2016年CCNA第二学期第二章考试答案

合集下载

ccna第二章答案

ccna第二章答案

1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for data 确定数据通路initiate data communicationsretime and retransmit data signals 重分发originate the flow of datamanage data flows 管理数据final termination point for data flow2. Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layers limit the need for hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors3. What are two functions of encapsulation? (Choose two.)tracks delay between end devicesenables consistent network paths for communicationallows modification of the original data before transmissionidentifies pieces of data as part of the same communicationensures that data pieces can be directed to the correct receiving end device4. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detection 支持错误检测‘ensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection5. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow6. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation 一个具体的封装层7. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flow 原数据流retime and retransmit data signalsdetermine pathways for data8.Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination devicean end devicean intermediate devicea media device9.Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown?(Choose three.)Network A -- WANNetwork B -- WANNetwork C -- LANNetwork B -- MANNetwork C -- WANNetwork A -- LAN10. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).11.Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexingencapsulation12. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating to identify the processes or services that are communicating within the end devices13. What device is considered an intermediary device?1.file serve2.IP phone ptop 4.printer 5.switch14.Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? sourceendtransferintermediary 中间设备15.Refer to the exhibit. What type of network is shown?WANMANLANWLAN16. Which layer encapsulates the segment into packets?physicaldata linknetwork 网络层封装的是数据包transport17. What can be identified by examining the network layer header?the destination device on the local mediathe destination host address 网络层头部封装目的主机的地址the bits that will be transferred over the mediathe source application or process creating the data18. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata presentationreliability, flow control, and error detectionnetwork media control 接入层控制网络媒体the division of segments into packets19. During the encapsulation process, what occurs at the data link layer? No address is added.The logical address is added.The physical address is added. 数据链路层添加一个物理地址The process port number is added.20.Refer to the exhibit. Which set of devices contains only end devices? A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?4physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application22. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)34NetworkTransportPhysicalData Link TCP/IP 工作在第一层和第二层Session。

ccna第二章练习答案.docx

ccna第二章练习答案.docx

yy1 ・ Refer to the exhibit・ Identify the devices labeled A, B, C, and D in the network physical documentation. 匚A=bridge, B=switch, C=router, D=hubK A=bridge, B=hub, C=router, D=switchC A=bridge, B=router, C=hub, D=switchc A=hub, B=bridge, C=router, D=switch2 The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented?匚busE starC ring匚mesh3. A switch has failed in the network. As a result, only one segment of the network is down. Which type of physical network topology is implemented?C busC ring匚starE extended star4. Which three features apply to LAN connections? (Choose three.)厂operate using serial in terfacesV make network connection using a hubV limited to operation over small geographic areas厂 provide part-time connectivity to remote servicesV typically operate under local administrative control厂provide lower bandwidth services compared to WANs5. What is one advantage of defining network communication by the seven layers of the OSI model? 【:It in creases the ban dwidth of a n etwork.E It makes networking easier to learn and understand・It eliminates many protocol restrictions.匚It increases the throughput of a network.c It reduces the need for testing network connectivity.6. What makes it easier for different networking vendors to design software and hardware that willin teroperate?E OSI modelc proprietary desig ns匚IP addressing schemec standard logical topologies匚standard physical topologies7. Which term describes the process of adding headers to data as it moves down OSI layers?匚division匚encoding匚separation匚segmentationE encapsulation8. What is the term used to describe the transport layer protocol data unit?匚bits c packetsE segments匚framesc data streams9. Which of the following are layers of the TCP/IP model? (Choose three.)▽ Applicati onr PhysicalV Internet0 Network Access厂Prese ntation10. Which of the following are data link layer encapsulation details? (Choose two.)0 A header and trailer are added・厂Data is con verted into packets ・V Packets are packaged into frames・厂Frames are divided into segments.厂Packets are changed into bits for Internet travel.11. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs?匚data link匚transport匚n etworkE application12. Which two features apply to WAN connections? (Choose two.)V operate using serial interfacesP make network connection using a hub厂limited to operation over small geographic areasI- typically operate under local administrative control▽provide lower bandwidth services compared to LANs13. Which of the following are ways that bandwidth is commonly measured? (Choose three.)厂GHzps▽kbpsV Mbps厂Nbps厂MHzpsV Gbps14. Refer to the following list. Choose the correct order of data encapsulation when a device sends information. segments bits packetsdata frames匚1 -3-5-4-2C 2- 1-3-5-4C 2-4-3-5-1匚4-3-1-2-5E 4-1 -3-5-2C 3-5-1-2-415. Which of the following are factors that determine throughput? (Choose two.)厂types of passwords used on servers厂type of Layer 3 protocol usedV n etwork topologywidth of the network cable0 number of users on the network16. Refer to the exhibit・ Which column shows the correct sequenee of OSI model layers?E D17. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?c physical layer匚data link layerE network layer匚transport layer18. Which best describes the function of the physical layer?E Defines the electrical and functional specifications for the link between end systems・匚Provides reliable transit of data across a physical link.匚Provides connectivity and path selection between two end systems・匚Concerned with physical addressing, network topology and media access.。

