cisco考试题型05,上学期末考证的复习材料

合集下载

思科第一学期期末考试答案

思科第一学期期末考试答案

思科第一学期期末考试最新答案work Information Technology Company.2020YEAR要将数据包发送到远程网络,应使用哪种设备?访问交换机DHCP 服务器集线器路由器OSI 哪一层使用面向连接的协议来确保数据的可靠传输?应用层表示层会话层传输层请参见图示。

根据显示的 IP 配置回答,主机 A 和主机 B 无法在本地网络外通信的原因是什么?对主机 A 分配了网络地址。

对主机 B 分配了组播地址。

主机 A 和主机 B 属于不同的网络。

对网关地址分配了广播地址。

请参见图示。

包含路由器 B 的网络遇到问题。

助理网络工程师已确定此网络的问题出在路由器什么操作可以纠正该网络问题?在接口 Serial 0/0/0 上发出clock rate命令在接口 Serial 0/0/1 上发出description命令在接口 FastEthernet 0/0 上发出ip address命令在接口 FastEthernet 0/1 上发出no shutdown命令请参见图示。

对于从主机 A 向 Web 服务器发出的网页请求,正确的目的套接字数字是什么00-08-a3-b6-ce-46198.133.219.25:80C 172.18.0.0/24 is directly connected, FastEthernet0/0在 Cisco IOS 设备中,启动配置文件存储于何处?闪存NVRAMRAMROM在配置路由器时,网络技术人员想要命名路由器。

输入hostname命令后,技术人员会看到下列示?Router>Router#Router(config)#Router(config-line)#下列哪三个 IPv4 地址代表子网的广播(选择三项)(主机为1)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /27网络管理员想要限制访问路由器的特权执行模式。

(完整版)Cisco期末考试选择题题库

(完整版)Cisco期末考试选择题题库

(完整版)Cisco期末考试选择题题库第1⼩组成员出题集:1.⼀台主机已经正确布线并配置有唯⼀的主机名和有效的IP地址。

要使主机可以远程访问资源还应配置哪两个额外的组件?AC A.⼦⽹掩码B.MAC 地址C.默认⽹关D.环回IP 地址E.DHCP 服务器IP 地址2.⽀持可变长⼦⽹掩码的路由协议有?BCDA. RIP v1B. RIP v2C. OSPFD. IS-IS3.路由器中含有许多其他计算机中常见的硬件和软件组合,包括?CA.CPU ROM 操作系统硬盘B.主板硬盘显卡CPUC.CPU ROM 内存操作系统D.主板电源光驱CPU4.哪两项说法正确描述了路由器的组件?BCA. RAM 永久存储着在启动过程中使⽤的配置⽂件B.重新启动时闪存中的内容不会丢失C. NVRAM 存储着在启动过程中使⽤的IOS 的备份副本D. ROM 包含最新⽽且最完整的IOS 版本5.下列哪些是路由器的功能?AA. 分组交换⼴播域分段根据逻辑编址选择最佳路径B. 分组交换⽹段扩展⼴播域分段C. 根据物理编址选择最佳路径根据逻辑编址选择最佳路径⽹段扩展D. 分组交换⽹段扩展⼴播域分段6.以下哪⼀项正确描述了路由器启动时的顺序?AA.加载bootstrap、加载IOS、应⽤配置B.加载bootstrap、应⽤配置、加载IOSC.加载IOS、加载bootstrap、应⽤配置、检查硬件D.检查硬件、应⽤配置、加载bootstrap、加载IOS7.⽹络管理员需要通过路由器的FastEthernet 端⼝直接连接两台路由器。

