CCNA第四学期官方章节考试题之第四学期《Final_Examination》(附答案)

合集下载

CCNA四考试答案

CCNA四考试答案

第 1 章考试1一家拥有10 名员工的小型公司使用单个LAN 在计算机之间共享信息。

哪种类型连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如DSL)答案:4解析:对于这种小型办公室,比较适合通过被称为数字用户线路(DSL) 的常见宽带服务实现Internet 连接,这种服务由当地的电话服务提供商提供。

由于员工人数很少,带宽的问题并不突出。

如果公司较大,在远程站点有分支机构,则专用线路会更加适合。

如果公司员工需要通过Internet 与公司联系,则采用虚拟专用网。

2哪种网络情况需要使用WAN?员工工作站需要获取动态分配的IP 地址。

员工在出差时需要通过VPN 连接到公司电子邮件服务器。

分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。

员工需要访问托管在其建筑物内DMZ 中的公司Web 服务器上的网页。

答案:2解析:当出差的员工需要通过WAN 连接到公司电子邮件服务器时,VPN 将通过WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。

通过DHCP 获取动态IP 地址是LAN 通信的功能。

在企业园区的不同建筑物之间共享文件可通过LAN 基础设施来实现。

DMZ 是企业LAN 基础设施内一个受保护的网络。

3以下哪项描述了WAN 的特征?WAN 和LAN 在同一地理范围内运行,但有串行链路。

WAN 网络归运营商所有。

所有串行链路均被视为WAN 连接。

WAN 可提供到园区主干网的终端用户网络连接。

答案:2解析:WAN 可用于将企业LAN 互连到远程分支机构站点LAN 和远程工作人员站点。

WAN 归运营商所有。

虽然WAN 连接一般通过串行接口实现,但并不是所有串行链路均连接至WAN。

LAN(而非WAN)可在组织中提供终端用户网络连接。

4电路交换WAN 技术的两个常见类型是什么?(请选择两项。

CCNA第四学期章节测试题

CCNA第四学期章节测试题

答案:1、D 2、AE 3、BC 4、E 5、B 6、D 7、AEF 8、A 9、A 10、B 11、D 12、B 13、A 14、D 15、AD 16、A 17、ABF 18、BF 19、B 20、C1收集症状以排查网络故障时,哪个步骤可能会牵涉到外部管理员?缩小范围收集可疑设备的症状分析现有症状确定所有权2逻辑网络图中一般有哪两项要素?(选择两项。