CCNA2 题库

CCNA2 题库

CCNA 2 - Chapter 11What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?has a positive impact on bandwidth by dropping most of the invalid framesmakes a fast forwarding decision based on the source MAC address of the framehas a lower latency appropriate for high-performance computing applications*provides the flexibility to support any mix of Ethernet speeds2A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)reduced cost for equipment and user trainingless required equipment to provide the same performance levelssimpler deployment for additional switch equipment*easier to provide redundant links to ensure higher availability*lower bandwidth requirements3What are two advantages of modular switches over fixed-configuration switches? (Choose two.)availability of multiple ports for bandwidth aggregationlower forwarding ratesneed for fewer power outlets*lower cost per switchincreased scalability*4Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?to Fa0/1, Fa0/2, and Fa0/4 onlyto Fa0/1, Fa0/2, Fa0/3, and Fa0/4to Fa0/1 and Fa0/2 onlyto Fa0/1, Fa0/2, and Fa0/3 only*to Fa0/1 only5What is one function of a Layer 2 switch?forwards data based on logical addressinglearns the port assigned to a host by examining the destination MAC addressduplicates the electrical signal of each frame to every portdetermines which interface is used to forward a frame based on the destination MAC address*6Refer to the exhibit. Fill in the blank.There are ” 12” collision domains in the topology.7What is a collapsed core in a network design?a combination of the functionality of the access, distribution, and core layersa combination of the functionality of the access and core layersa combination of the functionality of the distribution and core layers*a combination of the functionality of the access and distribution layers 8What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)to enhance user bandwidth*to eliminate virtual circuitsto create more broadcast domainsto isolate traffic between segments*to isolate ARP request messages from the rest of the networkto create fewer collision domains9Refer to the exhibit.How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.*SW1 drops the frame because it does not know the destination MAC address.10Place the options in the following order:[+] appropriate for high performance computing applications[+] forwarding process can begin after receiving the destination address [+] may forward invalid frames[#] error checking before forwarding[#] forwarding process only begin after receiving the entire frame [#] only forward valid frames[+] Order does not matter within this group.[#] Order does not matter within this group.11What is a basic function of the Cisco Borderless Architecture distribution layer?aggregating Layer 3 routing boundaries*aggregating all the campus blocksacting as a backboneproviding access to the user12ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?hubhostNICswitch*13What does the term “port density” represent for an Ethernet switch?the numbers of hosts that are connected to each switch portthe speed of each portthe memory space that is allocated to each switch portthe number of available ports*14Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?anycastunicastbroadcast*multicast15What is a basic function of the Cisco Borderless Architecture access layer?aggregates Layer 3 routing boundariesprovides high availabilityaggregates Layer 2 broadcast domainsprovides access to the user*16What information is added to the switch table from incoming frames?source MAC address and incoming port number*destination MAC address and incoming port numberdestination IP address and incoming port numbersource IP address and incoming port number17Fill in the blank.A “converged” network is one that uses the same infrastructure to carry voice, data, and video signals.18An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?It enables many switches to be connected with a special fiber-optic power cable to provide higher bandwidth.It enables the sharing of power among multiple stackable switches.*It enables many switches to be connected to increase port density.It enables many switches to be physically stacked in an equipment rack.It enables AC power for a switch to be provided from a powered patch panel.19Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?fixed-configuration switchmodular switchstackable switch*rackable 1U switch20Refer to the exhibit. Fill in the blank.There are ” 5 ”CCNA 2 - Chapter 2Posted by beotron at 8:59 PM1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?• administrative distance of 0 and metric of 0• administrative distance of 0 and metric of 1• administrative distance of 1 and metric of 0• administrative distance of 1 and metric of 12. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?• 172.16.0.0/21• 172.16.1.0/22• 172.16.0.0 255.255.255.248• 172.16.0.0 255.255.252.03. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?• 192.1.1.0/26 and 192.1.1.64/27• 192.1.1.128/25• 192.1.1.0/23 and 192.1.1.64/23• 192.1.1.0/24• 192.1.1.0/25• 192.1.1.0/24 and 192.1.1.64/244. Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?• It indicates that there are 8 hops between this router and the 10.0.0.0 network.• It represents the time, in milliseconds, it takes for a ping to reply when sent to the 10.0.0.0 network.• It indicates that there are 8 subnets in the destination network to which the router can forward packets.• It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.5. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded?• Router1 will perform recursive lookup and packet will exit S0/0.• Router1 will perform recursive lookup and packet will exit S0/1.• There is no matching interface associated with network 172.16.0.0 so packets will be dropped.• There is no matching interface associated with network 172.16.0.0 so packets will take gateway of last resort and exit out S0/2.6. A network administrator enters the following command into Router1: ip route 192.168.0.0255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet? • drops the packet because the destination host is not listed in the routing table• looks up the MAC address of the S0/1/0 interface to determine the destination MAC address of the new frame• performs a recursive lookup for the IP address of the S0/1/0 interface before forwarding the packet• encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface7. Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link? • The rate would be negotiated by both routers.• A rate would not be selected due to the DCE/DTE connection mismatch.• The rate configured on the DTE determines the clock rate.• The rate configured on the DCE determines the clock rate.8. Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet? • WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1• WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2• WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/09. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)• ping• show arp• traceroute• show ip route• show interface• show cdp neighbor d etail10. Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2• R1(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1• R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.1R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.2• R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.2.1R2(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.111. Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.) • load• platform• reliability• holdtime• local interface12. Refer to the exhibit. What two commands are required to provide connectivity between the192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)• A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0• A(config)# ip route 10.0.0.0 255.0.0.0 172.16.40.2• A (config)# ip route 10.0.0.0 255.0.0.0 s 0/0/0• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0• B (config)# ip route 192.168.1.0 255.255.255.0 172.16.40.1• B(config)# ip route 192.168.1.0 255.255.255.0 s 0/1/013. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)• A(config)# no network 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# no ip address 10.0.0.1 255.0.0.0 172.16.40.2• A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2• A(config)# ip route 10.0.0.0 255.0.0.0 s0/0/0• A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.214. What happens to a static route entry in a routing table when the outgoing interface is not available? • The route is removed from the table.• The router polls neighbors for a replacement route.• The route remains in the table because it was defined as static.• The router redirects the static route to compensate for the loss of the next hop device.15. A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)• The destination network no longer exists.• The destination network is moved to a different interface on the same router.• The path between the source and destination is upgraded with a higher bandwidth link.• A topology change occurs where the exi sting next-hop address or exit interface is not accessible.• The remote destination network interface has to be down for 15 minutes of maintenance.16. Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?• Adding the next-hop address eliminates the need for the router to do any lookups in the routing table before forwarding a packet.• In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.• Using a next-hop address in a static route provides a route with a lower metric.• In multi-access networks, using a next-hop address in a static route makes that route a candidate default route.17. The output of the Router# show interfaces serial 0/1 command displays the following:• Serial0/1 is up, line protocol is down.• What is the most likely cause for the line protocol being down?• Serial0/1 is shutdown.• There is no cable connecting the routers.• The remote rout er is using serial 0/0.• No clock rate has been set.18. Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network?• ip route 192.168.0.0 172.16.0.0 255.255.0.0• ip rou te 172.16.0.0 255.255.0.0 192.168.0.1• ip route 172.16.0.0 255.255.0.0 S0/0/1• ip route 172.16.0.0 255.255.0.0 S0/0/019. What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).• the serial port of the router• a modem• a switch• the ethernet port of the router• a CSU/DSU device• a DTE device20. Which of the following is true regarding CDP and the graphic shown?• CDP running on Router D will gather information about routers A, B, C, and E.• By default, Router A will receive CDP advertisements from routers B and C.• If routers D and E are running different routing protocols, they will not exchange CDP information.• Router E can use CDP to identify the IOS running on Router B.21. Which two statements describe functions or characteristics of CDP? (Choose two.)• It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.• It operates at the network layer and allows two systems to learn about each other.• It creates a topology map of the entire network.• It allows systems to learn about each other even if different network layer protocols are configured.• It forwards advertisements about routes for faster convergence.22. Which piece of information is available from examining the output of the command show ip interface brief?• Interface speed and duplex• Interface MTU• Errors• Interface MAC address• Interface IP addressCCNA 2 - Chapter 31A network administrator is determining the best placement of VLAN trunklinks. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)between two switches that share a common VLANbetween a switch and a server that has an 802.1Q NIC*between a switch and a client PCbetween a switch and a network printerbetween two switches that utilize multiple VLANs*2What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?The port automatically associates itself with the native VLAN. The port creates the VLAN again.The port goes back to the default VLAN.The port becomes inactive.*3Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used f or anything on the network.Disable autonegotiation and set ports to either static access or static trunk.Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.*4Which command is used to remove only VLAN 20 from a switch?no switchport access vlan 20delete flash:vlan.datno vlan 20*delete vlan.dat5A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?Erase the startup configuration and reboot the switch.Erase the running configuration and reboot the switch.Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*Delete the IP address that is assigned to the management VLAN and reboot the switch.6What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?VLAN 20 will be created automatically.*The command will have no effect on the switch.Port Fa0/18 will be shut down.An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?show mac address-table interface Fa0/1show interfaces Fa0/1 switchport*show interfaces trunkshow vlan brief8Place the options in the following order:- not scored -dynamic autononegotiatedynamic desirabletrunk9Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?Port Fa0/11 will be returned to VLAN 1.*VLAN 30 will be deleted.An error message would be displayed.Port Fa0/11 will be shutdown.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.*Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.11Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)Disable DTP autonegotiation on end-user ports.*Change the management VLAN to a distinct VLAN that is not accessible by regular users.Statically configure all ports that connect to end-user host devices to be in trunk mode.Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*Use SSH for all remote management access.12In a basic VLAN hopping attack, which switch feature do attackers take advantage of?automatic encapsulation negotiationthe default automatic trunking configuration*an open Telnet connectionforwarding of broadcasts13A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?It allows only VLAN 30 on Fa0/5.*It allows a native VLAN of 30 to be implemented on Fa0/5.It allows VLANs 1 to 30 on Fa0/5.It allows VLANs 10, 20, and 30 on Fa0/5.14Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?No VLAN tag is added to the frame.*A VLAN tag is added when the frame is accepted by the switch.A VLAN tag is added when the frame is forwarded out the port to PC-B.A VLAN tag is added when the frame leaves PC-A.15Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?The native VLAN is being pruned from the link.The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*The trunk has been configured with the switchport nonegotiate command. The native VLAN should be VLAN 60.16What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?All VLANs will be allowed across the trunk.*Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk. Only VLAN 1 will be allowed across the trunk.17Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)on links that should not be trunking*when connecting a Cisco switch to a non-Cisco switch*on links that should dynamically attempt trunkingwhen a neighbor switch uses a DTP mode of dynamic autowhen a neighbor switch uses a DTP mode of dynamic desirable18Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which PCs will receive the broadcast sent by PC-C?PC-D, PC-E*PC-A, PC-B, PC-D, PC-EPC-A, PC-BPC-A, PC-B, PC-D, PC-E, PC-FPC-A, PC-B, PC-E19Which two statements are true about VLAN implementation? (Choose two.)The network load increases significantly because of added trunking information.Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*The size of the collision domain is reduced.VLANs logically group hosts, regardless of physical location.*The number of required switches in a network decreases.20Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?switchport trunk allowed vlan add 99switchport trunk native vlan 66*switchport mode dynamic autoswitchport nonegotiate21Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?switch port securityPVLAN protected port*ACLVLAN22Fill in the blank. Use the full command syntax.The ” show vlan brief” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.23Which three statements accurately describe VLAN types? (Choose three).An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*A management VLAN is any VLAN that is configured to access management features of the switch.*A data VLAN is used to carry VLAN management data and user-generated traffic.Voice VLANs are used to support user phone and e-mail traffic on a network. VLAN 1 is always used as the management VLAN.After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*24Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?S1(config-if)# switchport mode trunkS1(config-if)# switchport mode accessS1(config-if)# switchport nonegotiate*S1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport trunk allowed vlan noneCCNA 2 - Chapter 41What type of IPv6 address is required as a minimum on IPv6 enabled interfaces?staticglobal unicastlink-local*loopbackunique local2In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)default gateway*hostnameDNS server addressDHCP server addressIP address*subnet mask*3What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)MAC addressesLayer 1 statuses*IP addresses*next-hop addressesinterface descriptionsspeed and duplex settings4Place the options in the following order:next hopdestination networkmetric- not scored -administrative distanceroute timestamproute source protocol- not scored -5Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)destination MAC addressnetwork numberdestination IP address*source MAC addresssubnet mask*6Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)Packets that are destined for the network 2001:DB8:ACAD:2::/64 will be forwarded through Fa0/1.R1 does not know a route to any remote networks.*The interface Fa0/1 is configured with IPv6 address2001:DB8:ACAD:A::12.*Packets that are destined for the network 2001:DB8:ACAD:2::54/128 will be forwarded through Fa0/0.The network FF00::/8 is installed through a static route command.7Refer to the exhibit. What is the purpose of the highlighted field in the line that is displayed from the show ip route command?It indicates that this is a directly connected route.It indicates that this route has been deleted from the routing table. It indicates that this route was learned via EIGRP.*It indicates that this is a default route.8Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)The metric varies depending which Layer 3 protocol is being routed, such as IP.A router first installs routes with higher administrative distances. The value of the administrative distance can not be altered by the network administrator.Routes with the smallest metric to a destination indicate the best path.* Administrative distance refers to the trustworthiness of a particular route.*The metric is always determined based on hop count.9What are two functions of a router? (Choose two.)It manages the VLAN database.It increases the size of the broadcast domain.It controls the flow of data via the use of Layer 2 addresses.It determines the best path to send packets.*It connects multiple IP networks.*10A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination? (Choose two.)destination MAC addresssource ARP tablesource IP address*destination IP address*source MAC addressLayer 2 header11。

