Cisco CCNA 认证考试最新真题

更新时间:2023-03-08 05:40:51 阅读量: 综合文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

Cisco CCNA 认证考试最新真题体验

1. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?

A.This command should be executed from the global configuration mode. B.The IP address 10.121.16.8 is the local router port used to forward data. C.102 is the remote DLCI that will receive the information.

D.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC 2. While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message \timed out.\is displayed. At which layer of the OSI model does the problem most likely exist? A.the session layer B.the network layer C.the data link layer D.the access layer

3. In order to allow the establishment of a Telnet session with a router, which set of commands must be configured?

A.router(config)# line console 0router(config-line)# enable password cisco

B.router(config)# line console 0router(config-line)# enable secret ciscorouter(config-line)# login C.router(config)# line console 0router(config-line)# password ciscorouter(config-line)# login D.router(config)# line vty 0router(config-line)# password cisco router(config-line)# login 4. On point-to-point networks, OSPF hello packets are addressed to which address? A.127.0.0.1 B.192.168.0.5 C.224.0.0.5 D.254.255.255.255 5. What should be part of a comprehensive network security plan?

A.Allow users to develop their own approach to network security.

B.Physically secure network equipment from potential access by unauthorized individuals

C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

6. During startup, the router displays the following error message:boot: cannot open \the router do next?

A.Because of damaged flash memory, the router will fail the POST.

B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM. D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog

7. At which OSI layer is a logical path created between two host systems? A.session B.transport C.network D.physical 8. A routing protocol is required that supports: 1) routing update authentication

2) an addressing scheme that conserves IP addresses 3) multiple vendors

4) a network with over 50 routers

Which routing protocol fulfills these requirements? A.RIPv1 B.RIPv2 C.EIGRP D.OSPF

9. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?

A.no VLANs B.all VLANs C.only VLANs 1 - 6 D.only the VLANs that are specified when creating the trunk

10. Which protocol provides a method of sharing VLAN configuration information between switches?

A.VTP B.STP C.ISL D.802.1Q DBDCB CCDBA

博主的更多文章>>

CCNA第一学期《Final Examination》

2009-02-27 08:58:47

标签:CCNA [推送到技术圈] 1

请参见图示。下列哪组设备仅包含中间设备? A、B、D、G A、B、E、F C、D、G、I G、H、I、J

2

您所在的网际网络发生了路由问题。要鉴别此错误,应该检查以下哪种类型的设备? 接入点 主机

集线器 路由器 交换机

3

请参见图示。技术人员正在处理网络问题,需要验证路由器的 LAN 接口。要确认路由器接口工作正常,应该从此主机 ping 哪个地址? 127.0.0.1 192.168.64.196 192.168.254.1 192.168.254.9 192.168.254.254

4

下列哪三项陈述说明了传输层协议的特征?(选择三项) 应用层协议使用 TCP 端口号和 UDP 端口号。 TCP 使用端口号提供可靠的 IP 数据包传输。 UDP 使用窗口和确认获得可靠的数据传输。 TCP 使用窗口和定序提供可靠的数据传输。 TCP 是面向连接的协议。UDP 是无连接协议。

5

OSI 模型的哪两项功能在第 2 层实现?(选择两项) 物理编址 编码 路由

布线 介质访问控制

6

由于发生安全规规事件,必须更改路由器口令。从以下配置项可获知什么信息?(选择两项。)

Router(config)#line vty 0 3

Router(config-line)# password c13c0 Router(config-line)#login

这些配置项对远程访问指定了三条 Telnet 线路。 这些配置项对远程访问指定了四条 Telnet 线路。

这些配置项将控制台口令和 Telnet 口令设置为 \。 因为 Telnet 配置不完整,所以 Telnet 访问将遭到拒绝。 允许使用 \作为口令访问 Telnet。

7

请参见图示。电缆 1 和电缆 2 的两端分别按照特定的物理层要求接线。表中按编号列出了每个网段以及网络技术人员在该网段不同网络组件之间已经安装的电缆。根据给定的数据回答,哪些网段的电缆安装正确?(选择三项) 网段 1 网段 2 网段 3

36

下列哪些是私有 IP 地址的地址范围? (选择三项。) 10.0.0.0 到 10.255.255.255 200.100.50.0 到 200.100.25.255 150.150.0.0 到 150.150.255.255 172.16.0.0 到 172.31.255.255 192.168.0.0 到 192.168.255.255 127.16.0.0 到 127.31.255.255

