CCNA第三学期英文答案chapter2
- 格式:doc
- 大小:570.00 KB
- 文档页数:9
CCNA中英对照题库(0-10.pdfCCNA (200-120)题库中英对照整理于:2015 年 3 月 31 日版本:1.2 声明:本题库来源互联网(鸿鹄论坛)本题库为英文考试原版左右选择题中文考试为随机抽取英文题的中译版此题库非中文考试题库,而是英文题库手动翻译此题库为手工个人翻译,存在错误和不妥难免,不代表任何官方机构和组织本题库旨在更好的理解英文原本题库,也可以用于中文考试参考用。
如发现任何错误或不当之处,可以自行修改,但请更新版本以免混乱,也可致上传者。
QUESTION 001 Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.) 参照下图,这个图示显示了R1接受到如图所示数据帧的时候会怎么做? A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965. R1会剥离源MAC地址,以 0000:0C36.6965 代替。
B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1. R1会剥离源 IP 地址,1/ 10以 192.168.40.1 代替。
C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320. R1会剥离源MAC地址,以 0000:0C36.6965 代替。
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1. R1会剥离目的 IP 地址,以 192.168.40.1 代替。
yy1 ・ Refer to the exhibit・ Identify the devices labeled A, B, C, and D in the network physical documentation. 匚A=bridge, B=switch, C=router, D=hubK A=bridge, B=hub, C=router, D=switchC A=bridge, B=router, C=hub, D=switchc A=hub, B=bridge, C=router, D=switch2 The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented?匚busE starC ring匚mesh3. A switch has failed in the network. As a result, only one segment of the network is down. Which type of physical network topology is implemented?C busC ring匚starE extended star4. Which three features apply to LAN connections? (Choose three.)厂operate using serial in terfacesV make network connection using a hubV limited to operation over small geographic areas厂 provide part-time connectivity to remote servicesV typically operate under local administrative control厂provide lower bandwidth services compared to WANs5. What is one advantage of defining network communication by the seven layers of the OSI model? 【:It in creases the ban dwidth of a n etwork.E It makes networking easier to learn and understand・It eliminates many protocol restrictions.匚It increases the throughput of a network.c It reduces the need for testing network connectivity.6. What makes it easier for different networking vendors to design software and hardware that willin teroperate?E OSI modelc proprietary desig ns匚IP addressing schemec standard logical topologies匚standard physical topologies7. Which term describes the process of adding headers to data as it moves down OSI layers?匚division匚encoding匚separation匚segmentationE encapsulation8. What is the term used to describe the transport layer protocol data unit?匚bits c packetsE segments匚framesc data streams9. Which of the following are layers of the TCP/IP model? (Choose three.)▽ Applicati onr PhysicalV Internet0 Network Access厂Prese ntation10. Which of the following are data link layer encapsulation details? (Choose two.)0 A header and trailer are added・厂Data is con verted into packets ・V Packets are packaged into frames・厂Frames are divided into segments.厂Packets are changed into bits for Internet travel.11. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs?匚data link匚transport匚n etworkE application12. Which two features apply to WAN connections? (Choose two.)V operate using serial interfacesP make network connection using a hub厂limited to operation over small geographic areasI- typically operate under local administrative control▽provide lower bandwidth services compared to LANs13. Which of the following are ways that bandwidth is commonly measured? (Choose three.)厂GHzps▽kbpsV Mbps厂Nbps厂MHzpsV Gbps14. Refer to the following list. Choose the correct order of data encapsulation when a device sends information. segments bits packetsdata frames匚1 -3-5-4-2C 2- 1-3-5-4C 2-4-3-5-1匚4-3-1-2-5E 4-1 -3-5-2C 3-5-1-2-415. Which of the following are factors that determine throughput? (Choose two.)厂types of passwords used on servers厂type of Layer 3 protocol usedV n etwork topologywidth of the network cable0 number of users on the network16. Refer to the exhibit・ Which column shows the correct sequenee of OSI model layers?E D17. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?c physical layer匚data link layerE network layer匚transport layer18. Which best describes the function of the physical layer?E Defines the electrical and functional specifications for the link between end systems・匚Provides reliable transit of data across a physical link.匚Provides connectivity and path selection between two end systems・匚Concerned with physical addressing, network topology and media access.。
1下列有关在交换机上发出的 banner login "Authorized personnel Only" 命令的说法中哪项正确?Option 2该命令应在特权执行模式下输入。
该命令会导致用户登录前显示 Authorized personnel Only 消息。
该命令会生成并显示错误消息 % Ambiguous command: "banner motd" ”。
将该命令输入交换机后,屏幕上会显示 End with the character “%”消息。
2哪种命令行界面 (CLI) 模式允许用户配置诸如主机名和口令等交换机参数?Option 3用户执行模式特权执行模式全局配置模式接口配置模式3网络管理员通过 CLI 输入一个命令,该命令需要几个参数。
交换机的响应为 "% Incomplete command"。
管理员不记得缺失了什么参数。
管理员可通过什么方法在线代理|网页代理|代理网页|来获取参数信息?Option 2向最后一个参数末尾附加一个问号 (?)向最后一个参数末尾附加一个空格,然后附加一个问号 (?)按 Ctrl-P 显示参数列表按 Tab 键显示可用的选项4请参见图示。
图中显示了 show running-config 命令的部分输出。
此交换机的使能口令是 "cisco"。
从图中所示的输出可得出什么结论?Option 3默认情况下会加密使能口令。
所有加密口令均采用 MD5 哈希算法加密。
在此配置中,已配置的所有线路模式口令都会被加密。
此行代表最安全的特权执行模式口令。
在线代理|网页代理|代理网页|5采用 CSMA/CD 的网络中发生冲突时,需要传输数据的主机在回退时间到期后做何反应?Option 1主机恢复传输前侦听模式。
造成冲突的主机优先发送数据。
造成冲突的主机重新传输最后 16 个帧。
主机延长其延迟时间以便快速传输。
CCNA学习指南第2章复习题中英文翻译版1. What are the decimal and hexadecimal equivalents of the binary number 10011101?(Choose two.)1. 二进制数10011101等效的十进制和十六进制数分别是多少?(选择两项。
)A. 159B. 157C. 185D. 0x9DE. 0xD9F. 0x1592. Which of the following allows a router to respond to an ARP request that is intended for a remote host?2. 下列哪一项允许路由器对远端主机的ARP请求做出响应?A. Gateway DP网关DPB. Reverse ARP (RARP)反向ARPC. Proxy ARP代理ARPD. Inverse ARP逆向ARPE. Address Resolution Protocol (ARP)地址解析协议3. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?3. 你想实现自动IP配置,包括IP地址,子网掩码,默认网关和DNS信息。