CCNA第二 部分考试题

CCNA第二 部分考试题

1、解决路由环问题的方法有____ABD_____A. 水平分割B. 路由保持法C. 路由器重启D. 定义路由权的最大值2、下面哪一项正确描述了路由协议_______C__A. 允许数据包在主机间传送的一种协议B. 定义数据包中域的格式和用法的一种方式C. 通过执行一个算法来完成路由选择的一种协议D. 指定MAC地址和IP地址捆绑的方式和时间的一种协议3、以下哪些内容是路由信息中所不包含的_____A____A. 源地址B. 下一跳C. 目标网络D. 路由权值4、以下说法那些是正确的_____BD____A. 路由优先级与路由权值的计算是一致的B. 路由权的计算可能基于路径某单一特性计算,也可能基于路径多种属性C. 如果几个动态路由协议都找到了到达同一目标网络的最佳路由,这几条路由都会被加入路由表中D. 动态路由协议是按照路由的路由权值来判断路由的好坏,并且每一种路由协议的判断方法都是不一样的5、IGP的作用范围是________C_A. 区域内B. 局域网内C. 自治系统内D. 自然子网范围内6、距离矢量协议包括____AB___A. RIPB. IGRPC. IS-ISD. OSPF7、关于矢量距离算法以下那些说法是错误的___A____A. 矢量距离算法不会产生路由环路问题B. 矢量距离算法是靠传递路由信息来实现的C. 路由信息的矢量表示法是(目标网络,metric)D. 使用矢量距离算法的协议只从自己的邻居获得信息8、如果一个内部网络对外的出口只有一个,那么最好配置_____A____A. 缺省路由B. 主机路由C. 动态路由10、在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有_____A_C_A. 路由的优先级B. 路由的发布者C. 路由的metirc值D. 路由的生存时间9、在RIP协议中,计算metric值的参数是_D________A. MTUB. 时延C. 带宽D. 路由跳数10、路由协议存在路由自环问题______A___A. RIPB. BGPC. OSPFD. IS-IS11、下列关于链路状态算法的说法正确的是: ___D______A. 链路状态是对路由的描述B. 链路状态是对网络拓扑结构的描述C. 链路状态算法本身不会产生自环路由D. OSPF和RIP都使用链路状态算法12、在OSPF同一区域(区域A)内,下列说法正确的是____D_____A. 每台路由器生成的LSA都是相同的B. 每台路由器根据该最短路径树计算出的路由都是相同的C. 每台路由器根据该LSDB计算出的最短路径树都是相同的D. 每台路由器的区域A的LSDB(链路状态数据库)都是相同的13、在一个运行OSPF的自治系统之内: _AD________A. 骨干区域自身也必须是连通的B. 非骨干区域自身也必须是连通的C. 必须存在一个骨干区域 ( 区域号为0 )D. 非骨干区域与骨干区域必须直接相连或逻辑上相连14、下列静态路由配置正确的是__D_______A. ip route 129.1.0.0 16 serial 0B. ip route 10.0.0.2 16 129.1.0.0C. ip route 129.1.0.0 16 10.0.0.2D. ip route 129.1.0.0 255.255.0.0 10.0.0.215、以下不属于动态路由协议的是______B___A. RIPB. ICMPC. IS-ISD. OSPf16、三种路由协议RIP 、OSPF 、BGP和静态路由各自得到了一条到达目标网络,路由器默认情况下,最终选选定____D____作为最优路由A. RIPB. OSPFC. BGPD.静态路由17、IGP 包括如下哪些协议_ABD________A. RIPB. BGPC. IS-ISD. OSPF18、路由环问题会引起_______A_A. 慢收敛B. 广播风暴C. 路由器重起D. 路由不一致19、以下哪些路由表项要由网络管理员手动配置_A_______A. 静态路由B. 直接路由C. 动态路由D. 以上说法都不正确20、关于RIP协议,下列说法正确的有: ________AC_A. RIP协议是一种IGPB. RIP协议是一种EGPC. RIP协议是一种距离矢量路由协议D. RIP协议是一种链路状态路由协议21、RIP协议是基于_____A____A. UDPB. TCPC. ICMPD. Raw IP22、RIP协议的路由项在多少时间内没有更新会变为不可达? __C_______A. 90sB. 120sC. 180sD. 240s23、解决路由环路的方法有______ABCDA. 水平分割B. 抑制时间C. 毒性逆转D. 触发更新24、RIP协议在收到某一邻居网关发布而来的路由信息后,下述对度量值的正确处理有哪些?_AD________A. 对本路由表中没有的路由项,只在度量值少于不可达时增加该路由项B. 对本路由表中已有的路由项,当发送报文的网关相同时,只在度量值减少时更新该路由项的度量值C. 对本路由表中已有的路由项,当发送报文的网关不同时,只在度量值减少时更新该路由项的度量值D. 对本路由表中已有的路由项,当发送报文的网关相同时,只要度量值有改变,一定会更新该路由项的度量值25、关于RIP V1和RIP V2,下列说法哪些正确? _BC_______A. RIP V1报文支持子网掩码B. RIP V2报文支持子网掩码C. RIP V2缺省使用路由聚合功能D. RIP V1只支持报文的简单口令认证,而RIP V2支持MD5认证26、在rip中metric等于_____D____为不可达A. 8B. 10C. 15D. 1627、RIP协议引入路由保持机制的作用是____B_____A. 节省网络带宽B. 防止网络中形成路由环路C. 将路由不可达信息在全网扩散D. 通知邻居路由器哪些路由是从其处得到28、与动态路由协议相比,静态路由有哪些优点? AB_______A. 带宽占用少B. 简单C. 路由器能自动发现网络拓扑变化D. 路由器能自动计算新的路由29、在RIP路由协议中,以下有关减少路由自环的方法正确的是__ABC__D_____A. 触发更新是从减少路由自环发生的概率方面来考虑问题的B. 水平分割的方法只对消除两台路由器之间的自环有作用C. 设置抑制时间的方法可能导致路由的慢收敛D. 为了减轻路由自环产生的后果,RIP协议规定了最大跳数30、路由协议在收到某一邻居发布而来的路由信息后,下述对度量值的正确处理有哪些? __BD_______A. 对本路由表中已有的路由项,当发送该路由信息的邻居相同时,只在度量值减少时更新该路由项的度量值B. 对本路由表中已有的路由项,当发送该路由信息的邻居相同时,只要度量值有改变,一定会更新该路由项的度量值C. 对本路由表中已有的路由项,当发送该路由信息的邻居不同时,只要度量值有改变,一定会更新该路由项的度量值D. 对本路由表中没有的路由项,只在度量值少于不可达时增加该路由项31、下面哪些协议是可路由协议(routed protocol)? ____AB_____A. IPB. IPXC. RIPD. NETBEUI32、以下协议属于路由协议的是_____ABCG____A. RIPB. IS-ISC. OSPFD. PPPE. IPF. IPXG. BGP33、下列哪些技术有助于避免路由环路? ___BCDEF______A. 直通交换B. 采用链路状态路由协议C. 水平分割D. 路由保持(holddown)E. 定义最大跳计数F. 路由中毒(poison reverse)34、静态路由的优点包括: ___AD______A. 管理简单B. 自动更新路由C. 提高网络安全性D. 节省带宽E. 收敛速度快35、以下对于缺省路由描述正确的是: ___BC______A. 缺省路由是优先被使用的路由B. 缺省路由是最后一条被使用的路由C. 缺省路由是一种特殊的静态路由D. 缺省路由是一种特殊的动态路由36、对路由器A配置RIP协议,并在接口S0(IP地址为10.0.0.1/24)所在网段使能RIP路由协议,在全局配置模式下使用的第一条命令是: ______A___A. Router ripB. rip 10.0.0.0C. network 10.0.0.1D. network 10.0.0.037、支持可变长子网掩码的路由协议有: __BCD_______A. RIP v1B. RIP v2C. OSPFD. IS-IS38、以下对路由优先级的说法,正确的是____BC_____A. 仅用于RIP和OSPF之间B. 用于不同路由协议之间C. 是路由选择的重要依据D. 直接路由的优先级缺省为039、您认为下列说法哪些是不正确的? ____CD__A. 每条静态路由的优先级也可以不相同B. 缺省情况下路由优先级的次序是 OSPF > RIPC. 路由算法产生一种权值来表示路由的好坏。

