CCNA考试试题
- 格式:doc
- 大小:44.00 KB
- 文档页数:5
CCNA试题1.What is the correct order for the OSI model? AP=Presentation, S=Session, D=Datalink, Ph=Physical, T=Transport, A= Application, N=NetworkA. P S A PH D N TB. A P S T N D PHC. PH D N T A S PD. P S A T N D PHIt is crucial you not only memorize this and know what each layer does.2. What is encapsulation? CA. Putting the header on an incoming frameB. Putting a header on an incoming segmentC. Putting a header on an outgoing frameD. Putting a header on an outgoing bitThis also includes trailers and can be put on segments, packets, and frames.3. Which layer is most concerned with user applications? AA. ApplicationB. PresentationC. NetworkD. Physical4. Which of the following is de-encapsulation?AA. Stripping the header from a frameB. Putting a header on a segmentC. Putting a header on a frameD. Stripping a frame from a linkThis also includes trailers as in question 2.5. What layer converts data into segments?A. ApplicationB. PresentationC. TransportD. Physical6. What layer converts data into Packets? AA. NetworkB. ApplicationC. PhysicalD. Data Link7. What layer converts data into Frames? CA. ApplicationB. PhysicalC. Data LinkD. Transport8. What layer converts data into bits? DA. ApplicationB. SessionC. Data LinkD. PhysicalAll of the layers need to convert data into something that they can pass down to the next level, with the exception of the Application layer which hands data to the Presentation layer.The Presentation layer encrypts, and compresses before sending it to the Session layer for it s first conversion.9. Which layer is most concerned with getting datafrom the beginning to the final destination? DA. ApplicationB. PresentationC. SessionD. TransportThe transport layer is most concerned with reliable transportation from one end to the other.10. Which of the following is not a part of the Session layer? BA. Establishing a sessionB. Ensuring error free segmentsC. Ending a sessionD. Keeping the sender and receiver from sending a message at the same time That is the job of the Transport layer.11. Which of the following is not a job for the presentation layer? Choose 2 CDA. Data representationB. CompressionC. Dialog managementD. TransmissionE. EncryptionC is handled by the session layer, andD is handled by the Transport layer12. What does Peer to Peer communication involve? DA. Each layer communication with the layer below itB. Each layer communication with layer above itC. Each layer communicating with adjacent layer in another systemD. Each layer communication with it s corresponding layer in another systemAnswer D.Answer C sounds correct also, but adjacent and corresponding are two different things. The session layer can only communicate with the session layer in another system for example.13. Why does the industry use a layered model?Choose all correct ABCDA. When you enhance one layer it doesn t affect the other layersB. Design and development can be made in a modular fashionC. Network operations can be simplifiedD. Troubleshooting can be simplified.14. Which two of the following are not from the physical layer? ADA. SDLCB. V.35C. HSSID. ISDNE. RS-232Answer A D.SDLC and ISDN are W AN protocols that function at the data link layer15. Which two answers are functions of the OSI model"s network layer? BCA. Sequencing of framesB. Path determinationC. Packet switchingD. Packet sequencingAnswer B C. Sequencing is done at the data link layer. D is fictional.16. What is an example of a MAC address? DA. Az32:6362:2434B. Sj:2817:8288C. GGG:354:665D. A625:cbdf:6525The address is a 48 bit address which requires 12 Hex digits.A hex digit can t be past the letter F. Hex stands for 16. 1-9 and A-F make up numbers that are valid.17. Which of the following is not part of the data link layer? EA. Transports data across the physical linkB. Performs physical addressingC. Performs flow controlD. Determines network topologyE. Terminates a sessionThis is part of the session layer18. Which of the following are data link protocols? ADEA. HDLCB. FTPC. SQLD. ISDNE. Token RingFTP is an application and SQL is a session layer protocol.19. Of the following address AA77:3827:EF54, which of the following is the vendor portion? AA. AA7738B. 27EF54C. AA77D. EF54The vendor code is how you can tell who made the card. The last 6 digits are the physical address.20. Which of the following are examples of layer 3 addressing? ABA. 165.33.4.34B. AA77:3827:EF54C. HHHH:hg:7654D. 76The first is a TCPIP address and the second is an IPX address21. What is considered Layer 3 addressing? BA. Data Link LayerB. Network LayerC. Application LayerD. None of thesePhysical is Layer 1, then data link, and then Network. This is the same layer that routers are on. A22. What layer are Bridges on?A. Data LinkB. PhysicalC. ApplicationD. TransportBridges segment networks but are not able to determine addresses like the network layer does.23. Repeaters are on what layer? CA. TransportB. SessionC. PhysicalD. ApplicationAll repeaters can do is boost a signal. An active hub is a good example of a repeater. A switching hub is a good example of layer 3 addressing, since switches go by network addresses