CCNA 3 Practice Final v5.0 Exam Answers 2015 (100%)

合集下载

思科CCNA第三学期官方试题(完整版)[有答案解析]

思科CCNA第三学期官方试题(完整版)[有答案解析]

参加考试 - ESwitching Final Exam - CCNA Exploration: LAN 交换和无线 (版本 4.0)剩余时间正在显示第 1 页,共 4页下一页>页跳转<上一页1 以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSID OFDMWEPDSSS2 分层网络模型具有哪三项优点?(选择三项。

)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化3在将 Catalyst 交换机迁移到其它 VTP 管理域之前,应该进行哪三项任务?(选择正确的 VTP 模式和版本。

使用新管理域的名称配置交换机。

从新域中的 VTP 服务器上下载 VTP 数据库。

配置新域内的 VTP 服务器,使其识别该交换机的 BID。

重置 VTP 计数器,使交换机可与新域内的其它交换机同步。

检验交换机的配置修订版号是否比新域内的其它交换机的低。

4下列哪两种说法正确地描述了生成树协议?(选择两项。

)它只在第 2 层使用。

它在交换机上配置。

它消除了网络拓扑中的第 2 层环路。

它限制了端口上所允许的有效 MAC 地址的数量。

它使 VLAN 信息得以传播到网络中的其它交换机。

5下列哪种方法可建立用于配置 Linksys WRT300N 无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。

以物理方式连接到接入点,然后重新启动计算机以启动配置软件。

在接入点所在的 IP 子网内的计算机上的 web 浏览器中输入接入点的默认修改与接入点连接的计算机的 TCP/IP 属性,使其与接入点处于同一个网机以建立连接。

6请参见图示。

源地址并非 0019.d2e4.d9f7 的帧进入接口 Fa0/24 时会发生什么情况?Fa0/24 会变为 error-disabled(错误-禁用)状态。

传入帧会被丢弃。

Fa0/24 端口 LED 会关闭。

安全违规计数会增加。

思科CCNA新版第3学期final-期末考试答案

思科CCNA新版第3学期final-期末考试答案

1出于维护目的,已将路由器从网络中移除。

并已将新的 Cisco IOS 软件映 像成功下载到效劳器并复制到路由器的闪存中。

应该在进行什么操作后再 将路由器放回网络中运行?备份新的映像。

将运行配置复制到NVRAM 。

从闪存中删除之前版本的 Cisco IOS 软件。

重新启动路由器并检验新的映像是否成功启动。

答案 说明 最高分值correctness of response Option 422请参见图示。

管理员尝试在路由器上配置 IPv6 的 EIGRP ,但收到如下图 的错误消息。

配置 IPv6 的 EIGRP 之前,管理员必须发出什么命令? no shutdownipv6 unicast-routingipv6 eigrp 100ipv6 cef答案 说明 最高分值correctness of response Option 323IPv6 EIGRP 路由器使用哪个地址作为 hello 消息的来源?32 位路由器ID接口上配置的 IPv6 全局单播地址所有 EIGRP 路由器组播地址接口 IPv6 本地链路地址答案 说明 最高分值correctness of response Option 424以下关于 EIGRP 确认数据包的说法,哪两项是正确的?〔请选择两项。

〕发送该数据包是为了响应 hello 数据包。

该数据包用于发现接口上连接的邻居。

该数据包作为单播发送。

该数据包需要确认。

该数据包不可靠。

答案 说明 最高分值correctness of response Option 3 and Option 5 are correct.25何时发送 EIGRP 更新数据包?仅在必要时当获取的路由过期时每 5 秒通过组播发送每 30 秒通过播送发送答案 说明 最高分值correctness of response Option 126请参见图示。