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版

CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。

)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。

你应该使用什么协议来完成这?A. SMTP简单邮件传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4. What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A. RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。

ccna第二学期练习题中文答案..

ccna第二学期练习题中文答案..

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念(版本4.0)1口令可用于限制对Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项)VTY 接口控制台接口以太网接口加密执行模式特权执行模式路由器配置模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去?仅第 2 层源地址仅第 2 层目的地址仅第 3 层源地址仅第 3 层目的地址第 2 层源地址和目的地址第 3 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的IP 地址。

从路由器ping 相连网络上的主机之间相互ping 都会遭到失败。

此问题最可能的原因是什么?目的网络不存在。

路由器接口的IP 地址必须配置为网络地址而非主机地址。

必须使用no shutdown命令启用接口。

每个接口都必须使用clock rate命令配置4请参见图示。

主机 A ping 主机B。

当R4 收到对以太网接口的ping 时,哪两块报头信息包括在内?(选择两项。

)源IP 地址:192.168.10.129源IP 地址:BBBB.3333.5677源MAC 地址:5555.AAAA.6666目的IP 地址:192.168.10.33目的IP 地址:192.168.10.134目的MAC 地址:9999.DADC.12345网络管理员刚把新配置输入Router1。

要将配置更改保存到NVRAM,应该执行哪一条命令?Router1# copy running-config flashRouter1(config)# copy running-config flashRouter1# copy running-config startup-configRouter1(config)# copy running-config startup-configRouter1# copy startup-config running-configRouter1(config)# copy startup-config running-config6您需要配置图中所示的串行连接,必须在Sydney 路由器上发出以下哪条配置命令才能与Melbourne 站点建立连接?(选Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# ip address 201.100.53.1 255.255.255.224Sydney(config-if)# clock rate 56000Sydney(config-if)# ip host Melbourne 201.100.53.27请参见图示。

CCNA第二单元考试内容

CCNA第二单元考试内容

CCNA第二单元考试内容CCNA第二单元考试内容1.STP的主要特点是什么?(实施VLAN和中继)a.允许架设中继,以提供冗余b.可以使交换网络的冗余最小化c.可以使错误配置和配置不一致的情况最小化d.允许在单个中继上运行几个VLAN2.STP如何选择网段上的指定端口?(使用生成树来提高性能)a.到根桥的开销最低路径b.到最近的非根桥的开销最高路径c.到最近的非根桥的开销最低路径d.到根桥的开销最高路径3.以下哪三种方法可以用于缓解配置问题?(交换网络故障排除)a.保护未使用的端口b.了解您有什么,然后开始c.保护配置。

d.验证更改,然后保存。

4.在故障排除商品访问问题时哪一个Cisco IOS 命令最有用?(交换机网络故障排除)a.b.I p address5.RSTP可解决哪种交换网络问题?(使用生成树来提高性能)a.收敛速度b.网络规模c.网络安全d.冗余拓扑6.有集线器的功能描述,哪两项是正确的?(了解共享LAN的挑战)a.集线器降低了冲突域的规模。

b.添加一个集线器以消除用户在网段上争用同一带宽的需求。

c.集线器可以增强数据信号,之后再重新传输。

d.集线器是一种数据链路层设备。

e.集线器可以扩展以太网LAN.7.如何通知Cisco设备解析和执行生个输入的命令?(Cisco IOS软件的操作)a.按Enter键b.在命令的结尾添加一个空格c.办理入命令后等待5秒钟。

d.按Send键8.当从VTP域删除VLAN时,应在何处进行更改?(实施LAN和中继)a.在每个交换机上,与VTP模式无关b.在处于VTP透明模式的交换机上c.在处于VTP客户端模式的每个交换机上d.在处于VTP服务器模式的交换机上9.下列哪两项可能会被认为是物理威胁?(保护交换机安全)a.有人关掉了交换器电源,从而阻止了网络访问。

b.用户密码遗忘在桌面上c.有人关掉了网络柜中的空调系统d.有人非法闯入了包含网络文档的机箱10.故障排除介质问题时哪一个Cisco IOS命令最有用?(交换网络故障排除)a.Show countersb.S how interfacec.Show rund.S how controller11.交换机A处于VTP客户端模式,并且其VLAN数据库具有VLAN1至VLAN5.交换机B处于VTP服务器模式,且被添加到相同的VTP域,其VLAN数据具有VLAN6至VLAN10那么当交换机B被添加到网络之后,交换机A和交换B的VLAN数据库会出现什么情况?(交换机故障排除)a.两个VLAN数据库均有VLAN6至VLAN10b.两个VLAN数据库均有VLAN1至VLAN10c.取决于哪台交换机具有更高的修订版号d.两个VLAN数据库均有VLAN1至VLAN512.当Cisco设备启动时,运行哪一项来检查其硬件?(Cisco IOS软件的操作)a.RAMb.T FTPc.POSTd.F lash13.VMPS将什么映射到VLAN分配?(实施VLAN和中继)a.IP地址b.M AC地址c.主机IDd.用户名14.下列哪一贡是远程访问网络设备的最安全的方法?(保护交换机安全)a.Telnetb.R MONc.SSHd.S NMPe.HTTP15.Show vlan命令会显示以下哪种信息?(实施VLAN和中继)a.配置为中继的端口b.V MPS服务器配置参数c.VLAN的名称和分配到VLAN的端口的名称d.V TP域参数16.哪一项Cisco IOS特征可用于vtp端口的访问?(保护交换机安全)a.访问列表b.端口安全性c.防火墙d.关闭17.哪三项陈述最好地描述了冲突?(了解共享LAN的挑战)a.向网络添加一个集线器可以发送冲突问题b.在一个冲突中,帧被破坏,网段中的每个站开始一个随机的计数器,该计数器在尝试重新传输数据之前完成c.冲突是共享LAN的副产品。

ccna第二学期练习答案中文

ccna第二学期练习答案中文

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念(版本4.0)1口令可用于限制对Cisco IOS 所有或部分内容的访问。

