A. 192.168.5.55B. 192.168.5.47C. 192.168.5.40D. 192.168.5.32E. 192.168.5.14QUESTION 6Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0? (Choose two.)A. 113.10.4.0B. 186.54.3.0C. 175.33.3.255D. 26.35.2.255E. 17.35.36.0QUESTION 7The network administrator has asked you to check the status of the workstation's IP stack by pinging theloopback address. Which address would you ping to perform this task?A. 10.1.1.1B. 127.0.0.1C. 192.168.0.1D. 239.1.1.1QUESTION 8Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IPaddress of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts toping between the hosts are unsuccessful. What two things can be done to allow communications betweenthe hosts? (Choose two.)A. Replace the straight-through cable with a crossover cable.B. Change the subnet mask of the hosts to /25.C. Change the subnet mask of the hosts to /26.D. Change the address of Workstation A to 192.0.2.15.E. Change the address of Workstation B to 192.0.2.111.QUESTION 9Your ISP has given you the address 223.5.14.6/29 to assign to your router's interface. They have alsogiven you the default gateway address of 223.5.14.7. After you have configured the address, the router isunable to ping any remote devices. What is preventing the router from pinging remote devices?A. The default gateway is not an address on this subnet.B. The default gateway is the broadcast address for this subnet.C. The IP address is the broadcast address for this subnet.D. The IP address is an invalid class D multicast address.QUESTION 10Which command is used to copy the configuration from RAM into NVRAM?A. copy running-config startup-configB. copy startup-config: running-config:C. copy running config startup configD. copy startup config running configE. write terminalQUESTION 11Which command is used to load a configuration from a TFTP server and merge the configuration intoRAM?A. copy running-config: TFTP:B. copy TFTP: running-configC. copy TFTP: startup-configD. copy startup-config: TFTP:QUESTION 12A system administrator types the command to change the hostname of a router. Where on the Cisco IFS isthat change stored?A. NVRAMB. RAMC. FLASHD. ROME. PCMCIAQUESTION 13Which command is used to configure a default route?A. ip route 172.16.1.0 255.255.255.0 0.0.0.0B. ip route 172.16.1.0 255.255.255.0 172.16.2.1C. ip route 0.0.0.0 255.255.255.0 172.16.2.1D. ip route 0.0.0.0 0.0.0.0 172.16.2.1QUESTION 14If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?(Choose two.)A. ip default-gateway 0.0.0.0B. ip route 172.16.2.1 0.0.0.0 0.0.0.0C. ip default-network 0.0.0.0D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1E. ip route 0.0.0.0 0.0.0.0 172.16.2.1QUESTION 15Which command would you configure globally on a Cisco router that would allow you to view directlyconnected Cisco devices?A. enable cdpB. cdp enableC. cdp runD. run cdpQUESTION 16Which command is used to see the path taken by packets across an IP network?A. show ip routeB. show routeC. tracerouteD. trace ip routeQUESTION 17Which command is used to debug a ping command?A. debug icmpB. debug ip icmpC. debug tcpD. debug packetQUESTION 18Which command displays CPU utilization?A. show protocolsB. show processC. show systemD. show versionQUESTION 19When configuring a serial interface on a router, what is the default encapsulation?A. atm-dxiB. frame-relayC. hdlcD. lapbE. pppQUESTION 20What must be set correctly when configuring a serial interface so that higher-level protocols calculate thebest route?A. bandwidthB. delayC. loadD. reliabilityQUESTION 21A company implements video conferencing over IP on their Ethernet LAN. The users notice that thenetwork slows down, and the video either stutters or fails completely. What is the most likely reason forthis?A. minimum cell rate (MCR)B. quality of service (QoS)C. modulationD. packet switching exchange (PSE)E. reliable transport protocol (RTP)QUESTION 22Which layer in the OSI reference model is responsible for determining the availability of the receivingprogram and checking to see if enough resources exist for that communication?A. transportB. networkC. presentationD. sessionE. applicationQUESTION 23Data transfer is slow between the source and destination. The quality of service requested by the transportlayer in the OSI reference model is not being maintained. To fix this issue, at which layer should thetroubleshooting process begin?A. presentationB. sessionC. transportD. networkE. physicalQUESTION 24Which protocols are found in the network layer of the OSI reference model and are responsible for pathdetermination and traffic switching?A. LANB. routingC. WAND. networkQUESTION 25Which command reveals the last method used to powercycle a router?A. show reloadB. show bootC. show running-configD. show versionQUESTION 26Which three options are valid WAN connectivity methods? (Choose three.)A. PPPB. WAPC. HDLCD. MPLSE. L2TPv3CCNA考试报名1700元7F. ATMQUESTION 27Refer to the exhibit. Which WAN protocol is being used?A. ATMB. HDLCC. Frame RelayD. PPPQUESTION 28What is the difference between a CSU/DSU and a modem?A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signalsfrom a router to a leased line.B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signalsfrom a router to a leased line.C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signalsfrom a router to a phone line.D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signalsfrom a router to a phone line.QUESTION 29A network administrator must configure 200 switch ports to accept traffic from only the currently attachedCCNA考试报名1700元8host devices. What would be the most efficient way to configure MAC-level security on all these ports?A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port securitymac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port securitymac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have enddevices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each portand thenenter the commands on each switch for MAC address port-security.QUESTION 30When troubleshooting a Frame Relay connection, what is the first step when performing a loopback test?A. Set the encapsulation of the interface to HDLC.B. Place the CSU/DSU in local-loop mode.C. Enable local-loop mode on the DCE Frame Relay router.D. Verify that the encapsulation is set to Frame Relay.What occurs on a Frame Relay network when the CIR is exceeded?A. All TCP traffic is marked discard eligible.B. All UDP traffic is marked discard eligible and a BECN is sent.C. All TCP traffic is marked discard eligible and a BECN is sent.D. All traffic exceeding the CIR is marked discard eligible.QUESTION 32What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)A. They create split-horizon issues.B. They require a unique subnet within a routing domain.C. They emulate leased lines.D. They are ideal for full-mesh topologies.E. They require the use of NBMA options when using OSPF.QUESTION 33Refer to the exhibit. Addresses within the range 10.10.10.0/24 are not being translated to the 1.128.0/16range. Which command shows if 10.10.10.0/24 are allowed inside addresses?A. debug ip natB. show access-listC. show ip nat translationD. show ip nat statisticsQUESTION 34A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card. The client section of theaccess point does not list any active WLAN clients. What is a possible reason for this?A. The incorrect channel is configured on the client.B. The client's IP address is on the wrong subnet.C. The client has an incorrect pre-shared key.D. The SSID is configured incorrectly on the client.QUESTION 35Which two features did WPAv1 add to address the inherent weaknesses found in WEP? (Choose two.)CCNA考试报名1700元10艾迪飞论坛http://bbs.edify艾迪飞论坛http://bbs.edifyA. a stronger encryption algorithmB. key mixing using temporal keysC. shared key authenticationD. a shorter initialization vectorE. per frame sequence countersQUESTION 36Which two wireless encryption methods are based on the RC4 encryption algorithm? (Choose two.)A. WEPB. CCKMC. AESD. TKIPE. CCMPQUESTION 37What are two characteristics of RIPv2? (Choose two.)A. classful routing protocolB. variable-length subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to compute pathQUESTION 38Which two Ethernet fiber-optic modes support distances of greater than 550 meters?A. 1000BASE-CXCCNA考试报名1700元11艾迪飞论坛http://bbs.edify艾迪飞论坛http://bbs.edify艾迪飞论坛http://bbs.edifyB. 100BASE-FXC. 1000BASE-LXD. 1000BASE-SXE. 1000BASE-ZXQUESTION 39What two things will a router do when running a distance vector routing protocol? (Choose two.)A. Send periodic updates regardless of topology changes.B. Send entire routing table to all routers in the routing domain.C. Use the shortest-path algorithm to the determine best path.D. Update the routing table based on updates from their neighbors.E. Maintain the topology of the entire network in its database.QUESTION 40Refer to the exhibit. According to the routing table, where will the router send a packet destined for10.1.5.65?A. 10.1.1.2B. 10.1.2.2C. 10.1.3.3D. 10.1.4.4QUESTION 41Which command shows if an access list is assigned to an interface?A. show ip interface [interface] access-listsB. show ip access-lists interface [interface]C. show ip interface [interface]D. show ip access-lists [interface]QUESTION 42Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?A. The address is removed from the pool until the conflict is resolved.B. The address remains in the pool until the conflict is resolved.C. Only the IP detected by Gratuitous ARP is removed from the pool.D. Only the IP detected by Ping is removed from the pool.E. The IP will be shown, even after the conflict is resolved.QUESTION 43Refer to the exhibit. You are connected to the router as user Mike. Which command allows you to seeoutput from the OSPF debug command?A. terminal monitorB. show debuggingC. show sessionsD. show ip ospf interfaceQUESTION 44Refer to the exhibit. If number 2 is selected from the setup script, what happens when the user runs setupfrom a privileged prompt?A. Setup is additive and any changes will be added to the config script.B. Setup effectively starts the configuration over as if the router was booted for the first time.C. Setup will not run if an enable secret password exists on the router.D. Setup will not run, because it is only viable when no configuration exists on the router. QUESTION 45Refer to the exhibit. Which (config-router) command will allow the network represented on the interface tobe advertised by RIP?A. redistribute ethernet0B. network ethernet0CCNA考试报名1700元14艾迪飞论坛http://bbs.edify艾迪飞论坛http://bbs.edifyC. redistribute 10.12.0.0D. network 10.12.0.0QUESTION 46Refer to the exhibit. What information can be gathered from the output?A. One router is running RIPv1.B. RIP neighbor is 224.0.0.9.C. The network contains a loop.D. Network 10.10.1.0 is reachable.QUESTION 47Refer to the exhibit. What type of connection would be supported by the cable diagram shown?A. PC to routerB. PC to switchC. server to routerD. router to routerQUESTION 48Refer to the exhibit. What type of connection would be supported by the cable diagram shown?A. PC to routerB. PC to switchC. server to switchD. switch to routerQUESTION 49Which two statements describe the Cisco implementation of VLANs? (Choose two.)A. VLAN 1 is the default Ethernet VLAN.B. CDP advertisements are only sent on VLAN 1002.C. By default, the management VLAN is VLAN 1005.D. By default, the switch IP address is in VLAN 1005.E. VLAN 1002 through 1005 are automatically created and cannot be deleted.QUESTION 50Refer to the exhibit. What can be determined about the router from the console output?A. No configuration file was found in NVRAM.B. No configuration file was found in flash.C. No configuration file was found in the PCMCIA card.D. Configuration file is normal and will load in 15 seconds.QUESTION 52Refer to the exhibit. Which command would allow the translations to be created on the router?A. ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 19B. ip nat outside mynats 1.1.128.1 1.1.135.254 prefix-length 19C. ip nat pool mynats 1.1.128.1 1.1.135.254 prefix-length 18D. ip nat outside mynats 1.1.128.1 1.1.135.254 prefix-length 18QUESTION 53Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output asshown. At which OSI layer is the problem?A. data link layerB. application layerC. access layerD. session layerE. network layerQUESTION 54Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?A. 10.0.0.0B. 10.0.0.254C. 192.223.129.0D. 192.223.129.254QUESTION 55Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?A. The IP address for Server A is a broadcast address.B. The IP address for Workstation B is a subnet address.C. The gateway for Workstation B is not on the same subnet.D. The gateway for Server A is not on the same subnet.QUESTION 56Refer to the exhibit. What does the (*) represent in the output?A. Packet is destined for a local interface to the router.B. Packet was translated, but no response was received from the distant device.C. Packet was not translated, because no additional ports are available.D. Packet was translated and fast switched to the destination.QUESTION 57Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?A. (config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB. (config-if) ip nat outside overloadC. (config) ip nat inside source list 1 interface ethernet1 overloadD. (config-if) ip nat inside overloadQUESTION 58Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for172.16.12.10 if the traffic is processed by this ACL?A. Traffic will be dropped per line 30 of the ACL.B. Traffic will be accepted per line 40 of the ACL.C. Traffic will be dropped, because of the implicit deny all at the end of the ACL.D. Traffic will be accepted, because the source address is not covered by the ACL.QUESTION 59Refer to the exhibit. Which statement describes the effect that the Router1 configuration has on devices inthe 172.16.16.0 subnet when they try to connect to SVR-A using Telnet or SSH?A. Devices will not be able to use Telnet or SSH.B. Devices will be able to use SSH, but not Telnet.C. Devices will be able to use Telnet, but not SSH.D. Devices will be able to use Telnet and SSH.QUESTION 60What are three advantages of VLANs? (Choose three.)A. VLANs establish broadcast domains in switched networks.B. VLANs utilize packet filtering to enhance network security.C. VLANs provide a method of conserving IP addresses in large networks.D. VLANs provide a low-latency internetworking alternative to routed networks.E. VLANs allow access to network services based on department, not physical location.F. VLANs can greatly simplify adding, moving, or changing hosts on the network.QUESTION 61An administrator would like to configure a switch over a virtual terminal connection from locations outsideof the local LAN. Which of the following are required in order for the switch to be configured from a remotelocation? (Choose two.)A. The switch must be configured with an IP address, subnet mask, and default gateway.B. The switch must be connected to a router over a VLAN trunk.C. The switch must be reachable through a port connected to its management VLAN.D. The switch console port must be connected to the Ethernet LAN.E. The switch management VLAN must be created and have a membership of at least one switch port.F. The switch must be fully configured as an SNMP agent.QUESTION 62Which of the following host addresses are members of networks that can be routed across the publicInternet? (Choose three.)A. 10.172.13.65B. 172.16.223.125C. 172.64.12.29D. 192.168.23.252E. 198.234.12.95F. 212.193.48.254QUESTION 63Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to networkhosts? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.192QUESTION 64Which of the following are benefits of VLANs? (Choose three.)A. They increase the size of collision domains.B. They allow logical grouping of users by function.C. They can enhance network security.D. They increase the size of broadcast domains while decreasing the number of collision domains.E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.F. They simplify switch administration.Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three.)A. pingB. tracertC. ipconfigD. show ip routeE. winipcfgF. show interfacesQUESTION 67。

