思科网院考试题库

合集下载

(完整版)思科题库2(修改)

(完整版)思科题库2(修改)

1: PDU封装的正确顺序是什么?锁头网络报头MA网络赧头传输歿头帧头数磚tm帧头數宠赣亀帧头IM 2:建立融合网络有何用途?O为斯有终鋸设备提供高速连揺O确保平等对待所有类盘的数霸包O实规数据网络基础架撇犒的容错能力和高可用性降低部署和维护通信基珊栈施的咸本A: ISPD JP电话和PC3:请参见图示。

哪个区域最有可能是图中所示的公司网络的外联网?I」回前A1 1区域BH BSCO区域D4:主机正在访冋远程网络的FTP服务器。

中间网络设备在此对话中起到哪三个作用?(请选择三项。

)列重新生成埶据信号0充当喜户端或服务器□提供伎输消息的画适&应用安全诠置来控制数据掠a岀现错误时si知其他设冷□用作滴恳的源或目标5 一位家庭用户想要使用能够在普通电话线路上提供快速数字传输的ISP连接。

应选择哪种ISP连接类型?厨OSL0拨号U卫星口手机调制解调器0电缆调制熾调器6:在学校网络上,学生可以浏览网页、搜索图书馆数据库,还可以和日本的姊妹学校一起参加音频会议。

如果使用QoS为网络流量排列优先顺序,这些流量的优先级从高到低如何排列?働音频会仪、敎馨障、HTTPO樋库、HTTP'S®馳O音颠会械、HTTPx埶捐庫O數辖库、音频会愤、HTTP7:管理员在发出ping命令之后在交换机上使用Ctrl-Shift-6键组合。

使用这些按键有什么用途?0重新启Ejhpingjfi程•I Ping 进程O退出到不同的配置複武u咒诈用户凫成齡令& OSI模型的物理层有什么重要功能?接覺来自物理介厲的帧。

0将上层数揺封装咸帧。

匕定义硬件核口执行的介质访问方达。

•3苗砸蹣码対电子、光纤或无绕电克信总。

9:下列哪个程序用于降低铜缆中的串扰影响?1零耍正确接地连播®统合反血]电路线对O用樂馬屏護滾住錢束0设计电86基珊设庇避免串扰干扰v.懂免在安装H出珈弯曲2层交换机10:如果收到的帧的目的MAC地址不在MAC表中,第将执行什么操作?O它会友起久阿1请求。

大学计算机思科试题及答案

大学计算机思科试题及答案

大学计算机思科试题及答案1. 选择题1.1) 下列哪个不是计算机网络发展的特点?A. 具有开放性和互联性B. 支持多媒体和实时通信C. 高性能和高可靠性D. 只能在局域网内部进行通信答案:D1.2) 在OSI模型中,将物理层和数据链路层合并为一个层次的模型是:A. TCP/IP模型B. 五层参考模型C. 四层参考模型D. 七层参考模型答案:B1.3) 下面哪个不是计算机网络的传输介质?A. 双绞线B. 光纤C. 无线电波D. 显示器答案:D1.4) 网络地址转换(NAT)技术在哪一层实现地址转换?A. 物理层B. 数据链路层C. 网络层D. 传输层答案:C1.5) 以下哪个协议用于到达目标主机的IP数据报的传输?A. ARPB. IPC. ICMPD. TCP答案:B2. 填空题2.1) IP地址的格式为_____位。

