CCNA第三学期Final Exam(附答案)
CCNA第三学期期末

36有问题。
答案可能是1请参见图示。
所有中继链路工作正常,而且允许所有VLAN使用所有中继链路。
计算机5发送了一条请求。
哪台或哪些设备会收到此消息?仅计算机4计算机3和T R-A计算机4和T R-A计算机1、计算机2、计算机4和T R-A计算机1、计算机2、计算机3、计算机4和T R-A所有计算机和路由器2 points for Option22下列关于在接入点上启用开放式身份验证的陈述,哪一项是正确的?不需要身份验证使用64位加密算法需要使用身份验证服务器需要共同商定的密码2 points for Option13请参见图示。
该交换机用于让图中所示部门的成员实现连接,但不存在路由。
连接到Fa0/22的一位用户应该能够与t ing VLAN中的用户通信。
下列哪项更改可实现所需通信?将该用户连接到Gi0/1。
将该用户连接到Fa0/6。
将该用户添加到本征N。
将该用户添加到默认N。
2 points for Option24分层网络模型具有哪三项优点?(选择三项。
)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化Option1, Option3, and Option6 are correc t.5下列关于新交换机默认配置的说法中哪三项正确?(选择三项。
)禁用了生成树协议。
使能口令被配置为o。
所有交换机端口都被分配给V LAN1。
闪存目录中包含IOS映像。
VLAN1配置有管理地址。
所有接口均设置为自动协商速度和双工模式。
Option3, Option4, and Option6 are correc t.6请参见图示。
最近安装了SW1用于取代集线器。
主机1和主机4同时传送数据。
网络设备会如何处理此事件?(选择两项。
)当冲突发生时,会调用回退算法。
由于主机1和主机4都连接到交换机,因此不会发生冲突。
交换机将根据交换机地址表中的信息将数据转发到相应的端口。
主机2和主机3会获分配更短的回退值,从而获得访问介质的优先权。
cisco36ccna第三学期第六章试题及答案.docx

丫y1 下列冇关OSPFDR和BDR选举的说法中哪项正确?匚每次添加新的OSPF相邻设备时都会发生DR/BDR选举。
E 具有最高OSPF优先级设置的路由器会在DR选举中获胜。
C连接到多路访问网络的路由器的默认优先级值为0。
C 当使用默认优先级值时,具冇最高MAC地址的路由器会被选为DR。
2下列哪两项与帧中继OSPF点对多点环境有关?(选择两项。
)17不选举DRo厂OSPF优先级值决定了帧中继链路上的活动DRoV OSPF邻居路由器是静态定义的。
厂链路类型被标识为广播多路访问。
厂BDR的路由器ID比DR路由器ID更高。
之前Router# show ip r <省略部分输出〉Gateway of last re10.0.0.0/8isvaC 10.16.1.0/270 10.16.J64匚S 10.16.1.64/30 10.16,1?129.192.168.1.0/30C 192.168.1.00 192.168.1.4C 198.18.1.0/24请参见图示。
命令ip route 10.16.1.64 255.255.255.252 s0/0/0己输入路由器中。
为什么路由表中除网络10.16.1.64/27 ;E 路由器将10.16.1.64/30和10.16.1.64/27视为不同的网络。
C 静态路由用作发往10.16.1.64/27的数据包的备用路由。
C 静态路由的AD比OSPF路由的AD低。
匚静态路由度戢比网络10.16.1.64/27的OSPF度量低。
请参见图示。
黑体显示的值128有什么用途?E 它是OSPF开销度量。
C它是OSPF管理距离。
匚这是Dijkstra算法指定的值,表示以跳数为单位的网络距离。
匚它是分配给接口的值,DUAL算法使用该值来确定度量。
BDR请参见图示。
A 、B 、C 三台路由器属于现有的OSPF 网络。
路由器D 新加入网络。
所有路由器均运行 示的优先级。
在路由器D 刚加入现有网络的一刻,DR/BDR 状态如何? C 会强制进行选举且路由器D 会在DR 选举中获胜。
思科ccna第3学期_final_第1套_V_4

What is the purpose of VLAN trunking?It improves network performance by reducing broadcast traffic.It selects the best path to transmit data in a switched network.It carries the traffic of multiple VLANs through a single link.It avoids spanning tree loops in a switched network.Refer to the exhibit. Both switches are configured with default bridge priority. Which port will act as the STP root port if all links are oper Fa0/1 interface of S1Fa0/2 interface of S1Fa0/1 interface of S2Fa0/2 interface of S2Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet conne ctions. How sh administrator change the displayed configuration to satisfy the requirement?Use SSH version 1.Reconfigure the RSA key.Configure SSH on a different line.Modify the transport input command.Refer to the exhibit. Which two facts about STP can be determined from the displayed output? (Choose two.)Switch S1 has the lowest configured STP priority in the network.Switch S1 is configured as the root bridge for VLAN1.Fa0/21 is the root port of switch S1.Fa0/22 is the redundant link.Fa0/24 is considered the best path to the root bridge.Which statement correctly describes the spanning-tree path cost?It is calculated based on the total number of switches connected in a loop.It is calculated based on the utilization of all the switches along a given path.It is calculated based on the bridge priority of the switches along a given path.It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.The physical interface of the router must be connected to a trunk link on the adjacent switch.The number of physical interfaces on the router should match the number of VLANs.Different static VLANs should be assigned to different interfaces of the router.The router should be configured as the VTP serverRefer to the exhibit. Which two options correctly describe the router configuration that is shown? (Choose two.)Routing between the 192.168.1.0 and 192.168.3.0 networks will not succeed until a routing protocol is configured on the route r.VLANs have not been appropriately configured on the router subinterfaces.The configuration is appropriate for a router-on-a-stick network design.Trunking has been appropriately configured on the router subinterfaces.An IP address should be applied to interface Fa0/1 for routing to occurRefer to the exhibit. What is true of the configuration of switch S1?A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both s is unable to propagate VLANs to S2. What could be the reason for this?The VTP configuration revision is different on both switches.The VTP domains are different on both switches.VTP pruning is disabled.VTP v2 is disabled.Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs problem?Rename VLAN1.Connect one more port of S1 to R1.Configure the Fa0/1 port of S1 as a trunk port.Move the Fa0/0 interface of R1 to another VLAN.Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between the router interface fa0/0 an fa0/1. The router and switch have been configured with the commands that are displayed in the exhib it. The network administrator ente trunk command and receives the output as shown. What is the cause of the "not-trunking" status for switch port Fa0/1?The trunk is established, but no VLANs have been configured to use it.The router is missing the dynamic trunking protocol statements necessary to form a trunk.Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.The router, the switch, or both must be configured with the dynamic desirable option for Dynamic Trunking Protocol to establish aRefer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. W receive this message?only computer 4computer 3 and RTR-Acomputer 4 and RTR-Acomputer 1, computer 2, computer 4, and RTR-Acomputer 1, computer 2, computer 3, computer 4, and RTR-Aall of the computers and the routerRefer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commVLAN 30 will be added to S1, S2, and S3, but not to S4.VLAN 30 will be pruned from the VLAN database of S3.VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayedRefer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traf host A on switch ST-C?It will be dropped.It will be forwarded out port Fa0/5 only.It will be forwarded out ports Fa0/5 and Fa0/10.It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D other. What is the most likely cause of this problem?The link between the switches is up but not trunked.The Fa0/11 interface of Switch1 is not configured as a trunk.Hosts A and D are configured with IP addresses from different subnets.VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default administrator passwor d and make other configuration changes. What must the user do to access the device in order to make these changes?Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the device.Establish a wired connection with the device and then reboot the attached computer to launch the configuration software.Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on the computer.Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer and the WRT300N exist on the same network. Then reboot the computer to establish a connection.Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?It is sending and receiving data frames.It is receiving BPDUs, but not sending data frames.It is participating in the election process by forwarding the BPDUs it receives.It is receiving BPDUs and populating the MAC address table, but not sending data.Refer to the exhibit. The switches have been configured as shown. The hosts that are connected to switch 101-2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL. What should be done to fix the problem?Configure port Fa0/2 on switch 101-3FL as a static trunk link.Introduce a Layer 3 device or a switch with Layer 3 capability into the topology.Utilize the switchport trunk allowed vlan all command on switch 101-3FL to permit the VLAN traffic.Apply IP addresses that are in the same subnet to the interfaces that are used to connect switches 101-2FL and 101-3FLAfter listening for the presence of a signal on the network media, hosts A and C transmit data at the same time. In what two ways do the hosts respond to this situation? (Choose two.)The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occured.Because they are operating in full-duplex mode, the hosts resume listening for traffic in preparation for sending future messages.Because the hub will temporarily block traffic from one of the hosts, that host will be allowed to transmit once the wire is clear.Hosts A and C are assigned shorter backoff values to provide them priority to access the media for retransmission.After the backoff period of a host, the host checks to determine if the line is idle before retransmittingRefer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide.What is the last device to receive the collision?hub HB1switch SW1router R1switch SW2router R2switch SW4Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so thatit participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?Disable VTP pruning on SW2.Configure SW2 in VTP transparent mode.Configure SW2 with the VTP domain password.Configure SW2 as a VTP server with a higher revision numberWhen configuring a router to act as an SSH server, what should be configured before issuing the crypto key generate rsacommand?the security domain namethe VTP domain namethe IP domain namethe host nameRefer to the exhibit. The switch VTY lines have been properly configured, but PC1 is unable to remotely manage the switch. How can this problem be resolved?Configure the Fa0/1 interface of the switch in trunk mode.Configure a default gateway on the switch.Configure the native VLAN on the switch.Configure the Fa0/1 interface of the switch to allow all VLANsRefer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access r esources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?Replace S1 with a router that has one FastEthernet interface for each PC.Add a second switch and divide the PCs so that each VLAN is connected to its own switch.Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interfaceRefer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?discard the frameforward the frame out port 2forward the frame out port 3forward the frame out all portsforward the frame out all ports except port 3add station 00-00-3D-1F-11-05 to port 2 in the forwarding tableWhich statement regarding the service password-encryption command is true?The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no servicepassword-encryption commandWhich statement correctly describes the function of a Layer 2 switch?It performs switching and filtering based on the destination network layer address.It automatically uses STP to prevent switching loops in redundant topologies.It uses VTP to allow data from multiple VLANs to travel across a single link.It routes packets between different LAN segmentsWhich three statements are correct concerning the default configuration of a new switch? (Choose three.)It is configured in VTP server mode.STP is automatically enabled.The first VTY line is automatically configured to allow remote connections.VLAN1 is configured with a management IP address.All switch ports are assigned to VLAN1.The enable password is configured as ciscoRefer to the exhibit. How will switch S2 manage traffic coming from host PC1?S2 will drop the traffic, unless it is management traffic.S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.S2 will leave the traffic untagged when it forwards it over a trunk link.S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. Which two sets of commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)S1-Central>enableS1-Central# reloadS1-Central>enableS1-Central# erase