ccna第六章练习答案
cisco36ccna第三学期第六章试题及答案.docx

丫y1 下列冇关OSPFDR和BDR选举的说法中哪项正确?匚每次添加新的OSPF相邻设备时都会发生DR/BDR选举。
E 具有最高OSPF优先级设置的路由器会在DR选举中获胜。
C连接到多路访问网络的路由器的默认优先级值为0。
C 当使用默认优先级值时,具冇最高MAC地址的路由器会被选为DR。
2下列哪两项与帧中继OSPF点对多点环境有关?(选择两项。
)17不选举DRo厂OSPF优先级值决定了帧中继链路上的活动DRoV OSPF邻居路由器是静态定义的。
厂链路类型被标识为广播多路访问。
厂BDR的路由器ID比DR路由器ID更高。
之前Router# show ip r <省略部分输出〉Gateway of last re10.0.0.0/8isvaC 10.16.1.0/270 10.16.J64匚S 10.16.1.64/30 10.16,1?129.192.168.1.0/30C 192.168.1.00 192.168.1.4C 198.18.1.0/24请参见图示。
命令ip route 10.16.1.64 255.255.255.252 s0/0/0己输入路由器中。
为什么路由表中除网络10.16.1.64/27 ;E 路由器将10.16.1.64/30和10.16.1.64/27视为不同的网络。
C 静态路由用作发往10.16.1.64/27的数据包的备用路由。
C 静态路由的AD比OSPF路由的AD低。
匚静态路由度戢比网络10.16.1.64/27的OSPF度量低。
请参见图示。
黑体显示的值128有什么用途?E 它是OSPF开销度量。
C它是OSPF管理距离。
匚这是Dijkstra算法指定的值,表示以跳数为单位的网络距离。
匚它是分配给接口的值,DUAL算法使用该值来确定度量。
BDR请参见图示。
A 、B 、C 三台路由器属于现有的OSPF 网络。
路由器D 新加入网络。
所有路由器均运行 示的优先级。
在路由器D 刚加入现有网络的一刻,DR/BDR 状态如何? C 会强制进行选举且路由器D 会在DR 选举中获胜。
CCNA认证基础课程-课后作业.习题答案

CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。
CCNA考试题

C C N A考试题(总9页) -CAL-FENGHAI.-(YICAI)-Company One1-CAL-本页仅作为文档封面,使用请直接删除第一部分:选择题1:提供可靠数据传输、流控的是OSI的第几层()A、表示层B、网络层C、传输层D、会话层E、链路层2:子网掩码产生在那一层()A、表示层B、网络层C、传输层D、会话层3:当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是()A、丢掉该分组B、将该分组分片C、转发该分组D、以上答案均不对4:当一台主机从一个网络移到另一个网络时,以下说法正确的是()A、必须改变它的IP地址和MAC地址B、必须改变它的IP地址,但不需改动MAC地址C、必须改变它的MAC地址,但不需改动IP地址D、MAC地址、IP地址都不需改动5:ISO提出OSI的关键是()A、系统互联B、提高网络速度C、为计算机制定标准D、经济利益6:OSI参考模型按顺序有哪些层()A、应用层、传输层、网络层、物理层B、应用层、表示层、会话层、网络层、传输层、数据链路层、物理层C、应用层、表示层、会话层、传输层、网络层、数据链路层、物理层D、应用层、会话层、传输层、物理层7:LAN的拓扑形式一般以()为主。
A、总线型B、环型C、令牌环D、载波侦听与冲突检测CSMA/CD8:网段地址154.27.0.0的网络,若不做子网划分,能支持()台主机A、254B、1024C、65,534D、16,777,2069:路由器网络层的基本功能是()。
A、配置IP地址B、寻找路由和转发报文C、将MAC地址解释成IP地址10:选出基于TCP协议的应用程序()。
A、PINGB、TFTPC、TELNETD、OSPF11:某公司申请到一个C类IP地址,但要连接6个的子公司,最大的一个子公司有26台计算机,每个子公司在一个网段中,则子网掩码应设为()。
A、255.255.255.0B、255.255.255.128C、255.255.255.192D、255.255.255.22412:B类地址的缺省掩码是()。
ccna章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。
而且对等网络也没有集中管理。
这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。
正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。
正确答案:1和4解析:终端设备会发出通过网络传输的数据。
中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。
网络介质提供网络消息的传输通道。
正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。
内部网只描述通常仅供内部人员访问的网络区域。
当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。
使用大学无线LAN 的设备多为平板电脑和智能手机。
大学生主要使用无线WAN 来访问他们的手机运营商网络。
.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。
内联网基本上是仅供内部使用的局域网。
外联网是外部合作伙伴访问组织内部特定资源的网络。
家庭用户并不一定使用LAN 来访问Internet。
例如,PC 可以通过调制解调器直接连接到ISP。
正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。
内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。
正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。
10正确答案:2和3解析:移动电话连接需要使用移动电话网络。
卫星连接通常用于家庭或企业外部不便使用物理布线的位置。
11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。
CCNA网络学院第二学期 第六章 试题及答案

