思科CCNA第一学期第10章答案
- 格式:doc
- 大小:1001.50 KB
- 文档页数:11
思科 CCNA 学习试题答案思科ccna学习试题答案CCNA课程测试一、单项选择题:1.媒体100BaseT的最大传输距离为:()a:10MB:100mc:1000md:500M2、路由器下,由一般用户模式进入特权用户模式的命令是:()a:enableb:configc:interfaced:router3、哪个命令可以成功测试网络:()a:router>ping192.5.5.0b:router#ping192.5.5.30c:router>ping192.5.5.256d:router#ping192.5.5.2554、介质工作在osi的哪一层()a:物理层B:数据链路层C:网络层D:传输层5。
100BaseT的速率为()Mbit/SA:1b:10C:100D:10006、在启用igrp协议时,所需要的参数是:()a:网络掩码b:子网号c:自治系统号d:跳数7、基本ip访问权限表的表号范围是:()a:1―100b:1-99c:100-199d:800-8998、查看路由表的命令是:()a:ShowInterface B:showrunc:showiprouted:showtable9、工作在osi第三层的设备是:()a:网卡b:路由器c:交换机d:集线器10、osi第二层数据封装完成后的名称是:()a:比特b:包c:帧d:段11.为了禁止网络210.93.105.0 FTP到网络223.8.151.0并允许其他信息传输,可以实现此功能的选项有:()a:access-list1deny210 93.105.0.0.0.0.0.0b:access-list100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpc:access-List100Permitipanyd:access-list100denytcp210.93.105.00.0.0.255223.8.151.00.0.0.255eqftpaccess-list100permitipanyany12.路由器下“特权用户模式”的标识符为:()a:>b:!c:#d:#配置如果)#13。
CCNA Exploration: 路由协议和概念10.1.3 链路状态路由过程考试试题:请参见图示。
当使用链路状态路由协议的路由器 D 添加到网络中后,在它了解网络拓扑结构其所做的第一件事是什么它向路由器 B 和 C 发送LSP 数据包。
它向网络中的所有路由器发送LSP 数据包。
它向网络中的所有路由器发送Hello 数据包。
它向路由器 A 和 E 发送有关其直连邻居的信息。
它向网络中的所有路由器发送有关其直连邻居的信息。
当其接口处于up 状态时,它便能获知自己的直连网络。
10.1.7 将链路状态数据包泛洪到邻居考试试题:哪两种事件将会导致链路状态路由器向所有邻居发送LSP(选择两项。
)30 秒计时器超时网络拓扑结构发生变化时运行贝尔曼-福特算法之后立即发送DUAL FSM 建立拓扑数据库之后立即发送路由器或路由协议初次启动时10.1.8 构建链路状态数据库考试试题:链路状态路由过程的最后一步是什么将后继路由加入路由表中SPF 计算到达每个目的网络的最佳路径向所有邻居发送LSP 以收敛网络运行DUAL 算法以找出到达目的网络的最佳路径10.1.7 将链路状态数据包泛洪到邻居考试试题:哪两项陈述正确描述了链路状态路由过程(选择两项。
)区域中的所有路由器都有链路状态数据库区域中的每个路由器都将向所有邻居发送LSPLSP 使用保留的组播地址来访问邻居通过运行扩散更新算法(DUAL) 来防止路由环路可靠传输协议(RTP) 是用于发送和接收LSP 的协议6 创建链路状态数据包考试试题:请参见图示。
在从路由器JAX 发送到路由器ATL 的LSP 中,可以看到哪种类型的信息跳数路由的正常运行时间链路的开销正在使用的所有路由协议的列表10.2.2 链路状态路由协议的要求考试试题:现代链路状态协议通过哪些功能来尽可能降低处理器和内存要求将路由拓扑结构分割成更小的区域为路由计算分配较低的处理优先级使用更新计时器限制路由更新严格执行水平分割规则以减少路由表条目10.1.3 链路状态路由过程考试试题:为使网络达到收敛,每台链路状态路由器会执行哪三个步骤(选择三项。
CCNACCNA11章节考试题之01《生活在以网络为中心的世界》1、在主要使用文本相互通信的两人或多人之间,他们使用的哪种通信形式属于基于文本的实时通信?A.网络日志B.维基C.即时消息D.播客E.协作工具2、哪种网络为客户提供对企业数据(如库存、部件列表和订单)的有限访问?A.内部网B.外联网C.网际网络D.Internet3、出于管理数据的目的,需要使用什么来权衡通信的重要性及其特征?A.网络管理B.网络流量C.QoS策略D.网络评估4、对网络通信采取哪些处理后才能使服务质量策略正常发挥作用?(选择两项)A.根据服务质量要求对通信分类。
