CCNA第二学期期末考试Exam
CCNA期末考试试题

1、要求:(1)VTP域名为benet;密码为123;启用修剪;(2)配置2台3层交换机为VTP的server模式;配置2层交换机为VTP的client模式;(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生成树根网桥;在2层交换机上配置速端口与上行速链路;(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路由,指向10.1.1.1/24;(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的EthernetChannel;(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议(1)(2)○1SW1-3L 配置vtp域名benetpassword 123 Server模式SW2-3L同样配置○2SW1-3L启用修剪SW2-3L同样配置○3SW3-2L配置vtp的client模式、SW4-2L、SW5-3L、SW6-3L相同配置(3)设置SW-3L-1是VLAN 2-6的生成树根网桥;设置SW-3L-2是VLAN 7-11的生成树根网桥;在2层交换机上配置速端口与上行速链路;○1SW-3L-1是VLAN 2-6的生成树根网桥;;○2设置SW-3L-2是VLAN 7-11的生成树根网桥○3SW3-2L配置速端口与上行链路,SW4-2L、SW5-2L 、SW6-2L上同样配置(4)配置路由器接口的IP地址;配置路由器启动RIP路由协议;配置路由器上的默认路由,指向10.1.1.1/24○1路由器上配置ip地址○2路由器上配置默认路由和RIP○3SW1-3L各vlan的ip地址○4SW2-3L各vlan的ip地址(5)在3层交换机上配置各VLAN的IP地址;配置两台3层交换机之间的EthernetChannel ○1在SW1-3L配置EthernetChannel;○2在SW2-3L配置EthernetChannel;(6)配置3层交换机的路由接口;在3层交换机上配置RIP路由协议○1SW1-3L上配置路由接口○2SW2-3L上配置路由接口○3SW1-3L上的RIP配置○4SW2-3L上的RIP配置○5在SW1-3L验证RIP○6在SW2-3L验证RIP2、要求:如图所示,四台路由器R1,R2,R3以及R4运行OSPF协议(要求发布各路由器的loopback0地址),R1与R2属于Area1,R2与R3属于Area0,R3与R4属于Area2。
思科 期末考试答案

关闭窗口考试系统考试浏览器 - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (版本下面是考试的考试试题以及与题目关联的评分规则。
思科网络技术学院的内容是受到版权保护的,禁止一切未经授权的张贴,分发或共享本考试的内容.1下列哪一个 OSI 层负责管理数据段?应用层表示层会话层传输层2请参见图示。
图中所示为客户端之间发送电子邮件的过程。
以下哪一列表正确地标识了图中各编号阶段使用的组件或协议?3第 4 层报头包含帮助数据传输的哪一类信息?服务端口号主机逻辑地址设备物理地址虚拟连接标识符4哪个 OSI 层提供面向连接的可靠数据通信服务?应用层表示层会话层传输层网络层5当 OSI 模型下层执行无连接协议时,通常使用什么来确认数据已收到并请求重传丢失的数据?IPUDP以太网无连接确认面向连接的上层协议或服务6下列哪三项是 CSMA/CD 的特征?(选择三项。
)设备会侦听介质,并且仅当无法检测到介质上存在其它信号时才会传输数据。
介质上的所有设备均可侦听所有通信。
设备根据配置的优先级来进行通信。
发生冲突后,引起冲突的设备会优先尝试传输数据。
发生冲突时,所有设备会在一段时间内停止传输数据,该段时间的长度随机决定。
CSMA/CD 使用令牌系统来避免冲突。
7在封装过程中,传输层添加什么标识符?源 IP 地址和目的 IP 地址源 MAC 地址和目的 MAC 地址源端口号和目的端口号源通道标识符和目的通道标识符8数据链路层有哪两项功能?(选择两项)分割和记录数据。
在源主机和目的主机上运行的程序之间进行数据交换。
控制数据如何传递到介质中。
生成信号以表示每个帧中的比特。
使用帧头和帧尾封装每个数据包,以便在本地介质中进行传输。
9请参见图示。
网络中的主机 A 和 B 正在传输层交换数据段。
下列关于此交换的陈述,哪两项是正确的?(选择两项)主机 A 正在使用 FTP 向主机 B 传输文件。
CCNA2PracticeFinalExamAnswerV3.1

CCNA2PracticeFinalExamAnswerV3.11. Which statements are true regarding VTY passwords? (Choose two.)VTY passwords must be encrypted.All VTY lines do not need to use the same password.A VTY password is required to establish telnet sessions.The VTY password is set with the command line console 0.The VTY password must be identical with the enable secret password. 2.Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?It will be forwarded through interface S1.It will be forwarded to the default route.It will be directed toward the Internet.It will be discarded.3.Which command will produce the output shown in the graphic?show cdpshow cdp neighborsshow cdp neighbors detailshow cdp detail4.Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)Router B received a configuration change.Router A sent a message requesting an update.Router C came online after Router B sent the RIP update.Router B received an error message indicating the last update was not received.5. How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?458106. Which of the following WAN connection services typically use synchronous communications? (Choose two.)circuit-switchedleased linepacket-switchedEthernetanalog modem services7. Which of the following will add a TFTP server as a fallback source fora router to load an IOS image?Router# boot system tftp 163.150.9.31 c2500-d-l.120-9Router# copy run startRouter# boot system tftp c2500-d-l.120-9.bin 163.150.9.31Router# copy run startRouter# config tRouter(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31 Router(config)# exitRouter# copy run startRouter# config tRouter(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.binRouter(config)# exitRouter# copy run start8. What types of messages are sent periodically by devices configured for CDP?probesbeaconssignalsadvertisementsrouting updatesunicast9. An administrator has made routing protocol changes to a ro uter’s configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?There was a POST failure.The incorrect IOS loaded.There was an error in the startup configuration file.The configuration register was set to ignore NVRAM.10. Which command is used to redirect debug information to a device that is connected though a Telnet session? Router# monitorRouter# terminal redirect vty 0Router# terminal monitorRouter# monitor output vty 011. After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)There is a mismatch in the encapsulation type on both ends of the link.A Layer 1 issue exists.An interface problem exists.The clockrate was not set during configuration.There is no usable media for the protocol.Keepalive messages are not being sent.12.Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)by forwarding packets over paths of equal costby forwarding packets according to hop count and speed of the linkby determining which interface has the least traffic and sending to it firstby first determining the speed of the links and then cycling packets through the fastest links firstby cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time13. When would the ROM monitor mode be used? (Choose two.) maintaining routing configuration settingsmodifying the IOS image stored in Flashrunning a limited IOS feature setperforming the bootstrap process14. Which two statements are true about route metrics? (Choose two.)The more factors that make up a metric, the greater the flexibility to tailor network operations.The larger the metric number, the better the path.Routing protocols use metrics to send routing updates to directly connected neighbors.Bandwidth and delay are static metrics used by RIP v1.Ticks, delay, and cost are metrics used by routing protocols.15.Which of the following are valid static IP routes? (Choose three.) RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1 RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2 RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.116. Of the eight network users on the Human Resources department LAN, one cannot connect to the file serv er. The user’s PC has successfully booted but can not see the network. What should be checked first?the PC power cordthe file serverthe PC network interface card LEDsthe LAN switch in the wiring closetthe configuration of the router interface attached to the LAN17. What can be determined from the partial output of the show ip route command displayed below? (Choose two.)R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0C 192.168.10.0/24 is directly connected, Serial0/0The next update will be in 76 seconds.The next update will be in 16 seconds.The administrative distance is 120 and the metric is 1.The metric is 120 and the administrative distance is 1.200.200.200.0 is configured on Serial0/0.192.168.10.2 is configured on Serial0/0.18. Why is it useful to have an interface description?A user can telnet to the router using the interface description.The interface description is a shortcut way to edit the running-config. The interface description helps identify distant network connections.The interface will remain inactive until an interface description is applied.19.Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)Updates start broadcasting every 30 seconds.Updates start broadcasting every 90 seconds.Link-state advertisements are flooded.Link-state advertisements are sent only to neighboring routers.All routers note the change and adjust routes.All routers ignore the change until the route becomes active again. 20.The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1Utah(config)# ip route 172.31.3.0 255.255.255.0 s1Utah(config)# ip route 0.0.0.0 0.0.0.0 s021. Which statement about datagram life is true?Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed. Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.22.The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.access-list 22 deny host 204.204.7.122access-list 22 permit anyWhich group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?RouterA(config)# interface s0/0RouterA(config-if)# ip access-group 22 inRouterA(config)# interface s0/0RouterA(config-if)# ip access-group 22 outRouterA(config)# interface fa0/0RouterA(config-if)# ip access-group 22 inRouterB(config)# interface fa0/0RouterB(config-if)# ip access-group 22 inRouterB(config)# interface s0/0RouterB(config-if)# ip access-group 22 inRouterB(config)# interface fa0/0RouterB(config-if)# ip access-group 22 out23. A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)The ip host table on the router is not configured.The command telnet Boston was issued from the wrong router prompt.The routing table is missing.Domain name services are not available.24. Which of the following are functions of a router? (Choose three.)packet switchingextension of network segmentssegmentation of local area networksselection of best path based on a logical addressingselection of best path based on a physical addressingThe commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?The router will load c2500-js-l.112-26d.The router will load c2500-d-l.120-9.The router will load the IOS from ROM.The router will boot into ROM monitor mode.26.A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one. The wrong port was configured for the ACL so Telnet traffic was still allowed.The access list has not been assigned to an interface.The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?F, G, E, D, B, AF, E, D, C, AF, E, D, AF, E, D, B, A28. Which of the following is the correct flow of routines for a router startup?load bootstrap, load IOS, apply configurationload bootstrap, apply configuration, load IOSload IOS, load bootstrap, apply configuration, check hardwarecheck hardware, apply configuration, load bootstrap, load IOS29. In the configuration register value 0×2104, which value represents the boot field setting?x2430. ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?The packets will be placed in a buffer and forwarded when the ACL is removed.The packets will be sent to the source with an error notification message.The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.The implicit deny any statement placed at the end of the list will cause the packets to be dropped.31. Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)telnetting into the routerinitiating a debug sessionconfiguring a router for the first timeusing the Aux port to check the current configurationusing the console port to check the current configuration32.The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?no update timersholdown-timer 96poison reverse E0passive-interface E0no triggered updates33. When must a router serial interface be configured with the clock rate command?when the interface is functioning as a DTE devicewhen the interface timers have been clearedwhen the connected DTE device is shut downwhen the interface is functioning as a DCE device34. What are the major characteristics of a wide area network? (Choose three.)connect devices separated by wide geographical areasincludes technologies of FDDI and Ethernetuses serial connections to access bandwidthcommon carriers are needed for connectionstype of connection between a router and a switch35. If the config-register on a router is set to 0×2102, where is the first place the router will look for boot system commands? RAMROMFlashNVRAM36. Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)It can be used to verify the operation of application layer software between the source and destination.Telnet can use the ICMP protocol to verify a hardware connection and network layer address.It is the most complete testing mechanism available.Remote networks may be accessed via a Telnet session for troubleshooting.Time to Live values are used by Telnet to identify a failure of device between source and destination.37.The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.All of the routers will have direct knowledge of the exact topology of the entire network.The Key West router will forward routing table information to the Miami and Palm Beach routers.The Miami router will learn about network 192.168.1.0 from the Key West router.If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.38. Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.) functions as a link-state routing protocoldiscards packets when the hop count is greater than 15calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)created as a proprietary routing protocolfloods updates as topology changes occurbroadcasts routing updates every 90 seconds or as triggered by topology changes39. The following line was displayed in the output of the show ip route command.R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0What is the value of the routing metric?312203012040.Refer to the output from the show ip route command. What can be concluded from the output of this router command?A preferred route to the destination has not been set.There are two equal cost paths to network 1.0.0.0.Both interfaces are being used equally to route traffic.A variance must be set to load-balance across multiple paths.41. Which of the following are true statements about creating and applying access lists? (Choose three.)Access list entries should filter in the order from general to specific.One access list per port per protocol per direction is permitted.Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination. There is an implicit deny at the end of all access lists.Statements are processed sequentially from top to bottom until a match is found.The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.42. Which of the following are true regarding the setup configuration mode? (Choose three.)To abort the setup mode, use the CTRL+SHIFT+6 keys.To abort the setup mode, use the CTRL+C keys.Setup mode allows a complete configuration of the router.To enter setup mode, use the privileged mode setup command.A router that does not find a valid IOS during the boot process will start the system configuration dialog.A router that does not find a valid configuration file during the boot process will start the system configuration dialog.43. Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)TCP/IP must be installed and properly configured on each device.。
CCNA期末测试多选题

CCNA期末测试多选题多选题:1、对于这样一个地址,192.168.19.255/20,下列说法正确的是: ()(A) 这是一个广播地址(B) 这是一个网络地址(C) 这是一个私有地址(D) 地址在192.168.19.0网段上(E) 地址在192.168.16.0网段上(F) 这是一个公有地址答案:CE2、下面有关NAT叙述正确的是()(A) NAT是英文“地址转换”的缩写,又称地址翻译(B) NAT用来实现私有地址与公用网络地址之间的转换(C) 当内部网络的主机访问外部网络的时候,一定不需要NAT(D) 地址转换的提出为解决IP地址紧张的问题提供了一个有效途径答案:ABD3、关于VLAN下面说法正确的是()(A) 隔离广播域(B) 相互间通信要通过路由器(C) 可以限制网上的计算机互相访问的权限(D) 只能在同一个物理网络上的主机进行逻辑分组答案:ABC4、下面对路由器的描述正确的是(交换机指二层交换机)()(A) 相对于交换机和网桥来说,路由器具有更加复杂的功能(B) 相对于交换机和网桥来说,路由器具有更低的延迟(C) 相对于交换机和网桥来说,路由器可以提供更大的带宽和数据转发功能(D) 路由器可以实现不同子网之间的通信,交换机和网桥不能(E) 路由器可以实现虚拟局域网之间的通信,交换机和网桥不能答案:ADE5、关于IP报文头的TTL字段,以下说法正确的有()(多选)(A) TTL的最大可能值是65535(B) 在正常情况下,路由器不应该从接口收到TTL=0的报文(C) TTL主要是为了防止IP报文在网络中的循环转发,浪费网络带宽(D) IP报文每经过一个网络设备,包括Hub、LAN SWITCH和路由器,TTL值都会被减去一定的数值答案:BC6、VLAN的划分方法有(多选)()(A) 基于设备端口(B) 协议(C) MAC(D) 物理地址答案:ABCD7、路由项10.0.24.0/21由哪几条子网路由聚合而来()(A) 10.0.0.25/16(B) 10.0.0.23/16(C) 10.0.0.26/16(D) 10.0.0.22/16答案:AC8、在OSPF中,以下()是两台路由器成为邻居关系的必要条件。
CCNA第二学期期末考试Exam

路由器获知到的第一条路径仅使用路由器获知到的前两条路径路由器获知到的最后一条路径所有四条路径对于为防止路由环路而通过毒性反转实现的水平分割方法,哪两项叙述正确?(选择两项。
)所有 Cisco IOS 都会默认启用此方法。
会将一个表示无穷大度量的值分配给路由以将其毒化。
将毒化路由更新发回该更新的发送接口。
指示路由器将可能会影响路由的更改保持一段特定的时间。
限制数据包在被丢弃之前能够在网络中传输的跳数。
在两台路由器能够使用 OSPF 形成邻居邻接关系之前必须完成哪两项任务?(选择两项。
)路由器必须选举出指定路由器。
路由器必须在网络类型方面达成一致。
路由器必须使用相同的 dead 时间间隔。
路由器必须交换链路状态请求。
路由器必须交换数据库描述数据包。
下列路由器组件和操作的配对中,哪两项是正确的?(选择两项。
)D RAM - 加载 bootstrapR AM - 存储操作系统闪存 - 启动时执行诊断N VRAM - 存储配置文件R OM - 存储备份配置文件P OST - 运行硬件模块诊断下列关于无类路由协议的陈述,哪两项是正确的?(选择两项。
)无类路由协议可用于不连续子网。
无类路由协议可在路由更新中转发超网路由。
无类路由协议无法在路由表中实施有类路由。
无类路由协议仅使用跳数度量。
无类路由协议的路由更新中不包含子网掩码。
请参见图示。
在图示的运行了show cdp neighbors命令。
根据此信息,可推断出哪两项结论?(选择两项。
)在路由器上运行了该命令。
A BCD 是一台非 CISCO 设备。
两台设备间存在第 3 层连通性。
A BCD 支持路由功能。
A BCD 连接到相邻设备的 Fa0/0 接口。
请参见图示。
网络连接有三台路由器:R1、R 示了所有三台路由器的路由。
从该输出可以得到什么结论?R1 和 R3 通过 S0/0/0 接口相连。
R1 S0/0/0 接口的 IP 地址为 10.1.1.2。
R2 S0/0/1 接口的 IP 地址为 10.3.3.2。
CCNA2 final期末考试答案A