flash:S1-Central>enableS1-Central# delete flash:vlan.datS1-Central>enableS1-Central# configure terminalS1-Central(config)# no vlan 2S1-Central>enableS1-Central# configure terminalS1-Central(config-if)# interface fastethernet 0/1 S1-Central(config-if)# switchport access vlan 3Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?Include a router in the topology.Associate hosts A and B with VLAN 10 instead of VLAN 1.Remove the native VLAN from the trunk.Configure one trunk port in the dynamic desirable mode.Add the switchport nonegotiate command to the configuration of S2Which two statements are correct about wireless infrastructure components? (Choose two.)An AP converts the TCP/IP data packets from their 802.11 frame encapsulation format to the 802.3 Ethernetframe format on the wired Ethernet network.A wireless AP does not require any physical connection to allow wireless clients to access the Internet.An AP is a layer 2 device, similar to a switch, that provides dedicated bandwidth to each connected wireless host.Collisions do not occur between wireless NICs and APs.The wireless router performs the roles of AP and router.Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)A new VLAN can be added to Switch1 and that information will be added only to Switch2.A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4A new switch is to be added to an exis ting network in a remote office. The network administrator does not wantthe technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)Configure an IP address on the new switch.Configure the existing VTP domain name on the new switch.Configure all ports of both switches to access mode.Configure the new switch as a VTP client.Enable VTP pruningWhich two statements describe Spanning Tree Protocol? (Choose two.)It is only used at Layer 2.It is configured on routers.It eliminates Layer 2 loops in network topologies.It limits the number of valid MAC addresses allowed on a port.It allows VLAN information to propagate to other switches in the network.Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?Cat-ACat-BCat-CCat-DRefer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)The switch ports are on different VLANs.The switch IP address is on the wrong subnet.The hosts are configured on different logical networks.A router is required to forward traffic between Host1 and Host2.The VLAN port assignments must be contiguous for each VLAN.The host default gateway addresses must be on the same logical network.Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?192.168.1.22 /28192.168.1.31 /28192.168.1.32 /28192.168.1.52 /28192.168.1.63 /28Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?The router will drop the packet.The router will forward the packet out interface FastEthernet 0/1.1.The router will forward the packet out interface FastEthernet 0/1.2.The router will forward the packet out interface FastEthernet 0/1.3.The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3Refer to the exhibit. On which of the devices in this network should routing between VLANs take place?the core layer devicesthe access layer devicesthe distribution layer devicesthe core and distribution layer devicesRefer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?The Fa0/7 port of STW will be shutdown.The student will gain full access to the Internet.Both the teacher and student will be able to receive data but only the teacher will be able to send.The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.Refer to the exhibit. In what two ways will the router handle VLAN traffic that is received on the trunk? (Choose two.)Traffic to VLAN 1 received by the router interface Fa0/0 will be dropped by the router.Because interface Fa0/0 requires an IP address, the router will not be able to route between the VLANs.Packets that are received from network 192.168.20.0 /24 will be handled by subinterface Fa0/0.20.The router will use subinterface MAC addresses to identify the VLAN traffic that is received on the physical interface.The router will continue to process traffic from the attached VLANs even if the physical interface goes downRefer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Studentdomain. What two pieces of information are indicated from the exhibited output? (Choose two.)The other switches in the domain can be running either VTP version 1 or 2.There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domainWhat are three benefits of employing a hierarchical network design? (Choose three.)Hierarchically designed networks can more easily be expanded to suit future needs.Hierarchical design models enhance existing bandwidth through the use of link aggregation.The hierarchical model allows for specialized functionality at each layer, simplifying devicemanagement.Use of a hierarchical design allows replacement of redundant devices with high-capacity network equipment.A hierarchical design uses firewalls instead of complicated port-based and distribution layer securitypolicies.The hierarchical model allows the use of high-performance switches at all design layers, thus allowing for a fully-meshed topologyRefer to the exhibit. Hosts A and B attempt to transmit a frame at the same time and a collision occurs. When will host D be able to transmit?immediatelyafter sending its jam signalafter host A and host B have completed transmissionafter the jam signal clears and its backoff delay expiresWhat provides an authentication mechanism for 802.11-based wireless networks?DSSSOFDMSSIDWPARefer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?WEP identifies the wireless LAN.WEP allows the access point to inform clients of its presence.WEP translates IP addresses into easy-to-remember domain names.WEP encrypts data between the wireless client and the access point.WEP ensures that only authenticated users are allowed access to the WLAN.WEP translates an internal address or group of addresses into an outside, public address.Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?Only VLAN 1 will be allowed across the trunk.All configured VLANs will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.Only the the management and native VLANs will be allowed across the trunk.Only VLANs that are configured on the VTP server in the dom ain will be allowed across the trunkRefer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?This entry can only be removed from the MAC address table by a network administrator.When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.The switch learned this MAC address from the source address in a frame received on Fa0/18.Refer to the exhibit. What is the purpose of the configuration commands that are shown?to activate port Fa0/10to make the port a member of VLAN 30to activate port security on port Fa0/10to add VLAN 30 to the trunk that is connected to port Fa0/10。
CCNA第三学期期末答案

假设没有使用 VLSM,添加 ip route 172.16.64.0 255.255.240.0 serial0/0 命令会对网络中正在工作的路由器造成什么影响?3目的地址处于 172.16.64.1 到 172.16.80.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.64.1 到 172.16.255.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.64.1 到 172.16.79.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.0.1 到 172.16.64.254 之间的所有数据包都会通过serial0/0 转发出去。
2请参见图示。
管理员正在向网络中添加新路由器。
IP 地址 192.168.13.6/30 已被分配给 R2 上的相连串行接口。
管理员必须为新路由器的串行接口分配什么IP 地址?2192.168.13.4/30192.168.13.5/30192.168.13.7/30192.168.13.58/30192.168.13.61/27192.168.13.63/273OSPF 路由协议身份验证使用 MD5 验证时,下列有关密钥的说法中哪两项正确?(选择两项。
)24密钥以明文形式在路由器之间传递。
密钥用于帮助生成验证用的加密数字。
密钥以加密形式在路由器之间传递。
密钥永远不会在网络上传输。
数据包嗅探器可以捕获密钥。
4请参见图示。
路由表中将显示哪些路由?1R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/05请参见图示。
CCNA 3 Final Exam V4.0 Answers

Refer to the graphic. What is the most efficient summarization of the routes attached to router RT-5?192.168.0.0/16192.168.52.0/24192.168.48.0/22192.168.52.0/22192.168.51.0/23192.168.48.0/212.Refer to the exhibit. Which sequence of commands is required to configure switch port Fa0/2 for host A?SW-1(config)# interface vlan 20SW-1(config-if)# switchport mode access 20SW-1(config)# interface fastethernet 0/2SW-1(config-if)# switchport mode accessSW-1(config-if)# switchport access vlan 20SW-1(config)# interface fastethernet 0/2SW-1(config-if)# vlan 20SW-1(config)# interface vlan 20SW-1(config-if)# switchport mode trunk3. Which layer of the hierarchical three-layer design model combines traffic from multiple IDFs?accessbackbonedistributioncore4. A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1command, an error is received. Why did this command generate an error?VLANs can only be deleted by the user who created them.VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities.The command was not entered properly, which caused a syntax error to occur.VLAN 1 can not be deleted until all ports have been removed from it.VLAN 1 is the management VLAN by default and can not be deleted.5.Refer to the exhibit. Which group of commands will correctly configure router ABC to use OSPF?ABC(config)# router ospf 99ABC(config-router)# network 192.168.43.64 255.255.255.224 area 0ABC(config-router)# network 192.168.43.248 255.255.255.248 area 0ABC(config)# router ospf 1ABC(config-router)# network 192.168.43.64 0.0.0.31 area 0ABC(config-router)# network 192.168.43.248 0.0.0.3 area 0ABC(config)# router ospf 1ABC(config-router)# network 192.168.43.64 0.0.0.63 area 0ABC(config-router)# network 192.168.43.248 0.0.0.3 area 0ABC(config)# router ospf 0ABC(config-router)# network 192.168.43.64 0.0.0.31 area 0ABC(config-router)# network 192.168.43.248 0.0.0.3 area 06.Refer to the exhibit. Two Catalyst switches are connected, and both switches have ports configured for VLANs 40 and 50 as shown. What willallow hosts on the same VLAN to communicate with one another across the different switches?trunkingSTPVTProuting7. Which characteristics of RIPv1 are different from RIPv2? (Choose three.)its use of the hop count metricits use of broadcast updatesits use of split horizon as a stability featurethe authentication of updatesits exclusively classful routingits hop count maximum of 158. Employees of XYZ Company connect their laptop computers to the office LAN using Ethernet ports. The Cisco switches used in the company network are configured with port security. At which layer of the three-layer design model do these switches operate?physicaldistributiondata linkaccesscore9. Which of the following tasks must be completed to configure a router interface to serve the newly added network 192.168.10.64/27 and to advertise this network over RIP v2? (Choose three.)RIP v2 must be configured with the network command and the IP network number for the new network.RIP v2 must be configured with the network command and the IP host address and subnet mask for the newly activated interface.The router must be configured with the ip subnet-zero command so that this network can be added and advertised.A network host address and subnet mask must be applied to the newly activated interface.The routing protocol must be activated with the router rip and version 2 commands.RIP v2 must be configured on the other enterprise routers with an entry for the newly added network.10. Which two statements describe Spanning Tree Protocol? (Choose two.) It eliminates Layer 2 loops in network topologies.It eliminates the need for redundant physical paths in network topologies. It can only be used in networks in which Layer 2 switching is in use.It can only be used in networks where both routers and switches are