)接口标识符连接器类型操作系统版本电缆类型虚电路3请参见图示。

在创建网络文档的过程中应该进行哪两个步骤?(选择两项。

)记录仅在园区网络中发现的设备的相关信息。

记录在整个网络中(包括远程站点)发现的设备的相关信息。

将网络配置表中与拓扑图所示组件相关的任何设备信息记录下来。

仅将网络配置表中与拓扑图所示组件相关的第2 层和第3 层设备信息记录下来。

将网络配置表中与拓扑图所示组件相关的在网络使用高峰期收集的的设备信息记录下来。

4请参见图示。

图中的图表来自HR-1,它是HR 部门使用的唯一一台应用程序服务器。

基线数据收集开始于8 月1 日。

从图表中可确定什么有用信息?HR-1 上的CPU 资源失衡。

需要调整处理周期。

有两个明显的周末处理周期,它们始于周六夜晚,止于周日早上。

基线图表显示HR-1 明显具有处理问题(尽管问题本质尚不清楚)。

HR-1 上的处理负载重复再现,因此可预测。

HR-1 上的CPU 负载因某种原因受到明显影响,但由于信息不足,无法确定是否存在问题。

5请参见图示。

服务器HR 上的一个应用程序不再响应任何客户端请求。

每件事务都取决于数据中心中的多台服务器。

数据中心内的服务器上运行的为全公司提供服务的应用程序均无问题。

员工没有解决此类故障的经验,且对各种应用程序的了解也有限。

哪些初始故障排除步骤体现了自上而下的故障排除方法?检查所有服务器的电缆连接。

检查每块网卡上的连接指示灯是否为绿色。

Ping 每台服务器的本地地址,然后Ping 相关服务器和典型客户端的地址。

CCNA网络基础知识考试四

CCNA网络基础知识考试四

1请参见图示。

从显示的输出中可以确定以下哪两项信息?(选择两项)本地主机正在使用三个客户端会话。

本地主机正在使用到远程服务器的Web 会话。

本地主机正在侦听使用公有地址的TCP 连接。

本地主机使用公认端口号标识源端口。

本地主机正在执行与192.168.1.101:1037 的三次握手。

135380102417283根据图中所示的传输层报头回答,以下哪些陈述描述了建立的会话?(选择两项。

)这是UDP 报头。

包含Telnet 请求。

包含TFTP 数据传输。

从这台远程主机返回的数据包将包含确认号43693。

这是TCP 报头。

4请参见图示。

主机A 正在使用FTP 从服务器1 下载大型文件。

在下载期间,服务器1 没机 A 对若干字节传输数据的确认。

服务器1 将默认执行什么操作?创建第1 层堵塞信号到达超时时间后重新发送需要确认的数据向主机发送RESET 位更改第4 层报头中的窗口大小5TCP 报头信息和UDP 报头信息中都包含下列哪项信息?定序流量控制确认源端口和目的端口6下列哪三项功能使TCP 得以准确可靠地跟踪从源设备到目的设备的数据传输?(选择三项。

流量控制紧急指针尽力传输会话创建无连接服务编号和定序7OSI 模型哪一层负责规范信息从源设备到目的设备准确可靠地流动?应用层表示层会话层传输层网络层8将流量控制用于TCP 数据传输的原因是什么?同步设备速度以便发送数据同步并对序列号排序,从而以完整的数字顺序发送数据防止传入数据耗尽接收方资源在服务器上同步窗口大小简化向多台主机传输数据的过程9下列哪项由源主机在转发数据时动态选择?目的逻辑地址源物理地址默认网关地址源端口10下列哪两项是用户数据报协议(UDP) 的功能?(选择两项)流量控制系统开销低无连接面向连接序列和确认11请参见图示。

此Wireshark 捕获输出的第7 行中执行的是哪一项TCP 操作?会话创建数据段重传数据传输会话断开12以下哪个事件发生于传输层三次握手期间?两个应用程序交换数据。