应⽤哪种电缆?CA.直通电缆B.全反电缆C.交叉电缆D.串⾏电缆8.以下哪些路由表项要由⽹络管理员⼿动配置?AA.静态路由B.直接路由C.动态路由D.以上说法都不正确9.RIP协议是基于?AA.UDPB.TCPC.ICMPD.Raw IP10.以下协议属于路由协议的是 ?ABCGA.RIPB.IS-ISC.OSPFD.PPPE.IPF.IPXG.BGP11.静态路由的优点包括? CA. 管理简单B. ⾃动更新路由C. 提⾼⽹络安全性D. 节省带宽E. 收敛速度快12.以下哪些内容是路由信息中所不包含的?AA. 源地址B. 下⼀跳C. ⽬标⽹络D. 路由权值13.下列关于OSPF协议的说法正确的是?ABDA. OSPF⽀持基于接⼝的报⽂验证B. OSPF⽀持到同⼀⽬的地址的多条等值路由C. OSPF是⼀个基于链路状态算法的边界⽹关路由协议D. OSPF发现的路由可以根据不同的类型⽽有不同的优先级14.以下哪⼀项正确描述了路由器启动时的顺序?A(A)加载bootstrap、加载IOS、应⽤配置(B)加载bootstrap、应⽤配置、加载IOS(C)加载IOS、加载bootstrap、应⽤配置、检查硬件(D)检查硬件、应⽤配置、加载bootstrap、加载IOS15.输⼊以下命令的作⽤是什么?BR1(config)#line vty 0 4R1(config-line)#password check123R1(config-line)#loginA.确保在进⼊⽤户执⾏模式之前输⼊⼝令B.设置通过Telnet连接该路由器时使⽤的⼝令C.要求在保存配置前输⼊check123D.创建本地⽤户账户以便登陆路由器或交换机16.您需要配置图中所⽰的串⾏连接,必须在sydney路由器上发出以下哪条配置命令才能与Melboume站点建⽴连接?(选三项)ABDA.Sydeny(config-if)#ip address 201.100.53.2 255.255.255.0B.Sydeny(config-if)#no shutdownC.Sydeny(config-if)#ip address 201.100.53.1 255.255.255.224D.Sydeny(config-if)#clock rate 56000E.Sydeny(config-if)#ip gost Melboume 201.100.53.2答案:1-5:AC,BCD,C,B,A6-10:A,C,A,A,ABCG7-15:ACD,A,ABD,A,B16:ABD注释:第1,6,11道陈宝⽣出题;第2,7,12道许斌斌出题;第3,8,13道曹淑婷出题;第4,9,14道彭鹏出题;第5,10,15,16道陆志翔出题。

CISCO考试

CISCO考试

CISCO考试交换第一章分析Cisco企业园区架构1.园区网设计的分层模型,哪几层,什么类型的设备属于哪一层p5 20●园区网设计方案中,可将网络架构分三层,一般二层交换机部署在哪一层?()A.接入层B.分布层C.核心层D.第二层2.网络流量的类型p16 15●下列流量的类型中哪一类占用的带宽最高?()A.网络管理B.语音C.IP组播D.清道夫类3.大、中、小型企业网适用的分层模型p30 18●小型园区网可能会合并分层模型中的哪两层?()A.接入层和核心层B.接入层和分布层C.核心层和分布层D.任何两层都不能合并第二章在园区网中实施VLAN4.设计VLAN模型中,端到端VLAN和本地VLAN的对比p49 14●本地VLAN相对端到端VLAN的优势是什么?()A.按照逻辑特性对用户分组B.无需使用三层设备C.更易于管理D.将用户和资源部署在统一VLAN中5.DTP中,链路两端的二层端口设置不同的聚集模式,最后协商的结果是什么p64 16、21●某链路上,一端二层接口模式被设置为dynamic auto,另一端二层接口模式被设置为Trunk,链路最后会被配置成何种模式?