CCNA、CCNP、CCIE模拟试题
思科认证CCNA认证试题与答案中文版

答案:D 注释:这个题目不是太严谨,应该加上子网掩码. A:224. 0. 0. 5 是多播地址 B: 127. 0.0. 0 保留作为测试使用 C:网络地址 26、 设置主接口由 up 转 down 后延迟 30 秒切换到备份接口,主 接口 由 down 转 up 后 60 秒钟切换回主接口的配置为()
忍一句,息一怒,饶一着,退一步。——《增广贤文》
人之为学,不日进则日退,独学无友,则孤陋而难成;久处一方,则习染而不自觉。——《顾炎武》
答案:D 注释:255. 255. 255. 255 是全网广播,DHCP 客户端发送全网广播来 查 找 DHCP 服务器. 24、 下而有关 NAT 叙述正确的是() (A) NAT 是英文“地址转换”的缩写,又称地址翻译 (B) XAT 用来实现私有地址与公用网络地址之间的转换 (C) 当内部网络的主机访问外部网络的时候,一定不需要 NAT (D) 地址转换的提出为解决 IP 地址紧张的问题提供了一个有效途 径 答案:ABD 25、 以下属于正确的主机的 IP 地址的是()
(A) arp-a (B) traceroute (C) routeprint (D) displayiprouting-table
答案:D 23、 D0. 0. 0 (B) 10. 0. 0. 1 (0127. 0. 0. 1 (D)255. 255. 255. 255
192. 168. 1. 1
答案:D 注释:PC 的'默认网关要指向路由器的以太网口的 IP 地址. 28、 ISDNB 信道速率是()
(A) 16kbps (B) 64kbps
2015年思科模拟题:CCNA、CCNP、CCIE模拟试题

2015年思科模拟题:CCNA、CCNP、CCIE模拟试题ccna1.which of the following types of packets will be allowed entry when a serial interface's inbound access list has been configured to prohibit entry for tcp and udp ports 21, 23 and 25? (select three options.)a. smtpb. stpc. ftpd. telnete. httpf. pop32.one of the trainees assigned to you want to know which services use tcp. what can you tell him? (select three options.)a. dhcpb. smtpc. snmpd. ftpe. httpf. tftp3.which of the following network masks would you use to reduce any wastage of ip addresses in point-to- point wan links on a network that supports vlsm?a. /38b. /30c. /27d. /23e. /184.how would you configure a router to avoid situations such as split horizon issues hampering routing updates on a frame relay network?a. configure a separate sub-interface for each pvc with a unique dlci and subnet assigned to the subinterface.b. configure each frame relay circuit as a point-to-point line to support multicast and broadcast traffic.c. configure one sub-interface to disperse into multiple pvc connections to multiple remote router interfaces.d. configure as many as possible sub-interfaces on the same subnet.5.with regard to isdn, which of the following are true? (choose all that apply.)a. legacy ddr can use port information to defineinteresting traffic.b. legacy ddr can configure multiple dialer configurations on the same interface.c. legacy ddr can use acls to define interesting traffic.d. hdlc or ppp can be used to encapsulate isdn d channel information.e. the bri interfaces on isdn routers with dialer profiles configured cannot belong to multiple dialer pools.f. dialer profiles cannot use acls to define interesting traffic.ccnp- bsci6.which of the following is a characteristic of link-state protocols?a. a network topology change generates an update that is broadcast to every router onthe network.b. the periodic routing update interval is slightly different in each router on a subnet.c. each router creates a routing table that only includes its directly connected neighbors.d. link-state protocols send routing updates only when there is a change in the networktopology.7.what is the term associated with synchronizing the routing tables after a topology change occurs?a. floodingb. broadcastingc. convergenced. summarization8.which of the following must be determined first by the router in order to route the data?a. the distance metric of the datab. the source address of the datac. which routing protocol is used by the datad. whether the protocol suite of the data is active9.you are a technician at abc. abc has the subnet/mask of 172.29.100.0/26 set aside for small remote locations. each location will have 5 ip devices connected to the network. which vlsm mask will provide the minimum number of hosts you require?a. /27b. /28c. /29d. /30e. /3110.you are a trainee technician at abc. your instructor shows you the following route summarization entry: 192.168.134.0/22 your instructor wants to know how many class c addresses are contained in this summarization. what would your reply be?a. 1b. 2c. 4d. 8e. 16- bcmsn11.which command enables an etherchannel bundle on a catalyst 2900xl switch?a. port groupb. set port channel onc. port etherchannel enabled. set etherchannel port enable12.which two statements about dynamic vlans are true? (choose two)a. each switch port is assigned to a specific vlan.b. dynamic vlans require a vlan membership policy server.c. devices are in the same vlan regardless of which port they attach