从输出中可以得出哪两条结论?〔请选择两项。

〕有一个通向网络 192.168.1.8/30 的可行后继路由器。

CCNA 2 Practice Final v5 answers 2013

CCNA 2 Practice Final v5 answers 2013

CCNA 2 Practice Final v5 answers 20131What is the order of packet types used by an OSPF router to establish convergence? Hello, DBD, LSR, LSU, LSAckLSAck, Hello, DBD, LSU, LSRLSU, LSAck, Hello, DBD, LSRHello, LSAck, LSU, LSR, DBD2Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)mostallgthostanysome3Which network design may be recommended for a small campus site that consists of a single building with a few users?a collapsed core network designa network design where the access and core layers are collapsed into a single layera three-tier campus network design where the access, distribution, and core are all separate layers, each one with very specific functionsa network design where the access and distribution layers are collapsed into a single layer 4Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?It identifies the subinterface.It identifies the native VLAN number.It identifies the number of hosts that are allowed on the interface.It identifies the VLAN number.It identifies the type of encapsulation that is used.5A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?the IP address of the interface that is configured with priority 0the highest IP address on the LAN interfacesthe OSPF area ID that is configured on the interface with the highest IP addressthe highest IP address that is configured on the WAN interfacesthe loopback interface IP addressRefer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?The NAT pool has been exhausted.The inside and outside interfaces have been configured backwards.The wrong netmask was used on the NAT pool.Access-list 1 has not been configured properly.7Which DHCP IPv4 message contains the following information?Destination address: 255.255.255.255Client IPv4 address: 0.0.0.0Default gateway address: 0.0.0.0Subnet mask: 0.0.0.0DHCPOFFERDHCPREQUESTDHCPACKDHCPDISCOVERRefer to the exhibit. R1 and R2 are OSPFv3 neighbors. Which address would R1 use as the next hop for packets that are destined for the Internet?2001:DB8:C5C0:1::22001:DB8:ACAD:1::2FE80::21E:BEFF:FEF4:5538FF02::59Which command will create a static default route on R1 to send all traffic to the Internet and use serial 0/0 as the exit interface?R1(config)# ip route 0.0.0.0 255.255.255.0 serial 0/0R1(config)# ip route 255.255.255.255 0.0.0.0 serial 0/0R1(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0R1(config)# ip route 0.0.0.0 255.255.255.255 serial 0/010A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.It must send a DHCPv6 INFORMATION-REQUEST message to request the address ofthe DNS server.It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use.It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address.11What is the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)The first 32 bits of a supplied IP address will be matched.The first 28 bits of a supplied IP address will be ignored.The last four bits of a supplied IP address will be ignored.The last four bits of a supplied IP address will be matched.The last five bits of a supplied IP address will be ignored.The first 28 bits of a supplied IP address will be matched.12How will a router handle static routing differently if Cisco Express Forwarding is disabled?It will not perform recursive lookups.Static routes that use an exit interface will be unnecessary.Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies.Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.13Fill in the blank.Using router-on-a-stick inter-VLAN routing, how many subinterfaces have to be configured to support 10 VLANs?1014Refer to the exhibit. The student on the H1 computer continues to launch an extended ping with expanded packets at the student on the H2 computer. The school network administrator wants to stop this behavior, but still allow both students access toweb-based computer assignments. What would be the best plan for the network administrator?Apply an outbound standard ACL on R2 S0/0/1.Apply an inbound standard ACL on R1 Gi0/0.Apply an outbound extended ACL on R1 S0/0/1.Apply an inbound extended ACL on R1 Gi0/0.Apply an inbound extended ACL on R2 Gi0/1.15What is an advantage of using dynamic routing protocols instead of static routing?fewer router resource overhead requirementsability to actively search for new routes if the current path becomes unavailable more secure in controlling routing updateseasier to implement16A network administrator is testing IPv6 connectivity to a web server. The network administrator does not want any other host to connect to the web server except for the one test computer. Which type of IPv6 ACL could be used for this situation?an extended, named, or numbered ACLonly a named ACLonly an extended ACLonly a standard ACLa standard or extended ACL17Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?Source MAC: 00E0.FE91.7799Source IP: 192.168.1.1Source MAC: 00E0.FE10.17A3Source IP: 192.168.1.1Source MAC: 00E0.FE91.7799Source IP: 10.1.1.1Source MAC: 00E0.FE10.17A3Source IP: 10.1.1.10Source MAC: 00E0.FE91.7799Source IP: 10.1.1.1018How many classful networks are summarized by the static summary route ip route192.168.32.0 255.255.248.0 S0/0/0?4281619.A small company has a web server in the office that is accessible from the Internet. The IP address 192.168.10.15 is assigned to the web server. The network administrator is configuring the router so that external clients can access the web server over the Internet. Which item is required in the NAT configuration?an ACL to identify the local IPv4 address of the web serverthe ip nat inside source command to link the inside local and inside global addressesthe keyword overload for the ip nat inside source commandan IPv4 address pool20What is a result of connecting two or more switches together?The number of collision domains is reduced.The size of the broadcast domain is increased.The number of broadcast domains is increased.The size of the collision domain is increased.21Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?The DNS server and the default gateway router should be in the same subnet.The default-router and dns-server commands need to be configured with subnet masks. The IP address of the DNS server is not contained in the excluded address list.The IP address of the default gateway router is not contained in the excluded address list.22When routing a large number of VLANs, what are two disadvantages of using therouter-on-a-stick inter-VLAN routing method rather than the multilayer switch inter-VLAN routing method? (Choose two.)Multiple SVIs are needed.Multiple subinterfaces may impact the traffic flow speed.Router-on-a-stick requires subinterfaces to be configured on the same subnets.Router-on-a-stick requires multiple physical interfaces on a router.A dedicated router is required.23How is the router ID for an OSPFv3 router determined?the highest EUI-64 ID on an active interfacethe highest IPv4 address on an active interfacethe highest IPv6 address on an active interfacethe lowest MAC address on an active interface24What does an OSPF area contain?routers whose SPF trees are identicalrouters that have the same link-state information in their LSDBsrouters that share the same router IDrouters that share the same process ID25Which command will verify the status of both the physical and the virtual interfaces on a switch?show ip interface briefshow running-configshow vlanshow startup-config26Which switching method provides error-free data transmission?fast-forwardintegrity-checkingstore-and-forwardfragment-free27What is associated with link-state routing protocols?split horizonshortest-path first calculationslow processor overheadrouting loopspoison reverse28Refer to the exhibit. Which would be chosen as the router ID of R2? 2001:DB8:CAFE:A001::/642001:DB8:CAFE:2::/64The router ID has to be manually configured.LLA: FE80::229Place the options in the following order: Step 3– target left blank –Step 4Step 2Step 130Refer to the exhibit. A network administrator is investigating a lag in network performance and issues the show interfaces fastethernet 0/0 command. Based on the output that is displayed, what two items should the administrator check next? (Choose two.)duplex settingscable lengthselectrical interferenceincorrect cable typesdamaged cable termination31The PT initialization was skipped. You will not be able to view the PT activity.Open the PT activity. Perform the tasks in the activity instructions and then answer the question.To verify that the SVI is configured correctly, answer this question: Which ping command completed successfully?ping 192.168.25.7ping 192.168.25.10ping 192.168.25.9ping 192.168.25.832An administrator created and applied an outbound Telnet extended ACL on a router to prevent router-initiated Telnet sessions. What is a consequence of this configuration?The ACL will work as desired as long as it is applied to the correct interface.The ACL will not work as desired because an outbound ACL cannot blockrouter-initiated traffic.The ACL will work as long as it will be applied to all vty lines.The ACL will not work because only standard ACLs can be applied to vty lines.33What is the effect of entering the network 192.168.10.1 0.0.0.0 area 0 command in router configuration mode?OSPF advertisements will include the specific IPv4 address 192.168.10.1.OSPF advertisements will include the network on the interface with the IPv4 address 192.168.10.1.This command will have no effect because it uses a quad zero wildcard mask.The interface with the IPv4 address 192.168.10.1 will be a passive interface.34Which type of static route typically uses the distance parameter in the ip route global configuration command?standard static routefloating static routedefault static routesummary static route35Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?ip dhcp snoopingswitchport port-security mac-address stickyshutdownswitchport port-security violation shutdownswitchport port-security mac-address sticky mac-address36What is a disadvantage when both sides of a communication use PAT?The flexibility of connections to the Internet is reduced.Host IPv4 addressing is complicated.The security of the communication is negatively impacted.End-to-end IPv4 traceability is lost.37What is meant by the term “best match” when applied to the routing table lookup process?network matchsupernet matchexact matchlongest match38Place the options in the following order:hierarchicalmodularityresiliency– not scored –flexibility39Fill in the blank. Do not use abbreviations.The duplex full command configures a switch port to operate in the full-duplex mode. 40An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?These VLANs are default VLANs that cannot be removed.Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.These VLANs cannot be deleted unless the switch is in VTP client mode.41An administrator attempts to change the router ID on a router that is running OSPFv3 by changing the IPv4 address on the router loopback interface. Once the IPv4 address is changed, the administrator notes that the router ID did not change. What two actions can the administrator take so that the router will use the new IPv4 address as the router ID? (Choose two.)Copy the running configuration to NVRAM.Reboot the router.Disable and re-enable IPv4 routing.Shut down and re-enable the loopback interface.Clear the IPv6 OSPF process.42Refer to the exhibit. In the routing table entry, what is the administrative distance?2412212043Which two pieces of information are required when creating a standard access control list? (Choose two.)subnet mask and wildcard maskaccess list number between 100 and 199access list number between 1 and 99destination address and wildcard masksource address and wildcard mask44Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?The access interfaces do not have IP addresses and each should be configured with an IP address.The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.45In a routing table which route can never be an ultimate route?parent routechild routelevel two routelevel one route46In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?DHCP snoopingMAC address floodingCAM table overflowDHCP starvation47Refer to the exhibit. What address will be used as the router ID for the OSPFv3 process?10.1.1.12001:DB8:ACAD:1::12001:DB8:CAFE:1::1192.168.1.11.1.1.148Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The administrator tries to ping a server on the Internet from PC-A and collects the debugs that are shown in the exhibit. Based on this output, what is most likely the cause of the problem?The NAT source access list matches the wrong address range.The inside and outside NAT interfaces have been configured backwards.The inside global address is not on the same subnet as the ISP.The address on Fa0/0 should be 64.100.0.1.49A college student is studying for the Cisco CCENT certification and is visualizing extended access lists. Which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (Choose three.)wwwudptcpicmpftptelnet50When does a switch use frame filtering?The destination MAC address is for a host on a different network segment from the source of the traffic.The destination MAC address is for a host with no entry in the MAC address table.The destination MAC address is for a host on a network supported by a different router.The destination MAC address is for a host on the same network segment as the source of the traffic.。