()A.连接受限B.TrunkC.AccessD.无法确定为何种模式6.VTP的工作模式有哪些p69 22●以下哪种不是VTP的工作模式?()A.干道模式B.服务器模式C.客户端模式D.透明模式7.私用VLAN中的端口类型,以及不同类型的端口互相之间通信的情况p78 4●私用VLAN中,以下哪种类型的端口之间能相互通信?()A.杂合端口和孤立端口B.团体端口和孤立端口C.两个孤立端口D.两个属于不同团体VLAN的团体端口8.EtherChannel的优点p88 31、32●EtherChannel提供了以下哪些解决方案()A.冗余B.策略路由C.限制广播D.流量分类/doc/223e079d3b3567ec112d8a33.html CP中,两端设置不同的协商模式,最后协商的结果p92图●LACP中,两端设置为何种模式,能动态协商建立起EtherChannel?()A.Passive和PassiveB.Passive和OnC.Active和ActiveD.Active和Off第三章实施生成树10.STP中,选举根网桥的依据p109 3●进行STP的根网桥选举,优先比较的是哪一个参数?()A.桥IDB.连接网段的数量C.优先级D.根端口的数量11.RSTP的端口状态p112●以下哪个描述符合RSTP端口的转发状态?()A.接收数据帧并填充MAC表B.当完成了提议和达成协议的进程之后,开始转发数据帧C.阻止传输数据帧D.转发状态会出现在拓扑同步和变更过程中12.配置PortFast特性的作用p123●端口的PortFast特性有何作用?()A.避免二层环路B.缩短STP收敛时间C.使端口进入侦听状态和学习状态D.使端口由转发状态马上变为阻塞状态13.配置了BPDU过滤的端口下应该接何种设备p136 11●配置了BPDU过滤的端口下应该接何种设备?()A.主机B.路由器C.交换机D.集线器如果一个端口上同时配置了BPDU防护和BPDU过滤,哪项特性优先级更高p137●在同一端口上启用了BPDU防护和BPDU过滤,以下描述正确的是()A.BPDU防护生效,BPDU过滤失效B.BPDU防护失效,BPDU过滤生效C.BPDU防护和BPDU过滤同时生效D.BPDU防护和BPDU过滤冲突,都失效第四章实施VLAN间路由14.懂得根据IP地址和VLAN的配置判断两台主机之间能否通信●位于不同VLAN的主机一定不能互相通信(√)15.使用单臂路由实现VLAN间路由,需要用到什么接口p166 6在使用单臂路由器执行VLAN间路由时,路由器接口会被划分为()A.三层子接口B.VLAN子接口C.802.1q子接口D.EtherChannel子接口16.使用SVI实现VLAN间路由的优点p170 9●使用SVI实现VLAN间路由有何优点()A.使用与路由器相连的外部链路来进行路由B.速度比使用单臂路由快C.节省设备成本D.只需要使用到二层交换机17.多层交换机中,什么命令能将端口在二层和三层之间切换p171 17●多层交换机中,什么命令能将端口从三层端口变为二层端口()A.SwitchportB.Switchport mode changeC.Ip switchportD.Switchport change18.DHCP中继的作用p190 3、19●通过DHCP中继代理,路由器能跨越VLAN或IP边界来转发DHCP请求(√)19.路由器使用哪几种方式转发数据包p196●下列哪种不是Cisco路由器用来转发数据包的工作方式?()A.进程交换B.快速交换C.拓扑交换D.Cisco快速转发第五章在园区网中实施高可用性和冗余性20.实施最优冗余性的关键是什么p223●在建立和维护网络的过程中,要尽一切可能提供冗余性,以保证网络的高可用性。