to.d. dynamic vlan assignment are made through the command interface.13.which statement is correct about 802.1q trunking? (select all that apply)a. both switches must be in the same vtp domain.b. the encapsulation type of both ends of the trunk does not have to match.c. the native vlan on both ends of the trunk must be vlan 1.d. 802.1q trunking can only be configured on a layer 2 port.e. in 802.1q trunking, all vlan packets are tagged on the trunk link, except the native vlan.14.you need to take advantage of fastethernet ports. which two actions avoid configuration problems that cause the port to be automatically disabled? (choose two)a. allow some ports in a channel to be disabled.b. configure the ports in a channel as dynamic vlan ports.c. configure all ports in a channel to operate at the same speed and duplex mode.d. assign all ports in a channel to the same vlan orconfigure them as trunk ports.15.what is the cause of jitter?a. variable queue delaysb. packet dropsc. transmitting too many small packetsd. compression- bcran16.regarding dhcp, dhcp relay and dhcp server are mutually exclusive.a. none of the choices.b. truec. false only for certain ios versiond. falsee. false only for ios version below v1017.a lapd address field can be 1 or 2 bytes long.a. trueb. falsec. true only in the usd. true only in asiae. true only in europe18.which of the following are valid functions of the lock dte modem attribute (choose all that apply)?a. disable uart.b. enable uart.c. locks the data speed between the computer motherboard and the rs232 port.d. locks the data speed between the modem and the dte device.19.which of the following are not the valid types of atm addresses (choose all that apply)?a. dccb. gctc. bspd. icde. nsapf. aed20.which of the following are not the valid types of x.25 plp packet fields (choose all that apply)?a. user datab. lcic. gfid. ptie. none of the choices.- cit21.you are a technician at . your newly appointed abc trainee wants to know what the similarities between topology diagrams and network configuration tables are.what would your reply be? (choose all that apply.)a. both share few components.b. both share many of the same components.c. both define physical memory components.d. both are used for troubleshooting.e. both use lines and symbols to represent network components.22.you are a technician at . your newly appointed abc trainee wants to know what the default action for the output of debug and system error messages is. what would your reply be?a. output goes to the remote console if logging is off.b. output is sent to the console terminal.c. error logging automatically invokes debug output to the designated tftp server.d. output configuration requires a tftp server to write filese. output is written to a syslog server.23.you are the network administrator at . abc hasa switched network. you want to control the designation of the spanning-tree root bridge in the abc network. what should you do?a. by enabling uplink-fast on the ports of the desired switch.b. by lowering the bridge priority on the desired switch.c. by setting a lower mac address on the designated switch.d. by raising the bridge id on one switch.24.you are a technician at abc. you receive a report from several abc users who complain that they get slow responses when sending and receiving email, especially when browsing the internet. you investigate the complaint by checking the output of a ping command issued from her computer and find that it indicates intermitted success and failures messages, when attempting to contact the email server. a tracert to the corporate internet gateway router shows high latency and occasional time out messages.what would be the most effective troubleshooting approach if you are to determine the cause of the slow response time?a. bottom-up approachb. random access approachc. divide and conquer approachd. top-down approache. top-down rule-out approach25.you are a technician at . your newly appointed abc trainee wants to know what features make ospf more suitable than rp in large network installations. what would your reply be? (choose all that apply.)a. diffusing update algorithmb. no hop count limitationc. higher routing update overheadd. faster convergencee. lower routing update