used together.It can only be used in networks where routers are installed.11.Refer to the graphic. The host on VLAN 2 cannot communicate with the host on VLAN 3. Which of the following could be the problem based on the output of the show interface fastethernet 0/1 command from the switch?The switch port 1 is not set to access mode.The router interface connected to switch port 1 is shut down.The router is not configured for trunking.The switch port is not configured for full duplex or a speed of 100 Mbps.12. What is added to a bridge CAM table as a frame passes through a switch?source IP addressdestination IP addresssource MAC addressdestination MAC address13.Refer to the routing table shown in the exhibit. What is the meaning of the highlighted value 192?It is the value assigned by the Dijkstra algorithm that designates the number of hops in the network.It is the value used by the DUAL algorithm to determine the bandwidth for the link.It is the metric, which is cost.It is the administrative distance.14.Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?A gateway of last resort is required.Subnetting is not supported by RIPv1.VLSM is not supported by RIPv1.One of the routers needs a clock rate on the serial interface.15.Refer to the exhibit. What is an advantage of this network design?It maximizes the number of ports available for hosts.It provides multiple paths for connectivity in the event of link failure.It provides multiple paths for Layer 2 broadcasts to circulate through the network.It allows Spanning Tree to forward traffic across redundant paths simultaneously.16.Refer to the exhibit. What will be the result of DR elections in the OSPF network shown? (Choose three.)R1 will be DR of the 192.168.4.0/24 network.R2 will be DR of the 192.168.4.0/24 network.R1 will be DR of the 192.168.5.0/24 network.R4 will be DR of the 192.168.5.0/24 network.R1 will be DR of the 192.168.6.0/24 network.R3 will be DR of the 192.168.6.0/24 network.17. What are two advantages provided by OSPF authentication? (Choose two.)It ensures that routing information comes from a valid source router.It ensures that OSPF routing information takes priority over RIP or EIGRP updates.It encrypts routing tables to prevent unauthorized viewing.It reduces OSPF information exchange overhead.It prevents routing information from being falsified in transit.18.Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?switch Aswitch Bswitch Cswitch Dswitch Eswitch F19.Refer to the graphic. Switch 2 has computers attached that belong to VLAN 2. Switch 3 has computers attached that belong to VLAN 3. Switch 1 is a Cisco 2926G Layer 3 switch that has a route module installed. Switch 1 provides connectivity to the other switches and is used to route betweenthe VLANs. At which layer of the three-layer switch design model does Switch 1 operate?physicaldata linkcoreaccessnetworkdistribution20. A network administrator is having problems with excessive collisions on the corporate network. If the network currently uses hubs, what is the most cost effective way to reduce collisions?add additional hubsreplace hubs with switchesreplace hubs with access pointsadd a router to every hub segment21. Which statements describe features of full-duplex Ethernet? (Choose three.)allows packets to be received and sent simultaneously by a hostrequires a minimum of two wiresreduces the number of collisionsallocates between 60 and 80 percent of available bandwidth in both directionsallocates 100 percent of the bandwidth in both directionsincreases the number of broadcast domains22. What does a constant green SYSTEM LED indicate on a Catalyst switch?The switch has passed POST and is working properlyThe switch has failed POST.The switch is in the process of initializing ports.The switch is going through POST.The switch is actively sending and receiving frames.23.Refer to the exhibit. Which command will remove the static address from the MAC address table?ALSwitch(config)# no mac-address-table entry 00e0.2917.1884 fastethernet interface 0/4 VLAN 1ALSwitch(config)# no mac-address-table entry 00e0.2917.1884 VLAN 1 fastethernet 04ALSwitch(config-if)# no mac-address-table entry static 00e0.2917.1884 VLAN 1 fastethernet 04ALSwitch(config-if)# no mac-address-table static 00e0.2917.1884 VLAN 1 fastethernet 04ALSwitch(config)# no mac-address-table static 00e0.2917.1884 interface fastethernet 0/4 VLAN 124.Refer to the OSPF network in the exhibit. Router REMO_2 has been elected DR, but router REMO_1 is the more powerful router. How can the network administrator configure REMO_1 to force it to be elected as DR?REMO_1(config)# interface fastethernet 0/0REMO_1(config-if)# ospf priority 0REMO_1(config)# interface fastethernet 0/0REMO_1(config-if)# ip ospf priority 0REMO_1(config)# interface fastethernet 0/0REMO_1(config-if)# ip ospf priority 255REMO_1(config)# ospf priority 1REMO_1(config)# ip ospf priority 25525. What is the first step in the spanning-tree process?elect a designated switchuse a router to locate a default gatewayelect a root bridgedetermine the path cost of each active port on the switch26. Which of the following statements is true when VTP is configured ona switched network that incorporates VLANs?VTP is only compatible with the 802.1Q standard.VTP adds to the complexity of managing a switched network.All VTP hello packets are routed through VLAN 1 interfaces.Changes made to the network can be communicated to all switches dynamically.27.Refer to the graphic. The network has converged. Network traffic analysis indicates that switch A should be the STP root bridge. However, switch F has been elected root bridge of the STP tree. The switches are all set to the default spanning-tree bridge priority value. How can the network administrator change the root bridge to switch A?Configure the bridge priority of switch A to a 1.Configure the bridge priority of switch A to a 65,565.Configure the bridge priority of switch F to 255.Configure the bridge priority of switch F to 32,768.28. Which of the following statements are true about routers that are running EIGRP? (Choose three.)They can support multiple routed protocols.They can support only link-state protocols.They send their entire routing tables to neighboring routers.They send partial routing updates in response to topology changes.They send routing updates to all other routers in the network.They use hello packets to inform neighboring routers of their status.29.Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch X with a default gateway. Assuming that the switch IP address is 192.168.5.147/24, what command will the administrator use to assign a default gateway to the switch?X(config)# ip default-gateway 192.168.5.254X(config)# ip gateway 192.168.5.1X(config)# ip route 0.0.0.0 0.0.0.0 192.168.5.1X(config)# ip default-route 192.168.5.1X(config)# ip route 192.168.5.254 255.255.255.0 fastethernet 0/030.Refer to the exhibit. Which configuration commands will direct outbound traffic from RT-2 to the ISP and inbound traffic from the ISP to network 192.0.2.0/27?RT-2(config)# ip route 172.16.127.0 255.255.255.0 serial 0/1ISP(config)# ip route 192.0.2.0 255.255.255.224 serial 0/0RT-2(config)# ip route 0.0.0.0 0.0.0.0 serial 0/1ISP(config)# ip route 192.0.2.0 255.255.255.224 serial 0/0RT-2(config)# ip route 172.16.127.0 255.255.255.0 serial 0/1ISP(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0RT-2(config)# ip route 0.0.0.0 0.0.0.0 serial 0/1ISP(config)# ip route 0.0.0.0 0.0.0.0 serial 0/131.Refer to the output in the exhibit. What is true about the configuration of this switch?Three ports have been assigned to the management VLAN.VTP has been enabled for all ports.ARP requests issued by the host on port Fa0/12 will be seen by all hosts on the PROD VLAN.Hosts in the ACCT and ENGR VLANs must have IP addresses in the same subnet in order to exchange data between VLANs.32.Refer to the graphic. What is the first parameter used to determine which switch is selected as the root bridge in the spanning-tree process?highest Layer 2 addresshighest priority numberhighest path costlowest Layer 2 addresslowest priority numberlowest path cost33. When should EIGRP automatic summarization be turned off?when a router has not discovered a neighbor within three minuteswhen a router has more than three active interfaceswhen a router has discontiguous networks attachedwhen a router has less than five active interfaces34.Refer to the exhibit. If the network is running RIP v2, which subnetworks can be assigned to the serial links between RTR-2 and the two other routers?198.19.23.192/30 and 198.19.23.196/30198.19.23.160/30 and 198.19.23.164/30198.19.23.96/30 and 198.19.23.100/30198.19.23.32/30 and 198.19.23.160/30198.19.23.4/30 and 198.19.23.8/3035. Which switching method increases latency and reliability more than any other method?cut-throughfast-forwardfragment-freestore-and-forward36. What are two advantages of adding switches to a network that has no VLANs configured? (Choose two.)Switches help eliminate collision domains.Switches create permanent virtual communication circuits.Switches allow bandwidth to be fully utilized.Switches decrease network throughput.Switches shrink the size of broadcast domains.37.Refer to the network and command output shown in the exhibit. A network administrator located at the Branch1 site needs to check the configuration of a switch located at the Central office. Which command can be used to gain remote access to the Central LAN switch, assuming the switch is assigned the IP address 192.168.10.238/24?Branch1# dial Central 192.168.10.238Branch1(config)# line vty 0 4Branch1(config-line)# telnetBranch1# telnet CentralBranch1# telnet 192.168.10.23838.Refer to the exhibit. Assuming that VLANs are not configured on the switch, how many broadcast domains are there?onetwothreefourfivesix39.Refer to the exhibit. How should an administrator configure the ports on switches ACC-1 and ACC-2 to allow hosts on the same VLAN to communicate across the two switches?as trunksas access portsas channelsas inter-VLAN portsas bridge ports40.Refer to the exhibit. Which set of commands should be used on the router to provide communication between the two hosts connected to the switch?R_1(config)# interface vlan 30R_1(config-if)# switchport mode trunk dot1qR_1(config-if)# interface vlan 40R_1(config-if)# switchport mode trunk dot1qR_1(config)# interface fastethernet 0/0R_1(config-if)# mode trunk dot1q 30 40R_1(config-if)# ip address 192.168.1.1 255.255.255.0R_1(config)# interface vlan 30R_1(config-if)# ip address 192.168.30.1 255.255.255.0R_1(config-if)# no shutdownR_1(config-if)# interface vlan 40R_1(config-if)# ip address 192.168.40.1 255.255.255.0R_1(config-if)# no shutdownR_1(config)# interface fastethernet 0/0R_1(config-if)# no shutdownR_1(config-if)# interface fastethernet 0/0.3R_1(config-if)# encapsulation dot1q 30R_1(config-if)# ip address 192.168.30.1 255.255.255.0R_1(config-if)# interface fastethernet 0/0.4R_1(config-if)# encapsulation dot1q 40R_1(config-if)# ip address 192.168.40.1 255.255.255.041.The network administrator shown in the exhibit is connected to an Ethernet LAN port on SW_1. The administrator needs to verify the configuration of the newly installed switch SW_2. What must be done so that the administrator can access SW_2 with a web browser? (Choose three.)Set the password on the management VLAN.Establish connectivity of the host to SW_2.Configure IP addressing parameters on SW_2.Configure the hostname on SW_2.Activate