思科CCNA题目及答案

合集下载

思科认证CCNA认证试题和答案中文版

思科认证CCNA认证试题和答案中文版

思科认证CCNA认证试题和答案中文版思科认证CCNA认证试题和答案中文版想要获得思科认证,首先要参加由思科推荐并授权的培训中心(Cisco Training Partner,简称CTP)所开设的培训课程。

完成学业后再到由全球考试机构Sylvan Prometric授权的.考试中心参加由思科指定的科目的认证考试。

通过指定的系列科目考试后,学员就可以获得相应分支系列等级的资格认证。

下面是店铺为大家搜集的相关试题,供大家参考练习。

16、路由器A串口0配置如下interface serial0link-protocol pppppp pap local-user huawei password simple quidwayip address 2.2.2.1 255.0.0.0路由器B串口及全局配置如下local-user huawei service-type ppp password simple quidway!interface serial0link-protocol pppppp authentication-mode papip address 2.2.2.2 255.0.0.0当两台路由器串口0相连时,两台路由器是否可以连接到对端()(A) 能(B) 不能答案:A17、关于千兆以太网,以下说法正确的是( )(A) IEEE802.3ab定义了千兆以太网(B) 在同一冲突域中,千兆以太网不允许中继器的互连(C) IEEE802.3z专门定义了千兆以太网在双绞线上的传输标准(D) 千兆以太网支持网络速率的自适应,可以与快速以太网自动协商传输速率答案:AB参考知识点:华为3com认证教材第一册3-8页18、高层的协议将数据传递到网络层后,形成( ),而后传送到数据链路层(A) 数据帧(B) 信元(C) 数据包(D) 数据段答案:C参考知识点:华为3com认证教材第一册1-20页19、在路由器上配置帧中继静态map必须指定( )参数(A) 本地的DLCI(B) 对端的DLCI(C) 本地的协议地址(D) 对端的协议地址答案:AD20、路由器的主要性能指标不包括( )(A) 延迟(B) 流通量(C) 帧丢失率(D) 语音数据压缩比答案:D【思科认证CCNA认证试题和答案中文版】。

思科认证CCNA认证试题与答案中文版

思科认证CCNA认证试题与答案中文版
(A) 224. 0. 0.5 (B) 127. 32. 5. 62 (0202. 112.5.0 (D) 162. 111. 111. Ill
答案:D 注释:这个题目不是太严谨,应该加上子网掩码. A:224. 0. 0. 5 是多播地址 B: 127. 0.0. 0 保留作为测试使用 C:网络地址 26、 设置主接口由 up 转 down 后延迟 30 秒切换到备份接口,主 接口 由 down 转 up 后 60 秒钟切换回主接口的配置为()
忍一句,息一怒,饶一着,退一步。——《增广贤文》
人之为学,不日进则日退,独学无友,则孤陋而难成;久处一方,则习染而不自觉。——《顾炎武》
答案:D 注释:255. 255. 255. 255 是全网广播,DHCP 客户端发送全网广播来 查 找 DHCP 服务器. 24、 下而有关 NAT 叙述正确的是() (A) NAT 是英文“地址转换”的缩写,又称地址翻译 (B) XAT 用来实现私有地址与公用网络地址之间的转换 (C) 当内部网络的主机访问外部网络的时候,一定不需要 NAT (D) 地址转换的提出为解决 IP 地址紧张的问题提供了一个有效途 径 答案:ABD 25、 以下属于正确的主机的 IP 地址的是()
(A) arp-a (B) traceroute (C) routeprint (D) displayiprouting-table
答案:D 23、 D0. 0. 0 (B) 10. 0. 0. 1 (0127. 0. 0. 1 (D)255. 255. 255. 255
192. 168. 1. 1
答案:D 注释:PC 的'默认网关要指向路由器的以太网口的 IP 地址. 28、 ISDNB 信道速率是()
(A) 16kbps (B) 64kbps

思科CCNA第一学期期末考试答案

思科CCNA第一学期期末考试答案
交叉电缆
连接
1 -
直通电缆
连接
2 -
交叉电缆
连接
3 -
交叉电缆
连接
1 -
直通电缆
连接
2 -
交叉电缆
连接
3 -
直通电缆
连接
1 -
交叉电缆
连接
2 -
直通电缆
连接
3 -
交叉电缆
-

请参见图示。I
主机的默认网关。
主机的IP地址
主机的首选域名服务器。
主机的主页IP地址
请参见图示。对图示拓扑可以得出哪两项结论?(选择两项)
下列哪个端口号范围为服务器上运行的应用程序常用的服务而保留?
0到255
0到1023
1024到49151
49152到65535
以下哪组
.0
以下哪个OSI协议层提供面向连接的可靠数据通信服务? 应用层
演示文稿
会话
传输层
n etwork
何时必须使用clock rate命令配置路由器串行接口?
当该接口充当DTE设备时闭时
当该接口充当DCE设备时
下列哪些是私有IP地址的地址范围?(选择三项。)
10.0.0
请参见图示。每条介质链路都已标记。应该使用哪种类型的电缆连接不同设备?
连接
1 -
全反电缆
连接
2 -
直通电缆
连接
3 -
交叉电缆
连接
1 -
交叉电缆
连接
2 -
全反电缆
连接
3 -

