CCNAITN第8章考试
ccna第二学期练习答案

ERouting Chapter 1 - CCNA Exploration: 路由协议和概念 (版本1口令可用于限制对 Cisco IOS 所有或部分内容的访问。
请选择可以用口令保护的模式和接口。
(选择三项。
)VTY 接口控制台接口特权执行模式2路由器从相连的以太网接口收到消息后,会更改哪项报头地址,再将消息从另一个接口发送出去第 2 层源地址和目的地址3请参见图示。
网络管理员已经为路由器连接到直连网络的接口配置了如图所示的 IP 地址。
从路由器 ping 相连网络上的主机口之间相互 ping 都会遭到失败。
此问题最可能的原因是什么必须使用no shutdown命令启用接口。
4请参见图示。
主机 A ping 主机 B。
当 R4 收到对以太网接口的 ping 时,哪两块报头信息包括在内(选择两项。
)目的 IP 地址:目的 MAC 地址:5网络管理员刚把新配置输入 Router1。
要将配置更改保存到 NVRAM,应该执行哪一条命令Router1# copy running-config startup-config6您需要配置图中所示的串行连接,必须在 Sydney 路由器上发出以下哪条配置命令才能与 Melbourne 站点建立连接(选择三Sydney(config-if)# ip addressSydney no shutdownSydney(config-if)# clock rate 560007请参见图示。
从路由器的运行配置输出可得出什么结论显示的命令决定了路由器的当前运行情况。
8请参见图示。
在主机 2 连接到 LAN 上的交换机后,主机 2 无法与主机 1 通信。
导致此问题的原因是什么主机 1 和主机 2 位于不同的网络中。
9输入以下命令的作用是什么R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login设置通过 Telnet 连接该路由器时使用的口令10以下哪一项正确描述了路由器启动时的顺序加载 bootstrap、加载 IOS、应用配置11加载配置文件时的默认顺序是怎样的NVRAM、TFTP、CONSOLE12请参见图示。
思科题目

CCNACCNA11章节考试题之01《生活在以网络为中心的世界》1、在主要使用文本相互通信的两人或多人之间,他们使用的哪种通信形式属于基于文本的实时通信?A.网络日志B.维基C.即时消息D.播客E.协作工具2、哪种网络为客户提供对企业数据(如库存、部件列表和订单)的有限访问?A.内部网B.外联网C.网际网络D.Internet3、出于管理数据的目的,需要使用什么来权衡通信的重要性及其特征?A.网络管理B.网络流量C.QoS策略D.网络评估4、对网络通信采取哪些处理后才能使服务质量策略正常发挥作用?(选择两项)A.根据服务质量要求对通信分类。
B.对应用程序数据的每个分类分配优先级。
C.始终对Web通信分配高优先级处理队列。
D.始终对数字电影分配高优先级处理队列。
E.始终对电子邮件通信分配低优先级队列。
5、网络体系结构有哪两个部分?(选择两项)A.构成以人为本网络的人B.通过网络传输消息的编程服务和协议C.通过网络传输的数据D.支持网络通信的技术E.运营和维护数据网络的企业6、在当初开发Internet时,放弃面向连接的电路交换技术出于哪三个原因?(选三项)A.电路交换技术要求将单个消息划分为包含编址信息的多个消息。
B.早期的电路交换网络在电路出现故障时不能自动建立备用链路。
C.电路交换技术要求即使两个位置之间当前并未传输数据,也必须在网络端点之间建立开放电路。
D.通过面向连接的电路交换网络传输消息无法保证质量和一致性。
E.建立多路并发开放电路获得容错能力成本高昂。
7、开发Internet时使用数据包交换无连接数据通信技术出于哪三个原因?(选三项)A.它能快速适应数据传输设施的丢失。
B.它能有效利用网络基础架构传输数据。
C.数据包可同时通过网络采取多条路径传输。
D.支持按建立连接的时间收取网络使用费用。
E.传输数据之前需要在源设备和目的设备之间建立数据电路。
8、QoS在融合网络中的作用是什么?A.确保丢弃高于可用带宽水平的所有通信B.确定网络中不同通信的传输优先级C.针对所有网络通信确定精确的优先级D.允许网络中的其它组织共享未使用的带宽9、将左侧的选项和右侧的对象连线,使网络体系结构的特征与其定义相匹配。
思科CCNA1第八章试题及答案英文版

1. 1. QuestionWhat is a result of connecting two or more switches together?o The number of broadcast domains is increased.o The size of the broadcast domain is increased.o The number of collision domains is reduced.o The size of the collision domain is increased.2. 2. QuestionRefer to the exhibit. How many broadcast domains are there?CCNA1 v6.0 Chapter 8 Exam 005o 1o 2o 3o43. 3. QuestionWhat are two reasons a network administrator might want to create subnets?