overheadccie26.you are the network administrator at abc. you are troubleshooting a network problem. you want to trace the route to a unix workstation that you want to reach through the internet. however, traceroute does not work.currently, there is an inbound access-list applied to the serial interface on router 1. an entry in the access-list states "access-list 101 permit tcp any any". what access-list entry may you need to be added to the access-list in order to get traceroute to work?a. access-list 101 permit udp any anyb. access-list 101 permit icmp any any time-exceeded access-list 101 permit icmp any any port-unreachablec. access-list 101 permit icmp any any time-exceeded access-list 101 permit icmp any any net-unreachabled. access-list 101 permit icmp any any echo access-list 101 permit icmp any any net-unreachablee. access-list 101 permit udp any any access-list 101 permit icmp any any protocol-unreachable27.what does the bgp backdoor command do?a. it changes the distance of an ibgp route to 20.b. it changes the distance of an ebgp route to 200.c. it changes the distance of an igp route to 20.d. it does not effect any changes in distance of the route.e. it changes the distance of an igrp route to 200.28.which of the following dns resource records is not valid?a. nsb. ptrc. mxd. fqdne. a29.which of the following features is provided by rip v2that were previously not possible with rip v1? (choose all that apply.)a. classless routing and split-horizon.b. poison reverse and updating to multicast addresses.c. poison reverse and classless routing.d. classless routing and updating to multicast addresses.e. route tag and classless routing.30.which of the following statements is valid when taking custom queuing into account?a. custom queuing has the ability to restrict a particular type of traffic to a given bandwidth not matter what is load is like on that link.b. custom queuing looks at groups of packets from the similar source-destination pairs.c. custom queuing will not proceed to a next queue unless the current queue is empty.d. custom queuing can prevent one type of traffic from dominating a busy link.。
CCNA考试题

C C N A考试题(总9页) -CAL-FENGHAI.-(YICAI)-Company One1-CAL-本页仅作为文档封面,使用请直接删除第一部分:选择题1:提供可靠数据传输、流控的是OSI的第几层()A、表示层B、网络层C、传输层D、会话层E、链路层2:子网掩码产生在那一层()A、表示层B、网络层C、传输层D、会话层3:当路由器接收的IP报文的目的地址不是本路由器的接口IP地址,并且在路由表中未找到匹配的路由项,采取的策略是()A、丢掉该分组B、将该分组分片C、转发该分组D、以上答案均不对4:当一台主机从一个网络移到另一个网络时,以下说法正确的是()A、必须改变它的IP地址和MAC地址B、必须改变它的IP地址,但不需改动MAC地址C、必须改变它的MAC地址,但不需改动IP地址D、MAC地址、IP地址都不需改动5:ISO提出OSI的关键是()A、系统互联B、提高网络速度C、为计算机制定标准D、经济利益6:OSI参考模型按顺序有哪些层()A、应用层、传输层、网络层、物理层B、应用层、表示层、会话层、网络层、传输层、数据链路层、物理层C、应用层、表示层、会话层、传输层、网络层、数据链路层、物理层D、应用层、会话层、传输层、物理层7:LAN的拓扑形式一般以()为主。
A、总线型B、环型C、令牌环D、载波侦听与冲突检测CSMA/CD8:网段地址154.27.0.0的网络,若不做子网划分,能支持()台主机A、254B、1024C、65,534D、16,777,2069:路由器网络层的基本功能是()。
A、配置IP地址B、寻找路由和转发报文C、将MAC地址解释成IP地址10:选出基于TCP协议的应用程序()。
A、PINGB、TFTPC、TELNETD、OSPF11:某公司申请到一个C类IP地址,但要连接6个的子公司,最大的一个子公司有26台计算机,每个子公司在一个网段中,则子网掩码应设为()。
A、255.255.255.0B、255.255.255.128C、255.255.255.192D、255.255.255.22412:B类地址的缺省掩码是()。
iscoccnp模拟试题与答案

C i s c o C C N P842-813e x a m Question:1uses layer 3 switches in the Core of their network. Which method of Layer 3 switching uses a forwarding information base (FIB)A. Topology-based switchingB. Demand-based switchingC. Route cachingD. Flow-based switchingE. None of the other alternatives applyAnswer: AQuestion:2You need to design the VLAN scheme for the network. Which two statements are true about best practices in VLAN design (Select two)A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routingshould occur at the distribution layer.B. Routing should always be performed at the distribution layer.C. VLANs should be localized to a switch.D. VLANs should be localized to a single switch unless voice VLANs are being utilized.E. Routing should not be performed between VLANs located on separate switches. Answer: B, CQuestion:3If you needed to transport traffic coming from multiple VLANs (connected between switches),and your CTO was insistent on using an open standard, which protocol would you useA.B. spanning-treeC.D. ISLE. VTPF.Answer: CQuestion:4Under what circumstances should an administrator prefer local VLANs overend-to-endVLANsA. Eighty percent of traffic on the network is destined for Internet sites.B. There are common sets of traffic filtering requirements for workgroups located in multiplebuildings.C. Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.D. Users are grouped into VLANs independent of physical location.E. None of the other alternatives applyAnswer: AQuestion:5What are some virtues of implementing end-to-end VLANs (Choose two)A. End-to-end VLANs are easy to manage.B. Users are grouped into VLANs independent of a physical location.C. Each VLAN has a common set of security and resource requirements for all members.D. Resources are restricted to a single location.Answer: B, CQuestion:6Which of the following statements is true about the 80/20 rule (Select all that apply)A. 20 percent of the traffic on a network segment should be localB. no more than 20 percent of the network traffic should be able to move across a backbone.C. no more than 80 percent of the network traffic should be able to move across a backbone.D. 80 percent of the traffic on a network segment should be localAnswer: B, DQuestion:7The LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcastsA. Creating smaller broadcast domains by implementing VLANs.B. Separate nodes into different hubs.C. Creating larger broadcast domains by implementing VLANs.D. Separate nodes into different switches.E. All of the above.Answer: AQuestion:8The LAN switches are being configured to support the use of Dynamic VLANs. Which of the following are true of dynamic VLAN membership (Select all that apply) A. VLAN membership of a user always remains the same even when he/she is moved toanother location.B. VLAN membership of a user always changes when he/she is moved to another location.C. Membership can be static or dynamic.D. Membership can be static only.E. None of the other alternatives apply.Answer: A, CQuestion:9The LAN switches are being configured to support the use of Dynamic VLANs. What should be considered when implementing a dynamic VLAN solution (Select two)A. Each switch port is assigned to a specific VLAN.B. Dynamic VLANs require a VLAN Membership Policy Server.C. Devices are in the same VLAN regardless of which port they attach to.D. Dynamic VLAN assignments are made through the command line interface. Answer: B, CQuestion:10In the three-layer hierarchical network design model; what’s associated with the access layer(Select two)A. optimized transport structureB. high port densityC. boundary definitionD. data encryptionE. local VLANsF. route summariesAnswer: B, EQuestion:11You are assigning VLANs to the ports of switch PG1. What VLAN number value is anassigned to the default VLANA. VLAN 1003B. VLAN 1C. VLAN OND. VLAN AE. VLAN 0Answer: BQuestion:12The VLANs in switch PG1 are being modified. Which of the following are updated in PG1every time a VLAN is modified (Select all that apply)A. Configuration revision numberB. Configuration revision flag fieldC. Configuration revision reset switchD. Configuration revision databaseE. None of the other alternatives apply.Answer: A, DQuestion:13What is a characteristic of assigning a static VLAN membershipA. VMPS server lookup is requiredB. Easy to configureC. Easy of adds, moves, and changesD. Based on MAC address of the connected deviceAnswer: BQuestion:14Static VLANs are being used on the network. What is true about static VLANsA. Devices use DHCP to request their VLAN.B. Attached devices are unaware of any VLANs.C. Devices are assigned to VLANs based on their MAC addresses.D. Devices are in the same VLAN regardless of which port they attach to. Answer: BQuestion:15Two switches are connected via a trunk using VTP. Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP (Select two)A. STP root statusB. VTP modeC. Negotiation statusD. Management domainE. Configuration revision numberAnswer: D, EQuestion:16You need to investigate a VTP problem between two switches. The lack of which two prevents VTP information from propagating between switches (Select two)A. A root VTP serverB. A trunk portC. VTP priorityD. VLAN 1E. None of the other alternatives applyAnswer: B, DQuestion:17PG1 and PG2 are switches that communicate via VTP. What is the default VTP advertisement intervals in Catalyst switches that are in server or client modeA. 30 secondsB. 5 minutesC. 1 minuteD. 10 secondsE. 