你应该使用什么协议来完成这?A. SMTP简单邮件传输协议B. SNMP简单网络管理协议C. DHCP动态主机控制协议D. ARP地址解析协议4. What protocol is used to find the hardware address of a local device?4. 什么协议用来找本地设备的硬件地址?A. RARPB. ARPC. IPD. ICMPE. BootP5. Which of the following are layers in the TCP/IP model? (Choose three.)5. 下列哪些层属于TCP/IP模型?(选择三项。
假设没有使用 VLSM,添加 ip route 172.16.64.0 255.255.240.0 serial0/0 命令会对网络中正在工作的路由器造成什么影响?3目的地址处于 172.16.64.1 到 172.16.80.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.64.1 到 172.16.255.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.64.1 到 172.16.79.254 之间的所有数据包都会通过serial0/0 转发出去。
目的地址处于 172.16.0.1 到 172.16.64.254 之间的所有数据包都会通过serial0/0 转发出去。
2请参见图示。
管理员正在向网络中添加新路由器。
IP 地址 192.168.13.6/30 已被分配给 R2 上的相连串行接口。
管理员必须为新路由器的串行接口分配什么IP 地址?2192.168.13.4/30192.168.13.5/30192.168.13.7/30192.168.13.58/30192.168.13.61/27192.168.13.63/273OSPF 路由协议身份验证使用 MD5 验证时,下列有关密钥的说法中哪两项正确?(选择两项。
)24密钥以明文形式在路由器之间传递。
密钥用于帮助生成验证用的加密数字。
密钥以加密形式在路由器之间传递。
密钥永远不会在网络上传输。
数据包嗅探器可以捕获密钥。
4请参见图示。
路由表中将显示哪些路由?1R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/05请参见图示。
武汉微博教育整理分享—计算机英语第三版课后答案(二)课后答案Unit 4 Computer Language and ProgrammingSection A I.Fill in the blanks with the information given in the text:1.artificial; instructions2.low-level; high-level3.low-level4.Machine5.functional; logic6.Statement7.Module8.digitalII.Translate the following terms or phrases from English into Chinese andvice versa:1.storage register 存储寄存器2.function statement 函数语句3.program statement 程序语句4.object-oriented language 面向对象语言5.assembly language 汇编语言6.intermediate language 中间语言,中级语言7.relational language 关系(型)语言8.artificial language 人造语言9.data declaration 数据声明10.SQL 结构化查询语言11.executable program 可执行程序12.program module 程序模块13.conditional statement 条件语句14.assignment statemen t赋值语句15.logic language 逻辑语言16.machine language 机器语言17.functional language 函数式语言18.programming language 程序设计语言19.run a computer program 运行计算机程序20.computer programme r 计算机程序设计员III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:A programming language is a language used to write instructions for the computer. It lets the programmer express data processing in a symbolic manner without regard to machine-specific details.The difficulty of writing programs in the machine language of 0s and 1s led first to the development of assembly language, which allows programmers to use mnemonics for instructions and symbols for variables. Such programs are then translated by a program known as an assembler into the binary encoding used by the computer. Other pieces of system software known as linking loaders combine pieces of assembled code and load them into the machine’s main memory unit, where they are then ready for execution. The concept of linking separate pieces of code was important, since it allowed “libraries” of programs to be built up to carry out common tasks—a first step toward the increasingly emphasized notion of software reuse. Assembly language was found to be sufficiently inconvenient that higher-level languages (closer to natural languages) were invented in the 1950s for easier, faster programming; along with them came the need for compilers, programs that translate high-level language programs into machine code. As programming languages became more powerful and abstract, building efficient compilers that createhigh-quality code in terms of execution speed and storage consumption became an interesting computer science problem in itself.IV.Translate the following passage from English into Chinese.One especially powerful feature of OOP (object-oriented programming) languages is a property which is known as inheritance. Inheritance allows an object to take on the characteristics and functions of other objects to which it is functionally connected. Programmers connect objects by grouping them together in different classes and by grouping the classes into hierarchies. These classes and hierarchies allow programmers to define the characteristics and functions of objects without needing to repeat source code, the coded instructions in a program. Thus, using OOP languages can greatly reduce the time it takes for a programmer to write an application, and also reduce the size of the program. OOP languages are flexible and adaptable, so programs or parts of programs can be used for more than one task. Programs written with OOP languages are generally shorter in length and contain fewer bugs (缺陷), ormistakes, than those written with non-OOP languages.面向对象程序设计语言的一个特别强大的功能,是称为继承的特性。
1. Refer to the exhibit. What could bepossible causes for the "Serial0/0 is down"interfacestatus? (Choosetwo.)A. A Layer 1 problem exists.B. The bandwidth is set too low.C. A protocol mismatch exists.D. An incorrect cable is being used.E. There is an incorrect IP address on the Serial 0/0 interface.Answer: AD2. Before installing a new, upgraded version of the IOS, what should be checked on the router, andwhichcommand should be used to gather this information? (Choose two.)A. the amount of available ROMB. the amount of available flash and RAM memoryC. the version of the bootstrap software present on the routerD. show versionE. show processesF. show running-configAnswer: BD3. Refer to the exhibit. Which two statements are true about interVLAN routing in the topologythat is shownin the exhibit? (Choose two.)中国思科华为3COM 网络技术发布A. Host E and host F use the same IP gateway address.B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and hostD.D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using thesameencapsulation type.Answer: DF4. Refer to the exhibit. Which two statements are true about the loopback address that isconfigured onRouterB? (Choose two.)A. It ensures that data will be forwarded by RouterB.B. It provides stability for the OSPF process on RouterB.