思科认证考试题库
思科认证CCNA认证试题与答案中文版
思科认证CCNA认证试题与答案中文版思科认证CCXA认证试题与答案中文版21、一个B类网络,有5位掩码加入缺省掩码用来划分子网,每个子网最多()台主机(A)510(B)512(C)1022(D)2046答案:D22、在路由器中,能用以下命令察看路由器的路由表()(A)arp-a(B)traceroute(C)routeprint(D)displayiprouting-table答案:D23、DHCP客户端是使用地址()来中请一个新的IP地址的(A)0. 0. 0. 0(B)10. 0. 0. 1(0127. 0. 0. 1(D)255. 255. 255. 255答案:D注释:255. 255. 255. 255是全网广播,DHCP客户端发送全网广播来查找DHCP服务器.24、下而有关NAT叙述正确的是()(A)NAT是英文“地址转换”的缩写,又称地址翻译(B)XAT用来实现私有地址与公用网络地址之间的转换(C)当内部网络的主机访问外部网络的时候,一定不需要NAT(D)地址转换的提出为解决IP地址紧张的问题提供了一个有效途径答案:ABD25、以下属于正确的主机的IP地址的是()(A)224. 0. 0.5(B)127. 32. 5. 62(0202. 112.5.0(D) 162. 111. 111. Ill答案:D注释:这个题目不是太严谨,应该加上子网掩码.A:224. 0. 0. 5是多播地址B: 127. 0.0. 0保留作为测试使用C:网络地址26、设置主接口由up转down后延迟30秒切换到备份接口,主接口由down转up后60秒钟切换回主接口的配置为()(A)standbytimer3060(B)standbytimer6030(C)standbytimerenable-delay60disable-delay30(D)standbytimerenable-delay30disable-delay60答案:D27、在一个以太网中,30台pc通过QuidwayR2501路由器s0 口连接internet, QuidwayR2501路由器配置如下:[Quidway-EthernetO] ipaddressl92. 168. 1. 1255. 255. 255. 0[Quidway-EthernetO]quit[Quidway]interfacesO[Quidway-SerialOJ ipaddress211. 136. 3. 6255. 255. 255. 252[Quidway-Serial0」link-protocolppp一台PC机默认网关为192. 168. 2.1,路由器会怎样处理发自这台PC 的数据包?(A)路由器会认为发自这一台PC的数据包不在同一网段,不转发数据包(B)路由器会自动修正这一台PC机的IP地址,转发数据包(C)路由器丢弃数据包,这时候需要重启路由器,路由器自动修正误配(D)路由器丢弃数据包,不做任何处理,需要重配PC网关为192. 168. 1. 1答案:D注释:PC的'默认网关要指向路由器的以太网口的IP地址.28、ISDNB信道速率是()(A)16kbps(B)64kbps(C)144kbps(D)2048kbps答案:B参考知识点:综合数字业务网(ISDN)由数字电话和数据传输服务两部分组成,一般由电话局提供这种服务。
思科考试题目
思科考试题目复习题1、使用MAC地址来转发帧的交换机工作于OSI模型的哪一层?A:第一层B:第二层C:第三层D:第四层2、以下交换机的模式中,哪一个是线路配置模式( )A:student1(config)#B:student1(config-line)#C:student1(config-if)#D:student1#3、以下交换机的模式中,哪一个是接口配置模式()A:student1#B:student1(config)#C:student1(config-if)#D:student1>4、网络管理员为一台Cisco交换机配置IP地址,他该如何操作?A:在特权模式下B:在交换机的接口FastEthernet 0/0上C:在管理Vlan中D:在连接到路由器或下一条设备的物理接口上5、设置主机名的命令是( )A:host name B:hostname C: name D:name V6、选择交换机的第1至第24口的快速以太网端口,则配置命令为( )A:student1(config)# interface fa0/1 - 24B:student1(config)# interface range fa0/1 ~ 24C:student1(config)# interface range fa0/1 , 24D:student1(config)# interface range fa0/1 - 247、取消管理IP地址,可执行( )配置命令A:no address B:no ip addressC:ip address D:no ip8、启用HTTP服务,配置命令:( )A:ip serverB:ip http serverC:ip httpD:http server9、Catalyst交换机必须处于哪个VTP模式,才能在管理中删除或添加VLAN?A:客户端B:服务器C:指定模式D:以上都不对10、无线接入点工作于OSI模型的哪一层?A:物理层B:数据链路层C:网络层D:应用层11、以下交换机的模式中,哪一个是全局配置模式()A:student1(config-if)#B:student1(config)#C:student1#D:student1>12、将交换机命名为stu的命令是()A:student1(config)#hostname stu B:student1(config)#name stuC:student1(config)# stu D:student1(config)#namehost stu13、执行命令student1>enable后的作用是( )A:进入用户模式B:进入特权模式C:进入安全模式D:进入全局模式14、网络管理员为一台Cisco交换机配置特权密码地址,他该如何操作?A:在全局模式下,配置密码B:在交换机的接口FastEthernet 0/0上C:在管理Vlan中D:在用户模式下15、以下交换机的模式中,哪一个是特权配置模式( )A:student1(config)#B:student1#C:student1(config-if)#D:student1(config-line)#16、Catalyst交换机处于哪个VTP模式,不能删除或添加VLAN?A:客户端B:服务器C:指定模式D:以上都不对17、配置管理IP地址,可执行( )配置命令A:no address B:no ip addressC:ip address D:no ip18、show running-config 命令的作用是( )A:显示当前正在运行的配置B:显示故障配置C:显示启动配置D:以上都不对19、选择交换机的第1至第24口的快速以太网端口,则配置命令为( )A:student1(config)# interface fa0/1 - 24B:student1(config)# interface range fa0/1 ~ 24C:student1(config)# interface range fa0/1 , 24D:student1(config)# interface range fa0/1 - 2420、禁用HTTP服务,配置命令:( )A:ip serverB:ip httpC:ip http serverD:no ip http server1、_____虚拟局域网_________(Virtual Local Area Network)通常简称为___VLAN_________。
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 and r5.f. create a static route on router r2 (ip route 22.1.1.0 255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to addadditional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to 137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with 200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear asone route to ospf.。
思科认证CCNP经典试题
第一部分填空题1、在Cisco体系的IGP协议中,RIP的A-D管理距离是,EIGRP的域内A-D管理距离是,EIGRP的域外A-D管理距离是OSPF的A-D管理距离是。
BGP 从EBGP学习到的路由学到路由的A-D管理距离是; BGP从IBGP学习到的路由学到路由的A-D管理距离是。
2、BGP的默认MED值为;其中MED越越优选被用于选路;BGP从邻居哪里学到的权重为;BGP自己本路由产生的路由(始发路由)产生权重是;BGP 的默认本地优先级为:。
3、BGP的邻居分为和。
4、OSPF在那个区域(有区域0,区域1,区域2)广播多路访问(比如以太网,没有出现外部网络),在区域0可以看到类LSA。
如果想看到2类LSA,必须在网络类型;在NSSA区域可以看到类LSA,在纯粹的NASS区域内是否有5类LSA?(回答是或者否)。
5、HSRP包括哪六种状态?6、OSPF在MA网络链路类型的HELLO报文作用?(3种)7、IPV6的本地链路地址是;本地站点地址是。
(没有/10的写法)8、在选择STP的角色(身份)有哪些?,默认STP的收敛时间为。
配置了portfast后,收敛时间会小于。
9、OSPF发送hello包的组播地址是,EIGRP组播地址是;HSRP发送hello包组播地址是;VRRP发送hello 包的组播地址是。
10、目前以太通道最多可以使用条物理线缆逻辑捆绑成一个以太通道接口?形成以太通道方式有。
11、BGP在EBGP中使用属性避免AS间的环路(确保无环),该属性属于BGP的间的环路(确保无环)必遵属性,其中还有哪两个是BGP公认必遵属性为和。
第二部分选择1、在对基于CEF的多层交换(MLS)进行排错的时候,例如解决无法到达特定的IP目标等问题,首先需要先查看哪两张表去验证错误?()A、IP路由表和路由表B、IP路由和CEF邻接关系表C、TCAM中的IP CEF FIB和邻接关系表D、IP路由表和ARP表2、EIGRP位一个混合距离矢量协议,位一个混合距离矢量协议,在在METRIC值中使用K1-K5五个K值,默认情况下,使用K值分别是()A、K1,K2 B K3,K4 C、K1,K5 D、K1,K3 3、OSPF中router-id能标识一台设备的身份,下面说法正确的是()A、先选举手工配置,然后选择设备loopback地址大的,在选运行了宣告进OSPF最大的物理接口最大的地址。
思科网络工程师认证考试试题
思科网络工程师认证考试试题1、以下属于物理层的设备是( a )a、中继器b、以太网交换机c、桥d、网关2、在以太网中,是根据( b )地址来区分不同的设备的。
a、llc地址b、mac地址c、ip地址d、ipx地址3、以下为传输层协议的是( cd )a、ipb、icmpc、udpd、spx4、以下对mac地址描述正确的是( bc )a、由32位2进制数组成b、由48位2进制数组成c、前6位16进制由ieee负责分配d、后6位16进制由ieee负责分配5、以下属于数据链路层功能的是( cd )a、定义数据传输速率b、定义物理地址c、描述网络拓扑结构d、流控制6、ieee802.3u标准是指( b )a、以太网b、快速以太网c、令牌环网d、fddi网7、如果要将两计算机通过双绞线直接连接,正确的线序是( c )a、1--1、2--2、3--3、4--4、5--5、6--6、7--7、8--8b、1--2、2--1、3--6、4--4、5--5、6--3、7--7、8--8c、1--3、2--6、3--1、4--4、5--5、6--2、7--7、8--8d、两计算机不能通过双绞线直接连接8、在v.35和v.24规程中,控制信号rts表示(d)a、数据终端准备好;b、数据准备好;c、数据载体检测;d、请求发送;e、清除发送。
9、路由器作为网络互连设备,必须具备以下哪些特点。
( abe )a、至少支持两个网络接口b、协议至少要实现到网络层c、至少支持两种以上的子网协议d、至少具备一个备份口e、具有存储、转发和寻径功能f、一组路由协议g、必须有较高的协议处理能力10、路由器的作用有( abdg)a、异种网络互连b、子网间的速率适配c、连接局域网内两台以上的计算机d、隔离网络,防止网络风暴,指定访问规则(防火墙)e、子网协议转换f、加快网络报文的传递速度g、路由(寻径):路由表建立、刷新、查找h、报文的分片与重组11、调用上一条历史命令的快捷键是( a )a、ctrl-pb、ctrl-oc、alt-pd、alt-o12、交换机工作在osi七层的哪一层?(b)a、一层b、二层c、三层d、三层以上13、以下对csma/cd描述正确的是( a d?? )a、在数据发送前对网络是否空闲进行检测b、在数据发送时对网络是否空闲进行检测c、在数据发送时对发送数据进行冲突检测d、发生碰撞后mac地址小的主机拥有发送优先权14、以下对store and forward描述正确的是( ce )a、收到数据后不进行任何处理,立即发送b、收到数据帧头后检测到目标mac地址,立即发送c、收到整个数据后进行crc校验,确认数据正确性后再发送d、发送延时较小e、发送延时较大15、以下对交换机工作方式描述正确的是( abd )a、可以使用半双工方式工作b、可以使用全双工方式工作c、使用全双工方式工作时要进行回路和冲突检测d、使用半双工方式工作时要进行回路和冲突检测16、vlan的`主要作用有(acd )a、保证网络安全b、抑制广播风暴c、简化网络管理d、提高网络设计灵活性17、在交换机中用户权限分为几个级别( d )a、1b、2c、3d、418、在路由器的配置过程中查询以s开头所有命令的方法是(b)a、直接使用?b、s?c、s ?d、dir s*19、第一次配置路由器时可以使用的方法为( a )a、使用con口本地配置b、使用con口远程配置c、使用aux口远程配置d、使用telnet远程配置20、在何种状态下可以为路由器改名( b?)a、普通模式b、超级模式c、全局模式d、接口模式21、某公司申请到一个c类ip地址,但要连接6个的子公司,最大的一个子公司有 26台计算机,每个子公司在一个网段中,则子网掩码应设为( d )。
Cisco认证实验考试经典题库CCIE_BootCamp3.0
Cisco认证实验考试经典题库CCIE_BootCamp3.0(第十章)137.20.0.0/24 is subnetted, 1 subnets c 137.20.20.0 is directly connected, ethernet 0 172.168.0.0/16 is variably subnetted, 7 subnets, 2 masks o ia 172.168.30.0/24 [110/65] via 172.168.100.3, 00:09:03, serial 1.1 i 172.168.40.0/24 [100/8576] via 172.168.200.2, 00:01:11, serial 1.2 o ia 172.168.60.0/24 [110/1572] via 172.168.65.1. 00:09:03, bri0 c 172.168.65.0/24 is directly connected, bri0 c172.168.100.0/24 is directly connected, serial 1.1 o172.168.100.0/24 [110/64] via 172.168.100.3, 00:09:13, serial 1.1 c 172.168.200.0/24 is directly connected, serial 1.2 o e1 192.168. 21.0/24 [110/21] via 137.20.20.1.00:09:03, ethernet 0 o e1 192.168. 17.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o e1 192.168. 70.0/24 [110/21] via 137.20.20.1. 00:09:03, ethernet 0 o*e10.0.0.0/0 [110/21] via 137.20.20.1. 00:09:03, ethernet 0r5#show ip ospf int bri0 bri0 is up, line protocol is up (spoofing) internet address 172.168.65.2/24, area 10 process id 1, router id 172.168.200.1, network typepoint_to_point, cost 1562 run as demand circuit donotage lsa allowed. transmit delay is 1 sec, state point_to_point,timer intervals configured, hello 10, dead 40, wait 40, retransmit 5 hello due in 00:00:06 neighbor count is 1, adjacent neighbor count is 1 adjacent with neighbor172.168.100.6 (hello suppressed) suppress hello for 1 neighbor(s) r5#show dialer bri0 – dialer type =isdn dial string successes failures last called last status 4930622 1 0 00:08:45 successful 0 incoming call(s) have been screened 0 incoming call(s) rejected for callback bri0:1 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle bri0:2 – dialer type =isdn idle time(45 secs), fast idle timer (20 secs) wait for carrier (30 secs), re-enable (15 secs) dialer state is idle r5# now go back to router r7 and bring up router r7’s interface s4 again 3. ipx configuration –15 pts (1 hour) a. configure all the active interfaces, including loopbacks, on routers r1, r2, r3, r5, r6, and r8 for ipx. b. configure router r8 and the lan interfaces on routers r3, r4, r5 and r6 for ipx rip. c. configure router r1 & r2 for ipx nlsp. d. configure the serial interfaces on the rest of the routers for ipx eigrp( not routers r1& r2 these oly use nlsp), also make the ethernet interface on router r2 ipx eigrp only. e.configure the bri0 interfaces on routers r5 & r6 as ipx rip. f. after this point you should be able to see all the ipx networks in all the routers routing table. test connectivity with ipx ping.