CCNA第一学期Finalexam考试英文版答案

合集下载

思科CCNA1第八章试题及答案英文版

思科CCNA1第八章试题及答案英文版

1. 1. QuestionWhat is a result of connecting two or more switches together?o The number of broadcast domains is increased.o The size of the broadcast domain is increased.o The number of collision domains is reduced.o The size of the collision domain is increased.2. 2. QuestionRefer to the exhibit. How many broadcast domains are there?CCNA1 v6.0 Chapter 8 Exam 005o 1o 2o 3o43. 3. QuestionWhat are two reasons a network administrator might want to create subnets?(Choose two.)o simplifies network designo improves network performanceo easier to implement security policieso reduction in number of routers neededo reduction in number of switches needed4. 4. QuestionRefer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?CCNA1 v6.0 Chapter 8 Exam 007o 255.255.255.0o 255.255.255.128o 255.255.255.192o 255.255.255.224o 255.255.255.2405. 5. QuestionRefer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has beensubnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the newnetwork (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?CCNA1 v6.0 Chapter 8 Exam 004o IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76o IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33o IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33o IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46o IP address: 192.168.10.254 subnet mask: 255.255.255.0, defaultgateway: 192.168.10.16. 6. QuestionIf a network device has a mask of /28, how many IP addresses are available for hosts on this network?o 256o 254o 62o 32o 16o 147. 7. QuestionWhich subnet mask would be used if 5 host bits are available?o 255.255.255.0o 255.255.255.128o 255.255.255.224o 255.255.255.2408. 8. QuestionHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?o 510o 512o1022o 1024o 2046o 20489. 9. QuestionHow many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?o twoo threeo fouro five10. 10. QuestionA network administrator wants to have the same network mask for allnetworks at a particular small site. The site has the following networks and number of devices:IP phones – 22 addressesPCs – 20 addresses neededPrinters – 2 addresses neededScanners – 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?o 255.255.255.0o 255.255.255.192o 255.255.255.224o 255.255.255.240o 255.255.255.248o 255.255.255.25211. 11. QuestionA company has a network address of 192.168.1.64 with a subnet mask of255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks wouldachieve that? (Choose two.)o 192.168.1.16/28o 192.168.1.64/27o 192.168.1.128/27o 192.168.1.96/28o 192.168.1.192/2812. 12. QuestionA network administrator is variably subnetting a network. The smallestsubnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?o 4o 6o 8o 10o 1213. 13. QuestionRefer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?CCNA1 v6.0 Chapter 8 Exam 001o 56o 60o 64o 68o7214. 14. QuestionRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?CCNA1 v6.0 Chapter 8 Exam 002o 10.16.10.160/26o 10.16.10.128/28o 10.16.10.64/27o 10.16.10.224/26o 10.16.10.240/27o 10.16.10.240/2815. 15. QuestionA network administrator needs to monitor network traffic to and fromservers in a data center. Which features of an IP addressing scheme should be applied to these devices?o random static addresses to improve securityo addresses from different subnets for redundancyo predictable static IP addresses for easier identificationo dynamic addresses to reduce the probability of duplicate addresses 16. 16. QuestionWhich two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)o It eliminates most address configuration errors.o It ensures that addresses are only applied to devices that require apermanent address.o It guarantees that every device that needs an address will get one.o It provides an address only to devices that are authorized to be connected to the network.o It reduces the burden on network support staff.17. 17. QuestionA DHCP server is used to assign IP addresses dynamically to the hosts on anetwork. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?o 254o251o 252o 25318. 18. QuestionRefer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the s ite subsection to represent multiple geographical sites of the company, the s ub-site section to represent multiple campuses at each site, and thes ubnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achievedper sub-site?CCNA1 v6.0 Chapter 8 Exam 003o 0o 4o16o 25619. 19. QuestionWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?o 2001:DB8:BC15o 2001:DB8:BC15:Ao 2001:DB8:BC15:A:1o 2001:DB8:BC15:A:1220. 20. QuestionConsider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is /6021. 21. QuestionMatch the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 0122. 22. QuestionRefer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)CCNA1 v6.0 Chapter 8 Exam 006。