37

请参见图示。对于从主机 A 向 Web 服务器发出的网页请求,正确的目的套接字数字是什么? 00-08-a3-b6-ce-46 198.133.219.25:80 http://www.cisco.com

C 172.18.0.0/24 is directly connected, FastEthernet0/0

38

下列哪三项是 CSMA/CD 的特征?(选择三项) 可以将设备配置为较高的传输优先级。 堵塞信号表示冲突已消除,介质不再占用。 设备侦听并等到介质未被占用后再传输。 冲突后只有拥有电子令牌的设备才能传输。 网段中的所有设备都知道网络介质中传输的数据。

检测到冲突后,主机可以在随机延迟时间到期后尝试重新传输。

39

请参见图示。假设所有设备均使用默认配置。支持显示的拓扑需要多少个子网? 1 3 4 5 7

40

下列哪些有关网络层编址的陈述是正确的?(选择三项) 使用平面结构 防止广播 分层

唯一标识每台主机 长 48 位 包括网络部分

41

哪些类型的介质不受 EMI 和 RFI 影响?(选择两项) 10 Base-T 10 Base-2 10 Base-5 100 Base-FX 100 Base TX 1000 Base LX

42

下列哪个端口号范围为服务器上运行的应用程序常用的服务而保留? 0 到 255 0 到 1023 1024 到 49151 49152 到 65535

43

请参见图示。一台路由器(其路由表如图所示)收到发往 192.168.1.4 的数据包。路由器将如何处理该数据包?

丢弃该数据包。

通过 FastEthernet 0/0 转发该数据包。 将该数据包转发到目的主机。

将该数据包转发到下一跳地址 192.168.1.3。

44

哪种口令在创建时自动加密? vty aux 控制台电缆 使能加密口令 使能口令

45

请参见图示。假设该路由器运行 NAT,计算机采用哪些 IP 地址可以访问 Internet?(选择三项) 192.168.18.38 192.168.18.48 192.168.18.49 192.168.18.52 192.168.18.59 192.168.18.63

46

一位技术人员必须通过要求提供口令来确保交换机特权执行模式的安全。哪种类型的口令能满足此类登录的需要并可视为最安全的口令? 控制台电缆 使能 使能加密口令 VTY

47

当 OSI 模型下层执行无连接协议时,通常使用什么来确认数据接收并请求重传丢失的数据? 无连接确认

面向连接的上层协议 网络层 IP 协议 传输层 UDP 协议

48

请参见图示。主机 A 尝试与主机 B 建立 TCP/IP 会话。尝试期间,捕获了源 MAC 地址为 0050.7320.D632 而目的 MAC 地址为 0030.8517.44C4 的帧。捕获的帧中封装了源 IP 地址为 192.168.7.5 而目的 IP 地址为 192.168.219.24 的数据包。此数据包是在网络中哪一点捕获的? 离开主机 A 离开 ATL 离开 Dallas 离开 NYC

参考答案:

1、A 2、D 3、C 4、ADE 5、AE 6、BE 7、ACD 8、B 9、ABD 10、A 11、D 12、B 13、C 14、D 15、D 16、B 17、CD 18、B 19、C 20、D 21、DE 22、AE 23、ACE 24、B 25、A 26、C 27、BE 28、D 29、E 30、D 31、B 32、E 33、A 34、D 35、D 36、ADE 37、B 38、CEF 39、B 40、CDF 41、DF 42、B 43、C 44、D 45、CDE 46、C 47、B 48、C 正确率在97%以上

博主的更多文章>>

CCNA1 - Module 1 Exam Answers (2008-4-8-PM-4:30)

1. Several computers in the company require new NICs. A technician has located a good price on the Internet for the purchase of these NICs. Before these NICs are purchased and installed, what details must be verified? (Choose three.) ? the MAC address on

? the size of the RAM on the NIC? the bandwidth supported by the NIC ? the type of media supported by the NIC

? the type of network architecture supported by the NIC

2. What is the hexadecimal equivalent for the binary number 00100101? ? 15 ? 20 ? 25 ? 30 ? 37 ? 40

3. Which phrases describe a byte? (Choose two.) ? a single binary digit ? +5 volts of electricity

? the value range 0 to 127? a grouping of eight binary digits ? a single addressable data storage location

4. Which specialized equipment is used to make a physical connection from a PC to a network? ? router ? RAM ? CD ROM

? network interface card

5. What is the binary equivalent for the decimal number 248? ? 11100000 ? 11110000 ? 11110100 ? 11111000

6. Convert the binary number 01011011 into its hexadecimal equivalent. Select the correct answer from the list below. ? 5A ? 5b ? 5c ? 5d ? 6b ? 7a