(Choose two.)o simplifies network designo improves network performanceo easier to implement security policieso reduction in number of routers neededo reduction in number of switches needed4. 4. QuestionRefer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?CCNA1 v6.0 Chapter 8 Exam 007o 255.255.255.0o 255.255.255.128o 255.255.255.192o 255.255.255.224o 255.255.255.2405. 5. QuestionRefer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has beensubnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the newnetwork (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?CCNA1 v6.0 Chapter 8 Exam 004o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46o IP address: 192.168.10.254 subnet mask: 255.255.255.0, defaultgateway: 192.168.10.16. 6. QuestionIf a network device has a mask of /28, how many IP addresses are available for hosts on this network?o 256o 254o 62o 32o 16o 147. 7. QuestionWhich subnet mask would be used if 5 host bits are available?o 255.255.255.0o 255.255.255.128o 255.255.255.224o 255.255.255.2408. 8. QuestionHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?o 510o 512o1022o 1024o 2046o 20489. 9. QuestionHow many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?o twoo threeo fouro five10. 10. QuestionA network administrator wants to have the same network mask for allnetworks at a particular small site. The site has the following networks and number of devices:IP phones – 22 addressesPCs – 20 addresses neededPrinters – 2 addresses neededScanners – 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?o 255.255.255.0o 255.255.255.192o 255.255.255.224o 255.255.255.240o 255.255.255.248o 255.255.255.25211. 11. QuestionA company has a network address of 192.168.1.64 with a subnet mask of255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks wouldachieve that? (Choose two.)o 192.168.1.16/28o 192.168.1.64/27o 192.168.1.128/27o 192.168.1.96/28o 192.168.1.192/2812. 12. QuestionA network administrator is variably subnetting a network. The smallestsubnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?o 4o 6o 8o 10o 1213. 13. QuestionRefer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?CCNA1 v6.0 Chapter 8 Exam 001o 56o 60o 64o 68o7214. 14. QuestionRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?CCNA1 v6.0 Chapter 8 Exam 002o 10.16.10.160/26o 10.16.10.128/28o 10.16.10.64/27o 10.16.10.224/26o 10.16.10.240/27o 10.16.10.240/2815. 