CCNA2-FINAL-(A+B+C套)英文版

CCNA2-FINAL-(A+B+C套)英文版

CCNA第二学期《Final Examinnation》英文A卷1 What are two functions of a router? (Choose two.)It forwards data packets toward their destination.It forwards the packet to the destination if the TTL value is 0.It changes the destination IP address of data packets before forwarding them to an exit interface.It determines the best path based on the destination MAC address.It acts as an intersection between multiple IP networks.2 Which router component contains a scaled-down version of the IOS that can be used to reload a complete version of the IOS in the event that the IOS becomes damaged or corrupted?ROMFlashSDRAMNVRAM3 Using default settings, what is the next step in the router boot sequence after the IOS loads from flash? Perform the POST routine.Search for a backup IOS in ROM.Load the bootstrap program from ROM.Load the running-config file from RAM.Locate and load the startup-config file from NVRAM.4Refer to the exhibit. How many routes are ultimate routes?34575ADCABCIt will load balance the traffic between ADC and ABCIt will send the traffic via ABC, and will use ADC as a backup path only when ABC fails.6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.Refer to the exhibit. The network is configured for OSPF routing with default settings. The bandwidths have been configured correctly for each link. If the T1 link between router A and router E fails, what path will a packet from router A take to reach the LAN attached to router F when the network has converged?A, B, C, FA, B, C, E, FA, D, G, E, FA, D, G, H, F8 In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network?D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/09 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.10with static routeswith a routed protocolwith a routing protocolwith directly connected routes11Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.12 Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route? RIPv1RIPv2OSPFEIGRP14 Which three routing metrics are correctly defined? (Choose three.)delay - the link speedreliability - the error rate on a linkload - the amount of traffic on a linkcost - the value to indicate preference for a routehop count - the path selected with the highest bandwidthbandwidth - the amount of time it takes a packet to travel a link15 Which two statements about routing protocols are accurate? (Choose two.)OSPF supports VLSM.RIPv1 supports VLSM.RIPv2 does not have a hop count limit.EIGRP supports discontiguous network designs.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicea modeman Ethernet switcha huba bridge17 When connecting two devices, which situation would normally require the use of a crossover cable? connecting a host to a switchconnecting a switch to a routerconnecting a switch to a switchconnecting a host to a router console port18Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required to make this interface operational?Switch the cable with a known working cable.Issue the no shutdown command on the interface.Configure the interface as a loopback interface.Set the encapsulation for the interface.19 Which port should a terminal emulator be connected to in order to access a router without network connectivity?T1serialconsoleFastEthernet20 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration21Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway?10.1.1.110.1.1.2172.16.1.122Refer to the exhibit. The show cdp neighbors command was run on one of the devices as shown. Based on this information, which two facts can be determined? (Choose two.)The command was run on the router.ABCD is a non- CISCO device.Layer 3 connectivity between two devices exists.ABCD supports routing capability.ABCD is connected to the Fa0/0 interface of the neighboring device.23Refer to the exhibit. Which statement is true about the Ethernet interfaces shown in the network?A frame leaves interface Fa0/0 of R1 with the source MAC address as 000C.3010.9260.A packet will not be forwarded between R1 and R2 until the no shutdown command is issued on the Fa0/0 interface of R1.24Refer to the exhibit. Which solution provides the most efficient use of router resources for forwarding traffic between BR and HQ?RIPRIPv2EIGRPstatic routes25Refer to the exhibit. Pings are failing between HostA and HostB. The network administrator discovers that Router1 does not have a route to the 172.16.0.0 network. Assuming Router2 is configured correctly, which two static routes could be configured on Router1 to enable Host A to reach network 172.16.0.0? (Choose two.)ip route 172.16.0.0 255.255.0.0 S0/0ip route 172.16.0.0 255.255.0.0 S0/1ip route 172.16.0.0 255.255.0.0 192.168.0.1ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/0ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/126Refer to the exhibit. How was the OSPF default gateway entry for R2 determined?Default routes are automatically injected by OSPF into all advertisements.A static default gateway route is defined in the configuration of R2.The default-information originate command is applied on R1.The ISP defines the gateway of last resort and automatically passes it to R1 and R2.The ip default-gateway command is applied on R2.27Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D28192.168.2.1192.135.250.129 Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a static route entry be altered to accommodate a topology change?Keep the existing static route and configure a new static route with the correct next hop IP address.Negate the existing static route and configure a new static route with the correct next hop IP address.Do nothing. The existing static route will automatically update the next hop entry with the new IP address. Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP address.30Refer to the exhibit. The entire 192.168.1.0 network has been allocated to address hosts in the diagram. Utilizing VLSM with contiguous address blocks, which set of addresses and prefixes could be used to create an addressing solution with a minimum waste of IP addresses?答案:D31Refer to the exhibit. Which host has a combination of IP address and subnet mask on the same network as Fa0/0 of Router1?host Ahost Bhost Chost D32Refer to the exhibit. If the EIGRP routing protocol is used throughout the network, which IP address and mask prefix should be sent by router R1 to the Edge router as a result of manual summarization of LANs A, B, C, and D?33Refer to the exhibit. Routers RTRA and RTRB are running OSPF. What entry does RTRA add in the routing table when Serial 0/0/0 receives an update about the network that is attached to RTRB?O 172.16.7.0/30 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.16/28 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.0/24 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.0.0/16 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/034Refer to the exhibit. If RIPv1 is used as the routing protocol throughout the network, what RIPv1 route will router R1 advertise to router R3?10.1.0.010.1.1.010.1.2.035 Which statement correctly describes a feature of RIP?RIP is a link-state routing protocol.RIP uses only one metric—hop count— for path selection.Advertised routes with hop counts greater than 10 are unreachable.Messages are broadcast every 10 seconds.36Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?triggered updatespoison reverseholddown timerssplit horizonroute poisoningsplit horizonhold-down timertriggered updates38Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)The missing information for Blank 1 is the command show ip route.The missing information for Blank 1 is the command debug ip route.The missing information for Blank 2 is the number 100.The missing information for Blank 2 is the number 120.The missing information for Blank 3 is the letter R.The missing information for Blank 3 is the letter C.39Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configured and operational. Both routers are configured to include all connected interfaces in routing updates. R2 is not showing any routes from R1 in the routing table. What is the likely cause?The adjacent interfaces are passive.The distance of 120 exceeds 15 hops.R2 will not accept version 1 updates from R1.Routes are being summarized by R1 but not by R2.40Refer to the exhibit. All routers are configured to use the EIGRP routing protocol with defaultIt will travel via A, B, and C.It will travel via A, F, E, D, and C.It will travel via A, G, H, and C.41 Which multicast address does EIGRP use to send hello and updates packets?224.0.0.5224.0.0.6224.0.0.942 A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is no feasible successor route to a destination network and the successor route fails?It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.It sends queries to adjacent neighbors until a new successor route is found.It immediately sends its entire routing table to its neighbors.It will set the metric for the failed route to infinity.43Refer to the exhibit. EIGRP 1 has been configured on R1. What is the effect of configuring the ip bandwidth-percent eigrp command?The EIGRP bandwidth routing metric will be reduced by 30%.EIGRP 1 protocol traffic will be restricted to 30% of the link bandwidth.Packets that are routed based on EIGRP routing table entries will be limited to 30% of the link bandwidth. EIGRP traffic will be permitted to burst for short periods to 30% above the configured link bandwidth.44Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)All routes are stable.Each route has one feasible successor.The administrative distance of EIGRP has been set to 50.The show ip eigrp topology command has been run on R1.45Refer to the exhibit. A network designer is testing a prototype of WAN connections. All of the routers in the exhibit are configured for OSPF routing. The design requires that the path between routers A and D through ISP-A is the primary and the path through ISP-B servers as a backup. The designer notices that router A has two equal-cost paths to the LAN on router D. How can the designer correct this problem?Issue a clock rate 2000000 interface command on S0/0/1 of router ISP-B.Change the default OSPF reference bandwidth on router A.Configure two static routes with administrative distances of 10.Use the bandwidth command to change the default bandwidth on the link to router B.46Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)Set a lower priority on R2.Configure the routers in the same area.Set a lower cost on R2 compared to R1.Add a backup designated router to the network.Match the hello and dead timers on both routers.47Refer to the exhibit. If the router loopback interfaces, FastEthernet interfaces, and OSPF priorities are configured as shown, which router would win an OSPF DR election?ABCD48 Two routers need to be configured within a single OSPF area. Which two components need to be configured on both routers to achieve this? (Choose two.)the same process IDthe same area IDnetwork addresses and wildcard masksthe same router IDthe same loop back address49Refer to the exhibit. What OSPF network statements are required for the router B to advertise the three networks that are attached?router ospf 1network 10.0.0.0 0.0.0.255 area 0router ospf 1network 10.1.1.0 0.3.255.255 area 0network 10.10.1.0 0.255.255.255 area 0network 10.20.1.0 0.255.