7. What is the binary equivalent for decimal number 149? ? 10010111 ? 10010101 ? 10011001 ? 10010111 ? 10101011 ? 10101101

8. In an 8 bit binary number, what is the total number of combinations of the eight bits? ? 128 ? 254 ? 255 ? 256 ? 512 ? 1024

9. Which device connects a computer with a telephone line by providing modulation and demodulation of incoming and outgoing data? ? NIC ? CSU/DSU ? router ? modem ? telco switch

10. What is the binary equivalent for the decimal number 162? ? 10101010 ? 10100010

? 10100100 ? 10101101 ? 10110000 ? 10101100

11. Which of the following are popular web browsers? (Choose two.) ? Acrobat

? Internet Explorer ? Macromedia Flash ? Netscape Navigator ? Quicktime ? World Wide Web

12. Convert the Base 10 number 116 into its eight bit binary equivalent. Choose the correct answer from the following list: ? 01111010 ? 01110010 ? 01110100 ? 01110110 ? 01110111 ? 01010110

13. What is the hexadecimal equivalent for the binary number 10001110? ? 22 ? 67 ? 142 ? AE ? 8E

14. Represented as a decimal number, what is the result of the logical ANDing of binary numbers 00100011 and 11111100? ? 3 ? 32 ? 35 ? 220 ? 255

15. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. ? 11110010 ? 11011011 ? 11110110 ? 11100111 ? 11100101

? 11101110

16. What are three conditions that would require a network administrator to install a new NIC? (Choose three.)? whenever a NIC is damaged ? when there is a need to provide a secondary or backup NIC ? when there is a change from copper media to wireless ? whenever operating system security patches are applied ? whenever the PC has been moved to a different location

CCNA1 - Module 2 Exam Answers (2008-4-8-PM-4:30)

1. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs? ? data link ? transport ? network

? application

2. Which of the following are data link layer encapsulation details? (Choose two.)

? A header and trailer are added. ? Data is converted into packets. ? Packets are packaged into frames. ? Frames are divided into segments.

? Packets are changed into bits for Internet travel.

3. Which three features apply to LAN connections? (Choose three.) ? operate using serial interfaces

? make network connection using a hub

? limited to operation over small geographic areas ? provide part-time connectivity to remote services ? typically operate under local administrative control ? provide lower bandwidth services compared to WANs

4. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? ? physical layer ? data link layer ? network layer ? transport layer

5. Which term describes the process of adding headers to data as it moves down OSI layers? ? division

? encoding ? separation ? segmentation ? encapsulation

6. Refer to the following list. Choose the correct order of data encapsulation when a device sends information. 1. segments 2. bits 3. packets 4. data 5. frames

? 1 - 3 - 5 - 4 - 2 ? 2 - 1 - 3 - 5 - 4 ? 2 - 4 - 3 - 5 - 1 ? 4 - 3 - 1 - 2 - 5 ? 4 - 1 - 3 - 5 - 2 ? 3 - 5 - 1 - 2 - 4 7. The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented? ? bus ? star ? ring ? mesh

8. Which of the following are factors that determine throughput? (Choose two.)

? types of passwords used on servers ? type of Layer 3 protocol used ? network topology

? width of the network cable

? number of users on the network

9. Which best describes the function of the physical layer?

? Defines the electrical and functional specifications for the link between end systems.

? Provides reliable transit of data across a physical link.

? Provides connectivity and path selection between two end systems. ? Concerned with physical addressing, network topology and media access.

10. Which of the following are ways that bandwidth is commonly measured? (Choose three.) ? GHzps

? kbps ? Mbps ? Nbps ? MHzps ? Gbps

11. Which of the following are layers of the TCP/IP model? (Choose three.) ? Application ? Physical ? Internet

? Network Access ? Presentation

12. What is the term used to describe the transport layer protocol data unit? ? bits ? packets ? segments ? frames

? data streams

13. What makes it easier for different networking vendors to design software and hardware that will interoperate? ? OSI model

? proprietary designs ? IP addressing scheme

? standard logical topologies ? standard physical topologies 14.

Refer to the exhibit. Which column shows the correct sequence of OSI model layers? ? A ? B ? C

performing some tests, a technician has determined that the copper media supporting the LAN is experiencing abnormal attenuation. What are two possible causes of the problem? (Choose two.)

