51CTO下载-CCNA 640-802 V14 题库(76-100) - 图文

更新时间:2024-05-03 15:31:01 阅读量: 综合文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

76. What is the purpose of the command shown below?vtp password Fl0r1da A. It is used to validate the sources of VTP advertisements sent between switches. B. It is used to access the VTP server to make changes to the VTP configuration. C. It allows two VTP servers to exist in the same domain, each configured with different passwords.

D. It is the password required when promoting a switch from VTP client mode to VTP server mode.

E. It is used to prevent a switch newly added to the network from sending incorrect VLAN information to theother switches in the domain.

Answer: A

77. A single 802.11g access point has been configured and installed in the center of a square office. A few wirelessusers are experiencing slow performance and drops while most users are operating at peak efficiency. What arethree likely causes of this problem? (Choose three.)

A. mismatched TKIP encryption B. null SSID C. cordless phones D. mismatched SSID E. metal file cabinets F. antenna type or direction Answer: CEF

78. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?

A. Establish a direct link from the switch to all other switches in the network.

B. Assign the switch a higher MAC address than the other switches in the network have.

C. Configure the switch so that it has a lower priority than other switches in the network.

D. Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.

E. Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

Answer: C

79. Refer to the exhibit. Given the output of the Floor3 switch, what statement describes the operation of thisswitch?

A. VTP is disabled on this switch.

B. The switch can create, change, and delete VLANs.

C. The switch learns VLAN information but does not save it to NVRAM.

D. The switch can create VLANs locally but will not forward this information to other switches.

E. The switch learns VLAN information and updates the local VLAN data base in NVRAM.

Answer: C

80. What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any

A. permit all packets matching the first three octets of the source address to all destinations

B. permit all packets matching the last octet of the destination address and accept all source addresses

C. permit all packets from the third subnet of the network address to all destinations D. permit all packets matching the host bits in the source address to all destinations E. permit all packets to destinations matching the first three octets in the destination address

Answer: A

81. Refer to the exhibit. Hosts on the same VLAN can communicate with each other but are unable tocommunicate with hosts on different VLANs. What is needed to allow communication between VLANs?

A. a switch with a trunk link that is configured between the switches

B. a router with an IP address on the physical interface that is connected to the switch C. a switch with an access link that is configured between the switches

D. a router with subinterfaces configured on the physical interface that is connected to the switch

Answer: D

82. Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port

B. to limit the number of Layer 2 broadcasts on a particular switch port C. to prevent unauthorized hosts from accessing the LAN

D. to protect the IP and MAC address of the switch and associated ports

E. to block unauthorized access to the switch management interfaces over common TCP ports

Answer: C

83. The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possible causesfor this interface status? (Choose three.)

A. The interface is shut down.

B. No keepalive messages are received. C. The clockrate is not set. D. No loopback address is set. E. No cable is attached to the interface.

F. There is a mismatch in the encapsulation type. Answer: BCF

84. Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the PayrollServer. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to thePayroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?(Choose two.)

A. access lists

B. encrypted router passwords

C. STP D. VLANs E. VTP

F. wireless LANs Answer: AD

85. A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ipospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?

A. The OSPF area is not configured properly. B. The priority on R1 should be set higher. C. The cost on R1 should be set higher.

D. The hello and dead timers are not configured properly. E. A backup designated router needs to be added to the network. F. The OSPF process ID numbers must match. Answer: D

86. On which types of network will OSPF elect a backup designated router? A. point-to-point and multiaccess B. point-to-multipoint and multiaccess C. point-to-point and point-to-multipoint D. nonbroadcast and broadcast multipoint

E. nonbroadcast and broadcast multiaccess Answer: E

87. This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from routerRemote27. Which of the following command sequences will correct this problem?

A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco B. Remote27(config)# line console 0 Remote27(config-line)# login

Remote27(config-line)# password cisco C. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login

ACCESS1(config-line)# password cisco D. Remote27(config)# line vty 0 4 Remote27(config-line)# login

Remote27(config-line)# password cisco E. ACCESS1(config)# enable password cisco F. Remote27(config)# enable password cisco Answer: C

88. Refer to the exhibit. Subnet 10.1.3.0/24 is unknown to router RTB. Which router command will prevent routerRTB from dropping a packet destined for the 10.1.3.0/24 network if a default route is configured?

A. ip classless B. ip default-network C. network 10.1.1.0

D. network 10.1.1.0 0.0.0.255 area 0 Answer: A

89. Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network hasconverged, and the routers in this network are functioning properly. The FastEthernet0/0 interface on R1 goesdown. In which two ways will the routers in this network respond to this change? (Choose two.)

