思科ITE第二章

合集下载

思科 FindIT Network Discovery Utility 2.0 快速入门指南说明书

思科 FindIT Network Discovery Utility 2.0 快速入门指南说明书

Cisco Systems, Inc. 思科在全球设有 200 多家办事机构。

地址、电话号码和传真号码 均在思科网站上列出,网址为: /go/offices 。

思科 Small BusinessCisco FindIT Network Discovery Utility 版本 2.0快速入门指南文本部件编号: 78-21387-02本手册中的规定和信息如有变更,恕不另行通知。

我们相信本手册中的所有声明、信息和建议均准确可靠,但不提供任何明示或暗示的担保。

用户应承担使用产品的全部责任。

产品配套的软件许可证和有限担保在随产品一起提供的信息包中提供,且构成本文的一部分。

如果您找不到软件许可或有限担保,请与思科代表联系以索取副本。

思科执行的 TCP 报头压缩是对加州大学伯克利分校 (UCB) 开发的某一程序的修改,它是 UNIX 操作系统的 UCB 公用版的一部分。

保留所有权利。

Copyright © 1981,加利福尼亚州大学董事会。

无论本手册中是否有任何其他担保,这些供应商的所有文档文件和软件均按“原样”提供,可能包含缺陷。

思科及其上述供应商不承担任何明示或暗示的担保, 包括(但不限于)商品适销性、对特定用途的适用性、非侵权担保,或因任何交易、使用或贸易行为而产生的担保责任。

在任何情况下,对于任何间接、特殊、连带发生或偶发的损坏,包括(但不限于)因使用或无法使用本手册而导致的任何利润损失或数据损失/损坏,思科及其供应商概不负责,即使思科及其供应商已获知此类损坏的可能性也不例外。

思科和思科徽标是思科和/或其附属公司在美国和其他国家/地区的注册商标。

要查看思科的商标列表,请访问此 URL:/go/trademarks。

文中提及的第三方商标为其相应所有人的财产。

使用“合作伙伴”一词并不暗示思科和任何其他公司之间存在合作关系。

(1110R)本文档中使用的任何互联网协议 (IP) 地址和电话号码并不代表实际地址和电话号码。

(完整版)思科ite6.0第四章考试答案

(完整版)思科ite6.0第四章考试答案

第四章考试答案1. 而消极的环境因素清理电脑内减少吗?•灰尘•EMI•生锈•防静电2. 哪个组件可以很容易地受到的直接喷射压缩空气清理电脑机箱内部的什么时候?•风扇•散热器•电力供应•CPU•电缆连接器3. 在生产地板,家具工厂笔记本电脑过程监测和报告。

生产楼环境是80华氏度(27摄氏度)左右。

湿度水平相当高70%左右。

空气循环风扇安装在天花板上。

木粉是普遍的。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•空气流•尘埃4. 蔬菜罐头工厂生产线使用笔记本电脑的监控。

生产环境有一个环境温度在华氏75度(摄氏24度)。

湿度水平约为30%。

噪音水平很高,由于灌装机械。

笔记本电脑是一个木制的盒子里,紧紧围绕着笔记本电脑三面。

哪个因素最可能影响在这种环境下使用的一台笔记本电脑吗?•房间的温度•湿度•噪音•笔记本电脑的容器5. 科学探险团队使用笔记本电脑。

科学家们正在研究的温度范围从-13华氏度(-25摄氏度)到80华氏度(27摄氏度)。

湿度水平约为40%。

噪音水平很低,但地形是粗糙和时速可以达到45英里(每小时72公里)。

在需要的时候,科学家们停止行走,使用笔记本电脑输入数据。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•粗糙的地形•风6. 创建一个预防性维护计划的一部分是什么?•记录每个维护任务的细节和频率•执行硬件升级•丢弃所有取代部分•执行一个法医审计的安全漏洞7. 电脑的技术员执行硬件维护在一个建筑工地。

什么任务应该技术员执行预防性维护计划的一部分?•把灰尘从摄入的粉丝。

•备份数据,格式化硬盘,重新安装数据。

•开发和安装法医跟踪软件。

•执行审计的所有软件安装。

8. 哪个任务应该是硬件维护程序的一部分吗?•审查安全更新。

•更新病毒定义文件。

•调整显示器的最佳分辨率。

•从硬盘中除尘。

•检查并确保任何松散的电缆。

9. 在测试的过程中几个可能的原因的理论问题,应该先测试吗?•最简单和最明显的•那些客户认为是最重要的•最复杂的,难以诊断•随机选择的选择10. 这两个项目可以用来帮助建立一个行动计划解决电脑问题?(选择两个。