?defective connectors? excessively long cable lengths ? use of higher grade cabling

? low frequency signals used in the media

? network cable runs isolated from other cables

6. What factors need to be considered to limit the amount of signal attenuation in Ethernet cable runs? (Choose two.) ? type of users ? number of users

?length of cable? type of electrical equipment ? installation of connectors on the cable

7. What conditions are described when transmission signals from one wire pair affects another wire pair? (Choose two.) ? noise

? resistance mismatch ? jitter ? crosstalk ? attenuation

8. What is a cause of crosstalk in UTP cable? ? cable pairs that are shorted

? cable pairs crossed during termination

? cabling runs installed in separate conduit

? cable pairs that are untwisted because of poor termination of the cable 9. Which of the following are detected by the wire map test? (Choose three.) ? near-end crosstalk (NEXT) ? opens

? propagation delay ? return loss

? reversed-pair faults ? short circuits

10. A company needs to extend the LAN to six separate buildings. To limit the amount of signal attenuation on the LAN media, what type of media would be the best to use between the buildings? ? air (wireless) ? coaxial cable ? fiber

? shielded twisted pair

? unshielded twisted pair

博主的更多文章>>

CCNA1 - Module 5 Exam Answers (2008-4-8-PM-4:30)

2008-04-09 16:36:35

标签:CCNA 练习题 [推送到技术圈]

1.

Refer to the exhibit. What is the appropriate cable to use at each of the numbered network connections?

? 1-crossover; 2-straight-through; 3-crossover; 4-straight-through ? 1-straight-through; 2-crossover; 3-straight-through; 4-straight-through

? 1-straight-through; 2-crossover; 3-crossover; 4-straight-through ?1-rollover; 2-crossover; 3-straight-through; 4-straight-through?

1-rollover; 2-straight-through; 3-straight-through; 4-straight-through

2. Which two devices are considered OSI Layer 1 devices? (Choose two.) ? hubs ? routers ? bridges ? switches ? repeaters

3. What device is used to connect hosts to an Ethernet LAN and requires a straight-through UTP cable between the hosts and this device? ? NIC

? router ? switch ? server

4. What is the most common type of cabling used in LANs? ? STP ? UTP ? coax ? fiber

5. In which situations would a crossover cable be used to connect devices in a network? (Choose two.) ? switch to PC ? switch to hub ? switch to router ? switch to server ? switch to switch 6.

Refer to the exhibit. How many collision domains exist in the network? ? 1? 2? 4 ? 7 ? 8

7. What type of cable would be used to make the connection between the console port of a router and a workstation? ? crossover ? rollover

? straight-through ? patch 8.

Which function is a unique responsibility of the DCE devices shown in the exhibit?

? transmission of data ? reception of data

? clocking for the synchronous link

? noise cancellation in transmitted data

9. Which address does a bridge use to make filtering and switching decisions? ? source MAC ? source IP

? destination MAC ? destination IP

? network IP address

10. What is characteristic of how a hub operates?

? A hub selectively drops packets that represent potential security risks.? A hub forwards data out all interfaces except the inbound

interface.? A hub dynamically learns the interfaces to which all devices are attached.

? At start up, a hub queries the devices on all interfaces in order to learn the MAC addresses of the attached devices.

? A hub transmits a frame to a specific interface based on the destination MAC address.

11. Users with systems that are attached to a hub are complaining about poor response time. What device could replace the hub and provide immediate response time improvement? ? router ? switch ? bridge ? repeater

12. Which of the following are benefits of peer-to-peer networks? (Choose three.)

? centralized security ? easy to create ? very scalable

? no centralized equipment required

? centralized administrator not required ? centralized control of assets

13. Which statement is accurate about a WAN link?

? The link transmits data serially.

? The link uses a maximum distance of 100 meters.

? The link uses the same transmission rate as all other WAN links use. ? The link uses the same standardized connector style that is used for all WAN technologies. 14.

Which items in the exhibit are DTE devices? ? A and B ? B and C ? C and D ? A and D

? A, B, C, and D

15. At which layer of the OSI model does the MAC address of a NIC reside? ? physical ? application ? network

? transport? data link? session 16.

Refer to the exhibit. A technician measured the lengths of the CAT 5e structured cable runs in the exhibit. How should the technician evaluate the cabling shown in the diagram to the network administrator? ? All cabling to work areas are within specifications.

? Station A and B may experience intermittent problems because the length exceeds the recommended standard.? Station B may experience intermittent problems because the length exceeds the recommended standard.? Station C may experience intermittent network connectivity because the length is less than the recommended standard.