答案:322.2) 网络层协议IP地址由网络号和____号两部分组成。

答案:主机2.3) 在计算机网络中,____是负责监测发送的数据是否发生错误。

答案:CRC2.4) DNS的英文全称是_____。

答案:Domain Name System2.5) HTTP的英文全称是_____。

答案:Hypertext Transfer Protocol3. 简答题3.1) 请解释OSI模型的七层,以及每一层的作用。

答案:OSI模型是一种将计算机网络通信协议划分为不同层次的理论模型。

七层分别为:1) 物理层:负责传输比特流,提供物理媒介之间的直接通信。

2) 数据链路层:负责通过物理连接传递数据帧,提供错误检测和纠正功能。

3) 网络层:负责数据的分组和路由选择,实现不同网络之间的数据传输。

4) 传输层:负责端到端的可靠数据传输,提供面向连接或无连接的通信服务。

5) 会话层:负责建立、管理和终止会话连接,控制数据传输的顺序和流量。

6) 表示层:负责数据的格式化和编码,支持不同系统间的数据交换。

7) 应用层:为用户提供网络服务,包括文件传输、电子邮件、远程登录等应用。

思科网院-网络工程-CCNA1-2017计算机科学与技术-一到十一章-题库及答案

思科网院-网络工程-CCNA1-2017计算机科学与技术-一到十一章-题库及答案

某公司正在考虑是使用客户端/服务器还是对等网络。

下列哪三项是对等网络的特征?(选择三项。

)哪种设备的功能是确定消息在网际网络中传输的路径?哪两个条件有助于您从各种网络介质当中选择一种网络介质?(请选择两项。

)下列哪两项描述了中间设备?(选择两项。

)网络上的终端设备有哪两项功能?(选择两项。

)由于许多学生带着自己的平板电脑和智能手机去学校访问学校资源,大学里的IT 人员最有可能需要重新设计的网络区域是什么?家庭用户必须要有哪种网络类型访问才能进行网上购物?一位分支机构办公室的员工正在为客户创建报价。

为此,该员工需要访问位于总部办公室的内部服务器上的机密定价信息。

该员工将要访问哪种类型的网络?下列哪两种连接选项可以为家庭办公室中的计算机提供始终在线的高带宽Internet 连接?(选择两项。

)下列哪两个Internet 连接选项不需要建筑物铺设物理电缆?(请选择两项。

)以下哪种术语描述了当对网络资源的请求超出可用容量时网络的状态?哪种类型的网络流量需要QoS?以下哪项表述准确定义了术语“带宽”?网络管理员正在实施一种要求复杂强密码的策略。

该策略支持哪种数据保护目标?下列哪种说法正确描述了云计算的特征?什么是Internet?下列哪种说法描述了电力线网络技术的用途?哪种安全侵犯会对家庭用户的生活造成最大损害?一位用户正在一个小型办公室网络上实施安全策略。

以下哪两种操作将为此网络提供求?(选择两项。

)A网络能够通过相同的通信通道传输语音、视频、文本和图形。

填空题。

缩写词是指允许员工在公司办公室中使用其个人设备访问网络和其他资源的策略。

正确答案:byod将每个描述与网络通信形式配对请将每个特征对应的internet连接类型进行匹配将每个定义与安全目标配对操作软件内核的作用是什么?网络管理员与交换机建立远程CLI 连接对其实施管理时,需要确保用户ID、密码和会话内容的保密性。

应当选择哪种访问方法?当在安全环境下执行初始配置时,下列哪个程序可用来访问Cisco 2960 交换机?哪个命令或组合键让用户返回命令层级中的上一级?某台路由器具有有效的操作系统,且NVRAM 中存储有配置文件。

思科模拟试题及答案

思科模拟试题及答案

思科模拟试题及答案一、选择题1. 以下哪个命令用于查看路由器的接口状态?A. show interfaceB. show ip interfaceC. show running-configD. show ip route答案:A2. 在思科路由器上配置默认网关的命令是什么?A. ip default-gatewayB. default gatewayC. ip route 0.0.0.0D. route 0.0.0.0答案:C3. 以下哪个协议用于在大型网络中自动发现路由?A. RIPB. OSPFC. BGPD. EIGRP答案:B4. 以下哪个命令用于查看当前路由器的配置?A. show running-configB. show startup-configC. show interfaceD. show ip route答案:A5. 以下哪个命令用于在路由器上配置静态路由?A. ip routeB. routeC. static routeD. configure static route答案:A二、填空题6. 思科的网络操作系统称为________。