5 secondsF. None of the other alternatives applyAnswer: BQuestion:18You want to configure switch PG1 to propagate VLAN information across the network using VTP. What must be configured on a Cisco switch in order to advertise VLANinformationA. VTP modeB. VTP passwordC. VTP revision numberD. VTP pruningE. VTP domain nameF. None of the other alternatives applyAnswer: EQuestion:19The switches have all been upgraded to use VTP version 2. What are two benefits provided in VTP Version 2 that are not available in VTP Version 1 (Select two)A. VTP version 2 supports Token Ring VLANsB. VTP version 2 allows VLAN consistency checksC. VTP version 2 allows active redundant links when used with spanning treeD. VTP version 2 reduces the amount of configuration necessaryE. VTP version 2 saves VLAN configuration memoryAnswer: A, BQuestion:20The network administrator needs to enable VTP pruning within thenetwork. What action should a network administrator take to enable VTP pruning on an entiremanagement domainA. Enable VTP pruning on any switch in the management domainB. Enable VTP pruning on any client switch in the domainC. Enable VTP pruning on a VTP server in the management domainD. Enable VTP pruning on every switch in the domainE. None of the other alternatives applyAnswer: CQuestion:21VTP is configured on switch PG1. Which of the following features were added in VTP version2 that were not previously supported in VTP version 1 (Select two)A. Supports Token Ring VLANs.B. Allows VLAN consistency checks.C. Saves VLAN configuration memory.D. Reduces the amount of configuration necessary.E. Allows active redundant links when used with spanning tree.Answer: A, BQuestion:22The switches are configured to use VTP. What’s true about the VLAN trunking protocol (VTP) (Select two)A. VTP messages will not be forwarded over nontrunk links.B. VTP domain names need to be identical. However, case doesn’t matter.C. A VTP enabled device which receives multiple advertisements will ignore advertisementswith higher configuration revision numbers.D. A device in “transparent” V TP mode will not forward VTP messages.E. VTP pruning allows switches to prune VLANs that do not have any active ports associatedwith them.Answer: A, DQuestion:23Switch PG1 and PG2 both belong to the VTP domain. What’s true about the switch operation in VTP domains (Select all that apply)A. A switch can only reside in one management domainB. A switch is listening to VTP advertisements from their own domain onlyC. A switch is listening to VTP advertisements from multi domainsD. A switch can reside in one or more domainsE. VTP is no longer supported on Catalyst switchesAnswer: A, BQuestion:24VTP devices in a network track the VTP revision number. What is a VTP configurationrevision numberA. A number for identifying changes to the network switch.B. A number for identifying changes to the network router.C. A number for identifying changes to the network topology.D. None of the other alternatives apply.Answer: CQuestion:25Switch PG1 is configured to use the VLAN Trunking Protocol (VTP). What does PG1 advertise in its VTP domainA. The VLAN ID of all known VLANs, the management domain name, and the total number oftrunk links on the switch.B. The VLAN ID of all known VLANs, a 1-bit canonical format (CF1 Indicator), and the switchconfiguration revision number.C. The management domain name, the switch configuration revision number, the knownVLANs, and their specific parameters.D. A 2-byte TPID with a fixed value of 0x8100 for the management domain number, theswitch configuration revision number, the known VLANs, and their specific parameters.E. None of the other alternatives apply.Answer: CQuestion:26VTP switches use advertisements to exchange information with each other. Which of thefollowing advertisement types are associated with VTP (Select all that apply)A. Domain advertisementsB. Advertisement requests from clientsC. Subset advertisementsD. Summary advertisementsAnswer: B, C, DQuestion:27Switch PG1 is part of the VTP domain. What’s true of VTP Pruning within this domain (Select all that apply)A. It does not prune traffic from VLANs that are pruning-ineligibleB. VLAN 1 is always pruning-eligibleC. it will prune traffic from VLANs that are pruning-ineligibleD. VLAN 