ERouting Chapter 6 - CCNA Exploration: 路由协议和概念 (版本4.0)1请参见图示。
网络管理员希望尽量减少 Router1 路由表中的条目数量。
管理员应该在该网络上使用什么技术?VLSMCIDR私有 IP 地址有类路由2 C IDR 对网络有哪两项好处?(选择两项。
)缩小路由表大小动态地址分配自动路由重分布减少路由更新流量在有类边界自动总结3在如图所示的网络中,从 C 类地址的主机部分借用了 3 个位。
在这三条点对点链路上,如果不使用VLSM,那么共有多少址没有被使用?341236841804下列哪些项包含在无类路由协议的路由更新中?(选择两项。
)32 位地址下一跳路由器接口子网掩码单播主机地址第 2 层地址5哪三种内部路由协议支持VLSM?(选择三项。
)OSPFRIP v1RIP v2EIGRPBGPSTP6网络管理员可在VLSM 的帮助下实现下列哪一项?在一个自治系统中使用一个子网掩码在相同的IP 地址空间中使用多个子网掩码在整个自治系统中使用IGRP 作为路由协议在自治系统中使用多种路由协议7如图所示,Router1 和Router2 之间新添加的以太网链路需要一个额外的子网。
要为此链路提供最多14 个可用地址同时又地址,应该在该网络上配置哪个子网地址?192.1.1.16/26192.1.1.96/28192.1.1.160/28192.1.1.196/27192.1.1.224/28192.1.1.240/288请参见图示。
下列哪个地址是图中某个子网的广播地址?192.168.4.3/29192.168.4.15/29192.168.4.65/26192.168.4.255/249某路由器的路由表中安装了一条到网络192.168.32.0/20 的总结路由。
该路由总结了哪些网络?192.168.0.0 – 192.168.32.0/24192.168.0.0 – 192.168.47.0/24192.168.32.0 – 192.168.47.0/24192.168.32.0 – 192.168.48.0/24192.168.32.0 – 192.168.63.0/2410请参见图示。
CCNA在线练习答案第六章