中国思科华为3COM 网络技术发布C. It specifies that the router ID for RouterB should be 10.0.0.1.D. It decreases the metric for routes that are advertised from RouterB.E. It indicates that RouterB should be elected the DR for the LAN.Answer: BC5. A network administrator is explaining VTP configuration to a new technician. What should thenetworkadministrator tell the new technician about VTP configuration? (Choose three.)A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higherVTPrevision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.Answer: ABD6. Which two locations can be configured as a source for the IOS image in the boot system command?(Choose two.)A. RAMB. NVRAMC. flash memoryD. HTTP serverE. TFTP serverF. TelnetserverAnswer: CE7. What are two reasons a network administrator would use CDP? (Choose two.)A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routersAnswer: DE中国思科华为3COM 网络技术发布8. Refer to the exhibit. Both switches are using a default configuration. Which two destinationaddresses willhost 4 use to send data to host 1? (Choose two.)A. the IP address of host 1B. the IP address of host 4C. the MAC address of host 1D. the MAC address of host 4E. the MAC address of the Fa0/0 interface of the R1 routerF. the MAC address of the Fa0/1 interface of the R1 routerAnswer: AF9. Refer to the exhibit. The router has been configured with these commands:hostname Gatewayinterface FastEthernet 0/0ip address 198.133.219.14 255.255.255.248no shutdowninterface FastEthernet 0/1ip address 192.168.10.254 255.255.255.0no shutdowninterface Serial 0/0ip address 64.100.0.2 255.255.255.252no shutdownip route 0.0.0.0 0.0.0.0 64.100.0.1What are the two results of this configuration? (Choose two.)中国思科华为3COM 网络技术发布A. The default route should have a next hop address of 64.100.0.3.B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.C. The address of the subnet segment with the WWW server will support seven more servers.D. The addressing scheme allows users on the Internet to access the WWW server.E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internetwithoutaddress translation.Answer: DE10. A company is installing IP phones. The phones and office computers connect to the same device.Toensure maximum throughput for the phone data, the company needs to make sure that the phonetraffic ison a different network from that of the office computer data traffic. What is the best networkdevice to whichto directly connect the phones and computers, and what technology should be implemented on thisdevice?(Choose two.)A. hubB. routerC. switchD. STPE. subinterfacesF. VLANAnswer: CF11. What are two benefits of using VTP in a switching environment? (Choose two.)中国思科华为3COM 网络技术发布A. It allows switches to read frame tags.B. It allows ports to be assigned to VLANs automatically.C. It maintains VLAN consistency across a switched network.D. It allows frames from multiple VLANs to use a single interface.E. It allows VLAN information to be automatically propagated throughout the switching environment.Answer: CE12. Which two statements are true about the command ip route172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.)A. It establishes a static route to the 172.16.3.0 network.B. It establishes a static route to the 192.168.2.0 network.C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0network.D. It configures the router to send any traffic for an unknown destination out the interface withthe address192.168.2.4.E. It uses the default administrative distance.F. It is a route that would be used last if other routes to the same destination exist.Answer: AE13. What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)A. decreasing the number of collision domainsB. filtering frames based on MAC addressesC. allowing simultaneous frame transmissionsD. increasing the size of broadcast domainsE. increasing the maximum length of UTP cabling between devicesAnswer: BC14. Refer to the exhibit. A network associate needs to configure the switches and router in thegraphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which twoEthernet segments would need to be configured as trunk links? (Choose two.)中国思科华为3COM 网络技术发布A. AB. BC. CD. DE. EF. FAnswer: CF15. Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)A. amount of RAMB. bridge priorityC. IOS versionD. IP addressE. MAC addressF. speed of the linksAnswer: BE16. Refer to the exhibit. Assume that the routing protocol referenced in each choice below isconfigured withits default settings and the given routing protocol is running onall the routers. Which twoconditionalstatements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0for therouting protocol mentioned? (Choose two.)中国思科华为3COM 网络技术发布A. If OSPF is the routing protocol, the path will be from R1 to R3to R4 to R5.B. If OSPF is the routing protocol, the path will be from R1 to R2to R5.C. If OSPF is the routing protocol, the path will be from R1 to R5.D. If RIPv2 is the routing protocol, the path will be from R1 to R3to R4 to R5.E. If RIPv2 is the routing protocol, the path will be from R1 to R5.Answer: AE17. Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which threevaluescould be used for the configuration of these hosts? (Choose three.)A. host A IP address: 192.168.1.79。