思科ccna复习题

思科ccna复习题

思科ccna复习题思科CCNA复习题是许多IT从业者在准备网络认证考试时面临的重要挑战。

CCNA(Cisco Certified Network Associate)认证是全球范围内最受认可的网络认证之一,它涵盖了网络基础知识、路由和交换技术、网络安全、无线网络等方面的内容。

在复习CCNA考试的过程中,掌握并解答复习题是一种非常有效的学习方法。

本文将介绍一些常见的CCNA复习题,并给出相应的解答和解析。

一、网络基础知识1. 什么是IP地址?IP地址有几种类型?答:IP地址是用于标识网络上设备(如计算机、路由器等)的一串数字。

IP地址分为IPv4和IPv6两种类型。

IPv4使用32位二进制数表示,通常以四个十进制数表示,每个数的取值范围是0-255。

IPv6使用128位二进制数表示,通常以八组四位十六进制数表示。

2. 什么是子网掩码?如何计算子网掩码?答:子网掩码是用于划分IP地址的网络部分和主机部分的一串二进制数。

计算子网掩码的方法是将IP地址中网络部分的位全部设置为1,主机部分的位全部设置为0。

例如,对于IP地址192.168.0.1,如果要将前24位作为网络部分,剩余8位作为主机部分,那么子网掩码为255.255.255.0。

二、路由和交换技术1. 什么是路由器?它的作用是什么?答:路由器是一种网络设备,用于在不同的网络之间传输数据包。

它通过查找路由表,将数据包从源地址传输到目标地址。

路由器的作用是实现不同网络之间的互联和数据转发。

2. 什么是交换机?与路由器有何区别?答:交换机是一种网络设备,用于在局域网内传输数据包。

它通过学习MAC地址,将数据包从源地址传输到目标地址。

交换机与路由器的区别在于作用范围不同,交换机只能在局域网内传输数据,而路由器可以在不同网络之间传输数据。

三、网络安全1. 什么是防火墙?它的作用是什么?答:防火墙是一种网络安全设备,用于监控和控制网络数据流。

它通过过滤、检测和阻止不安全的网络流量,保护网络免受未经授权的访问、攻击和数据泄露。

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题CCNA1备课讲稿

思科第一学期期末考试最新考题C C N A11Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?IPTCPUDPEthernet2Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J3Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process num ensure that data is delivered to the correct application?physical layerdata link layernetwork layertransport layer4The Layer 4 header contains which type of information to aid in the delivery of data?service port numberhost logical addressdevice physical addressvirtual connection identifier5Which fiber connector supports full-duplex Ethernet?6Which device should be used for routing a packet to a remote network?access switchDHCP serverhubrouter7Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is no table of switch SW1. How will SW1 handle the frame?Switch SW1 will drop the frame.Switch SW1 will forward the frame to host C.Switch SW1 will flood the frame out all ports.Switch SW1 will flood the frame out all ports except port Fa0/1.8Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. Th configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?9Which three statements are true about network layer addressing? (Choose three.)It uniquely identifies each host.It assists in forwarding packets across internetworks.It uses a logical 32-bit IPv4 address.It is not a configurable address.It is a physical address.It identifies the host from the first part of the address.10What is the result of using the clock rate 56000 command at the serial interface of the router?The interface is configured as a DCE device.The interface timers are cleared.The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.The IP address for the serial interface is configured.11Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 12 successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interfacnetwork card failurenetwork cables unpluggedIP address incorrectly enteredsubnet mask incorrectly entered12As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.12813Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?application layerpresentation layersession layertransport layer14 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which twlayer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)DNSFTPDHCPHTTPSMTP15Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address w access from host A?Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.13016 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the musers in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research17Which physical connector type is used for a serial V.35 connection to the CSU/DSU?18Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)Four collision domains are present.One logical network is represented.Two broadcast domains are present.Three networks are needed.Three logical address ranges are required.19What are three characteristics of CSMA/CD? (Choose three.)It monitors the media for presence of a data signal.After detecting a collision, hosts can resume transmission after a random timer has expired.A jam signal is used to ensure that all hosts are aware that a collision has occurred.Devices can be configured with a higher transmission priority.Data is transmitted only when the data signal is present.It uses a token system to avoid collisions.20Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The rou ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this probleConfigure the description at interface serial 0/0/0.Configure an IP address on interface serial 0/0/0.Remove the no shutdown command at interface serial 0/0/0Reboot the router.21Which OSI layer uses the header information to reassemble the data segments into streams?application layernetwork layerpresentation layersession layertransport layer22Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?192.168.1.191192.168.1.101192.168.1.1192.168.1.25423the IP address of the primary domain name server used by the host?10.10.10.32192.168.1.5192.168.1.99192.168.2.10024Which memory contents will change as a result of using the Router# erase startup-config command on a router?RAMROMflashNVRAM25While configuring a router, a network technician wants to name the router. Which prompt should the technician see when e hostname command?Router>Router#Router(config)#Router(config-line)#26Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or inte the IP address 192.168.1.254 belong?PCswitchrouter interface fa0/0router interface fa0/127Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correc which wire pairs need to be switched on one of the Ethernet cable ends?pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 428Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gUse the ping 127.0.0.1 command.Use the ipconfig command.Use the ipconfig/all command.Use the ping 10.0.0.254 command.29Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?The table will remain unaffected.The switch will remove the MAC address at Fa0/19.The switch will retain the MAC address until host B is powered on again.The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.30What information is contained in the header of Layer 3 to help data delivery?port numberdevice physical addressdestination host logical addressvirtual connection identifier31 A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts toany of the six computers. What type of network should be used?workgroupP2P applicationspeer-to-peer networkclient-server network32Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 491 assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254 statement is true?The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.33Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server.application will allow this request to be started?34Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser35What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.36 A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrenableauxconsoleVTY37Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2738Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?telnet 192.168.1.1ping 192.168.1.1ftp 192.168.1.1tracert 192.168.1.139Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?40If an administrator wished to return a router to the default state, what additional step must be taken after issuing the comma start-up config?Reload the device.Issue the command copy running-config start-up config.Perform a show running-config to verify that the file was removed.Enter the interface commands to allow the device to connect to the network.41By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with the subnet mask. To what network does the workstation belong?192.168.3.8192.168.3.16192.168.3.24192.168.3.3242Which statement is true about router hostnames?A hostname should be unique on each router.A router hostname cannot contain capital letters.A router hostname is configured in privileged executive mode.A router hostname must be created before any other configurations can be added to the device.43 A user types the enable command. What task can be performed at the privileged EXEC mode?Configure the device.Configure individual interfaces.Configure individual terminal lines.Issue show and debug commands.44Refer to the exhibit. Which logical topology describes the exhibited network?starringpoint-to-pointmulti-access45Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is sho default gateway IP address should be configured at the PC to enable this access?10.1.192.110.1.192.210.1.192.54192.31.7.146Which statement is true about the ICMP protocol?It is an application layer protocol.It is designed to make IP a reliable protocol.It is often filtered out of networks for security purposes.If a host does not respond to an ICMP echo request, the host is not functioning.47Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?Layer 1Layer 2Layer 3Layer 448Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address mask, and default gateway should be assigned to this host to allow it to function in the network?IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.3549Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correc the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA50What is the Cisco IOS?system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions。