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.255.255 area 0network 10.20.1.0 0.0.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.0.255 area 0network 10.20.1.0 0.0.0.255 area 050Refer to the exhibit. A network administrator is trying to determine why router JAX has no OSPF routes in its routing table. All routers are configured for OSPF area 0. From the JAX router, the administrator is able to ping its connected interfaces and the Fa0/1 interface of the ORL router but no other router interfaces. What is a logical step that the network administrator should take to troubleshoot the problem?Reboot the routers.Change the OSPF process ID on all of the routers to 0.Check to see if the cable is loose between ORL and JAX.Check to see if CDP packets are passing between the routers.Use show and debug commands to determine if hellos are propagating.CCNA第二学期《Final Examinnation》英文B卷1 A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a common connection to the Internet that can be shared?hubrouteraccess pointEthernet switch2 Which two router component and operation pair are correctly described? (Choose two.)DRAM - loads the bootstrapRAM - stores the operating systemFlash - executes diagnostics at bootupNVRAM - stores the configuration fileROM - stores the backup configuration filePOST - runs diagnostics on hardware modules3 A router boots and enters setup mode. What is the reason for this?The IOS image is corrupt.Cisco IOS is missing from flash memory.The configuration file is missing from NVRAM.The POST process has detected hardware failure.4Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)5 Which candidate route has the longest match for a packet with a destination address of 10.30.16.48?6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.R 192.168.1.0/24 [120/3] via 192.168.110.1, 00:00:17, Serial0/1/0R 192.168.1.0/24 [120/2] via 192.168.200.1, 00:00:17, Serial0/0/0R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial0/0/1R 192.168.1.0/24 [120/4] via 192.168.101.1, 00:00:17, Serial0/1/18Refer to the exhibit. The router receives a packet that is destined for 192.168.5.79. How will the router handle this packet?It will forward the packet via the FastEthernet0/0 interface.It will forward the packet via the Serial0/0/0 interface.It will forward the packet via the Serial0/0/1 interface.It will drop the packet.9 A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.)It uses the Bellman-Ford algorithm to determine the best path.It displays an actual map of the network topology.It offers rapid convergence in large networks.It periodically sends complete routing tables to all connected devices.It is beneficial in complex and hierarchically designed networks.10 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.11 Which two statements are true about classless routing protocols? (Choose two.)They can be used for discontiguous subnets.They can forward supernet routes in routing updates.They cannot implement classful routes in routing tables.They use only a hop count metric.They do not include the subnet mask in routing updates.12 Which statement is true regarding routing metrics?All routing protocols use the same metrics.EIGRP uses bandwidth as its only metric.Routers compare metrics to determine the best route.The larger metric generally represents the better path.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?RIPv2OSPFEIGRP14 You have been asked to explain converged networks to a trainee. How would you accurately describe a converged network?A network is converged when all routers have formed an adjacency.A network is converged immediately after a topology change has occurred.A network is converged when all routers flush the unreachable networks from their routing tables.A network is converged after all routers share the same information, calculate best paths, and update their routing tables.15Refer to the exhibit. All the routers are properly configured to use the RIP routing protocol with default settings, and the network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?Router A will send the data via the A-D-E path that is listed in the routing table.Router A will load-balance the traffic between A-B-E and A-C-E.Router A will determine that all paths have equal metric cost.Router A will send the data through A-D-E and keep A-B-E and A-C-E as the backup paths.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicean Ethernet switcha huba bridge17 Which component is typically used to connect the WIC interface of a router to a CSU/DSU?V.35 cableRJ-45 adaptercrossover cablestraight-through cable18 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration19Refer to the exhibit. What are the effects of the exhibited commands on the router?All passwords are encrypted.Only Telnet sessions are encrypted.Only the enable password is encrypted.Only the enable password and Telnet session are encrypted.Enable and console passwords are encrypted.20Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that interface FastEthernet0/1 is not functioning. Which action will most likely correct the problem with FastEthernet0/1?A clock rate should be added to the interface configuration.The subnet mask should be added to the interface configuration.An interface description needs to be added to the interface configuration.The no shutdown command needs to be added to the interface configuration.21Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)Three network devices are directly connected to Router2.The serial interface between Router2 and Router3 is up.Router1 and Router3 are directly connected.Six devices are up and running on the network.Layer 3 functionality between routers is configured properly.22Refer to the exhibit. Which route in the routing table of R1 will be discarded by its neighboring router? 192.168.2.0192.168.3.0192.168.9.0192.168.10.0192.168.11.023Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert command on host A. Which two facts could be responsible for the output of this command? (Choose two.)The gateway for Host A is missing or improperly configured.The gateway for Host B is missing or improperly configured.24 In which situation would a default static route be recommended?when connecting an edge router to the Internetwhen variable length subnet masking is in effectwhen there is more than one valid route for a destination networkwhen a destination network has a larger mask than any routes in the routing table25 What is the advantage of configuring a static route with an exit interface instead of a next-hop address?The router will perform a recursive lookup.This route will automatically be used as the gateway of last resort.The exit interface configuration consumes less router processing time.The exit interface configuration has an administrative distance value of 1.26Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D27 A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?Change the routing metric for that route.Nothing. The static route will go away on its own.Change the administrative distance for that route.Remove the route using the no ip route command.28Refer to the exhibit. Hosts on the 192.168.1.0 network cannot communicate with hosts on the 172.16.1.1 network. The network administrator has run the show ip route command on R1.What could be the cause of this problem?The FastEthernet interface on R1 is disabled.Autosummarization is enabled on R1.The serial interface S0/0/0 of R1 is administratively down.No static route or routing protocol is configured.29A new static route must be configured on R1 with the R3 serial interface as the next hop.A new default route must be configured on R1 with the R3 serial interface as the next hop.The default route on R2 should be configured with the R3 serial interface as the next hop.The default route on R2 must be replaced with a new static route and the next hop should be the R1 FastEthernet interface.31Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?32Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?The IP address of host A is incorrect.The default gateway of host A is incorrect.The Fa0/1 interfaces of the two routers are configured for different subnets.The subnet mask for the Fa0/0 interface of R1 is incorrect.33Automatic summarization is enabled on R1.The routing table of R2 contains only classful networks.R2 will reject this update.The routing protocol that is configured on both routers is RIPv1.34 Which additional piece of information is included in the updates of classless routing protocols to support the use of VLSM and discontiguous networks?metricnetwork maskneighbor router IDadministrative distance35Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is true regarding how the routers in this topology will respond to this event?Router4 will learn about the failed route 30 seconds later in the next periodic update.Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires.Router5 immediately flushes the unreachable route from its routing table.Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.clears an unreachable route from the routing table after the invalid timer expiresprevents regular update messages from inappropriately reinstating a route that may have gone badremoves an unreachable route from the routing table after the flush timer expireslimits the period of time or number of hops a packet can traverse through the network before it should be discardedused to mark the route as unreachable in a routing update that is sent to other routers37 Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)authenticationlink-state advertisementshold-down timersSpanning Tree Protocolsplit horizon38Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?An incorrect IP address is configured between the two routers.No static route is configured on Router2.A routing loop has occurred.No routing protocol is configured on either of the two routers.39。