请选择可以用口令保护的模式和接口。

(选择三项。

)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去?第 2 层源地址和目的地址3请参见图示。

网络管理员已经为路由器连接到直连网络的接口配置了如图所示的IP 地址。

从路由器ping 相连网络上的主机口之间相互ping 都会遭到失败。

此问题最可能的原因是什么?必须使用no shutdown命令启用接口。

4请参见图示。

主机 A ping 主机B。

当R4 收到对以太网接口的ping 时,哪两块报头信息包括在内?(选择两项。

)目的IP 地址:192.168.10.134目的MAC 地址:9999.DADC.12345网络管理员刚把新配置输入Router1。

要将配置更改保存到NVRAM,应该执行哪一条命令?Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在Sydney 路由器上发出以下哪条配置命令才能与Melbourne 站点建立连接?(选Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdownSydney(config-if)# clock rate 560007请参见图示。

从路由器的运行配置输出可得出什么结论?显示的命令决定了路由器的当前运行情况。

8请参见图示。

在主机 2 连接到LAN 上的交换机后,主机2 无法与主机 1 通信。

导致此问题的原因是什么?主机 1 和主机2 位于不同的网络中。

9输入以下命令的作用是什么?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序?加载bootstrap、加载IOS、应用配置11加载配置文件时的默认顺序是怎样的?NVRAM、TFTP、CONSOLE12请参见图示。

CCNA-Exploration-网络基础知识-第二章练习及答案

CCNA-Exploration-网络基础知识-第二章练习及答案

CCNA Exploration:网络基础知识第二章练习题及答案A.B.C.D.E.F.G.□○1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)□确定数据传输路径□发起数据通信□重新定时和重新传输数据信号□发送数据流□管理数据流□数据流最后的终止点Option 1, Option 3, and Option 5 are correct.2.请选择关于网络协议的正确陈述。

(选择三项。

)□定义特定层 PDU 的结构□规定实现协议层功能的方式□概述层与层之间通信所需的功能□限制了对硬件兼容性的需要□需要取决于协议层的封装过程□杜绝厂商之间的标准化Option 1, Option 3, and Option 5 are correct.3.封装的两个功能是什么?(选择两项)□跟踪终端设备之间的延迟□为通信提供统一的网络路径□在传输前可以修改原始数据□标识属于同一通信的数据片段□确保数据片段可以转发到正确的接收端设备Option 4 and Option 5 are correct.4. 数据链路层封装添加的报尾信息有何主要功能?○支持差错校验○确保数据按照顺序到达○确保送达正确目的○标识本地网络中的设备○帮助中间设备进行处理和路径选择2 points for Option 15. OSI 模型哪两层的功能与 TCP/IP 模型的网络接入层相同?(选择两项)□网络层□传输层□物理层□数据链路层□会话层Option 3 and Option 4 are correct.6. 什么是 PDU?○传输期间的帧损坏○在目的设备上重组的数据○因通信丢失而重新传输的数据包○特定层的封装2 points for Option 47. 以下哪种特征正确代表了网络中的终端设备?□管理数据流□发送数据流□重新定时和重新传输数据信号□确定数据传输路径2 points for Option 28. 请参见图示。

IP 地址为 10.0.0.34 的“手机 A”已经与 IP 地址为 172.16.1.103 的“IP 电话 1”建立了 IP 会话。

CCNA 2 Practice Final Exam Answer V3.1

CCNA 2 Practice Final Exam Answer V3.1

1. Which statements are true regarding VTY passwords? (Choose two.)VTY passwords must be encrypted.All VTY lines do not need to use the same password.A VTY password is required to establish telnet sessions.The VTY password is set with the command line console 0.The VTY password must be identical with the enable secret password. 2.Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?It will be forwarded through interface S1.It will be forwarded to the default route.It will be directed toward the Internet.It will be discarded.3.Which command will produce the output shown in the graphic?show cdpshow cdp neighborsshow cdp neighbors detailshow cdp detail4.Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)Router B received a configuration change.Router A sent a message requesting an update.Router C came online after Router B sent the RIP update.Router B received an error message indicating the last update was not received.5. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?458106. Which of the following WAN connection services typically use synchronous communications? (Choose two.)circuit-switchedleased linepacket-switchedEthernetanalog modem services7. Which of the following will add a TFTP server as a fallback source fora router to load an IOS image?Router# boot system tftp 163.150.9.31 c2500-d-l.120-9Router# copy run startRouter# boot system tftp c2500-d-l.120-9.bin 163.150.9.31Router# copy run startRouter# config tRouter(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31 Router(config)# exitRouter# copy run startRouter# config tRouter(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.binRouter(config)# exitRouter# copy run start8. What types of messages are sent periodically by devices configured for CDP?probesbeaconssignalsadvertisementsrouting updatesunicast9. An administrator has made routing protocol changes to a ro uter’s configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?There was a POST failure.The incorrect IOS loaded.There was an error in the startup configuration file.The configuration register was set to ignore NVRAM.10. Which command is used to redirect debug information to a device that is connected though a Telnet session?Router# monitorRouter# terminal redirect vty 0Router# terminal monitorRouter# monitor output vty 011. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)There is a mismatch in the encapsulation type on both ends of the link.A Layer 1 issue exists.An interface problem exists.The clockrate was not set during configuration.There is no usable media for the protocol.Keepalive messages are not being sent.12.Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)by forwarding packets over paths of equal costby forwarding packets according to hop count and speed of the linkby determining which interface has the least traffic and sending to it firstby first determining the speed of the links and then cycling packets through the fastest links firstby cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time13. When would the ROM monitor mode be used? (Choose two.) maintaining routing configuration settingsmodifying the IOS image stored in Flashrunning a limited IOS feature setperforming the bootstrap process14. Which two statements are true about route metrics? (Choose two.)The more factors that make up a metric, the greater the flexibility to tailor network operations.The larger the metric number, the better the path.Routing protocols use metrics to send routing updates to directly connected neighbors.Bandwidth and delay are static metrics used by RIP v1.Ticks, delay, and cost are metrics used by routing protocols.15.Which of the following are valid static IP routes? (Choose three.) RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2 RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.116. Of the eight network users on the Human Resources department LAN, one cannot connect to the file serv er. The user’s PC has successfully booted but can not see the network. What should be checked first?the PC power cordthe file serverthe PC network interface card LEDsthe LAN switch in the wiring closetthe configuration of the router interface attached to the LAN17. What can be determined from the partial output of the show ip route command displayed below? (Choose two.)R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0C 192.168.10.0/24 is directly connected, Serial0/0The next update will be in 76 seconds.The next update will be in 16 seconds.The administrative distance is 120 and the metric is 1.The metric is 120 and the administrative distance is 1.200.200.200.0 is configured on Serial0/0.192.168.10.2 is configured on Serial0/0.18. Why is it useful to have an interface description?A user can telnet to the router using the interface description.The interface description is a shortcut way to edit the running-config. The interface description helps identify distant network connections.The interface will remain inactive until an interface description is applied.19.Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)Updates start broadcasting every 30 seconds.Updates start broadcasting every 90 seconds.Link-state advertisements are flooded.Link-state advertisements are sent only to neighboring routers.All routers note the change and adjust routes.All routers ignore the change until the route becomes active again. 20.The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1Utah(config)# ip route 172.31.3.0 255.255.255.0 s1Utah(config)# ip route 0.0.0.0 0.0.0.0 s021. Which statement about datagram life is true?Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.22.The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.access-list 22 deny host 204.204.7.122access-list 22 permit anyWhich group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?RouterA(config)# interface s0/0RouterA(config-if)# ip access-group 22 inRouterA(config)# interface s0/0RouterA(config-if)# ip access-group 22 outRouterA(config)# interface fa0/0RouterA(config-if)# ip access-group 22 inRouterB(config)# interface fa0/0RouterB(config-if)# ip access-group 22 inRouterB(config)# interface s0/0RouterB(config-if)# ip access-group 22 inRouterB(config)# interface fa0/0RouterB(config-if)# ip access-group 22 out23. A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)The ip host table on the router is not configured.The command telnet Boston was issued from the wrong router prompt.The routing table is missing.Domain name services are not available.24. Which of the following are functions of a router? (Choose three.)packet switchingextension of network segmentssegmentation of local area networksselection of best path based on a logical addressingselection of best path based on a physical addressingThe commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?The router will load c2500-js-l.112-26d.The router will load c2500-d-l.120-9.The router will load the IOS from ROM.The router will boot into ROM monitor mode.26.A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.The wrong port was configured for the ACL so Telnet traffic was still allowed.The access list has not been assigned to an interface.The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?F, G, E, D, B, AF, E, D, C, AF, E, D, AF, E, D, B, A28. Which of the following is the correct flow of routines for a router startup?load bootstrap, load IOS, apply configurationload bootstrap, apply configuration, load IOSload IOS, load bootstrap, apply configuration, check hardwarecheck hardware, apply configuration, load bootstrap, load IOS29. In the configuration register value 0×2104, which value represents the boot field setting?x2430. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?The packets will be placed in a buffer and forwarded when the ACL is removed.The packets will be sent to the source with an error notification message.The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.The implicit deny any statement placed at the end of the list will cause the packets to be dropped.31. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)telnetting into the routerinitiating a debug sessionconfiguring a router for the first timeusing the Aux port to check the current configurationusing the console port to check the current configuration32.The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?no update timersholdown-timer 96poison reverse E0passive-interface E0no triggered updates33. When must a router serial interface be configured with the clock rate command?when the interface is functioning as a DTE devicewhen the interface timers have been clearedwhen the connected DTE device is shut downwhen the interface is functioning as a DCE device34. What are the major characteristics of a wide area network? (Choose three.)connect devices separated by wide geographical areasincludes technologies of FDDI and Ethernetuses serial connections to access bandwidthcommon carriers are needed for connectionstype of connection between a router and a switch35. If the config-register on a router is set to 0×2102, where is the first place the router will look for boot system commands?RAMROMFlashNVRAM36. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)It can be used to verify the operation of application layer software between the source and destination.Telnet can use the ICMP protocol to verify a hardware connection and network layer address.It is the most complete testing mechanism available.Remote networks may be accessed via a Telnet session for troubleshooting.Time to Live values are used by Telnet to identify a failure of device between source and destination.37.The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.All of the routers will have direct knowledge of the exact topology of the entire network.The Key West router will forward routing table information to the Miami and Palm Beach routers.The Miami router will learn about network 192.168.1.0 from the Key West router.If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.38. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)functions as a link-state routing protocoldiscards packets when the hop count is greater than 15calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)created as a proprietary routing protocolfloods updates as topology changes occurbroadcasts routing updates every 90 seconds or as triggered by topology changes39. The following line was displayed in the output of the show ip route command.R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0What is the value of the routing metric?312203012040.Refer to the output from the show ip route command. What can be concluded from the output of this router command?A preferred route to the destination has not been set.There are two equal cost paths to network 1.0.0.0.Both interfaces are being used equally to route traffic.A variance must be set to load-balance across multiple paths.41. Which of the following are true statements about creating and applying access lists? (Choose three.)Access list entries should filter in the order from general to specific.One access list per port per protocol per direction is permitted.Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.There is an implicit deny at the end of all access lists.Statements are processed sequentially from top to bottom until a match is found.The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.42. Which of the following are true regarding the setup configuration mode? (Choose three.)To abort the setup mode, use the CTRL+SHIFT+6 keys.To abort the setup mode, use the CTRL+C keys.Setup mode allows a complete configuration of the router.To enter setup mode, use the privileged mode setup command.A router that does not find a valid IOS during the boot process will start the system configuration dialog.A router that does not find a valid configuration file during the boot process will start the system configuration dialog.43. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)TCP/IP must be installed and properly configured on each device.Multiple subnets must be configured on the router to ensure accurate delivery.A default gateway must be configured for datagrams to travel outside of the LAN.The hosts must be directly connected to a switch to travel outside of the LAN.To ensure accurate delivery, a router must be configured and accessible by hosts on the network.44.Given the above topology, which of the following statements are true? (Choose two.)If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.45. Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name.Router# ip host Fontana 200.100.50.5Router(config)# ip host Fontana 200.100.50.5Router(config-if)# ip host Fontana 200.100.50.5Router(config)# ip host Fontana 200.100.50.5/24。