思科CCNA考试答案(全)

思科CCNA考试答案(全)

CCNA思科考试答案(全)第 1 章考试1一家拥有10 名员工的小型公司使用单个LAN 在计算机之间共享信息。

哪种类型连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如DSL)答案:4解析:对于这种小型办公室,比较适合通过被称为数字用户线路(DSL) 的常见宽带服务实现Internet 连接,这种服务由当地的电话服务提供商提供。

由于员工人数很少,带宽的问题并不突出。

如果公司较大,在远程站点有分支机构,则专用线路会更加适合。

如果公司员工需要通过Internet 与公司联系,则采用虚拟专用网。

2哪种网络情况需要使用WAN?员工工作站需要获取动态分配的IP 地址。

员工在出差时需要通过VPN 连接到公司电子邮件服务器。

分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。

员工需要访问托管在其建筑物内DMZ 中的公司Web 服务器上的网页。

答案:2解析:当出差的员工需要通过WAN 连接到公司电子邮件服务器时,VPN 将通过WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。

通过DHCP 获取动态IP 地址是LAN 通信的功能。

在企业园区的不同建筑物之间共享文件可通过LAN 基础设施来实现。

DMZ 是企业LAN 基础设施内一个受保护的网络。

3以下哪项描述了WAN 的特征?WAN 和LAN 在同一地理范围内运行,但有串行链路。

WAN 网络归运营商所有。

所有串行链路均被视为WAN 连接。

WAN 可提供到园区主干网的终端用户网络连接。

答案:2解析:WAN 可用于将企业LAN 互连到远程分支机构站点LAN 和远程工作人员站点。

WAN 归运营商所有。

虽然WAN 连接一般通过串行接口实现,但并不是所有串行链路均连接至WAN。

LAN(而非WAN)可在组织中提供终端用户网络连接。

4电路交换WAN 技术的两个常见类型是什么?(请选择两项。

CCNA考试题

CCNA考试题

C C N A考试题(总9页) -CAL-FENGHAI.-(YICAI)-Company One1-CAL-本页仅作为文档封面,使用请直接删除第一部分:选择题1:提供可靠数据传输、流控的是OSI的第几层()A、表示层B、网络层C、传输层D、会话层E、链路层2:子网掩码产生在那一层()A、表示层B、网络层C、传输层D、会话层3:当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是()A、丢掉该分组B、将该分组分片C、转发该分组D、以上答案均不对4:当一台主机从一个网络移到另一个网络时,以下说法正确的是()A、必须改变它的IP地址和MAC地址B、必须改变它的IP地址,但不需改动MAC地址C、必须改变它的MAC地址,但不需改动IP地址D、MAC地址、IP地址都不需改动5:ISO提出OSI的关键是()A、系统互联B、提高网络速度C、为计算机制定标准D、经济利益6:OSI参考模型按顺序有哪些层()A、应用层、传输层、网络层、物理层B、应用层、表示层、会话层、网络层、传输层、数据链路层、物理层C、应用层、表示层、会话层、传输层、网络层、数据链路层、物理层D、应用层、会话层、传输层、物理层7:LAN的拓扑形式一般以()为主。