1.IPv6 地址由多少位组成?3248641281322.哪项网络配置需要使用no auto-summary命令?在RIP 第 1 版中,在本地网络上启用子网划分在RIP 第 2 版中启用无类路由用于RIP 第 1 版,当存在不连续网络时用于RIP 第 2 版,当存在不连续网络时3.IPv6 地址1080:0000:0000:0000:0000:0000:1267:01A2 的另一种形式是什么?1080::1267:01A21080:0:0:0:0:1267:01A21080::0:1267:01A21080:::::1267.01A24.一名网络工程师作了一番研究,寻求有助于从IPv4 编址结构向IPv6 迁移的机制。
该工程师发现了哪三种选项?(选择三项。
)协议转换机制,它使IPv4 网络和IPv6 网络可相互通信。
数据包分析程序,它可确定编址结构并将其转换为相应的IPv4 或IPv6 方案。
必须购置支持IPV6 的新核心设备。
协议转换器,它可在IPv4 数据包与IPv6 数据包之间相互转换。
双协议栈网络设计,它使所有网络设备可同时使用IPv4 和IPv6 编址机制。
隧道,它可封装IPv4 数据包,使其可通过IPv6 网络传输,反之亦然。
5.下列哪项最适于描述不连续网络?组合了若干个有类网络地址包含通向同一目的地的多条路由执行多种路由协议与组织架构的其余部分之间被其它网络隔离6.网络管理员将网络10.0.0.0/8 用作公司网络。
管理员必须创建一个掩码方案来支持主办公室内的750 名用户和远程办公室内的620 名用户。
应该为网络10.0.0.0/8 分配什么掩码才能使保留的地址数量最多?255.255.255.0/19/20255.255.252.0/23/217.请参见图示。
公司决定添加一个新工作组。
如果网络的子网划分方案使用连续的地址块,则会为与wgroup3 连接的主机分配什么子网?172.16.3.12/29172.16.3.16/29172.16.3.20/29172.16.3.24/298.请参见图示。
CCNA第一学期各章习题及答案

诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61第十一章配置和测试网络P62-70第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。
所示网络属于哪一类型WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。
下列哪组设备仅包含终端设备A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I、J010 选择关于网络协议的正确陈述。
思科第一学期第六章节测试答案