思科CCNA5.0Final答案汇总

思科CCNA5.0Final答案汇总

1PDU 封装的正确顺序是什么?答案说明最高分值correctness of response 2 points for Option 10 points for any other option22管理员在发出 ping 命令之后在交换机上使用 Ctrl-Shift-6 键组合。

使用这些按键有什么用途?重新启动ping 进程中断 ping 进程退出到不同的配置模式允许用户完成命令要中断一个 IOS 进程(例如 ping 或 traceroute ),用户可以输入 Ctrl-Shift-6 键组合。

Tab 用于完成命令参数或变量的其余部分。

要退出配置模式并进入特权模式,可以使用 Ctrl-Z 按键。

CTRL-R 将会重新显示当前键入的行,这样便于用户按 Enter 并重新发出 ping 命令。

答案说明最高分值correctness of response 2 points for Option 2 0 points for any other option23 建立融合网络有何用途?为所有终端设备提供高速连接确保平等对待所有类型的数据包实现数据网络基础架构设备的容错能力和高可用性降低部署和维护通信基础设施的成本随着技术的发展,各个公司现在可以将不同的网络整合到一个平台之上,称为融合网络。

在融合网络中,语音、视频和数据通过同一网络传输,从而使人们不必再创建和维护各个单独的网络。

这也降低了提供和维护通信网络基础设施相关的成本。

答案说明最高分值correctness of response 2 points for Option 40 points for any other option24请参见图示。

哪个区域最有可能是图中所示的公司网络的外联网?区域A区域B区域C区域D外联网是外部实体访问其他公司的数据的平台。

其形式可能是产品供应商所使用的库存服务器,也可能是外部实体用来访问当天客户数量的当前信息的Web 服务器。

CCNA英文试题_(含答案)

CCNA英文试题_(含答案)