1.A technician configures the Fa0/0 interface on a router with ip address 192.168.3.5 255.255.255.252. What additional comma issued by the technician to activate the interface to forward traffic?Router(config-if)# exitRouter(config-if)# no shutdownRouter(config-if)# clock rateRouter# copy running-config startup-config2Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that interface FastEthernet0/1 is not functioning. Which action will most likely correct the problem with FastEthernet0/1?A clock rate should be added to the interface configuration.The subnet mask should be added to the interface configuration.An interface description needs to be added to the interface configuration.The no shutdown command needs to be added to the interface configuration.3Refer to the exhibit. A router interface is configured with the command ip address 172.16.3.31 255.255.192.0. Which set o values would allow a computer that is connected to the router interface to communicate with remote networks?A: 172.16.3.254B: 255.255.192.0C: 172.16.3.31A: 172.16.3.31B: 255.255.192.0C: 172.16.3.255A: 172.16.3.254B: 255.255.255.0C: 172.16.3.31A: 172.16.3.31B: 255.255.255.0C: 172.16.3.14Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be l routing table?ssss5Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?An incorrect IP address is configured between the two routers.No static route is configured on Router2.A routing loop has occurred.No routing protocol is configured on either of the two routers.Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)The route to network 172.16.0.0 has an AD of 156160.Network 192.168.0.16 can best be reached using FastEthernet0/0.The AD of EIGRP routes has been manually changed to a value other than the default value.Router1 is running both the EIGRP and OSPF routing process.Network 172.17.0.0 can only be reached using a default route.No default route has been configured.7Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displaye are operational and pings are not blocked on this network.Which ping will fail?from R1 to 172.16.1.1from R1 to 192.168.3.1from R2 to 192.168.1.1from R2 to 192.168.3.18Refer to the exhibit. A network administrator has configured OSPF using the following command:network 192.168.1.32 0.0.0.31 area 0Which router interface will participate in OSPF?FastEthernet0/0FastEthernet0/1Serial0/0/0Serial0/0/19Refer to the exhibit. The hosts on the R1 LAN are unable to access the Internet. What is incorrectly configured?the IP address of the Fa0/0 interface at R1the IP address of the S0/0/1 interface at R2the IP address of the S0/0/0 interface at R1the subnet mask of the S0/0/1 interface at R210Refer to the exhibit. Host A is having problems accessing server A. All routers have the same EIGRP configuration as rou What should be done so that host A can access server A?Add the command no auto-summary on all routers.Change the network statements to include a wildcard mask.Adjust the EIGRP hello timers to account for the network delay.Add the command eigrp log-neighbor-changes on all routers.Which feature of RIPv2 enables it to function as a classless routing protocol?Subnet masks are included in routing updates.Routing updates are triggered by topology changes.Next-hop addresses are included in routing updates.Multicast addresses are used to send routing updates.12A network administrator must use the subnet 172.16.128.0/18 to create 6 additional subnets each containing up to 2000 hLANs. Which subnet mask should the administrator use to create the new subnets?255.255.224.0255.255.240.0255.255.248.0255.255.252.013 A network administrator is in charge of two separate networks that share a single building. What device will be required totwo networks and add a common connection to the Internet that can be shared?hubrouteraccess pointEthernet switch14Refer to the exhibit. What needs to be done to allow these two routers to connect successfully?Add a clock rate to S0/0/0 on R1.Add an interface description to S0/0/1 on R2.Change the serial interface on R2 to S0/0/0 so that it matches R1.Change the IP address of S0/0/1 on R2 so that it is in the same subnet as R1.15In which situation would a default static route be recommended?when connecting an edge router to the Internetwhen variable length subnet masking is in effectwhen there is more than one valid route for a destination networkwhen a destination network has a larger mask than any routes in the routing tableRefer to the exhibit. A network engineer has run the show version command on R3. Upon rebooting, R3 does not load th configuration settings.What could be the cause of this problem?There is insufficient NVRAM.There is insufficient flash memory.The configuration register is not configured with the default setting.The system image file is not located in NVRAM.17Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?The IP address of host A is incorrect.The default gateway of host A is incorrect.The Fa0/1 interfaces of the two routers are configured for different subnets.The subnet mask for the Fa0/0 interface of R1 is incorrect.18Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configur operational. Both routers are configured to include all connected interfaces in routing updates. R2 is not showing any rout the routing table. What is the likely cause?The adjacent interfaces are passive.The distance of 120 exceeds 15 hops.R2 will not accept version 1 updates from R1.19W hich