CCNA第二学期考试答案

CCNA第二学期考试答案

以下是针对您未获得满分的试题给出的反馈。

某些交互式试题可能不显示您的答案。

分项分数:1与固定配置的交换机相比,模块化交换机具有哪两个优点?(请选择两项。

)正确响应您的响应每台交换机的成本更低可扩展性更高转发率更低需要的电源插座数目更少带宽聚合可以使用多个端口固定配置交换机价格较低,但是它具有指定数量的端口且不能添加端口。

它们提供的高速端口通常比较少。

为了在包含固定配置交换机的网络上扩展交换,需要购买更多的交换机。

这增加了需要使用的电源插座数量。

模块化交换机只需要购买额外的线卡便可以扩展。

带宽聚合也更容易,因为机箱的背板可以为交换机端口线卡提供所需的带宽。

此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.2 交换网络2思科无边界架构接入层的基本功能是什么?正确响应您的响应聚合第 2 层广播域聚合第 3 层路由边界为用户提供访问权提供高可用性思科无边界架构接入层的功能是为用户提供网络访问。

第 2 层广播域聚合、第 3 层路由边界聚合和高可用性是分布层的功能。

也有说答案是聚合第 3 层路由边界此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络3思科无边界架构分布层的基本功能是什么?正确响应您的响应充当主干聚合所有园区块聚合第 3 层路由边界为用户提供访问权思科无边界架构的分布层的一项基本功能是在不同的VLAN 之间路由。

充当主干和聚合园区块是核心层的功能。

为用户提供访问是接入层的功能。

此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络4若将大端口密度、容错和低价作为重要指标,应使用哪个交换机外形因素?正确响应您的响应固定配置交换机模块化交换机可配备机架的1U 交换机可堆叠式交换机堆叠式交换机可以使用特殊电缆实现互联,从而在交换机之间提供高带宽的吞吐量,并像单个大型交换机一样运行。

CCNA2期末测试题

CCNA2期末测试题

1请参见图示。

对于发往192.168.2.0 的数据包,R2 会采取什么操作?它会丢弃数据包。

它会通过S0/0/0 接口转发数据包。

它会通过Fa0/0 接口转发数据包。

它会将数据包转发给R1。

2请参见图示。

R1 会使用哪一总结地址来向R2 通告其网络?3请参见图示。

尽管R2 已配置正确,但主机A 还是无法访问Internet。

可以在R1 上配置哪两条可让主机A 访问Internet 的静态路由?(选择两项。

)ip route .0 0.0.0.0 Fa0/0ip route .0 0.0.0.0 Fa0/1ip routeip routeip route 209.165.202.0 255.255.255.0 .14请参见图示。

网络管理员已按图示配置了R1,并且所有接口都运作正常。

但从R1 ping 172.16.1.1 时失败。

造成此问题的原因可能是什么?R1 上的串行接口配置有误。

默认路由配置有误。

必须在R1 上发出default-information originate命令。

必须在R1 上禁用自动总结。

5请参见图示。

所有接口都已编址,并且运行正常。

网络管理员在主机A 上运行了tracert命令。

得到这种输出的原因可能是什么?(选择两项。

)主机A 缺少网关或配置不正确。

主机B 缺少网关或配置不正确。

R1 的路由表中缺少192.168.1.0/24 的条目。

R2 的路由表中缺少192.168.1.0/24 的条目。

R1 的路由表中缺少192.168.2.0/24 的条目。

R2 的路由表中缺少192.168.2.0/24 的条目。

6请参见图示。

从主机A 到主机B 的ping 成功,但从主机A ping 在Internet 上正常运行的主机却失败了。

此问题的原因是什么?R1 的快速以太网接口被禁用。

其中一条默认路由配置有误。

未在这两台路由器上配置路由协议。

主机A 上尚未配置默认网关。

7 网络管理员使用RIP 路由协议在一个自治系统内实施路由。

CCNA路由和交换网络简介第章探索网络练习和答案(二)

CCNA路由和交换网络简介第章探索网络练习和答案(二)