15. QuestionA network administrator needs to monitor network traffic to and fromservers in a data center. Which features of an IP addressing scheme should be applied to these devices?o random static addresses to improve securityo addresses from different subnets for redundancyo predictable static IP addresses for easier identificationo dynamic addresses to reduce the probability of duplicate addresses 16. 16. QuestionWhich two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)o It eliminates most address configuration errors.o It ensures that addresses are only applied to devices that require apermanent address.o It guarantees that every device that needs an address will get one.o It provides an address only to devices that are authorized to be connected to the network.o It reduces the burden on network support staff.17. 17. QuestionA DHCP server is used to assign IP addresses dynamically to the hosts on anetwork. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?o 254o251o 252o 25318. 18. QuestionRefer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the s ite subsection to represent multiple geographical sites of the company, the s ub-site section to represent multiple campuses at each site, and thes ubnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achievedper sub-site?CCNA1 v6.0 Chapter 8 Exam 003o 0o 4o16o 25619. 19. QuestionWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?o 2001:DB8:BC15o 2001:DB8:BC15:Ao 2001:DB8:BC15:A:1o 2001:DB8:BC15:A:1220. 20. QuestionConsider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is /6021. 21. QuestionMatch the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 0122. 22. QuestionRefer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 006。
最新 CCNA第二学期章节测试 第八章 答案

参加考试- ERouting Chapter 8 - CCNA Exploration: 路由协议和概念(版本 4.0) 1请参见图示。
下列哪项陈述能够正确描述该网络?错误!未找该网络使用EIGRP到引用源。
错误!未找至少包含一条父路由和一条子路由到引用源。
错误!未找192.168.2.0、192.168.3.0 和192.168.4.0 网络是子路由到引用源。
错误!未找发往172.16.3.0 的流量将被引导至s 0/0/1到引用源。
2请参见图示。
路由器 B 接收到目的地址为10.16.1.97 的数据包。
路由器 B 将会做什么?错误!未找丢弃数据包到引用源。
错误!未找使用默认路由到引用源。
错误!未找通过到10.16.1.0 的路由转发该数据包到引用源。
错误!未找通过到10.16.1.64 的路由转发该数据包到引用源。
3请参见图示。
Router1 将对172.16.0.0/24 网络的子路由应用什么子网掩码?错误!未找0.0.0.0到引用源。
错误!未找255.255.0.0到引用源。
错误!未找255.255.255.0到引用源。
错误!未找255.255.255.255到引用源。
4请参见图示。
Router1 正在运行IOS 第12.2 版。
网络管理员需要做什么工作才能确保发往172.16.0.0/24 未知子路由的数丢弃?错误!未找使用ip default-network命令到引用源。
错误!未找使用RIPv1 之类的有类路由协议到引用源。
错误!未找启用OSPF 或ISIS 作为路由协议到引用源。
错误!未找使用ip classless命令到引用源。
错误!未找什么都不用做,默认会启用ip classless到引用源。