two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)authenticationlink-state advertisementshold-down timersSpanning Tree Protocolsplit horizon20Which prompt is used to allow a user to change the IP address of an interface on a router?Router>Router#Router(config)#Router(config-if)#Refer to the exhibit. A network administrator adds this command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0 result of adding this command?This route is automatically propagated throughout the network.The traffic for network 172.16.1.0 is forwarded to network 192.168.2.0.A static route is established.The traffic for all Class C networks is forwarded to 172.16.1.2.22Refer to the exhibit. What information can be determined from the displayed output?EIGRP packets are waiting to be sent to the neighbors.The adjacencies between the routers are yet to be established.The IP address 192.168.10.10 is configured at serial interface S0/0/1 of router R2.Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interface.23Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router entering a password?The login command was not entered on the cons ole line.The enable password should be an enable secret password.No username and password combination has been configured.Console connections cannot be configured to require users to provide passwords.24W hich of the following are primary functions of a router? (Choose two.)packet switchingmicrosegmentationdomain name resolutionpath selectionflow control25Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a static altered to accommodate a topology change?Keep the existing static route and configure a new static route with the correct next hop IP address.Negate the existing static route and configure a new static route with the correct next hop IP address.Do nothing. The existing static route will automatically update the next hop entry with the new IP address.Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP addresRefer to the exhibit. All routers are configured with no auto-summary. All routers have a default route via their Serial0/1 Router B receives a packet with a destination of 10.16.1.98. What path will the packet take?B-EB-E-D-AB-E-D-A then loop A-D-A until the TTL expiresB will immediately drop the packet.There is insufficient information to answer the question.27Refer to the exhibit. A network administrator is investigating why data packets with destination addresses of 172.16.10.10 192.168.10.100 are being dropped instead of being forwarded via the static route as expected. After confirming that the ip command has been applied on all routers in the network, what other action should the administrator take to ensure that da these addresses are forwarded via the static route?Check that all routers are configured with the same autonomous system number.Issue the no auto-summary command within the EIGRP configuration of all routers.Issue the no passive-interface command within the EIGRP configuration of all routers.Configure the static route to point to the next hop address instead of the outbound interface.28If a router is booting with its default configuration register setting and its NVRAM lacks boot system commands, from whe router try to load the IOS image first?ROMRAMNVRAMflashTFTP server29T wo routers need to be configured within a single OSPF area. Which two components need to be configured on both rout this? (Choose two.)the same process IDthe same area IDnetwork addresses and wildcard masksthe same router IDthe same loop back address30Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choos10.0.0.0/864.100.0.0/16128.107.0.0/16172.16.40.0/24192.168.1.0/24192.168.2.0/24Which candidate route has the longest match for a packet with a destination address of 10.30.16.48?10.30.0.0/1610.30.15.0/2310.30.16.0/2410.30.16.32/2710.30.16.32/3032W hich three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a r (Choose three.)The router modifies the TTL field, decrementing it by one.The router changes the source IP to the IP of the exit interface.The router maintains the same source and destination IP.T he router changes the source physical address to the physical address of the exit interface.The router changes the destination IP to the IP of the exit interface.The router sends the packet out all other interfaces, besides the one it entered the router on.33Refer to the exhibit. The interfaces of all routers are configured for OSPF area 0. R3 can ping R1, but the two routers are establish a neighbor adjacency. What should the network administrator do to troubleshoot this problem?Check if the interfaces of the routers are enabled.Check the hello and dead intervals between the routers.Check the process ID of both routers.Check if CDP is enabled on all the routers.34W hich mechanism helps to avoid routing loops by advertising a metric of infinity?route poisoningsplit horizonhold-down timertriggered updates35Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which tw o devices for this? (Choose two.)a CSU/DSU devicea modeman Ethernet switcha huba bridge36Why is fast convergence desirable in networks that use dynamic routing protocols?Hosts are unable to access their gateway until the network is converged.Routers will not allow packets to be forwarded until the network is converged.Routers may make incorrect forwarding decisions until the network has converged.Routers will not allow configuration