CCNA第四学期第四章节练习

CCNA第四学期第四章节练习

下列关于网络安全的说法中哪两项正确?(选择两项。

)保护网络免受内部威胁侵害具有较低的优先级,因为由公司员工带来的安全风险较低。

无论是能自己编写攻击代码的资深黑客,还是从 Internet 下载攻击程序的入门攻击者都可能对网络安全造成严重威胁。

假设一家公司将其 web 服务器部署在防火墙之外,并充分备份 web 服务器,则无需采取其它安全措施来保护 web 服务器,因为即使它被攻击了也不会造成损失。

公众认可的网络操作系统(例如 UNIX)和网络协议(例如 TCP/IP)可采用默认设置工作,因为它们没有内在的安全缺陷。

保护网络设备免受水电等外在因素造成的物理破坏是安全策略的必要组成部分。

下列关于网络攻击的陈述,哪两项是正确的?(选择两项。

)强网络口令可防范大多数DoS 攻击。

蠕虫需要人的参与才能扩散,而病毒不需要。

侦测攻击本质上始终是电子攻击,例如ping 扫描或端口扫描。

暴力攻击会尝试使用字符集组合来搜索每个可能的口令。

内部设备不应该完全信任DMZ 中的设备,应该对DMZ 和内部设备之间的通信进行身份验证以防范端口重定向等攻击。

用户无法访问公司服务器。

系统日志显示服务器运行缓慢,因为它正在收到具有高优先级的虚假服务请求。

这是什么类型的攻击?侦测访问DoS蠕虫病毒特洛伊木马IT 主管发起了一项活动,旨在提醒用户避免打开来源可疑的电子邮件。

该IT 主管意在保护用户免受哪种DoSDDoS病毒访问侦测下列关于预防网络攻击的说法中哪两项正确?(选择两项。

)现代服务器和PC 操作系统具有可以信赖的默认安全设置。

入侵防御系统可以记录可疑的网络活动,但在没有用户干预的情况下无法对抗正在进行的攻击。

物理安全威胁的防范包括控制对设备控制台端口的访问、标识关键电缆、安装UPS 系统以及提供温湿控制。

防止网络钓鱼攻击的最好方法是采用防火墙设备。

更改默认的用户名和口令并禁用或取消不必要的服务有助于加强设备安全性。

入侵检测发生在“安全轮”的哪个阶段?保护监控测试改进侦测安全策略必须实现哪两个目标?(选择两项。

CCNA思科第四学期final答案

CCNA思科第四学期final答案

管理员无法接收电子邮件。

在排查故障时,管理员能够从远程网络成功ping 通本地邮件服务器IP 地址,且可使用nsloo 件服务器名称成功解析为IP 地址。

问题最可能发生在OSI 的哪一层?物理层数据链路层网络层应用层2在哪种情况下,应在帧中继PVC 配置中使用关键字multipoint?当使用全局DLCI 时当使用物理接口时当需要支持组播时当参与连接的路由器处于在同一子网中时3请参见图示。