and IPX addresses rather than just boost signals. Bridges can only read mac addresses, and not the full IPX or TCPIP addresses.24. Which of the following are considered routing protocols? ADA. OSPFB. IPC. IPXD. EIGRPE. Token RingAnswers B and C are routed protocols, whereas A and D are the protocols that do the routing. This is easily confused. You can remember it by thinking that the routing protocols that haul the routed protocols are like a tug ship pulling a barge. The barge is full of data.25. Which two of the following are considered connection oriented communication? ADA. Setup and maintenance procedures are performed to ensure message delieveryB. A physical circuit exists between two communicating devicesC. It is a best effort type of communicationD. A virtual connection exists between the twoB is not a necessity, andC is not accurate. TCP is connection oriented and UDP is not26. Which of the following are not WAN protocols? Choose 2 CDA. Frame RelayB. A TMC. EthernetD. FDDIE. ISDNEthernet and FDDI are LAN protocols.27. Which of the following will allow you to view NVRAM s contents? AEA. show configurationB. show protocolsC. show versionD. show running-configE. show startup-configAnswer A E. These show the backup configuration stored in NVRAM. The other anwsers allow youto view RAM.28. Which of the following contains the OS image? AA. FlashB. NVRAMC. RAMD. InterfacesROM will be used if Flash is unavailable. NVRAM is the backup configuration, and RAM is the active configuration29. Which of the following indicates the router is in privilege mode? AA. Router#B. Router>C. Router-D. Router* Answer B shows the router in user mode.30. What does "show cdp neighbors" not show? Neighbors___C______A. device idC. ios versionD. port type and number31. Which of the following will show you the clock? DA. cl?B. Cl ?C. Clock?D. Clock ?By typing this the router will finish the command and show the clock.32. CDP operates at which layer? DA. TransportB. NetworkC. Data linkD. PhysicalCDP allows a network device to exchange frames with other directly connected networked devices.33. Which command does not show two devices are not routing packets between them successfully? ACDA. pingB. show interfaceC. traceD. telnetAnswer A C D. With these commands you can tell whether or not you have communication. Show interface just verifies there is a connection34. What keystrokes shows the possible commands in privilege mode? ABA. helpB. hC. ctrl+hD. ?Answers A and B will give a brief description when typed, and C is not valid.35. Which two items contain versions of the router s configuration file? BCA. flashB. nvramC. ramD. romA and D contain the OS.36. Which of the following commands will allow you to review the contents of RAM?A. show configuration BCDC. show versionD. show running-configE. show startup-configA and E allow you to see NVRAM.37. Which of the following will allow you to add, modify, or delete commands in the startup configuration file? DA. show startup-configB. show running-configC. configure terminalD. configure memoryAnswer C allows you to change items in the running configuration file38. Which command would be used to restore a configuration file to RAM? ____A____TFTP running-configA. router#copyB. router>copyC. router*copyD. router^copyYou must be in privilege mode when executing this, which is why you see the # sign.39. Which of the following commands will display the running configuration file to a terminal? AA. show running-configB. show router-configC. router#show flashD. router>show versionIt can only be shown in privilege mode.40. If you need to copy the currently executing configuration file into NVRAM,which command would you use? CA. router#copy startup-config running-configB. router#copy startup-config TFTPC. router#copy running-config startup-configD. router>copy startup-config running-configAnswers ABC show that the router is in privilege mode which is necessary to complete this action, but only C shows the correct syntax.。
CCNA集训队综合试卷一、选择题( 40分)1.交换机进行数据转发时,依据的是()。
(A)IP地址(B)MAC地址(C)主机名称(D)网络标识2.对交换机配置时,应将配置线缆插入()。
(A)Ethernet口(B)AUX口(C)Serial口(D)Console口3.下列哪个服务提供域名到IP地址的解析服务()。
A.DNS B.DHCP C.WWW D.SMTP4.哪种路由选择协议使用最短路径优先算法?( )A. 距离向量B. 链路状态C. 混合D. 以上都不对5.不支持可变长子网掩码的路由协议是( )A. RIP v1B. RIP v2C. OSPFD. IS-IS 6.Cisco的专用协议有( )A. RIPB. BGPC. EIGRPD. OSPF7.默认时,管理距离大于90的有( ) (本题多选)A. RIPB. IGRPC. OSPFD. EIGRP 8.路由协议存在路由自环问题的是( )A. RIPB. BGPC. OSPFD. IS-IS9.MAC地址与IP地址的长度分别是()。
(A)48位、48位(B)32位、32位(C)48位、32位(D)32位、48位10.以下网络互连设备中,属于物理层的设备是()。
(A)集线器(B)交换机(C)路由器(D)网关11.下列IP地址属于标准B类IP地址的是()(A)172.19.3.245/24 (B)190.168.12.7/16 (C)120.10.1.1/16 (D)10.0.0.1/16 12.以太网交换机组网中有环路出现也能正常工作,则是由于运行了()协议。
(A)801.z (B)802.3 (C)Trunk (D)Spanning Tree13.对IP地址为192.168.2.1的主机不停发送数据包的命令ping命令是()。
(A)ping 192.168.2.1 –n (B)ping 192.168.2.1 -i(C)ping 192.168.2.1 –t (D)ping 192.168.2.1 -a14.要查看交换机端口加入VLAN的情况,可以通过()命令来查看(A)show vlan (B)show running-config (C)show vlan.dat (D)show interface vlan 15.下列属于路由表的产生方式的是()。
1下列哪种类型的网络攻击是利用被入侵的系统中的漏洞在网络中自我传播?B病毒蠕虫特洛伊木马中间人2请参见图示。
有一个FTP 请求数据包需要发往IP 地址为172.16.1.5 的FTP 服务器。
Router1 的S0/0/0 接口收到该请求数据包后,会以何种方式处理?C路由器认定传入数据包与access-list 201 permit ip any any 命令创建的语句匹配,从而允许数据包进入路由器。