思科第二章

思科第二章

1静态路由较之动态路由有哪两项优点(请选择两项。

)正确响应您的响应o由于静态路由不通过网络进行通告,因此比较安全。

o静态路由随着网络不断发展而进行扩展。

o正确实施静态路由所需的网络知识很少。

o静态路由比动态路由使用的路由器资源少。

o静态路由更容易进行大型网络配置。

静态路由需要充分了解整个网络才能正确实施。

它非常容易出错,且不能针对大型网络扩展。

静态路由使用更少的路由器资源,因为更新路由不需要计算。

由于它不通过网络通告,静态路由也比较安全。

此试题参考以下领域的内容:Routing and Switching Essentials静态路由2 请参见图示。

允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么2请参见图示。

允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么正确响应您的响应o配置一条从 R1 到 Edge 的静态路由和一条从 Edge 到 R1 的动态路由。

o配置一条从 R1 到 Edge 的静态默认路由、一条从 Edge 到互联网的默认路由以及一条从 Edge 到 R1 的路由。

o配置一条从 R1 到 Edge 的动态路由和一条从 Edge 到 R1 的静态路由。

o配置 R1 和 Edge 间的动态路由协议,并通告所有路由。

必须创建两个路由:在 R1 中创建默认路由来访问“边缘”,在“边缘”中创建静态路由以访问返回流量的 R1。

PC A 和 PC B 属于末端网络后,这就是最佳解决方案。

而且,静态路由使用的带宽少于动态路由。

此试题参考以下领域的内容:Routing and Switching Essentials静态路由3 浮动静态路由的正确语法是什么3浮动静态路由的正确语法是什么正确响应您的响应o ip route serial 0/0/0o ip route 120o ip route serial 0/0/0o ip route将浮动静态路由用作备用路由,常常是从动态路由协议学习的路由。