分支 A 配有一台使用IETF 封装的非Cisco 路由器,分支 B 配有一台Cisco 路由器。

输入图中所示的命令后无法建立PVC。

R2 LMI 的类型是Cisco,R1 LMI 的类型是ANSI。

两处都成功建立了LMI。

为什么无法建立PVC?PVC 与R1 之间的链路必须是点对点链路。

PVC 两端的LMI 类型必须匹配。

Cisco 路由器和非Cisco 路由器之间无法建立帧中继PVC。

命令frame-relay map ip 10.10.10.1 201中缺少参数IETF。

4请参见图示。

EIGRP 已配置为网络路由协议。

网络192.168.1.0/24 中的用户应有对与192.168.3.0/24 连接的web 服务器权限,但不允许telnet 至路由器R3。

在检验配置时,网络管理员发现网络192.168.1.0/24 中的用户可成功telnet 至路由修复此问题?将ACL 101 中语句10 和20 交换顺序。

将ACL 101 应用于R3 VTY 线路0 4 的入站方向。

将ACL 101 应用于R3 VTY 线路0 4 的出站方向。

将ACL 101 应用于R3 接口Serial0/0/1 的出站方向。

将ACL 101 语句10 更改为:permit ip 192.168.1.0 0.0.0.255 any5请参见图示。

所有设备的配置如图所示。

PC1 无法ping 通默认网关。

此问题的原因是什么?默认网关位于错误的子网中。

CCNA第四学期final

CCNA第四学期final

1At what physical location does the responsibilty for a WAN connection change from the user to the service provider?demilitarized zone (DMZ)demarcation pointlocal loopcloud2Refer to the exhibit. Computers on the internal network need access to all servers in the external network. The only traffic tha from the external network must be responses to requests that are initiated on the internal network. Which security measure w this requirement?a numbered extended ACLa named standard ACLa reflexive ACLa dynamic ACL3Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?DEBECIRFECNCBIR4Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate thUse correct source file name in the command.Verify that the TFTP server software is running.Make sure that there is enough room on the TFTP server for the backup.Check that R1 has a route to the network where the TFTP server resides.5Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same subnet as host 192.168.16.43/28?access-list 10 deny 192.168.16.0 0.0.0.31access-list 10 deny 192.168.16.16 0.0.0.31access-list 10 deny 192.168.16.32 0.0.0.16access-list 10 deny 192.168.16.32 0.0.0.15access-list 10 deny 192.168.16.43 0.0.0.166An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local ma address successfully from a remote network and can successfully resolve the mail server name to an IP address via the use nslookup command. At what OSI layer is the problem most likely to be found?physical layerdata link layernetwork layerapplication layer7Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later revie routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem RIPng configuration?The serial interfaces are in different subnets.The RIPng process is not enabled on interfaces.The RIPng network command is not configured.The RIPng processes do not match between Router1 and Router2.8Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The administrator enters the as shown in the exhibit on R2, but the Frame Relay PVCs are inactive. What is the problem?The incorrect DLCI numbers are being configured on R2.The S0/0/0 interface on R2 needs to be point-to-point.The frame-relay map commands are missing the cisco keyword at the end.A single router interface cannot connect to more than one Frame Relay peer at a time.9Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet tra comes into interface FastEthernet 0/1? (Choose two).Telnet to 172.16.10.0/24 is denied.Telnet to 172.16.20.0/24 is denied.Telnet to 172.16.0.0/24 is permitted.Telnet to 172.16.10.0/24 is permitted.Telnet to 172.16.20.0/24 is permitted.10Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remo should the point-to-point subinterfaces be configured on HQ to complete the topology?frame-relay interface-dlci 103 on Serial 0/0/0.1frame-relay interface-dlci 203 on Serial 0/0/0.2frame-relay interface-dlci 301 on Serial 0/0/0.1frame-relay interface-dlci 302 on Serial 0/0/0.2frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.211Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?BEDECIRCBIR12Refer to the exhibit. A network administrator notices that three VLANs created on SW1 do not show in SW3. Based on out show vtp status and show running-config commands, what is the cause of the problem in the SW3 configuration?VTP version 2 is disabled.The VTP mode is misconfigured.The configure revision number for VTP does not match.13Refer to the exhibit. In the partial router configuration that is shown, what is the purpose of access list BLOCK_XYZ?to prevent source IP address spoofing by hosts on the Fa0/0 LANto block access by Fa0/0 LAN hosts to all network services beyond the routerto prevent users on the Fa0/0 LAN from opening Telnet sessions on the routerto secure Fa0/0 hosts by allowing only locally sourced traffic into the Fa0/0 LAN14 A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two prothe technician should use to successfully complete this task? (Choose two.)Configure the login banner.Configure authentication.Define the asymmetrical keys.Configure the console password.Enter the service password-encryption command.15 A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages thatleased lines provide compared to a shared Frame Relay solution? (Choose two.)reduced jitterreduced costsreduced latencythe ability to burst above guaranteed bandwidththe ability to borrow unused bandwidth from the leased lines of other customers16Which statement is true about PAP in the authentication of a PPP session?PAP uses a two-way handshake.The password is unique and random.PAP conducts periodic password challenges.PAP uses MD5 hashing to keep the password secure.17An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error mess trying to enter the IPv4 routes into RIPng. What is the cause of the problem?When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer tecIncorrect IPv4 addresses are entered on the router interfaces.RIPng is incompatible with dual-stack technology.IPv4 is incompatible with RIPng.18Refer to the exhibit. Which