A、总线型B、环型C、令牌环D、载波侦听与冲突检测CSMA/CD8:网段地址154.27.0.0的网络,若不做子网划分,能支持()台主机A、254B、1024C、65,534D、16,777,2069:路由器网络层的基本功能是()。

A、配置IP地址B、寻找路由和转发报文C、将MAC地址解释成IP地址10:选出基于TCP协议的应用程序()。

A、PINGB、TFTPC、TELNETD、OSPF11:某公司申请到一个C类IP地址,但要连接6个的子公司,最大的一个子公司有26台计算机,每个子公司在一个网段中,则子网掩码应设为()。

A、255.255.255.0B、255.255.255.128C、255.255.255.192D、255.255.255.22412:B类地址的缺省掩码是()。

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案.doc

CCNA第一学期各章习题和参考答案第二章网络通信1、TCP/IP网络接入层有何作用?A路径确定和数据包交换B数据表示、编码和控制C可靠性、流量控制和错误检测E将数据段划分为数据包2、下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)B发起数据通信D发送数据流F数据流最后的终止点3、下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)C LAN 中的不同网段之间一般通过租用连接的方式连接。

D此类网络的安全和访问控制由服务提供商控制。

F此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU?A传输期间的帧损坏B在目的设备上重组的数据C因通信丢失而重新传输的数据包005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)018哪个应用层协议通常用于支持客户端与服务器之间的文件传输?A HTMLB HTTP D Telnet019哪个应用层协议中规定了Microsoft 网络中用于文件共享的服务?A DHCPB DNS D SMTP E Telnet020服务器上的应用层通常如何处理多客户端服务请求?A终止与服务的所有连接B拒绝与单一守护程序的多个连接C暂停当前连接,建立新连接第四章OSI传输层001下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)A流量控制 D 面向连接E 序列和确认002请参见图示。

此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?A会话创建B 数据段重传C 数据传输D 会话断开003数据段的TCP 报头中为什么包含端口号?A指示转发数据段时应使用的正确路由器接口B 标识接收或转发数据段时应使用的交换机端口C确定封装数据时应使用的第3 层协议让接收主机转发数据到适当的应用程序E让接收主机以正确的顺序组装数据包004OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?A应用层 B 表示层 C 会话层传输层 E 网络层005请参见图示。

ccna考试题及答案

ccna考试题及答案

ccna考试题及答案1. 以下哪项是网络层的功能?A. 路由选择B. 错误检测C. 流量控制D. 封装数据包答案:A2. 在OSI模型中,哪一层负责在网络中传输数据?A. 应用层B. 传输层C. 会话层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中发现网络设备的?A. ARPB. RARPC. ICMPD. OSPF答案:A4. 在TCP/IP模型中,哪一层与OSI模型的传输层相对应?A. 应用层B. 互联网层C. 网络接口层D. 传输层答案:D5. 以下哪个地址是一个有效的IPv4地址?A. 192.168.1.256B. 192.168.1.1C. 10.0.0.0D. 172.16.300.1答案:B6. 在配置路由器时,以下哪个命令用于进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B7. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show configD. show current-config答案:A8. 在Cisco设备上,以下哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. save startup-config答案:A9. 以下哪个命令用于在Cisco设备上查看所有接口的状态?A. show interfacesB. show ip interface briefC. show interface statusD. show running-config interface答案:B10. 在Cisco设备上,以下哪个命令用于关闭接口?A. shutdownB. no shutdownC. disableD. no enable答案:A11. 以下哪个命令用于在Cisco设备上启用接口?A. shutdownB. no shutdownC. disableD. no enable答案:B12. 在配置静态路由时,以下哪个命令用于指定下一跳地址?B. ip static-routeC. route ipD. static-route ip答案:A13. 以下哪个命令用于在Cisco设备上清除ARP表?A. clear arp-cacheB. clear arpC. clear arp tableD. clear ip arp答案:D14. 在配置动态路由协议时,以下哪个命令用于在接口上启用RIP?A. ip rip enableB. ip rip receiveD. network rip答案:C15. 以下哪个命令用于在Cisco设备上查看RIP路由表?A. show ip ripB. show ip route ripC. show ripD. show ip protocols答案:B16. 在配置EIGRP时,以下哪个命令用于指定自动汇总?A. metric weightsB. auto-summaryC. network auto-summaryD. no auto-summary答案:B17. 以下哪个命令用于在Cisco设备上查看EIGRP邻居?A. show ip eigrp neighborsB. show eigrp neighborsC. show ip eigrpD. show eigrp interfaces答案:A18. 在配置OSPF时,以下哪个命令用于指定路由器ID?A. router-idB. router ospfC. networkD. area答案:A19. 以下哪个命令用于在Cisco设备上查看OSPF路由表?A. show ip ospfB. show ip ospf databaseC. show ospfD. show ip route ospf答案:D20. 在配置VLAN时,以下哪个命令用于创建一个新的VLAN?A. vlan databaseB. configure terminalC. vlan [vlan-id]D. new-vlan答案:C21. 以下哪个命令用于将接口分配给VLAN?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:C22. 在配置交换机时,以下哪个命令用于将接口设置为Trunk 模式?A. switchport mode accessB. switchport mode trunkC. switchport access vlan [vlan-id]D. switchport trunk vlan [vlan-id]答案:B23. 以下哪个命令用于在Cisco设备上查看VLAN配置?A. show vlanB. show vlan briefC. show vlan detailD. show vlan all答案:B24. 在配置VTP时,以下哪个命令用于将交换机设置为VTP服务器模式?A. vtp mode serverB. vtp mode clientC. vtp mode transparentD. vtp mode off答案:A25. 以下哪个命令用于在Cisco设备上查看VTP状态?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A26. 在配置STP时,以下哪个命令用于设置根桥?A. spanning-tree root primaryB. spanning-tree root secondaryC. spanning-tree root primary [priority]D. spanning-tree root secondary [priority]答案:C27. 以下哪个命令用于在Cisco设备上查看STP状态?A. show spanning-treeB. show spanning-tree detailC. show spanning-tree summaryD. show spanning-tree interface答案:A28. 在配置VLAN Trunking Protocol (VTP) 时,以下哪个命令用于设置VTP域名?A. vtp domain [domain-name]B. vtp password [password]C. vtp mode [mode]D. vtp version [version]答案:A29. 以下哪个命令用于在Cisco设备上查看当前的VTP版本?A. show vtp statusB. show vtp statisticsC. show vtp passwordD. show vtp configuration答案:A30. 在配置端口安全时,以下哪个命令用于限制接口上可以学习到的最大MAC地址数量?A. switchport port-security maximum [mac-count]B. port-security maximum [mac-count]C. switchport port-security violation restrictD. port-security violation shutdown答案:A这些题目和答案仅供学习和参考之用,实际的CCNA考试内容和形式可能会有所不同。

ccna测试题及答案

ccna测试题及答案

ccna测试题及答案CCNA测试题及答案一、选择题1. 在Cisco设备上,以下哪个命令用于查看当前的路由表?A. show ip routeB. show running-configC. show interface statusD. show version答案:A2. 以下哪个协议用于在网络中自动发现其他设备?A. ARPB. CDPC. ICMPD. TCP答案:B3. 以下哪个命令用于配置Cisco设备上的接口?A. configure terminalB. interfaceC. ip addressD. hostname答案:A二、填空题4. 在Cisco设备上,使用命令_________可以查看接口的配置信息。