B.对应用程序数据的每个分类分配优先级。
C.始终对Web通信分配高优先级处理队列。
D.始终对数字电影分配高优先级处理队列。
E.始终对电子邮件通信分配低优先级队列。
5、网络体系结构有哪两个部分?(选择两项)A.构成以人为本网络的人B.通过网络传输消息的编程服务和协议C.通过网络传输的数据D.支持网络通信的技术E.运营和维护数据网络的企业6、在当初开发Internet时,放弃面向连接的电路交换技术出于哪三个原因?(选三项)A.电路交换技术要求将单个消息划分为包含编址信息的多个消息。
B.早期的电路交换网络在电路出现故障时不能自动建立备用链路。
C.电路交换技术要求即使两个位置之间当前并未传输数据,也必须在网络端点之间建立开放电路。
D.通过面向连接的电路交换网络传输消息无法保证质量和一致性。
E.建立多路并发开放电路获得容错能力成本高昂。
7、开发Internet时使用数据包交换无连接数据通信技术出于哪三个原因?(选三项)A.它能快速适应数据传输设施的丢失。
B.它能有效利用网络基础架构传输数据。
C.数据包可同时通过网络采取多条路径传输。
D.支持按建立连接的时间收取网络使用费用。
E.传输数据之前需要在源设备和目的设备之间建立数据电路。
8、QoS在融合网络中的作用是什么?A.确保丢弃高于可用带宽水平的所有通信B.确定网络中不同通信的传输优先级C.针对所有网络通信确定精确的优先级D.允许网络中的其它组织共享未使用的带宽9、将左侧的选项和右侧的对象连线,使网络体系结构的特征与其定义相匹配。
CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。
最新CCNA第一学期第十章答案1、OSI 模型的哪三层提供类似于TCP/IP 模型的应用层提供的网络服务?(请选择三项。
)OSI 模型的三个较高层,即会话层、表示层和应用层,提供类似于TCP/IP 模型的应用层提供的服务。
OSI 模型的较低层主要处理数据流。
表示层负责处理通用数据格式。
加密、格式化和压缩是该层的部分功能。
网络层负责寻址,会话层负责会话控制,应用层或会话层负责进行身份验证。
4、一家生产公司向ISP 定制特定的托管服务。
要求的服务包括托管万维网、文件传输和电子邮件。
下列哪些协议可满足这三项主要的应用服务?(选择三项。
)当用户在Web 浏览器的地址栏中键入网站域名时,工作站需要向DNS 服务器发送DNS 请求,请求执行名称解析流程。
该请求是客户端/服务器模型的应用。
电驴应用程序是P2P。
在工作站上共享打印机的网络属于点对点网络。
使用ARP 只是主机发送的广播消息。
IMAP 和POP 是用于检索电子邮件的协议。
使用IMAP 而不使用POP 的好处在于,当用户连接到使用IMAP 的服务器时,邮件副本会下载到客户端应用程序。
然后,IMAP 会将电子邮件存储在服务器上,直至用户手动删除这些邮件。
8、如果发送电子邮件时目的电子邮件服务器繁忙,SMTP 将执行哪两项操作?(请选择两项。
)当发出电子邮件时,目的电子邮件服务器可能处于脱机状态或忙碌状态。
无论哪种情况,SMTP 会将邮件转到后台处理,稍后再发送。
服务器会定期检查邮件队列,然后尝试再次发送。
经过预定义的到期时间后,如果仍然无法发送邮件,则会将其作为无法投递的邮件退回给发件人。
10、启用DHCP 的客户端PC 已经启动。
在下列哪两步中,客户端PC 会使用广播消息与DHCP 服务器通信?(请选择两项。
)启用DHCP 的客户端和DHCP 服务器之间的所有DHCP 消息均使用广播消息,直至收到DHCPACK 消息为止。
启用DHCP 的客户端只能发送DHCPDISCOVER 和DHCPREQUEST 消息。
ITN 第7 章考试1什么是套接字?正确响应您的响应源和目的IP 地址以及源和目的以太网地址的组合源IP 地址与端口号的组合或目的IP 地址与端口号的组合源和目的序列号和确认号的组合源和目的序列号和端口号的组合套接字是源IP 地址与源端口号的组合,或者目的IP 地址与目的端口号的组合。
此试题参考以下领域的内容:Introduction to Networks•7.1.2 TCP 和UDP 简介2主机设备需要通过网络发送大型视频文件,同时为其他用户提供数据通信。
下列哪种功能可以让不同通信流同时发生,而不会让一个数据流使用所有可用带宽?正确响应您的响应窗口大小多路复用端口号确认多路复用对交替发送多个通信流很有用。
窗口大小用于降低数据通信速率。
端口号用于将数据流传送到正确的应用程序。
确认用于通知发送设备数据包流已收到或未收到。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输3主机设备通过HTTP 协议向Web 服务器发送数据包。