configuration command would result in the output in the exhibit?ip nat inside source static 10.1.200.254 172.16.76.3ip nat inside source static 10.1.200.254 192.168.0.10ip nat inside source static 172.16.76.3 10.1.200.254ip nat inside source static 172.16.76.3 192.168.0.10ip nat inside source static 192.168.0.10 172.16.76.3ip nat inside source static 192.168.0.10 10.1.200.25419Which option represents a best practice for applying ACLs?Named ACLs are less efficient than numbered ACLs.Standard ACLs should be applied inside the core layer.ACLs applied to outbound interfaces use fewer router resources.Extended ACLs should be applied closest to the source that is specified by the ACL. 20Refer to the exhibit. What statement is true about the core router devices?They use multiport internetworking devices to switch traffic such as Frame Relay, ATM, or X.25 over the WAN.They provide internetworking and WAN access interface ports that are used to connect to the service provider network.They provide termination for the digital signal and ensure connection integrity through error correction and line monitorinThey support multiple telecommunications interfaces of the highest speed and are able to forward IP packets at full spe those interfaces.21Which important piece of troubleshooting information can be discovered about a serial interface using the show controllersqueuing strategyserial cable typeinterface IP addressencapsulation method22Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?ATMFrame RelayHDLCPPPSDLC23When would the multipoint keyword be used in Frame Relay PVCs configuration?when global DLCIs are in usewhen using physical interfaceswhen multicasts must be supportedwhen participating routers are in the same subnet24 A company has its headquarters office in Dallas and five branch offices located in New York, Chicago, Los Angeles, Seattle,WAN links are used for communications among offices in six sites. In planning the WAN links, the network designer is given requirements: (1) minimize cost and (2) provide a certain level of WAN link reliability with redundant links. Which topology sh network designer recommend?starfull meshhierarchicalpartial mesh25While troubleshooting a PPP link that uses PAP authentication, a network administrator notices an incorrectly configured pas running configuration. The administrator corrects the error by entering the command ppp pap sent-username ROUTER_NA password NEW_PASSWORD, but the link still does not come up.Assuming that the rest of the configuration is correct and that the link has no physical layer problems, what should the adminSave the configuration to NVRAM.Shut down the interface then re-enable it.Generate traffic by pinging the remote router.Use CHAP to ensure compatibility with the remote router.26An administrator issues the command confreg 0x2142 at the rommon 1> prompt. What is the effect when this router is rebooContents in RAM will be erased.Contents in RAM will be ignored.Contents in NVRAM will be erased.Contents in NVRAM will be ignored.27Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the e11 was created on S1. Why is VLAN 11 missing from S2?There is a Layer 2 loop.The VTP domain names do not match.Only one switch can be in server mode.S2 has a higher spanning-tree priority for VLAN 11 than S1 does.28 A network administrator determines that falsified routing information is propagating through the network. What action can beaddress this threat?Update the IOS images.Change console passwords.Employ end-user authentication.Configure routing protocol authentication.29 A recently patched application server is experiencing response time problems. The network on which the application server isbeen experiencing occasional outages that the network team believes may be related to recent routing changes. Network an teams have been notified to work on their respective issues. Which statement applies to this situation?Only results from the software package should be tested as the network is designed to accommodate the proposed sof platform.Scheduling will be easy if the network and software teams work independently.It will be difficult to isolate the problem if two teams are implementing changes independently.Results from changes will be easier to reconcile and document if each team works in isolation.30Refer to the exhibit. How is the TCP/IP configuration information specified by the default-router and dns-server commands available?The TCP/IP information is forwarded to a 10.0.1.3 to be supplied to DHCP clients.The TCP/IP information is used by DNS clients to forward all data to the default gateway on R1 of 10.0.1.3.The TCP/IP information is supplied to any DHCP client on the network connected to the FastEthernet 0/0interface of R1.The TCP/IP information is applied to each packet that enters R1 through the FastEthernet 0/0 interface that are hosts on /24 network except packets from addresses 10.0.1.2, 10.0.1.16, and 10.0.1.254.31Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the problem?The default gateway is in the wrong subnet.STP has blocked the port that PC1 is connected to.Port Fa0/2 on S2 is assigned to the wrong VLAN.S2 has the wrong IP address assigned to the VLAN30 interface.32Refer to the exhibit. Which statement is true about the Frame Relay connection?The Frame Relay connection is in the process of negotiation.A congestion control mechanism is enabled on the Frame Relay connection.The “ACTIVE” status of the Frame Relay connection indicates that the network is expe riencing congestion.Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.33Which configuration on the vty lines provides the best security measure for network administrators to remotely access the co headquarters?34 A DHCP server is configured with a block of excluded addresses. What two devices would be assigned static addresses fromexcluded address range? (Choose two.)a protocol analyzerDNS server for the networknetwork printer that is used by many different usersa laptop that will get a different address each time it boots up35Which two functions are provided by the NCP during a PPP connection? (Choose two.)the identification of fault conditions for the PPP linkproviding multilink capabilities over the PPP linkbringing the network layer protocol or protocols up and downthe enhancement of security by providing callback over PPPthe negotiation of options for the IP protocolauthentication between the peer routers of the PPP link36Which address provides an example of an IPv6 link-local address?FE80::1324:ABCD2001:2345:AB12:1935::FEFF2001:1234:0000:9CA::0876/641234:ABCD:5678:EF00:9234:AA22:5527:FC3537Which combination of Layer 2 protocol and authentication should be used to establish a link without sending authentication in plain text between a Cisco and a non-Cisco router?PPP with PAPPPP with CHAPHDLC with PAPHDLC with CHAP38What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration o router that has been configured as a DHCP server?Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.39Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch offic VLSM is used, what mask should be used for addressing hosts at Branch4 with minimal waste from unused addresses?/19/20/21/22/23/2440What are two main components of data confidentiality? (Choose two.)checksumdigital certificatesencapsulationencryptionhashing41What major benefit does Cisco HDLC provide that ISO standard HDLC lacks?flow controlerror controlmultiprotocol supportcyclic redundancy checks42When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?access control listrouting protocolinbound interfaceARP cache43 A light manufacturing company wishes to replace its DSL service with a non-line-of-sight broadband wireless solution that ofcomparable speeds. Which solution should the customer choose?Wi-FisatelliteWiMAXMetro Ethernet44Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized partQoSlatencyreliabilityconfidentiality45Refer to the exhibit. A network administrator has been asked to configure PPP with CHAP authentication over the serial link routers R1 and R2. What additional configuration should be included on both routers to complete the task?46What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control lis on the inbound interface of a router?TCP traffic with a destination to the 10.25.132.0/24 is permitted.Only Telnet traffic is permitted to the 10.24.132.0/24 networkTtraffic from 10.25.132.0/24 is permitted to anywhere on using any port.Traffic using port 25 from the 10.25.132.0/24 is permitted to all destinations.47What is tunneling?using digital certificates to ensure that data endpoints are authenticcreating a hash to ensure the integrity of data as it traverses a networkusing alternate paths to avoid access control lists and bypass security measuresencapsulating an entire packet within another packet for transmission over a network48Which statement is true about wildcard masks?Inverting the subnet mask will always create the wildcard mask.The wildcard mask performs the same function as a subnet mask.A network or subnet bit is identified by a "1" in the wildcard mask.IP address bits that must be checked are identified by a "0" in the wildcard mask.49Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router R shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still re traffic between the two networks?Apply the ACL in the inbound direction.Apply the ACL on the FastEthernet 0/0 interface.Reverse the order of the TCP protocol statements in the ACL.Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet .50 A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. Howadministrator determine how this change has affected performance and availability on the company intranet?Conduct a performance test and compare with the baseline that was established previously.Determine performance on the intranet by monitoring load times of company web pages from remote sites.Interview departmental administrative assistants and determine if they think load time for web pages has improved.Compare the hit counts on the company web server for the current week to the values that were recorded in previous w 51Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across aviruswormTrojan horseman-in-the-middle52What are the symptoms when the s0/0/0 interface on a router is attached to an operational CSU/DSU that is generating a cloc the far end router on the point-to-point link has not been activated?show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.An employee of XYZ corporation will begin working from home. The employee has a choice ofDSL or cable technology for WAN connectivity. Which connectivity characteristic is accuratelydescribed?Cable transfer rates are dependent on the length of the local loop.DSL provides a high-speed connection over existing copper phone wires.DSL download speeds are affected by high usage in the area.DSL service shares the same frequency range as voice calls.Cable connectivity usually requires new fiber installed for the local loop.Refer to the exhibit. WestSW is supposed to send VLAN information to EastSW, but that did not occur. What will force WestSW to send a VLAN update to EastSW?Change EastSW to be a VTP server.Reload both WestSW and EastSW at the same time.Erase the VLAN database on EastSW and reload the switch.Reset the configuration revision number on EastSW to zero.Reload EastSW。