changes to be made until the network has converged.37Refer to the exhibit. R1 is configured properly for a single area OSPF, and R2 has been recently installed in the network.commands is required to configure a single area OSPF for the networks that are connected to R2?R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config)# router ospf 2R2(config-router)# network 10.1.1.0 0.0.0.3 area 0R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.1.1.0 0.0.0.3 area 1R2(config)# router ospf 1R2(config-router)# network 192.168.2.0 0.0.0.255 area 0R2(config-router)# network 10.0.0.0 0.0.0.3 area 138Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network?ADCABCIt will load balance the traffic between ADC and ABCIt will send the traffic via ABC, and will use ADC as a backup path only when ABC fails.39W hat are two ways that a router can learn of the paths to destination networks? (Choose two.)updates from other routersDHCP information broadcastsmanual configuration of routesARP requests from connected routersinspection of the destination IP address in data packetsupdates from the SMTP management information base40Refer to the exhibit. The network administrator has run the following command on R1.R1(config)# ip route 192.168.2.0 255.255.255.0 172.16.1.2What is the result of running this command?Traffic for network 192.168.2.0 is forwarded to 172.16.1.2.This route is automatically propagated throughout the entire network.Traffic for all networks is forwarded to 172.16.1.2.The command invokes a dynamic routing protocol for 192.168.2.0.Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.42Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is tru how the routers in this topology will respond to this event?Router4 will learn about the failed route 30 seconds later in the next periodic update.Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires.Router5 immediately flushes the unreachable route from its routing table.Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.43Refer to the exhibit. Which combination of IP address and subnet mask can be used on the serial interface of Router2 in o interface in the same network as the serial interface of Router1?IP 172.16.0.18, subnet mask 255.255.255.0IP 172.16.32.15, subnet mask 255.255.255.240IP 172.16.0.18, subnet mask 255.255.255.252IP 172.16.32.18, subnet mask 255.255.255.25244W hich statement is true about the RIPv1 protocol?It is a link-state routing protocol.It excludes subnet information from the routing updates.It uses the DUAL algorithm to insert backup routes into the topology table.It uses classless routing as the default method on the router.45Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?192.168.1.0/24192.168.0.0/24192.168.0.0/22192.168.1.0/22Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.T he shortest path first algorithm is used.Split horizon is used to avoid routing loops.47A router learns about network 192.168.10.128/27 from multiple sources. Which option represen ts the best route and will berouting table?S 192.168.10.128/27 [1/0] via 192.168.10.226R 192.168.10.128/27 [120/2] via 192.168.10.226, 00:00:14, Serial0/0/0O 192.168.10.128/27 [110/1563] via 192.168.10.226, 00:00:09, Serial0/0/0D 192.168.10.128/27 [90/21026560] via 192.168.10.226, 00:00:16, Serial0/0/048Refer to the exhibit. When all of the commands that are shown in the exhibit are entered at the correct router prompt, wha of the router?nameciscorouterhostname49W hich statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.50Which two statements are true about the EIGRP successor route? (Choose two.)It is saved in the topology table for use if the primary route fails.It may be backed up by a feasible successor route.It is used by EIGRP to forward traffic to the destination.It is flagged as active in the routing table.After the discovery process has occurred, the successor route is stored in the neighbor table.Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip databa However, upon running the show ip route command, the network administrator sees that the router has installed a differe 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?Compared to RIP, EIGRP has a lower administrative distance.Compared to EIGRP, RIP has a higher metric value for the route.Compared to RIP, the EIGRP route has fewer hops.Compared to RIP, EIGRP has a faster update timer.52A network administrator is analyzing routing update behavior on a network that has both EIGRP and OSPF configured on Both protocols appear in the output of show ip protocols. However, only EIGRP internal routes appear in the routing tabstatement correctly explains the scenario?The OSPF protocol has a higher cost than EIGRP.The EIGRP protocol has a lower metric than OSPF.The EIGRP protocol was configured first on the router.The EIGRP protocol has a lower administrative distance than OSPF.。
CCNA 2 Chapter 3 v5.0 Exam Answers 2013