5路由表中显示以下条目:R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1这是哪种类型的路由?错误!未找1 级父路由到引用源。
CCNA认证基础课程-课后作业.习题答案

CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。
CCNA网络安全

第一章P28选择题1.计算机网络安全是指利用计算机网络管理控制和技术措施,保证在网络环境中数据的、完整性、网络服务可用性和可审查性受到保护。
A 保密性B 抗攻击性C 网络服务管理性D 控制安全性2.网络安全的实质和关键是保护网络的安全。
A 系统B 软件C 信息D 网站3.下列不属于TCSEC标准定义的系统安全等级的4个方面的是。
A安全政策B可说明性C 安全保障D 安全特征4.在短时间内向网络中的某台服务器发送大量无效连接请求,导致合法用户暂时无法访问服务器的攻击行为是破坏了。
A 保密性B完整性C 可用性D可控性5.如果访问者有意避开系统的访问控制机制,则该访问者对网络设备及资源进行非正常使用属于。
A 破坏数据完整性B 非授权访问C 信息泄露D拒绝服务攻击填空题1.计算机网络安全是一门涉及息论等多学科的综合性学科。
2.网络安全的5第二章P45 P63 64P45虚拟专用网(VPN)技术虚拟专用网:是利用公共数据网或专用局域网,以特殊设计的硬件和软件直接通过共享的IP网络所建立的隧道完成的虚拟专用网络。
通过VPN可以实现远程网络之间安全、点对点的连接。
VPN的安全性可通过隧道技术、加密和认证技术得到解决。
选择题1. SSL协议是之间实现加密传输的协议。
A 物理层和网络层B 网络层和系统层C 传输层和应用层D 物理层和数据层2 加密安全机制提供了数据的。
A 可靠性和安全性B 保密性和可控性C 完整性和安全性D 保密性和完整性3 抗抵赖性服务对证明信息的管理与具体服务项目和公证机制密切相关,通常都建立在之上。
A物理层 B 网络层C传输层D应用层4 能在物理层、链路层、网络层、传输层和应用层提供的网络安全服务的是。
A认证服务B数据保密性服务C 数据完整性服务D 访问控制服务5 传输层由于可以提供真正的端到端的连接,最适宜提供安全服务。
A数据保密性 B 数据完整性填空题协议是在网络传输过程中,第四章P93 108 129黑客(Hacker)源于Hack,本意为“干了一件非常漂亮的事”,原指一群专业技能超群、聪明能干、精力旺盛、对计算机信息系统进行非授权访问的人员。
2016CCNA1各章及期末考试答案

ITN 第7 章考试1什么是套接字?正确响应您的响应源和目的IP 地址以及源和目的以太网地址的组合源IP 地址与端口号的组合或目的IP 地址与端口号的组合源和目的序列号和确认号的组合源和目的序列号和端口号的组合套接字是源IP 地址与源端口号的组合,或者目的IP 地址与目的端口号的组合。
此试题参考以下领域的内容:Introduction to Networks•7.1.2 TCP 和UDP 简介2主机设备需要通过网络发送大型视频文件,同时为其他用户提供数据通信。
下列哪种功能可以让不同通信流同时发生,而不会让一个数据流使用所有可用带宽?正确响应您的响应窗口大小多路复用端口号确认多路复用对交替发送多个通信流很有用。
窗口大小用于降低数据通信速率。
端口号用于将数据流传送到正确的应用程序。
确认用于通知发送设备数据包流已收到或未收到。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输3主机设备通过HTTP 协议向Web 服务器发送数据包。
传输层使用下列哪项来将数据流传送到服务器上的正确应用程序?正确响应您的响应序列号确认源端口号目的端口号目的端口号用于将数据流传输到正确的应用程序,而源端口号由源设备随机生成并进行跟踪。
序列号用于指示如何重组和重新排序收到的数据段。
确认用于通知发送设备数据包流已收到或未收到。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输4UDP 传输协议有什么有利功能?正确响应您的响应确认已接收的数据减少传输延迟使用序列号跟踪数据段能够重新传输丢失的数据由于其报头小于TCP 报头,UDP 协议可以减少传输延迟。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输5下列哪种场景描述了传输层提供的功能?正确响应您的响应学生使用教室里的VoIP 电话给家里打电话。
CCNA题库

●在 ISO 的 OSI 模型中,提供流量控制功能的层是__(1)__;提供建立、维护和拆除端到端连接的层是__(2)__。
为数据分组提供在网络中路由功能的是__(3)__;传输层提供__(4)__的数据传送;为网络层实体提供数据发送和接收功能和过程的是___(5)__ 。
(1):A.1、2、3 层(2):A.物理层(3):A.物理层(4):A.主机之间(5):A.物理层B.2、3、4 层B.数据链路层B.数据链路层B.网络之间B.数据链路层C.3、4、5 层C.会话层C.网络层C.数据链路之间C.网络层D.4、5、6 层D.传输层D.传输层D.物理键路之间D.传输层●TCP/IP是Internet 采用的协议标准,它是一个协议系列,由多个不同层次的协议共同组成,用于将各种计算机和设备组成实际的计算机网络。
TCP/IP 协议系统分成四个层次,分别是网络接口层、网络层、传输层与应用层。