思科CCNA考证习题答案

思科CCNA考证习题答案

1. what could be possible causes for the "Serial0/0 is down"interface status? 这可能是为“Serial0 / 0的可能原因是向下”接口的状态?TWOA.a layer 1 problem exists.1层存在问题D.an incorrect cable is being used。

2.before installing a new,upgraded version of the ios,what should be checked on the router,and which command should be used to gather this information?在安装一个新的,升级的IOS版本,应该怎样检查路由器上,并命令应该被用来收集这些资料?B.the amount of avaiable flash and ram 缴费的闪存和RAM的数量D.show version 显示版本3.refer to the exhibit. which two statements are true about inter VLAN routing in the topology that is shown in the exhibit?(choose two)指展览。

这两个语句是对国际米兰的是在展会上展出的拓扑路由的VLAN是否属实?D. the FastEthernet 0/0 inerface on router1 must be configured with subinterfaces.关于路由器1的在FastEthernet 0/0 inerface 必须配置子接口F.the FastEthernet 0/0 interface on router1 and switch2 trunk ports must be configured using the same encapsulation type. 对在FastEthernet 0/0 接口上路由器1和交换器2中继端口必须配置使用相同的封装类型。

思科CCNA语音习题和答案

思科CCNA语音习题和答案

1.使用以下哪个平台运行Cisco Unified CME?a.Cisco媒体集成服务器材b.Cisco1861 路由器c.Cisco3550交换机d.Cisco 3750交换机e.Cisco UC500统一通信管理商用版本相比统一通信管理器有哪些好处?a.支持非CiscoIP电话b.基于SIP的信令支持c.支持大规模的部署d.集成语言邮件支持2.以下哪个设备允许将模拟传真机中的信号转换为V oIP数据包?a.Cisco 3911b.Cisco 7985Gc.Cisco A TAd.Cisco扩展模块3.以下哪些术语与VLAN的意思相同?a.IP子网b.端口安全c.广播域d.冲突域4.以下哪些中继协议将Cisco交换机连接到非Cisco交换设备?a.VTPb.802.3afc.802.1Qd.ISL5.以下哪些协议可以将Cisco交换机使用以下哪种VTP模式?a.客户端b.服务器c.透明d.默认禁用VTP6.一部Cisco2801 CME路由器能够支持多少部CiscoIP电话?a.8b.24c.50d.1447.运行一台Cisco Unified CME路由器需要下列哪些授权?a.IDS授权b.用户授权c.电话授权d.电话用户授权e.特征授权8.下列哪个文件CiscoIP电话在启动过程中从TFTP服务器下载的?a.固件b.保持音乐c.模板d.配置文件9.当连接到CME路由器时,Cisco7960电话应使用下列哪个指定的固件文件?a.tftp_severb.loadc.firmware-load7960d.firmware-load10.ephone-dn配置在single-line模式中时,不允许以下哪些特性发生?a.呼叫保持b.扬声器c.重播d.会议11.为GME环境创建本地电话directory时,必须遵从以下哪个步骤?a.使用directory命令给每个ephone-dn分配目录项b.在使用name命令分配caller-id信息时,CME自动创建目录项c.使用命令给每个分配目录项d.进入目录项配置模式。

ccna面试题目

ccna面试题目

ccna面试题目在准备CCNA(Cisco Certified Network Associate)面试时,需要掌握并准确回答相关的面试题目。

本文将就一些常见的CCNA面试题目进行讨论,以帮助读者更好地应对这些挑战。

以下是一些常见的CCNA面试题目及其详细解答。

题目一:什么是OSI模型?它由哪些层组成?答:OSI模型是开放式系统互连参考模型(Open Systems Interconnection Reference Model)的简称,它是国际标准化组织(ISO)制定的一个用于计算机网络互连的概念模型。