? Station A and B will have intermittent problems because the length exceeds the recommended standard.

? Station C will not have network connectivity because the length is less than the recommended standard.

17. Which statement describes a typical use of Gigabit Ethernet? ? to provide high-speed desktop connectivity for average users ? to provide connectivity to low to medium volume applications ? to provide medium volume connectivity to workgroup servers

? to provide high-speed connectivity for backbones and cross connects 18.

The ends of a UTP cable are shown in the exhibit. Which cable configuration is shown? ? crossover ? rollover

? reversed-pair ? straight-through ? split-pair ? console 19.

The ends of a UTP cable are shown in the exhibit. Which cable configuration is shown?

? console ? crossover ? rollover

? reversed-pair ? split-pair

? straight-through

20. Which of the following are benefits of a wireless network? (Choose two.)

? higher data speeds ? better security ? mobility

? less expensive NIC cards

? no need to run cables to hosts

博主的更多文章>>

CCNA1 - Module 6 Exam Answers (2008-4-13-PM-21:40)

2008-04-09 18:21:08

标签:CCNA 练习题 [推送到技术圈]

1.

Refer to the exhibit. Host A is communicating with host F. What happens to a frame sent from host A to host F as it travels over the Ethernet segments? ? The frame format is modified as it passes through each switch.? The frame format remains the same across each Ethernet segment.? The frame format is modified as the media speed changed at switch B and switch E. ? The frame format is modified as the media material changes between copper and fiber at switch C and switch D.

2. How many hexadecimal digits are in a MAC address? ? 2 ? 8 ? 12 ? 16

? 32 3. What are three functions of a NIC in a PC? (Choose three.)? A NIC connects the PC to the network media.

? A NIC detects collisions on the Ethernet segment.

? A NIC checks the formatting of data before it is transmitted.

? A NIC passes the contents of selected frames to the upper OSI layers. ? A NIC acknowledges and retransmits data that was not received properly. ? A NIC discards frames when the destination IP address does not match the local host.

4. At what layer of the OSI model does a MAC address reside? ? 1 ? 2 ? 3 ? 4 ? 7

5. A router has an Ethernet, Token Ring, serial, and ISDN interface. Which interfaces will have a MAC address? ? serial and ISDN interfaces? Ethernet and Token Ring interfaces? Ethernet and ISDN interfaces

? Token Ring and serial interfaces

6. In an Ethernet LAN, how does the NIC know when it can transmit data? ? An Ethernet NIC transmits data as soon as the frame is received. ? An Ethernet NIC transmits data as soon as the NIC receives a token. ? An Ethernet NIC transmits data when it senses a collision. ? An Ethernet NIC transmits data after listening for the absence of a signal on the media. 7. Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choose three.) ? reliable

? point-to-point ? nondeterministic ? connection-oriented ? collision environment

? first-come, first-served approach 8. Which two devices can provide full-duplex Ethernet connections? (Choose two.) ? hub ? modem

? repeater? NIC ? Layer 2 switch

9. On a local area network, one workstation can send data on the line while it is receiving data. What type of data transfer does this describe? ? hybrid

? half duplex? full duplex? multilink 10.

Refer to the exhibit. The small office network shown in the exhibit consists of four computers connected through a hub. Which configuration would cause collisions and errors on the network? ? autonegotiation ? FastEthernet

? peer-to-peer shared resources

? administratively configured full duplex 11.

Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?

? No collisions will occur on this link.

? Only one of the devices can transmit at a time.

? The switch will have priority for transmitting data.

? The devices will default back to half duplex if excessive collisions occur.

12.

Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)

? Hosts 1 and 4 may be operating full duplex so no collision will exist. ? The hub will block the port connected to Host 4 to prevent a collision. ? After the end of the jam signal, Hosts 1, 2, 3, and 4 invoke a backoff algorithm.? Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.? If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle, before transmitting.

13. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired? ? The hosts return to a listen-before-transmit mode.

? The hosts creating the collision have priority to send data. ? The hosts creating the collision retransmit the last 16 frames.

? The hosts extend their delay period to allow for rapid transmission.

14. Which statement describes how CSMA/CD on an Ethernet segment manages the retransmission of frames after a collision occurs?

? The first device to detect the collision has the priority for retransmission.

? The device with the lowest MAC address determines the retransmission priority.

? The devices on the network segment hold an election for priority to retransmit data

? The devices transmitting when the collision occurs DO NOT have priority for retransmission. 15.

本文来源:https://www.bwwdw.com/article/qct.html

Top