CISCO第二学期期末考试-答案

CISCO第二学期期末考试-答案

客户向ISP 技术人员反映连通性问题。

技术人员就相关问题询问客户之后,发现除了FTP 外,所有网络应用程序都正常。

技术人员怀疑出现了什么问题?防火墙配置有误/交换机或集线器端口损坏客户工作站上的IP 地址配置有误客户工作站上的DNS 服务器配置有误客户工作站上的默认网关配置有误请参见图示。

对于图中所示的数据会话,下列哪两项描述正确?(选择两项。

)数据会话由客户端所运行的HTTP 应用程序进程启动。

/数据会话由客户端的TCP 端口80 标识。

用户通过发送电子邮件启动数据会话。

Internet 服务器的IP 地址是192.168.17.43。

Internet 服务器将把数据发送至客户端端口8547。

/端口过滤和访问列表通过什么方式来增强网络安全?防止特定类型的通信到达特定网络主机。

/遭受各类拒绝服务攻击时提醒网络管理员。

防止病毒、蠕虫和特洛伊木马感染主机计算机和服务器。

可对机密数据通信进行加密和身份认证。

某黑客尝试获取存储在公司网络内部某台服务器上的机密信息。

网络安全解决方案检测完整的数据包,确定这是一个威胁,所以阻止该数据包进入内部网络。

这一过程中哪项安全措施保护了网络?IDSIPS /基于主机的防火墙Anti-X 软件192.168.17.111/28 属于哪一类地址?主机地址网络地址广播地址 /组播地址在图中所示的其中一台路由器上执行 show ip route 命令,显示下列输出:C 192.168.4.0/24 is directly connected, Serial0/0R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1C 192.168.3.0/24 is directly connected, Serial0/1此命令是从哪一台路由器执行的?ABC /D请参见图示。

第3学期cisco复习资料

第3学期cisco复习资料

第2章:交换机的基本概念和配置

• •
交换机的基本配置
交换机的管理配置:MAC地址表管理 交换机的安全配置 • 交换机的端口安全 VLAN的类型 • VLAN的中继:802.1Q、ISL • 配置VLANs 和中继 第4章:VTP • VTP的概念:VTP域、VTP通告、VTP工作模式
• VTP的运作:VTP的默认配置、VTP修剪
• VTP的配置 • VTP故障排除
复习大纲
第6章:VLAN间路由 • • • • • • • VLAN间路由的三种实现方式 配置VLAN间路由 配置单臂路由器VLAN间路由 排查VLAN间路由故障 冗余功能和二层环路的危害 STP生成树算法 STP-BPDU帧字段
复习大纲
第11章:OSPF
• OSPF 消息格式 • OSPF 数据包类型 • OSPF 区域 • 单区OSPF 基本配置 • OSPF 路由器 ID确定方法 • OSPF 相邻关系建立
• OSPF 度量计算
• 多路访问网络中DR/BDR 选举过程 • OSPF 默认路由重分布
复习大纲
交换部分 第1章:LAN设计 • • • • 交换式LAN体系结构-分层模型 将交换机与指定的LAN功能进行配对 Ethernet/802.3 LAN简介 交换机转发帧的方法

• • • • • •
RIPv1自动汇总
默认路由在RIP中的传播 VLSM划分子网 CIDR技术路由汇总 RIPv1和RIPv2的差别 RIPv2的配置 RIPv2禁用自动汇总
第6-7章 VLSM、CIDR 与RIPv2
复习大纲
第8章:进一步了解路由表
• 路由表结构 • 第1级路由: 父路由、最终路由 • 第2级子路由 • 路由表查找过程的步骤 • 路由行为:有类路由行为和无类路由行为 第10章 链路状态路由协议 • 链路状态路由过程 • 链路状态路由协议的特点