OSI模型共由七个层组成,分别是物理层、数据链路层、网络层、传输层、会话层、表示层和应用层。

每一层都有其特定的功能和协议。

题目二:请解释一下TCP/IP协议族。

答:TCP/IP协议族是一系列协议的集合,用于在因特网上进行通信。

它由包括互联网协议(IP)、传输控制协议(TCP)、用户数据报协议(UDP)等在内的多个协议组成。

其中,IP协议负责将数据包从源地址传输到目的地址,TCP协议提供可靠的连接和数据传输服务,UDP协议则提供不可靠但效率较高的数据传输服务。

题目三:请描述一下子网掩码的作用。

答:子网掩码用于将IP地址分为网络地址和主机地址两部分,确定子网中主机的数量和网络范围。

通过与IP地址进行逻辑与运算,子网掩码能够识别网络地址和主机地址。

网络中的路由器使用子网掩码来确定数据包的传输路径,以便正确地将数据包发送到目标主机。

题目四:请解释一下DNS的作用。

答:DNS(Domain Name System)是用于将域名解析为IP地址的分布式命名系统。

当我们在浏览器输入一个域名时,DNS会将该域名翻译为相应的IP地址,以便能够正确地连接到目标服务器。

DNS的作用是提供可读性强的域名,方便用户访问互联网,同时减轻记忆IP地址的负担。

题目五:请解释一下路由器和交换机的区别。

答:路由器和交换机是网络中两种不同的设备。

思科CCNA学习试题答案

思科CCNA学习试题答案

思科CCNA学习试题答案CCNA课程测试一、单项选择题:1、介质100BaeT的最大传输距离是:()A:10mB:100mC:1000mD:500m2、路由器下,由一般用户模式进入特权用户模式的命令是:()A:enableB:configC:interfaceD:router3、哪个命令可以成功测试网络:()A:Router>ping192.5.5.0B:Router#ping192.5.5.30C:Router>ping192.5.5.256D:Router#ping192.5.5.2554、介质工作在OSI 的哪一层()A:物理层B:数据链路层C:网络层D:传输层5、100baeT的速率是()Mbit/A:1B:10C:100D:10006、在启用IGRP协议时,所需要的参数是:()A:网络掩码B:子网号C:自治系统号D:跳数7、基本IP访问权限表的表号范围是:()A:1—100B:1-99C:100-199D:800-8998、查看路由表的命令是:()A:howinterfaceB:howrunC:howiprouteD:howtable9、工作在OSI第三层的设备是:()A:网卡B:路由器C:交换机D:集线器10、OSI第二层数据封装完成后的名称是:()A:比特B:包C:帧D:段11、为了禁止网络210.93.105.0ftp到网络223.8.151.0,允许其他信息传输,则能实现该功能的选项是:()A:acce-lit1deny210.93.105.0.0.0.0.0.0B:acce-lit100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpC:acce-lit100permitipanyanyD:acce-lit100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpacce-lit100permitipanyany12、路由器下“特权用户模式”的标识符是:()A:>B:!C:#D:(config-if)#13、把指定端口添加到VLAN的命令是:() A:vlanB:vlan-memberhipC:vtpD:witchport14、交换机工作在OSI七层模型的哪一层()A:物理层B:数据链路层C:网络层D:传输层15、在OSI七层模型中,介质工作在哪一层()A:传输层B:会话层C:物理层D:应用层16、交换机转发数据到目的地依靠()A:路由表B:MAC地址表C:访问权限表D:静态列表17、为了使配置私有IP的设备能够访问互联网,应采用的技术是()?A:NATB:VLANC:ACCESS-LISTD:DDR18、VLAN主干协议VTP的默认工作模式是()A:服务器模式B:客户端模式C:透明模式D:以上三者都不是19、路由器的配置文件tartup-config存放在()里A:RAMB:ROMC:FLASHD:NVRAM20、配置路由器特权用户“加密密码”的命令是:()A:pawordB:enablepawordC:enableecretD:pawd21、某网络中,拟设计10子网,每个子网中放有14台设备,用IP地址段为199.41.10.某,请问符合此种规划的子网掩码是()A:255.255.255.0B:255.255.240.0C:255.255.255.240D:255.248.0.022、在路由表中到达同一网络的路由有:静态路由、RIP路由、IGRP路由,OSPF路由,则路由器会选用哪条路由传输数据:()A:静态路由B:RIP路由C:IGRP路由D:OSPF路由23、扩展IP访问权限表的表号范围是:()A:1—100B:1-99C:100-199D:800-89924、把访问权限表应用到路由器端口的命令是:()A:permitacce-lit101outB:ipacce-group101outC:applyacce-lit101outD:acce-cla101out25、混合型协议既具有“距离矢量路由协议”的特性,又具有“链路状态路由协议”的特性,下列协议中属于混合型协议的是:()A:RIPB:OSPFC:EIGRPD:IGRP26、在路由器上,命令howacce-lit的功能是():A:显示访问控制列表内容B:显示路由表内容C:显示端口配置信息D:显示活动配置文件27、RIP路由协议认为“网络不可到达”的跳数是:()A:8B:16C:24D:10028、查看E0端口配置信息的命令是:()A:howacce-litB:howiprouteC:howverionD:howinterfacee029、配置路由器时,封装PPP协议的命令是:()A:encappppB:pppC:grouppppD:intppp30、路由器上“水平分割”的功能是:()A:分离端口B:阻止路由环路C:简化配置D:方便故障处理31、OSI七层模型中,“包”是哪一层数据封装的名称()A:物理层B:数据链路层C:网络层D