1.Which two statements describe the benefits of VLANs? (Choose two.)VLANs improve network performance by regulating flow control and window size.VLANs enable switches to route packets to remote networks via VLAN ID filtering.VLANs reduce network cost by reducing the number of physical ports required on switches.VLANs improve network security by isolating users that have access to sensitive data andapplications.VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms2.What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)VLAN1 should renamed.VLAN 1 is the management VLAN.All switch ports are members of VLAN1.Only switch port 0/1 is assigned to VLAN1.Links between switches must be members of VLAN13.Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if theneighboring interface is configured in nonegotiate mode.Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration of the configuration on the neighboring interface4.Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and computer 4 will a VLAN ID tag be included with the frame?AA, BA, B, D, GA, D, FC, EC, E, F5.The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two statements are true concerning VLAN configuration? (Choose two.)The VLANs may be named.VLAN information is saved in the startup configuration.Non-default VLANs created manually must use the extended range VLAN numbers.The network administrator may create the VLANs in either global configuration mode or VLAN database mode.Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations6.Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the outputshown? (Choose two.)The network administrator configured VLANs 1002-1005.The VLANs are in the active state and are in the process of negotiating configuration parameters.A FDDI trunk has been configured on this switch.The command switchport access vlan 20 was entered in interface configuration mode for FastEthernet interface 0/1.Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to portsfa0/9 through fa0/12 without the use of a Layer 3 device7.What happens to the member ports of a VLAN when the VLAN is deleted?The ports cannot communicate with other ports.The ports default back to the management VLAN.The ports automatically become a part of VLAN1.The ports remain a part of that VLAN until the switch is rebooted. They then become members ofthe management VLAN.8.A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1 command,received. Why did this command generate an error?VLAN 1 can never be deleted.VLAN 1 can only be deleted by deleting the vlan.dat file.VLAN 1 can not be deleted until all ports have been removed from it.VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities9.What is the effect of the switchport mode dynamic desirable command?DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and b up as needed.A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switctrunk commands.10.Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?Cisco switches only support the ISL trunking protocol.The trunk cannot be negotiated with both ends set to auto.By default, Switch1 will only allow VLAN 5 across the link.A common native VLAN should have been configured on the switches11.Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?Disable DTP.Delete any VLANs currently being trunked through port Fa0/1.Administratively shut down and re-enable the interface to return it to default.Enter the switchport mode access command in interface configuration mode.12.Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem?The link between the switches is up but not trunked.VLAN 3 is not an allowed VLAN to enter the trunk between the switches.The router is not properly configured to route traffic between the VLANs.Computer D does not have a proper address for the VLAN 3 address space13.Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?There is a native VLAN mismatch.The link between Switch1 and Switch2 is up but not trunked.The router is not properly configured for inter-VLAN routing.VLAN 50 is not allowed to entering the trunk between Switch1 and Switch214.Refer to the exhibit. Which statement is true concerning interface Fa0/5?The default native VLAN is being used.The trunking mode is set to auto.Trunking can occur with non-Cisco switches.VLAN information about the interface encapsulates the Ethernet frames15.What statements describe how hosts on VLANs communicate?Hosts on different VLANs use VTP to negotiate a trunk.Hosts on different VLANs communicate through routers.Hosts on different VLANs should be in the same IP network.Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network16.Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LANdomain?none of the computers will receive the broadcast framecomputer A, computer B, computer Ccomputer A, computer D, computer Gcomputer B, computer Ccomputer D, computer Gcomputer A, computer B, computer C, computer D, computer E, computer F, computer G, computerH, computer I17.What is a valid consideration for planning VLAN traffic across multiple switches?Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VA trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.Carrying all required VLANs on a single access port will ensure proper traffic separation18.Which two statements about the 802.1q trunking protocol are true? (Choose two.)802.1q is Cisco proprietary.802.1q frames are mapped to VLANs by MAC address.If 802.1q is used on a frame, the FCS must be recalculated.802.1q will not perform operations on frames that are forwarded out access ports.802.1q allows the encapsulation of the original frame to identify the VLAN from which a frameoriginated19.What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in "dynamic d mode?dynamic desirable modeon or dynamic desirable modeon, auto, or dynamic desirable modeon, auto, dynamic desirable, or nonegotiate mode20.Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a newcompany office. The company will add a switch, S3, connected via a trunk link to S2, another switch. Forsecurity reasons the new PC will reside in the HR VLAN, VLAN 10. The new office will use the172.17.11.0/24 subnet. After installation, the existing PCs are unable to access shares on PC4. What isthe likely cause?The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.PC4 must use the same subnet as the other HR VLAN PCs.A single VLAN cannot span multiple switches.21.What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?Enter the no vlan 2 and the vlan 3 commands in global configuration mode.Enter the switchport access vlan 3 command in interface configuration mode.Enter the switchport trunk native vlan 3 command in interface configuration mode.Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3。