答案:show interface5. 静态路由配置中,_________命令用于指定下一跳地址。

答案:ip route6. 动态路由协议可以自动适应网络变化,其中_________是最常见的一种。

答案:RIP(路由信息协议)三、简答题7. 请简述VLAN(虚拟局域网)的作用。

答案:VLAN是一种将局域网内不同物理位置的设备划分为同一逻辑网络的技术,主要用于隔离广播域,提高网络的安全性和效率。

8. 描述交换机和路由器在网络中的基本功能。

答案:交换机主要用于局域网内部,通过MAC地址表来转发数据帧,实现数据包在局域网内的快速交换。

路由器则工作在网络层,使用IP地址来转发数据包,连接不同的网络,并进行路径选择。

四、计算题9. 假设一个子网掩码为255.255.255.192,计算这个子网的可用IP地址范围。

答案:可用IP地址范围为192.168.1.0到192.168.1.62(包含两端)。

五、实验题10. 请根据以下配置文件,列出Router1的接口配置信息。

```Router1show running-configinterface FastEthernet0/0ip address 192.168.1.1 255.255.255.0duplex autospeed auto!interface FastEthernet0/1no ip addressshutdown!interface Serial0/0/0ip address 10.0.0.1 255.255.255.252clock rate 64000!router ospf 1network 192.168.1.0 0.0.0.255 area 0network 10.0.0.0 0.0.0.3 area 0!```答案:- FastEthernet0/0: IP地址为192.168.1.1,子网掩码为255.255.255.0,双工模式和速度均为自动。

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英⽂翻译版及答案CCNA考试题库中英⽂翻译版及答案1[1]1、 What are two reasons that a network administrator would use access lists? (Choose two、)1、出于哪两种理由,⽹络管理员会使⽤访问列表?A、 to control vty access into a routerA、控制通过VTY访问路由器B、 to control broadcast traffic through a routerB、控制⼴播流量穿越路由器2、⼀个默认得帧中继WAN被分类为哪种物理⽹络类型?A、 point-to-pointA、点到点B、 broadcast multi-accessB、⼴播多路访问C、 nonbroadcast multi-accessC、⾮⼴播多路访问D、 nonbroadcast multipointD、⾮⼴播多点E、 broadcast point-to-multipointE、⼴播点到多点Answer: C3、 A single 802、11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency、 What are three likely causes of this problem? (Choose three、)3、⼀个802、11接⼊点被部署在⼀个⽅形办公室得中央,当⼤多数⽤户在⼤流量传输数⼀些⽆线⽤户发现⽆线⽹络变得缓慢与出现丢包A、 mismatched TKIP encryptionB、 null SSIDC、 cordless phonesD、 mismatched SSIDE、 metalF、 antenna type or directionAnswer: CEF4、 Refer to the exhibit、 How many broadcast domains exist in the exhibited topology?根据下图,图中得拓扑中存在多少个⼴播域?A、 one A、1B、 two B、2C、 three C、3D、 four D、4E、 five E、5F、 six F、6Answer: C5、 Refer to the exhibit、 What two facts can be determined from the WLAN diagram? (Choose two、) 5、根据下图,WLAN diagram决定了哪两个事实A、 The area of overlap of the two cells represents a basic service set (BSS)、A、两个 cells得overlap得区域描述了⼀个basic service setB、 The network diagram represents an extended service set (ESS)、B、⽹络描述了⼀个extended service setC、 Access points in each cell must be configured to use channel 1、C、再每个CELL中得AP必须被配置成使⽤channel 1D、 The area of overlap must be less than 10% of the area to ensure connectivity、D、为了确保连通性,重叠区域必须⼩于10%E、 The two APs should be configured to operate on different channels、E、两个访问点应该被配置成⼯作在不同得频道Answer: BE6、 The command frame-relay map ip 10、121、16、8 102 broadcast was entered on the router、Which of the following statements is true concerning this command?6、路由器上输⼊命令frame-relay map ip 10、121、16、8 102 broadcast,以下选项正确得就是?A、 This command should be executed from the global configuration mode、A、该命令应该在全局配置模式下被执⾏B、 The IP address 10、121、16、8 is the local router port used to forward data、B、IP地址10、121、16、8就是本地路由器⽤来转发数据得接⼝C、 102 is the remote DLCI that will receive the information、C、102就是远端得DLCI它将接受信息。

2011最新10月CCNA题库word版201~300题

2011最新10月CCNA题库word版201~300题

QUESTION 201Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksQUESTION 202Refer to the exhibit. Assume that the routing protocol referenced in each choice below is configured with itsdefault settings and the given routing protocol is running on all the routers. Which two conditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0 for therouting protocol mentioned? (Choose two.)A. If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2 to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3 to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.QUESTION 203Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values couldbe used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79B. host A IP address: 192.168.1.64C. host A default gateway: 192.168.1.78D. host B IP address: 192.168.1.128E. host B default gateway: 192.168.1.129F. host B IP address: 192.168.1.190QUESTION 204A network administrator changes the configuration register to 0x2142 and reboots the router. What are tworesults of making this change? (Choose two.)A. The IOS image will be ignored.B. The router will prompt to enter initial configuration mode.C. The router will boot to ROM.D. Any configuration entries in NVRAM will be ignored.E. The configuration in flash memory will be booted.QUESTION 205Refer to the exhibit. The networks connected to router R2 have been summarized as a 192.168.176.0/21route and sent to R1. Which two packet destination addresses will R1 forward to R2? (Choosetwo.)A. 192.168.194.160B. 192.168.183.41C. 192.168.159.2D. 192.168.183.255E. 192.168.179.4F. 192.168.184.45QUESTION 206Which three statements are typical characteristics of VLAN arrangements? (Choose three.)A. A new switch has no VLANs configured.B. Connectivity between VLANs requires a Layer 3 device.C. VLANs typically decrease the number of collision domains.D. Each VLAN uses a separate address space.CCNA考试报名1700元99艾迪飞论坛艾迪飞论坛E. A switch maintains a separate bridging table for each VLAN.F. VLANs cannot span multiple switches.QUESTION 207QoS policies are applied on the switches of a LAN. Which type of command will show the effects of thepolicy in real time?A. show commandB. debug commandC. configuration commandD. rommon commandQUESTION 208Which command will show the MAC addresses of stations connected to switch ports?A. show mac-addressB. show arpC. show tableD. show switchportQUESTION 209What is the name of the VTP mode of operation that enables a switch to forward only VTP advertisements while still permitting the editing of local VLAN information?A. serverB. clientC. tunnelD. transparentQUESTION 210Which port state is introduced by Rapid-PVST?A. learningCCNA考试报名1700元100艾迪飞论坛艾迪飞论坛B. listeningC. discardingD. forwardingQUESTION 211What speeds must be disabled in a mixed 802.11b/g WLAN to allow only 802.11g clients to connect?A. 6, 9, 12, 18B. 1, 2, 5.5, 6C. 5.5, 6, 9, 11D. 1, 2, 5.5, 11QUESTION 212Refer to the exhibit. Which VLSM mask will allow for the appropriate number of host addresses for NetworkA?A. /25B. /26C. /27D. /28QUESTION 213Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the leastamount of wasted addresses?A. 255.255.255.0B. 255.255.254.0C. 255.255.252.0D. 255.255.248.0QUESTION 214Refer to the exhibit. Which mask is correct to use for the WAN link between the routers that will provideconnectivity while wasting the least amount of addresses?A. /23B. /24C. /25D. /30QUESTION 215Refer to the exhibit. What is the most appropriate summarization for these routes?A. 10.0.0.0 /21B. 10.0.0.0 /22C. 10.0.0.0 /23D. 10.0.0.0 /24QUESTION 216CCNA考试报名1700元102艾迪飞论坛艾迪飞论坛Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)A. Set the IP gateway to be used by the network.B. Perform host discovery used DHCPDISCOVER message.C. Configure IP address parameters from DHCP server to a host.D. Provide an easy management of layer 3 devices.E. Monitor IP performance using the DHCP server.F. Assign and renew IP address from the default pool.QUESTION 217Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choosetwo.)A. reduces routing table entriesB. auto-negotiation of media ratesC. efficient utilization of MAC addressesD. dedicated communications between devicesE. ease of management and troubleshootingQUESTION 218Which two benefits are provided by creating VLANs? (Choose two.)A. added securityB. dedicated bandwidthC. provides segmentationD. allows switches to route traffic between subinterfacesE. contains collisionsWhich two link protocols are used to carry multiple VLANs over a single link? (Choose two.)A. VTPB. 802.1qC. IGPD. ISLE. 802.3uQUESTION 220Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choosetwo.)A. 802.1dB. VTPC. 802.1qD. STPE. SAPQUESTION 221On the network 131.1.123.0/27, what is the last IP address that can be assigned to a host?A. 131.1.123.30B. 131.1.123.31C. 131.1.123.32D. 131.1.123.33QUESTION 222The ip subnet zero command is not configured on a router. What would be the IP address of Ethernet0/0using the first available address from the sixth subnet of the network 192.168.8.0/29?A. 192.168.8.25B. 192.168.8.41C. 192.168.8.49D. 192.168.8.113QUESTION 223For the network 192.0.2.0/23, which option is a valid IP address that can be assigned to a host?A. 192.0.2.0B. 192.0.2.255C. 192.0.3.255D. 192.0.4.0QUESTION 224How many addresses for hosts will the network 124.12.4.0/22 provide?A. 510B. 1022C. 1024D. 2048QUESTION 225Where does routing occur within the DoD TCP/IP reference model?A. applicationB. internetC. networkD. transportWhich VTP mode is capable of creating only local VLANs and does not synchronize with other switches inthe VTP domain?A. clientB. dynamicC. serverD. staticE. transparentQUESTION 227Which switch would STP choose to become the root bridge in the selection process?A. 32768: 11-22-33-44-55-66B. 32768: 22-33-44-55-66-77C. 32769: 11-22-33-44-55-65D. 32769: 22-33-44-55-66-78QUESTION 228A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existingdepartmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?A. More collision domains will be created.B. IP address utilization will be more efficient.C. More bandwidth will be required than was needed previously.D. An additional broadcast domain will be created.QUESTION 229Which two statements about the use of VLANs to segment a network are true? (Choose two.)A. VLANs increase the size of collision domains.B. VLANs allow logical grouping of users by function.C. VLANs simplify switch administration.D. VLANs enhance network security.QUESTION 230On corporate network, hosts on the