传输层使用下列哪项来将数据流传送到服务器上的正确应用程序?正确响应您的响应序列号确认源端口号目的端口号目的端口号用于将数据流传输到正确的应用程序,而源端口号由源设备随机生成并进行跟踪。
序列号用于指示如何重组和重新排序收到的数据段。
确认用于通知发送设备数据包流已收到或未收到。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输4UDP 传输协议有什么有利功能?正确响应您的响应确认已接收的数据减少传输延迟使用序列号跟踪数据段能够重新传输丢失的数据由于其报头小于TCP 报头,UDP 协议可以减少传输延迟。
此试题参考以下领域的内容:Introduction to Networks•7.1.1 数据传输5下列哪种场景描述了传输层提供的功能?正确响应您的响应学生使用教室里的VoIP 电话给家里打电话。
将二进制数字10111010 转换为等值的十六进制数字。
请从下面选择正确的答案。
8590BAA1B31C以下哪些选项描述的是帧间隙?(选择两项)任何站点在发送另一帧前必须等待的最短时间间隔,以比特时间为测量单位任何站点在发送另一帧前必须等待的最长时间间隔,以比特时间为测量单位插入帧中的96 位负载填充位,用于使其达到合法的帧大小帧之间传输的96 位帧填充位,用于实现正确同步可以让速度较慢的站点处理帧并准备下一帧的时间站点在发送另一帧前不得超过的最长时间间隔,否则将视其为无法到达采用CSMA/CD 的网络中发生冲突时,需要传输数据的主机在回退时间到期后做何反应?主机恢复传输前侦听模式。
造成冲突的主机优先发送数据。
造成冲突的主机重新传输最后16 个帧。
主机延长其延迟时间以便快速传输。
发生以太网冲突之后调用回退算法时,哪种设备优先传输数据?涉入冲突的设备中MAC 地址最小的设备涉入冲突的设备中IP 地址最小的设备冲突域中回退计时器首先过期的任何设备同时开始传输的设备以下哪项是CSMA/CD 访问方法的缺点?冲突会降低网络性能。
比非确定性协议复杂。
确定性介质访问协议会减慢网络速度。
CSMA/CD LAN 技术只能以低于其它LAN 技术的速度提供。
请参见图示。
交换机和工作站已针对全双工操作进行了管理配置。
下列哪项陈述准确反映了此链路的运行?此链路不会发生冲突。
每次只有一台设备能够传输。
交换机将优先传输数据。
如果发生过多冲突,设备将默认恢复半双工操作。
以太网网段中的主机发生冲突时,为何要在尝试传输帧之前随机延迟?随机延迟旨在确保无冲突链路。
每台设备的随机延迟值由制造商指定。
网络设备厂商之间无法就标准的延迟值达成一致。
随机延迟有助于防止站点在传输期间再次发生冲突。
在图示中,当主机 B 希望向主机 C 传输帧时,主机 A 向主机 D 发送1 KB 以太网帧的过程已完成了50%。
主机B 必须执行什么操作?主机 B 可以立即传输,因为它连接到自己的电缆部分中。
诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14第四章OSI传输层P15-20第五章OSI网络层P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章OSI物理层P41-45第九章以太网P46-51第十章网络规划和布线P52-61第十一章配置和测试网络P62-70第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包002下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。
此类网络由由一个组织管理。
LAN 中的不同网段之间一般通过租用连接的方式连接。
此类网络的安全和访问控制由服务提供商控制。
LAN 为同一个组织内的用户提供网络服务和应用程序访问。
此类网络的每个终端通常都连接到电信服务提供商(TSP)。
004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层006请参见图示。
所示网络属于哪一类型WANMANLANWLAN007 以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务009 请参见图示。
下列哪组设备仅包含终端设备A、C、DB、E、G、HC、D、G、H、I、JD、E、F、H、I、JE、F、H、I、J010 选择关于网络协议的正确陈述。
请参见图示。
在实验室中操作的学生选择了接线如图所示的电缆。
使用此电缆可以成功实现哪些连接类型?(选择两项)
连接PC 与路由器的控制台端口
通过快速以太网端口连接两台路由器
以千兆位的速度连接两台交换机
以千兆以太网速度连接PC 与交换机
以快速以太网速度连接接口类型相同的两台设备
以下哪个选项表示用于Cisco 路由器初始配置的主接口?