:传输层32、OSI七层模型中,“段”是哪一层数据封装的名称()A:物理层B:数据链路层C:网络层D:传输层33、备份路由器IOS的命令是:()A:copyflahtftpB:copyrunning-configtftpC:copyIOStftpD:copytartup-configtftp34、PPP工作在OSI的哪一层()A:物理层B:数据链路层C:网络层D:传输层35、FTP工作在OSI哪一层()A:会话层B:表示层C:传输层D:应用层36、TELNET工作在OSI哪一层()A:会话层B:表示层C:传输层D:应用层37、SMTP工作在OSI哪一层()A:会话层B:表示层C:传输层D:应用层38、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的子网号为()A:192.168.50.32B:192.168.80.64C:192.168.50.96D:192.168.50.7139、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的广播地址为()A:192.168.50.32B:192.168.80.64C:192.168.50.96D:192.168.50.7140、IP地址为:192.168.50.70,掩码为:255.255.255.248,则该A:createB:interfaceC:encapulationD:ipaddre75、路由器上,命令“howint0”的显示结果为:Serial0iup,lineprotocolidown出现该结果的可能原因是()A:端口处于关闭状态B:物理端口被烧毁C:两端设备协议不一致D:路由表中无路由76、如果把路由器的某个端口的IP配置为:192.168.10.64,掩码配置为:255.255.255.248,则该端口()A:能和其他设备正常通信B:会变成“adminitrativelydown”状态C:端口被烧毁D:出现错误提示,配置命令执行失败77、网关的功能()A:过滤数据包B:不同网段通信C:校验数据帧D:把数据封装成“段”78、能够分配给设备的IP,应该是()A:网络有效IPB:网络号C:网络广播地址D:任意IP79、路由器“全局模式”的提示符为()A:>B:#C:(config)#D:(config-router)#80、路由器当前的模式为“端口模式”,要退回到“特权模式”,应该使用的快捷键为()A:ctrl+bB:ctrl+zC:ctrl+cD:ctrl+p81、下列命令中,无法正确执行的是()A:Router(config)#howrunB:Router#ping127.0.0.1C:Router(config)#hotn amecicoD:Router#reload82、路由器上,设置端口速率的命令是()A:clockrateB:bandwidthC:etD:encap83、路由器上,清空路由表的命令是()A:clearipB:deleteiprouteC:deleterouteD:cleariproute某84、路由表中,某条路由的“路由代码为D”,则表明该路由为()A:直连路由B:静态路由C:IGRP路由D:EIGRP路由85、两台路由器直连到一起,应该使用的线缆为()A:交叉线缆B:直通线缆C:反转线缆D:任意线缆86、通过路由器的“配置端口conole”对路由器进行配置,应该使用的线缆为()A:交叉线缆B:直通线缆C:反转线缆D:任意线缆87、下面对Cico2621路由器和Cico2501路由器描述中,错误的是()A:Cico2621路由器的可扩展性优于Cico2501路由器B:Cico2621是模块化路由器C:Cico2501上提供一个100Mbit/的快速以太网端口D:Cico2501是固定端口的路由器88、为了连接“帧中继”线路,网络中的路由器需要提供的端口类型为()A:FatEthernetB:SerialC:BRID:Ethernet89、路由器“特权模式”的提示符是:()A:>B:#C:(config)#D:(config-if)#90、下列关于路由器和交换机的描述中,错误的是()A:路由器可以用来连接internet B:二层交换机可以用来实现“异地网络”互连C:路由器可以用来做路径选择D:交换机可以转发广播二、多项选择题:正确答案的个数在每题的题后括号中有说明91、在路由器上,可以使用的命令有:()[选3个]A:pingB:howinterfaceC:howiprouteD:ipconfigE:wincfg92、在配置帧中继子接口时,在物理接口上应该配置的内容是:()[选3个]A:配置IP地址B:封装帧中继协议C:指定子接口类型D:设定子接口E:配置密码93、请选出交换机处理帧的三种模式:()[选3个]A:直通模式B:存储转发模式C:侦测模式D:分段模式E:阻塞模式94、对于IP为199.41.27.0,子网掩码为255.255.255.240,则该IP地址和子网掩码相作用会得到一系列IP,从下列选项中选出属于“有效IP”的选项:()[选3个]A:199.141.27.33B:199.141.27.112C:199.141.27.119D:199.141.27.126E:199.141.27.175F:199.141.27.20895、属于私有IP 段的是()[选3个]A:10.0.0.0-10.255.255.255B:172.16.0.0-172.31.255.255C:202.110.100.0-202.110.100.255D:192.168.0.0-192.168.255.255E:126.0.0.0-126.255.255.25596、下列哪一设备工作时,要用到OSI的七个层(一层到七层)()[选3个]A:PCB:网管机C:WEB服务器D:交换机E:路由器97、网络中经常使用DDN服务,请选出DDN的优点()[选3个]A:传输质量高B:接入方式灵活C:偷占带宽D:使用虚电路E:专用线路98、网络中经常使用“帧中继”服务,请选出帧中继的优点()[选3个]A:偷占带宽B:提供拥塞管理机制C:可以使用任意广域网协议D:灵活的接入方式99、默认情况下,IGRP衡量路径好坏时,考虑的因素为()[选2个]A:带宽B:可靠性C:最大传输单元D:延时100、交换机的三大功能为()[选3个]A:地址学习B:转发过滤C:消除回路D:发送数据包。