CCNA Exploration:网络基础知识第二章练习题及答案A.B.C.D.E.F.G.□○1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)□确定数据传输路径□发起数据通信□重新定时和重新传输数据信号□发送数据流□管理数据流□数据流最后的终止点Option 1, Option 3, and Option 5 are correct.2.请选择关于网络协议的正确陈述。
(选择三项。
)□定义特定层 PDU 的结构□规定实现协议层功能的方式□概述层与层之间通信所需的功能□限制了对硬件兼容性的需要□需要取决于协议层的封装过程□杜绝厂商之间的标准化Option 1, Option 3, and Option 5 are correct.3.封装的两个功能是什么?(选择两项)□跟踪终端设备之间的延迟□为通信提供统一的网络路径□在传输前可以修改原始数据□标识属于同一通信的数据片段□确保数据片段可以转发到正确的接收端设备Option 4 and Option 5 are correct.4. 数据链路层封装添加的报尾信息有何主要功能?○支持差错校验○确保数据按照顺序到达○确保送达正确目的○标识本地网络中的设备○帮助中间设备进行处理和路径选择2 points for Option 15. OSI 模型哪两层的功能与 TCP/IP 模型的网络接入层相同?(选择两项)□网络层□传输层□物理层□数据链路层□会话层Option 3 and Option 4 are correct.6. 什么是 PDU?○传输期间的帧损坏○在目的设备上重组的数据○因通信丢失而重新传输的数据包○特定层的封装2 points for Option 47. 以下哪种特征正确代表了网络中的终端设备?□管理数据流□发送数据流□重新定时和重新传输数据信号□确定数据传输路径2 points for Option 28. 请参见图示。
IP 地址为 10.0.0.34 的“手机 A”已经与 IP 地址为 172.16.1.103 的“IP 电话 1”建立了 IP 会话。
1.What are two expected features of modern enterprise networks? (Choose two.)o support for limited growtho support for critical applicationso support for distributed administrative controlo support for 90 percent reliabilityo support for converged network trafficExplanation:All modern enterprise networks are expected to support critical applications, converged network traffic, diverse business needs, and provide centralized administrative control. Users expect enterprise networks to be up 99.999 percent of the time (not 90 percent.). Support for limited growth is not a usual network design criterion.2.What network design would contain the scope of disruptions on a networkshould a failure occur?o the installation of only enterprise class equipment throughout thenetworko the configuration of all access layer devices to share a single gatewayo the reduction in the number of redundant devices and connections in thenetwork coreo the deployment of distribution layer switches in pairs and the division ofaccess layer switch connections between themExplanation:One way to contain the impact of a failure on the network is to implement redundancy. One way this is accomplished is by deploying redundant distribution layer switches and dividing the access layer switch connections between the redundant distribution layer switches. This creates what is called a switch block. Failures in a switch block are contained to that block and do not bring down the whole network.3.Which action should be taken when planning for redundancy on a hierarchicalnetwork design?o immediately replace a non-functioning module, service or device on anetworko continually purchase backup equipment for the networko implement STP portfast between the switches on the networko add alternate physical paths for data to traverse the networkExplanation:One method of implementing redundancy is path redundancy, installing alternate physical paths for data to traverse the network. Redundant links in a switched network supports high availability and can be used for load balancing, reducing congestion on the network.4.Refer to the exhibit. Which devices exist in the failure domain when switch S3loses power?CCNA2 v6.0 Chapter 1 Exam 002o S4 and PC_2o PC_3 and AP_2o AP_2 and AP_1o PC_3 and PC_2o S1 and S4Explanation:A failure domain is the area of a network that is impacted when a critical device such as switch S3has a failure or experiences problems.5.Which design feature will limit the size of a failure domain in an enterprisenetwork?o the use of a collapsed core designo the use of the building switch block approacho the installation of redundant power supplieso the purchase of enterprise equipment that is designed for large trafficvolumeExplanation:In order to best limit the of a failure domain, routers or multilayer switches can be deployed in pairs.The failure of a single device should not cause the network to go down. Installing redundant power supplies may protect a single device from a power failure, but if that device suffers from another type of problem, a redundant device would have been a better solution. Purchasing enterprise equipment that handles large flows of traffic will not provide extra reliability in times of an outage. If acollapsed core design is used, the core and distribution are collapsed into a single device, increasing the chance of a devastating outage.6. A network administrator is planning redundant devices and cabling in aswitched network to support high availability. Which benefit will implementingthe Spanning Tree Protocol provide to this design?o Multiple physical interfaces can be combined into a single EtherChannelinterface.o Redundant paths can be available without causing logical Layer 2 loops.o Network access can be expanded to support both wired and wirelessdevices.o Faster convergence is available for advanced routing protocols.Explanation:With the implementation of redundant devices and links, redundant paths will exist in the network.This may cause a Layer 2 loop, and Spanning Tree Protocol (STP) is used to eliminate switching loops while maintaining