CCNA 3 Final Exam

CCNA 3 Final Exam

1. Which address is used by an IPv6 EIGRP router as thesource for hello messages?o the 32-bit router IDo the IPv6 global unicast address that is configured on the interfaceo the all-EIGRP-routers multicast addresso the interface IPv6 link-local address2. Which two statements are correct about EIGRPacknowledgment packets? (Choose two.)o The packets are sent in response to hello packets.o The packets are used to discover neighbors that are connected on an interface.o The packets are sent as unicast.o The packets require confirmation.o The packets are unreliable.3. When are EIGRP update packets sent?o only when necessaryo when learned routes age outo every 5 seconds via multicasto every 30 seconds via broadcast4. Refer to the exhibit. Which two conclusions can be derivedfrom the output? (Choose two.)o There is one feasible successor to network 192.168.1.8/30.o The network 192.168.10.8/30 can be reached through 192.168.11.1.o The reported distance to network 192.168.1.0/24 is 41024256.o The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.o Router R1 has two successors to the 172.16.3.0/24 network.5. Refer to the exhibit. Which route or routes will beadvertised to the router ISP if autosummarization isenabled?o10.0.0.0/8o10.1.0.0/16o10.1.0.0/28o10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 10.1.4.0/286. Refer to the exhibit. What can be concluded about network192.168.1.0 in the R2 routing table?o This network has been learned from an internal router within the same area.o This network was learned through summary LSAs from an ABR.o This network is directly connected to the interface GigabitEthernet0/0.o This network should be used to forward traffic toward external networks.7. Refer to the exhibit. A company has migrated from singlearea OSPF to multiarea. However, none of the users fromnetwork 192.168.1.0/24 in the new area can be reached by anyone in the Branch1 office. From the output in theexhibit, what is the problem?o There are no interarea routes in the routing table for network 192.168.1.0.o The OSPF routing process is inactive.o The link to the new area is down.o The router has not established any adjacencies with other OSPF routers.8. When does an OSPF router become an ABR?o when the router has interfaces in different areaso when the router is configured as an ABR by the network administratoro when the router has the highest router IDo when the router has an OSPF priority of 09. What is a difference between the Cisco IOS 12 and IOS 15versions?o The IOS 12 version has commands that are not available in the 15 version.o The IOS version 15 license key is unique to each device, whereas the IOS version 12 license key is not device specific.o Every Cisco ISR G2 platform router includes a universal image in the IOS12 versions, but not the IOS 15 versions.o IOS version 12.4(20)T1 is a mainline release, whereas IOS version15.1(1)T1 is a new feature release.10. A network administrator issues the command R1(config)#license boot module c1900 technology-package securityk9 on a router. What is the effect of this command?o The IOS will prompt the user to reboot the router.o The features in the Security package are available immediately.o The IOS will prompt the user to provide a UDI in order to activate the license.o The Evaluation Right-To-Use license for the Security technology package is activated.11. A network administrator is troubleshooting slowperformance in a Layer 2 switched network. Uponexamining the IP header, the administrator notices that the TTL value is not decreasing. Why is the TTL value notdecreasing?o This is the normal behavior for a Layer 2 network.o The MAC address table is full.o The VLAN database is corrupt.o The inbound interface is set for half duplex.12. A network administrator enters the spanning-tree portfastbpduguard default command. What is the result of thiscommand being issued on a Cisco switch?o Any switch port will be error-disabled if it receives a BPDU.o Any trunk ports will be allowed to connect to the network immediately, rather than waiting to converge.o Any switch port that has been configured with PortFast will be error-disabled if it receives a BPDU.o Any switch port that receives a BPDU will ignore the BPDU message.13. An STP instance has failed and frames are flooding thenetwork. What action should be taken by the networkadministrator?o A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network.o Spanning tree should be disabled for that STP instance until the problem is located.o Broadcast traffic should be investigated and eliminated from the network.o Redundant links should be physically removed until the STP instance is repaired.14. A network engineer is configuring a LAN with a redundantfirst hop to make better use of the available networkresources. Which protocol should the engineerimplement?o FHRPo GLBPo HSRPo VRRP15. Which mode configuration setting would allow formationof an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?o SW1: on SW2: ono SW1: desirable SW2: desirableo SW1: auto SW2: auto trunking enabled on both switcheso SW1: auto SW2: auto PortFast enabled on both switcheso SW1: passive SW2: active16. What are two requirements to be able to configure anEtherChannel between two switches? (Choose two.)o The interfaces that are involved need to be contiguous on the switch.o All the interfaces need to work at the same speed.o All the interfaces need to be working in the same duplex mode.o All interfaces need to be assigned to different VLANs.o Different allowed ranges of VLANs must exist on each end.17. When should EIGRP automatic summarization be turnedoff?o when a router has not discovered a neighbor within three minuteso when a router has more than three active interfaceso when a network contains discontiguous network addresseso when a router has less than five active interfaceso when a network addressing scheme uses VLSM18. What two conditions have to be met in order to form acluster that includes 5 access points? (Choose two.)o Clustering mode must be enabled on the APs.o At least two controllers are needed to form the cluster.o The APs have to be connected on the same network segment.o The APs must all be configured to use different radio modes.o The APs must use different cluster names.19. A network engineer is troubleshooting a newly deployedwireless network that is using the latest 802.11 standards.When users access high bandwidth services such asstreaming video, the wireless network performance ispoor. To improve performance the network engineerdecides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services.Why might this solution improve the wireless networkperformance for that type of service?o The 5 GHz band has a greater range and is therefore likely to be interference-free.o Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.o The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.o The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.20. What method of wireless authentication is dependent ona RADIUS authentication server?o WEPo WPA Personalo WPA2 Personalo WPA2 Enterprise21. Refer to the exhibit. What two pieces of information couldbe determined by a network administrator from thisoutput? (Choose two.)o R1 is participating in multiarea OSPF.o The OSPF process number that is being used is 0.o Interface Fa0/1 is not participating in the OSPF process.o R1 is the distribution point for the routers that are attached to the 10.0.0.4 network.o The metric that will be installed in the routing table for the 10.0.0.0 route will be 65 (64+1).22. A remote classroom can successfully access video-intensive streaming lectures via wired computers.However, when an 802.11n wireless access point isinstalled and used with 25 wireless laptops to access the same lectures, poor audio and video quality isexperienced. Which wireless solution would improve the performance for the laptops?o Decrease the power of the wireless transmitter.o Add another access point.o Upgrade the access point to one that can route.o Adjust the wireless NICs in the laptops to operate at 10GHz to be compatible with 802.11n.23. What are the two methods that are used by a wireless NICto discover an AP? (Choose two.)o sending an ARP requesto delivering a broadcast frameo transmitting a probe requesto initiating a three-way handshakeo receiving a broadcast beacon frame24. When will a router that is running EIGRP put a destinationnetwork in the active state?o when the EIGRP domain is convergedo when there is outgoing traffic toward the destination networko when there is an EIGRP message from the successor of the destination networko when the connection to the successor of the destination network fails and there is no feasible successor available25. Which wireless network topology is being configured by atechnician who is installing a keyboard, a mouse, andheadphones, each of which uses Bluetooth?o ad hoc modeo hotspoto infrastructure modeo mixed mode26. What is a wireless modulation technique used by 802.11WLAN standards that can implement MIMO?o BSSo DSSSo FHSSo OFDM27. Refer to the exhibit. A network administrator issues theshow ipv6 eigrp neighbors command. Which conclusion can be drawn based on the output?o The link-local addresses of neighbor routers interfaces are configured manually.o R1 has two neighbors. They connect to R1 through their S0/0/0 and S0/0/1 interfaces.o The neighbor with the link-local address FE80::5 is the first EIGRP neighbor that is learned by R1.o If R1 does not receive a hello packet from the neighbor with the link-local address FE80::5 in 2 seconds, it will declare the neighbor router is down.28. A network engineer is troubleshooting a single-areaOSPFv3 implementation across routers R1, R2, and R3.During the verification of the implementation, it is noted that the routing tables on R1 and R2 do not include theentry for a remote LAN on R3. Examination of R3 shows the following:1.that all interfaces have correct addressing2.that the routing process has been globally configured3.that correct router adjacencies have formedWhat additional action taken on R3 could solve the problem?o Enable the OSPFv3 routing process on the interface connected to the remote LAN.o Use the network command to configure the LAN network under the global routing process.o Force DR/BDR elections to occur where required.o Restart the OPSFv3 routing process.29. A network administrator in a branch office is configuringEIGRP authentication between the branch office router and the headquarters office router. Which security credential is needed for the authentication process?o a randomly generated key with the crypto key generate rsa commando the username and password configured on the headquarters office router o the hostname of the headquarters office router and a common passwordo a common key configured with the key-string command inside a key chain30. For troubleshooting missing EIGRP routes on a router,what three types of information can be collected using the show ip protocols command? (Choose three.)o any interfaces that are enabled for EIGRP authenticationo any interfaces on the router that are configured as passiveo the IP addresses that are configured on adjacent routerso any ACLs that are affecting the EIGRP routing processo networks that are unadvertised by the EIGRP routing protocolo the local interface that is used to establish an adjacency with EIGRP neighbors31. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commando There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.32. A network engineer is implementing security on allcompany routers. Which two commands must be issued to force authentication via the password 1C34dE for allOSPF-enabled interfaces in the backbone area of thecompany network? (Choose two.)o ip ospf message-digest-key 1 md5 1C34dEo area 1 authentication message-digesto username OSPF password 1C34dEo enable password 1C34dEo area 0 authentication message-digest33. Which port role is assigned to the switch port that has thelowest cost to reach the root bridge?o root porto non-designated porto designated porto disabled port34. Refer to the exhibit. A network administrator is attemptingto upgrade the IOS system image on a Cisco 2901 router.After the new image has been downloaded and copied to the TFTP server, what command should be issued on the router before the IOS system image is upgraded on theo dir flash:o ping 10.10.10.1o copy tftp: flash0:o ping 10.10.10.235. A set of switches is being connected in a LAN topology.Which STP bridge priority value will make it least likely for the switch to be selected as the root?o4096o32768o61440o6553536. What are two features of OSPF interarea routesummarization? (Choose two.)o ASBRs perform all OSPF summarization.o Routes within an area are summarized by the ABR.o ABRs advertise the summarized routes into the backbone.o Type 3 and type 5 LSAs are used to propagate summarized routes by default.o Route summarization results in high network traffic and router overhead.37. Refer to the exhibit. What are two results of issuing thedisplayed commands on S1, S2, and S3? (Choose two.)o S1 will automatically adjust the priority to be the lowest.o S1 will automatically adjust the priority to be the highest.o S3 can be elected as a secondary bridge.o S2 can become root bridge if S3 fails.o S2 can become root bridge if S1 fails.38. Refer to the exhibit. Which two conclusions can be drawnfrom the output? (Choose two.)o The EtherChannel is down.o The port channel ID is 2.o The port channel is a Layer 3 channel.o The bundle is fully operational.o The load-balancing method used is source port to destination port. 39. Refer to the exhibit. Interface FastEthernet 0/1 on S1 isconnected to Interface FastEthernet 0/1 on S2, andInterface FastEthernet 0/2 on S1 is connected to Interface FastEthernet 0/2 on S2. What are two errors in the presentEtherChannel configurations? (Choose two.)o The trunk mode is not allowed for EtherChannel bundles.o Two auto modes cannot form a bundle.o Desirable mode is not compatible with on mode.o The channel group is inconsistent.o The interface port channel ID should be different in both switches. 40. Which technology is an open protocol standard thatallows switches to automatically bundle physical ports into a single logical link?o Multilink PPPo DTPo LACPo PAgP41. A network administrator has configured an EtherChannelbetween two switches that are connected via four trunk links. If the physical interface for one of the trunk linkschanges to a down state, what happens to theEtherChannel?o The EtherChannel will transition to a down state.o Spanning Tree Protocol will recalculate the remaining trunk links.o The EtherChannel will remain functional.o Spanning Tree Protocol will transition the failed physical interface into forwarding mode.42. Refer to the exhibit. Based on the command outputshown, what is the status of the EtherChannel?o The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports.o The EtherChannel is down as evidenced by the protocol field being empty.o The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports.o The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.43. Refer to the exhibit. If router B is to be configured forEIGRP AS 100, which configuration must be entered?o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)#network 192.168.10.1280.0.0.63o B(config-router)# network 192.168.10.4 255.255.255.248 B(config-router)# network 192.168.10.8 255.255.255.248 B(config-router)#network192.168.10.128 255.255.255.192o B(config-router)# network 192.168.10.0 255.255.255.0o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)# network 192.168.10.640.0.0.63 B(config-router)# network 192.168.10.128 0.0.0.63 B(config-router)# network 192.168.10.192 0.0.0.63o B(config-router)# network 192.168.10.0 0.0.0.25544. Refer to the exhibit. When the show ip ospf neighborcommand is given from the R1# prompt, no output isshown. However, when the show ip interface briefcommand is given, all interfaces are showing up and up.What is the most likely problem?o R2 has not brought the S0/0/1 interface up yet.o R1 or R2 does not have a loopback interface that is configured yet.o The ISP has not configured a static route for the ABC Company yet.o R1 or R2 does not have a network statement for the 172.16.100.0 network.o R1 has not sent a default route down to R2 by using the default-information originate command.45. Refer to the exhibit. Which destination MAC address isused when frames are sent from the workstation to thedefault gateway?o MAC address of the forwarding routero MAC addresses of both the forwarding and standby routerso MAC address of the standby routero MAC address of the virtual router46. If a company wants to upgrade a Cisco 2800 router fromIOS 12.4T, what IOS should be recommended for a stable router platform?o12.5To13.1To14.0o15.1M47. What is the purpose of the Cisco PAK?o It is a key for enabling an IOS feature set.o It is a proprietary encryption algorithm.o It is a compression file type used when installing IOS 15 or an IOS upgrade.o It is a way to compress an existing IOS so that a newer IOS version can be co-installed on a router.48. What are two reasons to implement passive interfaces inthe EIGRP configuration of a Cisco router? (Choose two.)o to provide increased network securityo to shut down unused interfaceso to avoid unnecessary update traffico to mitigate attacks coming from the interfaceso to exclude interfaces from load balancing49. Fill in the blank.EIGRP keeps feasible successor routes inthe topology table.50. Fill in the blank.The backbone area interconnects with all other OSPF area types.51. Fill in the blank. Use the acronym.Which encryptionprotocol is used by the WPA2 shared key authentication technique? AES52. Match each OSPF LSA description with its type. (Not alloptions are used.)53. Match the CLI command prompt with the command orresponse entered when backing up Release 15 IOS imageto an IPv6 TFTP server. (Not all options are used.)54. Which characteristic would most influence a networkdesign engineer to select a multilayer switch over a Layer2 switch?o ability to build a routing tableo ability to aggregate multiple ports for maximum data throughputo ability to provide power to directly-attached devices and the switch itself o ability to have multiple forwarding paths through the switched network based on VLAN number(s)55. A network designer is considering whether to implementa switch block on the company network. What is theprimary advantage of deploying a switch block?o A single core router provides all the routing between VLANs.o The failure of a switch block will not impact all end users.o This is a security feature that is available on all new Catalyst switches.o This is network application software that prevents the failure of a singleo network device.56. Which action should be taken when planning forredundancy on a hierarchical network design?o immediately replace a non-functioning module, service or device on a networko continually purchase backup equipment for the networko implement STP portfast between the switches on the networko add alternate physical paths for data to traverse the network57. Which technological factor determines the impact of afailure domain?o the number of layers of the hierarchical networko the number of users on the access layero the role of the malfunctioning deviceo the forwarding rate of the switches used on the access layer58. What are three access layer switch features that areconsidered when designing a network? (Choose three.)o broadcast traffic containmento failover capabilityo forwarding rateo port densityo Power over Etherneto speed of convergence59. What are two requirements when using out-of-bandconfiguration of a Cisco IOS network device? (Choosetwo.)o HTTP access to the deviceo a terminal emulation cliento Telnet or SSH access to the deviceo a direct connection to the console or AUX porto a connection to an operational network interface on the device60. In a large enterprise network, which two functions areperformed by routers at the distribution layer? (Choosetwo.)o connect remote networkso provide Power over Ethernet to deviceso connect users to the networko provide data traffic securityo provide a high-speed network backboneUpdated 05 April 20151. Refer to the exhibit. Which switch will be the root bridgeafter the election process is complete?CCNA3 Final Exam updated 001o S1o S2o S3o S42. Refer to the exhibit. What are the possible port roles forports A, B, C, and D in this RSTP-enabled network?CCNA3 Final Exam updated 002o alternate, root, designated, rooto designated, root, alternate, rooto alternate, designated, root, rooto designated, alternate, root, root3. Refer to the exhibit. A network administrator is configuringPVST+ for the three switches. What will be a result ofentering these commands?CCNA3 Final Exam updated 003o S1 will set the priority value for VLAN 10 to 0.o S2 will set the priority value for VLAN 10 to 24576.o S3 will set the priority value for VLAN 30 to 8192.o S1 will set the priority value for VLAN 20 to 24596.4. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement is a feature that is associated with GLBP?o GLBP allows load balancing between routers.o It is nonproprietary.o It uses a virtual router master.o It works together with VRRP.5. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement describes a feature that isassociated with HSRP?o HSRP uses active and standby routers.o It uses ICMP messages in order to assign the default gateway to hosts.o It allows load balancing between a group of redundant routers.o HSRP is nonproprietary.6. Which function is provided by EtherChannel?o spreading traffic across multiple physical WAN linkso dividing the bandwidth of a single link into separate time slotso enabling traffic from multiple VLANs to travel over a single Layer 2 linko creating one logical link by using multiple physical links between two LAN switches7. Which two channel group modes would place an interfacein a negotiating state using PAgP? (Choose two.)o ono desirableo activeo autoo passive8. At a local college, students are allowed to connect to thewireless network without using a password. Which mode is the access point using?o networko openo passiveo shared-key9. Which wireless encryption method is the most secure?o WPAo WEPo WPA2 with TKIPo WPA2 with AES10. Users on an IEEE 801.11n network are complaining ofslow speeds. The network administrator checks the APand verifies it is operating properly. What can be done to improve the wireless performance in the network?o Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.o Change the authentication method on the AP.o Switch to an 802.11g AP.o Set the AP to mixed mode.11. What are two methods to make the OSPF routing protocolmore secure? (Choose two.)o Use only OSPFv3.o Use MD5 authentication.o Use the enable secret command.o When feasible, create a VPN tunnel between each OSPF neighbor adjacency.o Use the passive-interface command on LAN interfaces that areconnected only to end-user devices.12. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commandoutput?CCNA3 Final Exam updated 004o There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.13. Which type of OSPF LSA represents an external route andis propagated across the entire OSPF domain?o type 1o type 2o type 3o type 4o type 514. An administrator issues the router eigrp 100 command ona router. What is the number 100 used for?o as the autonomous system numbero as the number of neighbors supported by this routero as the length of time this router will wait to hear hello packets from a neighboro as the maximum bandwidth of the fastest interface on the router15. A network administrator wants to verify the default delayvalues for the interfaces on an EIGRP-enabled router.Which command will display these values?o show ip protocolso show running-configo show interfaceso show ip route16. Which two parameters does EIGRP use by default tocalculate the best path? (Choose two.)o delayo MTUo reliabilityo transmit and receive loado bandwidth17. By default, how many equal cost routes to the samedestination can be installed in the routing table of a Cisco router?o 2o4o16o3218. When a Cisco router is configured with fast-switching,how are packets distributed over equal-cost paths?o on a per-packet basiso on a per-interface basiso on a per-path-load basiso on a per-destination basis19. Refer to the exhibit. Router CiscoVille has been partiallyconfigured for EIGRP authentication. What is missing that would allow successful authentication between EIGRPneighbors?。