the HTTP service on SW_2.42. How do EIGRP routers establish and maintain neighbor relationships?by exchanging neighbor tables with directly attached routersby comparing known routes to information received in updatesby exchanging of hello packets with neighboring routersby dynamically learning new routes from neighborsby exchanging routing tables with directly attached routers43. What are three attributes of distance vector routing protocols? (Choose three.)Hello packets are used to form neighbor adjacencies.Each router sends its entire routing table in routing updates.Periodic updates are sent to neighboring routers.Distance vector protocols converge more rapidly than link-state protocols do.Because of their frequent periodic updates, distance vector protocols after convergence use more bandwidth than link-state protocols do.Distance vector protocols are less prone to routing loops than are link-state protocols.44.Refer to the exhibit. Routers RT-1 and RT-3 are completely configured. The administrator needs to configure the routing protocol on router RTR-2 so that communication occurs throughout the network. Which group of commands will successfully configure EIGRP on RTR-2?RTR-2(config)# router eigrp 1RTR-2(config-router)# network 198.198.76.0RTR-2(config)# router eigrp 1RTR-2(config-router)# network 198.198.76.0 0.0.0.3 no-summaryRTR-2(config-router)# network 198.198.76.4 0.0.0.3 no-summaryRTR-2(config-router)# network 198.198.76.128 0.0.0.192 no-summaryRTR-2(config)# router eigrp 1RTR-2(config-router)# network 198.198.76.0 0.0.0.3 area 0RTR-2(config-router)# network 198.198.76.4 0.0.0.3 area 0RTR-2(config-router)# network 198.198.76.128 0.0.0.63 area 0RTR-2(config)# router eigrp 1RTR-2(config-router)# network 198.198.76.0 0.0.0.3RTR-2(config-router)# network 198.198.76.4 0.0.0.3RTR-2(config-router)# network 198.198.76.128 0.0.0.19245.Refer to the exhibit. What does "FORWARDING" mean in the command output shown?The switch is receiving BPDUs, but not sending data frames.The switch is participating in an election process by forwarding the BPDUs it receives.The switch is sending and receiving data frames.The switch is receiving BPDUs and populating the MAC address table, but not sending data.46. The following command was added to a router configuration:ip route 198.19.150.0 255.255.255.0 192.0.2.249What two effects will this command have? (Choose two.)It will create a static route to the 198.19.150.0/24 network.It will create a default route using the interface with the IP address 192.0.2.249 as the next hop.All packets with an unknown destination address will be forwarded to the 198.19.150.0/24 network.Information about the 198.19.150.0 network learned dynamically will be ignored as long as this configuration command is in effect.The route will be marked with an "R" in the routing table.。
ccna_第三学期期末考试

1.VLAN 中继有何用途?通过减少广播流量提高网络性能。
选择在交换网络中传输数据的最佳路径。
通过一条链路传送多个VLAN 的流量。
避免交换网络中出现生成树环路。
请参见图示。
两台交换机都配置有默认的网桥优先级。
如果所有链路都在相同的带宽下运行,哪个端口将作为STP 根端口?S1 的Fa0/1 接口S1 的Fa0/2 接口S2 的Fa0/1 接口S2 的Fa0/2 接口请参见图示。
从图中显示的输出可以得到有关STP 的哪两项结论?(选择两项。
)交换机S1 所配置的STP 优先级值在该网络中最低。
交换机S1 被配置为VLAN1 的根桥。
Fa0/21 是交换机S1 的根端口。
Fa0/22 是冗余链路。
Fa0/24 被视为通往根桥的最佳路径。
下列哪种说法正确描述了生成树路径开销?根据环路中连接的交换机总数计算。
根据给定路径上所有交换机的使用率计算。
根据给定路径上交换机的网桥优先级计算。
根据给定路径上每个交换机端口的端口开销值(由端口速度决定)的总和计算。
使用单臂路由器模型配置VLAN 间路由有哪两项要求?(选择两项。
)每个子接口都应配置有自己的IP 地址、子网掩码和唯一的VLAN 分配。
路由器的物理接口必须连接到相邻交换机上的中继链路。
路由器的物理接口数量应该与VLAN 数量匹配。
应该将不同的静态VLAN 分配给路由器的不同接口。
路由器应该配置为VTP 服务器。
请参见图示。
下列哪两项正确描述了图中所示的路由器配置。
(选择两项。
)在路由器上配置路由协议之前,网络192.168.1.0 与网络192.168.3.0 之间无法成功路由。
路由器子接口上未正确配置VLAN。
该配置适用于单臂路由器网络设计。
路由器子接口上未正确配置中继。
应该为接口Fa0/1 分配IP 地址,否则无法进行路由请参见图示。
下列有关交换机S1 配置的说法中哪项正确?端口Fa0/1 和Fa0/3 使用的是Cisco 专有协议。
已使用switchport mode access命令配置交换机的Fa0/1 和Fa0/3 端口。
CCNA第三学期官方章节考试题之四、《VTP》(附答案)46 doc
VTP
VTP
一台配置了
VTP
VTP
2
如果将此交换机添加到已收敛的网络中,则同一个
告的
此交换机未显示配置修订版的错误。
此交换机已经与相邻设备建立了双向通信。
此交换机被配置为向同一个
此交换机被配置为允许网络管理员通过限制通向特定网络设备的流量来尽量提高带宽。
模式
域口令
版本号
4
所有交换机均会收到更新并同步
仅交换机
SW3
仅交换机
该交换机会以
该交换机会以
该交换机会以
该交换机会以6
S2
S2
S2
当电缆重新接好时,
无法在处于透明模式的交换机上创建
服务器模式交换机既不会侦听透明模式交换机发出的
在透明模式交换机上创建的
其它交换机上没有为新的
透明模式中的交换机不会转发8
交换机必须通过接入链路互连。
必须将交换机
必须将该两台交换机配置为
必须采用同一个
必须采用同一个
只能接受
可以创建并接受更新后的
只能传递
可以向域中添加
无法添加
10
Switch1
Switch1
Switch2
Switch1
Switch1 12在
14下
它检验了已配置的它检验了
它检验了是否在交换它检验了。
cisco CCNA官方第三学期第三章官方测试题和答案
1网络管理员正在从交换机删除多个VLAN。
当管理员输入no vlan 1命令时,收到错误消息。
此命令为什么产生错误消息?在任何情况下都不能删除VLAN 1。
只能通过删除vlan.dat 文件来删除VLAN 1。
只有删除VLAN 1 的所有端口后才能删除VLAN 1。
只有将VLAN 1 的角色分配给其它VLAN 后,才能删除VLAN 1。
2网络管理员希望将大楼A 中的主机划分到编号分别为20 和30 的VLAN 中,下列关于VLAN 配置的说法中哪两项正确项。
)可以为这些VLAN 命名。
VLAN 信息保存在启动配置中。
手动创建的非默认VLAN 必须使用扩展范围的VLAN 编号。
网络管理员可在全局配置模式或VLAN 数据库模式下创建VLAN。
两个VLAN 都可命名为BUILDING_A 以与处于不同地理位置的其它VLAN 区分。
3下列有关802.1q 中继协议的说法中哪项正确?802.1q 是Cisco 专有协议。
802.1q 帧通过MAC 地址映射到VLAN。
802.1q 不需要重新计算原始帧的FCS。
802.1q 对通过接入端口转发出去的帧不会执行操作。
4下列哪两种说法正确描述了VLAN 的优点?(选择两项。
)VLAN 通过调节流量控制和窗口大小来提升网络性能。
VLAN 使交换机可通过VLAN ID 过滤将数据包路由到远程网络。
VLAN 通过减少交换机上所需的物理端口数量来降低网络开销。
VLAN 通过识别有权访问敏感数据和应用程序的用户来提升网络安全性。
VLAN 将网络划分为较小的逻辑网络,这降低了网络对广播风暴的敏感性。
5请参见图示。
SW1 和SW2 是将要安装到图中所示拓扑中的新交换机。
交换机SW1 的Fa0/1 接口已将中继模式配置为“打于交换机SW1 和SW2 之间形成中继链路的说法中哪项正确?交换机SW2 的Fa0/2 接口如果支持DTP,则会协商成为中继链路。
交换机SW2 的Fa0/2 接口只有在静态配置为中继接口的情况下才能成为中继链路。
思科CCNA新版第3学期final-期末考试答案
思科CCNA新版第3学期final-期末考试答案1出于维护目的,已将路由器从网络中移除。
并已将新的 Cisco IOS 软件映 像成功下载到服务器并复制到路由器的闪存中。
应该在进行什么操作后再 将路由器放回网络中运行?备份新的映像。
将运行配置复制到 NVRAM 。
从闪存中删除之前版本的 Cisco IOS 软件。
重新启动路由器并检验新的映像是否成功启动。
答案 说明最高分值correctness of response Option 422请参见图示。
管理员尝试在路由器上配置 IPv6 的 EIGRP ,但收到如图所示 的错误消息。
配置 IPv6 的 EIGRP 之前,管理员必须发出什么命令?no shutdowneigrp router-id 100.100.100.100ipv6 unicast-routingipv6 eigrp 100ipv6 cef答案 说明 最高分值correctness of response Option 323IPv6 EIGRP 路由器使用哪个地址作为 hello 消息的来源?32 位路由器ID接口上配置的 IPv6 全局单播地址所有 EIGRP 路由器组播地址接口 IPv6 本地链路地址答案 说明 最高分值correctness of response Option 424下列关于 EIGRP 确认数据包的说法,哪两项是正确的?(请选择两项。