思科(CISCO)笔试题目、解析和答案

思科(CISCO)笔试题目、解析和答案

思科(CISCO)笔试题目、解析和答案一题:解:求至少几人及格,也就是求最多多少人不及格,情况分为:做对0个,做对1个,做对2个,做对3个,做对4个,做对5个,为了使不及格人最多,不妨对做对0个的人说,为何不把你的做错的两道给做对3个或4个的人呢,这样你还是不及格并且可以多增加人不及格,这样做对0个把自己的错误2个题给别人,他错3个,同理做对1个的把自己的一个错误题给别人,这样保证了不及格人最多,经过以上分析,现在不及格人最多时,只有一下几种情况:做对2个,做对3个,做对4个,做对5个。

分别设人数为:x2,x3.x4.x5,则:当x2最大是,至少及格人数为:100-x2x2+x3+x4+x5=100 (1)总错误题数为:100*5-(80+72+84+88+56)=120则:3x2+2x3+x4=120 (2)(2)-(1)得:2x2+x3-x5=20 (3)可以看出要想使x2最大,则x3最小,x5最大,则:x3=0,x5=56,则x2=38,x4=6,即做对2个38,做对3个0,做对4个6,全对56。

也就是说至少有100-x2=100-38=62人及格,对结果进行分析:对于第五题只有56人做对,那么38+6=44,即做对4个和做对2个的都有第五题做错,那么做对2个的38人只能在前4道题中错2道:显然很好分配,分法之一:38-28=10,做错1和2的10人,做错1和3的20-10=10人,做错2和3的16-10=6人,做错2和4的12人。

二题:10人和一个司机时间最少,则车接第十人正好与前面9个人一起到达终点设第一个人坐车t1小时,步行t2小时,求t1+t2,则:100t1+5t2=1000 (1)假设在d点把第一人放下,在c点车回来接到第二人,则车从d-c时间为:t=(100t1-5t1)/105,设从车载第二人开始开始到车追上第一人时,第一个走了s公里到达e点则:车在c点时,车与第一人的距离为105t=100t1-5t1=95t1,则:(95t1+s)/100=s/5 (2)即:5t1=s第一人从d-e走了:5t+s公里同理可知第三人到第10 人与第二人一样,则车一共送10人次,回头接人(空车)9次则第一人共走了9*(5t+s)=5t2即:9*[5*(100t1-5t1)/105+s]=5t2 (3)由(1),(2)(3)可得:t1=70/13,t2=1200/13,则:t1+t2=1270/13=97.69小时。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

一.分析题:
阅读以下说明,回答问题1至问题3
【说明】
某公司总部和三个子公司分别位于四处,网络结构如图1-1所示,公司总部和各子公司所需主机数如表1-1所示。

表1-1
【问题1】
该公司用一个C类地址块202.119.110.0/24组网,将表1-2中的(1)~(6)处空缺的主机地址或子网掩码填写在答题纸的相应位置。

表1-2
[问题1]
(1)202.119.110.190
(2)202.119.110.65
(3)255.255.255.224
(4)202.119.110.110
(5)202.119.110.113
(6)202.119.110.126
【问题2】
发现子公司A的某台PC机无法访问Web服务器,做如下检查:
1、查看网上邻居,发现该PC机可以访问子公司A内其他主机;
2、采用___(7)___命令来检查与路由器接口1的连通性,结果正常;
3、该PC机可以通过域名访问FTP服务器;
4、用SHOWACCESS-LIST命令检查路由器的___(8)___,发现有问题,那么造成该PC 机无法访问Web服务器的原因可能是___(9)___。

(7)A.ping B.nslookup C.netstat D.interface
(8)A.地址解析协议B.访问控制列表C.路由表D.IP地址
(9)A.该PC机子网掩码配置错误B.该PC机网关配置错误
C.该PC机的DNS、服务器地址配置错误D.路由器对该PC机访问
Web服务器的权限进行了限制
【问题3】
可以采用___(10)___方法防止IP地址被盗用。

(10)A.IP地址与子网掩码进行绑定B.IP地址与MAC地址进行绑定如:arp –s 198.168.1.100 A0-45-14-00-00-20 删除绑定是arp –d 显示列表arp -a C.设置网关地址D.IP地址与路由器地址进行绑定。

相关文档
最新文档