CCNA4思科第四学期第4最新答案

CCNA4思科第四学期第4最新答案

思科练习第四学期窗体底端1窗体顶端使用 Cisco AutoSecure 有哪两个好处?(选择两项。

)管理员可通过它来精确控制各种服务的启用和禁用情况。

它可提供立即禁用非关键系统进程和服务的功能。

它可自动将路由器配置为与 SDM 协同工作。

它可确保与您网络中的其它设备充分兼容。

它使管理员无需了解 Ci sco I OS 软件的所有功能即可配置安全策略。

窗体底端2窗体顶端用户无法访问公司服务器。

系统日志显示服务器运行缓慢,因为它正在收到具有高优先级的虚假服务请求。

这是什么类型的攻击?侦测访问DoS蠕虫病毒特洛伊木马窗体底端3窗体顶端下列哪两种说法定义了在网络中启用 DNS 服务所带来的安全风险?(选择两项。

)默认情况下,域名查询被发送到广播地址 255.255.255.255。

DNS 域名查询需要在所有路由器的以太网接口上启用ip directed-broadcast命令。

在一台路由器上使用全局配置命令ip nam e-server会在网络中的所有路由器上启用 DNS 服务。

基本 DNS 协议不提供身份验证或完整性保证。

路由器配置不提供用于设置主 DNS 服务器和备份 DNS 服务器的选项。

窗体底端4窗体顶端网络管理员在试图通过 TFTP 服务器升级 Ci sco I OS 映像前,必须检验哪两项?(选择两项。

)使用show h osts命令检验 TFTP 服务器的名称。

使用tftpdnld命令检验 TFTP 服务器是否正在运行。

使用show version命令检验映像的校验和是否有效。

使用ping命令检验路由器与 TFTP 服务器之间的连通性。

使用show fl ash命令检验闪存是否具有足够空间容纳新的 Cisco IOS 映像。

窗体底端5窗体顶端下列关于网络安全的说法中哪两项正确?(选择两项。

)保护网络免受内部威胁侵害具有较低的优先级,因为由公司员工带来的安全风险较低。

无论是能自己编写攻击代码的资深黑客,还是从 Internet 下载攻击程序的入门攻击者都可能对网络安全造成严重威胁。

CCNA第四学期Final(2010)

CCNA第四学期Final(2010)

请参见图示。

R1 针对内部网络10.1.1.0/24 执行NAT 过载。

主机 A 向web 服务器发送了一个数据包。

R1 收到的从web 服务器返回的数据包中,目的I10.1.1.2:8010.1.1.2:1234172.30.20.1:1234172.30.20.1:3333 DDDDDDDD2如果不以纯文本格式发送身份验证信息,在Cisco 和非Cisco 路由器之间建立链路连接时,应使用以下哪种身份验证和第 2 层协议的组合?BBB CHAP 和HDLCCHAP 和PPPPAP 和HDLCPAP 和PPP3请参见图示。

网络管理员创建一个标准访问控制列表,以禁止从网络192.168.1.0/24 访问网络192.168.2.0/24 并允许所有网络访问Internet。

应该在哪个路由应用该列表?Fa0/0 接口,入站Fa0/0 接口,出站Fa0/1 接口,入站Fa0/1 接口,出站4请参见图示。

要允许从网络172.16.10.0/24 中的主机发出的任何类型的网络流量进入Internet,并阻止从网络172.16.10.0/24 中的主机发出的所有FTP 流量在R2 的S0/0/0 接口入站方向应用哪一ACL?BBBB5管理员在提示符rommon 1> 后输入命令confreg 0x2142。