cisco

cisco

Chapter 2 Correct Answers:1. What are the key functions of encapsulation? (Choose three.)allows modification of the original data before transmissionidentifies pieces of data as part of the same communicationenables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end deviceenables the reassembly of complete messagestracks delay between end devices2. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detectionensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection3. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)NetworkTransportPhysicalData LinkSession4. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).5. Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexingencapsulation6. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the networkto identify the source and destination end devices that are communicatingto identify the processes or services that are communicating within the end devices7. What can be identified by examining the network layer header?the destination device on the local mediathe destination host addressthe bits that will be transferred over the mediathe source application or process creating the data8. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata representation, encoding, and controlreliability, flow control, and error detectiondetailing the components that make up the physical link and how to access itthe division of segments into packets9. Which layer encapsulates the segment into packets?physicaldata linknetworktransport10. Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layerslimit hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors11. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation12. Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination devicean end devicean intermediate devicea media device13. Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?sourceendtransferintermediary14. What device is considered an intermediary device?file serverIP phonelaptopprinterswitch15. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flowretime and retransmit data signalsdetermine pathways for data16. Refer to the exhibit. Which set of devices contains only end devices?A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J17. During the encapsulation process, what occurs at the data link layer?No address is added.The logical address is added.The physical address is added.The process port number is added.18. Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)Network A -- WANNetwork B -- WANNetwork C -- LANNetwork B -- MANNetwork C -- WANNetwork A -- LAN19. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application20. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow21. Refer to the exhibit. What type of network is shown?WANMANLANWLANIn your opinion (this has no bearing on your grade), please indicate your interest in this course:(1) Not At All Interested(2) Slightly Interested(3) Interested(4) Very Interested(5) Completely InterestedIn your opinion (this has no bearing on your grade), please indicate how enthusiastic you are about the content of this course and the things you’re learning (or have learned):(1) Not At All Enthusiastic(2) Slightly Enthusiastic(3) Enthusiastic(4) Very Enthusiastic(5) Completely EnthusiasticIn your opinion (this has no bearing on your grade), please rate your motivation to do well in this course:(1) Not At All Motivated(2) Slightly Motivated(3) Motivated(4) Very Motivated(5) Completely MotivatedChapter 322. What are two forms of application layer software? (Choose two.)applicationsdialogsrequestsservicessyntax23. What is the purpose of resource records in DNS?temporarily holds resolved entriesused by the server to resolve namessent by the client to during a querypasses authentication information between the server and client24. What three protocols operate at the Application layer of the OSI model? (Choose three.)ARPDNSPPPSMTPPOPICMP25. Which application layer protocols correctly match a corresponding function? (Choose two.)DNS dynamically allocates IP addresses to hostsHTTP transfers data from a web server to a clientPOP delivers email from the client to the server email serverSMTP supports file sharingTelnet provides a virtual connection for remote access26. As compared to SSH, what is the primary disadvantage of telnet?not widely availabledoes not support encryptionconsumes more network bandwidthdoes not support authentication27. What are three properties of peer-to-peer applications? (Choose three.)acts as both a client and server within the same communicationrequires centralized account administrationhybrid mode includes a centralized directory of filescan be used in client-server networksrequires a direct physical connection between devicescentralized authentication is required28. Which email components are used to forward mail between servers? (Choose two.)MDAIMAPMTAPOPSMTPMUA29. What application layer protocol describes the services that are used for file sharing in Microsoft networks?DHCPDNSSMBSMTPTelnet30. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)routes email to the MDA on other serversreceives email from the client's MUAreceives email via the POP3 protocolpasses email to the MDA for final deliveryuses SMTP to route email between serversdelivers email to clients via the POP3 protocol31. How does the application layer on a server usually process multiple client request for services?ceases all connections to the servicedenies multiple connections to a single daemonsuspends the current connection to allow the new connectionuses support from lower layer functions to distinguish between connections to the service 32. Which layer of the OSI model supplies services that allow user to interface with the network?physicalsessionnetworkpresentationapplicationtransport33. What is the automated service that matches resource names with the required IP address?HTTPSSHFQDNDNSTelnetSMTP34. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?8012611553339126552035. What are two characteristics of peer-to-peer networks? (Choose two.)scalableone way data flowdecentralized resourcescentralized user accountsresource sharing without a dedicated server36. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)centralized administrationdoes not require specialized softwaresecurity is easier to enforcelower cost implementationprovides a single point of failure37. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)ASPFTPHTMLHTTPHTTPSIP38. What is the role of the OSI application layer?provides segmentation of dataprovides encryption and conversion of dataprovides the interface between the applications on either end of the networkprovides control of all the data flowing between the source and destination devices39. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)User accounts are centralized.Security is difficult to enforce.Specialized operating system software is required.File permissions are controlled by a single computer.A computer that responds to a file sharing request is functioning as a server.40. What application layer protocol is commonly used to support for file transfers between a client and a server?HTMLHTTPFTPTelnet41. What are two characteristics of clients in data networks? (Choose two.)use daemonsinitiate data exchangesare repositories of datamay upload data to serverslisten for requests from serversChapter 442. Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)This is a UDP header.This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of 43693.This is a TCP header.43. With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?0 to 255256 to 10220 to 10231024 to 204749153 to 6553544. Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segmentto determine which Layer 3 protocol should be used to encapsulate the datato enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order45. Which two options represent Layer 4 addressing? (Choose two.)identifies the destination networkidentifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media46. Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?session establishmentsegment retransmitdata transfersession disconnect47. Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)The local host is using three client sessions.The local host is using web sessions to a remote server.The local host is listening for TCP connections using public addresses.The local host is using well-known port numbers to identify the source ports.The local host is performing the three-way handshake with 192.168.101:1037.48. Which information is found in both the TCP and UDP header information?sequencingflow controlacknowledgmentssource and destination port49. Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?encapsulationflow controlconnectionless servicessession establishmentnumbering and sequencingbest effort delivery50. Which is an important characteristic of UDP?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery51. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?1353801024172852. Which event occurs during the transport layer three-way handshake?The two applications exchange data.TCP initializes the sequence numbers for the sessions.UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client.53. Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical orderto prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts54. Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?TCPIPUDPHTTPDNS55. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?The packets will not be delivered.The packets will be retransmitted from the source.The packets will be delivered and reassembled at the destination.The packets will be delivered and not reassembled at the destination.56. What mechanism is used by TCP to provide flow control as segments travel from source to destination?sequence numberssession establishmentwindow sizeacknowledgments57. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?create a Layer 1 jam signalreach a timeout and resend the data that needs to be acknowledgedsend a RESET bit to the hostchange the window size in the Layer 4 header58. What is dynamically selected by the source host when forwarding data?destination logical addresssource physical addressdefault gateway addresssource port59. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?applicationpresentationsessiontransportnetwork60. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.61. What are two features of the User Datagram Protocol (UDP)? (Choose two.)flow controllow overheadconnectionlessconnection-orientedsequence and acknowledgementsChapter 562. When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)The router sends an ARP request to determine the required next hop address.The router discards the packet.The router forwards the packet toward the next hop indicated in the ARP table.The router forwards the packet to the interface indicated by the source address.The router forwards the packet out the interface indicated by the default route entry.63. What are the key factors to consider when grouping hosts into a common network? (Choose three.)gatewayspurposephysical addressingsoftware versiongeographic locationownership64. What is a component of a routing table entry?the MAC address of the interface of the routerthe destination Layer 4 port numberthe destination host addressthe next-hop address65. Which three statements are true about routes and their use? (Choose three.)If no route to the destination network is found, the packet is returned to the previous router.If the destination network is directly connected, the router forwards the packet to the destination host.If multiple network entries exist for the destination network, the most general route is used to forward the packet.If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.If a host does not have a route manually configured for the destination network, the host will drop the packet.66. Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.)Replace S2 with a router.Place all servers on S1.Disable TCP/IP broadcasts.Subnet the 192.168.0.0 /24 network.Disable all unused interfaces on the switches.67. What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)require no device configurationprovide routers with up-to-date routing tablesrequire less processing power than static routes requireconsume bandwidth to exchange route informationprevent manual configuration and maintenance of the routing table68. What statement describes the purpose of a default route?A host uses a default route to transfer data to another host on the same network segment.A host uses a default route to forward data to the local switch as the next hop to all destinations.A host uses a default route to identify the Layer 2 address of an end device on the local network.A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.69. What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address70. In a connectionless system, which of the following is correct?The destination is contacted before a packet is sent.The destination is not contacted before a packet is sent.The destination sends an acknowledgement to the source that indicates the packet was received.The destination sends an acknowledgement to the source that requests the next packet to be sent.71. Which IP packet field will prevent endless loops?type-of-serviceidentificationflagstime-to-liveheader checksum72. What type of routing uses information that is manually entered into the routing table?dynamicinteriorstaticstandard73. What are three common problems with a large network? (Choose three.)too few broadcastsperformance degradationsecurity issueslimited management responsibilityhost identificationprotocol compatibility74. Which intermediary devices could be used to implement security between networks? (Choose two.)routerhubswitchfirewallaccess pointbridge75. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?destination network addresssource network addresssource MAC addresswell known port destination address76. Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?345781177. Which portion of the network layer address does a router use to forward packets?host portionbroadcast addressnetwork portiongateway address78. What is the purpose of a default gateway?physically connects a computer to a networkprovides a permanent address to a computeridentifies the network to which a computer is connectedidentifies the logical address of a networked computer and uniquely identifies it to the rest of the networkidentifies the device that allows local network computers to communicate with devices on other networks79. If the default gateway is configured incorrectly on the host, what is the impact on communications?The host is unable to communicate on the local network.The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remotenetworks.The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.There is no impact on communications.80. Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to which all hosts send packets that are destined for an outside network?10.10.10.26127.0.0.110.10.10.610.10.10.1224.0.0.081. Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two.)192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 10.0.0.0 network.192.168.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 172.16.0.0 network.172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network.192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0network.192.168.0.2 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network.82. Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?192.135.250.1192.31.7.1192.133.219.0192.133.219.1Chapter 683. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)172.16.4.127 /26172.16.4.155 /26172.16.4.193 /26172.16.4.95 /27172.16.4.159 /27172.16.4.207 /2784. What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?255.255.0.0255.255.255.0255.255.254.0255.255.248.085. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160172.16.192.168172.16.192.17686. What is the primary reason for development of IPv6?securityheader format simplificationexpanded addressing capabilitiesaddressing simplification87. What is the network address of the host 172.25.67.99 /23 in binary?10101100. 00011001.01000011.0000000010101100. 00011001.01000011.1111111110101100. 00011001.01000010.0000000010101100. 00011001.01000010.0110001110101100. 00010001.01000011. 0110001010101100. 00011001.00000000.0000000088. What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)1 The router will discard the packet.2 The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.3 The router will send a time exceeded message to the source host.4 The router will increment the TTL value and forward the packet to the next router on the path to the destination host.5 The router will send an ICMP Redirect Message to the source host.89. Which three IP addresses are private? (Choose three.)1 172.168.33.12 10.35.66.703 192.168.99.54 172.18.88.905 192.33.55.896 172.35.16.590. Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?1 binary adding2 hexadecimal anding3 binary division4 binary multiplication5 binary ANDing91. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?1 This is a useable host address.2 This is a broadcast address.3 This is a network address.4 This is not a valid address.92. Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.1 /242 /163 /204 /275 /256 /2893. Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?1 The IP settings are not properly configured on the host.2 Internet Protocol is not properly installed on the host.3 There is a problem at the physical or data link layer.4 The default gateway device is not operating.5 A router on the path to the destination host has gone down.94. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?1 an internet2 a network3 an octet4 a radix95. Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?1 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.392 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.333 IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.334 IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.315 IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.196. Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?1 255.255.255.2482 255.255.255.2243 255.255.255.1924 255.255.255.2405 255.255.255.1286 255.255.255.25297. What three facts are true about the network portion of an IPv4 address? (Choose three.)1 identifies an individual device2 is identical for all hosts in a broadcast domain3 is altered as packet is forwarded4 varies in length5 is used to forward packets6 uses flat addressing98. Which statements are true regarding IP addressing? (Choose two.)1 NAT translates public addresses to private addresses destined for the Internet.2 Only one company is allowed to use a specific private network address space.3 Private addresses are blocked from public Internet by router.4 Network 172.32.0.0 is part of the private address space.5 IP address 127.0.0.1 can be used for a host to direct traffic to itself.。