因为access-list 101 permit ip any any 命令没有创建任何语句,所以路由器会达到ACL 101 的尾部而找不到匹配的条件,从而丢弃该数据包。
路由器认定传入数据包与access-list 101 permit ip any 172.16.1.0 0.0.0.255 命令创建的语句匹配,从而忽略ACL 101 的其余的语句,允许数据包进入路由器。
路由器会认定传入数据包与命令access-list 201 deny icmp172.16.1.0 0.0.0.255 any 创建的语句匹配,然后继续将该数据包与ACL 201 中剩余的语句比对,以确保后续语句均未禁止FTP,然后路由器将丢弃该数据包。
3管理员正在使用RIPng 和双协议栈技术为一路由器配置IPv6 和IPv4,他在输入IPv4 路由时收到一条错误消息。
可能是什么原因导致出现错误消息?AIPv4 与RIPng 不兼容RIPng 与双协议栈技术不兼容。
路由器接口的地址配置错误。
在同一接口同时配置IPv4 和IPv6 时,所有IPv4 地址均被禁用,以支持新的技术。
4帧中继网络中所用的本地管理接口(LMI) 提供哪两项功能?(选择两项。
)AE流量控制错误通知拥塞通知映射DLCI 至网络地址发送keepalive 数据包以检验PVC 的工作情况5如果不以纯文本格式发送身份验证信息,在Cisco 和非Cisco 路由器之间建立链路连接时,应使用以下哪种第 2 层协议和身份验证的组合?DHDLC 与PAPHDLC 与CHAPPPP 与PAPPPP 与CHAP6服务提供商自何处开始对客户的WAN 连接负责?C本地环路路由器上的DTE 电缆分界点非军事区7请参见图示。
CCNA认证试题一(附答案和解析)中文版一) 认证试题一(附答案和解析)中文版(一CCNA1 2019-09-30 15:49:59 阅读139 评论0 字号:大中小订阅1、目前,我国应用最为广泛的LAN 标准是基于()的以太网标准. (A) IEEE 802.1 (B) IEEE 802.2 (C) IEEE 802.3 (D) IEEE 802.5 答案:C 参考知识点:现有标准:IEEE 802.1 局域网协议高层IEEE 802.2 逻辑链路控制IEEE 802.3 以太网IEEE 802.4 令牌总线IEEE 802.5 令牌环IEEE 802.8 FDDI IEEE 802.11 无线局域网记住IEEE802.1-------IEEE802.5 的定义以太网是一种计算机局域网组网技术IEEE 制定的IEEE 802.3 标准给出了以太。
网的技术标准。
它规定了包括物理层的连线、电信号和介质访问层协议的内容。
以太网是当前应用最普遍的局域网技术。
它很大程度上取代了其他局域网标准,如令牌环、FDDI 和ARCNET。
以太网的标准拓扑结构为总线型拓扑,但目前的快速以太网(100BASE-T、1000BASE-T 标准)为了最大程度的减少冲突,最大程度的提高网络速度和使用效率,使用交换机(Switch)来进行网络连接和组织,这样,以太网的拓扑结构就成了星型,但在逻辑上,以太网仍然使用总线型拓扑的C***A/CD 介质访问控制方法。
电气电子工程师协会或IEEE(Institute of Electrical and Electronics Engineers)是一个国际性的电子技术与信息科学工程师的协会。
建会于1963 年1 月1 日。
总部在美国纽约市。
在150 多个国家中它拥有300 多个地方分会。
目前会员数是36 万。
专业上它有35 个专业学会和两个联合会。
IEEE 发表多种杂志,学报,书籍和每年组织300 多次专业会议。
CCNA集训队综合试卷2 2010.12一、填空题(60*1=60分)1.WWW是____________________的缩写,默认情况下使用的端口号为_________。
2.要查看路由器的接口是DTE还是DCE的命令是:show ________________3.当用ICS双网卡共享上网的时候,共享外网卡时,会把内网卡默认设置成IP:4.路由环路解决方法:, ;毒性逆转/路由中毒; ;5.RIP中路由更新定时器:每隔默认秒,发送完整的路由表拷贝到邻居。
6.从网络拓扑发生变化到网络中所有路由器都知道这个变化的时间就叫7.OSPF中必须用到的主干区域用数字来表示。
8.路由器中不用激活就能使用的接口是______________9.SNMP翻译成中文:ARP翻译成中文:10.MAC地址有位;Ipv4地址位;IPV6地址位。
11.MAC地址翻译成IP地址用协议。
12.OSPF的五种数据包:hello包;;;;13.RIP的管理距离是:OSPF的管理距离:EIGRP的管理距离:14.查看vlan的信息可用命令show ;VLAN的信息保存在,可通过show 查看。
15.交换机工作在层;网桥工作在层;中继器工作在层。
路由器工作在层;Trunking技术是工作在层;16.PT中路由器和电脑相连用线。
(直连线还是交叉线)17.虚拟局域网(VLAN)可以给网络分段,提供灵活性,便于网络管理,最重要的是可以提高网络的性。
18.Trunk中封装VLAN的技术有:802.1Q和(思科特有)。
19.通过一个共有的管理域,维持VLAN配置信息的一致性用的是协议。
20.学校DNS的地址是:;本机回环测试地址是:无锡电信的DNS地址是:21.RG-WALL这是什么东西?22.C类地址的范围是:;B类地址的范围是23.在广播型拓扑结构中,OSPF发送HELLO包的目的地址是:24.OSPF将网络分为四种:PPP,点到多点,,25.OSPF路由器分类主干路由器;自治系统边界路由器(ASBR);26.OSPF中路由器的ID(RID)是如何选举的?先比较,如果就比较27.DR/BDR选举中优先级为0的路由器放弃选举,成为28.一个公司的网络运行的是OSPF,后来收购另一个运行RIP协议的公司,为了使两个公司网络互通,可以采用技术。
2023年CCNA考试真题2023年CCNA考试正式开考啦!本次考试涉及网络技术的基础知识,将对考生的技术水平进行全面考察。
下面是本次考试的真题,希望能够帮助考生更好地复习。
【第一部分:选择题】(共10题,每题2分,共计20分)1. OSI模型中,位于网络层的协议是:A. TCPB. IPC. HTTPD. UDP2. 下面哪个命令可以查看路由表信息:A. pingB. tracertC. ipconfigD. route print3. 在IP地址192.168.0.1/24中,/24表示什么意思:A. 子网掩码B. 路由器IP地址C. 网络IDD. 主机ID4. 下面哪个协议可以实现主机与交换机之间的通信:A. BGPB. ARPC. MPLSD. SNMP5. 下面哪个命令可以查看IP地址的连通性:A. telnetB. netstatC. pingD. tracert6. VLAN是指:A. 虚拟本地区域网络B. 可视化局域网C. 个人局域网D. 无线局域网7. 下面哪个设备可以实现不同局域网之间的互联:A. 集线器B. 路由器C. 交换机D. 网桥8. 下面哪个协议负责在网络中寻找设备的物理地址:A. ARPB. ICMPC. OSPFD. BGP9. 下面哪个命令可以查看交换机的端口信息:A. show ip interface briefB. show mac-address-tableC. show running-configD. show version10. 下面哪个协议可以实现安全的远程登录:A. FTPB. HTTPC. SSHD. Telnet【第二部分:填空题】(共5题,每题4分,共计20分)1. 在OSI模型中,位于物理层的设备是_________。
2. 在TCP/IP协议族中,位于传输层的协议是_________。
3. IP地址由_________位二进制数组成。
ccna考试试题库CCNA(Cisco Certified Network Associate)考试是思科认证网络专家的初级认证,主要测试考生在网络基础、路由、交换、无线和安全等方面的知识。
以下是一些模拟CCNA考试的试题和答案:1. 什么是子网掩码,它有什么作用?答案:子网掩码是一种IP地址的附加信息,用于指定IP地址中网络部分和主机部分的界限。
它的作用是允许路由器区分IP地址中的网络地址和主机地址,从而实现不同网络之间的路由。
2. 描述静态路由和动态路由的区别。
答案:- 静态路由:由网络管理员手动配置的路由信息,不随网络结构的变化而自动调整。
- 动态路由:由路由器根据网络拓扑的变化自动生成和更新的路由信息。
3. 什么是VLAN,它有什么好处?答案: VLAN(虚拟局域网)是一种在交换机上划分不同网络的技术,即使物理上连接在同一交换机上,也可以属于不同的VLAN。
VLAN的好处包括提高安全性、减少广播域、提高网络管理的灵活性等。
4. 简述TCP和UDP的区别。
答案:- TCP(传输控制协议):提供可靠的、面向连接的传输服务,有流量控制和拥塞控制机制。
- UDP(用户数据报协议):提供不可靠的、无连接的传输服务,适用于对实时性要求高的应用。
5. 什么是DHCP,它的作用是什么?答案: DHCP(动态主机配置协议)是一种网络管理协议,用于自动分配IP地址和其他网络配置信息给网络中的设备。
它的作用是简化网络配置,避免IP地址冲突。
6. 什么是NAT,它在网络中扮演什么角色?答案: NAT(网络地址转换)是一种技术,允许多个设备共享一个公共IP地址与互联网通信。
它在网络中扮演的角色是节省IP地址资源,隐藏内部网络结构。
7. 什么是STP(生成树协议)?答案: STP(生成树协议)是一种网络协议,用于在局域网中防止网络环路的产生。
通过创建一个无环的逻辑拓扑,STP确保网络的稳定性和可靠性。
8. 描述OSPF(开放最短路径优先)协议的工作原理。
CCNA认证考试真题(1)TCP/IP Addressing and Protocol1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?A. 255.0.0.0B. 255.255.0.0C. 255.245.255.0D. 255.255.255.0E. 255.255.255.2552: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?A. TCPB. UDPC. IPD. ICMP3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the currentnumber of users. Which subnet mask would best meet your needs?A. 255.255.0.