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第九章)j. make the default route on r2 appear in he routing table of all the other routers. k. configure routers r1, r2’ss1, and router r8’s ethernet interface e0 for eigrp. configure router r8’s interface to0 for rip. l. redistribute all routers between all routing protocols such that all routes are visible in all routers and every router can ping each other’s ip interfaces (even the loopback on r2) as shown on the lab diagram lab 5a. m. make sure that all ospf external routes appear as type-1, verify your routes. are the routes appearing in the correctly routing protocol? n. configure router r5 such that the only route on r6 for the 137. 20.0.0 network appears exactly as follows; o 137.20.20.0 [110/65] via 172.168.100.5,00:51:03, serial 1. hint pay attention to the underlined value 65. o. configure routers r3 & r4 to resolve dns namesusing dns servers 207.238.183.71 &207.238.183.72. 2. ospf demand circuit –15 pts (1 hour) a. use network172.168.65.0/24 for the isdn interfaces on routers r5 &r6 and ass them to ospf. configure routers r5 & r6 to use the isdn interfaces for restoral[ 恢复]. the isdn link should only come up when you administratively shutdown the serial 4 interface on router r7, and there is interesting traffic trying to get between routers r5 & r6 (i.e. use ping as the interesting traffic to test. make sure you test from router r6 and from router r5. see the router ports/configuration into online for the phone #’s, spids, and switch type if you are using our remote racks. configure the isdn link so that it will shutdown 45 seconds after an inbound or outbound ping packet. both routers should shave full ospf routes when the frame link is functional or not. you are required to use ospf demand-circuit as your solution here, after the initial isdn call to synchronize ospf, your isdn interfaces should stay down unless you break the frame connection between r5 and r6 and there is interesting traffic. now go to router r7 and shut down interface s4, your isdn connection should kick in and provide a backup path for router r6 to reach the rest of the network, butonly when there is data to send. ospf router updates should not keep the isdn up. pretend [假装]your isdn line is charged at $5 per minute and it comes out of your check. at this point when router r7’s interfaces s4 (your frame connection) is still down. router r5 should have the following displays for:”show ip route”, “show ip ospfint bri0”, and “show dialer”notice that the isdn connection is down and router r5 has a routing table with ospf entries using interface bri0 to get to router r6’s ethernet network, and is suppressing ospf hellos for 1 neighbor. also pay attention to the ospf dead time on r5’s bri0 interface. output from router r5 r5# show ip route codes: c- connected, s-static i- igrp, r-rip, m-mobile, b-bgp, d-eigrp, ex-eigrp external, o-ospf, ia-ospf inter area, n1-ospf nssa external type 1, n2- ospf nssa external type2, e1- ospf external type 1, e2- ospf external type 2 e- egp i- is-is, l1- is-is lever-1, l2- is-is level-2, *- candidate default, u- per-user static route, o- od gateway of last resort is 137.20.20.1 to network0.0.0.0Cisco认证实验考试经典题库CCIE_BootCamp3.0(第八章)3. bgp configuration –15pts (1h)a. place router r4 in bgp as 1 and router r3 in bgp as 2. create two static routes to null0 using a class a address with a 24-bit mask on r4 and inject into bgp such that router r3 can see it. use loopbacks as the update source on both routers r3 and r4. create loopback interface as necessary.b. filter one of the static routes with a route-map statement on router r4.c. configure bgp on router r4 such that the sub-netted class a route is seen. for example, the bgp route on router r3 could be 41.1.1.0 not 41.0.0.0.d. configure a second loopback interface on router r4 at 200.200.200.1/24 and enable rip on this router for this network. inject this route and the previous one with a metric of 5.e. configure router r2, r1, and r5 in bgp as3. use only one neighbor x.x.x.x remote-as x statement on routers r2 andr5.f. create a static route on router r2 (ip route 22.1.1.0255.255.255.0 null0) inject this route into bgp. make sure the other routers running bgp can see this route.g. also make sure all routers can ping 200.200.200.1.you have completed lab 4 compare your configurations to the ones we provided. often there is more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations toolab5at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration & ospf -35pts (2 h)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. configure router r2’s ethernet interfaces with ip address 137.20.20.1/24 and router r2’s default route to137.20.20.2.c. use a 24-bit mask unless told to use otherwise.d. create a loopback interface on router r2 with200.200.200.1/24.e. connect router r3, r4, r5, and r6 over frame-relay. configure router r5 using sub-interfaces.f. connect routers r3, r4, r5 and r6 over frame-relay. configure router r5 and router r4 on a different subnet.g. configure ospf on router r3’s interface s1, router r6’s interface s1, and router r5’s sub-interface s1.1 for ospf area 10, place r5’s and r2’s ethernet interface in ospf area 0.h. configure the connection between router r5’s interface s1.2 and router r4 for igrp.i. configure router r6’s ethernet e0 as ospf area 6. configure router r3’s token-ring interface to0 as ospf area 3. configure two loopback interfaces on router r3 with networks that contain at most 30 hosts and put both loopbacks in the same area as the token-ring interface. summarize the loopback subnets and router r3’s interface to0 to appear as one route to ospf.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第七章)d. routers r1, r3 and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with a 9-bit subnet mask on its ethernet interface.(the mask should be 255.255.128.0) sue subnet-zero here.g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface. (the mask shouldbe 255.255.0.0)i. use network 11.1.x.x 255.255.0.0 between routers r5 &r6.2. ospf & other ip routing configuration –35 pts (1hous 30 mins)a. configure ospf area 0 on the frame-relay interfaces between routers r1,r3, and r5.b. place router r1’s ethernet in ospf area 1. place router r3’s interface to 0 in ospf area 2.c. place router r3’s interface serial 0, and all of router r4 in ospf area 3. make ospf area 3 a totally-stubby area.d. place r5 and r6 ethernet interface in ospf area 4. make this ospf area a nssa (not-so-stubby-area) make the default cost 20.e. configure router r6’s interface serial 0 and routerr8’s interfaces s0, e0,and loop 0 for eigrp.f. place router r2’s interface serial 0 and router r1’ss0.1 in ospf area 5.g. redistribute all routes so that you can see all routes and ping from everywhere.h. summarize the routers for router r8’s interface e0, loop0, and s0 that were redistributed into ospf by routerr6 on router r5 so that all of router r8’s networks appear as one route to the rest of the ospf routers except r6.i. when you redistribute eigrp into ospf make these routes appear as type-1 external routes.j. configure router r2 such that it propagates a default route the other ospf routers.k. create a second loopback interface on router r2 with an address of 20.1.1.1/24. make sure you can ping the second loopback interface on router r2 from other the routers.l. create two loopbacks on router r3 with networks that could contain at most 30 hosts. place the loopbacks onrouter r3 in one area and summarize such that one route appears for both loopacks.m. place the ethernet interface on router r2 in area 10. n. configure simple password authentication in ospf area 4. o. use the ip ospf priority command on router r5 to make it become the dr for ospf area 4.p. change the cost on router r5’s interface e0 using an ip ospf command to make it appear as 100mbps as it relates to ospf metrics.q. change the cost on r6’s e0 without using an ip ospf command to make it appear as 100mbps as it relates to ospf metics.