思科第4学期第2章答案

思科第4学期第2章答案

1一家拥有 10 名员工的小型公司使用单个 LAN 在计算机之间共享信息。

哪种 类型的 Internet 连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如 DSL )答案 说明 最高分值correctness of response Option 42对于这种小型办公室,比较适合通过被称为数字用户线路 (DSL) 的常见宽带服务实现 Internet 连接,这种服务由当地的电话服务提供商提供。

由于员工人数很少,带宽的问题并不突出。

如果公司较大,在远程站点有分支机构,则专用线路会更加适合。

如果公 司员工需要通过 Internet 与公司联系,则采用虚拟专用网。

2哪种网络情况需要使用 WAN ?员工工作站需要获取动态分配的 IP 地址。

员工在出差时需要通过 VPN 连接到公司电子邮件服务器。

分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。

员工需要访问托管在其建筑物内 DMZ 中的公司 Web 服务器上的网页。

答案 说明 最高分值correctness of response Option 22当出差的员工需要通过 WAN 连接到公司电子邮件服务器时,VPN 将通过 WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。

通过 DHCP 获取动态 IP 地址是 LAN 通信的功能。

在企业园区的不同建筑物之间共享文件可通过 LAN 基础设施来实现。

DMZ 是企业 LAN 基础设施内一个受保护的网络。

3当使用数字租用线路来提供客户与服务提供商之间的连接时,需要使用哪两种 设备?(请选择两项。

)接入服务器CSU第 2 层交换机DSU拨号调制解调器答案说明最高分值correctness of responseOption 2 and Option 4 are correct.2数字租用线路需要通道服务单元 (CSU) 和数据服务单元 (DSU)。

思科网络课件计算机网络双语教程第二章

思科网络课件计算机网络双语教程第二章
Communicating over the Network
Network Fundamentals – Chapter 2
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
1
Objectives
–Benefits include • assists in protocol design • fosters competition • changes in one layer do not affect other layers • provides a common language
ITE PC v4.0 Chapter 1
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
5
Network Structure
End Devices and their Role in the Network
–End devices form interface with human network & communications network
Explain network protocols
Network protocols are used
to allow devices to
communicate
successfully
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Chap 2 Summary