ccna考试题库最新版

ccna考试题库最新版

ccna考试题库最新版CCNA(Cisco Certified Network Associate)认证是全球范围内最受欢迎的网络工程师认证之一,具备CCNA认证可以证明一个人在建立、规划、运行、安装和配置中等规模的局域网和广域网方面的专业知识。

为了帮助广大考生顺利通过CCNA考试,不断更新的CCNA考试题库至关重要。

以下是最新版本的CCNA考试题库,希望对考生们有所帮助。

第一部分:网络基础知识1. 什么是OSI七层模型?简要介绍每一层的功能。

2. TCP和UDP之间有哪些区别?请分别举例说明。

3. 什么是IP地址?IP地址的类型有哪些?请列举并简要介绍各自的特点。

4. 什么是子网掩码?为什么在网络中使用子网掩码?5. 简述常见的网络设备有哪些,以及各自的功能与作用。

第二部分:路由和交换技术1. 路由器和交换机之间有何区别?请进行比较并指出各自的优势和劣势。

2. 什么是VLAN?VLAN的作用及在网络中的应用场景是什么?3. OSPF和EIGRP是两种常见的路由协议,请比较它们的特点并举例说明。

4. 请解释静态路由和动态路由的概念以及在网络中的应用。

5. 交换机在网络中扮演什么角色?交换机的MAC地址表是如何工作的?第三部分:网络安全和管理1. 网络安全的重要性是什么?请列举几种常见的网络安全威胁并介绍应对策略。