答案:IOS7. 在思科设备上,使用________命令可以进入特权模式。

答案:enable8. 配置VLAN的命令是________。

答案:VLAN configuration mode9. 动态主机配置协议的缩写是________。

答案:DHCP10. 用于测试网络连通性的命令是________。

答案:ping三、简答题11. 简述什么是子网掩码,并说明其作用。

答案:子网掩码是一种用于区分IP地址中网络部分和主机部分的位模式。

它的作用是告诉路由器或交换机,IP地址的哪部分是网络地址,哪部分是主机地址,以便正确地进行路由和数据传输。

12. 描述什么是VLAN,以及它在网络中的作用。

答案:VLAN(虚拟局域网)是一种将局域网划分为多个虚拟网络的技术。

大二思科考试题库和答案

大二思科考试题库和答案

大二思科考试题库和答案一、单项选择题(每题2分,共20分)1. 思科公司(Cisco)成立于哪一年?A. 1984年B. 1990年C. 1995年D. 2000年答案:A2. 以下哪个协议是用于在IP网络中传输数据的?A. HTTPB. FTPC. TCPD. IP答案:D3. 在OSI模型中,哪一层负责建立、维护和终止通信会话?A. 应用层B. 传输层C. 会话层D. 网络层答案:C4. 以下哪个设备不是网络交换机?A. Layer 2 SwitchB. Layer 3 SwitchC. RouterD. Hub答案:D5. 以下哪个命令用于在Cisco设备上显示当前配置?A. show running-configB. show startup-configC. show interfaceD. show ip interface brief答案:A6. 在Cisco设备上,哪个命令用于保存当前的配置到启动配置文件?A. copy running-config startup-configB. copy startup-config running-configC. save running-configD. write memory答案:A7. 以下哪个命令用于在Cisco设备上创建一个新的VLAN?A. vlan databaseB. configure terminalC. enableD. show vlan答案:A8. 以下哪个命令用于在Cisco设备上将接口配置为Trunk模式?A. switchport mode accessB. switchport mode dynamicC. switchport mode trunkD. switchport mode static答案:C9. 以下哪个协议用于在IP网络中自动分配IP地址?A. DHCPB. DNSC. FTPD. HTTP答案:A10. 在Cisco设备上,哪个命令用于查看设备的接口状态?A. show interfacesB. show ip interface briefC. show running-configD. show vlan答案:B二、多项选择题(每题3分,共15分)11. 以下哪些协议属于TCP/IP模型的应用层协议?A. HTTPB. FTPC. SNMPD. IP答案:A, B, C12. 在Cisco设备上,以下哪些命令用于配置接口?A. interfaceB. ip addressC. no shutdownD. enable答案:A, B, C13. 以下哪些设备可以作为网络的核心设备?A. SwitchB. RouterC. FirewallD. Hub答案:A, B14. 以下哪些命令用于在Cisco设备上查看网络信息?A. show ip routeB. show running-configC. show interfaceD. ping答案:A, C, D15. 以下哪些因素可以影响网络的性能?A. 带宽B. 延迟C. 丢包率D. 网络拓扑结构答案:A, B, C, D三、填空题(每题2分,共20分)16. 在Cisco设备上,使用________命令可以进入特权模式。

思科网络第一学期1-5章中文测试题及答案

思科网络第一学期1-5章中文测试题及答案

ENetwork Chapter 2 - CCNA Exploration: 网络基础知识(版本4.0) 1在封装过程中,数据链路层执行什么操作?不添加地址。

添加逻辑地址。

添加物理地址。

添加进程的端口号。

2TCP/IP 网络接入层有何作用?路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包3数据链路层封装添加的报尾信息有何主要功能?支持差错校验确保数据按照顺序到达确保送达正确目的标识本地网络中的设备帮助中间设备进行处理和路径选择4请参见图示。

下列哪组设备仅包含终端设备?A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I、J5OSI 模型各层从最高层到最低层的正确顺序如何?物理层、网络层、应用层、数据链路层、表示层、会话层、传输层应用层、物理层、会话层、传输层、网络层、数据链路层、表示层应用层、表示层、物理层、会话层、数据链路层、传输层、网络层应用层、表示层、会话层、传输层、网络层、数据链路层、物理层表示层、数据链路层、会话层、传输层、网络层、物理层、应用层6下列哪三项陈述是对局域网(LAN) 最准确的描述?(选择三项)LAN 通常位于一个地域内。

此类网络由由一个组织管理。

LAN 中的不同网段之间一般通过租用连接的方式连接。

此类网络的安全和访问控制由服务提供商控制。

LAN 为同一个组织内的用户提供网络服务和应用程序访问。

此类网络的每个终端通常都连接到电信服务提供商(TSP)。

7第4 层端口指定的主要作用是什么?标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务8以下哪种特征正确代表了网络中的终端设备?管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径9请参见图示。

哪个术语正确判断出了包含于绿色区域中的设备类型?源终端传输中间10OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)网络层传输层物理层数据链路层会话层11请参见图示。