CCNA 思科网络章节考试题及答案《物理层》

CCNA 思科网络章节考试题及答案《物理层》

《物理层》2.使用什么设备可以检查安装的光纤是否存在错误并检查其完整性和介质性能?光注入器OTDRTDR万用表3.以下哪些特征描述的是光缆?(选择两项)不受EMI 或RFI 影响。

每对电缆都包裹在金属箔中。

结合取消、屏蔽和绕绞技术来保护数据。

最高速度为100 Mbps。

最昂贵的LAN 电缆类型。

通过控制台端口连接路由器时连接两台交换机时连接主机与交换机时连接两台路由器时请参见图示。

哪种 5 类电缆用于在主机 A 和主机 B 之间建立以太网连接?同轴电缆全反电缆交叉电缆直通电缆6.哪种信号传输方法使用无线电波传送信号?电光无线声7.大多数企业LAN 中的双绞线网络电缆使用哪种连接器?BNCRJ-11RJ-45F 型8.以下哪项是单模光缆的特征?一般使用LED 作为光源因为有多条光通路,核心相对较粗价格比多模低一般使用激光作为光源9.哪种电缆通常与光缆相关联?主干电缆水平电缆跳线电缆工作区域电缆10.数据传输的三种量度标准是什么?(选择三项)实际吞吐量频率幅度吞吐量串扰带宽11如果在网络中使用非屏蔽双绞线铜缆,导致线对内串扰的原因是什么?相邻线对周围的磁场使用编织线屏蔽相邻线对从电缆远端反射回来的电波因两个节点尝试同时使用介质而导致的冲突12.在网络中传输数据时,物理层的主要作用是什么?创建信号以表示介质上每个帧中的比特为设备提供物理编址确定数据包的网络通路控制数据对介质的访问13.在可能存在电气危险或电磁干扰的LAN 安装中,主干布线建议使用哪种类型的介质?同轴光纤5e 类UTP6 类UTPSTP14.对网络电缆采用的连接器不正确可能产生什么后果?会将数据转发到错误的节点。