)发送该数据包是为了响应 hello 数据包。
该数据包用于发现接口上连接的邻居。
该数据包作为单播发送。
该数据包需要确认。
该数据包不可靠。
答案 说明 最高分值correctness of response Option 3 and Option 5 are correct.25何时发送 EIGRP 更新数据包?仅在必要时当获取的路由过期时每 5 秒通过组播发送每 30 秒通过广播发送答案 说明 最高分值correctness of response Option 126请参见图示。
思科网院[Cisco]第三学期Final题目及答案
1请参见图示。
网络支持技术人员需要为新路由器的一个FastEthernet 接口设置IP 地址。
但接口拒绝该地址,其原因是什么该IP 地址已在使用中。
技术人员使用的是网络地址。
技术人员为/26 使用了错误的子网掩码。
技术人员必须在该接口上启用VLSM。
2一个销售代表准备从酒店使用Internet 向公司总部发送敏感信息。
旅行前,IT 工作人员进行了必要工作以允许其安全访问该销售代表实施了什么解决方VPN帧中继带有CHAP 身份验证的PPP带有PAP 身份验证的PPP3下列哪两种说法正确描述了IEEE STP 的功能?(选择两项。
)它会立即将不处于丢弃状态的所有端口转换为转发状态。
它提供了一种在交换网络中禁用冗余链路的机制。
它有三种端口状态:丢弃、学习和转发。
它可确保交换网络中没有环路。
它可在不到 1 秒的时间内使交换网络收敛。
4请参见图示。
网络管理员必须为ISP 手动总结POP 路由器上的所有IP 地址。
下列哪项是正确的总结地址?192.168.0.0/2192.168.0.0/23192.168.0.0/24192.168.0.0/255请参见图示。
所有路由器都配置为使用带有默认设置的OSPF 协议。
如果同时启动所有路由器,哪台路由器将被选为BDRR1R2R3R46有关单区域OSPF 网络的说法中,哪两项正确?(选择两项。
)DR 和BDR 会减少在广播网络中发送的更新数量。
BDR 负责将更改发布到所有其它的OSPF 路由器。
路由器使用hello 数据包建立和维护邻居邻接关系。
所有OSPF 路由器都会接收组播地址224.0.0.6 上的更新。
区域 1 必须始终存在。
7请参见图示。
网络管理员按图示配置R1。
但是,网络 A 的一些主机无法访问Internet。
下列哪两个措施可解决此问题?(在正确的接口上配置ip nat inside和ip nat outside命令。
在NAT 地址池中增加IP 地址数量。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
CCNA3 思科第三学期 v3.0 ESwitching Final Exam-1a(2010-06-25 20:24:09)分类:CCNA3标签:ccna3思科第三学期v3.0eswitchingfinalexam-1a杂谈1.请参见图示。
连接到交换机X 上的VLAN 10中的主机通过以下哪种方法可以与连接到交换机Y上的VLAN 10 中的主机通信?QoS路由(routing)中继VPNVoIP子接口2.请参见图示。
所有交换机都配置有默认的网桥优先级。
如果所有链路都在相同的带宽下运行,哪个端口将作为非指定端口?交换机A 的Fa0/1 接口交换机A 的Fa0/2 接口交换机B 的Fa0/1 接口交换机B 的Fa0/2 接口交换机C 的Fa0/1 接口交换机C 的Fa0/2 接口3.请参见图示。
网络管理员希望允许用户通过SSH 和Telnet 连接访问Switch1。
但是SSH 连接却失败了。
此问题最可能的原因是什么?未删除RSA 密钥。
SSH 被配置在错误的线路上。
transport input命令应用不正确。
配置域名时进入的配置模式错误。
4.请参见图示。
SW1 是一台2960 交换机,已对其指定了默认值。
下列关于开销值38 对SW1 的意义的说法中哪两项正确?(选择两项。
)SW1 通过两条快速以太网链路连接到根交换机。
此开销代表从SW1 到根交换机的最快路径的数字值。
开销值38 是上游交换机(更接近根交换机)的端口26 向外通告的值。
SW1 将快速以太网链路的开销相加后得出38,从而确定到达根交换机所需的总开销。
根交换机通告的开销值是38,该值比加入VLAN0001 生成树域的其它任何交换机的值都低。
SW1 通过快速以太网链路连接到上游交换机,该上游交换机则通过千兆以太网链路直接连接到根交换机。
5.生成树算法的作用是什么?向其它交换机传播VLAN 配置。
将广播数据包限制到一个VLAN。
将网络划分为多个广播域。
防止包含冗余路径的交换网络中出现环路。
6.单臂路由器VLAN 间路由有哪三项特征?(选择三项。
)需要使用VTP需要使用子接口减少广播域的数量使用过多VLAN 时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于VLAN 间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口7.请参见图示。
下列哪三项正确描述了图中所示的路由器配置。
(选择三项。
)使用的是IEEE 标准中继协议。
接口Fa0/1 已配置了子接口。
已经在接口Fa0/1 上应用了shutdown命令。
接口Fa0/1.3 被映射到默认的管理VLAN。
该配置适用于单臂路由器网络设计。
应该为接口Fa0/1 分配IP 地址,否则无法进行路由。
8请参见图示。
下列有关交换机S1 配置的说法中哪项正确?只允许VLAN99 使用中继链路。
交换机端口Fa0/1 和Fa0/3 配置了标准中继协议。
应该将交换机端口Fa0/1 和Fa0/3 配置为接入端口,以允许来自多个VLAN 的数据访问交换机S1。
因为已经使用switchport mode dynamic auto命令配置了相连的所有接口,所以交换机将为接口Fa0/1 和Fa0/3 协商中继链路。
9.请参见图示。
网络管理员计划要在S3 上的整个VTP 域内多共享五个VLAN。
管理员在另行创建VLAN 之前应该采取什么措施?在处于VTP 服务器模式的一台交换机上创建VLAN 并允许这些VLAN 传播到域中的其它交换机上。
将配置修订版号修改为10 以支持另行额外的VLAN。
启用VTP 修剪模式以便在S3 上创建VLAN。
启用VTP v2 模式。
10.请参见图示。
RTB 被配置为进行传统的VLAN 间路由。
RTB 可以ping 通计算机A 但无法ping 通计算机B。
此故障的原因可能是什么?Fa0/11 端口处于错误的VLAN 中。
RTB 上没有有效的路由协议。
计算机B 的IP 地址在错误的逻辑网络中。
路由器的Fa0/1 接口上配置了错误的中继封装类型。
11请参见图示。
将图中列出的命令输入路由器R1 和交换机S1 后,PC1 和PC2 彼此无法ping 通。
网络管理员输入show interfaces trunk命令后获得了图中所示的结果。
问题很可能出在哪里?路由器上未配置路由协议。
已建立中继链路,但未将任何VLAN 配置为使用该中继链路。
由于交换机端口未配置为中继,因此未建立中继链路。
必须在交换机或路由器上或同时在这两台设备上配置dynamic desirable选项,动态中继协议才能建立中继链路。
12请参见图示。
计算机D 发送了一则广播消息。
哪些设备会处理该广播消息?计算机E计算机D 和计算机E计算机D、计算机E 和Router1计算机B 和计算机E计算机B、计算机E 和Router1计算机C、计算机D 和计算机E计算机C、计算机D、计算机E 和Router1计算机A、计算机B、计算机C、计算机D、计算机E 和Router113如果一台VTP 交换机不允许创建本地VLAN 但却接收同一域内其它交换机发出的VLAN 更新,则该交换机处于什么工作模式?客户端根服务器透明14请参见图示。
图中所示的交换机已启用VTP 修剪。
SW4 会允许哪个或哪些VLAN 使用连接到SW2 的中继链路?仅VLAN 20VLAN 10 和VLAN 30VLAN 10、VLAN 20 和VLAN 30VLAN 1、VLAN 20 和VLAN 1002 到100515请参见图示。
网络管理员刚将VLAN 50 添加到Switch1 和Switch2。
主机A、B、C、D 都正确配置了VLAN 50 子网范围中的IP 地址。
主机A 可以与主机B 通信,但无法与主机C 或主机 D 通信。
此问题的原因是什么?本征VLAN 不匹配。
Switch1 的Fa0/11 接口未配置为中继接口。
交换机Switch1 和Switch2 之间的链路处于工作状态,但未配置为中继链路。
不允许VLAN 50 使用交换机Switch1 和Switch2 之间的中继链路。
16首次配置Linksys WRT300N 无线接入设备需要通过以下哪种组合建立连接?采用控制台连接计算机与WRT300N通过无线连接计算机与WRT300N通过辅助端口连接计算机与WRT300N配置在同一个IP 子网中并采用电缆直接连接计算机和WRT300N17请参见图示。
在生成树协议中,“学习”表示什么意思?交换机正在发送并接收数据帧。
交换机并未接收BPDU,但正在发送并接收数据。
交换机正在通过转发收到的BPDU 参与选举过程。
交换机正在接收BPDU 并填充MAC 地址表,但并未发送数据。
18请参见图示。
交换机SW1 所连接的主机无法与处于相同VLAN 中且连接到交换机SW2 的主机通信。
怎样才能纠正此问题?在拓扑中加入第3 层设备。
将两台交换机都配置为VTP 透明模式,使其共享VLAN 信息。
使用静态中继配置重新配置交换机SW1 的fa0/1 接口。
将属于同一子网的IP 地址分配给SW1 的FastEthernet 0/1 接口和SW2 的FastEthernet 0/2 接口。
19请参见图示。
最近安装了SW1 用于取代集线器。
主机1和主机4 同时传送数据。
网络设备会如何处理此事件?(选择两项。
)当冲突发生时,会调用回退算法。
由于主机1 和主机4 都连接到交换机,因此不会发生冲突。
交换机将根据交换机MAC 地址表中的信息将数据转发到相应的端口。
主机2 和主机3 会获分配更短的回退值,从而获得访问介质的优先权。
为了防止再发生冲突,交换机会在设定时间内阻塞与主机2、主机3 和主机4 连接的端口。
20请参见图示。
主机PC_A 和主机PC_B 同时发送流量,来自这两台发送站的帧发生了冲突。
最后收到冲突信号的是哪台设备?集线器HB1交换机SW1路由器R1交换机SW2路由器R2交换机SW421请参见图示。
新购置了交换机SW2 并将其添加到网络中。
应该向SW2 应用什么配置才能使其与交换机SW1 处于同一个VTP 域内,接收来自SW1 的VLAN 信息,并同步VLAN 信息?在SW2 上禁用VTP 修剪。
将SW2 配置为VTP 透明模式。
为SW2 配置VTP 域口令。
将SW2 配置为具有更高修订版号的VTP 服务器。
22请参见图示。
哪一个口令可让管理员进入特权执行模式?cisco1cisco2cisco3cisco23请参见图示。
发出这些命令会产生什么结果?会设置使能口令。
会为第一个Telnet 连接设置口令。
会为控制台连接设置口令。
会为辅助端口连接设置口令。
24请参见图示。
网络管理员已将网络划分为两个VLAN,R1和S1 的配置如图所示。
但是,PC1 无法访问PC2。
问题很可能出在哪里?R1 上未配置路由协议。
S1 的Fa0/1 端口不是中继端口。
S1 上未设置默认网关地址。
S1 和R1 之间只配置了一条物理链路用于VLAN 间路由。
25请参见图示。
管理员记录下一台以太网交换机的CAM 表输出,内容如图所示。
当该交换机收到图中底部所示的帧时,会进行什么操作?丢弃该帧将该帧从端口2 转发出去将该帧从端口3 转发出去将该帧转发出所有端口将该帧从除端口3 以外的所有端口转发出去在转发表中将站点00-00-3D-1F-11-05 添加到端口226下列关于 service password-encryption 命令的说法中哪项正确?cservice password-encryption 命令应在特权执行模式提示符下输入。
service password-encryption 命令只加密控制台与 VTY 端口的口令。
service password-encryption 命令对运行配置中先前未加密的所有口令进行加密。
若要查看通过 service password-encryption 命令加密的口令,可输入 no service password-encryption 命令。
27下列哪一项正确描述了第 2 层交换机的功能?b它在不同 LAN 网段之间路由数据包。
它使用目的 MAC 地址来选择性地转发帧。
它根据网络层目的地址执行交换和过滤。
如果帧的目的 MAC 地址不在 MAC 地址表中,它将丢弃该帧。
28Cisco 交换机启动过程中要执行哪三项操作?(选择三项。
)cef启动加载器使用交换机自带的操作系统启动交换机。
启动加载器通过 TFTP 检索诊断例程。
启动加载器执行 POST。
启动加载器从 RAM 加载。
启动加载器初始化用于启动系统的闪存文件系统。
如果闪存中的操作系统损坏或已丢失,启动加载器会加载默认操作系统。
29请参见图示。