__(30)__是属于网络层的低层协议,主要用途为完成网络地址向物理地址的转换。
__(31)__起到相反的作用,多用在无盘工作站启动时利用物理地址解析出对应的网络地址。
__(32)__是与 IP 协议同层的协议,更确切的说是工作在 IP 协议之上,又不属于传输层的协议,可用于 Internet 上的路由器报告差错或提供有关意外情况的信息。
__(33)__是一种面向连接的传输协议,在协议使用中存在着建立连接、传输数据、撤消连接的过程;__(34)__是一种非连接的传输协议,采用这种协议时,每一个数据包都必须单独寻径,特别适合于突发性短信息的传输。
(30):A.RARP(31):A.RARP(32):A.IGMP(33):A.SNMP B.ICMPB.ARPB.ICMDB.NFSC.ARPC.IPXC.CDMAC.TCPD.IGMPD.SPXD.WAPD.UDP(34):A.HTTP B.FTP C.TCP D.UDP●Internet提供了大量的应用服务,分为通信、获取信息与共享计算机资源等三类。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1 ITN 第 8 章考试1 IPv4 地址由多少位组成?正确响应 您的 响应3264128256IPv4 地址由 4 个二进制八位数组成,每个数字包含 8 个位,从而构成一个 32 位地址。
此试题参考以下领域的内容:Introduction to Networks• 8.1.1 IPv4 地址结构2 下列哪两项是 IPv4 地址的组成部分?(请选择两项。
)正确响应您的 响应子网部分2网络部分逻辑部分主机部分物理部分广播部分IPv4 地址分为两个部分:网络部分 - 用于识别主机所在的特定网络,主机部分 - 用于识别网络中的特定主机。
子网掩码用于识别各个部分的长度。
此试题参考以下领域的内容:Introduction to Networks• 8.1.2 IPv4 子网掩码3 子网掩码 255.255.255.224 的前缀长度计数法是什么?正确响应您的 响应/25/26 /27/283 255.255.255.224 的二进制格式为 11111111.11111111.11111111.11100000。
前缀长度是指子网掩码中连续的 1 的个数。
因此,前缀长度为 /27。
此试题参考以下领域的内容:Introduction to Networks• 8.1.2 IPv4 子网掩码4 一条消息发送到远程网络上的所有主机。
它是哪种消息类型?正确响应您的 响应有限广播组播 定向广播单播定向广播是将消息发送到特定网络中的所有主机。
它适用于将广播发送到非本地网络中的所有主机。
组播消息是将消息发送到订阅组播组中的一组选定主机。
有限广播只限于将消息发送到本地网络中的主机。
单播消息是将消息从一台主机发送到另一台主机。
此试题参考以下领域的内容:Introduction to Networks• 8.1.3 IPv4 单播、广播和组播54 下列哪两种说法描述了第 3 层广播的特征?(请选择两项。
)正确响应您的 响应广播是一种威胁,用户必须避免使用实施广播的协议。
路由器可创建广播域。
某些 IPv6 协议使用广播。
每个交换机接口都有一个广播域。
受限广播数据包的目的 IP 地址为 255.255.255.255。
路由器不会转发任何类型的第 3 层广播数据包。
许多协议使用广播,因此无法避免。
路由器不转发广播,因此会在其每个接口形成一个广播域。
IPv6 中没有广播。
如果交换机收到广播数据包,它将通过除入站接口以外的所有接口转发此数据包。
此试题参考以下领域的内容:Introduction to Networks• 8.1.3 IPv4 单播、广播和组播6 DHCP 服务器用于为网络上的主机动态分配 IP 地址。
地址池配置为 192.168.10.0/24。
该网络中有 3 台打印机需要使用池中保留的静态 IP 地址。
池中有多少 IP 地址分配给其他主机? 正确响应 您的 响应5254251252253如果分配给池的地址块是 192.168.10.0/24,则网络上的主机可分配到 254 个 IP 地址。
由于有 3 台打印机需要静态分配地址,则剩余 251 个 IP 地址可供分配。
此试题参考以下领域的内容:Introduction to Networks• 8.1.4 IPv4 地址的类型7 下列哪种网络迁移技术可以把 IPv6 数据包封装在 IPv4 数据包中,以便通过 IPv4 网络基础架构进行传输?正确响应您的 响应封装转换双堆栈 隧道建立6 隧道迁移技术可将 IPv6 数据包封装在 IPv4 数据包中。
封装过程中会组装消息并向每一层添加信息,以便通过网络传输数据。
转换迁移技术允许支持 IPv6 的设备与支持 IPv4 的设备使用类似于 IPv4 中 NAT 的转换技术进行通信。
双堆栈迁移技术允许 IPv4 和 IPv6 协议栈在同一网络中同时共存。
此试题参考以下领域的内容:Introduction to Networks• 8.2.1 IPv4 问题8 下列关于 IPv4 和 IPv6 地址的说法,哪两项是正确的?(请选择两项。
)正确响应 您的 响应IPv6 地址用十六进制数字表示。
IPv4 地址用十六进制数字表示。
IPv6 地址长度为 32 位。
IPv4 地址长度为 32 位。
IPv4 地址长度为 128 位。
IPv6 地址长度为 64 位。
IPv4 地址用点分十进制数字表示,长度为 32 位。
IPv6 地址用十六进制数字表示,长度为 128 位。
此试题参考以下领域的内容:Introduction to Networks7 • 8.2.2 IPv6 编址9 哪个 IPv6 地址是完整 FE80:0:0:0:2AA:FF:FE9A:4CA3 地址的最终压缩结果?正确响应您的 响应FE8::2AA:FF:FE9A:4CA3 FE80::2AA:FF:FE9A:4CA3FE80::0:2AA:FF:FE9A:4CA3FE80:::0:2AA:FF:FE9A:4CA3当压缩 IPv6 地址时,:: 只能替换一次重复出现的一组 0。