通过该电缆传输的数据可能发生信号丢失。

将对该电缆中传输的数据采用不正确的信号方法。

该电缆中发送的数据所采用的编码方法将更改,用于补偿不当连接。

15.哪种光纤连接器支持全双工以太网?16.以下哪项被视为选择无线介质的优点?主机移动更方便安全风险更低减少干扰的影响环境对有效覆盖面积的影响更小17.UTP 电缆的哪个特征有助于减少干扰的影响?屏蔽层中的金属编织包裹核心的反射涂层电缆中的线对绕绞外皮中的绝缘材料。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CCNA-Cisco-Chapter11C11 An electrician has investigated your recent power problems and has suggested that they are caused by oscillation. What is the BEST solution to your problem?Move the network server to another roomReplace UTP with fiber optic cable* Rewire the electrical systemFit commercial surge suppressors2 What is another term that can be used to describe an Intermediate Distribution Frame (IDF)? work area (WA)telecommunications outlet (TO)main cross-connect (MCC)* horizontal cross-connect (HCC)3 Why is fiber optic cable commonly used as a network backbone between campus buildings?It provides a less resistive path for electrical current to flow from one building to anotherIt enhances the signals at the physical layer* It reduces the hazardous effects of electrical potential difference and lightning strikesIt is cheaper and easier to install than copper wire4 Which of the following environmental specifications are recommended for a wiring closet ? Carpeted floor; tiled walls and an inward opening doorWooden floor; brick walls and fluorescent lightingTiled floor; internal power outlets and a dropped ceiling* Raised floor; wood covered walls and an internal light switch5 What is one of the most significant causes of oscillatory noise problems on a power circuit? ??? Long wiring runsSchool photocopiersLocating power cables in elevator shaftsAir conditioners cycling on and off6 What device is best used to minimize the effects of power line sags and brownouts?A primary protection deviceA surge suppressorAn optical isolator* An uninterruptible power supply7 What causes Electrostatic Discharge (ESD)?Long power linesFaulty electrical equipment* An accumulation of static electricityAn increase in atmospheric humidity8 Which of the following problems is caused by too high a humidity level in a wiring closet? Signal degradation* Copper wire corrosionInsulation failurePower surges9 What is the ideal room temperature and relative humidity at which a wiring closet should bemaintained?* 21 degrees Celsius / 45 % relative humidity21 degrees Fahrenheit / 45 % relative humidity45 degrees Celsius / 21 % relative humidity45 degrees Fahrenheit / 21 % relative humidity10 What is the maximum length specified for 62.5/125µm multimode optical fiber run between the MDF and IDF?90 m800 m2000 m* 3000 m11 What are the three components that make up an uninterruptible power supply?* A battery, inverter and battery chargerA MOV, capacitor and diodeA generator, changeover circuit and server softwareA circuit breaker, fuse and battery12 Where does the horizontal cable extend?From the main distribution frame in the wiring closet to the vertical cross connect in the intermediate distribution frameFrom the telecommunications outlet in the work area to the horizontal cross-connect in the telecommunications closet* From the patch panel in the point of presence to the backbone connection in the customer premises equipmentFrom the telecommunications outlet in the wiring closet to the conduit in the intermediate distribution frame13 Which statement BEST describes the current flow in an electrical circuit with a DC source?* It is constant over timeIt varies over timeIt increases with timeIt decreases with time14 Why are exposed metal components normally connected to the ground, or earth, pin of a power outlet?The connection is needed to increase the resistance of the circuit to ground* If an electrical fault occurs in the equipment, the connection will reduce the chance of shock Connecting the metal to ground makes it act like an insulatorThe ground connection can act as an alternative path for controlled current flow if the neutral wire is disconnected15 What is the term used to describe a problem in an electrical system between the hot, or live, wire and the neutral wire?An isolated mode problemA ground fault problem* A common mode problemA normal mode problem16 What function does an electrical insulator perform?It completes the circuit, allowing current to flowIt reduces the resistance in an electrical circuitIt allows a short circuit to be present* It prevents uncontrolled current flow17 What is an alternative name for backbone cabling?Horizontal cabling* Vertical cablingMain cablingTrunk cabling18 Why can digital electronic equipment, such as a computer, malfunction if subjected to excessive power line noise?Logic gates are unable to correctly distinguish the noise polarityThe noise enhances the digital signal edgesThe noise replaces the digital signal* Logic gates are unable to correctly distinguish between a one and a zero19 A potential wiring closet has been identified in a building with a floor area of 930 sq. m. The distance from this closet to the furthest workstation is 127 m. How many ADDITIONAL wiring closets would need to be installed?* 012820 Why is copper considered a good conductor of electricity?* It offers a path of least resistance to current flowIt is easily formed into wiresIt is cheaper than other metalsIt reduces power line noise21 In a controlled electrical circuit, which path do electrons normally follow?From the positively charged source to ground* From the negatively charged source to a positively charged sourceFrom the more positively charged source to the less positively charged sourceFrom the negatively charged source to ground22 What is the purpose of providing a ground, or earth, connection on a wall power outlet?To reduce the resistance in the electrical circuitTo link the neutral wire to ground* To allow fault currents to flow to groundTo complete the circuit for normal current to flow23 What is a possible problem associated with multiple building grounds?They are often at the same potential with respect to each otherThey do not allow electrical current to flow between the buildingsSeparate protective devices are needed at each building* They may present a shock hazard due to different potentials24 What features should be considered when assessing a potential wiring closet?It should be secure and situated on the first (ground) floor???? It should be secure and close to the POPIt should be within 150 m of the MDF and close to an entranceIt should be an internal room and close to the electrical supply distributionC21. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow2. Select the statements that are correct concerning network protocols. (Choose three.) define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layerslimit the need for hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors3. What are two functions of encapsulation? (Choose two.)tracks delay between end devicesenables consistent network paths for communicationallows modification of the original data before transmissionidentifies pieces of data as part of the same communicationensures that data pieces can be directed to the correct receiving end device4. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detectionensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection5. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow6. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation7. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flowretime and retransmit data signalsdetermine pathways for data10. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection. The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).12. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the networkto identify the source and destination end devices that are communicatingto identify the processes or services that are communicating within the end devices13. What device is considered an intermediary device?file serverIP phonelaptopprinterswitch16. Which layer encapsulates the segment into packets?physicaldata linknetworktransport17. What can be identified by examining the network layer header?the destination device on the local mediathe destination host addressthe bits that will be transferred over the mediathe source application or process creating the data18. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata presentationreliability, flow control, and error detectionnetwork media controlthe division of segments into packets19. During the encapsulation process, what occurs at the data link layer?No address is added.The logical address is added.The physical address is added.The process port number is added.21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?4physical, network, application, data link, presentation, session, transport application, physical, session, transport, network, data link, presentation application, presentation, physical, session, data link, transport, network application, presentation, session, transport, network, data link, physical presentation, data link, session, transport, network, physical, application22. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)34NetworkTransportPhysicalData LinkSessionC31 How does the application layer on a server usually process multiple client request for services?ceases all connections to the servicedenies multiple connections to a single daemonsuspends the current connection to allow the new connectionuses support from lower layer functions to distinguish between connections to the service2 A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)User accounts are centralized.Security is difficult to enforce.Specialized operating system software is required.File permissions are controlled by a single computer.A computer that responds to a file sharing request is functioning as a server.3 What is the purpose of resource records in DNS?temporarily holds resolved entriesused by the server to resolve namessent by the client to during a querypasses authentication information between the server and client4 A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)centralized administrationdoes not require specialized softwaresecurity is easier to enforcelower cost implementationprovides a single point of failure5 What are three properties of peer-to-peer applications? (Choose three.)acts as both a client and server within the same communicationrequires centralized account administrationhybrid mode includes a centralized directory of filescan be used in client-server networksrequires a direct physical connection between devicescentralized authentication is required6 As compared to SSH, what is the primary disadvantage of telnet?not widely availabledoes not support encryptionconsumes more network bandwidthdoes not support authentication7 What is the automated service that matches resource names with the required IP address?HTTPSSHFQDNDNSTelnetSMTP8 What application layer protocol describes the services that are used for file sharing in Microsoft networks?DHCPDNSSMBSMTPTelnet9 Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)ASPFTPHTMLHTTPHTTPSIP10 What three protocols operate at the Application layer of the OSI model? (Choose three.)ARPDNSPPPSMTPPOPICMP11 Which layer of the OSI model supplies services that allow user to interface with the network?physicalsessionnetworkpresentationapplicationtransport12 Which email components are used to forward mail between servers? (Choose two.) MDAIMAPMTAPOPSMTPMUA13 What are two forms of application layer software? (Choose two.)applicationsdialogsrequestsservicessyntax14 Which statements are correct concerning the role of the MTA in handling email? (Choose three.)routes email to the MDA on other serversreceives email from the client's MUAreceives email via the POP3 protocolpasses email to the MDA for final deliveryuses SMTP to route email between serversdelivers email to clients via the POP3 protocol15 What are two characteristics of clients in data networks? (Choose two.)use daemonsinitiate data exchangesare repositories of datamay upload data to serverslisten for requests from servers16 What is the role of the OSI application layer?provides segmentation of dataprovides encryption and conversion of dataprovides the interface between the applications on either end of the network provides control of all the data flowing between the source and destination devices 17 Which application layer protocols correctly match a corresponding function? (Choose two.)DNS dynamically allocates IP addresses to hostsHTTP transfers data from a web server to a clientPOP delivers email from the client to the server email serverSMTP supports file sharingTelnet provides a virtual connection for remote access19 What are two characteristics of peer-to-peer networks? (Choose two.) scalableone way data flowdecentralized resourcescentralized user accountsresource sharing without a dedicated server20 What application layer protocol is commonly used to support for file transfers between a client and a server?HTMLHTTPFTPTelnetC42. With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?0 to 255256 to 10220 to 10231024 to 204749153 to 655353. Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segmentto determine which Layer 3 protocol should be used to encapsulate the datato enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order4. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?applicationpresentationsessiontransportnetwork6. Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical orderto prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts7. Which two options represent Layer 4 addressing? (Choose two.)identifies the destination networkidentifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media10. What is dynamically selected by the source host when forwarding data? destination logical addresssource physical addressdefault gateway addresssource port11. What are two features of the User Datagram Protocol (UDP)? (Choose two.) flow controllow overheadconnectionlessconnection-orientedsequence and acknowledgements12. What mechanism is used by TCP to provide flow control as segments travel from source to destination?sequence numberssession establishmentwindow sizeacknowledgments13. Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?TCPIPUDPHTTPDNS14. Which information is found in both the TCP and UDP header information? sequencingflow controlacknowledgmentssource and destination port15. Which three features allow TCP to reliably and accurately track the transmission of data from source to destination? (Choose three.)flow controlurgent pointerbest effort deliverysession establishmentconnectionless servicesnumbering and sequencing16. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?The packets will not be delivered.The packets will be retransmitted from the source.The packets will be delivered and reassembled at the destination.The packets will be delivered and not reassembled at the destination.17. Which is an important characteristic of UDP?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery18. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?1353801024172819. Which event occurs during the transport layer three-way handshake?The two applications exchange data.TCP initializes the sequence numbers for the sessions.UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client.C51 What is the purpose of a default gateway?physically connects a computer to a networkprovides a permanent address to a computeridentifies the network to which a computer is connectedidentifies the logical address of a networked computer and uniquely identifies it to the rest of the networkidentifies the device that allows local network computers to communicate with devices on other networks2 What type of routing uses information that is manually entered into the routing table?dynamicinteriorstaticstandard4 Which IP packet field will prevent endless loops?type-of-serviceidentificationflagstime-to-liveheader checksum6 What is a component of a routing table entry?the MAC address of the interface of the routerthe destination Layer 4 port numberthe destination host addressthe next-hop address7 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?destination network addresssource network addresssource MAC addresswell known port destination address8 What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address9 If the default gateway is configured incorrectly on the host, what is the impact on communications?The host is unable to communicate on the local network.The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.There is no impact on communications.10 In a connectionless system, which of the following is correct?The destination is contacted before a packet is sent.The destination is not contacted before a packet is sent.The destination sends an acknowledgement to the source that indicates the packet was received.The destination sends an acknowledgement to the source that requests the next packet to be sent.11 Which portion of the network layer address does a router use to forward packets? host portionbroadcast addressnetwork portiongateway address13 When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)The router sends an ARP request to determine the required next hop address.The router discards the packet.The router forwards the packet toward the next hop indicated in the ARP table.The router forwards the packet to the interface indicated by the source address.The router forwards the packet out the interface indicated by the default route entry.14 What are three common problems with a large network? (Choose three.)too few broadcastsperformance degradationsecurity issueslimited management responsibilityhost identificationprotocol compatibility15 Which three statements are true about routes and their use? (Choose three.)If no route to the destination network is found, the packet is returned to the previous router.If the destination network is directly connected, the router forwards the packet to the destination host.If multiple network entries exist for the destination network, the most general route is used to forward the packet.If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.If a host does not have a route manually configured for the destination network, the host will drop the packet.16 Which intermediary devices could be used to implement security between networks? (Choose two.)routerhubswitchfirewallaccess pointbridge19 What are the key factors to consider when grouping hosts into a common network? (Choose three.)gatewayspurposephysical addressingsoftware versiongeographic locationownership20 What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)require no device configurationprovide routers with up-to-date routing tablesrequire less processing power than static routes requireconsume bandwidth to exchange route informationprevent manual configuration and maintenance of the routing table21. What statement describes the purpose of a default route?A host uses a default route to transfer data to another host on the same network segment.A host uses a default route to forward data to the local switch as the next hop to all destinations.A host uses a default route to identify the Layer 2 address of an end device on the local network.A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.C62 Which IPv4 subnetted addresses represent valid host addresses? (Choose three.) 172.16.4.127 /26172.16.4.155 /26172.16.4.193 /26172.16.4.95 /27172.16.4.159 /27172.16.4.207 /273 Which statements are true regarding IP addressing? (Choose two.)NAT translates public addresses to private addresses destined for the Internet.Only one company is allowed to use a specific private network address space.Private addresses are blocked from public Internet by router.Network 172.32.0.0 is part of the private address space.IP address 127.0.0.1 can be used for a host to direct traffic to itself.4 Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?binary addinghexadecimal andingbinary divisionbinary multiplicationbinary ANDing5 What is the network address of the host 172.25.67.99 /23 in binary?10101100. 00011001.01000011.0000000010101100. 00011001.01000011.1111111110101100. 00011001.01000010.0000000010101100. 00011001.01000010.0110001110101100. 00010001.01000011. 0110001010101100. 00011001.00000000.000000006 What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?255.255.0.0255.255.255.0255.255.254.0255.255.248.07 Which three IP addresses are private? (Choose three.)172.168.33.110.35.66.70192.168.99.5172.18.88.90192.33.55.89172.35.16.58 Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?This is a useable host address.This is a broadcast address.This is a network address.This is not a valid address.11 Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)LAN workstationsserversnetwork printersroutersremote workstationslaptops12 Which of the following are features of IPv6? (Choose three.)larger address spacefaster routing protocolsdata types and classes of serviceauthentication and encryptionimproved host naming conventionssame addressing scheme as IPv413 A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160172.16.192.168172.16.192.17614 What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)The router will discard the packet.The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.The router will send a time exceeded message to the source host.The router will increment the TTL value and forward the packet to the next router on the path to the destination host.The router will send an ICMP Redirect Message to the source host.16 How many bits make up an IPv4 address?12864483217 What is the primary reason for development of IPv6?securityheader format simplificationexpanded addressing capabilitiesaddressing simplification18 What three facts are true about the network portion of an IPv4 address? (Choose three.)identifies an individual deviceis identical for all hosts in a broadcast domainis altered as packet is forwardedvaries in lengthis used to forward packetsuses flat addressing19 What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?an interneta networkan octeta radixC71 What is a function of the data link layer?。

相关文档
最新文档