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.1604: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?A. 172.16.12.33/28B. 172.16.12.32/27C. 172.16.12.33/27D. 172.16.12.34/27E. 172.16.12.35/28F. 172.16.12.38/28G. 172.16.12.63/275: The address 172.16.208.16/20 is a host address in which of the following subnets?A. 172.16.176.0–255.255.240.0B. 172.16.192.0–255.255.240.0C. 172.16.208.0–255.255.240.0D. 172.16.224.0–255.255.240.06: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.2487: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?A. One network with 254 hostsB. Two networks with 128 hostsC. Four networks with 64 hostsD. Six networks with 30 hosts8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)A. 201.168.27.33B. 201.168.27.112C. 201.168.27.119D. 201.168.27.126E. 201.168.27.175F. 201.168.27.2089: What is the subnetwork address for a host with the IP address 201.100.5.68/28?A. 201.100.5.0B. 201.100.5.32C. 201.100.5.64D. 201.100.5.65E. 201.100.5.31F. 201.100.5.110: Which of the following protocols uses a three-way handshake mechanism to establish sessions?A. TCPB. IPC. UDPD. IPXE. Frame relay11: Which of the following protocols is connection-oriented?A. TCPB. IPC. IPXD. Frame relay12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?A. TCPB. IPC. UDPD. SPXE. AppleTalk13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.A. MTU adjustmentB. WindowingC. Flexible Send PathD. FCS14: If the destination did not receive a segment, how will the TCP host know to resend the information?A. The ACK received will not include the segment number that was not received.B. The ACK received will include the segment number that was not received.C. The sending host will send a PACK to verify segment receipt.D. The destination host will send a YACK message back to the sending host.15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?A. Class AB. Class BC. Class CD. Class DE. Class E16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)A. 10.23.45.67B. 126.21.34.56C. 172.16.32.1D. 172.31.234.55E. 192.169.4.517: A new network is being designed for your company, Acme,Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?DepartmentNumber of UsersCorporateCustomer SupportFinancialEngineeringA. 255.255.255.0B. 255.255.255.192C. 255.255.255.224D. 255.255.255.240E. 255.255.255.24818: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?A. UDPB. TCPC. SNMPD. ICMP19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)A. MAC address resolutionB. Sequence numbersC. AcknowledgmentsD. PingE. Routing updates20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?A. Increased throughputB. Decreased throughputC. Increased latencyD. Decreased reliability21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.224E. 255.255.255.240F. 255.255.255.24822: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?A. ARPB. RARPC. SLARPD. DHCP23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?A. The host's default gateway is down.B. The destination host is not powered on.C. The IP address of the router interface is incorrect.D. The IP address of the switch to which the destination host connects is incorrect.E. The host is in a different subnet.24: Which of the following classes of IP addresses is utilized for multicasting?A. Class AB. Class BC. Class CD. Class D25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her:A. It represents the number of hosts possible on that subnetwork.B. It represents the number of subnetworks that are being used.C. It represents the class of IP address being used.D. It represents the number of bits in the subnet mask that are 1.26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviatecongestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.224E. 255.255.255.24027: Which of the following would a Class A network be assigned to?A. Government agencyB. Small-to-medium sized corporationC. SOHOD. An individual28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)A. 192.168.5.95B. 192.168.5.100C. 192.168.5.128D. 192.168.5.11029: Which of the following IP addresses is not a public IP address that can be routed over the Internet?A. 2.3.4.5B. 11.12.13.14C. 165.23.224.2D. 172.31.45.34E. 203.33.45.2230: You are given a Class B network. What is the default subnet mask assigned to the Class B network?A. 255.255.255.255B. 255.255.0.0C. 255.224.0.0D. 0.0.0.031: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address?A. Class C addresses cannot be assigned to Ethernet interfaces.B. The /27 is an invalid mask.C. It is a broadcast address.D. It is a public IP address.E. It is a private IP address.32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?A. 255.255.255.254B. 255.255.254.0C. 255.255.240.254D. 255.255.0.033: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of 255.255.255.248?A. 192.168.2.24/192.168.2.31B. 192.168.2.32/192.168.2.39C. 192.168.2.40/192.168.2.47D. 192.168.2.48/192.168.2.55E. 192.168.2.56/192.168.2.6334: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?A. 218B. 219C. 220D. 221E. 22235: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?A. 75B. 83C. 90D. 9736: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?A. 198B. 214C. 252D. 25537: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?A. 182B. 192C. 202D. 21238: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)A. 15.234.118.63B. 92.11.178.93C. 134.178.18.56D. 192.168.16.87E. 201.45.116.159F. 217.63.12.19239: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?A. 62 networks and 2 hostsB. 