思科网院final考试试题

思科网院final考试试题

思科⽹院final考试试题1答案正确率89。

9%下列哪三项是CSMA/CD 的特征?(选择三项。

)设备会侦听介质,并且仅当⽆法检测到介质上存在其它信号时才会传输数据。

介质上的所有设备均可侦听所有通信。

设备根据配置的优先级来进⾏通信。

发⽣冲突后,引起冲突的设备会优先尝试传输数据。

发⽣冲突时,所有设备会在⼀段时间内停⽌传输数据,该段时间的长度随机决定。

CSMA/CD 使⽤令牌系统来避免冲突。

2请参见图⽰。

从显⽰的会话信息中可以得出以下哪两个结论?(选择两项)所⽤的协议是⼀种⾯向连接的协议。

此交换是三次握⼿的⼀部分。

SYN 标志代表开始建⽴会话。

⽬的端⼝表⽰已经发起了FTP 会话。

源端⼝不⽀持与列出的⽬的端⼝通信。

3请参见图⽰。

下列哪组设备仅包含中间设备?A、B、E、FC、D、G、IG、H、I、J4⽹络管理员想要限制访问路由器的特权执⾏模式。

管理员应该使⽤哪⼀种⼝令?使能aux控制台VTY5下列有关⽹络层编址的陈述中哪三项是正确的?(选择三项。

)使⽤IP 地址的最后⼀个⼆进制⼋位数来识别⽹络。

⽀持不同⽹络之间的数据通信。

由⽹络技术⼈员进⾏配置。

使⽤16 位IPv4 地址。

可阻⽌⼴播。

唯⼀标识每台主机。

6请参见图⽰。

⽤记号来表⽰每条介质链路。

⽤来连接不同设备的正确电缆类型是什么?连接 1 - 全反电缆,连接2 - 直通电缆,连接 3 - 交叉电缆连接 1 - 交叉电缆,连接2 - 全反电缆,连接 3 - 直通电缆连接 1 - 交叉电缆,连接2 - 直通电缆,连接 3 - 全反电缆连接 1 - 直通电缆,连接2 - 直通电缆,连接 3 - 直通电缆7请参见图⽰。

图中所⽰为在各层添加的头部。

哪⼀层会添加⽬的进程号和源进程号以确保将数据传递到正确的应⽤程序?物理层数据链路层⽹络层传输层8请参见图⽰。

技术⼈员正在处理⽹络问题,需要验证路由器的LAN 接⼝。

要确认路由器接⼝⼯作正常,应该从此主机ping127.0.0.1192.168.64.196192.168.254.1192.168.254.9192.168.254.2549路由器fa0/0 接⼝的IP 地址配置不正确。

思科网络 试题库

思科网络 试题库

二、单选题1、 ADSL MODEM不能激活,打一个电话或振一下铃就好了,其原因可能是A、分离器损坏;B、modem工作不稳定;C、电话机有问题;D、线路接触面氧化;答案为d6、172.16.99.99/255.255.192.0 的广播地址是什么?A、172.16.99.255;B、172.16.127.255;C、172.16.255.255;D、172.16.64.127; 答案为b7、190.233.27.13./16所在网段地址A、190.233.0.0;B、190.0.0.0;C、190.233.27.0;答案为a8、224.0.0.5代表的是()地址。

A、主机地址;B、广播地址;C、网络地址;D、组播地址;答案为d10、ATM协议工作在________层。

A、物理层;B、链路层;C、网络层;D、传输层;答案为b11、ATM信元是定长的,而且信元的长度较小,只有()字节。

A、33;B、43;C、53;D、63;答案为c23、DHCP客户端申请一个新的IP地址之前,使用的初始IP地址是________。

A、0.0.0.0;B、127.0.0.1;C、255.255.255.255;D、169.254.1.1 ;答案为a24、DNS工作于()A、网络层 ;B、传输层;C、会话层;D、表示层;E、应用层;答案为e26、D类地址的缺省子网掩码有()位A、8;B、16;C、24;D、 None;答案为d28、FDDI 使用的是()局域网技术A、以太网;B、快速以太网;C、令牌环;D、令牌总线;答案为c29、IEEE 802.4是下面哪一种局域网标准?正确的选项是A、以太网;B、生成树;C、令牌环;D、令牌总线;答案为d30、IEEE于1999年颁布了用以标准化VLAN实现方案的________协议标准草案。

A、802.1B;B、802.1D;C、802.1P;D、802.1Q;答案为d32、IP报文头中固定长度部分为多少字节?A、10;B、20;C、30;D、40;答案为b33、IP报文中一部分字段专门用来描述报文的生命周期,即TTL值,它的最大值是________。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