reliability. STP is not required to combine multiple physical interfaces into a single EtherChannel interface. STP does not provide faster convergence or an expanded network that uses wired or wireless connectivity.7.What are two benefits of extending access layer connectivity to users through awireless medium? (Choose two.)o increased flexibilityo decreased number of critical points of failureo reduced costso increased bandwidth availabilityo increased network management optionsExplanation:Wireless connectivity at the access layer provides increased flexibility, reduced costs, and the ability to grow and adapt to changing business requirements. Utilizing wireless routers and access points can provide an increase in the number of central points of failure. Wireless routers and access points will not provide an increase in bandwidth availability.8.Which two features of enterprise class equipment assists an enterprise networkin maintaining 99.999 percent up-time? (Choose two.)o failover capabilitieso collapsed coreo redundant power supplieso failure domainso services moduleExplanation:Enterprise class equipment is designed with features such as redundant power supplies and failover capabilities. A failure domain is an area of a network that is impacted when a critical device fails. A collapsed core is a two-tier hierarchical design where the core and distribution layers are collapsed into a single layer. This reduces cost and complexity but does not provide redundancy and uptime.9.What capability is provided by the use of application-specific integrated circuitsin Cisco multilayer switches?o aggregating physical ports into a single logical interfaceo protecting data traffic in the event of a failed circuito forwarding of IP packets independent of the CPUo providing user authentication and authorizationExplanation:Application-specific integrated circuits (ASICs) increase the forwarding speed of a switch byallowing packets to bypass the CPU for processing.10.Which statement describes a characteristic of Cisco Meraki switches?o They promote infrastructure scalability, operational continuity, andtransport flexibility.o They are cloud-managed access switches that enable virtual stacking ofswitches.o They are campus LAN switches that perform the same functions asCisco 2960 switches.o They are service provider switches that aggregate traffic at the edge ofthe network.Explanation:The Cisco Meraki cloud-managed access switches enable virtual stacking of switches. They monitor and configure thousands of switch ports over the web, without the intervention of onsite IT staff. 11.In which situation would a network administrator install a Cisco Nexus Series orCisco Catalyst 6500 Series switch to promote infrastructure scalability?o to enable virtual stacking of switches to provide cloud-managed accesso on a service provider network to promote integrated security, andsimplified managemento on a data center network to provide expansion and transport flexibilityo on a campus LAN network as access layer switchesExplanation:Cisco Nexus Series switches are employed on data centers to promote infrastructure scalability, operational continuity, and transport flexibility. They also provide secure multitenant services by adding virtualization intelligence technology to the data center network.12.Which statement describes a characteristic of Cisco Catalyst 2960 switches?o They do not support an active switched virtual interface (SVI) with IOSversions prior to 15.x.o They are best used as distribution layer switches.o They are modular switches.o New Cisco Catalyst 2960-C switches support PoE pass-through.Explanation:Cisco Catalyst 2960 switches support one active switched virtual interface (SVI) with IOS versionsprior to 15.x. They are commonly used as access layer switches and they are fixed configuration switches.13.What are three access layer switch features that are considered when designinga network? (Choose three.)o broadcast traffic containmento failover capabilityo forwarding rateo port densityo Power over Etherneto speed of convergenceExplanation:The port density of a switch (the number of ports available on a single switch), forwarding rate (how much data the switch can process per second), and Power over Ethernet (the ability of the switch to deliver power to a device over the existing Ethernet cabling) are access layer switch features to be considered when designing a network. Failover capability, speed of convergence, and broadcast traffic containment are distribution layer features.14.What are two functions of a router? (Choose two.)o It connects multiple IP networks.o It controls the flow of data via the use of Layer 2 addresses.o It determines the best path to send packets.o It manages the VLAN database.o It increases the size of the broadcast domain.Explanation:Routers connect multiple networks in an organization to provide interconnections among them. They perform the task by using the network portion of the destination IP address to determine the best path to send packets to their destination.15.A network engineer is reviewing a network design that uses a fixed configurationenterprise router that supports both LAN and WAN connections. However, theengineer realizes that the router does not have enough interfaces to supportgrowth and network expansion. Which type of device should be used as areplacement?o a Layer 3 switcho a modular routero a PoE deviceo another fixed configuration routerExplanation:Modular routers provide multiple slots that allow a network designer to change or increase theinterfaces that exist on the router. A Layer 3 switch may increase the number of ports available on a