6 networks and 30 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 16 networks and 14 hosts40: What is a disadvantage of using a connection-oriented protocol such as TCP?A. Packet acknowledgment might add overhead.B. Packets are not tagged with sequence numbers.C. Loss or duplication of data packets is more likely to occur.D. The application layer must assume responsibility for the correct sequencing of the data packets.41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?A. 62 networks and 2 hostsB. 6 networks and 30 hostsC. 8 networks and 32 hostsD. 16 networks and 16 hostsE. 14 networks and 14 hosts42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)A. 165.203.2.0B. 165.203.5.192C. 165.203.6.63D. 165.203.6.191E. 165.203.8.25543: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)B. 192.168.32.112C. 192.168.32.119D. 192.168.32.126E. 192.168.32.175F. 192.168.32.20844: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?A. 198.57.78.33B. 198.57.78.64C. 198.57.78.97D. 198.57.78.97E. 198.57.78.159F. 198.57.78.25445: What is the subnetwork address for a host with IP address 165.100.5.68/28?A. 165.100.5.0C. 165.100.5.64D. 165.100.5.65E. 165.100.5.31F. 165.100.5.146: Your boss wants to know what TCP stands for. What do you tell him?A. Transmission Check ProtocolB. Transport Check ProtocolC. Transmission Control ProtocolD. Transport Control Protocol47: Your boss wants to know what UDP stands for. What do you tell him?A. Unreliable Data ProtocolB. Unreliable Data ProgramC. User-Defined ProtocolD. User Datagram Protocol48: Which of the following statements accurately describesUDP?A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP).49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)A. 10.20.12.64B. 172.16.32.129C. 172.64.32.34D. 192.168.23.252E. 196.104.12.95F. 214.192.48.25450: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)A. Assign a public IP address.B. Use the shutdown command.C. Use the no shutdown command.D. Make sure the interface is running in full-duplex.(2)Basic IOS Configuration1: In which of the following modes in Cisco's IOS can you issue show commands? (Choose two.)A. UserB. PrivilegedC. Line ConfigurationD. Global Configuration2: Yo u are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose two.)A. FTPB. TFTPC. SQLD. Oracle3: You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?A. pingB. IPConfigC. tracerouteD. Show interface Ethernet 04: Which command would you use at the CLI in User mode to enter Privileged EXEC mode?A. PrivilegeB. AdminC. EnableD. Disable5: You have just received 14 Catalyst switches for your network. You would like to install these switches into your productionnetwork to provide separate collision domains for each of the connected devices. What configuration is required to provide this functionality?A. No configuration is required.B. You must set up an IP address on the switch.C. You must configure unique VLANs on the switches.D. You must install the Cisco IOS.6: Which of the following prompts indicates your router is in Privileged EXEC mode?A. Router>B. Router#C. Router&D. Router$7: You have made a console connection to your Cisco Catalyst switch and you see the > symbol in HyperTerminal. What does it mean?A. You are in Privileged EXEC mode.B. You are in User EXEC mode.C. The switch has not been configured.D. The switch is in need of repairs.8: You would like to assign a meaningful name to your Catalyst switch. What command should you use?A. enableB. host nameC. hostnameD. name9: You need to assign an IP address to your Catalyst 2950 switch. You are at the HQ_SW1> prompt. What is the correct series of commands? (cr = carriage return)A. enable ip address 10.1.1.1B. enable ip address 10.1.1.1 255.255.255.0C. enable configure terminal ip address 10.1.1.1 255.255.255.0D. enable configure terminal interface vlan 1 ip address10.1.1.1 255.255.255.010: Which of the following commands displays the syntax for the clock command?A. cl?B. clock?C. clock ?D. cl ?11: Which of the following commands allows you to configure a welcoming message whenever you log in to a router?A. Router(config)# banner messageB. Router(config)# banner motd &C. Router# banner motd #D. Router# banner message !12: You need to connect to your 2621XM router to configure an interface. Which of the following methods allows you to connect to and issue commands on the router? (Choose three.)A. TelnetB. FTPC. Console connectionD. AUX connection13: You want to prevent unauthorized users from plugging their laptops into the router. What type of password helps prevent this issue?A. vtyB. InterfaceC. ConsoleD. Enable14: You have connected to the console port and are running HyperTerminal. You see only scrambled characters and symbols. What is the most likely solution to this problem?A. Change the connectors.B. Use a different Terminal program.C. Reset the router.D. Adjust the baud rate of your COM port.