CCNA路由和交换网络简介第章探索网络练习和答案(二)CCNA路由和交换网络简介第章探索网络练习和答案本文将为大家介绍CCNA路由和交换网络简介第章探索网络练习和答案,帮助大家更好地了解网络知识。

一、练习题1. 什么是计算机网络?2. 什么是协议?3. OSI模型中,每一层的作用是什么?4. 什么是TCP/IP协议?5. 什么是IP地址?6. 什么是子网掩码?7. 什么是路由器?8. 什么是交换机?二、答案解析1. 计算机网络是指两台或两台以上计算机通过通信设备和通信线路连接起来,以实现信息交换和资源共享的系统。

2. 协议是计算机网络中用于规定通信双方之间的通信规则和格式的一种约定。

3. OSI模型中每一层的作用如下:- 应用层:提供应用程序之间的通信和数据交换服务。

- 表示层:负责处理数据格式的转换、数据加密和解密等。

- 会话层:负责建立、管理和终止会话。

- 传输层:负责数据的传输和流量控制。

- 网络层:负责数据的路由和寻址。

- 数据链路层:负责数据的传输和错误检测。

- 物理层:负责数据的传输和物理连接。

4. TCP/IP协议是一种网络协议,它是互联网的基础协议,包括TCP和IP两个部分。

TCP负责数据的分段和重组,IP负责数据的路由和寻址。

5. IP地址是指互联网协议地址,它是用于标识网络上设备的一种地址,由32位二进制数表示。

6. 子网掩码是一种用于划分网络的地址掩码,它与IP地址一起使用,用于确定网络地址和主机地址的范围。

7. 路由器是一种网络设备,它负责将数据包从一个网络传输到另一个网络,是网络中的重要组成部分。

8. 交换机是一种网络设备,它负责在局域网中转发数据包,是局域网中的重要组成部分。

以上就是本文为大家介绍的CCNA路由和交换网络简介第章探索网络练习和答案,希望对大家有所帮助。

ccna第二章章节习题加答案

ccna第二章章节习题加答案

第1章路由和数据包转发介绍1.下面哪些路由器的组成和它的功能是匹配的?DA.Flash:永久的储存bootstrap程序B.ROM:永久地存储启动配置文件C.NVRAM:永久地存储操作系统镜像D.RAM:存储路由表和ARP缓存2.哪两个命令可以用来检查给路由器串行接口分配的IP地址?A、EA.show interfacesB.show interfaces ip briefC.show controllers allD.show ip configE.show ip interface brief3.下面哪些命令可以设置特权模式口令为“quiz”?AA.R1(config)# enable secret quizB.R1(config)# password secret quizC.R1(config)# enable password secret quizD.R1(config)# enable secret password quiz4.哪个路由原理是正确的?CA.如果一个路由器在它的路由表中具有确定的信息,那么所有邻接的路由也拥有同样的信息B.从一个网络到另外一个网络路径的路由信息意味着存在着反向(或返回)路径的路由信息C.每个路由器根据它自己路由表中的信息,独立作出路由判断D.每个路由器根据它自己和邻居路由表中的信息,独立作出路由判断5.动态路由协议执行哪两个任务?B、DA.发现主机B.更新和维护路由表C.传播主机默认网关D.网络发现E.分配IP地址6.网络工程师正在配置一个新的路由器。

接口已经配置好了IP地址,并且已经激活。

但是还没有配置路由协议或静态路由。

这时路由表中出现的是什么路由?CA.默认路由B.广播路由C.直接路由D.没有路由,路由表也是空的7.下面哪两个对于路由器转发数据包的描述是正确的?B、DA.如果数据包是去往远程网络的,那么路由器会向所有到这个网络的下一跳接口发送该数据包B.如果数据包是去往直连网络的,那么路由器会向路由表中所指示的外出接口发送C.如果数据包是去往远程网络的,那么路由器会根据路由主机表来发送该数据包D.如果数据包是去往远程网络的,那么路由器会向路由表中所指示下一跳IP发送E.如果数据包是去往直连网络的,那么路由器会根据目的MAC地址发送该数据包F.如果数据包是去往直连网络的,那么路由器会转发数据包到下一跳VLAN的交换机8.关于路由协议使用的度量的哪个描述是正确的?AA.度量是路由协议用来检测给定路由的一个测量值B.度量是思科专有的用来转换距离到标准单元的方法C.度量表示了对于所有路由协议中发生的数据包丢失的数量的一个统计值D.路由器使用度量lai 决定哪些包是错误的和要被丢失的9.网络管理员在路由器上配置了ip rout 0.0.0.0 0.0.0.0 serial 0/0/0命令。

CCNA第二学期官方章节考试题之《距离矢量路由协议》(附答案)46doc

CCNA第二学期官方章节考试题之《距离矢量路由协议》(附答案)46doc

数据包在路由器的两个环回接口之间来回传递
从目的地返回的路径与出发路径不同而形成
数据包在一系列路由器间不断传输却始终无法到达其真正的目的地的情况路由从一种路由协议到另一种路由协议的分布
2
用于在发送到其它路由器的更新中将路由标记为不可达
防止定期更新消息错误地恢复已经不可用的路由
防止从收到更新的接口通告同一网络
限制数据包在被丢弃之前在网络中传输的时间或跳数
通过设置最大跳数来为每一距离矢量路由协议定义最大度量值
4以
路由环路
不一致的流量转发
除非系统收敛,否则不会转发任何流量
路由表条目不一致
路由表更新被发送到错误的目的地
6运
立即将其加入路由表中
调整新路由的度量以显示增加的路由距离
将该路由从其传入接口以外的所有其它接口通告出去
发送
8下
它会在更新从路由器接口送出时缓冲更新,以此防止路由更新同步。

它会从下一次路由更新间隔中减去随机时间段(大小为指定间隔时间的
它会使路由器跳过每一个其它计划更新时间,以此防止路由更新同步。

它会强制路由器在发送自身更新之前侦听链路上的其它更新是何时发送的,以此防止路由更新同步10
13以15水
17R
19哪
抑制计时器将等候
如果在
更新计时器将请求有关从路由器Hello。

CCNA最新中文版题库第二学期第二单元 (2)

CCNA最新中文版题库第二学期第二单元 (2)

1.Router# show interfaces serial 0/1 命令的输出显示了如下内容:Serial0/1 is up, line protocol is down.线路协议为 down(关闭)的原因最可能是什么?Serial0/1 为关闭状态。

路由器未连接电缆。

远程路由器正在使用 serial 0/0 接口。

尚未设置时钟频率。

2.哪一个地址可以用来总结从到的所有网络?3.请参见图示。

目的地为网络的数据包会被如何转发?Router1 会执行递归查找,数据包将从 S0/0 接口发出。

Router1 会执行递归查找,数据包将从 S0/1 接口发出。

没有与网络关联的匹配接口,因此数据包将被丢弃。

没有与网络关联的匹配接口,因此数据包将采用“最后选用网关”,从 S0/2 接口发出4指向下一跳 IP 的静态路由在路由表中会显示怎样的管理距离和度量?管理距离为 0,度量为 0管理距离为 0,度量为 1管理距离为 1,度量为 0管理距离为 1,度量为 15.两个独立子网上的主机之间无法通信。

网络管理员怀疑其中一个路由表中缺少路由。

可以使用哪三条命令来帮助排查第 3 层连通性问题?(选择三项。

)pingshow arptracerouteshow ip routeshow controllersshow cdp neighbor6.请参见图示。

为使主机 A 能够连接到网络上的主机 B,应在 Router1 上配置哪种静态路由?ip routeip routeip route S0/0/1ip route S0/0/07.Router# show cdp neighbors 命令会显示下列哪些内容?(选择三项。

)负载平台可靠性保持时间本地接口8.为什么在创建送出接口为以太网络的静态路由时输入下一跳 IP 地址是明智之举?添加下一跳地址将使路由器在转发数据包时不再需要在路由表中进行任何查找。

在多路访问网络中,如果没有下一跳地址,路由器将无法确定以太网帧的下一跳MAC 地址。

CCNA网络学院第二学期 第二章 试题及答案

CCNA网络学院第二学期 第二章 试题及答案

ERouting Chapter 2 - CCNA Exploration: 路由协议和概念 (版本 4.0)1当外发接口不可用时,路由表中的静态路由条目有何变化?该路由将从路由表中删除。