1A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)between two switches that share a common VLANbetween a switch and a server that has an 802.1Q NIC*between a switch and a client PCbetween a switch and a network printerbetween two switches that utilize multiple VLANs*2What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?The port automatically associates itself with the native VLAN.The port creates the VLAN again.The port goes back to the default VLAN.The port becomes inactive.*3Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to anotherswitch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.Disable autonegotiation and set ports to either static access or static trunk.Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.All user ports are associated with VLANs distinct from VLAN 1 and distinct from the‘black-hole’ VLAN.*4Which command is used to remove only VLAN 20 from a switch?no switchport access vlan 20delete flash:vlan.datno vlan 20*delete vlan.dat5A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?Erase the startup configuration and reboot the switch.Erase the running configuration and reboot the switch.Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*Delete the IP address that is assigned to the management VLAN and reboot the switch.6What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?VLAN 20 will be created automatically.*The command will have no effect on the switch.Port Fa0/18 will be shut down.An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created. 7Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?show mac address-table interface Fa0/1show interfaces Fa0/1 switchport*show interfaces trunkshow vlan brief8Place the options in the following order:- not scored -dynamic autononegotiatedynamic desirabletrunk9Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?Port Fa0/11 will be returned to VLAN 1.*VLAN 30 will be deleted.An error message would be displayed.Port Fa0/11 will be shutdown.10What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode.Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.*Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.11Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)Disable DTP autonegotiation on end-user ports.*Change the management VLAN to a distinct VLAN that is not accessible by regular users.Statically configure all ports that connect to end-user host devices to be in trunk mode. Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*Use SSH for all remote management access.12In a basic VLAN hopping attack, which switch feature do attackers take advantage of?automatic encapsulation negotiationthe default automatic trunking configuration*an open Telnet connectionforwarding of broadcasts13A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?It allows only VLAN 30 on Fa0/5.*It allows a native VLAN of 30 to be implemented on Fa0/5.It allows VLANs 1 to 30 on Fa0/5.It allows VLANs 10, 20, and 30 on Fa0/5.14Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?No VLAN tag is added to the frame.*A VLAN tag is added when the frame is accepted by the switch.A VLAN tag is added when the frame is forwarded out the port to PC-B.A VLAN tag is added when the frame leaves PC-A.15Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?The native VLAN is being pruned from the link.The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*The trunk has been configured with the switchport nonegotiate command.The native VLAN should be VLAN 60.16What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?All VLANs will be allowed across the trunk.*Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk.Only VLAN 1 will be allowed across the trunk.17Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)on links that should not be trunking*when connecting a Cisco switch to a non-Cisco switch*on links that should dynamically attempt trunkingwhen a neighbor switch uses a DTP mode of dynamic autowhen a neighbor switch uses a DTP mode of dynamic desirable18Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which PCs will receive the broadcast sent by PC-C?PC-D, PC-E*PC-A, PC-B, PC-D, PC-EPC-A, PC-BPC-A, PC-B, PC-D, PC-E, PC-FPC-A, PC-B, PC-E19Which two statements are true about VLAN implementation? (Choose two.)The network load increases significantly because of added trunking information.Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*The size of the collision domain is reduced.VLANs logically group hosts, regardless of physical location.*The number of required switches in a network decreases.20Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?switchport trunk allowed vlan add 99switchport trunk native vlan 66*switchport mode dynamic autoswitchport nonegotiate21Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?switch port securityPVLAN protected port*ACLVLAN22Fill in the blank. Use the full command syntax.The ” show vlan brief” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.23Which three statements accurately describe VLAN types? (Choose three).An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*A management VLAN is any VLAN that is configured to access management features of the switch.* A data VLAN is used to carry VLAN management data and user-generated traffic.Voice VLANs are used to support user phone and e-mail traffic on a network.VLAN 1 is always used as the management VLAN.After the initial boot of an unconfigured switch, all ports are members of the default VLAN.* 24Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?S1(config-if)# switchport mode trunkS1(config-if)# switchport mode accessS1(config-if)# switchport nonegotiate*S1(config-if)# switchport mode dynamic desirableS1(config-if)# switchport trunk allowed vlan none。
CCNA第二学期考试答案

以下是针对您未获得满分的试题给出的反馈。
某些交互式试题可能不显示您的答案。
分项分数:1与固定配置的交换机相比,模块化交换机具有哪两个优点?(请选择两项。