same VLAN can communicate with each other, but they are unable tocommunicate with hosts on different VLANs. What is needed to allow communication between the VLANs?A. a router with subinterfaces configured on the physical interface that is connected to the switchB. a router with an IP address on the physical interface connected to the switchC. a switch with an access link that is configured between the switchesD. a switch with a trunk link that is configured between the switchesQUESTION 231When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choosetwo.)A. network or subnetwork IP addressB. broadcast address on the networkC. IP address leased to the LAND. IP address used by the interfacesE. manually assigned address to the clientsF. designated IP address to the DHCP serverQUESTION 232Which statement describes the process of dynamically assigning IP addresses by the DHCP server?A. Addresses are allocated after a negotiation between the server and the host to determine the length ofthe agreement.B. Addresses are permanently assigned so that the hosts uses the same address at all times.C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for anaddress must be made.D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.QUESTION 233Which network protocol does DNS use?A. FTPB. TFTPC. TCPD. UDPE. SCPAnswer: DExplanation/Reference:此题答案并不严格,严格讲DNS有两个端口号一个为TCP一个为UDP并且端口号都为53 DNS解析用UDP 效率高但不能保证完整性DNS服务器之间同步使用TCP保证数据正确QUESTION 234When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?A. RARP requestB. Show Network Address requestC. Proxy ARP requestD. ARP requestE. Show Hardware Address requestQUESTION 235Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the followingare true? (Choose two.)CCNA考试报名1700元107艾迪飞论坛艾迪飞论坛A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.D. Router C will send a Destination Unreachable message type.E. Router C will send a Router Selection message type.F. Router C will send a Source Quench message typeQUESTION 236To configure the VLAN trunking protocol to communicate VLAN information between two switches, whattwo requirements must be met? (Choose two.)A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.B. The VTP management domain name of both switches must be set the same.C. All ports on both the switches must be set as access ports.D. One of the two switches must be configured as a VTP server.E. A rollover cable is required to connect the two switches together.F. A router must be used to forward VTP traffic between VLANs.QUESTION 237Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)A. It is locally significant.B. It is globally significant.C. It is needed to identify a unique instance of an OSPF database.D. It is an optional parameter required only if multiple OSPF processes are running on the router.E. All routers in the same OSPF area must have the same process ID if they are to exchange routinginformation.QUESTION 238What functions do routers perform in a network? (Choose two.)A. packet switchingB. access layer securityC. path selectionD. VLAN membership assignmentE. bridging between LAN segmentsF. microsegmentation of broadcast domainsQUESTION 239Which series of commands will configure router R1 for LAN-to-LAN communication with router R2? Theenterprise network address is 192.1.1.0/24 and the routing protocol in use is RIP. (Choose three.)A. R1(config)# interface ethernet 0R1(config-if)# ip address 192.1.1.129 255.255.255.192R1(config-if)# no shutdownB. R1(config)# interface ethernet 0R1(config-if)# ip address 192.1.1.97 255.255.255.192R1(config-if)# no shutdownC. R1(config)# interface serial 0R1(config-if)# ip address 192.1.1.4 255.255.255.252R1(config-if)# clock rate 56000D. R1(config)# interface serial 0R1(config-if)# ip address 192.1.1.6 255.255.255.252R1(config-if)# no shutdownCCNA考试报名1700元109艾迪飞论坛艾迪飞论坛E. R1(config)# router ripR1(config-router)# network 192.1.1.4R1(config-router)# network 192.1.1.128F. R1(config)# router ripR1(config-router)# version 2R1(config-router)# network 192.1.1.0QUESTION 240A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalystswitch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring theserver online. What can the administrator do to ensure that only the MAC address of the server is allowedby switch port Fa0/1? (Choose two.)A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofingthe server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of theserver.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.QUESTION 241The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic.There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at thedefault and the router IDs are shown with each router. Which routers are likely to have been elected asDR? (Choose two.)A. Corp-1B. Corp-2C. Corp-3D. Corp-4E. Branch-1F. Branch-2QUESTION 242At which layers of the OSI model do WANs operate? (Choose two.)A. application layerB. session layerC. transport layerD. network layerE. datalink layerF. physical layerQUESTION 243Which routing protocols can be used within the enterprise network shown in the diagram? (Choose three.)A. RIP v1B. RIP v2C. IGRPD. OSPFE. BGPF. EIGRPQUESTION 244Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possiblereasons for this problem? (Choose two.)A. All of the routers need to be configured for backbone Area 1.B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from beingestablished.D. The hello and dead interval timers are not set to the same values on R1 and R3.E. EIGRP is also configured on these routers with a lower administrative distance.F. R1 and R3 are configured in different areas.QUESTION 245Which statements are true about EIGRP successor routes? (Choose two.)A. A successor route is used by EIGRP to forward traffic to a destination.B. Successor routes are saved in the topology table to be used if the primary route fails.C. Successor routes are flagged as "active" in the routing table.D. A successor route may be backed up by a feasible successor route.E. Successor routes are stored in the neighbor table following the discovery process.QUESTION 246CCNA考试报名1700元112艾迪飞论坛Refer to the diagram. All hosts have connectivity with one another. Which statements describe theaddressing scheme that is in use in the network? (Choose three.)A. The subnet mask in use is 255.255.255.192.B. The subnet mask in use is 255.255.255.128.C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1D. The IP address 172.16.1.205 can be assigned to hosts in VLAN1E. The LAN interface of the router is configured with one IP address.F. The LAN interface of the router is configured with multiple IP addresses.QUESTION 247Refer to the diagram. Which three statements describe the router port configuration and the switch portconfiguration as shown in the topology? (Choose three.)A. The Router1 WAN port is configured as a trunking port.B. The Router1 port connected to Switch1 is configured using subinterfaces.C. The Router1 port connected to Switch1 is configured as 10 Mbps.D. The Switch1 port connected to Router1 is configured as a trunking port.E. The Switch1 port connected to Host B is configured as an access port.F. The Switch1 port connected to Hub1 is configured as full duplex.QUESTION 248Which routing protocols will support the following IP addressing scheme? (Choose three.) Network 1 - 192.168.10.0 /26Network 2 - 192.168.10.64 /27Network 3 - 192.168.10.96 /27Network 4 - 192.168.10.128 /30Network 5 - 192.168.10.132 /30A. RIP version 1B. RIP version 2C. IGRPD. EIGRPE. OSPFQUESTION 249Refer to the partial command output shown. Which two statements are correct regarding the routerhardware? (Choose two.)A. Total RAM size is 32 KB.B. Total RAM size is 16384 KB (16 MB).C. Total RAM size is 65536 KB (64 MB).D. Flash size is 32 KB.E. Flash size is 16384 KB (16 MB).F. Flash size is 65536 KB (64 MB)QUESTION 250The Ethernet networks connected to router R1 in the graphic have been summarized for router R2 as192.1.144.0/20. Which of the following packet destination addresses will R2 forward to R1, according to thissummary? (Choose two.)A. 192.1.159.2B. 192.1.160.11C. 192.1.138.41D. 192.1.151.254E. 192.1.143.145F. 192.1.1.144QUESTION 251The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possiblecauses for this interface status? (Choose three.)A. The interface is shut down.B. No keepalive messages are received.C. The clockrate is not set.D. No loopback address is set.E. No cable is attached to the interface.F. There is a mismatch in the encapsulation type.QUESTION 252Which of the following describe private IP addresses? (Choose two.)A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organizationQUESTION 253Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of thefollowing will correct the problems? (Choose two.)A. Configure the gateway on Host A as 10.1.1.1.B. Configure the gateway on Host B as 10.1.2.254.C. Configure the IP address of Host A as 10.1.2.2.D. Configure the IP address of Host B as 10.1.2.2.E. Configure the masks on both hosts to be 255.255.255.224.F. Configure the masks on both hosts to be 255.255.255.240.QUESTION 254A network associate is trying to understand the operation of the FLD Corporation by studying the network inthe exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support theuser hosts in the other VLANs. The associate needs to determine which interfaces are access ports. WhichCCNA考试报名1700元116艾迪飞论坛interfaces are access ports? (Choose three.)A. Switch1 - Fa 0/2B. Switch1 - Fa 0/9C. Switch2 - Fa 0/3D. Switch2 - Fa 0/4E. Switch2 - Fa 0/8F. Router - Fa 1/0QUESTION 255Refer to the