2 is always pruning-ineligibleE. None of the other alternatives apply.Answer: AQuestion:28What action should you execute if you wanted to enable VTP pruning on your entire management domainA. Enable VTP pruning on any client switch in the management domain.B. Enable VTP pruning on any switch in the management domain.C. Enable VTP pruning on every switch in the management domain.D. Enable VTP pruning on a VTP server in the management domain.E. Disable VTP pruning on a VTP server in the management domain.Answer: DQuestion:29Switch PG1 is configured with VTP. Which two VTP modes will make PG1 capable of creatingand deleting VLANs on itself (Select two)A. ClientB. ServerC. TransparentD. Pass-throughE. No-negotiateAnswer: B, CQuestion:30When the Catalyst switch PG1 is enabled to use VTP, which information does it advertise onits trunk ports (Select two)A. VTP modeB. STP root statusC. Negotiation statusD. Management domainE. Configuration revision numberAnswer: D, EQuestion:31Two switches are connected via a trunk link. In this network, the original frame is encapsulated and an additional header is added before the frame is carried over a trunk link.At the receiving end, the header is removed and the frame is forwarded to the assigned VLAN.This describes which technologyA. DISLB. ISLC. DTPD. IEEEE. MPLSF. None of the other alternatives applyAnswer: BQuestion:32The core switches use trunks to connect to each other. How doestrunking keep track of multiple VLANsA. It tags the data frame with VLAN information and recalculates the CRC valueB. It encapsulates the data frame with a new header and frame check sequenceC. It modifies the port index of a data frame to indicate the VLAND. It adds a new header containing the VLAN ID to the data frameE. None of the other alternatives applyAnswer: AQuestion:33The core switches are configured to use trunks. Which three statementsare correct with regard to the IEEE standard (Select three)A. The IEEE frame format adds a 4 byte field to a Ethernet frameB. The packet is encapsulated with a 26 byte header and a 4 byte FCSC. The protocol uses point-to-multipoint connectivityD. The protocol uses point-to-point connectivityE. The IEEE frame uses multicast destination of 0x01-00-0c-00-00F. The IEEE frame retains the original MAC destination addressAnswer: A, D, FQuestion:34Switch PG1 has been configured with DTP using the desirable option. Which statementdescribes Dynamic Trunking Protocol (DTP) desirable modeA. The interface actively attempts to convert the link to a trunk link.B. The interface is put into permanent trunking mode but prevented from generating DTPframes.C. The interface is put into permanent trunking mode and negotiates to convert the link into atrunk link.D. The interface is put into a passive mode, waiting to convert the link to a trunk link.E. None of the other alternatives applyAnswer: AQuestion:35You need to configure a new switch for trunking. Which switch command enables a trunking protocol that appends a four byte CRC to the packetA. Switch(config-if)#switchport trunk encapsulation dot1qB. Switch(config-if)#switchport trunk encapsulation itefC. Switch(config-if)#switchport trunk encapsulation fddiD. Switch(config-if)#switchport trunk encapsulation islE. None of the other alternatives applyAnswer: DQuestion:36While using a packet analyzer, you notice four additional bytes being added to the packets inthe network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC valueA. DTPB. VTPC.D. ISLE. None of the other alternatives applyAnswer: CQuestion:37You need to configure a new switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation framesA. AccessB. No negotiateC. TrunkD. Dynamic desirableE. Dynamic autoF. None of the other alternatives applyAnswer: DQuestion:38A new switch was just configured using the “switchport trunk native vlan 7”command. What does this interface command accomplishA. Causes the interface to apply ISL framing for traffic on VLAN 7B. Configures the trunking interface to forward traffic from VLAN 7C. Configures the interface to be a trunking port and causes traffic on VLAN 7 to be taggedD. Configures the trunking interface to send traffic from VLAN 7 untaggedE. None of the other alternatives applyAnswer: DQuestion:39You need