AUX 接口
以太网接口
串行接口
控制台接口
下列哪些因素使光缆比铜缆更适用于连接不同建筑物?(选择三项)
每根电缆覆盖的距离更远
安装成本更低
EMI/RFI 的影响有限
耐用的连接
潜在带宽更高
易于端接
网络管理员必须在网络中使用电缆长度无需中继器即可达100 米的介质。
所选介质必须价格适中并制的现成建筑物内实施安装。
哪种类型的介质最适合这些要求?
STP
UTP
同轴
单模光纤
多模光纤
“衰减”一词在数据通信中是什么意思?
信号强度随着距离的增加而减弱
信号到达其目的地的时间
信号从一个线对泄露到另一个线对
网络设备对信号的强化
在使用网络地址130.68.0.0 和子网掩码255.255.248.0 时,每个子网上可以分配多少个主机地址?
30
256
2046
2048
4094
4096
要为每个子网提供254 个可用主机地址,应该将以下哪个子网掩码分配给网络地址192.168.32.0?
255.255.0.0
255.255.255.0
255.255.254.0
255.255.248.0
一家公司计划将其网络分为多个子网,每个子网最多支持27 台主机。
哪一子网掩码可支持所需的主址最少?
255.255.255.0
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
终端和控制台端口之间使用哪种类型的网络电缆?
交叉电缆
直通电缆
全反电缆
跳线电缆
以下哪种设备用于创建或划分广播域?
集线器
交换机
网桥
路由器
中继器
请参见图示。
PC1 会将哪个目的IP 地址放入发往PC2 的数据包报头中?
192.168.1.1
192.168.2.1
192.168.2.2
192.168.3.1
192.168.3.54
请参见图示。
根据显示的IP 配置回答,主机 A 和主机 B 尝试在网段外通信的结果是什么?
主机 A 和主机 B 都会成功
主机 A 会成功,主机 B 会失败
主机 B 会成功,主机 A 会失败
主机 A 和主机 B 都会失败
下列哪三种类型的连接器通常与Cisco 的V.35 串口电缆相关?(选择三项)
RJ11
DB 60
Winchester 15 针
DB 9
Smart 串行
RJ45
请参见图示。
支持图中显示的网络需要多少个子网?
2
3
4
5
将UTP 以太网端口设置为MDI 或MDIX 运行的三种常用方法是什么?(选择三项)
直接配置设备
与电缆的颜色代码关联
选择和配置电缆
使用电缆测试仪确定线序
启用电动调换发射线对和接收线对的机制
自动检测和协商端口的MDI/MDIX 运行
请参见图示。
某学生准备建立一个家庭网络,主要用于大量文件传输、视频流和游戏。
在显示的拓扑中,哪种网
无线接入点
路由器
集线器
交换机
关于路由器在网络中的作用,下列哪些陈述是正确的?(选择三项)
用于传播广播。
用于放大冲突域。
用于分割广播域。
用于连接不同的网络技术。
每个路由器接口需要一个单独的网络或子网。
用于在LAN 和WAN 接口之间保持同一种帧格式。
请参见图示。
网络管理员决定使用数据包捕获软件评估从学生子网到Internet 之间的所有通信。
要确保捕获所有络设备将监控站点连接到R1 和R2 之间的网络?
路由器
集线器
交换机
无线接入点
请参见图示。
假设所有设备均使用默认设置。
支持显示的拓扑需要多少个子网?
1
3
4
5
7
请参见图示。
下列关于图示拓扑的陈述,哪三项是正确的?(选择三项)
主机 B 和 C 位于同一个子网中。
存在五个广播域。
主机 B 使用交叉电缆连接到路由器。
存在四个广播域。
显示了五个网络。
主机 B 使用全反电缆连接到路由器。
要建立从计算机到Cisco 路由器的控制台连接,会使用以下哪个电缆接线选项?
交叉电缆
直通电缆
全反电缆
V.35 电缆
请参见图示。
有关图示网段中使用的电缆类型,下列哪三项陈述判断正确?(选择三项)
网段 1 使用主干布线。
网段 1 使用跳线。
网段 3 使用跳线。
网段 3 使用垂直布线。
网段 3 使用水平布线。
网段 4 使用垂直布线。
请参见图示。
网络技术人员已经将私有IP 地址范围192.168.1.0/24 分配给图中显示的网络使用。
满足此网际网络中网段 A 的主机要求应使用哪个子网掩码?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248。