A. All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.

B. Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-down timers expire.

C. Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 aboutconnectivity to the 192.168.1.0 network.

D. When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond bysending a route back to R1 with an infinite metric to the 192.168.1.0 network.

E. R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updatesat an increased rate until the network again converges.

Answer: CD

90. Which statement accurately describes a benefit provided by VTP? A. VTP allows routing between VLANs.

B. VTP allows a single port to carry information to more than one VLAN. C. VTP allows physically redundant links while preventing switching loops. D. VTP allows switches to share VLAN configuration information. Answer: D

91. Refer to the exhibit. What kind of cable should be used to make each connection that is identified by thenumbers shown?

A. 1 - Ethernet crossover cable 2 - Ethernet straight-through cable 3 - fiber optic cable 4 - rollover cable

B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - serial cable 4 - rollover cable

C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - serial cable 4 - null modem cable

D. 1 - Ethernet straight-through cable

2 - Ethernet crossover cable 3 - serial cable 4 - rollover cable

E. 1 - Ethernet straight-through cable 2 - Ethernet crossover cable 3 - serial cable

4 - Ethernet straight-through cable Answer: B

92. Refer to the exhibit. A network administrator attempts to ping Host2 from Host1 and receives the results thatare shown. What is a possible problem?

A. The link between Host1 and Switch1 is down. B. TCP/IP is not functioning on Host1

C. The link between Router1 and Router2 is down. D. The default gateway on Host1 is incorrect. E. Interface Fa0/0 on Router1 is shutdown. F. The link between Switch1 and Router1 is down. Answer: C

93. What does the \Global\address represent in the configuration of NAT?

A. the summarized address for all of the internal subnetted addresses

B. the MAC address of the router used by inside hosts to connect to the Internet C. a globally unique, private IP address assigned to a host on the inside network D. a registered address that represents an inside host to an outside network Answer: D

94. During startup, the router displays the following error message:boot: cannot open \

A. Because of damaged flash memory, the router will fail the POST.

B. It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.

C. It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.

D. It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.

E. It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM.

Answer: C

95. Refer to the exhibit. S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in this hub-and-spoke Frame Relay topology. While testing this configuration, a technician notes that pings aresuccessful from hosts on the 172.16.1.0/24 network to hosts on both the 172.16.2.0/25 and 172.16.2.128/25networks. However, pings between hosts on the 172.16.2.0/25 and 172.16.2.128/25 networks are not successful.What could explain this connectivity problem?

A. The ip subnet-zero command has been issued on the R1 router.

B. The RIP v2 dynamic routing protocol cannot be used across a Frame Relay network.

C. Split horizon is preventing R2 from learning about the R3 networks and R3 from learning about the R2 networks.

D. The 172.16.2.0/25 and 172.16.2.128/25 networks are overlapping networks that can be seen by R1, but notbetween R2 and R3.

E. The 172.16.3.0/29 network used on the Frame Relay links is creating a discontiguous network between the R2 and R3 router subnetworks.

Answer: C

96. Refer to the exhibit. Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output from RouterA, what are two possible reasons for the failure? (Choose two.)

A. The cable that is connected to S0/0 on RouterA is faulty. B. Interface S0/0 on RouterB is administratively down.

C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.

D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet. E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU. F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.

Answer: EF

97. When upgrading the IOS image, the network administrator receives the exhibited error message. What couldbe the cause of this error?

A. The new IOS image is too large for the router flash memory. B. The TFTP server is unreachable from the router. C. The new IOS image is not correct for this router platform. D. The IOS image on the TFTP server is corrupt.

E. There is not enough disk space on the TFTP server for the IOS image. Answer: B

98. You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created?

A. BSS B. ESS C. IBSS D. SSID Answer: C

99. The Frame Relay network in the diagram is not functioning properly. What is the cause of the problem?

A. The Gallant router has the wrong LMI type configured.

B. Inverse ARP is providing the wrong PVC information to the Gallant router. C. The S3 interface of the Steele router has been configured with the frame-relay encapsulation ietf command.

D. The frame-relay map statement in the Attalla router for the PVC to Steele is not correct.

E. The IP address on the serial interface of the Attalla router is configured incorrectly. Answer: D

100. Which of the following statements describe the network shown in the graphic? (Choose two.)

A. There are two broadcast domains in the network. B. There are four broadcast domains in the network. C. There are six broadcast domains in the network. D. There are four collision domains in the network. E. There are five collision domains in the network. F. There are seven collision domains in the network. Answer: AF

本文来源:https://www.bwwdw.com/article/jojg.html

Top