1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。

思科第一学期期末试题目及答案

思科第一学期期末试题目及答案

1请参见图示。

主机 A 用户向主机 B 用户发送了一封电子邮件。

主机 A 发送了哪种类型的信息?广播组播同播单播2为了将PC 加入到网络环境中,应通过软件配置哪两个组件?(选择两项。

)MAC 地址IP 地址内核外壳(shell)子网掩码3哪两项是MAC 地址的特征?(选择两项。

)指示网络中主机的物理位置。

由DHCP 服务器动态分配。

以十六进制格式显示。

是物理地址。

是一种基于电缆的地址。

4哪种连接需要使用直通电缆?PC 端口至PC 端口PC 端口至路由器接口交换机端口至路由器端口交换机端口至交换机端口5路由器在收到包含广播MAC 地址的帧时会执行什么操作?它不会将该帧转发给另一个网络。

它会以其IP 地址作为回复将该帧转发回发送主机。

它会将帧从除该帧所在接口的其它所有接口转发出去。

它会将该帧转发回接收接口,以确保局域网中的所有主机都能收到。

6DNS 服务器的功能是什么?将IP 地址映射为MAC 地址。

将计算机或域名转换为相应的IP 地址。

管理客户端所在的域。

接收从客户端发来的HTTP 请求。

7哪两种网络故障与物理层相关?(选择两项。

)电缆和接头损坏编址不正确子网掩码不正确组件过热默认网关不正确8哪一层是主机进入网络的第一个进入点?核心层接入层网络层分布层9下列哪些是私有IP 地址的地址范围?(选择三项。

)10.0.0.0 到10.255.255.255200.100.50.0 到200.100.25.255150.150.0.0 到150.150.255.255172.16.0.0 到172.31.255.255192.168.0.0 到192.168.255.255127.16.0.0 到127.31.255.25510请参见图示。