此试题参考以下领域的内容:Introduction to Networks• 8.2.2 IPv6 编址10 IPv6 单播地址包括哪两种类型?(请选择两项。
)正确响应您的 响应组播8环回本地链路任播广播组播、任播和单播属于 IPv6 地址类型。
IPv6 中没有广播地址。
环回和本地链路是单播地址的特定类型。
此试题参考以下领域的内容:Introduction to Networks• 8.2.3 IPv6 地址类型11 IPv6 全局单播地址包括哪三个部分?(请选择三项。
)正确响应您的 响应用于标识特定主机的本地网络的接口 ID 用于标识 ISP 提供的地址网络部分的全局路由前缀用于标识本地企业站点内部网络的子网 ID用于标识本地管理员提供的网络地址部分的全局路由前缀用于标识网络中的本地主机的接口 IDIPv6 全局单播地址包括三个要素。
由 ISP 提供的全局路由前缀,由组织确定的子网 ID ,以及唯一标识主机接口的接口 ID 。
9此试题参考以下领域的内容:Introduction to Networks• 8.2.4 IPv6 单播地址12 支持 IPv6 的设备发送一个目的地址为 FF02::1 的数据包。
该数据包的目标是什么?正确响应您的 响应所有 IPv6 DHCP 服务器 本地链路上支持 IPv6 的所有节点本地链路上配置了 IPv6 的所有路由器网络中配置了 IPv6 的所有路由器FF02::1 是本地链路范围内的全节点组播组。
所有支持 IPv6 的接口将接收和处理具有此目的地址的数据包。
此试题参考以下领域的内容:Introduction to Networks• 8.2.5 IPv6 组播地址13 当思科路由器从 IPv4 环境完全迁移到 IPv6 环境时,哪组命令可以正确启用 IPv6 转发和接口寻址?10正确响应您的响应Router# configure terminalRouter(config)# interface fastethernet 0/0Router(config-if)# ip address 192.168.1.254 255.255.255.0Router(config-if)# no shutdownRouter(config-if)# exitRouter(config)# ipv6 unicast-routingRouter# configure terminalRouter(config)# interface fastethernet 0/0Router(config-if)# ipv6 address 2001:db8:bced:1::9/64Router(config-if)# no shutdownRouter(config-if)# exitRouter(config)# ipv6 unicast-routingRouter# configure terminalRouter(config)# interface fastethernet 0/0Router(config-if)# ipv6 address 2001:db8:bced:1::9/64Router(config-if)# no shutdownRouter# configure terminalRouter(config)# interface fastethernet 0/0Router(config-if)# ip address 2001:db8:bced:1::9/64Router(config-if)# ip address 192.168.1.254 255.255.255.0Router(config-if)# no shutdown11此试题参考以下领域的内容:Introduction to Networks•8.2.4 IPv6 单播地址 • 8.2.5 IPv6 组播地址14 IPv4 与 IPv6 协议共同使用哪两个 ICMP 消息?(请选择两项。
)正确响应您的 响应路由器请求 路由重定向邻居请求协议无法到达路由器通告ICMPv4 和 ICMPv6 通用的 ICMP 消息包括:主机确认、目标(网络、主机、协议、端口)或服务不可达、超时和路由重定向。
路由器请求、邻居请求和路由器通告是 ICMPv6 中实施的新协议。
此试题参考以下领域的内容:Introduction to Networks• 8.3.1 ICMP12 15 当支持 IPv6 的主机需要发现预期 IPv6 目标的 MAC 地址时,源主机将在 NS 消息中使用下列哪个目的地址?正确响应您的 响应全节点组播地址请求节点组播地址接收方的本地链路地址接收方的全局单播地址当主机需要查找目的主机的 MAC 地址时,则使用地址解析。
IPv6 主机设备将发送邻居请求 (NS) 消息到请求节点组播地址。
此地址包括两个部分,共同构成了 128 位的地址。
前半部分是 FF02::1:FF00/104,后半部分是目的主机的本地链路地址或全球单播地址的最右边 24 位。
此试题参考以下领域的内容:Introduction to Networks• 8.3.1 ICMP16 路由器在什么情况下会丢弃 traceroute 数据包?正确响应您的 响应当路由器收到 ICMP 超时消息时当 RTT 值达到零时13当主机发出ICMP 响应应答消息时 当 TTL 字段的值达到零时当响应请求和响应应答消息的值达到零时当路由器收到一个 traceroute 数据包时,TTL 字段的值递减 1。