2. 什么是ACL(访问控制列表)?ACL的作用是什么?请给出一个ACL的配置示例。

3. VPN是什么?VPN的工作原理及在企业网络中的应用。

4. SNMP是网络管理中常用的协议,它的作用是什么?请解释SNMP中的几个重要概念。

5. 如何保护无线网络的安全?请列举几种方法。

第四部分:WAN技术1. 什么是WAN?WAN的主要特点是什么?2. PPP协议和HDLC协议分别是什么?请比较它们的异同。

3. 什么是Frame Relay?Frame Relay的工作原理及在WAN中的应用。

4. 请解释T1和E1的概念,以及它们在传输速率和应用方面的差异。

12-CCNA-R&S-3-Network Basics (Version 5.0) - NB Chapter 1 Exam

12-CCNA-R&S-3-Network Basics (Version 5.0) - NB Chapter 1 Exam

∙Assessment Results∙Item Feedback ReportNetwork Basics (Version 5.0) - NB Chapter 1 ExamBelow is the feedback on items for which you did not receive full credit. Some interactive items may notdisplay your response.1 A company wants to deploy a technology that will allow its employees to speak toshare text and graphics, and edit documents together, all in real-time. What type o should the company deploy?Correct Response YourResponsewikisweblogspodcastssocial mediacollaboration applicationsWikis allow users to edit shared documents, but do not allow the users to speak to each other, or share text and graphic podcasts are methods of publishing information to the internet, but do not offer any real-time collaboration features. Soc users to share content with other users, but does not give them the ability to edit the documents in real time or speak dirThis item references content from the following areas:Network Basics∙ 1.1.1 Interconnecting our Lives2 What is an example of an internal factor that can affect the quality of network comCorrect Response YourResponsethe quality of the pathway between the sender and the recipientthe number of different types of messages that are being transmitted on the communication network the number of times the message has to be redirected or readdressedthe size of the message that is being sentInternal quality of service (QoS) factors are those related to the nature of the message itself, rather than external factors wh complexity of the network. Because large messages are often delayed or interrupted at various points in the network, the s a direct influence on the quality of communication.This item references content from the following areas:Network Basics∙ 1.1.2 Supporting Communication3 What is an advantage of having a converged network?Correct Response Your ResponseSeparate networks are no longer required to support voice, video, and data traffic.Separate networks are required for each traffic type, but they are all managed by a single administrationVoice, video, and data traffic receive the same quality of service priority level.The network will be faster and more secure.Each service has its own set of rules and standards to ensure successful communication, but the packe across a single media.On a converged network, the flow of voice, video, and data traveling over the same network eliminates the need to create a networks. With convergence, there is one common network infrastructure for all types of traffic.This item references content from the following areas:Network Basics∙ 1.2.1 Converged Networks4 Which function is used to ensure data integrity on a network?Correct Response YourResponseencrypting the datausing checksum mechanismsconfiguring network firewallsimplementing antivirus softwareData integrity is having the assurance that the data has not be changed as it travels from the source to the destination. Has run on the data before it is sent, then verified at the destination to ensure that the message has not been altered. Antivirus firewalls help to ensure availability of network resources, and encrypting data helps ensure the confidentiality of the data.This item references content from the following areas:Network Basics∙ 1.2.2 Reliable Network5 Which expression accurately defines the term congestion?Correct Response YourResponsea method of limiting the impact of a hardware or software failure on the networka measure of the data carrying capacity of the networka state where the demand on the network resources exceeds the available capacitya set of techniques to manage the utilization of network resourcesA method of limiting the impact of a hardware or software failure is fault tolerance. A measure of the data carrying capacitytechniques to manage the utilization of network resources is QoS.This item references content from the following areas:Network Basics∙ 1.2.2 Reliable Network6 What does the use of redundant network components supply to a network?Correct Response YourResponsescalabilitymanageabilitycompatibilityreliabilityThis item references content from the following areas:Network Basics∙ 1.2.2 Reliable Network7 What are two characteristics of a scalable network? (Choose two.)Correct Response YourResponseeasily overloaded with increased trafficgrows in size without impacting existing userslimits the impact of failure of network devices and linkscontains modular devices that allow for expansionoffers a limited number of applicationsThis item references content from the following areas:Network Basics∙ 1.2.2 Reliable Network8 What is a characteristic of circuit-switched networks?Correct Response Your ResponseIf all circuits are busy, a new call cannot be placed.If a circuit fails, the call will be forwarded on a new path.Circuit-switched networks can dynamically learn and use redundant circuits.A single message can be broken into multiple message blocks that are transmitted through multiple circCircuit-switched networks have a finite capacity to create new circuits. It is possible to occasionally get a message that all c call cannot be placed. If a circuit fails, a new circuit has to be created to forward the message to its destination. All parts of transmitted using only one circuit.This item references content from the following areas:Network Basics∙ 1.2.2 Reliable Network9 Which device performs the function of determining the path that messages shouldinternetworks?Correct Response Your Responsea routera firewalla web servera DSL modemA router is used to determine the path that the messages should take through the network. A firewall is used to filter incomiA DSL modem is used to provide Internet connection for a home or an organization.This item references content from the following areas:Network Basics∙ 1.3.1 Components of a Network10Refer to the e set of devices contains only intermediary devices?Correct Response Your ResponseA, B, D, GA, B, E, FC, D, G, IG, H, I, JRouters and switches are intermediary devices. End devices consist of PCs, laptops, and servers. They also include printe security cameras, and hand-held devices.This item references content from the following areas:Network Basics1.3.1 Components of a Network11 What two criteria are used to help select network media? (Choose two.)Correct Response YourResponsethe types of data that need to be prioritizedthe cost of the end devices utilized in the networkthe distance the media can successfully carry a signalthe number of intermediary devices installed in the networkthe environment where the media is to be installedCriteria for choosing a network media are the distance the media can successfully carry a signal, the environment in which installed, the amount of data and the speed at which it must be transmitted, and the cost of the media and installation.This item references content from the following areas:Network Basics∙ 1.3.1 Components of a Network12 What are two functions of intermediary devices on a network? (Choose two.)Correct Response YourResponseThey are the primary source and providers of information and services to end devices.They run applications that support collaboration for business.They form the interface between the human network and the underlying communication network.They direct data along alternate pathways when there is a link failure.They filter the flow of data, based on security settings.Processes running on the intermediary network devices perform functions like regenerating and retransmitting data signals information about what pathways exist through the network and internetwork, directing data along alternate pathways when and permitting or denying the flow of data, based on security settings.This item references content from the following areas:Network Basics∙ 1.3.1 Components of a Network13 What type of network must a home user access in order to do online shopping?Correct Response Your Responsean intranetthe Internetan extraneta local area networkHome users will go online shopping over the Internet because online vendors are accessed through the Internet. An intrane area network for internal use only. An extranet is a network for external partners to access certain resources inside an orga does not necessarily need a LAN to access the Internet. For example, a PC connects directly to the ISP through a modem.This item references content from the following areas:Network Basics∙ 1.3.3 The Internet14 A home user receives voice and data on a high-bandwidth line by connecting to thtelephone cable. What type of connection to the Internet does the user have?Correct Response Your ResponsesatellitecableDSLMetro EthernetDSL provides a high bandwidth connection to the Internet, running over a telephone line that is split into three channels: vo received without disconnecting from the Internet), a faster download channel, and a moderately fast upload channel.This item references content from the following areas:Network Basics∙ 1.3.4 Connecting to the Internet15 A teacher living on a farm very far from the city needs a connection to the Internetconnection is not available in the region where the farm is located. What connectio be the best option in this case?Correct Response Your Responsesatellitedial-up telephoneDSLcableSatellite service can provide a connection when a wired solution is not available.This item references content from the following areas:Network Basics∙ 1.3.4 Connecting to the Internet16 Which two Internet solutions provide an always-on, high-bandwidth connection toLAN? (Choose two.)Correct Response Your ResponsecellularDSLsatellitecabledial-up telephoneCable and DSL both provide high bandwidth, an always on connection, and an Ethernet connection to a host computer or LThis item references content from the following areas:Network Basics∙ 1.3.4 Connecting to the Internet17 What term describes an Internet connection that provides T1/E1 or T3/E3 speedsdedicated telephone circuit from the service provider to the customer premises?Correct Response YourResponsemetro EthernetDSLdial-upleased linecableDSL, while a technology that runs on the phone line, uses a shared telephone circuit rather than a dedicated one. Likewise generates on-demand connections rather than dedicated telephone circuits. Metro Ethernet and cable technologies do not provide connectivity.This item references content from the following areas:Network Basics∙ 1.3.4 Connecting to the Internet18 Which statement describes a characteristic of cloud computing?Correct Response YourResponseA business can connect directly to the Internet without the use of an ISP.Applications can be accessed over the Internet through a subscription.Devices can connect to the Internet through existing electrical wiring.Investment in new infrastructure is required in order to access the cloud.Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additiona Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than aThis item references content from the following areas:Network Basics∙ 1.4.1 Network Trends19 Which three network tools provide the minimum required security protection for ho(Choose three.)Correct Response YourResponsean intrusion prevention systemantivirus softwareantispyware softwareaccess control listsa firewallpowerline networkingIntrusion prevention systems and access control lists are usually associated with business networks rather than home netwThis item references content from the following areas:Network Basics∙ 1.4.2 Network Security20to access the business network and resources.This item references content from the following areas:Network Basics∙ 1.4.1 Network Trends21 Fill in the blank.This item references content from the following areas:Network Basics∙ 1.3.3 The Internetinterconnects users and end devices in a small geographical area.WLAN is similar to a LAN, but wirelessly interconnects users and end points in a small geographical area.This item references content from the following areas:Network Basics∙ 1.3.2 LANs and WANs23Question as presented:Place the options in the following order:social mediawikipodcastinstant messagingThis item references content from the following areas:Network Basics∙ 1.1.1 Interconnecting our LivesYour response:。

ccna考试试题库

ccna考试试题库

ccna考试试题库CCNA(Cisco Certified Network Associate)考试是思科认证网络专家的初级认证,主要测试考生在网络基础、路由、交换、无线和安全等方面的知识。