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第六章)d. configure two static saps on router r3. filter on router r5 such that routers r6 and r8 only see one of the saps.e. disable ipx on the between routers r3 &r4 all routes should still be seen by all routers running ipx.f. change the frequency of the rip updates across the r3-r4serial connection to once every 2 minutes.g. configure router r1’s ethernet with ipx 802.2 and 802.3 raw frame types.h. configure routers r3 and r4 to pass ipx netbios type-20 broadcasts between their lan interfaces.5. dlsw configuration – 10 pts (45 mins)a. configure dlsw between router r3’s interface token-ring0 and router r4’s interface ethernet 0.b. place router r2’s interface ethernet 0 into the dlsw network. make sure there is connectivity between all lan interfaces.c. configure a filter that blocks netbios packets with destination name ‘cciering1” from leaving router r3’s interface to0.d. setup a filter that would permit only sna traffic between routers r3 & r4.6. bgp configuration – 15 pts (1h)a. configure bgp on router r4 using as number 1. configure bgp on routers r1, r2, r3 and r5 using as number 2. you can only use one neighbor x.x..x.x remote-as 2 command on routers r2 and r5.b. configure two static routes to 172.168.1.0/24 and172.168.2.0/24 using the command ip route 172.168.1.0255.255.255.0 null 0 on router r4, redistribute the second route into bgp using the route-map command.c. make sure that router r5 can see the 172.168.2.0 route.d. setup router r8 with bgp in as number 3. on router r8 use the loopback interface lo0 as the source for its bgp connection to as2. make sure router r8 can see the specific 172.168.2.0 route, and not the aggregate 172.168.0.0you have completed lab 3. compare your configurations to the ones we provided. often there si more than one to complete a task so your configuration may be different than ours. if your configuration are different than ours make sure you understand how to complete the lab with our configurations too.lab4at the end of this lab verify connectivity to all ports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration -10pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1,r2,r3, and r5 over the frame-relay. configure router r1 using sub-interfaces. configure routers r2.r3, and r5 without using sub-interfaces.c. use only frame-relay pvc on routers r2, r3 and r5. the recommended dlci numbers 102.201.103.105, and 501 are indicated on the network diagram.Cisco认证实验考试经典题库CCIE_BootCamp3.0(5)i. configure the ethernet interface e0 on router r4 to bein ospf area 40. j. configure the r5, r6, and r8 ethernet 0 interface to use eigrp. k. configure r8’s interface loop5 as 192.168.100.1/24 and add it to rip l. redistribute routes between all protocols such that router r1 can ping any interface. m. configure 2 loopbacks interfaces onrouter r8 with 10.1.1.1/24 & 10.1.2.1/24. add there to rip and redistribute rip to eigrp. summarize such that allrouters only see one route to the loopback interfaces. test connectivity to loopback interface via ping. n. filter such that router r6 can ping the loopbacks on router r1, but not the ethernet interface on router r1. the route for the ethernet on router r1 should still be visible and all other traffic such as telnet should still pass unfiltered. o. filter on router r5 such that routers r1 r2, r3, and r4, don’t see the route to router r8’s interface loopback 5. p. create three loopback interfaces on router r8 and use 160.10.10.1/24 for loopback 2, q. 161.10.10.1/24 for loopback 3, and 170.10.10.1 for loopback 4. now summarize the three loopback networks into one route. when done router r1 should see only one route for these three loopback interfaces ana should be able to ping all three of them. hint, the route may not look like what you think. 3. ntp & access-list & other tasks -15 pts (30 mins) a. configure ntp between routers r2 &r3. make r2 the time source. set the correct time and date on router on router r2. set the time-zone on routers r2 & r3, verify that router r3 has synced with router r2 via ntp. b. configure queuing on router r3’s s0 interface such that telnet, ip, ipx, and everything else use 25% of the bandwidth each.configure the queuing such that none of the traffic defined at 25% above uses more than 1000 bytes per time slice. you are allowed to exceed 1000 bytes per time slice only if there is part of a remaining individual packet that needs to be emptied from the queue. c. configure the frame-relay interface on router r2’s interface so such that ip is discard eligible on the frame. d. create the following 6 static routes on router r6; suing the cisco ios command ip route 192.168.x.0 255.255.255.0 null 0. use the number1,2,3,4,5 and 6 for the variable x. redistribute the static routes such that they are seen by all the other routers. now filter on router r5 using any method that use an access list so that only the even routes (i.e. x=2,4,and 6) are seen past router r5 towards the ospf network. your access-list can only have two lines in it, not seven for this exercise. all the 192.168.x.0 routes must still be seen in router r5’s routing table.4. ipx configuration – 20 pts (1h) a. configure all interface(including loopbacks ) for ipx b. configure ipx eigrp on the nbma frame-relay network c. configure ipxrip/sap everywhere else.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第四章)n. filter on router r5 such that the bgp route to null0 defined on router r4 isn’t seen on routers r6 &r8. o. hint the object of this bgp section is to provide end-to-end connectivity between all routers and interfaces. in this exercise you are not allowed to configure igp or two-way static route connectivity between routers r5 & r6, bgp should be providing the necessary routing information. you are allowed to setup a default route on router r6 to point to router r5. now that you have completed lab 2 check., the routing tables on all routers. do they make sense? ping all interfaces from all routers. can you ping everywhere? do the appropriate routers see the static route to null0 on r4 via bgp? go to every router and ping every interface. if you can’t ping everything you are not done yes. you have completed lab 2. compare your configuration to ones we provided. often there is more than one to complete a task so your configurations may be different than ours. if your configurations are different than ours make sure you understand how to complete the lab with our configurations too lab 3 at the end of this lab verify connectivity to allports. you should be able to ping every interface from any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are asked to filter packets. routes or other specific tasks. 1. initial configuration -5 pts (30 mins) a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks. b. configure lab 3 network using network 137.20.x.x c. create a loopback interface on router r2 with 172.168.32.1/24. d. connect routers r1,r2, r3, and r5 over frame-relay cloud. e. configure router r1 using sub-interfaces. f. configure router r2 without using sub-interfaces or frame-relay map commands. g. put routers r1 &r2 frame-relay interfaces on one subnet and routers r1, r3, and r5 on a different subnet. 2. ospf & other ip routing configuration -35 pts ( 2 h) a. configure ospf with the frame-relay cloud in ospf area 0 b. configure the r3-r4 serial connection to be in area 1. c. set the ring-speed on router r3 to 16 mbps. d. configure the loopback interface on router r2 in adifferent ospf area. e. configure the lan interfaces onrouters r1, r2,and r3 to be in different ospf areas. f. configure two loopbacks on router r3 using subnets thatwill contain at most 30 host ip addresses. g. configure two loopback interfaces on router r1 using subnets that will contain at most 14 host ip addresses. h. summarize the two loopback interfaces on routers r1 and r3 such that routerr2 only sees one route from each.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第三章)k. configure router r6 for ospf with a different process id than used thus far. do not configure r6’s e0 for ospf. l. configure router r8 to be in the same ospf area as routerr6. put router r8’s interface e0&lo0 into the ospf routing process. configure router r6 so that its s1 interface speed is correctly reflected in the ospf metrics without using the “ip ospf cost xxx” command. m. configure ospf message-digest authentication between routers r6 & r8. n. change the ospf hello interval between routers r6 & r8 to 45 seconds. o. configure router r8 suing the “ip ospf cost” command such that the speed of the link forinterface s0 is correctly reflected in the ospf metrics. p.change the ospf transmit interval delay to 10 seconds between routes r6 & r8. q. add a default route to router r2 that points to 137.20.20.2. configure one static route on router r2 so that full connectivity to r4’s interface e0 is available. you will notice that the default gateway of router r2 has a lower administrative cost than the one learned via router r1. as a result, the other default route never makes it in the routing table for router r2. r. you will notice that r2 can’t ping the serial interfaces between routers r3 & r4. fix this problem by only making changes to router r3 without static routes. 