exhibit. Which destination addresses will Host A use to send data to Host B? (Choose two.)A. the IP address of Switch1B. the IP address of Router1 Fa0/0C. the IP address of HostBD. the MAC address of Switch1E. the MAC address of Router1 Fa0/0CCNA考试报名1700元117艾迪飞论坛F. the MAC address of HostBQUESTION 256The network security policy requires that only one host be permitted to attach dynamically to each switchinterface. If that policy is violated, the interface should shut down. Which two commands must the networkadministrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)A. Switch1(config-if)# switchport port-security maximum 1B. Switch1(config)# mac-address-table secureC. Switch1(config)# access-list 10 permit ip hostD. Switch1(config-if)# switchport port-security violation shutdownE. Switch1(config-if)# ip access-group 10QUESTION 257Refer to the graphic. A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Whichcommands will accomplish this? (Choose two.)A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0QUESTION 258What should be done prior to backing up an IOS image to a TFTP server? (Choose three.)A. Make sure that the server can be reached across the network.CCNA考试报名1700元118艾迪飞论坛B. Check that authentication for TFTP access to the server is set.C. Assure that the network server has adequate space for the IOS image.D. Verify file naming and path requirements.E. Make sure that the server can store binary files.F. Adjust the TCP window size to speed up the transfer.QUESTION 259What are the possible trunking modes for a switch port? (Choose three.)A. transparentB. autoC. onD. desirableE. clientF. forwardingQUESTION 260The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses canbe assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router? (Choosethree.)A. 172.25.78.243B. 172.25.98.16C. 172.25.72.0D. 172.25.94.255E. 172.25.96.17F. 172.25.100.16QUESTION 261Refer to the graphic. Host 1 cannot receive packets from Host 2. Assuming that RIP v1 is the routingprotocol in use, what is wrong with the IP configuration information shown? (Choose two.)A. The fa0/1 interface of router R2 has been assigned a broadcast address.B. The fa0/1 network on router R2 overlaps with the LAN attached to R1.C. Host 2 has been assigned the incorrect subnet mask.D. Host 1 has been configured with the 255.255.248.0 subnet mask.E. Host 2 on router R2 is on a different subnet than its gateway.QUESTION 262What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)A. to make VTP easier to implementB. to isolate broadcast trafficC. to increase the size of the collision domainD. to allow more devices to connect to the networkE. to logically group hosts according to functionF. to increase network securityQUESTION 263Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links areoperating at the same bandwidth? (Choose three.)A. Switch A - Fa0/0B. Switch A - Fa0/1C. Switch B - Fa0/0D. Switch B - Fa0/1E. Switch C - Fa0/0F. Switch C - Fa0/1QUESTION 264Which statements describe two of the benefits of VLAN Trunking Protocol? (Choose two.)A. VTP allows routing between VLANs.B. VTP allows a single switch port to carry information to more than one VLAN.C. VTP allows physically redundant links while preventing switching loops.D. VTP simplifies switch administration by allowing switches to automatically share VLAN configurationinformation.E. VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F. VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.QUESTION 265What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch?CCNA考试报名1700元121艾迪飞论坛艾迪飞论坛(Choose two.)A. The switch will ignore VTP summary advertisements.B. The switch will forward VTP summary advertisements.C. The switch will process VTP summary advertisements.D. The switch will originate VTP summary advertisements.E. The switch will create, modify and delete VLANs for the entire VTP domain.QUESTION 266A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a hostthat has been newly connected to the network. Which protocols were used during the test? (Choose two.)A. ARPB. CDPC. DHCPD. DNSE. ICMPQUESTION 267Refer to the exhibit. Host A is to send data to Host B. How will Router1 handle the data frame receivedfrom Host A? (Choose three.)A. Router1 will strip off the source MAC address and replace it with the MAC address on the forwardingFastEthernet interface.B. Router1 will strip off the source IP address and replace it with the IP address on the forwarding FastEthernet interface.C. Router1 will strip off the destination MAC address and replace it with the MAC address of Host B.D. Router1 will strip off the destination IP address and replace it with the IP address of Host B.E. Router1 will forward the data frame out interface FastEthernet0/1.F. Router1 will forward the data frame out interface FastEthernet0/2.QUESTION 268Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.)A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.E. Router1 will forward the data packet out interface FastEthernet0/1.F. Router1 will forward the data packet out interface FastEthernet0/2.QUESTION 269Refer to the exhibit. Host A pings Host B. What source MAC address and source IP address are containedin the frame as the frame leaves R2 destined for host B?A. abcd.abcd.a001B. abcd.abcd.b002C. abcd.abcd.c003D. 10.2.0.15E. 10.0.64.1F. 10.0.128.15QUESTION 270Refer to the exhibit. A network associate has configured OSPF with the command:City(config-router)# network 192.168.12.64 0.0.0.63 area 0After completing the configuration, the associate discovers that not all the interfaces are participating inOSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? (Choose three.)A. FastEthernet0 /0CCNA考试报名1700元124艾迪飞论坛B. FastEthernet0 /1C. Serial0/0D. Serial0/1.102E. Serial0/1.103F. Serial0/1.104QUESTION 271A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?(Choose three.)A. Erase flash.B. Restart the switch.C. Delete the VLAN database.D. Erase the running configuration.E. Erase the startup configuration.F. Modify the configuration register.QUESTION 272Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to thePayroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers withaccess to the Payroll Server. What two technologies should be implemented to help prevent unauthorizedaccess to the server? (Choose two.)A. access listsB. encrypted router passwordsC. STPD. VLANsCCNA考试报名1700元125艾迪飞论坛E. VTP。

CCNA期末考试复习题(1)

CCNA期末考试复习题(1)

CCNA期末考试复习题一、选择题1 、图示的网络中有多少个冲突域?A 1B 2C 3D 6E 72、如图所示网络,交换机都是默认配置。

主机A需要和主机D通信,但是主机A没有默认网关的MAC地址。

哪些主机将收到主机A发出的ARP请求?A 只有主机DB 只有路由器R1C 只有主机B和CD 只有主机B,C和DE 只有主机B,C和路由器R13、如图所示,主机A属于哪个子网?A 10.197.0.0B 10.192.0.0C 10.197.184.0D 10.197.187.0E 10.197.187.1684、248表示为二进制形式是:A 11101000B 11110100C 11111000D 111110105、10BASE-T指哪种线缆?A 10Mbit/s传输速度,基带信号,线缆长度500M,同轴线B 10Mbit/s传输速度,宽带信号,线缆长度100M,同轴线C 10Mbit/s传输速度,基带信号,线缆长度100M,双绞线D 10Gbit/s传输速度,宽带信号,线缆长度500M,双绞线6、如图所示,网络管理员希望创建一个子网用于两个路由器点对点连接。

哪个子网掩码可以给点对点连接提供足够的地址,且浪费又最少?A 255.255.255.192B 255.255.255.224C 255.255.255.240D 255.255.255.248E 255.255.255.2527、如图所示,主机A希望发送一个消息给主机B。

请将下列步骤排列为正确的顺序,使得消息能够发送出去。

A——添加网络层地址B——发送比特C——创建应用层数据D——添加数据链路层地址A B—A—D—CB D—A—C—BC A—D—C—BD C—A—D—BE C—D—A—BF C—B—A—D8、一个C类网络192.168.35.0使用/28的掩码划分子网,可用子网个数及每子网的可用主机数分别是多少?A 6 子网/64主机B 14 子网/32主机C 14子网/14主机D 30子网/64主机9、哪种协议用来消灭交换环路?A TCPB RIPC STPD IGRPE IP10、因为无法ping通本地路由器,技术人员决定查看一下路由器。

ccna考试题库

ccna考试题库

c c n a考试题库(总34页) -CAL-FENGHAI.-(YICAI)-Company One1-CAL-本页仅作为文档封面,使用请直接删除QUESTION 37What are two characteristics of RIPv2 (Choose two.)A. classful routing protocolB. variable-length subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to compute path Answer: BDExplanation/Reference:A:有类路由协议,错误B:可变长度子网掩码,正确C:采用广播地址更新,错误D:手动路由汇总,正确E:使用spf算法计算路径,错误。

QUESTION 38Which two Ethernet fiber-optic modes support distances of greater than 550 meters?A.1000BASE-CXB. 100BASE-FXC. 1000BASE-LXD. 1000BASE-SXE. 1000BASE-ZXAnswer: CEExplanation/Reference:A:最长距离25米B:最长距离100米C:最长距离3000米D:最长距离550米E:最长距离70千米QUESTION 39What two things will a router do when running a distance vector routing protocol(Choose two.)A. Send periodic updates regardless oftopology changes.B. Send entire routing table to all routers in the routing domain.C. Use the shortest-path algorithm to the determine best path.D. Update the routing table based on updates from their neighbors.E. Maintain the topology of the entire network in its database.Answer: ADExplanation/Reference:考点:考查距离矢量路由协议特性A:周期性更新,正确B:发送整个路由表到整个路由域,错误,只发送给邻居C:使用SPF算法,错误D:依靠邻居发送更新来更新路由表,正确E:在数据库中维护整个网络的拓扑。

CCNA认证试题(中文+答案)

CCNA认证试题(中文+答案)

CCNA认证试题一(附答案和解析)中文版(一)1、目前,我国应用最为广泛的LAN标准是基于()的以太网标准.(A) IEEE 802。

1(B) IEEE 802。

2(C) IEEE 802.3(D)IEEE 802.5答案:C参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802。

3 以太网IEEE 802.4 令牌总线IEEE 802。

5 令牌环IEEE 802.8 FDDIIEEE 802。

11 无线局域网记住IEEE802.1-——-—--IEEE802。

5的定义以太网是一种计算机局域网组网技术.IEEE制定的IEEE 802。

3标准给出了以太网的技术标准.它规定了包括物理层的连线、电信号和介质访问层协议的内容。

以太网是当前应用最普遍的局域网技术.它很大程度上取代了其他局域网标准,如令牌环、FDDI和ARCNET。

以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE—T、1000BASE-T标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD介质访问控制方法.电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会.建会于1963年1月1日。

总部在美国纽约市。

在150多个国家中它拥有300多个地方分会。

目前会员数是36万.专业上它有35个专业学会和两个联合会。

IEEE发表多种杂志,学报,书籍和每年组织300多次专业会议。

IEEE定义的标准在工业界有极大的影响.下面列出:IEEE802.3以太网标准802。

3--——---—— 10Base以太网标准802.3u-—------ 100Base-T(快速以太网)802.3z—-—————— 1000Base-X(光纤吉比特以太网)802.3ab———-——-— 1000Base—T(双绞线吉比特以太网)2、对于这样一个地址,192。

CCNA问答题及答案

CCNA问答题及答案

CCNA问答题及答案1、CIDR、VLSM分别叫什么?CIDR:无类型域间选路VLSM:可变长子网掩码2、路由的作用1、改进网络分段(每个网段的结点数是有限的)。