以下是一些模拟CCNA考试的试题和答案:1. 什么是子网掩码,它有什么作用?答案:子网掩码是一种IP地址的附加信息,用于指定IP地址中网络部分和主机部分的界限。

它的作用是允许路由器区分IP地址中的网络地址和主机地址,从而实现不同网络之间的路由。

2. 描述静态路由和动态路由的区别。

答案:- 静态路由:由网络管理员手动配置的路由信息,不随网络结构的变化而自动调整。

- 动态路由:由路由器根据网络拓扑的变化自动生成和更新的路由信息。

3. 什么是VLAN,它有什么好处?答案: VLAN(虚拟局域网)是一种在交换机上划分不同网络的技术,即使物理上连接在同一交换机上,也可以属于不同的VLAN。

VLAN的好处包括提高安全性、减少广播域、提高网络管理的灵活性等。

4. 简述TCP和UDP的区别。

答案:- TCP(传输控制协议):提供可靠的、面向连接的传输服务,有流量控制和拥塞控制机制。

- UDP(用户数据报协议):提供不可靠的、无连接的传输服务,适用于对实时性要求高的应用。

5. 什么是DHCP,它的作用是什么?答案: DHCP(动态主机配置协议)是一种网络管理协议,用于自动分配IP地址和其他网络配置信息给网络中的设备。

它的作用是简化网络配置,避免IP地址冲突。

6. 什么是NAT,它在网络中扮演什么角色?答案: NAT(网络地址转换)是一种技术,允许多个设备共享一个公共IP地址与互联网通信。

它在网络中扮演的角色是节省IP地址资源,隐藏内部网络结构。

7. 什么是STP(生成树协议)?答案: STP(生成树协议)是一种网络协议,用于在局域网中防止网络环路的产生。

通过创建一个无环的逻辑拓扑,STP确保网络的稳定性和可靠性。

8. 描述OSPF(开放最短路径优先)协议的工作原理。

CCNA-第二学期期末考试-Final-Exam

CCNA-第二学期期末考试-Final-Exam

CCNA-第二学期期末考试-Final-Exam7请拜见图示。

网络连结有三台路由器:R1 、R2 和 R3 。

图中显示了全部三台路由器的路由。

从该输出能够获得什么结论?R1和R3经过S0/0/0接口相连。

R1 S0/0/0接口的IP 地点为10.1.1.2 。

R2 S0/0/1接口的IP 地点为10.3.3.2 。

R2连结到R3 的 S0/0/1接口。

√D8请拜见图示。

要达成路由器R1与WAN之间的连结,可使用以下哪两种设施?(选择两项。

)CSU/DSU设施调制解调器以太网互换机集线器网桥9请拜见图示。

依据如下图的输出,以下哪两项陈说是正确的?(选择两项。

)全部路由都处于稳固状态。

每条路由都有一个可行后继。

两台路由器之间的串行接口封闭。

EIGRP的管理距离已设置为50 。

R1 上已运转了show ip eigrp topology命令。

10一台使用RIP路由协议的路由器在路由表中存有到某个网络的路由条目。

以后,路由器收到另一条到同一目的网络的路由条目的更新,且与前者比,该路由此更新,路由器会采纳什么操作?路由器会将更新信息附带到路由表中。

路由器会将路由表中到该网络的路由条目标志为无效。

路由器会用新信息替代现有的路由表条目。

路由器会忽视新的更新。

11请拜见图示。

网络管理员将此命令增添到路由器R1 : ip route 192.168.2.0 255.255.255.0 S0/0/0。

增添此命令会产生什么结果?此路由会在网络中自动流传。

发往网络的流量被转发到网络192.168.2.0 。

成立一条静态路由。

全部 C 类网络的流量都被转发到172.16.1.2 。

12请拜见图示。

从突出显示的输出能够获得什么信息?R1 生成路由。

自动总结被禁用。

选 B网络到R1 有一跳的距离。

网络使用的是有类路由协议。

13请拜见图示。

网络管理员从R3 上成功ping通了R1 。

接下来,管理员在R3上运转了show cdp neighbors命令。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CCNA 3 Practice Final v5.0 Exam Answers 2015 (100%)1.Which technological factor determines the impact of a failure domain?∙the number of layers of the hierarchical network∙the number of users on the access layer∙the role of the malfunctioning device∙the forwarding rate of the switches used on the access layerWhich routing protocol is able to scale for large networks and utilizes non-backbone areas forexpansion?∙EIGRP∙BGP∙OSPF∙RIPv2Which model and which two characteristics would be more likely to be considered in purchasing an access layer switch, as compared to buyingswitches that operate at the other layers of theCisco hierarchical design model? (Choose three.) ∙Catalyst 2960∙Catalyst 4500X∙number of ports∙PoE∙EtherChannel∙RSTPWhat are two reasons to install a single 48-port fixed configuration switch, rather than two 24-port fixed configuration switches, in a wiring closet that supports two classrooms? (Choose two.)∙more power provided to each port∙more ports available for end devices∙higher uplink speeds∙reduced power and space requirements∙reduced number of VLANs/broadcast domainsIn the Cisco hierarchical design model, which layer is more likely to have a fixed configuration switch than the other layers?∙distribution∙transport∙internet∙access∙coreWhat are two requirements when using out-of-band configuration of a Cisco IOS network device? (Choose two.)∙HTTP access to the device∙ a terminal emulation client∙Telnet or SSH access to the device∙ a direct connection to the console or AUX port∙ a connection to an operational network interface on the device Which port role is assigned to the switch port that has the lowest cost to reach the root bridge? ∙ root port∙∙non-designated port∙∙ designated port∙∙ disabled portWhat two STP features are incorporated into Rapid PVST+? (Choose two.)∙UplinkFast∙PortFast∙BPDU guard∙BPDU filter∙BackboneFast∙loop guardRefer to the exhibit. A network administrator is verifying the bridge ID and the status of this switchin the STP election. Which statement is correct based on the command output?∙The bridge priority of Switch_2 has been lowered to a predefined value to become the root bridge.∙The bridge priority of Switch_2 has been lowered to a predefined value to become the backup root bridge.∙The STP instance on Switch_2 is failing due to no ports being blocked and all switches believing they are the root.∙The STP instance on Switch_2 is using the default STP priority and the election is based on Switch_2 MAC address.When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)∙disabled∙designated∙root∙alternate∙blockedA network administrator is analyzing first-hop router redundancy protocols. What is a characteristic of VRRPv3?0.VRRPv3 is Cisco proprietary.1.It supports IPv6 and IPv4 addressing.2.It works together with HSRP.3.It allows load balancing between routers.Refer to the exhibit. Which switching technology would allow data to be transmitted over each access layer switch link and prevent the port from being blocked by spanning tree due to the redundant link?∙EtherChannel∙HSRP∙PortFast∙trunkingA network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?∙The EtherChannel will transition to a down state.∙Spanning Tree Protocol will recalculate the remaining trunk links.∙The EtherChannel will remain functional.∙Spanning Tree Protocol will transition the failed physical interface into forwarding mode.What are two advantages of EtherChannel? (Choose two.)∙Configuring the EtherChannel interface provides consistency in the configuration of the physical links.∙Load balancing occurs between links configured as different EtherChannels. ∙EtherChannel uses upgraded physical links to provide increased bandwidth. ∙Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.∙Spanning Tree Protocol ensures redundancy by transitioning failed interfaces in an EtherChannel to a forwarding state.When a range of ports is being configured for EtherChannel, which mode will configure LACP on aport only if the port receives LACP packets from another device?∙active∙auto∙desirable∙passiveWhich two parameters must match on the ports of two switches to create a PAgP EtherChannel between the switches? (Choose two.)∙MAC address∙speed∙VLAN information∙PAgP mode∙port IDWhen EtherChannel is configured, which mode will force an interface into a port channel without exchanging aggregation protocol packets?∙active∙auto∙on∙desirableWhich command will start the process to bundle two physical interfaces to create an EtherChannel group via LACP?∙channel-group 2 mode auto∙interface port-channel 2∙channel-group 1 mode desirable∙interface range GigabitEthernet 0/4 – 5Refer to the exhibit. Based on the command output shown, what is the status of theEtherChannel?∙The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports.∙The EtherChannel is down as evidenced by the protocol field being empty. ∙The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports.∙The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?∙ad hoc∙hotspot∙infrastructure∙mixed modeIn wireless networks what is a disadvantage of using mixed mode on an AP?∙Only 802.11n wireless NICs can attach to the AP.∙Devices must be closer to the AP due to the limited distance range.∙The wireless network operates slower if one device uses an older standard wireless NIC.∙No encryption can be used by the AP or by the wireless NIC that is attached to the AP.When would a network engineer configure an access point with channel bonding?∙when security is an issue∙when more throughput is needed∙when older wireless NICs are being used∙when trunking is enabled between the access point and switch Which method of wireless authentication is currently considered to be the strongest?∙WEP∙WPA∙WPA2∙open∙shared keyWhat is a wireless security mode that requires a RADIUS server to authenticate wireless users?∙enterprise∙personal∙shared key∙WEPA laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)∙Ensure that the wireless NIC is enabled.∙Ensure that the laptop antenna is attached.∙Ensure that the wireless SSID is chosen.∙Ensure that the correct network media is selected.∙Ensure that the NIC is configured for the proper frequency.A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?∙The 5 GHz band has a greater range and is therefore likely to be interference-free.∙Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.∙The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.∙The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.Refer to the exhibit. How did this router learn of the highlighted route in the routing table?∙by entering the router configuration mode command default-information originate∙by entering the global configuration mode command ip route 0.0.0.0 0.0.0.0 interface-type interface-number∙by entering the global configuration mode command ip route 0.0.0.0 0.0.0.0 ip-address∙by receiving an update from another OSPF router that is running another routing protocol∙by receiving an update from another OSPF router that has the default-information originate command configuredRefer to the exhibit. What are two consequences of issuing the displayed commands? (Choose two.)∙The routing update information is protected against being falsified.∙The routing table of R2 will be secured.∙The key is encrypted with the MD5 hashing algorithm.∙OSPF routes will get priority over EIGRP routes going into the routing table.∙The overhead of OSPF information exchange will reduce.What does an OSPF area contain?∙routers that share the same router ID∙routers whose SPF trees are identical∙routers that have the same link-state information in their LSDBs∙routers that share the same process IDRefer to the exhibit. Why are some of the entries marked O IA?∙They correspond to entries that are learned from other areas.