路由器将轮询邻居以查找替用路由。

该路由将保持在路由表中,因为它是静态路由。

路由器将重定向该静态路由,以补偿下一跳设备的缺失。

2 哪两种设备负责将来自 WAN服务提供商的数据转换为路由器可以接受的形式?(选择两项。

)路由器的串行端口调制解调器交换机路由器的以太网端口CSU/DSU 设备DTE 设备3请参见图示。

要使WinterPark 和Altamonte 路由器能够传送来自每个LAN 的数据包并将所有其它流量转到Internet,应命令来配置静态路由?WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 198.18.222.0 255.255.255.255 s0/1WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/04路由器配置有到达每个目的网络的静态路由。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

以下是针对您未获得满分的试题给出的反馈。

某些交互式试题可能不显示您的答案。

分项分数:1哪个接口是包含用于管理24 个端口以太网交换机的IP 地址的默认位置?正确响应您的响应VLAN 1Fa0/0Fa0/1连接到默认网关的接口VLAN 99此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.1 使用初始设置配置交换机2下列关于使用全双工快速以太网的陈述中,哪三项是正确的?(请选择三项。

)正确响应您的响应通过双向数据流改善了性能。

由于禁用了设备上的冲突检测功能,因此性能得到了改善。

节点以全双工单向数据流运行。

由于网卡可以检测到冲突,因此性能得到了改善。

全双工快速以太网在两个方向上提供100% 的效率。

由于网卡能更快速地处理帧,因此延迟减少了。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.2 配置交换机端口3使用mdix auto 配置命令会对交换机上的以太网接口产生什么影响?正确响应您的响应自动检测双工设置自动检测接口速度自动检测铜电缆类型自动将第一个检测到的MAC 地址分配给接口此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.2 配置交换机端口4在Cisco IOS 软件无法加载的情况下,网络管理员需要哪种类型的电缆将PC 与交换机连接才能恢复它?正确响应您的响应同轴电缆控制台电缆交叉电缆直通电缆因为交换机上没有运行Cisco IOS 软件,所以管理员需要使用控制台电缆将PC 连接到交换机控制台端口,比便将来自PC 的软件转移到交换机。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.1 使用初始设置配置交换机5在对连接问题进行故障排除时,网络管理员发现交换机端口状态LED 在绿色和琥珀色之间跳转。

此LED 表示什么?正确响应您的响应该端口没有链路。

该端口遇到了错误。

该端口管理性关闭。

有一台计算机正在使用错误的电缆连接到该端口。

该端口拥有一个具有正常流量活动的活动链路。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.1 使用初始设置配置交换机6生产交换机重新加载并以显示Switch> 提示符结束。

可确定以下哪两项事实?(请选择两项。

)正确您的响应响应POST 正常执行。

启动过程被打断。

此路由器上RAM 或闪存不足。

找到并重新加载了完整版本的Cisco IOS。

路由器未位于闪存中的Cisco IOS,因此默认在ROM 中。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.1 使用初始设置配置交换机7下列哪条命令可以显示某个特定接口的auto-MDIX 设置信息?正确响应您的响应show interfacesshow controllersshow processesshow running-config要检查某个特定接口的Auto-MDIX 设置,应当使用show controllers ethernet-controller 命令和关键字 phy 。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.2 配置交换机端口8 请参见图示。

基于show interface 命令输出,在连接到Fa0/1 的链路上可能存在什么介质问题?正确响应您的响应接口上的带宽参数可能过高。

可能存在网卡故障的问题。

链路上可能存在过多电子干扰和噪音。

连接主机到端口Fa0/1 的电缆可能过长。

接口可配置为半双工。

不断升级的CRC 错误通常说明在将数据从主机传输到交换机的过程中已对数据作了修改。

这通常是由链路上高强度的电磁干扰造成的。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.1.2 配置交换机端口9 请参见图示。

网络管理员要将Switch1 配置为允许SSH 连接并禁止Telnet 连接。

网络管理员应如何更改图中所示配置才能满足此要求?正确响应您的响应使用SSH 版本1。

重新配置RSA 密钥。

在其它线路上配置SSH。

修改transport input命令。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.1 安全远程访问10哪种协议或服务可以发送包含Cisco IOS 软件版本的发送设备的广播,并且其数据包可能被网络上的恶意主机所捕获?正确响应您的响应CDPDHCPDNSSSHCDP 可以发送包含诸如设备IP 地址和Cisco IOS 软件版本等信息的定期广播。

运行数据包捕获应用程序的节点可以收到这些数据包并恶意使用它们。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.2 LAN 中的安全问题11在哪种类型的攻击中,一个恶意节点可以请求DHCP 服务器地址池中的所有可用IP 地址,从而阻止合法主机获取网络访问权限?正确响应您的响应CAM 表溢出MAC 地址泛洪DHCP 耗竭DHCP 监听在DHCP 耗竭攻击中,恶意节点会发送足够多的DHCP 请求,以耗尽DHCP 服务器上的可用地址池。

由于服务器没有可用IP 地址可以分配给尝试加入网络的节点,攻击者因此实现了拒绝服务攻击。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.2 LAN 中的安全问题12下列哪种方法能够缓解MAC 地址泛洪攻击?正确响应您的响应增加CAM 表的大小配置端口安全使用ACL 过滤交换机上的广播流量提高交换机端口的速度可以在交换机上配置端口安全,以帮助防止无效的MAC 地址占据MAC 地址表。

ACL 不会协助交换机过滤广播流量,而且增加CAM 表的规模或交换机端口的速度并不能解决这个问题。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.2 LAN 中的安全问题13网络安全工具执行哪两项基本功能?(请选择两项。

)正确响应您的响应揭示攻击者可以通过监控网络流量所获取信息的类型向员工就社会工程攻击进行培训模拟对生产网络的攻击以确定任何现有的漏洞编写安全政策文件以保护网络控制对用户设备的物理访问应当使用网络安全工具来衡量当前网络安全的薄弱程度。

它们执行两项基本功能:安全审核和渗透测试。

安全审核可揭示攻击者只需监视网络流量就能收集到哪类信息。

渗透测试是一种网络模拟攻击,用于确定网络在真实攻击中易受攻击的程度。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.3 最佳安全实践14下列哪项操作可以将错误禁用交换机端口返回至运行状态?正确响应您的响应在接口上删除并重新配置端口安全。

在接口上发出switchport mode access 命令。

清除交换机上的MAC 地址表。

发出 shutdown 和 no shutdown 接口命令。

当配置了端口安全的交换机端口出现违规时会将违规操作关闭,端口将置为err-disabled 状态。

可以通过关闭接口然后发出no shutdown 命令重新启用接口。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.4 交换机端口安全15 请参见图示。

在已实施最佳实践的情况下,应当使用 ip dhcp snooping trust 命令配置哪个S1 交换机端口接口或接口?正确响应您的响应只配置G0/1 端口只配置未使用的端口只配置G0/1 和G0/24 端口只配置G0/2、G0/3 和G0/4 端口只配置G0/1、G0/2、G0/3 和G0/4 端口DHCP 消息应当信任的交换机端口是那些将接收来自DHCP 服务器的DHCP 传入消息的端口。

这包括与DHCP 服务器直接连接的所有端口以及与DHCP 服务器连接的其他交换机的上行链路。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.4 交换机端口安全16 请参见图示。

端口Fa0/2 已正确配置。

IP 电话和PC 正常工作。

如果网络管理员想要实现以下目标,哪种交换机配置最适于端口Fa0/2?∙不允许任何人断开IP 电话或PC 连接或连接其他一些有线设备。

∙如果已连接其他设备,应关闭端口Fa0/2。

∙交换机应自动检测IP 电话和PC 的MAC 地址并将这些地址添加至运行配置中。

正确响应您的响应SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address stickySWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address stickySWA(config-if)# switchport port-security violation restrict端口安全违规的默认模式为关闭端口,因此无需使用switchport port-security violation 命令。

switchport port-security 命令输入时必须没有其他为端口启用端口安全的选项。

然后可以添加其他端口安全选项。

此试题参考以下领域的内容:Routing and Switching Essentials∙ 2.2.4 交换机端口安全17请参见图示。

可以从显示信息中得出端口安全的什么信息?正确响应您的响应端口已关闭。

端口有两个连接设备。

相关文档
最新文档