Cisco Chap 2 Summary

Types of Cables1.Connecting a DTE to a DCE2.Connecting two DTEs directly to eac h otherSpecification for DTE/DCE interface1.Mechanical/Physical (number of pins & connector type)2. Electrical (Define voltage level for 0 and 1 )3. Functional (Func performed by assigning meaning to S ignalLine)4. Procedural (Sequence of ev ents for transmitting data )Null Modem- Comm method to directly c onnect two DTEs using RS-232 serial cableNull Modem Connection- Transmit (Tx) and rec eive (Rx) lines are crosslinkedWAN Encapsulation Protocols1.HDLC2.PPP3.SLIP4.X.25 or LAPB5.Frame Relay6.ATMSerial Line Internet Protocol (SLIP)- A standard protoc ol f or point-to-point serial connections using TCP/IP.X.25/Link Access Procedure, Balanced (LAPB)- X.25 specifies LAPB, a data link lay er protocol- Predecessor to Frame Relay.Frame Relay- Eliminates some of the time-consuming processes (such as error correction and flow control) employed in X.25ATM- The cell relay in w hich dev ices send multiple servic e ty pes (v oice, v ideo, or data) in f ixed-leng th (53-byte) cells.Fixed-length Cells- Allow proc essing to occ ur in hardw are, thereby reducing transit delay s. - 53 bytesHigh-level Data Link Control (HDLC)-Default enc ap type on point-point c onn, when link uses 2 Cisc o devices - Bit-oriented sy nchronous data link layer protocol developed by the ISO - Current standard is ISO13239- Devfrom Synchro Data Link Control (SDLC) standard proposed in 1970s- Provides both c onnection-oriented and connectionless service- Defines a Lay er 2 framing structure that allows f or flow control and errorcontrol throug h the use of acknow ledgments- Uses a frame delimiter/flag to mark the beg inning &end of each frameHLDC Frame Types1.Flag2.Address3.Control4.Protoc ol5.Data6.FCSFlag- Field that initiates and terminates error check ing- The frame always starts and ends with an 8-bit f lag f ield- The bit pattern is 01111110Address- Field that contains the HDLC address of the secondary station- Can contain a specific address, a group address, or a broadcast addressControl- HDLC defines 3 types of frames, each w/a diffcontrol field format:rmation (I) frame - Carry upper layer inf o & some control info2.Supervisory (S) frame-Prov ide control information.3.Unnumbered (U) frame -Support ctrl purposes & arn’t sequencedProtocol- HDLC protocol specif ies the protoc ol type enc apsulated w/in the fram eData-Contains a Path Info Unit (PIU) Exchang e Identific ation (XID) infoFrame Check Sequenc e (FCS)- Precedes the ending f lag delimiter and is usually a cyclic redundancycheck (CRC) calc ulation remainderCisco HLDC (cHDLC)-Proprietary- Frames contain a field for identifying the network protocol beingencapsulated- Default enc ap method used by Cisco devices on sy nchronous serial lines- PPP Encapsulation is used to connec t to a non-Cisco devic e- Used as a point-to-point protoc ol on leased lines bet 2 Cisc o devicesencapsulation hdlc command-SYNTAX: encapsulation hdlc- Used cmd in priv ileg ed mode to re-enable HDLCshow interfaces serial command-show interfaces serial0/0/0-Display s information specific to serial interfaces- When HDLC is conf igured, "Enc apsulation HDLC" is shown- Verify proper configuration of HDLC or PPP encapsulationshow ip int brief command-Used in troubleshooting a serial interfac e-5 possible problem states can be identified1.Serial x is down, line protocol is dow n2.Serial x is up, line protoc ol is down3.Serial x is up, line protoc ol is up (looped)4.Serial x is up, line protoc ol is down (disabled)5.Serial x is administrativ ely down, line protocol is downTroubleshooting a Serial Interface (See Reference)Serial Line Internet Protocol (SLIP)- Standard protocol for point-point serial connusing a variation of TCP/IP- Predecessor of PPPPoint-to-Point Protocol (PPP)- Successor to SLIP providing router-router and host-network conn ov ersynchro and asynchro circ uits- Provides multiprotocol LAN-WAN connections handling TCP/IP, IPX, andAppleTalk simultaneously- Used over Twisted Pair,Fiber-Optic Lines, and Satellite Transm ission- Provide transport over ATM, Frame Relay,ISDN&Optical Link- Allows y ou to authenticate connections using either PAP/CHAP- Allows the simultaneous use of multiple netw ork layer protocols- Does not impose any restrictions regarding transmission rate other thanthose imposed by the partic ular DTE/DCE interface in use- Most of the w ork done by PPP is at the data link and network layers bythe LC P and NCPsLCP-Sets up the PPP c onnection and its parameters-Establishes, config ures, and tests the data-link connection-Establishes the point-to-point link-Negotiates and sets up c ontrol options on the WAN data link, w hich arehandled by the NC Ps-Provides automatic c onfig uration of the interfac es at each end,including:-Handling varying limits on packet size-Detecting common misconf iguration errors-Terminating the link-Determining w hen a link is functioning properly or when it is failingNCP-Handle hig her lay er protocol conf igurations, and the LC P terminates thePPP connection-Include functional f ields c ontaining standardized codes to indicate thenetwork lay er protoc ol that PPP enc apsulatesPPP Features Not Available in HDLC1.The link quality management feature monitors the quality of the link. Iftoo many errors are detected, PPP tak es the link down.2.PPP supports PAP and CHAP authenticationPPP Components1.HDLC protocol for encapsulating datag rams ov er point-to-point links.2.Extensible LC P to estab, conf igure, and test the data link connection.3.Family of Network Control Protocols (NC Ps) f or establishing andconfiguring different network lay er protoc olsPPP Configuration on Physical Layer1.Asynchronous serial2.Synchronous serial3.HSSI4.ISDNPhases of Establishing a PPP SessionPhase 1: Link establishment and configuration negotiation- LCP must 1st open the connection and neg otiate configuration optionsPhase 2: Link quality determination (optional)- LCP tests the link to determine w hether the link quality is sufficient tobring up netw ork layer protocols.Phase 3: Netw ork layer protocol conf iguration negotiation- After LC P has finished the link quality determ ination phase,theappropriate NCP can separately config ure the network layer protocols,and bring them up and take them down at any timeClasses of LCP Frames1.Link-establishment frames2.Link-maintenance frames3.Link-termination framesLink-EstablishmentFrames-Estab&Conf ig a link-Configure-Request, C onfig ure-Ack, Configure-Nak, and Config ure-Rej ectLink-Maintenance Frames- Manage and debug a link- Code-Reject, Protocol-Reject, Echo-Request, Ec ho-Reply, & Discard-ReqLink-Termination Frames-Terminate a link-Terminate-Request and Terminate-AckLCP Packet Contents1.Code- field identifying the ty pe of LCP packet2.Identifier- field so that requests and replies c an be matched3.Length - field indicating the size of the LCP packet4.Data - Packet ty pe-specif ic dataAAA/TACACS- Dedicatedserverusedtoauthenticateusers.。