to connect two core switches via an ISL trunk. Which statement is true regarding the configuration of ISL trunksA. A Catalyst switch cannot have ISL and IEEE trunks enabled.B. All Catalyst switches support ISL trunking.C. A Catalyst switch will report giants if one side is configured for ISL while the other side isnot.D. ISL trunking requires that native VLANs match.E. None of the other alternatives applyAnswer: CQuestion:40Which of the following technologies would an Internet Service Provider use to supportoverlapping customer VLAN ID’s over transparent LAN servicesA. tunnelingB. ATMC. SDHD. IP Over Optical NetworkingE. ISLAnswer: AQuestion:41If you were to configure an ISL Ethernet trunk between two Cisco switches, named PG1 andPG2, what would you have to include at the end of the link for the trunk to operate correctly(Select two)A. An identical VTP mode.B. An identical speed/duplex.C. An identical trunk negotiation parameter.D. An identical trunk encapsulation parameter.Question:42Refer to the exhibit. On the basis of the information provided in the exhibit, which two sets of procedures are best practicesfor Layer 2 and 3 failover alignment (Choose two.)A .Configure the D-SW1 switch as the active HSRP router and the STP root for all VLANs.Configure the D-SW2 switch as the standby HSRP router and backup STP root for all VLANs.B. Configure the D-SW1 switch as the standby HSRP router and the STP root for VLANs 11 and 110.Configure the D-SW2 switch as the standby HSRP router and the STP root for VLANs 12 and 120.C. Configure the D-SW1 switch as the active HSRP router and the STP root for VLANs 11 and 110.Configure the D-SW2 switch as the active HSRP router and the STP root for VLANs 12 and 120.D. Configure the D-SW2 switch as the active HSRP router and the STP root for all VLANs.Configure the D-SW1 switch as the standby HSRP router and backup STP root for all VLANs.E. Configure the D-SW1 switch as the active HSRP router and the backup STP root for VLANs 11 and 110.Configure the D-SW2 switch as the active HSRP router and the backup STP root for VLANs 12 and 120.F. Configure the D-SW1 switch as the standby HSRP router and the backup STP root for VLANs12 a nd 120.Configure the D-SW2 switch as the standby HSRP router and the backup STP root for VLANs 11 and 110.Answer: CFExplanation:Basically, each of the routers that provides redundancy for a given gateway address is assigned to a common HSRP group. One router is elected as the primary, or active, HSRP router, another is elected as the standby HSRP router, and all the others remain in the listen HSRP state. The routers exchange HSRP hello messages at regular intervals, so they can remain aware of each。
ccnp的试题全中文

CCNP级别网络工程师面试题1、解决路由环问题的方法有(ABD) A.水平分割 B.路由保持法 C.路由器重启D.定义路由权的最大值2、下面哪一项正确描述了路由协议(C) A.允许数据包在主机间传送的一种协议 B.定义数据包中域的格式和用法的一种方式C.通过执行一个算法来完成路由选择的一种协议D.指定MAC地址和IP地址捆绑的方式和时间的一种协议3、以下哪些内容是路由信息中所不包含的(A) A.源地址 B.下一跳 C.目标网络D.路由权值4、以下说法那些是正确的(BD)A.路由优先级与路由权值的计算是一致的B.路由权的计算可能基于路径某单一特性计算,也可能基于路径多种属性C.如果几个动态路由协议都找到了到达同一目标网络的最佳路由,这几条路由都会被加入路由表中D.动态路由协议是按照路由的路由权值来判断路由的好坏,并且每一种路由协议的判断方法都是不一样的5、IGP的作用范围是(C) A.区域内 B.局域网内 C.自治系统内 D.自然子网范围内6、距离矢量协议包括(AB) A.RIP B.BGP C.IS-IS D.OSPF7、关于矢量距离算法以下那些说法是错误的(A) A.矢量距离算法不会产生路由环路问题 B.矢量距离算法是靠传递路由信息来实现的C.路由信息的矢量表示法是(目标网络,metric)D.使用矢量距离算法的协议只从自己的邻居获得信息求职胜经/简历亮出你的精彩简历写作技巧,...面试前准备才是...8、如果一个内部网络对外的出口只有一个,那么最好配置(A) A.缺省路由 B.主机路由 C.动态路由9、BGP是在(D)之间传播路由的协议 A.主机 B.子网C.区域(area)D.自治系统(AS)10、在路由器中,如果去往同一目的地有多条路由,则决定最佳路由的因素有(AC) A.路由的优先级 B.路由的发布者 C.路由的metirc值 D.路由的生存时间11、在RIP协议中,计算metric值的参数是(D) A.MTU B.时延 C.带宽D.路由跳数12、路由协议存在路由自环问题(A) A.RIP B.BGP C.OSPF D.IS-IS13、下列关于链路状态算法的说法正确的是:(bc) A.链路状态是对路由的描述B.链路状态是对网络拓扑结构的描述C.链路状态算法本身不会产生自环路由D.OSPF 和RIP都使用链路状态算法14、在OSPF同一区域(区域A)内,下列说法正确的是(d) A.每台路由器生成的LSA都是相同的B.每台路由器根据该最短路径树计算出的路由都是相同的C.每台路由器根据该LSDB计算出的最短路径树都是相同的 D.每台路由器的区域A的LSDB(链路状态数据库)都是相同的15、在一个运行OSPF的自治系统之内:(ad) A.骨干区域自身也必须是连通的 B.非骨干区域自身也必须是连通的C.必须存在一个骨干区域(区域号为0)D.非骨干区域与骨干区域必须直接相连或逻辑上相连16、下列关于OSPF协议的说法正确的是:(abd) A.OSPF支持基于接口的报文验证B.OSPF支持到同一目的地址的多条等值路由C.OSPF是一个基于链路状态算法的边界网关路由协议D.OSPF发现的路由可以根据不同的类型而有不同的优先级17、禁止RIP协议的路由聚合功能的命令是(c) A.undo rip B.auto-summanyC.undo auto-summanyD.undo network10.0.0.018、下列静态路由配置正确的是(d) A.ip route129.1.0.016serial0 B.ip route10.0.0.216129.1.0.0 C.ip rout e129.1.0.01610.0.0.2D.ip route129.1.0.0255.255.0.010.0.0.219、以下不属于动态路由协议的是(d) A.RIP B.ICMP C.IS-ISD.OSPf20、三种路由协议RIP、OSPF、BGP和静态路由各自得到了一条到达目标网络,在华为路由器默认情况下,最终选选定(b)路由作为最优路由 A.RIP B.OSPF C.BGPD.静态路由21、IGP包括如下哪些协议(acd) A.RIP B.BGP C.IS-IS D.OSPF22、路由环问题会引起(abd) A.慢收敛 B.广播风暴 C.路由器重起D.路由不一致23、以下哪些路由表项要由网络管理员手动配置(a) A.静态路由B.直接路由C.动态路由D.以上说法都不正确24、在运行Windows98的计算机中配置网关,类似于在路由器中配置(a) A.直接路由 B.默认路由 C.动态路由 D.间接路由25、关于RIP协议,下列说法正确的有:(ac) A.RIP协议是一种IGP B.RIP协议是一种EGPC.RIP协议是一种距离矢量路由协议D.RIP协议是一种链路状态路由协议欢迎您的下载,资料仅供参考!致力为企业和个人提供合同协议,策划案计划书,学习资料等等打造全网一站式需求。