3. bgp configuration -15 pts (1 hour) a. configure router r4 in bgp autonomous system 1. b. create a static route to null0 router r4 and redistribute into bgp. c. create a loopback interface on r4 and add its network to bgp d. when adding the first loopback to bgp use a class a address with a 24-bit mask. the network that was added to bgp from the first loopback address should appear in the routing table of other routers as “ b 44.1.1.0…” e. create another loopback on router r4 with a class a address and put this network into rip and redistribute rip into bgp. f. configure router r3 in bgp autonomous system 1 and useinterface loopback 0 as the update source. g. configure routers r1, r2, and r5 in bgp autonomous system 2, only use one neighbor x.x.x.x remote-as 2 command on routers r2, r3. &r5 for autonomous system 2. h. place routers r6 and r8 in bgp autonomous system 3. i. configure bgp authentication between router r6 & r8. j. configure a loopback interface on router r8 and enable rip for this network. redistribute this rip network into ospf. k. redistribute the ospf routing process that contains routers r6 and r8 into bgp. l. you are not allowed to add any static routes to routerr8 during this exercise. m. configure router r6 such that all bgp routes learned from router r5 have a local preference of 300.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第二章)lab 2at the end of this lab verify connectivity to all ports. you should be able to ping every interface from and router. (don’t worry about being able to ping a local frame-relayinterface. please disregard this statement if you are asked to filter packets. routes or other specific tasks.)1. initial configuration – 5 pts (30 mins)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram. you may have to add additional ip addresses to complete some tasks.b. connect routers r1, r2, r3, and r5 over the frame-relay cloud. configure router r1 using sub-interfaces. configure routers r2, r3, and r5 without using sub-interface.c. use only one frame-relay pvc on routers r2, r3, and r5, the recommended dlci numbers 102,201,103, 301,105, and 501 for the frame-relay pvc’s are indicated on the network diagram.d. routers r1,r3,and r5 should share network 10.10.x.x 255.255.0.0 on their frame-relay interfacese. routers r1 and r2 should share network 10.20.x.x255.255.0.0 on their frame-relay interfaces.f. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)g. router r2 should have network 137.20.20.0 with a 24-bit mask on its ethernet interface.h. router r3 should have network 10.3.x.x with an 8-bit subnet mask on its token-ring interface ( the mask shouldbe 255.255.0.0)2. ospf configuration –30 pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between routers r1, r3 and router r5.b. place router r1’s ethernet in ospf area 1. place router r5’s interface e0 in ospf area 0.c. setup a default static route (default gateway) from r3to r4. redistribute this default static route into ospfwith a metric-type of 1 and a metric of 500.d. configure router r3’s serial 1 interface as173.168.40.1/24 and router r4’s serial 0 interface as172.168.40.2/24.e. configure router r4’s e0 interface as 200.100.100.1/24.f. configure a default gateway on router r4 to route all packets for which it has no routes to router r3.g. configure two loopback interfaces on router r3 with networks that could have at most 254 hosts and put themboth in the same ospf area, but different from ospf area 0. summarize this route into ospf so that the two subnets appear as one route.h. configure router r2 for eigrp and put all interface in the routing process.i. configure router r1 with eigrp and redistribute with ospf. set the metric type to type-1 when you redistribute from eigrp to ospf. also, redistribute ospf into eigrp.j. configure router r1 so that it only listens to eigrp updates on e0 and s0.2.Cisco认证实验考试经典题库CCIE_BootCamp3.0(第一章)1- day format version 3.002- policy routing frame relay ospflab#1network learning, inc. r&s ccie practice lab 1 version2.00 1-day versionat the end of this lab verify connectivity to all ports. you should be able to ping every interface form any router. (don’t worry about being able to ping a local frame-relay interface. please disregard this statement if you are askedto filter packets, routers or other specific tasks.)1. initial configuration – 5 pts (30 minutes)a. use the pre-configuration files to apply proper ip addresses to the router interfaces. add ip addresses as needed as shown on the network diagram.b. configure router r7 as a frame-relay switch. refer to the diagram for interface connections to other routers connected to router r7.c. connect routers r1,r2, r3, and r5 over the frame-relay cloud. configure router r1’s s0 interface as a sub-interface. configure r2,r3, and r5 without using sub-interfaces. use only one frame-relay pvc on routers r2, r3, and r5. the recommended dlci numbers 102, 201,103,301,105, and 501 are indicated on the lab diagram.d. routers r1, r2, r3, and r5 should share network10.10.x.x 255.255.0.0 on their frame-relay interfaces.e. router r1 should have network 10.1.x.x with an 8-bit subnet mask on its ethernet interface( the mask should be 255.255.0.0)f. make sure all the ethernet interfaces are in their own broadcast domain if you are using an ethernet switch for your ethernet connections.2. ospf configuration –25pts (2 hours 30 minutes)a. configure ospf area 0 on the frame-relay interfaces between r1, r2, r3, and r5.b. configure router r1’s interface ethernet 0 for ospf area 1c. configure router r2’s interface e0 for ospf area 10d. configure router r3’s interface s 1 and all of router r4’s interface for ospf area 3.e. configure router r5’s interface e 0 for ospf area 4.f. create two loopback interface on r4 and put both of the associated subnets on these interfaces in ospf area 44.g. summarize the (2) loopback interface you just created on router r4 so they appear as one route to the rest of the ospf routers in your network..h. here is the tricky part. you can’t use the command ip ospf network xxxx anywhere in your router configurations.i. redistribute the default route on router r2 as type-1 with a metric of 100. this route is already part of the initial configurations we provided for you.j. also, one of the problems in this lab can be solved with multiple frame map ip statements, but that is not the solution we want you to use, solve the problem with。
思科认证考试题库
思科认证考试题库2016年思科认证考试题库思科认证是由网络领域著名的厂商--Cisco公司推出的'。
是互联网领域的国际权威认证。
思科认证有CCNA、CCDA、CCNP、CCDP、CCSP、CCIP、CCVP、CCIE(又分为针对路由和交换;语音;存储网络;安全;电信运营商)等多种不同级别、不同内容、不同方向的各种认证。
下面一起来看看思科认证的考试题库吧!Below are questions 1-19. To see an explanation for each question, please refer to the explanation link below the question or select explanations on the navigation bar to the left.Questions1. [OxNx] During a TFTP transfer using Cisco Routers what is the numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header?a) 96b) 47c) a random number above 1024d) 69e) none of the above2. [CxNx] What is the standard encapsulation method used by Cisco routers for the Inte rnet Protocol (IP) on it’s Ethernet interfaces?a) SNAPb) ARPAc) NOVELL-ETHERd) DARPAe) Ethernet_802.33. [CxNx] What will be the correct command on a Cisco router to set the IP address of an interface assuming you are at the"router(config-if)#" prompt?a) ip address 1.1.1.1 255.255.255.0b) ip address 1.1.1.1c) ip 1.1.1.1d) ip 1.1.1.1 255.255.255.0e) none of the above4. [CxNx] Which commands will display the IP addresses of all interfaces on a Cisco Router? (Choose all that apply)a) show ip routeb) show ip addressc) show ip interfaced) show interfacee) display ip addresses5. [CxNx] Which of the following commands will display the contents of the ARP cache of your Cisco router?a) show ip arp cacheb) show ip routec) show ip arpd) show arpe) there is no way to display the ARP cache6. [CxNx] Reverse Address Resolution Protocol (RARP) is the process UM0-411 1T6-530 920-115 2B0-024 2B0-022 :a) Where an IP host resolves it’s IP address by broadcasting it’s MAC address to the network and a BOOTP server assigns it an IP address.b) Where an IP host resolves it’s MAC address by broadcasting to the local network it’s IP address.c) Where an IP host tries to resolve the MAC address of a destination by sending a network broadcast. The destination responds to the broadcast with it’s MAC address.d) Where an IP host resolves a destination IP address by sending a broadcast on the local network and the destination host responds with it’s IP address.e)There is no such process.7. [OxNx] Which of the following applications requires the connection-oriented layer four protocol, TCP? (Choose all that apply)a) Telnetb) FTPc) TFTPd) SNMPe) none of the above8. [RxNx] Which of the following are link state Routing Protocols.