[View full size image]15: Which of the following commands would you type to receive this output shown in the figure above?A. Show running-configB. Show startup-configC. Show ip routeD. Show version16: You are configuring a router named East for authentication with a router named West using CHAP. What username should youconfigure on East to allow the routers to communicate?A. EastB. WestC. SouthD. North17: What is the default point-to-point encapsulation protocol used on a Cisco router?A. PPPB. SLIPC. HDLCD. ATM18: What type of handshake occurs with CHAP authentication?A. One-wayB. Two-wayC. Three-wayD. Mutual19: You have connected to your Cisco router through a Telnet connection. To test one of your connections, you use a debug ippacket command. Even though you are sure traffic is passing through your router, nothing is reported in your terminal window. What is the most likely cause of this problem?A. There is no debug ip packet command.B. You need to type in the terminal monitor command to see debug output from a Telnet session.C. This command displays information only if the interface experiences trouble. No output indicates that the interface is fine.D. Cisco routers do not allow you to enable debug commands remotely due to security restrictions.[View full size image]20: Which of the following commands would you type to see this output on your Cisco router shown in the previous figure?A. Show versionB. Show running-configC. Show startup-configD. Show router setup21: Which of the following commands would you type to see this output shown in the figure above?A. Show interface Ethernet 0/0B. Show ip interface detailC. Show interface Serial 0/1D. Show ip interface brief22: Your routers at ACME, Inc., are having some connectivity issues. You issue show commands for each connecting router's interface. Why are they unable to communicate (see figures above)?A. Incorrect IP addressB. Wrong routing protocolC. Bad cableD. Encapsulation mismatch23: You need to back up the configurations you just made, but no TFTP servers are available. Which of the following commands are options to back up your currently running configuration? (Choose two.)A. Router1#copy running-config startup-configB. Router1#copy running-config flashC. Router1#copy startup-config running-configD. Router1#copy running-config http24: You are consulting a small business that is establishing itsfirst WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose three.)A. Frame relayB. EthernetC. Token ringD. PPPE. HDLC25: Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if he or she happens to view a configuration on your router. What command encrypts all passwords on your router?A. Router1#service password-encryptionB. Router1(config)#service password-encryptionC. Router1#enable secret passwordD. Router1(config)#enable secret password26: You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?A. Acme1(config)# line console 0Acme1(config-line)# password acmeAcme1(config-line)# loginB. Acme1(config)# line vty 0Acme1(config-line)# enable password acmeC. Acme1(config)# line vty 0Acme1(config-line)# enable secret acmeAcme1(config-line)# loginD. Acme1(config)# line vty 0Acme1(config-line)# password acmeAcme1(config-line)# login27: When you are setting up your serial interfaces, what does the clockrate command do for your connection?A. Establishes the timing at which you send dataB. Establishes keepalivesC. Establishes the advertised bandwidthD. Establishes the time on the router28: You need to set up passwords on all your default Telnet lines. What command would you start with?A. Router1(config)#telnet configurationB. Router1(config)#interface Ethernet 0/1C. Router1(config)#line vty 1 5D. Router1(config)#line vty 0 429: You can execute show commands at which prompt? (Choose two.)A. Router1#B. Router1(config)#C. Router1(config-router)#D. Router1>E. romon1>30: You are configuring your router and type in an Enable password and an Enable Secret password. Your fellow network technician asks you why you have two passwords set when you need only one. What do you tell him?A. The Enable password is used by low-level applications.B. If you reverted to an older version of the IOS, it would not understand the Secret password.C. Both passwords are treated the same.D. It is a failsafe method of ensuring that people need to type two passwords instead of just one.31: You need to get back to Privileged EXEC mode from Interface Configuration mode. What is the quickest method?A. Ctrl+Shift+6; then press XB. Ctrl+EscC. Ctrl+ZD. Type exit32: When you are establishing a PPP link, which of the following would be negotiated? (Choose three.)A. IPCPB. CHAPC. UDPD. Q.931E. Multilink Protocol33: Which of the following commands returns your router to a previously saved configuration?A. Router1#setupB. Router1#copy running-config startup-configC. Router1#copy startup-config running-configD. Router1#reload34: You are in Interface Configuration mode and would like to recall the last command you typed, move your cursor to the beginning of the command line, and type no before the recalled command. You notice your up- and down-arrow keys do not function because you are using an older terminal program. What command combinations could you use to recall the previous command and move your cursor to the beginning of the line?Press Ctrl+P to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+L to recall the previous command and Ctrl+B to move to the beginning of the command line.Press Ctrl+D to recall the previous command and Ctrl+A to move to the beginning of the command line.Press Ctrl+E to recall the previous command and Ctrl+A to