网络工程师CCNA证书考试题库

网络工程师CCNA证书考试题库网络工程师是当今社会上一种备受青睐的职业,具备CCNA证书是成为一名合格网络工程师的基本要求之一。
CCNA(Cisco Certified Network Associate)是思科公司提供的一种权威的网络证书,考试内容涵盖了网络基础知识、路由器和交换机配置、网络安全等方面的内容。
下面将为大家整理一份网络工程师CCNA证书考试题库,供大家参考和复习。
一、网络基础知识1. OSI参考模型中,哪一层负责确定数据如何在网络中传输?A. 应用层B. 传输层C. 网络层D. 数据链路层2. IP地址的子网掩码用来做什么?A. 区分网络地址和主机地址B. 确定网络的物理拓扑C. 控制网络访问权限D. 提高网络安全性3. TCP协议是一种什么类型的协议?A. 面向连接型B. 面向无连接型C. 面向消息型D. 面向数据流型4. 下面哪种传输介质是最适合用于在大楼内部连接不同楼层的网络设备?A. 双绞线B. 同轴电缆C. 光纤D. 无线电波二、路由器和交换机配置1. 在路由器上配置静态路由需要设置哪些参数?A. 出接口B. 下一跳地址C. 网关地址D. 子网掩码2. 交换机的VLAN技术主要用来实现什么功能?A. 提高网络传输速度B. 划分不同的广播域C. 增加网络安全性D. 实现无线网络连接3. 在路由器上配置NAT技术的目的是什么?A. 增加网络带宽B. 实现内网主机与外网通信C. 提高网络可靠性D. 实现跨平台数据传输4. 交换机端口默认是属于哪个VLAN?A. VLAN1B. VLAN10C. VLAN100D. VLAN1000三、网络安全1. 以下哪种加密算法用于保护传输过程中的数据机密性?A. DESB. MD5C. RSAD. SHA2. 防火墙的作用是什么?A. 限制网络带宽的使用B. 监控网络流量C. 阻止非法入侵D. 加快网络数据传输速度3. 在网络安全方面,ACL(访问控制列表)主要用来控制什么?A. 网络拓扑B. 主机访问权限C. 广播域D. 数据传输速度4. DDos攻击是指什么?A. 拒绝服务攻击B. 数据泄露攻击C. 蠕虫攻击D. 恶意代码攻击通过以上网络工程师CCNA证书考试题库的复习,相信大家可以更加全面地了解CCNA考试的内容要求,提升自己的备考水平。
CCIE模拟考试题_思科认证考试.doc

CCIE模拟考试题_思科认证考试1.What statement is FALSE with respect to the operation of Unidirectional Link Detection?A. It negotiates the Unidirectional Link Detection link state during physical signaling.B. It performs tasks that autonegotiation cannot perform.C. It works by exchanging protocol packets between the neighboring devices.D. Both devices on the link must support Unidirectional Link Detection and have it enabled on respective ports.2.What is true concerning Traffic contract, Traffic shaping, and Traffic policing in ATM networks?A. They are parameters of PNNI set during PNNI configuration.B. They are forms of QoS features used in ATM networks.C. They are types of SVCs.D. They are types of PVCs.E. They are only used between ATM switches to control traffic flows.3.Which are the primary reasons to use traffic shaping? (Select two)A. To control the maximum rate of traffic transmitted or received on an interface.B. To control access to available bandwidth.C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits.D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets.E. To ensure that traffic conforms to the policies established for it.4.In a bridged network running IEEE 802.1d spanning tree, what parameter will a bridge take form the root bridge?A. MaxageB. Forwarding delayC. Hello timeD. All of the above5.What statement is FALSE concerning the use of SPAN on the Catalyst 6500?A. It is possible to configure SPAN to have a Gigabit port, such as source port, and a 10/100 port as the destination port.B. If the source port is configured as a trunk port, the traffic on the destination port will be tagged as well, regardless of the configuration on the destination port.C. When a SPAN session is active the destination port does not participate in Spanning Tree.D. With SPAN an entire VLAN can be configured to be the source.E. In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN.。
ccna考试试题库

ccna考试试题库CCNA(Cisco Certified Network Associate)考试是思科认证网络专家的初级认证,主要测试考生在网络基础、路由、交换、无线和安全等方面的知识。
以下是一些模拟CCNA考试的试题和答案:1. 什么是子网掩码,它有什么作用?答案:子网掩码是一种IP地址的附加信息,用于指定IP地址中网络部分和主机部分的界限。
它的作用是允许路由器区分IP地址中的网络地址和主机地址,从而实现不同网络之间的路由。
2. 描述静态路由和动态路由的区别。
答案:- 静态路由:由网络管理员手动配置的路由信息,不随网络结构的变化而自动调整。
- 动态路由:由路由器根据网络拓扑的变化自动生成和更新的路由信息。
3. 什么是VLAN,它有什么好处?答案: VLAN(虚拟局域网)是一种在交换机上划分不同网络的技术,即使物理上连接在同一交换机上,也可以属于不同的VLAN。
VLAN的好处包括提高安全性、减少广播域、提高网络管理的灵活性等。
4. 简述TCP和UDP的区别。
答案:- TCP(传输控制协议):提供可靠的、面向连接的传输服务,有流量控制和拥塞控制机制。
- UDP(用户数据报协议):提供不可靠的、无连接的传输服务,适用于对实时性要求高的应用。
5. 什么是DHCP,它的作用是什么?答案: DHCP(动态主机配置协议)是一种网络管理协议,用于自动分配IP地址和其他网络配置信息给网络中的设备。
它的作用是简化网络配置,避免IP地址冲突。
6. 什么是NAT,它在网络中扮演什么角色?答案: NAT(网络地址转换)是一种技术,允许多个设备共享一个公共IP地址与互联网通信。
它在网络中扮演的角色是节省IP地址资源,隐藏内部网络结构。
7. 什么是STP(生成树协议)?答案: STP(生成树协议)是一种网络协议,用于在局域网中防止网络环路的产生。
通过创建一个无环的逻辑拓扑,STP确保网络的稳定性和可靠性。
8. 描述OSPF(开放最短路径优先)协议的工作原理。