router, but will not provide WAN connectivity. The PoE capability of a device is not related to the number of ports it has. Using another fixed configuration router will not provide the flexibility to adapt to future growth that using a modular router will provide.16.When a Cisco IOS device is being selected or upgraded, which option indicatesthe capabilities of the Cisco IOS device?o version numbero feature seto release numbero platformExplanation:The version number and release number refer to the overall device operating system. The platform refers to the specific model of a device. The feature set determines what a particular device is capable of.17.Immediately after a router completes its boot sequence, the networkadministrator wants to check the routers configuration. From privileged EXECmode, which of the following commands can the administrator use for thispurpose? (Choose two.)o show flasho show NVRAMo show startup-configo show running-configo show versionExplanation:The show startup-config command can be used to display the Cisco device configuration stored in NVRAM. The show running-config command can be used to display the currently activeconfiguration that is stored in RAM. The show flash command displays the files (not file content) stored in the flash memory.18.Refer to the exhibit. Which command was issued on a Cisco switch that resultedin the exhibited output?CCNA2 v6.0 Chapter 1 Exam 001o show vlan briefo show port-security addresso show mac-address-tableo show vlan summaryExplanation:The show port-security address command displays all secure MAC addresses configured on all switch interfaces. The show mac-address-table command displays all MAC addresses that the switch has learned, how those addresses were learned (dynamic/static), the port number, and the VLAN assigned to the port. The show vlan brief command displays the available VLANs and the ports assigned to each VLAN. The show vlan summary command displays the count of allconfigured VLANs.19.What is a characteristic of in-band device management?o It uses a terminal emulation client.o It is used for initial configuration or when a network connection isunavailable.o It uses a direct connection to a console or AUX port.o It is used to monitor and make configuration changes to a networkdevice over a network connection.Explanation:In-band device management is used to monitor and make configuration changes to a network device over a network connection. Configuration using in-band management requires at least one network interface on the device to be connected and to be operational, and it requires the use of Telnet, SSH, or HTTP to access the device.20.Which two requirements must always be met to use in-band management toconfigure a network device? (Choose two.)o a direct connection to the console porto a direct connection to the auxiliary porto a terminal emulation cliento at least one network interface that is connected and operationalo Telnet, SSH, or HTTP access to the deviceExplanation:Direct connections to the console and auxiliary ports allow for out-of-band management. Terminal emulation software is not always required because in-band management can be performed using a browser.21.Which type of information is displayed by the show ip protocols command thatis issued from a router command prompt?o the configured routing protocols and the networks that the router isadvertisingo interfaces with line (protocol) status and I/O statisticso interface information, including whether an ACL is enabled on theinterfaceo the routed protocol that is enabled and the protocol status of interfaces Explanation:The show ip protocols command displays information about the routing protocols that areconfigured, the networks the router is advertising, and the default administrative distance. The show interfaces command displays interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics. The show ip interfaces command displays interfaceinformation, including protocol status, the IP address, whether a helper address is configured, and whether an ACL is enabled on the interface. The show protocols command displays information about the routed protocol that is enabled and the protocol status of interfaces.22.A network technician needs to connect a PC to a Cisco network device for initialconfiguration. What is required to perform this device configuration?o Telnet accesso at least one operational network interface on the Cisco deviceo HTTP accesso terminal emulation client。
1.When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?The hosts return to a listen-before-transmit mode.The hosts creating the collision have priority to send data.The hosts creating the collision retransmit the last 16 frames.The hosts extend their delay period to allow for rapid transmission.2.Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?No collisions will occur on this link.Only one of the devices can transmit at a time.The switch will have priority for transmitting data.The devices will default back to half duplex if excessive collisions occur3.Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty?SW1 drops the frame.SW1 floods the frame on all ports on SW1, except port Fa0/1.SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1.SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to all ports on SW24.When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?The switch will request that the sending node resend the frame.The switch will issue an ARP request to confirm that the source exists.The switch will map the source MAC address to the port on which it was received.The switch ends an acknowledgement frame to the source MAC of this incoming frame5.Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?workstation Cworkstations B and Cworkstations A, B, C, and the interfaces of the routerworkstations B, C, D, E, F, and interfaces of the router6.Refer to the exhibit. How many collision domains are depicted in the network?1246787.Which two statements about Layer 2 Ethernet switches are true? (Choose two.)Layer 2 switches prevent broadcasts.Layer 2 switches have multiple collision domains.Layer 2 switches route traffic between different networks.Layer 2 switches decrease the number of broadcast domains.Layer 2 switches can send traffic based on the destination MAC address.8.Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and passwo user EXEC modeprivileged EXEC modeglobal configuration modeinterface configuration mode9.A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with "% Incommand". The administrator cannot remember the missing parameters. What can the administrator do to get the paramete append ? to the last parameterappend a space and then ? to the last parameteruse Ctrl-P to show a parameter listuse the Tab key to show which options are available10.Where is the startup configuration stored?DRAMNVRAMROMstartup-config.text11.If a network administrator enters these commands in global configuration mode on a switch, what will be the result?Switch1(config-line)# line console 0Switch1(config-line)# password ciscoSwitch1(config-line)# loginto secure the console port with the password "cisco"to deny access to the console port by specifying 0 lines are availableto gain access to line configuration mode by supplying the required passwordto configure the privilege exec password that will be used for remote access12.R efer to the exhibit. The network administrator’s attempts to connect to Switch1 via Secure Shell are failing. What is most likely the problem?incorrect vty lines configuredincompatible Secure Shell versionincorrect default gateway addressvty lines that are configured to allow only Telnet13.Which two statements are true about EXEC mode passwords? (Choose two.)The enable secret password command stores the configured password in plain text.The enable secret password command provides better security than the enable password.The enable password and enable secret password protect access to privileged EXEC mode.The service password-encryption command is required to encrypt the enable secret password.Best practices require both the enable password and enable secret password to be configured and used simultaneously.14.Refer to the exhibit. The exhibit shows partial output of the show running-config command. The enable password on this switch is "cisco." What can be determined from the output shown?The enable password is encrypted by default.An MD5 hashing algorithm was used on all encrypted passwords.Any configured line mode passwords will be encrypted in this configuration.This line represents most secure privileged EXEC mode password possible15.Which statement is true about the command banner login "Authorized personnel Only" issued on a switch?The command is entered in privileged EXEC mode.The command will cause the message Authorized personnel Only to display before a user logs in.The command will generate the error message % Ambiguous command: "banner motd" ” to be displayed.The command will cause the message End with the character “%” to be displayed after the command is entered into th16.What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks two.)Enable CDP on the switch.Change passwords regularly.Turn off unnecessary services.Enable the HTTP server on the switch.Use the enable password rather than the enable secret password.17.Which two statements are true regarding switch port security? (Choose two.)The three configurable violation modes all log violations via SNMP.Dynamically learned secure MAC addresses are lost when the switch reboots.The three configurable violation modes all require user intervention to re-enable ports.After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses.If fewer than the maximum number of MAC addresses for a port are configured statically,dynamically learned addresses are added to CAM until the maximum number is reached.18.Refer to the exhibit. What happens when Host 1 attempts to send data?Frames from Host 1 cause the interface to shut down.Frames from Host 1 are dropped and no log message is sent.Frames from Host 1 create a MAC address entry in the running-config.Frames from Host 1 will remove all MAC address entries in the address table.19.What happens when the transport input ssh command is entered on the switch vty lines?The SSH client on the switch is enabled.Communication between the switch and remote users is encrypted.A username/password combination is no longer needed to establish a secure remote connection to the switch.The switch requires remote connections via proprietary client software20.Refer to the exhibit. A user on PC1 experiences a delay when accessing applications on the server. What two statements about latency are true? (Choose two.)Each hop in the path adds delay to the overall latency.Placing the bits on the wire at PC1 is propagation delay.Total latency depends solely on the number of devices in the path.The NIC delay at points A and F contributes to the overall latency.The time it takes for an electrical signal to transit the segment from point C to point D is the cause for the propagation delay.Because optimized routing algorithms are faster than switching algorithms, routers R1 and R2 are expected to add less latency than switches SW1 and SW2.21.hosts A and Bhosts D and Ehosts A, B, and Chosts A, B, C, D, and E hosts A, B, C, D, E, and F。