move to the beginning of the command line.35: What is the baud rate setting for your terminal emulation program so that you can communicate through your console port?A. 2400B. 9600C. 14400D. 3630036: What must be configured on a Cisco device to enable Telnet functionality?A. A management IP addressB. SNMPC. CDPD. vty ports37: You are configuring your Cisco router and need to go back to User EXEC mode. What command takes you back to User EXEC mode?A. Router1#enableB. Router1#exitC. Router1#configure terminalD. Router1#disable38: Which of the following commands places an IP address on your Catalyst switch?A. Switch1#ip address 10.2.2.2 255.255.255.0B. Switch1(config)#Set IP 10.2.2.2 255.255.255.0C. Switch1(config-vlan)#ip address 10.2.2.2D. Switch1(config-vlan)#ip address 10.2.2.2 255.255.255.039: Which of the following commands would you enter to receive this output shown in the figure above?A. Router1#show NVRAMB. Router1#show FlashC. Router1#show Flash-MemD. Router1#show V ersion40: Your senior network administrator is unable to telnet to a Catalyst switch because she forgot the IP address. You have physical access and are able to console in. Which of the following commands is the best to get the IP address on the switch?A. Switch1#show ipB. Switch1#show vlan 1C. Switch1#show ip routeD. Switch1#show interface vlan141: You have powered up your Cisco 3640 router. The first thing you see is this output. Which of the following statements about this screen is accurate (see figure above)?A. Your IOS is corrupt and unable to load.B. Your configuration is missing parameters.C. You do not have a configuration saved in NVRAM.D. You have typed setup in the Privileged mode.42: You type in a command and are shown the following output:% Ambiguous command: "show con"What does this mean?A. You did not enter enough characters for your device to recognize the command.B. You did not enter all the keywords or values required by this command.C. You entered the command incorrectly.D. Context-sensitive help is unable to helbreak.B. The router truncates the command because commands longer than one line are not allowed.C. The router automatically scrolls the line to the left and uses a dollar sign ($) to indicate that there is text to the left of the $.D. The router shortens all the commands to squeeze thecommand on to the screen.44: You want to change the size of the command history buffer. Which of the following commands will set it permanently to 100?A. Router1#terminal history 100B. Router1#history size 100C. Router1(config)#terminal history 100D. Router1(config-line)#history size 10045: You have configured a description on your serial interfaces. Which of the following commands displays the description? (Choose two.)A. Show running-configB. Show flashC. Show interfacesD. Show ip protocols46: You are typing commands into your Cisco IOS on your 3640 router. However, your typing is consistently interrupted by console messages, forcing you to retype. Which of the following commands forces the IOS to retype your original input after it displays the console message?A. Exec-timeoutB. Logging synchronousC. Line consoleD. Exec message readout47: You are configuring a router and issue the command interface ethernet 1/0/0. What do the numbers represent?A. Slot/port/interfaceB. Slot/interface/portC. Port/slot/port numberD. Slot/port adapter/port number48: Which of the following commands correctly sets the physical speed of a serial interface to 64Kbps?A. Router1(config-if)#bandwidth 64B. Router1(config-if)#bandwidth 64000C. Router1(config-if)#clockrate 64D. Router1(config-if)#clockrate 6400049: In what mode do you use the encapsulation command?A. Interface Configuration modeB. Sub-interface Configuration modeC. User modeD. Privileged mode50: You are configuring your router, and your boss happens to look over your shoulder as you type a show running-config command. She sees one of the lines that says password 7 14361F009A056E7D and asks what this means. What do you tell her?A. It is the actual password.B. It is the result of a service password-encryption command.C. The console output made a mistake.D. It is the result of an enable secret command.。
CCNA考试题一、选择题(每题5分)1、具有第 3 层功能的以太网交换机有哪两项关键功能?(选择两项。
)()A、第 3 层路由功能B、网络地址转换(NA T)C、与远程网络和设备建立远程访问连接D、广播流量管理和组播流量管理E、采用边界网关协议(BGP) 进行自治系统(AS) 间路由2、第 2 层以太网交换机有哪三项功能?(选择三项。
)()A、防止广播B、增大每名用户可用的带宽C、减小冲突域的大小D、在网段间隔离流量E、在不同的网络间路由流量F、减少广播域的数量3、分层网络设计模型中的哪一层称为互连网络的高速主干层,其中高可用性和冗余性是该层的关键?()A、接入层B、分布层C、网络层D、核心层E、工作组层F、 W AN 层4、分层网络设计模型中的哪一层提供了将设备接入网络的途径并控制允许那些设备通过网络进行通信?()A、应用层B、接入层C、分布层D、网络层E、核心层5、在处于不同的VLAN 中的设备间配置通信需要使用OSI 模型中的哪个层?()A、第 1 层B、第 3 层C、第 4 层D、第 5 层6、推荐同时在核心层和分布层采用哪种分层设计特征以在发生路由故障时保护网络?()A、交换B、冗余C、聚合D、访问列表7、为支持客户端关联过程,802.11 标准中指定了哪两种身份验证方法?(选择两项。
)()A、轻型可扩展身份验证协议(EAP)B、共享密钥C、高级加密标准(AES)D、临时密钥完整性协议(TKIP)E、开放式身份验证8、传统路由与单臂路由器有何区别?()A、传统路由只能使用单个交换机接口。
单臂路由器可使用多个交换机接口。
()B、单臂路由器使用子接口将多个逻辑网络连接到单个路由器端口。
传统路由在每个逻辑网络中使用一个端口。
C、传统路由使用路由协议来向其它路由器更新路由。
单臂路由器仅将数据路由到直连网络。
D、单臂路由器不提供多个连接,因此消除了使用STP的需要。
传统路由使用通向路由器的多条路径,因此需要STP。
复习提纲:
1、路由产生的方式直链路由、静态路由、动态路由
2、管理距离
3、rip \eigrp\ospf的基本特点、所使用的组播地址
4、RIP更新周期,RIP路由协议采用UDP的端口、rip协议避免路由环路的方法,
5、Enable password和enable secret命令的作用?