∙They correspond to entries that are learned from other routing protocols. ∙They represent summary routes that are internal to the area.∙They are default routes that are learned from other routing protocols.In which mode is the area area-id range address mask command issued when multiarea OSPF summarization is being configured?∙global configuration mode∙router configuration mode∙interface configuration mode of area 0 interfaces∙interface configuration mode of all participating interfacesRefer to the exhibit. What two pieces of information could be determined by a networkadministrator from this output? (Choose two.)∙R1 is participating in multiarea OSPF.∙The OSPF process number that is being used is 0.∙Interface Fa0/1 is not participating in the OSPF process.∙R1 is the distribution point for the routers that are attached to the 10.0.0.4 network.∙The metric that will be installed in the routing table for the 10.0.0.0 route will be 65 (64+1).Which statement describes the Autonomous System number that is used in EIGRP?∙It defines the reliability of the EIGRP routing protocol.∙It identifies the priority of the networks to be included in update packets.∙It is associated with the global Autonomous System number that is assigned by IANA.∙It specifies the EIGRP routing process on a router.What are two reasons to implement passive interfaces in the EIGRP configuration of a Cisco router? (Choose two.)∙to provide increased network security∙to shut down unused interfaces∙to avoid unnecessary update traffic∙to mitigate attacks coming from the interfaces∙to exclude interfaces from load balancingRefer to the exhibit. A network administrator has issued the show ip eigrp neighbors command. What can be concluded from the output?∙There is no incoming EIGRP message at this moment.∙The first EIGRP neighbor R1 learned about has the IP address 10.10.10.2.∙An EIGRP neighbor with IP address 10.10.10.14 is connected to R1 via serial interface 0/1/0.∙If R1 does not receive a Hello packet in 4 seconds from the neighbor with IP 10.10.10.18, it will declare the neighbor is down.Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?∙The EIGRP K values are default values.∙R1 receives routes to the network 192.168.1.0/24 and 10.0.0.0/24.∙The no auto-summary command is not applied for the EIGRP operation. ∙Up to 4 routes of different metric values to the same destination network will be included in the routing table.Refer to the exhibit. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could bethe problem?∙EIGRP does not support VLSM.∙The routers were not configured to monitor neighbor adjacency changes. ∙The default bandwidth was used on the routers.∙An incorrect IP address was configured on a router interface.Which two metric weights are set to one by default when costs in EIGRP are being calculated? (Choose two.)∙k1∙k2∙k3∙k4∙k5∙k6Which command can be issued on a router to display information about the successors and feasible successors for a destination network when EIGRP is used as the routing protocol?∙show ip protocols∙show ip eigrp topology∙show ip eigrp interfaces∙show ip eigrp neighborsRefer to the exhibit. An administrator attempts to configure EIGRP for IPv6 on a router and receives the error message that is shown. Which command must be issued by the administrator before EIGRP for IPv6 can be configured?∙no shutdown∙eigrp router-id 100.100.100.100∙ipv6 unicast-routing∙ipv6 eigrp 100∙ipv6 cefA network administrator is configuring the authentication for EIGRP routing. The administrator enters these commands:R1(config)# key chain THE_KEYR1(config-keychain)# key 1R1(config-keychain-key)# key-string key123What is the next step necessary to enable the authentication for EIGRP routing?∙Configure the priority of authentication algorithms to be used.∙Configure the authentication on all interfaces that are participating in EIGRP.∙Configure an ACL to identify the networks that are participating in EIGRP. ∙Configure the authentication in the router eigrp as-number configuration mode.Refer to the exhibit. Why did R1 and R2 not establish an adjacency?∙The AS number does not match on R1 and R2.∙The automatic summarization is enabled on R1 and R2.∙The IPv4 address of Fa0/0 interface of R1 has a wrong IP address.∙There is no network command for the network 192.168.1.0/24 on R1.A network administrator is troubleshooting the EIGRP routing between two routers, R1 and R2. The problem is found to be that only some, but not all networks attached to R1 are listed in the routing table of router R2. What should the administratorinvestigate on router R1 to determine the cause of the problem?∙Does the AS number match the AS number on R2?∙Does the hello interval setting match the hello interval on R2?∙Do the network commands include all the networks to be advertised?∙Is the interface connected to R2 configured as a passive interface?For troubleshooting missing EIGRP routes on a router, what three types of information can be collected using the show ip protocols command? (Choose three.)∙any interfaces that are enabled for EIGRP authentication∙any interfaces on the router that are configured as passive∙the IP addresses that are configured on adjacent routers∙any ACLs that are affecting the EIGRP routing process∙networks that are unadvertised by the EIGRP routing protocol∙the local interface that is used to establish an adjacency with EIGRP neighborsRefer to the exhibit. The routing table on R2 does not include all networks that are attached to R1. The network administrator verifies that the network statement is configured to include these twonetworks. What is a possible cause of the issue?∙The AS number does not match between R1 and R2.∙The network statements should include the wild card mask.∙The no auto-summary command is missing in the R1 configuration.∙The interfaces that are connected to these two networks are configured as passive interfaces.What are three characteristics of the Cisco IOS Software Release 12.4T train? (Choose three.)∙It requires the activation of a license.∙It has a number of embedded technology packages.∙It is updated with new features and hardware support.∙It is derived from the Cisco IOS Software Release 12.4 Mainline train.∙It has extended maintenance new feature releases approximately every 16 to 20 months.∙It receives regular software fixes that are synchronized with the 12.4 Mainline train.If a company wants to upgrade a Cisco 2800 router from IOS 12.4T, what IOS should be recommended for a stable router platform?∙12.5T∙13.1T∙14.0∙15.1MA router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before placing the router back into service?∙Back up the new image.∙Copy the running configuration to NVRAM.∙Delete the previous version of the Cisco IOS software from flash.∙Restart the router and verify that the new image starts successfully.Which step supports disaster recovery and should be performed first when upgrading an IOS system image on a Cisco router?∙Delete the current image from flash memory.∙Copy the current image from the router to a TFTP server.∙Use the boot system command to configure the router to load the new image.∙Configure the router to load the new image from the TFTP server.Refer to the exhibit. A network engineer is preparing to upgrade the IOS system image on a Cisco 2901 router. Based on the output shown, how much space is available for the new image?∙25574400 bytes∙249856000 bytes∙221896413 bytes∙33591768 bytesThe customer of a networking company requires VPN connectivity for workers who must travel frequently. To support the VPN server, the customerrouter must be upgraded to a new Cisco IOS software version with the Advanced IP Services feature set. What should the field engineer do before copying the new IOS to the router?∙Set the router to load the new IOS image file directly from the TFTP server on the next reboot.∙Delete the currently installed IOS by using the erase flash: command, and reload the router.∙Issue the show running-configuration command to determine the features of the currently installed IOS image file.∙Issue the show version and the show flash commands to ensure that the router has enough memory and file space to support the new IOS image.Fill in the blank.In RSTP, BPDU frames are sent every 2 seconds by default.Fill in the blank.EIGRP keeps feasible successor routes inthe topology table.Fill in the blank.By default, EIGRP is able to use up to 50 percent of the bandwidth for EIGRP messages on an EIGRP-enabled interface.Match the switched LAN problem to the correct symptom. (Not all options are used.)Match the step number to the sequence of stages that occur during the HSRP failover process. (Not alloptions are used.)Match each OSPF LSA description with its type. (Not all options are used.)Match the step sequence to the multiarea OSPFroute calculation process. (Not all options are used.) Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which message was displayed on the web server? ∙You’ve made it!∙Congratulations!∙Wonderful work!∙Work done!Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why are users in the OSPF network not able to access the Internet?∙The default route is not redistributed correctly from router R1 by OSPF.∙The interface that is connected to the ISP router is down.∙The OSPF network statements are misconfigured on routers R2 and R3. ∙The OSPF timers that are configured on routers R1, R2, and R3 are not compatible.∙The network statement is misconfigured on router R1.。

相关文档
最新文档