)正确响应您的响应每台交换机的成本更低可扩展性更高转发率更低需要的电源插座数目更少带宽聚合可以使用多个端口固定配置交换机价格较低,但是它具有指定数量的端口且不能添加端口。
它们提供的高速端口通常比较少。
为了在包含固定配置交换机的网络上扩展交换,需要购买更多的交换机。
这增加了需要使用的电源插座数量。
模块化交换机只需要购买额外的线卡便可以扩展。
带宽聚合也更容易,因为机箱的背板可以为交换机端口线卡提供所需的带宽。
此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.2 交换网络2思科无边界架构接入层的基本功能是什么?正确响应您的响应聚合第 2 层广播域聚合第 3 层路由边界为用户提供访问权提供高可用性思科无边界架构接入层的功能是为用户提供网络访问。
第 2 层广播域聚合、第 3 层路由边界聚合和高可用性是分布层的功能。
也有说答案是聚合第 3 层路由边界此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络3思科无边界架构分布层的基本功能是什么?正确响应您的响应充当主干聚合所有园区块聚合第 3 层路由边界为用户提供访问权思科无边界架构的分布层的一项基本功能是在不同的VLAN 之间路由。
充当主干和聚合园区块是核心层的功能。
为用户提供访问是接入层的功能。
此试题参考以下领域的内容:Routing and Switching Essentials• 1.1.1 融合网络4若将大端口密度、容错和低价作为重要指标,应使用哪个交换机外形因素?正确响应您的响应固定配置交换机模块化交换机可配备机架的1U 交换机可堆叠式交换机堆叠式交换机可以使用特殊电缆实现互联,从而在交换机之间提供高带宽的吞吐量,并像单个大型交换机一样运行。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
C C N A第二学期期末考试E x a m集团文件发布号:(9816-UATWW-MWUB-WUNN-INNUL-DQQTY-路由器获知到的第一条路径仅使用路由器获知到的前两条路径路由器获知到的最后一条路径所有四条路径对于为防止路由环路而通过毒性反转实现的水平分割方法,哪两项叙述正确(选择两项所有 Cisco IOS 都会默认启用此方法。
会将一个表示无穷大度量的值分配给路由以将其毒化。
将毒化路由更新发回该更新的发送接口。
指示路由器将可能会影响路由的更改保持一段特定的时间。
限制数据包在被丢弃之前能够在网络中传输的跳数。
在两台路由器能够使用 OSPF 形成邻居邻接关系之前必须完成哪两项任务(选择两项。
路由器必须选举出指定路由器。
路由器必须在网络类型方面达成一致。
路由器必须使用相同的 dead 时间间隔。
路由器必须交换链路状态请求。
路由器必须交换数据库描述数据包。
下列路由器组件和操作的配对中,哪两项是正确的(选择两项。
)D RAM - 加载 bootstrapR AM - 存储操作系统闪存 - 启动时执行诊断N VRAM - 存储配置文件R OM - 存储备份配置文件P OST - 运行硬件模块诊断下列关于无类路由协议的陈述,哪两项是正确的(选择两项。
)无类路由协议可用于不连续子网。
无类路由协议可在路由更新中转发超网路由。
无类路由协议无法在路由表中实施有类路由。
无类路由协议仅使用跳数度量。
无类路由协议的路由更新中不包含子网掩码。
请参见图示。
在图示的其中一台设备上运行了show cdp neighbors命令。
根据此信推断出哪两项结论(选择两项。
)在路由器上运行了该命令。
A BCD 是一台非 CISCO 设备。
两台设备间存在第 3 层连通性。
A BCD 支持路由功能。
A BCD 连接到相邻设备的 Fa0/0 接口。
请参见图示。
网络连接有三台路由器:R1、R2 和 R3。
图中显示了所有三台路由器的从该输出可以得到什么结论R1 和 R3 通过 S0/0/0 接口相连。
R1 S0/0/0 接口的 IP 地址为 10.1.1.2。
R2 S0/0/1 接口的 IP 地址为 10.3.3.2。
R2 连接到 R3 的 S0/0/1 接口。
√D请参见图示。
要完成路由器 R1 与 WAN 之间的连接,可使用下列哪两种设备(选择C SU/DSU 设备调制解调器以太网交换机集线器网桥请参见图示。
根据如图所示的输出,下列哪两项陈述是正确的(选择两项。
)所有路由都处于稳定状态。
每条路由都有一个可行后继。
两台路由器之间的串行接口关闭。
E IGRP 的管理距离已设置为 50。
R1 上已运行了show ip eigrp topology命令。
一台使用 RIP 路由协议的路由器在路由表中存有到某个网络的路由条目。
后来,路由另一条到同一目的网络的路由条目的更新,且与前者比,该路由跳数较少。
对于此更器会采取什么操作路由器会将更新信息附加到路由表中。
路由器会将路由表中到该网络的路由条目标记为无效。
路由器会用新信息替换现有的路由表条目。
路由器会忽略新的更新。
请参见图示。
网络管理员将此命令添加到路由器 R1:。
添加此命令会产生什么结果此路由会在网络中自动传播。
建立一条静态路由。
请参见图示。
从突出显示的输出可以得到什么信息自动总结被禁用。
选B网络使用的是有类路由协议。
请参见图示。
网络管理员从 R3 上成功 ping 通了 R1。
接下来,管理员在 R3 上运show cdp neighbors命令。
图中显示了该命令的输出。
输出中缺少 R1 的两个原因是什么(选择两项。
)R1 和 R3 之间有连通性问题。
R1 的 Fa0/0 接口配置了不正确的 IP 地址。
在 R1 上运行了no cdp run命令。
对 R3 的 Fa0/1 接口运行了no cdp enable命令。
关闭了 R1 的电源。
数据会通过 R3-R2 传输。
数据会通过 R3-R1-R2 传输。
流量会在两条路径(R3-R2 和 R3-R1-R2)间进行负载均衡。
数据会通过 R3-R2 传输,而另一条通过 R3-R1-R2 的路径则会留作备用路径。
请参见图示。
网络管理员运行了show interface命令。
图中显示了该命令的输出。
接口工作,需要采取的第一步是什么用已知能够正常工作的电缆替换所用电缆。
对接口发出no shutdown命令。
将接口配置为环回接口。
为接口设置封装。
经由 A、B 和 C 传输。
经由 A、F、E、D 和 C 传输。
经由 A、G、H 和 C 传输。
流量会在所有路径上进行负载均衡。
网络管理员在所示网络图中的路由器 B 和 C 上启用了 RIP。
什么命令可防止向路由器RIP 更新A(config)# router ripA(config-router)# passive-interface S0/0B(config)# router ripB(config-router)#B(config-router)#A(config)# router ripA(config-router)#B(config)# router ripB(config-router)# passive-interface S0/0A(config)# no router rip请参见图示。
下列有关所示网络中快速以太网接口的陈述,哪一项是正确的帧离开 R1 的接口 Fa0/0,源 MAC 地址为 000C.。
10.1.1除非对 R1 的 Fa0/0 接口发出no shutdown 命令,否则 R1 和 R2 之间不会转发数据请参见图示。
R2 应使用哪个总结地址将其 LAN 网络通告给 R1请参见图示。
PC1 无法访问 Internet。
此问题的原因是什么两台路由器之间配置了错误的 IP 地址。
R outer2 上未配置静态路由。
出现了路由环路。
两台路由器上均未配置路由协议。
请参见图示。
所有路由器都配置为运行 RIPv1,并已完全收敛。
R3 会收到下列哪项由更新哪种路由协议默认使用带宽和延迟来计算路由的度量R IPv1R IPv2O SPFE IGRP关于数据包通过路由器传输时的封装和解封的叙述,下列哪三项是正确的(选择三项。
路由器修改 TTL 字段,将其值减 1。
路由器将源 IP 更改为送出接口的 IP。
路由器保持相同的源 IP 和目的 IP。
路由器将源物理地址更改为送出接口的物理地址。
路由器将目的 IP 更改为送出接口的 IP。
路由器会从所有接口将数据包转发出去,包括路由器接收数据包时使用的那个接口。
路由器配置了不同版本的 RIP。
R2 不会转发路由更新。
R1 的配置应包含no auto-summary命令。
已超出最大路径数。
请参见图示。
网络管理员从控制台端口访问路由器 R1,以配置一个新连接的接口。
接并进行必要的配置更改,管理员需要需要输入什么口令仅需输入 Cisco123 口令仅需输入 Cisco789 口令仅需输入 Cisco001 口令C isco001 和 Cisco789 口令C isco001 和 Cisco123 口令请参见图示。
尽管两台路由器都可以 ping 通其邻居的串行接口,但无法 ping 通其的以太网接口。
下列关于此网络的说法中哪两项正确(选择两项。
)两台路由器上的管理距离都设置为 50。
两台路由器上都未运行network 10.1.1.0 命令。
两台路由器上都启用了自动总结。
请参见图示。
网络管理员已使用以下命令配置了 OSPF。
0.0.0.31 area 0哪个路由器接口将参与 OSPFF astEthernet0/0F astEthernet0/1S erial0/0/0S erial0/0/1R outer1R outer2R outer3R outer4路由器启动时,如果没有boot system命令,则查找 Cisco IOS 的默认顺序是什么R OM、TFTP 服务器、闪存闪存、TFTP 服务器、ROM 选B闪存、NVRAM、TFTP 服务器R OM、TFTP 服务器、闪存网络管理员需要配置一台路由器,用于在不等价路径上负载均衡流量。
管理员应采用由协议E IGRPO SPFR IPv1R IPv20/1/1下列关于 OSPF Hello 数据包的陈述,哪两项是正确的(选择两项。
)用于动态发现邻居。
用于维护邻居关系。
用于确定完整的网络拓扑。
与计时器一起用来选举链路速度最快的指定路由器。
用于在相邻接口之间协商正确的参数。
请参见图示。
命令ip route 0.0.0已在路由器 R2 上生效。
此命令会产生哪两项结择两项。
)会在路由表中更新静态路由。
来自 Internet 的流量会转发给 R2。
该路由会被指定为到路由表中所有未定义的网络的默认路由。
所有广播都会通过 R2 的 S0/0/0 接口转发。
请参见图示。
网络管理员已在 R1 上运行了show ip protocol命令。
从所示的输出什么结论路由器正在使用 RIPv2。
路由器不会转发路由更新。
路由器会收到两个 RIP 版本的更新。
F astEthernet0/0 接口关闭。
请参见图示。
R1 LAN 中的主机无法访问 Internet。
下列哪项配置有误R1 Fa0/0 接口的 IP 地址R2 S0/0/1 接口的 IP 地址R1 S0/0/0 接口的 IP 地址R2 S0/0/1 接口的子网掩码请参见图示。
从 R1 能够 ping 通 10.1.1在 R1 处没有最后选用网关。
两台路由器之间的串行接口关闭。
R1 上未配置默认路由。
下列哪两项是路由器的功能(选择两项。
)连接多个 IP 网络。
通过使用第 2 层地址控制数据流。
确定发送数据包的最佳路径。
管理 VLAN 数据库。
扩大广播域。
请参见图示。
有多少条路由是子路由346请参见图示。
所有路由均已通告给所有路由器且均运行正常。
下列有关数据从路由器由器 B 传输的路径,哪一项叙述正确如果采用 EIGRP 的默认配置,数据会在两条路径(A, D, B 和 A, C, B)之间平均分如果采用 RIPv1 的默认配置,数据会在所有路径上进行负载均衡。
如果同时使用 EIGRP 和 OSPF 的默认配置,数据会通过由 OSPF 协议获知的路径发送如果采用 RIPv2 的默认配置,数据会在两条路径(A, D, B 和 A, C, D)之间平均分请参见图示。
突出显示的值 120 表示什么意思路由协议计算出的度量。
D UAL 算法使用该值来确定该链路的带宽。
路由协议的管理距离。
收到下一个更新前的抑制时间,单位为秒。
请参见图示。
当数据包发往哪两个网络时需要路由器执行递归查找(选择两项。
)10.0.0.0/8请参见图示。
主机 A 无法访问 Internet,经查明这是由编址问题造成的。