6、running-config、startup-config文件的是什么?
7、ospf的配置;route-id 确定原则;DR选举的原则;域内路由、域间路由、域外路由的概念;ospf汇总的种类;ospf的网络类型;ospf 的度量值(比如以太)、理解ospf的特殊区域
8.什么是后继和可行后继?如何通过RD和FD理解可行性条件?9.PPP的两种认证的特点?
10、NAT的类型与差别是什么?查看及其清除Nat 映射表
11、acl的种类,及其功能
12、ipv6地址分类及其配置命令
13、路由重分布的命令(metric等参数)、ospf
14、路由器配置寄存器
选择题例题
1、255.255.0.0是哪类地址的默认掩码?
A、B
B、A
C、 C
D、E
2、基于距离矢量算法的路由协议是:()
A、ICMP
B、EIGRP
C、OSPF
D、IS-IS
3、OSPF路由协议的度量标准是:
A、带宽
B、延迟
C、开销(cost)
D、可靠性
5、路由器工作在OSI的第几层?
A、3
B、2
C、4
D、5
6、可以解决路由环路问题的解决方法是:()
A、采用水平分割
B、加快路由更新报文的发送频率
C、重分布
D、配置静态路由
7、下列选择中哪个是表示路由器的快速以太网口:
A、console 0
B、s0/0
C、f0/0
D、e0
8、用来检查到一台主机的网络层是否连通命令是()
A、 Ip Router
B、 PING和TRACERT
C、 TELNET
D、 IPCONFIG
9、路由器提示为:Router(config)#,问现在是处在什么模式?
A、全局配置模式
B、特权用户模式
C、普通用户模式
D、接口模式
10、计算机和交换机的以太口直接连接用什么网络线?
A、直通线
B、反转线
C、交叉线
D、串口线
11、第一次对路由器进行配置时,采用哪种配置方式:()
A、通过CONSOLE口配置
B、通过拨号远程配置
C、通过TELNET方式配置
D、通过哑终端配置
12、作为一个网络维护人员,对于OSPF区域体系结构的原则必须有清楚的了解,下面的论述表达正确的是:()
A 、所有的OSPF区域必须通过域边界路由器与区域0相连,或采用OSPF虚链路。
B、单个区域不能包含没有物理链路的两个区域边界路由器。
C、虚链路可以穿越stub区域。
13、静态路由的缺点是____。
A、不适合小型网络
B、占用CPU资源大
C、当拓扑发生变化时,管理员需要手工改路由信息。
D、在小型局域网内,很容易暴露网络拓扑结构.
14、逆向地址解析协议(Inverse ARP)在帧中继网络的主要功能是:
()
A、通过网络设备的网络地址查找到设备的硬件地址
B、查找连接的DLCI编号
C 、在帧中继网络中查找虚电路连接的对端设备的协议地址
D 、在帧中继网络中生成对端协议地址与DLCI的映射
15、ospf路由协议的管理距离是:
A、110
B、120
C、115
D、100
16、路由器中的操作系统,常常缩写为:
A、OS
B、DOS
C、ISO
D、IOS
17、RIP路由协议的度量标准是:
A、带宽
B、延迟
C、跳数
D、可靠性
18、改变路由器主机名的命令:
A、Host
B、 username
C、login
D、hostname
19、PPP 的CHAP 认证采用了什么加密算法()
A、MD5
B、DES
C、RSA
D、SHA
20. 对于192.168.0.1/22 网段,用反掩码来表示为()
A、192.168.0.1 255.255.252.0
B、192.168.0.1 0.0.3.255
C、192.168.0.1 255.255.255.0
D、192.168.0.1 0.0.0.255
21、在cisco路由器上查看当前配置命令为()
A、show running-configuration
B、show current-configuration
C、display current-configuration
D、display configuration
22、访问控制列表的种类利用数字来标识,其中1-99 表示()
A、基于接口的访问控制列表
B、标准访问控制列表
C、扩展访问控制列表
D、基于MAC 地址的访问控制列表
23、30 位掩码网段,正确的反掩码是()
A、0.0.0.3
B、0.0.0.7
C、255.255.255.252
D、255.255.255.248
24、以下情况可以使用访问控制列表准确描述的是:()
A、禁止所有使用Telnet的用户访问我的主机
B、禁止使用UNIX系统的用户访问我的主机
C、禁止有CIH病毒的文件到我的主机
D、只允许系统管理员可以访问我的主机
25、在rip中metric等于()为不可达
A、8
B、10
C、15
D、16
26、标准访问控制列表以()作为判别条件
A、数据包的大小
B、数据包的源地址
C、数据包的端口号
D、数据包的目的地址
27、下面哪一个不是CISCO的认证?
A、CIW
B、CCNA
C、CCIE
D、CCNP
28、配置从普通用户模式进入特权用户模式的密码,命令是:password ******
enable password ******
enable ******
login password ******
29、RIP 每隔多长时间就会发送自己的信息? _______
A:30s B:60s C:90s D:120s
10、eigrp 路由协议的管理距离是:
A、110
B、120
C、115
D、90
30、RIP协议引入路由保持机制的作用是( )
A. 节省网络带宽
B. 防止网络中形成路由环路
C. 将路由不可达信息在全网扩散
D. 通知邻居路由器哪些路由是从其他处得到
31、以下内容哪些是路由表信息中所不包含的()。
A、目标网络
B、源地址
C、路由权值 D 、下一跳
32、路由重分布时,那种路由必须有subnet参数才能重分布成功( ).
A、rip
B、eigrp
C、ospf
D、静态路由。