思科第一学期第六章章节测试答案1.请参见图示。
下列哪个网络前缀将使用图中显示的 IP 编址方案/24/16/20/27/25/282.下列哪些划分子网后的 IPv4 地址代表有效的主机地址(选择三项)/26/26/26/27/27/273.下列关于 IP 编址的陈述,哪些是正确的(选择两项)NAT 将公有地址转换为发往 Internet 的私有地址。
只允许一家公司使用特定的私有网络地址空间。
路由器阻止私有地址接入公共 Internet。
网络是私有地址空间的一部分。
主机可以使用 IP 地址向自身发送通信。
4.路由器根据给定 IP 地址和子网掩码来确定子网的网络地址时使用以下哪种运算过程二进制加法十六进制“与”运算二进制除法二进制乘法二进制“与”运算5.请参见图示。
主机 A 连接到 LAN,但无法访问 Internet 上的任何资源。
主机的配置如图所示。
问题的原因可能是什么主机的子网掩码不正确。
默认网关为网络地址。
默认网关为广播地址。
默认网关与主机位于不同的子网。
6.如果最多可支持 254 台主机,网络管理员会为网络地址分配什么子网掩码7.以下哪三项是私有 IP 地址(选择三项。
)8.假设 IP 地址为,子网掩码为,以下哪项描述的是此地址这是可用主机地址。
这是广播地址。
这是网络地址。
这不是有效地址。
9.路由器接口分配的 IP 地址为,掩码为。
该 IP 地址属于哪个子网10.请参见图示。
网络管理员已将的地址范围分配给网际网络 LBMISS,并已使用 /29 掩码将此地址范围划分为子网。
为了满足要,技术人员决定使用第五个子网配置新网络(子网零是第一个子网)。
根据公司规定,必须始终将第一个可用主机地址分配口,并将最后一个可用主机地址分配给工作组服务器。
为了连接到网络,应该在工作组服务器的属性中输入下列哪一项的配置IP 地址:子网掩码:255,255,255,240 默认网关:IP 地址:子网掩码:255,255,255,240 默认网关:IP 地址:子网掩码:255,255,255,248 默认网关:IP 地址:子网掩码:255,255,255,248 默认网关:IP 地址:子网掩码:默认网关:11.静态 IP 地址建议分配给以下哪些网络设备(选择三项。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1. Refer to the exhibit. Host A is communicating with host F. What happens to a frame sent from host A to host F as it travels over the Ethernet segments?The frame format is modified as it passes through each switch.The frame format remains the same across each Ethernet segment.The frame format is modified as the media speed changed at switch B and switch E.The frame format is modified as the media material changes between copper and fiber at switchC and switch D.2. How many hexadecimal digits are in a MAC address?281216323. What are three functions of a NIC in a PC? (Choose three.)A NIC connects the PC to the network media.A NIC detects collisions on the Ethernet segment.A NIC checks the formatting of data before it is transmitted.A NIC passes the contents of selected frames to the upper OSI layers.A NIC acknowledges and retransmits data that was not received properly.A NIC discards frames when the destination IP address does not match the local host.4. At what layer of the OSI model does a MAC address reside?123475. A router has an Ethernet, Token Ring, serial, and ISDN interface. Which interfaces will have a MAC address?serial and ISDN interfacesEthernet and Token Ring interfacesEthernet and ISDN interfacesToken Ring and serial interfaces6. In an Ethernet LAN, how does the NIC know when it can transmit data?An Ethernet NIC transmits data as soon as the frame is received.An Ethernet NIC transmits data as soon as the NIC receives a token.An Ethernet NIC transmits data when it senses a collision.An Ethernet NIC transmits data after listening for the absence of a signal on the media.7. Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choosethree.)reliablepoint-to-pointnondeterministicconnection-orientedcollision environmentfirst-come, first-served approach8. Which two devices can provide full-duplex Ethernet connections? (Choose two.)hubmodemrepeaterNICLayer 2 switch9. On a local area network, one workstation can send data on the line while it is receiving data. What type of data transfer does this describe?hybridhalf duplexfull duplexmultilink10. Refer to the exhibit. The small office network shown in the exhibit consists of four computers connected through a hub. Which configuration would cause collisions and errors on the network?autonegotiationFastEthernetpeer-to-peer shared resourcesadministratively configured full duplex11. Refer to the exhibit. The switch and workstation are administratively configured for full-duplexoperation. Which statement accurately reflects the operation of this link?No collisions will occur on this link.Only one of the devices can transmit at a time.The switch will have priority for transmitting data.The devices will default back to half duplex if excessive collisions occur.12. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hos the network? (Choose two.)Hosts 1 and 4 may be operating full duplex so no collision will exist.The hub will block the port connected to Host 4 to prevent a collision.After the end of the jam signal, Hosts 1, 2, 3, and 4 invoke a backoff algorithm.When the four hosts detect the collision, Hosts 1, 2, 3, and 4 generate a jam signal.Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle, before13. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respondafter the backoff period has expired?The hosts return to a listen-before-transmit mode.The hosts creating the collision have priority to send data.The hosts creating the collision retransmit the last 16 frames.The hosts extend their delay period to allow for rapid transmission.14. Which statement describes how CSMA/CD on an Ethernet segment manages theretransmission of frames after a collision occurs?The first device to detect the collision has the priority for retransmission.The device with the lowest MAC address determines the retransmission priority.The devices on the network segment hold an election for priority to retransmit dataThe devices transmitting when the collision occurs DO NOT have priority for retransmission.15. Refer to the exhibit. A technician wants to increase the available bandwidth for the workstation by allowing the switch anthe workstation to transmit and receive simultaneously. What will permit this?CSMA/CDfull-duplexFastEthernetcrossover cable16. Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frA random delay is used to ensure a collision-free link.A random delay value for each device is assigned by the manufacturer.A standard delay value could not be agreed upon among networking device vendors.A random delay helps prevent the stations from experiencing another collision during the transmission.17. In which two layers of the OSI model does Ethernet function? (Choose two.)applicationsessiontransportnetworkdata linkphysical18. Which of the following are specified by IEEE standards as sublayers of the OSI data link layer?(Choose two.)Logical Link ControlLogical Layer ControlMedia Access ControlLogical Link CommunicationMedia Access CommunicationPhysical Access Communication19. Where does the MAC address originate?DHCP server databaseconfigured by the administratorburned into ROM on the NIC cardnetwork configuration on the computer included in the creation of the processor chip。