(Choose all that apply.)a) IPb) OSPFc) RIPd) EIGRPe) IS-IS9. [CxNx] Of the following commands, identify the correct one for clearing the IP arp table in memory of the router s10-100 2B0-102 190-534 HP0-750.a) clear ip arp-cacheb) clear ip arp-tablec) clear arp-cached) clear arp-tablee) clear arp-ram10. [CxNx] Which of the following explains the correct definition of administrative distance as it pertains to Cisco’s IOSmd0-251 9A0-013 jn0-541 ?a) The process by which routers select an administrator for an autonomous system.b) The process where a router will select the best path to a destination network.c) The process where a router will distance itself from other routers due to it’s lack of administrative experience.d) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the lowest administrative distance will take priority.e) The process where a router will prioritize routing protocols so that in the event two routing protocols have conflicting next hop addresses, the routing protocol with the highest administrative distance will take priority.11. [ExNx] Collisions occur whena) multiple packets are placed on a serial linkb) multiple stations listen for traffic and transmit at the same timec) when multiple tokens are on a ring simultaneouslyd) beaconing process takes place12. [RINx] How many subnets are possible with a Class C address and a subnet mask of 255.255.255.252?a) 32b) 30c) 60d) 62e) 413. [RxNx] What commands will list all protocols that are currently being routed? (Choose all that apply.)a) show ip protocolb) show protocolc) show rund) show starte) All of the above14. [xxNx] Which of the following are true of access lists?a) Access list should have at least one permit statement.b) The last configured line should always be a permit statement.c) Every access-list will implicitly deny all traffic.d) Access-lists are processed top down.e) All of the above.15. [xxNx] If the access-group command is configured on an interface and there is no access-list created which of the following is most correct?a) An error message will appear.b) The command will be executed and deny all traffic out.c) The command will be executed and permit all traffic out.d) The command will be executed and permit all traffic in and out.e) The command will be executed and deny all traffic in and out.16. [xxNx] What is the result of the command?" access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established"a) telnet sessions will be permitted regardless of the source addressb) telnet sessions will be denied regardless of the source addressc) telnet sessions will be denied if initiated from any addressother than 172.16.0.0 networkd) telnet sessions will be permitted to the 172.16.0.0 network onlye) telnet sessions will be denied to the 172.16.0.0 network only17. [xxNx] Which is generally true of the location of access-lists? (Choose all that apply.)a) Standard lists will most likely be placed close to the destination.b) Standard lists will most likely be placed close to the source.c) Extended lists will most likely be placed close to the destination.d) Extended lists will most likely be placed close to the source.e) It does not matter.18. [RxNx] Which of the following is most correct?a) IP is to TCP. as IPX is to SPX.b) RTMP is to Appletalk as IP RIP is to IP.c) NLSP is to IPX as OSPF is to IP.d) a is true.e) b is true.f) a & b are true.g) c is true.h) b & c are true.i) a, b and c are true.。
大二思科考试题库和答案
大二思科考试题库和答案一、单项选择题(每题2分,共20分)1. 思科公司(Cisco)成立于哪一年?A. 1984年B. 1990年C. 1995年D. 2000年答案:A2. 以下哪个协议是用于在IP网络中传输数据的?A. HTTPB. FTPC. TCPD. IP答案:D3. 在OSI模型中,哪一层负责建立、维护和终止通信会话?A. 应用层B. 传输层C. 会话层D. 网络层答案:C4. 以下哪个设备不是网络交换机?A. Layer 2 SwitchB. Layer 3 SwitchC. RouterD. Hub答案:D5. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show interfaceD. show ip interface brief答案:A6. 在Cisco设备上,哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. write memory答案:A7. 以下哪个命令用于在Cisco设备上创建一个新的VLAN?A. vlan databaseB. configure terminalC. enableD. show vlan答案:A8. 以下哪个命令用于在Cisco设备上将接口配置为Trunk模式?A. switchport mode accessB. switchport mode dynamicC. switchport mode trunkD. switchport mode static答案:C9. 以下哪个协议用于在IP网络中自动分配IP地址?A. DHCPB. DNSC. FTPD. HTTP答案:A10. 在Cisco设备上,哪个命令用于查看设备的接口状态?A. show interfacesB. show ip interface briefC. show running-configD. show vlan答案:B二、多项选择题(每题3分,共15分)11. 以下哪些协议属于TCP/IP模型的应用层协议?A. HTTPB. FTPC. SNMPD. IP答案:A, B, C12. 在Cisco设备上,以下哪些命令用于配置接口?A. interfaceB. ip addressC. no shutdownD. enable答案:A, B, C13. 以下哪些设备可以作为网络的核心设备?A. SwitchB. RouterC. FirewallD. Hub答案:A, B14. 以下哪些命令用于在Cisco设备上查看网络信息?A. show ip routeB. show running-configC. show interfaceD. ping答案:A, C, D15. 以下哪些因素可以影响网络的性能?A. 带宽B. 延迟C. 丢包率D. 网络拓扑结构答案:A, B, C, D三、填空题(每题2分,共20分)16. 在Cisco设备上,使用________命令可以进入特权模式。
思科期末考试题库和答案
思科期末考试题库和答案一、单选题1. 在思科网络技术中,OSI模型的第4层是什么?A. 传输层B. 会话层C. 表示层D. 应用层答案:A2. 以下哪个协议是用于在网络层进行路由选择的?A. TCPB. IPC. UDPD. FTP答案:B3. 动态主机配置协议(DHCP)工作在OSI模型的哪一层?A. 应用层B. 传输层C. 网络层D. 数据链路层答案:D4. 以下哪个命令用于在思科设备上查看当前配置?A. show running-configB. show startup-configC. show interface statusD. show ip route答案:A5. 在思科设备上,哪个命令用于保存当前的配置到启动配置中?A. copy running-config startup-configB. copy startup-config running-configC. saveD. write答案:A二、多选题6. 以下哪些是思科交换机上常用的端口类型?A. FastEthernetB. GigabitEthernetC. TenGigabitEthernetD. Serial答案:A, B, C, D7. 在思科设备上,以下哪些命令用于管理VLAN?A. vlan databaseB. enableC. configure terminalD. exit答案:A, C8. 以下哪些是思科路由器上常用的接口类型?A. FastEthernetB. GigabitEthernetC. SerialD. ATM答案:A, B, C, D9. 以下哪些是思科设备上用于查看网络状态的命令?A. show ip interface briefB. show running-configC. show interface statusD. ping答案:A, C, D10. 在思科设备上,以下哪些命令用于配置静态路由?A. ip routeB. ip routingC. routeD. configure terminal答案:A, D三、判断题11. 思科的IOS(Internetworking Operating System)是运行在所有思科设备上的软件。
思科考试真题和答案
思科考试真题和答案****一、单选题1. 以下哪项是思科设备默认的VLAN?A. VLAN 1B. VLAN 10C. VLAN 100D. VLAN 200答案:A2. 思科设备默认的管理VLAN是哪个?A. VLAN 1B. VLAN 10C. VLAN 20D. VLAN 100答案:A3. 在思科设备上,以下哪个命令可以查看当前设备的VLAN信息?A. show vlanB. show interfaceC. show running-configD. show ip interface brief答案:A4. 在思科设备上,以下哪个命令可以进入全局配置模式?A. enableB. configure terminalC. privileged execD. user exec答案:B5. 在思科设备上,以下哪个命令可以查看设备的接口状态?A. show interfaceB. show running-configC. show vlanD. show ip interface brief答案:A二、多选题1. 以下哪些命令可以在思科设备上创建VLAN?A. vlan <vlan_id>B. configure terminalC. interface vlan <vlan_id>D. switchport mode access答案:A, C2. 在思科设备上,以下哪些命令可以配置接口为Trunk模式?A. switchport mode trunkB. switchport trunk encapsulation dot1qC. switchport nonegotiateD. switchport mode dynamic auto答案:A, B, C, D3. 以下哪些命令可以在思科设备上查看接口的Trunk信息?A. show interfaces trunkB. show interface statusC. show vlanD. show running-config答案:A, B三、判断题1. 思科设备默认的VLAN是VLAN 1。
思科Cisco认证最新真题50道:TCPIP
思科Cisco认证最新真题50道:TCP/IP1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?A. 255.0.0.0B. 255.255.0.0C. 255.245.255.0D. 255.255.255.0E. 255.255.255.2552: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?A. TCPB. UDPC. IPD. ICMP3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?A. 255.255.0.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.1604: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?A. 172.16.12.33/28B. 172.16.12.32/27C. 172.16.12.33/27D. 172.16.12.34/27E. 172.16.12.35/28F. 172.16.12.38/28G. 172.16.12.63/275: The address 172.16.208.16/20 is a host address in which of the following subnets?A. 172.16.176.0–255.255.240.0B. 172.16.192.0–255.255.240.0C. 172.16.208.0–255.255.240.0D. 172.16.224.0–255.255.240.06: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.2487: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?A. One network with 254 hostsB. Two networks with 128 hostsC. Four networks with 64 hostsD. Six networks with 30 hosts8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)A. 201.168.27.33B. 201.168.27.112C. 201.168.27.119D. 201.168.27.126E. 201.168.27.175F. 201.168.27.2089: What is the subnetwork address for a host with the IP address 201.100.5.68/28?A. 201.100.5.0B. 201.100.5.32C. 201.100.5.64D. 201.100.5.65E. 201.100.5.31F. 201.100.5.110: Which of the following protocols uses a three-way handshake mechanism to establish sessions?A. TCPB. IPC. UDPD. IPXE. Frame relay11: Which of the following protocols is connection-oriented?A. TCPB. IPC. IPXD. Frame relay12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?A. TCPB. IPC. UDPD. SPXE. AppleTalk13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as _________.A. MTU adjustmentB. WindowingC. Flexible Send PathD. FCS14: If the destination did not receive a segment, how will the TCP host know to resend the information?A. The ACK received will not include the segment number that was not received.B. The ACK received will include the segment number that was not received.C. The sending host will send a PACK to verify segment receipt.D. The destination host will send a YACK message back to the sending host.15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?A. Class AB. Class BC. Class CD. Class DE. Class E16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)A. 10.23.45.67B. 126.21.34.56C. 172.16.32.1D. 172.31.234.55E. 192.169.4.517: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?DepartmentNumber of UsersCorporate7Customer Support15Financial13HR7Engineering16A. 255.255.255.0B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.24818: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?A. UDPB. TCPC. SNMPD. ICMP19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)A. MAC address resolutionB. Sequence numbersC. AcknowledgmentsD. PingE. Routing updates20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?A. Increased throughputB. Decreased throughputC. Increased latencyD. Decreased reliability21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.224E. 255.255.255.240F. 