思科Tetration Analytics产品手册说明书

思科Tetration Analytics产品手册说明书

产品手册Cisco Tetration AnalyticsCisco Tetration Analytics™平台可提供全面的可视性、基于行为的应用见解和零信任模式迁移,实现了高效的数据中心运营。

产品概述借助需要快速部署应用的虚拟化、容器化和工作负载移动技术以及支持应用组件之间不断变化的通信模式,现代数据中心实现了动态化运营。

得益于这些技术进步,东 - 西流量占数据中心流量的比例达到 76%。

此外,当今的数据中心还要求网络具备高可用性,并可以消除计划停机。

这种动态环境带来了三项主要挑战:●提供对数据中心基础设施中的流量的全面可视性并实现长期保留数据,以便进行调查和分析●了解数据中心内部所有应用的通信和依赖性●建立白名单策略模型,实时识别行为偏差,并执行调查分析操作全新的 Cisco Tetration Analytics 平台可使用算法方法收集丰富的流量遥感勘测数据并执行高级分析,从而成功应对这些挑战。

此平台可在数据中心扩展时以线速收集这种丰富的遥感勘测数据。

该算法方法包括无人管理式机器学习技术和行为分析,可提供全面解决方案。

此平台具备以下优势:●每秒能够处理数百万数据流,在几分钟内即可应用智能算法并提供切实可行的见解●无需汇聚即可捕捉并存储数千亿条遥感勘测记录,从而支持长期调查分析●提供对应用组件及其通信和依赖性的全面可视性,实现网络内部零信任模式使用传感器收集丰富的 Cisco Tetration 遥感勘测数据。

第一版中包含两种类型的传感器:硬件和软件(主机)传感器。

借助这两种传感器,该解决方案可同时支持现有(棕地)和新增(绿地)数据中心基础设施。

图 1 显示 Cisco Tetration Analytics 平台的高级架构。

图 1. Cisco Tetration Analytics 平台架构Cisco Tetration Analytics 平台包含三个主要功能层:●数据收集层:该层主要由轻型传感器组成,它们可作为分析平台的“眼睛”和“耳朵”。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档