相同类型的局域网互连,划分子网段,三层交换,避免“广播风暴”。

2、不同局域网之间的路由能力,实现三层的数据报文的转换。

3、连接W AN的路由能力。

3、被动路由与主动路由1.主动路由协议是路由器在互联网上动态找寻所有网络,并确保所有路由器拥有相同路由表的协议. 它基本上就是决定数据包通过互联网最右路径的协议. RIPv1,RIPv2,EIGRP 和OSPF都是主动路由协议.2. 被动路由协议:是路由器不自动搜寻网络,需要手工配置。

一旦所有的路由器都了解了所有的网络,被动路由协议便可用来发送用户数据(数据包),通过互联网络被动路由协议被分派到接口上并决定数据包的传送方式.IP和IPv6就是被动路由协议4、查看路由表可以使用什么命令,常用路由方式的缩写show ip route5、IP路由选择过程6、静态路由及其配置方法静态路由是指由网络管理员手工配置的路由信息router(config)#hostname A (更改路由器主机名)A(config)#interface f0/0 (进入接口f0/0)A(config-if)#ip address 192.168.1.1 255.255.255.0 (设置接口ip地址和子网掩码)A(config-if)#no shutdown (启用接口)A(config)#interface f0/1A(config-if)#ip address 192.168.2.1 255.255.255.0A(config-if)#no shutdown ×××以下二选一:A(config)#ip route 192.168.3.0 255.255.255.0 f0/1(目标网段ip地址目标子网掩码送出接口(路由器A))或者A(config)#ip route 192.168.3.0 255.255.255.0 192.168.2.2 (目标网段ip地址目标子网掩码下一路由器接口ip地址)router(config)#hostname BB(config)#interface f0/0B(config-if)#ip address 192.168.3.1 255.255.255.0B(config-if)#no shutdownB(config)#interface f0/1B(config-if)#ip address 192.168.2.2 255.255.255.0B(config-if)#no shutdown ×××以下二选一:B(config)#ip route 192.168.1.0 255.255.255.0 192.168.2.1 或者:B(config)#ip route 192.168.1.0 255.255.255.0 f0/1(目标网段ip地址目标子网掩码送出接口(路由器B))×××注1:此网络链路为以太网链路,如果是串行链路,送出接口也就是本地路由器的串行接口。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Exam AQUESTION 1A network engineer must create a diagram of a multivendor network.which command must be configured on the Cisco devices so that the topology of the network can be mapped?A.Device(config)#lldp runB.Device(config)#cdp runC.Device(config)# cdp enableD.Device(config)# flow-sampler-map topologyCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 2Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?A.CPU ACLB.TACACSC.Flex ACLD.RADIUSCorrect Answer: ASection: (none)ExplanationExplanation/Reference:Reference:https:///c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.htmlQUESTION 3When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A.IKEv2B.IKEv1C.IPsecD.MD5Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 4How do TCP and UDP differ in the way that they establish a connection between two endpoints?A.TCP use the three-way handshake,and UDP dose no guarantee message deliveryB.TCP use synchronization packets,and UDP uses acknowledgement packetsC.UDP provides reliable message transfer,and TCP is a connectionless protocol.D.UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.Correct Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 5What are two reasons that cause late collisions to increment on an Ethernet interface?(choose two)A.when the sending device waits 15 seconds before sending the frame againB.when the cable length limits are exceededC.when one side of the connection is configured for half-duplexD.when Carner Sense Multiple Access/Collision Detection is usedE.when a collision occurs after the 32nd byte of a frame has been transmittedCorrect Answer: BDSection: (none)ExplanationExplanation/Reference:QUESTION 6A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A.It allows the traffic to pass through unchangedB.It drops the trafficC.It tags the traffic with the default VLAND.It tags the traffic with the native VLANCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 7Refer to the exhibit. The show ip ospf interface command has been executed on R1 How is OSPF configured?A.The interface is not participating in OSPFB.A point-to-point network type is configuredC.The default Hello and Dead timers are in useD.There are six OSPF neighbors on this interfaceCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 8What benefit does controller-based networking provide versus traditional networking?A.provides an added layer of security to protect from DDoS attacksbines control and data plane functionality on a single device to minimize latencyC.moves from a two-tier to a three-tier network architecture to provide maximum redundancyD.allows configuration and monitoring of the network from one centralized pointCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 9When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?A.The floating static route must have a higher administrative distance than the primary route so it is used as a backupB.The administrative distance must be higher on the primary route so that the backup route becomes secondary.C.The floating static route must have a lower administrative distance than the primary route so it is used as a backupD.The default-information originate command must be configured for the route to be installed into the routing tableCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 10Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?A.onB.autoC.activeD.desirableCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 11What are two descriptions of three-tier network topologies? (Choose two.)A.The distribution layer runs Layer 2 and Layer 3 technologies.B.The network core is designed to maintain continuous connectivity when devices fail.C.The core layer maintains wired connections for each host.D.The core and distribution layers perform the same functionsE.The access layer manages routing between devices in different domains.Correct Answer: ABSection: (none)ExplanationExplanation/Reference:QUESTION 12Refer to the exhibit.which statement explains the configuration error message that is received?A.it belongs to a private IP address rangeB.the router dose not support /28 maskC.it is a network IP addressD.it is a broadcast IP addressCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 13what is the expected outcome when an EUI-64 address is generated?A.The seventh bit of original MAC address of the interface is invertedB.The interface ID is configured as a random 64-bit valueC.The characters FE80 are inserted at the beginning of the MAC address of the interfaceD.The MAC address of the interface is used as the interface ID without modificationCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 14Which function does an SNMP agent perform?A.It manages routing between Layer 3 devices in a network,B.It coordinates user authentication between a network device and a TACACS+ or RADIUS server.C.It sends information about MIB variables in response to requests from the NMS.D.It requests information from remote network nodes about catastrophic system events.Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 15Refer to the exhibit.The default-information originate command is configured under the R1 OSPF configuration.After testing,workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet.wihch action corrects the configuration issue?A.Add the default-information originate command on R2B.Add the always keyword to the default-information originate command on R1C.Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1D.Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 16What are two benefits of network automation? (Choose two)A.reduced operational costsB.reduced hardware footprintC.faster changes with more reliable resultsD.fewer network failuresE.increased network securityCorrect Answer: ACSection: (none)ExplanationExplanation/Reference:QUESTION 17Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-standard protocol?(choose two) A.interface GigabitEthernet0/0/1Channel-group 10 mode activeB.interface GigabitEthernet0/0/1Channel-group 10 mode autoC.interface GigabitEthernet0/0/1Channel-group 10 mode onD.interface port-channel 10no switchportip address 172.16.0.1 255.255.255.0E.interface port-channel 10switchportSwitchport mode trunkCorrect Answer: ADSection: (none)ExplanationExplanation/Reference:QUESTION 18Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A.enable secretB.service password-encryptionername Cisco password encryptD.enable passwordCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 19R1 has learned route 10.10.10.0/24 via numerous routing protocols,which route is installed?A.route with the lowest costB.route with the shortest prefix lengthC.route with the next hop that has the highest IPD.route with the lowest administrative distanceCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 20which network allows devices to communicate without the need to access the internet?A.172.9.0.0/16B.172.28.0.0/16C.192.0.0.0/18D.209.165.201.0/24Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 21Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?A.dual algorithmB.metricC.administrative distanceD.hop countCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 22which command must be entered when a device is configured as an NTP server?A.ntp masterB.ntp severC.ntp authenticateD.ntp peerCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 23When OSPF learns multiple paths to a network, how does it select a route?A.It multiple the active K value by 256 to calculate the route with the lowest metric.B.For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowestbandwidth.C.It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowestcost.D.It count the umber of hops between the source router and the destination to determine the router with the lowest metricCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 24What is a characteristic of spine-and-leaf architecture?A.It provides variable latency.B.Each link between leaf switches allows for higher bandwidth.C.Each device is separated by the same number of hops.D.It provides greater predictability on STP blocked ports.Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 25Which two outcomes are predictable behaviors for HSRP? (Choose two)A.The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.B.The two routers negotiate one router as the active router and the other as the standby routerC.Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced betweenthem.D.The two routers synchronize configurations to provide consistent packet forwardingE.The two routed share the same IP address, and default gateway traffic is load-balanced between themCorrect Answer: ABSection: (none)ExplanationExplanation/Reference:QUESTION 26Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?A.explicitly assign a link-local addressB.disable the EUI-64 bit processC.enable SLAAC on an interfaceD.configure a stateful DHCPv6 server on the networkCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 27Refer to the exhibit. What is the effect of this configuration?A.The switch port interface trust state becomes untrustedB.The switch port remains administratively down until the interface is connected to another switchC.Dynamic ARP inspection is disabled because the ARP ACL is missingD.The switch port remains down until it is configured to trust or untrust incoming packetsCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 28In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?A. A spine switch and a leaf switch can be added with redundant connections between themB. A spine switch can be added with at least 40 GB uplinksC. A leaf switch can be added with connections to every spine switchD. A leaf switch can be added with a single connection to a core spine switchCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 29Refer to the exhibit.Router R1 is running three different routing protocols.Which route characteristic is used by the router to forward the packet that receives fordestination IP 172.16.32.1?A.metricB.longest prefixC.costD.administrative distanceCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 30Which configuration is needed to generate an RSA key for SSH on a router?A.Configure the version of SSHB.Configure VTY access.C.Create a user with a passwordD.Assign a DNS domain nameCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 31Which API is used in controller-based architectures to interact with edge devices?A.overlayB.northboundC.underlayD.southboundCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 32Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1.which configuration accomplishes this task?A.R1# config tR1(config)# ip routingR1(config)# ip route default-route 192.168.1.1B.R1# config tR1(config)# ip routingR1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1C.R1# config tR1(config)# ip routingR1(config)# ip route 192.168.1.1 0.0.0.0 0.0.0.0D.R1# config tR1(config)# ip routingR1(config)# ip default-gateway 192.168.1.1Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 33What is a benefit of using a Cisco Wireless LAN Controller?A.Central AP management requires more complex configurationsB.Unique SSIDs cannot use the same authentication methodC.It supports autonomous and lightweight APsD.It eliminates the need to configure each access point individuallyCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 34An engineer must configure a /30 subnet between two routers.which usable IP address and subnet mask combination meets this criteria?A.interface e0/0description to HQ-A370:98968ip address 10.2.1.3 255.255.255.252B.interface e0/0description to HQ-A370:98968ip address 192.168.1.1 255.255.255.248C.interface e0/0description to HQ-A370:98968ip address 172.16.1.4 255.255.255.248D.interface e0/0description to HQ-A370:98968ip address 209.165.201.2 255.255.255.252Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 35Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?A.snifferB.meshC.flexconnectD.localCorrect Answer: CSection: (none)ExplanationExplanation/Reference:https:///c/en/us/td/docs/wireless/controller/8-5/configguide/b_cg85/flexconnect.htmlQUESTION 36Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A.passiveB.mode onC.autoD.activeCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 37which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?IP encryptionB.SAE encryptionC.AES encryptionD.scrambled encryption keyCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 38Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1.The new circuit uses eBGP and teams the route to VLAN25 from the BGP path. What is the expected behavior for the traffic flow for route10.10.13.0/25?A.Traffic to 10.10.13.0.25 is load balanced out of multiple interfacesB.Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.C.Traffic to 10.10.13.0/25 is a symmetricalD.Route 10.10.13.0/25 learned via the Gi0/0 interface remains in the routing tableCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 39Refer to the exhibit.How does router R1 handle traffic to 192.168.10.16?A.It selects the EIGRP route because it has the lowest administrative distanceB.It selects the RIP route because it has the longest prefix inclusive of the destination addressC.It selects the OSFP route because it has the lowest costD.It selects the IS-IS route because it has the shortest prefix inclusive of the destination addressCorrect Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 40Which two actions influence the EIGRP route selection process? (Choose two)A.The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.B.The router calculates the best backup path to the destination route and assigns it as the feasible successor.C.The router calculates the feasible distance of all paths to the destination routeD.The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the linkE.The router must use the advertised distance as the metric for any given routeCorrect Answer: BCSection: (none)ExplanationExplanation/Reference:QUESTION 41Refer to the exhibit.which two commands were used to create port channel 10?(choose two)A.int range g0/0-1Channel-group 10 mode activeB.Bint range g0/0-1Channel-group 10 mode desirableC.int range g0/0-1Channel-group 10 mode passiveD.int range g0/0-1Channel-group 10 mode autoE.int range g0/0-1Channel-group 10 mode onCorrect Answer: ACSection: (none)ExplanationExplanation/Reference:QUESTION 42What is a difference between RADIUS and TACACS+?A.TACACS+ encrypts only password information and RADIUS encrypts the entire payloadB.RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commandsC.RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authenticationD.TACACS+ separates authentication and authorization, and RADIUS merges themCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 43Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server.Which configuration when applied to switch A accomplishes this task?A.B.C.D.Correct Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 44Refer to the exhibit. How does the router manage traffic to 192.168.12.16?A.It selects RIP route because it has the longest prefix inclusive of the destination addressB.It chooses the EIGRP route because it has the lowest administrative distanceC.It load-balances traffic between all three routesD.It chooses the OSPF route because it has the longest prefix inclusive of the destination address Correct Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 45What is an advantage of Cisco DNA Center versus traditional campus device management?A.It supports numerous extensibility options including cross-domain adapters and third-party SDKs.B.It supports high availability for management functions when operating in cluster mode.C.It enables easy autodiscovery of network elements m a brownfield deployment.D.It is designed primarily to provide network assuranceCorrect Answer: ASection: (none)ExplanationExplanation/Reference:QUESTION 46While examining excessive traffic on the network,it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two)A.The packets fail to match any permit statementB.A matching permit statement is too high in the access testC.A matching deny statement is too high in the access listD.A matching permit statement is too broadly definedE.The ACL is emptyCorrect Answer: BDSection: (none)ExplanationExplanation/Reference:QUESTION 47Which design element is a best practice when deploying an 802.11b wireless infrastructure?A.disabling TPC so that access points can negotiate signal levels with their attached wireless devices.B.setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC.allocating non overlapping channels to access points that are in close physical proximity to one anotherD.configuring access points to provide clients with a maximum of 5 MbpsCorrect Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 48How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?A.Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management optionsB.Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management.C.Cisco DNA Center device management can deploy a network more quickly than traditional campus device managementD.Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management.Correct Answer: CSection: (none)ExplanationExplanation/Reference:QUESTION 49Which two actions are performed by the Weighted Random Early Detection mechanism?(Choose two)A.It drops lower-priority packets before it drops higher-priority packetsB.It can identify different flows with a high level of granularityC.It guarantees the delivery of high-priority packetsD.It can mitigate congestion by preventing the queue from filling upE.IT supports protocol discoveryCorrect Answer: ADSection: (none)ExplanationExplanation/Reference:加权随机先期检测(WRED:Weighted Random Early Detection)是将随机先期检测与优先级排队结合起来,这种结合为高优先级分组提供了优先通信处理能力。

相关文档
最新文档