一家组织的安全策略允许员工在家里连接办公室内部网。

这是一种什么安全策略?合理使用事件处理网络维护远程访问11请参见图示。

将Linksys 集成路由器上的安全模式设置为WEP 有什么作用?WEP 安全模式能够使接入点向客户端告知它的存在。

CCNA Exploration 1 Final Exam Answers

CCNA Exploration 1 Final Exam Answers

CCNA Exploration 1 Final Exam Answers1.Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)The address that is assigned to the computer represents private addressing.The computer is unable to communicate outside of the local network.The network of this computer can have 126 hosts.The prefix of the computer address is /27.The IP address that is assigned to the computer is routable on the Internet.The IP address that is assigned to the computer is a broadcast address.2. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?255.255.0.0255.255.248.0255.255.252.0255.255.254.0255.255.255.0255.255.255.1283. Which OSI layers offers reliable, connection-oriented data communication services? applicationpresentationsessiontransportnetwork4. Which type of media is immune to EMI and RFI? (Choose two.)10 Base-T10 Base-210 Base-5100 Base-FX100 Base TX1000 Base LX5. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?IPUDPEtherneta connectionless acknowledgementan upper-layer, connection-oriented protocol or service6. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?172.16.128.0 255.255.255.224172.16.128.0 255.255.0.0172.16.128.0 255.255.192.0172.16.128.0 255.255.224.0172.16.128.0 255.255.255.1927. During the encapsulation process, which identifiers are added at the transport layer?two networks routing the packetstwo applications communicating the datatwo hosts at either end of the communicationtwo nodes on the local network exchanging the frame8. What are three characteristics of CSMA/CD? (Choose three)Devices can be configured with a higher transmission priority.A jam signal indicates that the collision has cleared and the media is not busy.A device listens and waits until the media is not busy before transmitting.The device with the electronic token is the only one that can transmit after a collision.All of the devices on a segment see data that passes on the network medium.After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.9.Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?Connection 1 – rollover cableConnection 2 – straight-through cableConnection 3 – crossover cableConnection 1 – crossover cableConnection 2 – rollover cableConnection 3 – crossover cableConnection 1 – straight-through cableConnection 2 – crossover cableConnection 3 – crossover cableConnection 1 – straight-through cableConnection 2 – crossover cableConnection 3 – straight-through cableConnection 1 – crossover cableConnection 2 – straight-through cableConnection 3 – crossover cable10.Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.9412.Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?145713.Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)This is a server response.The UDP protocol is being used.The destination port indicates a Telnet session.The return segment will contain a source port of 23.The next session originated from the client of this session will use the source port number 13358.14.Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?IP address of the hostdefault gateway of the hostIP address of the homepage for the hostprimary domain name server for the hostIP address of the website resolver1.mooki.local15.Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?The packet will be dropped.The packet will be forwarded via FastEthernet 0/0.The packet will be forwarded to the destination host.The packet will be forwarded to the 192.168.1.3 next-hop address.16.Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?The data is automatically encrypted.A Telnet server process is running on PC1.The connection is made through a VTY session on the router.A GET request was sent to RouterB to retrieve data during this session.17. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)172.16.4.63 /26172.16.4.129 /26172.16.4.191 /26172.16.4.51 /27172.16.4.95 /27172.16.4.221 /2718.Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser19. Which three statements characterize the transport layer protocols? (Choose three.) TCP and UDP port numbers are used by application layer protocols.TCP uses port numbers to provide reliable transportation of IP packets.UDP uses windowing and acknowledgments for reliable transfer of data.TCP uses windowing and sequencing to provide reliable transfer of data.TCP is a connection-oriented protocol. UDP is a connectionless protocol.20. The Layer 4 header contains which type of information to aid in the delivery of data? service port numberhost logical addressdevice physical addressvirtual connection identifier21.Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?AthensAnkaraLondonParisPC422.Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?leaving host Aleaving ATLleaving Dallasleaving NYC23Refer to the exhibit. Which set of devices contains only intermediary devices?A, B, D, GA, B, E, FC, D, G, IG, H, I, J24Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)This exchange is part of the three-way handshake.The source port indicates that a Telnet session has been initiated.The data is flowing from server to client.The destination port indicates that an HTTP session has been initiated.The data listed is associated with the transport layer.The source port does not support communication with the destination port that is listed.25. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two)Router(config)# line vty 0 3Router(config-line)# password c13c0Router(config-line)# loginThe entries specify three Telnet lines for remote access.The entries specify four Telnet lines for remote access.The entries set t he console and Telnet password to “c13c0″.Telnet access will be denied because the Telnet configuration is incomplete.Access will be permitted for Telnet using “c13c0″ as the password.26.Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)segment1segment2segment3segment4segment527. Which password is automatically encrypted when it is created?vtyauxconsoleenable secretenable password28.Refer to the exhibit. Which logical topology best describes the exhibited network?starringpoint-to-pointmultiaccessmesh29.Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?issue the clock rate command on interface Serial 0/0/0issue the description command on interface Serial 0/0/1issue the ip address command on interface FastEthernet 0/0issue the no shutdown command on interface FastEthernet 0/130. What are two characteristics of the data link layer? (Choose two.)It segments and reorders the data.It exchanges the frames between nodes.It defines the method by which network devices place data onto the media.It manages the transfer of data between the processes that run on each host.It retrieves signals from the media and restores them to their bit representations.31. Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255200.100.50.0 to 200.100.25.255150.150.0.0 to 150.150.255.255172.16.0.0 to 172.31.255.255192.168.0.0 to 192.168.255.255127.16.0.0 to 127.31.255.25532.Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.1.MUA2.MDA3.MTA4.SMTP5.MTA6.POP7.MDA8.MUA1.MUA2.POP3.MDA4.SMTP5.MTA6.MDA7.SMTP8.MUA1.MUA2.POP3.SMTP4.MDA5.MTA6.SMTP7.POP8.MUA1.MDA2.SMTP3.MTA4.SMTP5.MTA6.MUA7.POP8.MDA1.MUA2.SMTP3.MTA4.SMTP5.MTA6.MDA7.POP8.MUA33.Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?Host A was assigned a network address.Host B was assigned a multicast address.Host A and Host B belong to different networks.The gateway address was assigned a broadcast address.34.Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?00-08-a3-b6-ce-46198.133.219.25:80C 198.133.219.0/24 is directly connected, FastEthernet0/035. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?access pointhosthubrouterswitch36. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?applicationpresentationsessiontransport37. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?0 to 2550 to 10231024 to 4915149152 to 6553538.Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?IP address incorrectly enterednetwork cables unpluggedsubnet mask incorrectly enterednetwork card failure39.Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?only computer Donly computer A and computer Donly computer B, computer C, and computer Dall computers40. In a Cisco IOS device, where is the startup-configuration file stored?FlashNVRAMRAMROM41.Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three)192.168.18.38192.168.18.48192.168.18.49192.168.18.52192.168.18.59192.168.18.6342. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?consoleenableenable secretVTY43. Which prompt represents the appropriate mode used for the copy running-configstartup-config command ?Switch-6J>Switch-6J#Switch-6J(config)#Switch-6J(config-if)#Switch-6J(config-line)#44.Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?127.0.0.1192.168.64.196192.168.254.1192.168.254.9192.168.254.25445. What is true regarding network layer addressing? (Choose three)uses a flat structureprevent broadcastsheirarchicaluniquely identifies each host48 bits in lengthcontains a network portion46.Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?address translationDHCP servicesftpdweb server47. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?Use the ipconfig /all co mmand at the host’s command prompt.Use the ping 127.0.0.1 command at the command prompt.Use the traceroute command at the command prompt to identify any failures on the path to the gateway.Use FTP to check for connectivity to remote sites.Download a troubleshooting tool from the PC manufacturer’s website.48.Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two)A single broadcast domain is presentTwo logical address ranges are required.Three broadcast domains are shown.Four networks are needed.Five collision domains exist.49. Which two functions of the OSI model occur at layer two? (Choose two.)physical addressingencodingroutingcablingmedia access control50. When must a router serial interface be configured with the clock rate command?when the interface is functioning as a DTE devicewhen the interface timers have been clearedwhen the connected DTE device is shut downwhen the interface is functioning as a DCE device。

(完整版)ccna1章节与期末答案

(完整版)ccna1章节与期末答案

第一章:正确答案:2.4.5•解析:由于不需要使用网络设备和专用服务器,对等网络易于创建,复杂性更低,且成本更少。

而且对等网络也没有集中管理。

这种网络安全性更低,不可扩展,而且那些同时充当客户端和服务器的设备可能性能更差正确答案:1解析:正确答案: 3.5解析:选择网络介质的条件包括:所选介质可以成功传送信号的距离、要安装所选介质的环境、必须传输的数据量和速度以及介质和安装的成本。