思科网院考试题库CCNA1 - Module 2CCNA1 - Module 21Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)NetworkTransportPhysical**Data Link**Session2What is a primary function of the trailer information added by the data link layer encapsulation?supports error detection**ensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection3During the encapsulation process, what occurs at the data link layer? No address is added.The logical address is added.The physical address is added.**The process port number is added.4What device is considered an intermediary device?file serverIP phonelaptopprinterswitch**5Which layer encapsulates the segment into packets?physicaldata link**networktransport6Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for data**initiate data communicationsretime and retransmit data signals**originate the flow of datamanage data flows**final termination point for data flow7What can be identified by examining the network layer header?the destination device on the local mediathe path to use to reach the destination host**the bits that will be transferred over the mediathe source application or process creating the data8What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physical**presentation, data link, session, transport, network, physical, application9Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) Network A -- WANNetwork B -- WAN**Network C -- LAN**Network B -- MANNetwork C -- WANNetwork A -- LAN**10What are the key functions of encapsulation? (Choose three.)allows modification of the original data before transmissionidentifies pieces of data as part of the same communication**enables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end device**enables the reassembly of complete messages**tracks delay between end devices11Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexing**encapsulation12What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communication**a layer specific encapsulation13Refer to the exhibit. "Cell A" at IP address has established an IP session with "IP Phone 1" at IP address Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination device**an end devicean intermediate devicea media device14Refer to the exhibit. Which set of devices contains only end devices? A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, J**E, F, H, I, J15Refer to the exhibit. Which term correctly identifies the device type thatis included in the green area?sourceendtransfer**intermediary16Which three statements best describe a Local Area Network (LAN)? (Choose three.)**A LAN is usually in a single geographical area.**The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.**A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).17Refer to the exhibit. What type of network is shown?WANMAN**LANWLAN18What is the purpose of the TCP/IP Network Access layer?path determination and packet switching**data representation, encoding, and controlreliability, flow control, and error detectiondetailing the components that make up the physical link and how to access itthe division of segments into packets19Which characteristic correctly refers to end devices in a network? manage data flowsoriginate data flow**retime and retransmit data signalsdetermine pathways for data20What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating **to identify the processes or services that are communicating within the end devices21Select the statements that are correct concerning network protocols.(Choose three.)**define the structure of layer specific PDU'sdictate how to accomplish layer functions**outline the functions necessary for communications between layers limit hardware compatibility**require layer dependent encapsulationseliminate standardization among vendorsCCNA1 - Module 3CCNA1 - Module 31. What is the purpose of resource records in DNS?used by the server to resolve names2. What are two forms of application layer software?applicationssyntax3. What application layer protocol is commonly used to support for file transfers between a client and a server?FTP4. What are two characteristics of peer-to-peer networks? decentralized resourcesresource sharing without a dedicated server5. Which layer of the OSI model supplies services that allow user to interface with the network?application6. What are three properties of peer-to-peer applications?acts as both a client and server within the same communicationhybrid mode includes a centralized directory of filesdoes not require specialized software7. What is the role of the OSI application layer?provides the interface between the applications on either end of the network8. What three protocols operate at the Application layer of the OSI model? DNS, SMTP, POP9. Which email components are used to forward mail between servers? MDA, MTA10. Which two protocols are used to control the transfer of web resources from a web server to a client browser?HTTPSHTTP11. Which statements are correct concerning the role of the MTA in handling email?receives email from the client's MUApasses email to the MDA for final deliveryuses SMTP to route email between servers12. As compared to SSH, what is the primary disadvantage of telnet?does not support encryption13. Which application layer protocols correctly match a corresponding function?DNS dynamically allocates IP addresses to hostsTelnet provides a virtual connection for remote access14. What is the automated service that matches resource names with the required IP address?DNS15. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?8016. What are two characteristics of clients in data networks?initiate data exchangesmay upload data to servers17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?SMB18. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model?centralized administrationsecurity is easier to enforce19. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type?User accounts are centralized.Security is difficult to enforce.20. How does the application layer on a server usually process multiple client request for services?uses support from lower layer functions to distinguish between connections to the serviceCCNA1 - Module 4CCNA1 - Module 41Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)The local host is using well-known port numbers to identify the source ports.**A termination request has been sent toCommunication with is using HTTP Secure.