重新启动路由器时会产生什么效果?DDDRAM 中的内容将被清除。

RAM 中的内容将被忽略。

NVRAM 中的内容将被清除。

NVR AM 中的内容将被忽略。

6网络管理员正与应用程序团队合作,尝试解决服务器上某一应用程序的响应时间问题。

管理员已检查数据通路的网络部分,并确认了可能发生问题的多个区域。

组也确认了可能与当前软件版本有关的问题。

在应用程序团队为软件打补丁的同时,网络管理员开始着手解决网络问题。

下列哪种说法对此情况是正确的?对网络的更改将会揭示因新补丁导致的问题。

如果网络和软件团队独立工作,时间安排会更加困难。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

公司

A
A
2
SSH
存在不正确的访问控制列表条目。

访问列表中的
必须在
会防止以明文传输登录信息
如果身份验证失败,则会断开PPP 会话连接
会发起双向握手
容易遭受回送攻击
4命令show frame-relay map的输出如下:
Serial 0 (up): ip 192.168.151.4 dlci 122, dynamic, broadcast, status defined, active 下列哪三种说法正确描述了所示内容的意义?(选择三项。


192.168.151.4代表远程路由器的IP 地址
192.168.151.4代表本地串行接口的IP 地址
DLCI 122代表远程串行接口
DLCI 122代表用于连接远程地址的本地编号
broadcast表示动态路由协议(例如RIP v1)可通过此PVC 发送数据包
active表明ARP 进程正在工作
5路由器的SDM 主页会显示哪三点信息?(选择三项。


ARP 缓存
闪存的总容量和可用容量
路由表
已配置的LAN 接口的数量
是否配置了DHCP 服务器
该LAN 中路由器的数量
6从
非军事区
分界点
本地环路
网云
确保

确认
确保路由器上有通向
下列哪三种说法正确描述了
CSU/DSU
调制解调器用于端接本地数字环路。

CSU/DSU
调制解调器用于端接本地模拟环路。

路由器通常被视为
路由器通常被视为
10
在链路质量测试完毕后,
路由器在协商第
LCP
NCP
它会被丢弃。

它会被放到队列中,直到主机
它会被转换,源端口号保持为
它会被分配其端口范围内的第一个可用端口号。

交换虚电路的相关信息
将DLCI 映射到网络地址
提供流量控制
提供错误通知
提供拥塞通知
发送keepalive 数据包以检验PVC 的工作情况
14
请参见图示。

下列说法中哪三项正确?(选择三项。


启用了NAT 过载。

启用了动态NAT。

地址转换会失败。

接口配置不正确。

地址为192.168.1.255 的主机将被转换。

进入0/0/2 接口的流量先被转换,然后才流出串行接口0/0/0。

15
Internet
确保在受影响的客户端与公司的其它资源之间不存在其它常规连通性问题,从而缩小调查范围。

从物理层开始。

因为由外部供应商安装服务器会增大发生安装错误的可能性,
序,然后向下层逐层检查,直到物理层为止。

通过在服务器上安装协议分析器来隔离问题区域。

PVC
R2
多点拓扑是命令
18
20
22
24一
网络使用情况基线应该能快速揭示应用程序可用性。

24
比较容易的办法是先监控应用程序服务器上所有的数据输入,然后逐步调整到只监控到较少的变量。

网络发生变化或使用活动增多后,初始的基线值与当前状况就没有多少可比性了。

只要可行,网络管理员就应该尝试自动收集性能数据,尽量避免手动收集。

创建网络基线有助于确定设备的报警阈值。

可使用
应该根据安全策略来制定保护网络的步骤。


保护网络需要使用采用数据包过滤和
26
28
30下
32
34
访问列表中未指明36技
38
40
系统会在发送完

会允许从任何网络发往
会允许来自
会允许从
会允许所有
路由器会拒绝该命名,因为该命令不完整。

44创
启用
将两台路由器上的封装更改为

将用于连接

48下
50当52管
54下
56。

相关文档
最新文档