255.255.255.24822: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?A. ARPB. RARPC. SLARPD. DHCP23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?A. The host's default gateway is down.B. The destination host is not powered on.C. The IP address of the router interface is incorrect.D. The IP address of the switch to which the destination host connects is incorrect.E. The host is in a different subnet.24: Which of the following classes of IP addresses is utilized for multicasting?A. Class AB. Class BC. Class CD. Class D25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her:A. It represents the number of hosts possible on that subnetwork.B. It represents the number of subnetworks that are being used.C. It represents the class of IP address being used.D. It represents the number of bits in the subnet mask that are 1.26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.224E. 255.255.255.24027: Which of the following would a Class A network be assigned to?A. Government agencyB. Small-to-medium sized corporationC. SOHOD. An individual28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)A. 192.168.5.95B. 192.168.5.100C. 192.168.5.128D. 192.168.5.11029: Which of the following IP addresses is not a public IP address that can be routed over the Internet?A. 2.3.4.5B. 11.12.13.14C. 165.23.224.2D. 172.31.45.34E. 203.33.45.2230: You are given a Class B network. What is the default subnet mask assigned to the Class B network?A. 255.255.255.255B. 255.255.0.0C. 255.224.0.0D. 0.0.0.031: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address?A. Class C addresses cannot be assigned to Ethernet interfaces.B. The /27 is an invalid mask.C. It is a broadcast address.D. It is a public IP address.E. It is a private IP address.32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?A. 255.255.255.254B. 255.255.254.0C. 255.255.240.254D. 255.255.0.033: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of 255.255.255.248?A. 192.168.2.24/192.168.2.31B. 192.168.2.32/192.168.2.39C. 192.168.2.40/192.168.2.47D. 192.168.2.48/192.168.2.55E. 192.168.2.56/192.168.2.6334: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?A. 218B. 219C. 220D. 221E. 22235: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?A. 75B. 83C. 90D. 9736: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?A. 198B. 214C. 252D. 25537: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?A. 182B. 192C. 202D. 21238: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.19239: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?A. 62 networks and 2 hostsB. 6 networks and 30 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 16 networks and 14 hosts40: What is a disadvantage of using a connection-oriented protocol such as TCP?A. Packet acknowledgment might add overhead.B. Packets are not tagged with sequence numbers.C. Loss or duplication of data packets is more likely to occur.D. The application layer must assume responsibility for the correct sequencing of the data packets.41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?A. 62 networks and 2 hostsB. 6 networks and 30 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 14 networks and 14 hosts42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)A. 165.203.2.0B. 165.203.5.192C. 165.203.6.63D. 165.203.6.191E. 165.203.8.25543: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)A. 192.168.32.33B. 192.168.32.112C. 192.168.32.119D. 192.168.32.126E. 192.168.32.175F. 192.168.32.20844: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?A. 198.57.78.33B. 198.57.78.64C. 198.57.78.97D. 198.57.78.97E. 198.57.78.159F. 198.57.78.25445: What is the subnetwork address for a host with IP address 165.100.5.68/28?A. 165.100.5.0B. 165.100.5.32C. 165.100.5.64D. 165.100.5.65E. 165.100.5.31F. 165.100.5.146: Your boss wants to know what TCP stands for. What do you tell him?A. Transmission Check ProtocolB. Transport Check ProtocolC. Transmission Control ProtocolD. Transport Control Protocol47: Your boss wants to know what UDP stands for. What do you tell him?A. Unreliable Data ProtocolB. Unreliable Data ProgramC. User-Defined ProtocolD. User Datagram Protocol48: Which of the following statements accurately describes UDP?A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP).49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)A. 10.20.12.64B. 172.16.32.129C. 172.64.32.34D. 192.168.23.252E. 196.104.12.95F. 214.192.48.25450: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)A. Assign a public IP address.B. Use the shutdown command.C. Use the no shutdown command.D. Make sure the interface is running in full-duplex.。
思科认证最新真题50道:TCPIP
为⼤家收集整理了《思科认证最新真题50道:TCP / IP》供⼤家参考,希望对⼤家有所帮助 1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him? A. 255.0.0.0 B. 255.255.0.0 C. 255.245.255.0 D. 255.255.255.0 E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity? A. TCP B. UDP C. IP D. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? A. 255.255.0.0 B. 255.255.255.0 C. 255.255.255.192 D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch? A. 172.16.12.33/28 B. 172.16.12.32/27 C. 172.16.12.33/27 D. 172.16.12.34/27 E. 172.16.12.35/28 F. 172.16.12.38/28 G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A. 172.16.176.0–255.255.240.0 B. 172.16.192.0–255.255.240.0 C. 172.16.208.0–255.255.240.0 D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use? A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her? A. One network with 254 hosts B. Two networks with 128 hosts C. Four networks with 64 hosts D. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.) A. 201.168.27.33 B. 201.168.27.112 C. 201.168.27.119 D. 201.168.27.126 E. 201.168.27.175 F. 201.168.27.208 9: What is the subnetwork address for a host with the IP address 201.100.5.68/28? A. 201.100.5.0 B. 201.100.5.32 C. 201.100.5.64 D. 201.100.5.65 E. 201.100.5.31 F. 201.100.5.1 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions? A. TCP B. IP C. UDP D. IPX E. Frame relay 11: Which of the following protocols is connection-oriented? A. TCP B. IP C. IPX D. Frame relay 12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use? A. TCP B. IP C. UDP D. SPX E. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as _________. A. MTU adjustment B. Windowing C. Flexible Send Path D. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information? A. The ACK received will not include the segment number that was not received. B. The ACK received will include the segment number that was not received. C. The sending host will send a PACK to verify segment receipt. D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient? A. Class A B. Class B C. Class C D. Class D E. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.) A. 10.23.45.67 B. 126.21.34.56 C. 172.16.32.1 D. 172.31.234.55 E. 192.169.4.5 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table? Department Number of Users Corporate 7 Customer Support 15 Financial 13 HR 7 Engineering 16 A. 255.255.255.0 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself? A. UDP B. TCP C. SNMP D. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.) A. MAC address resolution B. Sequence numbers C. Acknowledgments D. Ping E. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network? A. Increased throughput B. Decreased throughput C. Increased latency D. Decreased reliability 21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.224 E. 255.255.255.240 F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts? A. ARP B. RARP C. SLARP D. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him? A. The host's default gateway is down. B. The destination host is not powered on. C. The IP address of the router interface is incorrect. D. The IP address of the switch to which the destination host connects is incorrect. E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting? A. Class A B. Class B C. Class C D. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork. B. It represents the number of subnetworks that are being used. C. It represents the class of IP address being used. D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.224 E. 255.255.255.240 27: Which of the following would a Class A network be assigned to? A. Government agency B. Small-to-medium sized corporation C. SOHO D. An individual 28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.) A. 192.168.5.95 B. 192.168.5.100 C. 192.168.5.128 D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet? A. 2.3.4.5 B. 11.12.13.14 C. 165.23.224.2 D. 172.31.45.34 E. 203.33.45.22 30: You are given a Class B network. What is the default subnet mask assigned to the Class B network? A. 255.255.255.255 B. 255.255.0.0 C. 255.224.0.0 D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address? A. Class C addresses cannot be assigned to Ethernet interfaces. B. The /27 is an invalid mask. C. It is a broadcast address. D. It is a public IP address. E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requireme n t s , y o u m u s t p r o v i d e t h e m a x i m u m n u m b e r o f s u b n e t s . W h i c h s u b n e t m a s k s h o u l d y o u u s e ? / p > p b d s f i d = " 2 3 3 " > 0 0 A . 