**The local computer is accepting HTTP requests.is performing the three-way handshake with2After a web browser makes a request to a web server that is listening tothe standard port, what will be the source port number in the TCP header of the response from the server?1353**80102417283Which information is found in both the TCP and UDP header information? sequencingflow control**acknowledgmentssource and destination4Which is an important characteristic of UDP?acknowledgement of data delivery**minimal delays in data deliveryhigh reliability of data deliverysame order data delivery5Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. Whataction will Server 1 take as a result?create a Layer 1 jam signal**reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the hostchange the window size in the Layer 4 header6Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?**session establishmentsegment retransmitdata transfersession disconnect7Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost? 236**1850343134758Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical order**to prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts9During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? The packets will not be delivered.The packets will be retransmitted from the source.**The packets will be delivered and reassembled at the destination. The packets will be delivered and not reassembled at the destination.10With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?0 to 255256 to 1022**0 to 10231024 to 204749153 to 6553511Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?TCPIP**UDPHTTPDNS12What are two features of the User Datagram Protocol (UDP)? (Choose two.) **flow control**low overheadconnectionlessconnection-orientedsequence and acknowledgements13What mechanism is used by TCP to provide flow control as segments travel from source to destination?sequence numberssession establishment**window sizeacknowledgments14What is dynamically selected by the source host when forwarding data? destination logical addresssource physical addressdefault gateway address**source port15Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data **to enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order16Which two options represent Layer 4 addressing? (Choose two.) identifies the destination network**identifies source and destination hostsidentifies the communicating applications**identifies multiple conversations between the hostsidentifies the devices communicating over the local media17Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?**encapsulationflow controlconnectionless services**session establishment**numbering and sequencingbest effort delivery18Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? applicationpresentationsession**transportnetwork19Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.) This is a UDP header.**This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of 43693.**This is a TCP header.20Which event occurs during the transport layer three-way handshake? The two applications exchange data.TCP initializes the sequence numbers for the sessions.**UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client. CCNA1 - Module 5CCNA1 - Module 51In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?**destination network addresssource network addresssource MAC addresswell known port destination address2What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port number**source and destination IP address3In a connectionless system, which of the following is correct?The destination is contacted before a packet is sent.**The destination is not contacted before a packet is sent.The destination sends an acknowledgement to the source that indicates the packet was received.The destination sends an acknowledgement to the source that requests the next packet to be sent.4Which IP packet field will prevent endless loops?type-of-serviceidentificationflags**time-to-liveheader checksum5Which portion of the network layer address does a router use to forward packets?host portionbroadcast address**network portiongateway address6Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the network?**7If the default gateway is configured incorrectly on the host, what is the impact on communications?The host is unable to communicate on the local network.**The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.There is no impact on communications.8What is the purpose of a default gateway?physically connects a computer to a networkprovides a permanent address to a computeridentifies the network to which a computer is connectedidentifies the logical address of a networked computer and uniquely identifies it to the rest of the network**identifies the device that allows local network computers to communicate with devices on other networks9What type of routing uses information that is manually entered into the routing table?dynamicinterior**staticstandard10When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)**The router sends an ARP request to determine the required next hop address.The router discards the packet.The router forwards the packet toward the next hop indicated in the ARP table.**The router forwards the packet to the interface indicated by the source address.The router forwards the packet out the interface indicated by the default route entry.11What are the key factors to consider when grouping hosts into a common network? (Choose three.)**gatewayspurposephysical addressingsoftware version**geographic location**ownership12What is a component of a routing table entry?the MAC address of the interface of the routerthe destination Layer 4 port numberthe destination host address**the next-hop address13Which intermediary devices could be used to implement security between networks? (Choose two.)**routerhubswitch**firewallaccess pointbridge14What are three common problems with a large network? (Choose three.) too few broadcasts**performance degradation**security issues**limited management responsibilityhost identificationprotocol compatibility15Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?3**45781116Which three statements are true about routes and their use? (Choose three.) If no route to the destination network is found, the packet is returned to the previous router.If the destination network is directly connected, the router forwards the packet to the destination host.**If multiple network entries exist for the destination network, the most general route is used to forward the packet.**If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.**If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.If a host does not have a route manually configured for the destination network, the host will drop the packet.17Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to whichall hosts send packets that are destined for an outside network?