正确答案:3和4解析:终端设备上的应用程序可以生成数据,更改数据内容并且负责启动封装过程。

正确答案:1和4解析:终端设备会发出通过网络传输的数据。

中间设备会在链路发生故障时通过备用路径传输数据,并且会过滤数据传输以增强安全性。

网络介质提供网络消息的传输通道。

正确答案:4解析:外联网是公司外部的人或企业合作伙伴访问数据的网络区域。

内部网只描述通常仅供内部人员访问的网络区域。

当设备连接到有线网络时,有线LAN 会受BYOD(自带设备)影响。

使用大学无线LAN 的设备多为平板电脑和智能手机。

大学生主要使用无线WAN 来访问他们的手机运营商网络。

.正确答案:2解析:由于通过Internet 可以联系在线供应商,所以家庭用户通过Internet 进行网上购物。

内联网基本上是仅供内部使用的局域网。

外联网是外部合作伙伴访问组织内部特定资源的网络。

家庭用户并不一定使用LAN 来访问Internet。

例如,PC 可以通过调制解调器直接连接到ISP。

正确答案:1解析:内部网这个术语用于表示一个组织的私有局域网和广域网连接。

内部网的设计旨在仅允许该组织的成员、员工或其他获得授权的人员进行访问。

正确答案:2和4解析:电缆和DSL 均能实现高带宽、始终联网,并提供到主机计算机或LAN 的以太网连接。

10正确答案:2和3解析:移动电话连接需要使用移动电话网络。

卫星连接通常用于家庭或企业外部不便使用物理布线的位置。

11正确答案:2解析:当对网络资源的请求超出了可用容量时,网络就会变得拥堵。

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案

CCNA第一学期Finalexam考试英文版答案(R&S.)C 1A medium-sized business is researching available options for connecting to the Internet.Thecompany is looking for a high speed option with dedicated, symmetric access.Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2What is the purpose of having a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining thecommunication infrastructure3What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5A network technician is attempting to configure an interface by entering the followingcommand:SanJose(config)#ip address192.168.2.1255.255.255.0.The command isrejected by the device.What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued.Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit.From global configuration mode,an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only!Violators will be prosecuted!V When users log in using Telnet,the banner does not appear correctly.What is the problem? The banner message is too long.The delimiting character appears in the banner message.The symbol“!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8What are three characteristics of an SVI?(Choose three.) It is designed as a security protocol to protect switch ports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1by default.9A technician configures a switch with these commands: SwitchA(config)#interface vlan1SwitchA(config-if)#ip address192.168.1.1255.255.255.0 SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10In computer communication,what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14When IPv4addressing is manually configured on a web server,which property of the IPv4configuration identifies the network and host portion for an IPv4address?DNS server addresssubnet maskdefault gatewayDHCP server address15A network administrator is troubleshootingconnectivity issues on a ing a tester,the administrator notices that the signals generated by the server NIC are distorted and not usable.In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer16A network engineer is measuring the transfer of bits across the company backbone for amission critical database application.The engineer notices that the network throughputappears lower than the bandwidth expected.Which three factors could influence thedifferences in throughput?(Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19What are the three primary functions provided by Layer 2data encapsulation?(Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22What are two examples of the cut-through switching method?(Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B,what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24What are two services provided by the OSI network layer?(Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25What information is added during encapsulation at OSI Layer3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26What are two functions of NVRAM?(Choose two.)to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit.The network administrator for a small advertising company has chosen to use the192.168.5.96/27 network for internal LAN addressing.As shown in the exhibit,a static IP address is assigned to the company web server.However,the web server cannot access the Internet.The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet,and the web server is able to ping local workstations.Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28Why does a Layer3device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destination network29What are the three ranges of IP addresses that are reserved for internal private use?(Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731What type of IPv6address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit.On the basis of the output,which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are4hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is2 milliseconds.This host does not have a default gateway configured.33Which subnet would include the address192.168.1.96as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934How many hosts are addressable on a network that has a mask of255.255.255.248?268141625435Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different,depending on requirements.Subnets may only be subnetted one additional time.Bits are returned,rather than borrowed,to create additional subnets.36Refer to the exhibit.Consider the IP address of 192.168.10.0/24that has been assigned to a high school building.The largest network in this building has100 devices.If192.168.10.0is the network number for the largest network,what would be the network number for thenext largest network,which has40devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037In what two situations would UDP be the preferred transport protocol over TCP?(Choosetwo.)when applications need to guarantee that a packet arrives intact,in sequence,and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38What important information is added to the TCP/IPtransport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39What is the TCP mechanism used in congestion avoidance? three-way handshakesocket pairtwo-way handshakesliding window40Which three statements characterize UDP?(Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented,fast transport of data at Layer 3.UDP relies on application layer protocols for error detection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42Which two protocols operate at the highest layer of the TCP/IP protocol stack?(Choose two.)DNSEthernetIPPOPTCPUDP43Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers?(Choose two.)clientmasterserverslavetransient44What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port11045A wireless host needs to request an IP address.What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46When planning for network growth,where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47When applied to a router,which command would help mitigate brute-force password attacksagainst the router?exec-timeout30service password-encryptionbanner motd$Max failed logins=5$login block-for60attempts5within6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address10.1.1.1.What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply fromthe remote device.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CCNA第一学期Finalexam考试英文版答案(R&S.)C1 A medium-sized business is researching available options for connecting to the Internet. Thecompany is looking for a high speed option with dedicated, symmetric access. Whichconnection type should the company choose?DSLdialupsatelliteleased linecable modem2 What is the purpose of having a converged network? to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining the communication infrastructure3 What characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4 Which connection provides a secure CLI session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection5 A network technician is attempting to configure aninterface by entering the followingcommand: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command isrejected by the device. What is the reason for this? The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.6 After several configuration changes are made to a router, the copy running-configurationstartup-configuration command is issued. Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server7Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using thecommand banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?The banner message is too long.The delimiting character appears in the banner message.The symbol “!”signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.8 What are three characteristics of an SVI? (Choose three.)It is designed as a security protocol to protect switchports.It is not associated with any physical interface on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1 by default.9 A technician configures a switch with these commands:SwitchA(config)# interface vlan 1SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0SwitchA(config-if)# no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access10 In computer communication, what is the purpose of message encoding?to convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11 What protocol is responsible for controlling the size of segments and the rate at whichsegments are exchanged between a web client and a web server?TCPIPHTTPEthernet12 What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affecting other layers.It ensures a device at one layer can function at the next higher layer.13 What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14 When IPv4 addressing is manually configured on aweb server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?DNS server addresssubnet maskdefault gatewayDHCP server address15 A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? presentation layernetwork layerphysical layerdata link layer16 A network engineer is measuring the transfer of bits across the company backbone for amission critical database application. The engineer notices that the network throughputappears lower than the bandwidth expected. Which three factors could influence thedifferences in throughput? (Choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method applied to the datathe type of traffic that is crossing the networkthe latency that is created by the number of network devices that the data is crossingthe bandwidth of the WAN connection to the Internetthe reliability of the gigabit Ethernet infrastructure of the backbone17 Which type of UTP cable is used to connect a PC to a switch port?consolerollovercrossoverstraight-through18 What is a characteristic of the LLC sublayer?It provides the logical addressing required that identifies the device.It provides delimitation of data according to the physical signaling requirements of the medium.It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.It defines software processes that provide services to the physical layer.19 What are the three primary functions provided by Layer 2 data encapsulation? (Choosethree.)error correction through a collision detection methodsession control using port numbersdata link layer addressingplacement and removal of frames from the mediadetection of errors through CRC calculationsdelimiting groups of bits into framesconversion of bits into data signals20 What will a host on an Ethernet network do if it receives a frame with a destination MACaddress that does not match its own MAC address?It will discard the frame.It will forward the frame to the next host.It will remove the frame from the media.It will strip off the data-link frame to check the destination IP address.21 What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MAC address tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC addressexamining the destination MAC address to add new entries to the MAC address table22 What are two examples of the cut-through switching method? (Choose two.)store-and-forward switchingfast-forward switchingCRC switchingfragment-free switchingQOS switching23Refer to the exhibit.If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD172.168.10.99CC:CC:CC:CC:CC:CC172.168.10.65BB:BB:BB:BB:BB:BBAA:AA:AA:AA:AA:AA24 What are two services provided by the OSI network layer? (Choose two.)performing error detectionrouting packets toward the destinationencapsulating PDUs from the transport layerplacement of frames on the mediacollision detection25 What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address26 What are two functions of NVRAM? (Choose two.) to store the routing tableto retain contents when power is removedto store the startup configuration fileto contain the running configuration fileto store the ARP table27Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assignedto the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?subnet maskDNS addresshost IP addressdefault gateway address28 Why does a Layer 3 device perform the ANDing process on a destination IP address andsubnet mask?to identify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty framesto identify the network address of the destinationnetwork29 What are the three ranges of IP addresses that are reserved for internal private use? (Choosethree.)10.0.0.0/864.100.0.0/14127.16.0.0/12172.16.0.0/12192.31.7.0/24192.168.0.0/1630 Which three addresses are valid public addresses? (Choose three.)198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.22731 What type of IPv6 address is FE80::1?loopbacklink-localmulticastglobal unicast32Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)There is connectivity between this device and the device at 192.168.100.1.The connectivity between these two hosts allows for videoconferencing calls.There are 4 hops between this device and the device at 192.168.100.1.The average transmission time between the two hosts is 2 milliseconds.This host does not have a default gateway configured.33 Which subnet would include the address 192.168.1.96 as a usable host address?192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/2934 How many hosts are addressable on a network that has a mask of 255.255.255.248?268141625435 Which statement is true about variable-length subnet masking?Each subnet is the same size.The size of each subnet may be different, depending on requirements.Subnets may only be subnetted one additional time.Bits are returned, rather than borrowed, to create additional subnets.36Refer to the exhibit. Consider the IP address of 192.168.10.0/24 that has been assigned to a high school building. The largest network in this building has 100 devices. If 192.168.10.0 is the network number for the largest network, what would be the network number for the next largest network, which has 40 devices?192.168.10.0192.168.10.128192.168.10.192192.168.10.224192.168.10.24037 In what two situations would UDP be the preferred transport protocol over TCP? (Choosetwo.)when applications need to guarantee that a packet arrives intact, in sequence, and unduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic38 What important information is added to the TCP/IP transport layer header to ensurecommunication and connectivity with a remote network device?timing and synchronizationdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39 What is the TCP mechanism used in congestion avoidance?three-way handshakesocket pairtwo-way handshakesliding window40 Which three statements characterize UDP? (Choose three.)UDP provides basic connectionless transport layer functions.UDP provides connection-oriented, fast transport of data at Layer 3.UDP relies on application layer protocols for errordetection.UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.UDP relies on IP for error detection and recovery.UDP provides sophisticated flow control mechanisms.41 Which two tasks are functions of the presentation layer? (Choose two.)compressionaddressingencryptionsession controlauthentication42 Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)DNSEthernetIPPOPTCPUDP43 Which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers? (Choose two.)clientmasterserverslavetransient44 What is the function of the HTTP GET message?to request an HTML page from a web serverto send error information from a web server to a web clientto upload content to a web server from a web clientto retrieve client email from an email server using TCP port 11045 A wireless host needs to request an IP address. What protocol would be used to process therequest?FTPHTTPDHCPICMPSNMP46 When planning for network growth, where in the network should packet captures take place toassess network traffic?on as many different network segments as possibleonly at the edge of the networkbetween hosts and the default gatewayonly on the busiest network segment47 When applied to a router, which command would help mitigate brute-force password attacksagainst the router?exec-timeout 30service password-encryptionbanner motd $Max failed logins = 5$login block-for 60 attempts 5 within 6048Refer to the exhibit.An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?Connectivity to the remote device was successful.A router along the path did not have a route to the destination.A ping packet is being blocked by a security device along the path.The connection timed out while waiting for a reply from the remote device.。

相关文档
最新文档