2 5 5 . 2 5 5 . 2 5 5 . 2 5 4 / p > p b d s f i d = " 2 3 4 " > 0 0 B . 2 5 5 . 2 5 5 . 2 5 4 . 0 / p > p b d s f i d = " 2 3 5 " > 0 0 C . 2 5 5 . 2 55 . 2 4 0 . 2 5 4 / p > p b d s f i d = " 2 36 " > 0 0 D . 2 5 5 . 2 5 5 . 0 . 0 / p > p b d s f i d = " 2 37 " > 0 0 3 3 : W h a t i s t h e s ub n e t w o r k a n d b r o a dc a s t I P ad d re s s of 1 9 2 . 1 6 8 . 2 . 3 7 w i t h t h e s u b n e t m a s k o f 2 5 5 . 2 5 5 . 2 5 5 .2 4 8 ? / p > p b d s f i d = " 23 8 " > 0 0 A . 1 9 2 . 1 6 8 . 2 . 24 / 1 9 2 . 1 6 8 . 2 . 3 1 / p > p b d s f i d = " 2 3 9 " > 0 0 B . 1 9 2 . 1 6 8 . 2 . 3 2 / 1 9 2 . 1 6 8 . 2 . 3 9 / p > p b d s f i d = " 2 4 0 " > 0 0 C . 1 9 2 . 1 6 8 . 2 . 4 0 / 1 9 2 . 1 6 8 . 2 . 4 7 / p > p b d s f i d = " 2 4 1 " > 0 0 D . 1 9 2 . 1 6 8 . 2 . 4 8 / 1 9 2 . 1 6 8 . 2 .5 5 / p > p b d s f i d = " 2 4 2 " > 0 0 E . 1 9 2 . 16 8 . 2 . 5 6 / 1 9 2 . 1 6 8 . 2 . 6 3 / p > p b d s f i d = " 2 4 3 " > 0 0 3 4 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 1 0 1 1 0 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 4 4 " > 0 0 A . 2 1 8 / p > p b d s f i d = " 2 4 5 " > 0 0 B . 2 1 9 / p > p b d s f i d = " 2 4 6 " > 0 0 C . 2 2 0 / p > p b d s f i d = "2 4 7 " > 0 0 D . 2 2 1 / p > p b d s f i d = " 2 4 8 " > 0 0 E . 2 2 2 / p > p b d s f i d = " 2 4 9 " > 0 03 5 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 0 1 0 1 1 0 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 5 0 " > 0 0 A . 7 5 / p > p b d s f i d = " 2 5 1 " > 0 0 B . 8 3 / p > p b d s f i d = " 2 5 2 " > 0 0 C . 9 0 / p > p b d s f i d = " 2 5 3 " > 0 0 D . 9 7 / p > p b d s f i d = " 2 54 " > 0 0 3 6 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 1 0 1 0 1 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 25 5 " > 0 0 A . 1 9 8 / p > p b d s f i d = " 2 56 " > 0 0 B . 2 1 4 / p > p b d s fi d = " 2 5 7 " > 0 0 C . 2 5 2 / p > p b d s f i d = " 2 5 8 " > 0 0 D . 2 5 5 / p > p b d s f i d = " 2 5 9 " > 0 0 3 7 : O n e o f y o u r c o - w o r k e r s a t A c m e , I n c . , n e e d s t o c o n v e r t t h e b i n a r y n u m b e r 1 0 1 1 0 1 1 0 i n t o a d e c i m a l . W h a t i s t h e d e c i m a l e q u i v a l e n t ? / p > p b d s f i d = " 2 6 0 " > 0 0 A . 1 8 2 / p > p b d s f i d = " 2 6 1 " > 0 0 B . 1 9 2 / p > p b d s f i d = " 2 6 2 " > 0 0 C . 2 0 2 / p > p b d s f i d = " 2 6 3 " > 0 0 D . 2 1 2 / p > p b d s f i d = " 2 6 4 " > 0 0 3 8 : Y o u a r e c o n f i g u r i n g a s u b n e t f o r t h e A c m e , I n c . , b r a n c h o f f i c e i n B e i j i n g . Y o u n e e d t o a s s i g n I P a d d r e s s e s t o h o s t s i n t h i s s u b n e t . Y o u h a v e b e e n g i v e n t h e s u b n e t m a s k o f 2 5 5 . 2 5 5 . 2 5 5 . 2 2 4 . Wh i c h o f t h e s e I P a d d r e s s e s w o u l d b e v a l i d ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 2 6 5 " > 0 0 A . 1 5 . 23 4 . 1 1 8 . 6 3 / p > p b d s f i d = " 2 6 6 " > 0 0 B . 9 2 . 1 1 . 1 7 8 . 9 3 / p > p b d s f i d = " 2 6 7 " > 0 0 C . 1 3 4 . 1 7 8 . 1 8 .5 6 / p > p b d s f i d = " 2 6 8 " > 0 0 D . 1 9 2 . 1 6 8 . 1 6 . 8 7 / p > p b d s f i d = " 2 6 9 " > 0 0 E . 2 0 1 . 4 5 . 1 1 6 . 1 5 9 / p > p b d s f i d = " 2 7 0 " > 0 0 F . 2 1 7 . 6 3 . 1 2 . 1 9 2 / p > p b d s f i d = " 2 7 1 " > 0 0 3 9 : Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 2 0 8 . 9 8 . 1 1 2 . 0 n e t w o r k w i t h a / 2 8 m a s k . Y o u r b o s s a s k s y o u h o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v i d e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r i s u s i n g i p s u b n e t - z e r o ? / p > p b d s f i d = " 2 7 2 " > 0 0 A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 7 3 " > 0 0 B . 6 n e t w o r k s a n d 3 0 h o s t s / p > p b d s f i d = " 2 7 4 " > 0 0 C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 7 5 " > 0 0 D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f i d = " 2 7 6 " > 0 0 E . 1 6 n e t w o r k s a n d 1 4 h o s t s / p > p b d s f i d = " 2 7 7 " > 0 0 4 0 : W h a t i s ad i s a d v a n t a ge of u s i ng a c o n n e c t i o n - o r i e n t e d p r o t o c o l s u ch a s T C P ? / p > p b d s fi d = " 2 7 8 " >0 0 A . P a c k e t a c k n o w l e d g m e n t m i g h t a d d o v e r h e a d . / p > p b d s f i d = " 2 7 9 " > 0 0 B . P a c k e t s a r e n o t t a g g e d w i t h s e q u e n c e n u m b e r s . / p > p b d s f i d = " 2 8 0 " > 0 0 C . L o s s o r d u p l i c a t i o n o f d a t a p a c k e t s i s m o r e l i k e l y t o o c c u r . / p > p b d s f i d = " 2 8 1 " > 0 0 D . T h e a p p l i c a t i o n l a y e r m u s t a s s u m e r e s p o n s i b i l i t y f o r t h e c o r r e c t s e q u e n c i n g o f t h e d a t a p a c k e t s . 0 0 4 1 : Y o u a r e a n e t w o r k t e c h n i c i a n a t A c m e , I n c . Y o u h a v e s u b n e t t e d t h e 1 9 2 . 1 6 8 . 7 2 . 0 n e t w o r k w i t h a / 3 0 m a s k f o r c o n n e c t i o n s b e t w e e n y o u r r o u t e r s . Y o u r b o s s a s k s y o u h o w m a n y u s a b l e s u b n e t w o r k s a n d u s a b l e h o s t a d d r e s s e s p e r s u b n e t t h i s w i l l p r o v i d e . W h a t s h o u l d y o u t e l l h e r , a s s u m i n g y o u r r o u t e r c a n n o t u s e i p s u b n e t - z e r o ? / p > p b d s f i d = " 2 8 2 " > 0 0 A . 6 2 n e t w o r k s a n d 2 h o s t s / p > p b d s f i d = " 2 8 3 " > 0 0 B . 6 n e t w o r k s a n d 3 0 h o s t s / p > p b d s f i d = " 2 8 4 " > 0 0 C . 8 n e t w o r k s a n d 3 2 h o s t s / p > p b d s f i d = " 2 8 5 " > 0 0 D . 1 6 n e t w o r k s a n d 1 6 h o s t s / p > p b d s f i d = " 2 8 6 " > 0 0 E . 1 4 n e t w o r k s a n d 1 4 h o s t s / p > p b d s f i d = " 2 8 7 " > 0 0 4 2 : W h i c h o f t h e f o l l o w i n g I P a d d r e s s e s a r e c o n s i d e r ed " ne t w o r k " a d d r e s s e s w i t h a / 2 6 p r ef i x ? ( C h o o s e t w o . ) / p > p b d s f i d = " 2 8 8 " > 0 0 A . 1 6 5 . 2 0 3 .2 . 0 / p > p b d s f i d = " 2 8 9 " > 0 0 B . 1 6 5 . 2 03 . 5 . 1 9 2 / p > p b d s f i d = " 2 9 0 " > 0 0 C . 1 6 5 . 2 0 3 . 6 . 6 3 / p > pb d s f i d = " 2 9 1 " > 0 0 D . 1 6 5 . 2 0 3 . 6 . 1 9 1 / p > p b d s f i d = " 2 9 2 " > 0 0 E . 1 6 5 . 2 0 3 . 8 . 2 5 5 / p > p b d s f i d = " 2 9 3 " > 0 0 4 3 : I d e n t i f y t h r e e v a l i d h o s t s i n a n y s u b n e t o f 1 9 2 . 1 6 8 . 3 2 . 0 , a s s u m i n g t h e s u b ne t m a s k u s e d i s 2 5 5 . 2 5 5 . 2 5 5 . 2 4 0 . ( C h o o s e t h r e e . ) / p > p b d sf i d = " 2 9 4 " > 0 0 A . 1 9 2 . 1 6 8 . 3 2 .3 3 / p > p b d s f i d = " 2 9 5 " > 0 0 B . 1 9 2 . 1 6 8 . 3 2 . 1 1 2 / p > p b d s f i d = " 2 9 6 " > 0 0 C . 1 9 2 . 1 6 8 . 3 2 . 1 1 9 / p > p b d s f i d = " 2 9 7 " > 0 0 D . 1 9 2 . 1 6 8 . 3 2 . 1 2 6 / p > p b d s f i d = " 2 9 8 " > 0 0 E . 1 9 2 . 1 6 8 . 3 2 . 1 7 5 / p > p b d s f i d = " 2 9 9 " > 0 0 F . 1 9 2 . 1 6 8 . 3 2 . 2 0 8 / p > p b d s f i d = " 3 0 0 " > 0 04 4 : A C l a s s C n e t w o r k a d d r e s s h a s b e e n s u b n e t t e d w i t h a / 2 7 m a s k . W h i c h o f t h e f o l l o w i n g a d d r e s s e s i s a b r o a d c a s t a d d r e s s f o r o n e o f t h e r e s u l t i n g s u b n e t s ? / p > p b d s f i d = " 3 0 1 " > 0 0 A . 1 9 8 .5 7 . 7 8 . 3 3 / p > p b d s f i d = " 3 0 2 " > 0 0 B . 1 9 8 . 5 7 . 7 8 .6 4 / p > p b d s f i d = " 3 0 3 " > 0 0 C . 1 9 8 . 57 . 78 .9 7 / p > p b d s f i d = " 3 0 4 " > 0 0 D . 1 9 8 . 5 7 . 7 8 . 9 7 / p > p b d s f i d = " 3 0 5 " > 0 0 E . 1 9 8 . 5 7 . 7 8 . 1 5 9 / p > p b d s f i d = " 3 0 6 " > 0 0 F . 1 9 8 . 5 7 . 7 8 . 2 5 4 / p > p b d s f i d = " 3 0 7 " > 0 0 4 5: W h a t i s t h e s u b n e t w o r k a d d r e s s f o r a h o s t w i t h I P a d d r e s s 1 6 5 . 1 0 0 . 5 . 6 8 / 2 8 ? / p > p b d s f i d = " 3 0 8 " > 0 0 A . 1 6 5 . 1 0 0 . 5 . 0 / p > p b d s f i d = " 3 0 9 " > 0 0 B . 1 6 5 . 1 0 0 . 5 . 3 2 / p > p b d s f i d = " 3 1 0 " > 0 0 C . 1 6 5 . 1 0 0 . 5 . 6 4 / p > p b d s f i d = " 3 1 1 " > 0 0 D . 1 6 5 . 1 0 0 . 5 . 6 5 / p > p b d s f i d = " 3 1 2 " > 0 0 E . 1 6 5 . 1 0 0 . 5 . 3 1 / p > p b d s f i d = " 3 1 3 " > 0 0 F . 1 6 5 . 1 0 0 . 5 . 