**18Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.)**Replace S2 with a router.Place all servers on S1.Disable TCP/IP broadcasts.**Subnet the /24 network.Disable all unused interfaces on the switches.19Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two.)** is the next-hop address that is used by R3 to route a packet from the network to the network.is the next-hop address that is used by R1 to route a packet from thenetwork to the network.** is the next-hop address that is used by R1 to route a packet from the network to the network.is the next-hop address that is used by R3 to route a packet from the to the network.is the next-hop address that is used by R2 to route a packet from the network to the network.is the next-hop address that is used by R2 to route a packet from the network to the network.20What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)require no device configuration**provide routers with up-to-date routing tablesrequire less processing power than static routes requireconsume bandwidth to exchange route information**prevent manual configuration and maintenance of the routing table21What statement describes the purpose of a default route?A host uses a default route to transfer data to another host on the same network segment.A host uses a default route to forward data to the local switch as the next hop to all destinations.A host uses a default route to identify the Layer 2 address of an end device on the local network.**A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.CCNA1 - Module 6CCNA1 - Module 61How many bits make up an IPv4 address?128644832 **2Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?**3Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?IP address: subnet mask: default gateway:IP address: subnet mask: default gateway:IP address: subnet mask: default gateway: **IP address: subnet mask: default gateway:IP address: subnet mask: default gateway:4Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic./24/16/20/27 **/25/285Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?The router has an incorrect gateway.Host A has an overlapping network address.Host A has an incorrect default gateway configured.Host A has an incorrect subnet mask.NAT is required for the host A network. **6What subnet mask would a network administrator assign to a network address of if it were possible to have up to 254 hosts?**7Given the IP address and subnet mask of , which of the following would describe this address?This is a useable host address.This is a broadcast address.This is a network address. **This is not a valid address.8What three facts are true about the network portion of an IPv4 address? (Choose three.)identifies an individual deviceis identical for all hosts in a broadcast domainis altered as packet is forwarded **varies in length **is used to forward packets **uses flat addressing9What is the network address of the host /23 in binary?... **.. 00010001.01000011. 01100010.10A router interface has been assigned an IP address of with a mask of To which subnet does the IP address belong?**11Refer to the exhibit. Why would the response shown be displayed after issuing the command ping on a PC?The IP settings are not properly configured on the host. **Internet Protocol is not properly installed on the host.There is a problem at the physical or data link layer.The default gateway device is not operating.A router on the path to the destination host has gone down.12What two things will happen if a router receives an ICMP packet which hasa TTL value of 1 and the destination host is several hops away? (Choose two.)The router will discard the packet.The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.The router will send a time exceeded message to the source host. **The router will increment the TTL value and forward the packet to the next router on the path to the destination host.The router will send an ICMP Redirect Message to the source host. ** 13Refer to the exhibit. An administrator is designing security rules for the /24 network. Each security rule requires an address and mask pair to represent the machines that will be affected by the rule. Which two address and mask pairs will be the most precise way to reference the servers and hosts separately. (Choose two.)****14Which of the following are features of IPv6? (Choose three.)larger address space **faster routing protocolsdata types and classes of service **authentication and encryption **improved host naming conventionssame addressing scheme as IPv415Which process do routers use to determine the subnet network address basedupon a given IP address and subnet mask?binary addinghexadecimal andingbinary divisionbinary multiplicationbinary ANDing **16What is the primary reason for development of IPv6? securityheader format simplificationexpanded addressing capabilities **addressing simplification17Which three IP addresses are private? (Choose three.)******18Which statements are true regarding IP addressing? (Choose two.)NAT translates public addresses to private addresses destined for the Internet.Only one company is allowed to use a specific private network address space.Private addresses are blocked from public Internet by router. **Network is part of the private address space.IP address can be used for a host to direct traffic to itself. **Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)/26/26 **/26 **/27/27/27 **20What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?an interneta network **an octeta radi **21Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?The host subnet mask is incorrect.The default gateway is a network address.The default gateway is a broadcast address.The default gateway is on a different subnet from the host. **22Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)LAN workstationsservers **network printers **routers **remote workstationslaptopsCCNA1 - Module 7CCNA1 - Module 71Which options are properties of contention-based media access for a shared media? (Choose three.)**non-deterministic**less overheadone station transmits at a time**collisions existdevices must wait their turntoken passing2What is a primary purpose of encapsulating packets into frames? provide routes across the internetworkformat the data for presentation to the user**facilitate the entry and exit of data on mediaidentify the services to which transported data is associated3。

相关文档
最新文档