1 / p > p b d s f i d = " 3 1 4 " > 0 0 4 6 : Y o u r b o s s w a n t s t o k n o w w h a t T C P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 3 1 5 " > 0 0 A . T r a n s m i s s i o n C h e c k P r o t o c o l / p > p b d s f i d = " 3 1 6 " > 0 0 B . T r a n s p o r t C h e c k P r o t o c o l / p > p b d s f i d = " 3 1 7 " > 0 0 C . T r a n s m i s s i o n C o n t r o l P r o t o c o l / p > p b d s f i d = " 3 1 8 " > 0 0 D . T r a n s p o r t C o n t r o l P r o t o c o l / p > p b d s f i d = " 3 1 9 " > 0 0 4 7 : Y o u r b o s s w a n t s t o k n o w w h a t U D P s t a n d s f o r . W h a t d o y o u t e l l h i m ? / p > p b d s f i d = " 3 2 0 " > 0 0 A . U n r e l i a b l e D a t a P r o t o c o l / p > p b d s f i d = " 3 2 1 " > 0 0 B . U n r e l i a b l e D a t a P r o g r a m / p > p b d s f i d = " 3 2 2 " > 0 0 C . U s e r - D e f i n e d P r o t o c o l / p > p b d s f i d = " 3 2 3 " > 0 0 D . U s e r D a t a g r a m P r o t o c o l / p > p b d s f i d = " 3 2 4 " > 0 0 4 8 : W h i c h o f t h e f o l l o w i n g s t a t e m e n t s a c c u r a t e l y d e s c r i b e s U D P ? / p > p b d s f i d = " 3 2 5 " > 0 0 A . U D P c o p i e s f i l e s b e t w e e n a c o m p u t e r a n d a s y s t e m r u n n i n g r s h d , t h e r e m o t e s h e l l s e r v i c e ( d a e m o n ) . / p > p b d s f i d = " 3 2 6 " > 0 0 B . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t o c o l s t h a t g o v e r n s t h e e x c h a n g e o f e l e c t r o n i c m a i l b e t w e e n m e s s a g e t r a n s f e r a g e n t s . / p > p b d s f i d = " 3 2 7 " > 0 0 C . U D P i s a m e m b e r o f t h e T C P / I P s u i t e o f p r o t o c o l s a n d i s u s e d t o c o p y f i l e s b e t w e e n t w o c o m p u t e r s o n t h e I n t e r n e t . B o t h c o m p u t e r s m u s t s u p p o r t t h e i r r e s p e c t i v e r o l e s : o n e m u s t b e a c l i e n t , a n d t h e o t h e r a s e r v e r . / p > p b d s f i d = " 3 2 8 " > 0 0 D . U D P i s a T C P c o m p l e m e n t t h a t o f f e r s a c o n n e c t i o n l e s s d a t a g r a m s e r v i c e g u a r a n t e e i n g n e i t h e r d e l i v e r y n o r c o r r e c t s e q u e n c i n g o f d e l i v e r e d p a c k e t s ( m u c h l i k e I P ) . / p > p b d s f i d = " 3 2 9 " > 0 0 4 9 : W h i c h o f t h e f o l l o w i n g h o s t a d d r e s s e s a r e m e m b e r s o f n e t w o r k s t h a t c a n b e r o u t e d a c r o s s t h e p u b l i c I n t e r n e t ? ( C h o o s e t h r e e . ) / p > p b d s f i d = " 3 3 0 " > 0 0 A . 1 0 . 2 0 . 1 2 . 6 4 / p > p b d s f i d = " 3 3 1 " > 0 0 B . 1 7 2 . 1 6 . 3 2 . 1 2 9 / p > p bd s f i d = " 3 3 2 " > 0 0 C . 1 7 2 . 6 4 . 3 2 . 3 4 / p > p b d s f i d = " 3 3 3 " > 0 0 D . 1 9 2 . 1 6 8 . 2 3 . 2 5 2 / p > p b d s f i d = "3 34 " > 0 0 E . 1 9 6 . 1 0 4 . 1 2 . 95 / p > p b d s f i d = " 3 3 5 " > 0 0 F . 2 1 4 . 1 9 2 . 4 8 . 2 5 4 / p > p b d s f i d = " 3 36 " >0 0 5 0 : Y o u a r e c o n n e c t i n g y o u r S e r i a l 0 / 1 i n t e r f a c e t o t h e I n t e r n e t . W h i c h o f t h e f o l l o w i n g ne e d t o b e d o n ef o r t h e c o n n e c t i o n t o w o r k ? ( C h o o s e t w o . ) / p > p b d s f i d = " 3 3 7 " > 0 0 A . A s s ig n a p u b l i c I P a d d r e s s . / p > p b d s f i d = " 3 3 8 " > 0 0 B . U s e th e s h u t d o w n c o m m a n d . / p > p b d s fi d = " 3 3 9 " > 0 0 C . U s e t h e n o s h u t d o w n c o m m a n d . / p > p b d s f i d = " 3 4 0 " > 0 0 D . M a k e s u r e t h e i n t e r f a c e i s r u n n i n g i n f u l l - d u p l e x . / p > / d i v > d i v i d = " f l o a t _ b t n " c l a s s = " " b d s f i d = " 3 4 1 " > b u t t o n c l a s s = " f l o a t _ b t n l e f t _ b t n " i d = " c o p y _ b u t t o n " d a t a - c l i p b o a r d - a c t i o n = " c o p y " d a t a - c l i p b o a r d -t a r g e t = " # c o n t e n t - t x t " o n c l i c k = " d o _ c o p y ( ) ; " b d s f i d = " 3 4 2 " > e m c l a s s = " i c o n " b d s f i d = " 3 4 3 " >。
思科网院考试题库和答案
思科网院考试题库和答案一、单选题1. 思科网院课程中,CCNA(Cisco Certified Network Associate)认证主要涉及哪些技术领域?A. 网络基础B. 网络安全C. 无线网络D. 云服务答案:A2. 在思科网院的课程中,OSI模型的第3层是什么?A. 应用层B. 传输层C. 数据链路层D. 网络层答案:D3. 以下哪个协议是用于在IP网络中路由数据包的?A. TCPB. UDPC. IPD. ICMP答案:C4. 思科网院课程中,哪个设备用于连接不同网络或子网?A. 路由器B. 交换机C. 集线器D. 网桥答案:A5. 在思科网院课程中,VLAN(虚拟局域网)的主要作用是什么?A. 提高网络速度B. 提高网络安全性C. 增加网络带宽D. 减少网络延迟答案:B二、多选题6. 思科网院课程中,以下哪些因素会影响网络的性能?A. 带宽B. 延迟C. 丢包率D. 网络拓扑结构答案:A, B, C, D7. 在思科网院课程中,以下哪些设备属于网络核心层设备?A. 路由器B. 交换机C. 集线器D. 网桥答案:A, B8. 思科网院课程中,以下哪些协议属于传输层协议?A. TCPB. UDPC. IPD. ICMP答案:A, B9. 在思科网院课程中,以下哪些因素可以提高网络的安全性?A. 使用防火墙B. 定期更新软件C. 限制不必要的服务D. 使用VPN答案:A, B, C, D10. 思科网院课程中,以下哪些技术可以用于网络故障排除?A. PINGB. TRACEROUTEC. SHOW COMMANDSD. PACKET TRACER答案:A, B, C, D三、判断题11. 思科网院课程中,IP地址192.168.1.1是一个公网IP地址。
(对/错)答案:错12. 在思科网院课程中,交换机可以减少网络中的冲突域。
(对/错)答案:对13. 思科网院课程中,路由器的主要功能是在不同网络之间转发数据包。
2023年Cisco认证考试真题
2023年Cisco认证考试真题(正文开始)一. 选择题1. 在计算机网络中,下列哪种网络设备可以实现不同网络之间的数据传输?a. 路由器b. 集线器c. 交换机d. 网桥2. OSI参考模型中,负责传输数据的层次是:a. 物理层b. 数据链路层c. 网络层d. 传输层3. 下列哪种协议用于应用层的电子邮件传输?a. FTPb. SMTPc. HTTPd. SNMP4. 下列哪种协议用于在网络中获取IP地址?a. DNSb. DHCPc. ARPd. RARP5. 在TCP/IP协议中,下列哪种协议用于为应用程序提供可靠的、面向连接的数据传输服务?a. TCPb. UDPc. IPd. HTTP二. 填空题1. ICMP是Internet控制报文协议的缩写,它位于(网络层/传输层),主要用于发送网络错误、确认消息。
2. IP地址由(多少个/32个)比特构成。
3. OSI模型中,网络层主要负责在不同网络之间的(通信/传输)。
4. 在数据链路层,最长的帧长度为(1500/2000)字节。
5. SNMP是(简单网络管理协议/边界网关协议)的缩写。
三. 简答题1. 请简要介绍下OSI参考模型的七层结构和各层的主要功能。
2. 请说明TCP/IP协议族包括哪些协议,分别用于哪些功能?3. 请解释什么是IP地址和子网掩码?它们之间有什么关系?四. 论述题计算机网络的发展对人们的生活和工作已经产生了深远的影响。
请以自己的观点,论述计算机网络发展对社会的重要性和所带来的优势。
(正文结束)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
CCNA640-802 V13题库试题分析题库讲解:吴老师(艾迪飞CCIE实验室首发网站:1. What are two reasons that a network administrator would use access lists? (Choose two.)A. to control vty access into a routerB. to control broadcast traffic through a routerC. to filter traffic as it passes through a routerD. to filter traffic that originates from the routerE. to replace passwords as a line of defense against security incursionsAnswer: AC解释一下:在VTY线路下应用ACL,可以控制从VTY线路进来的telnet的流量。
也可以过滤穿越一台路由器的流量。
2. A default Frame Relay WAN is classified as what type of physical network?A. point-to-pointB. broadcast multi-accessC. nonbroadcast multi-accessD. nonbroadcast multipointE. broadcast point-to-multipointAnswer: C解释一下:在默认的情况下,帧中继为非广播多路访问链路。
但是也可以通过子接口来修改他的网络的类型。
3.Refer to the exhibit. How many broadcast domains exist in the exhibited topology?A. oneB. twoC. threeD. fourE. fiveF. sixAnswer: C解释一下:广播域的问题,在默认的情况下,每个交换机是不能隔离广播域的,所以在同一个区域的所有交换机都在同一个广播域中,但是为了减少广播的危害,将广播限制在一个更小的范围,有了VLAN的概念,VLAN表示的是一个虚拟的局域网,而他的作用就是隔离广播。
所以被VLAN隔离了的每个区域都表示一个单独的广播域,这样一个VLAN中的广播的流量是不能传到其他的区域的,所以在上题中就有3个广播域了。
4. A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.)A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or directionAnswer: CEF6. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?A. This command should be executed from the global configuration mode.B. The IP address 10.121.16.8 is the local router port used to forward data.C. 102 is the remote DLCI that will receive the information.D. This command is required for all Frame Relay configurations.E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.Answer: E解释一下:关于命令frame-relay map ip 10.121.16.8 102 broadcast ,这个命令用于手工静态添加一条映射,到达10.121.16.8的流量封装一个DLCI号为102,而且这条PVC是支持广播的流量的,比如RIP的更新包。
因为在默认的情况下,帧中继的网络为非广播的,而RIP在其上是无法发包的。
8.Which of the following are associated with the application layer of the OSI model? (Choose two.)A. pingB. TelnetC. FTPD. TCPE. IPAnswer: BC解释一下:在OSI 7层模型中位于应用层的应用有telnet 和ftp 这两种应用。
9. For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?A. IPB. ICMPC. TCPD. UDPAnswer: B解释一下:PING命令利用ICMP协议的echo,和echo-replay两个报文来检测链路是否连通的。
所以如果要阻止PING的流量到网络,就只要过滤掉ICMP的应用就可以了。
10.Refer to the exhibit. The network administrator has created a new VLAN on Switch1 and added host C and host D. The administrator has properly configured switch interfaces FastEthernet0/13 through FastEthernet0/24 to be members of the new VLAN. However, after the network administrator completed the configuration, host A could communicate with host B, but host A could not communicate with host C or host D. Which commands are required to resolve this problem?A. Router(config)# interface fastethernet 0/1.3Router(config-if)# encapsulation dot1q 3Router(config-if)# ip address 192.168.3.1 255.255.255.0B. Router(config)# router ripRouter(config-router)# network 192.168.1.0Router(config-router)# network 192.168.2.0Router(config-router)# network 192.168.3.0C. Switch1# vlan databaseSwitch1(vlan)# vtp v2-modeSwitch1(vlan)# vtp domain ciscoSwitch1(vlan)# vtp serverD. Switch1(config)# interface fastethernet 0/1Switch1(config-if)# switchport mode trunkSwitch1(config-if)# switchport trunk encapsulation islAnswer: A解释一下:这是一个多VLAN间通讯的问题,虽然都同在一台交换机上,但是由于处在不同的VLAN中,而导致了不同VLAN中的主机是不能通讯的。
这时我们就需要借助与trunk和三层的路由功能了,在交换机和路由器之间封装TRUNK,这样可以允许交换机间的二层的通讯,但是由于两个VLAN是划分到不同的网段中的,因此需要借助路由器的路由功能来实现三层的可达,可以将VLAN中的主机的网关指定为路由器与该VLAN相连的子接口的地址,这样VLAN中的数据包就都会发往网关,而由网关来进行进一步的转发。
在这个题中,题目给出了路由器的的子接口的网段,而又给出了VLAN 2与路由器相连的接口的IP地址,所以剩下的一个网段就是给VLAN 3的了,所以要在路由器上将与一个子接口划分到VLAN 3,并给其分配另一个网段中的IP地址。
这样就可以了。
11.What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)A. Allow unrestricted access to the console or VTY ports.B. Use a firewall to restrict access from the outside to the network devices.C. Always use Telnet to access the device command line because its data is automatically encrypted.D. Use SSH or another encrypted and authenticated transport to access device configurations.E. Prevent the loss of passwords by disabling password encryption.Answer: BD解释一下:要确保外部的安全的站点才可以访问我的网络,这就涉及到了安全的问题了,我们可以使用防火墙来限制外网中来的设备;也可以通过SSH或加密和认证来控制。