为了正常的体验网站,请在浏览器设置里面开启Javascript功能!

CCNA考试必看

2012-10-31 23页 doc 159KB 24阅读

用户头像

is_781019

暂无简介

举报
CCNA考试必看练习 1: 在子接口配置模式中想要彻底地回到特权EXEC模式。应该键入什么?(选所有的可能) A. CTRL-Z B. end Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? (Choose three) B. 27.35.16.44 C. 27.35.16.45 D. 27.35.16.33 默认哪些度量值组件在IGRP中使用? 延迟 ...
CCNA考试必看
练习 1: 在子接口配置模式中想要彻底地回到特权EXEC模式。应该键入什么?(选所有的可能) A. CTRL-Z B. end Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? (Choose three) B. 27.35.16.44 C. 27.35.16.45 D. 27.35.16.33 默认哪些度量值组件在IGRP中使用? 延迟 D. 带宽 4.Your ISP assigned you a full class A address space. From this, you need at least 300 sub-networks that can support at least 50 hosts each. Which of the subnet masks below are capable of satisfying your needs? (Select two). 255.255.128.0 B. 255.255.192.0 5.要在路由器上启用IP路由选择,必须做什么? A. 启用路由选择协议 C. 向路由器接口分配IP地址 6.从闪存中备份IOS镜像时,copy flash tftp命令将提示用户输入以下哪些信息? A. TFTP server IP address C. Source filename D. Destination filename 7.You have the following :199.141.27.0/27. Which of the following addresses can be allocated to hosts on the resulting subnet?A. 199.141.27.2 C. 199.141.27.13 D. 199.141.27.11 8.哪条路由器命令执行覆盖的过程? copy running-config start copy running-config tftp 9.You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network? (Select all valid answers) A. 254 usable subnet. B. 254 usable hosts persubnet 10.下列哪项存储在ROM中? A. POST B. ROMMON 11.Which two of the addresses below are available for host addresses on the subnet 192.168.16.19/28? (Select two answer choices) A. 192.168.16.17 B. 192.168.16.29 12.Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? (Select three) A. 115.54.7.64 B. 115.54.6.255 C. 115.54.5.128 13.要在路由器上启用IP路由选择,必须做什么? A. 启用路由选择协议 C. 向路由器接口分配IP地址 14.Using a subnet mask of 255.255.255.240, which of the IP addresses below can you assign to the hosts on this subnet? (Select all that apply) A. 92.11.178.93 B. 134.178.18.56 C. 192.168.16.87 15.下面哪些中继方式是Cisco专有的? B. 802.1 D. ISL 练习2: 1.A. Both bridges and switches forward Layer 2 broadcasts. B. Switches typically have a higher number of ports than bridges. C. Both bridges and switches make forwarding decisions based on Layer 2 addresses. 255.255.128.0 B. 255.255.192.0 Which of the following IP hosts would be valid for PC users, assuming that a /28 network mask was used for all of the networks? (Choose all that apply.) 83.121.178.93 B. 134.178.18.56 C. 192.168.19.37 3.Which of the following statements are true regarding a network using a subnet mask of 255.255.248.0? (Choose three) A. It corresponds to a Class A address with 13 bits borrowed C. The network address of the last subnet will have 248 in the 3rd octet. D. The subnetwork numbers will be in multiples of 8 4.图中的家庭网络可能用到了哪些设备? A. 100Mbps以太网适配器 B. Category 5 双铰线电缆 C. 以太网集线器 5.You have the binary number 10011101. Convert it to its decimal and hexadecimal equiva-lents. (Select two answer choices) B. 0x9D D. 157 6.Which of the following devices can an administrator use to segment their LAN? (Choose all that apply) B. Switches C. Bridges D. Routers 7.Routers perform which of the following functions? (Select Three) A. Packet switching C. Packet filtering D. Internetwork communication 8.Which of the following protocols operate at the Application layer of the OSI model? (Select all valid answers) B. Telnet C. FTP 9.The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model? (Select all that apply) A. Application layer C. Transport layer D. Internet layer 10.There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 & 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 & 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers) A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1 B. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1 C. Host 4 on VLAN 2 can ping Host 2 on VLAN 2 11.The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three) B. Ensure that cables A and B are straight-through cables. C. Ensure that switch has power. D. Reseat all cables. 12.Regarding the extended ping command; which of the statements below are true? (Select all valid answer choices) A. The extended ping command is available from privileged EXEC mode. B. With the extended ping command you can specify the timeout value. C. With the extended ping command you can specify the datagram size. 13.Within the TestKing office, The Sales and Production networks are separated by a router as shown in the diagram below: Which of the following statements most accurately describes the characteristics of the above networks broadcast and collision domains? A. There are two broadcast domains in the network. D. There are seven collision domains in the network. 14.The TestKing network is displayed in the diagram below: Referring to the devices shown above, which statements are true in this scenario? (Select two) B. Only the device in network 192.168.1.0 will receive a broadcast to 255.255.255.255 sent by TestkingA C. Each host is in a separate collision domain 15.With regards to bridges and switches, which of the following statements are true? (Choose three) A. Both bridges and switches forward Layer 2 broadcasts. B. Switches typically have a higher number of ports than bridges. C. Both bridges and switches make forwarding decisions based on Layer 2 addresses. 16.Which Layer 1 devices can be used to extend the area covered by a single LAN segment? (Select two) A. Hub B. Repeater 练习3: CDP is running between two TestKing devices. What information is supplied by CDP? (Se-lect three) A. Device Identifiers B. Capabilities list C. Platform TestKing is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorize? Access lists D. VLANs 3.If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs? A. 172.16.45.12 B. 172.16.45.13 4.Which two of the addresses below are available for host addresses on the subnet 192.168.15.19/28? (Select two answer choices) A. 192.168.15.17 C. 192.168.15.29 5.3 addresses are shown in binary form in the exhibit. Regarding these three binary addresses in the above exhibit; which statements below are correct? (Select three) A. Address C is a public Class C address. C. Address A is a public Class A address. D. Address B is a private Class B address. 6.Using a subnet mask of 255.255.255.224, which of the IP addresses below can you assign to the hosts on this subnet? (Select all that apply) A. 92.11.178.93 B. 134.178.18.56 C. 192.168.16.87 Your ISP has assigned you the following IP address and subnet mask: IP address: 199.141.27.0 Subnet mask: 255.255.255.240 Which of the following addresses can be allocated to hosts on the resulting subnet? (Select all that apply) A. 199.141.27.2 C. 199.141.27.13 D. 199.141.27.11 You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network? (Select all valid answers) A. There are 254 usable subnets. D. There are 254 usable hosts per subnet. Your ISP assigned you a full class B address space. From this, you need at least 300 sub-networks that can support at least 50 hosts each. Which of the subnet masks below are capable of satisfying your needs? (Select two). A. 255.255.255.128 D. 255.255.255.192 10.You've been assigned the CIDR (classless inter domain routing) block of 115.64.4.0/22 from your ISP. Which of the IP addresses below can you use for a host? (Select all valid answers) A. 115.64.7.64 B. 115.64.6.255 11.All of the hosts in the above exhibit are connected with each other via the single Catalyst switch. Which of the following statements correctly describe the addressing scheme of this network? (Select three) B. The subnet mask in use is 255.255.255.128. C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1. D. The LAN interface of the router is configured with multiple IP addresses. In the network diagram, what are the broadcast addresses of the subnets? (Select three) B. 172.16.95.255 C. 172.16.47.255 D. 172.16.79.255 Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks? (Choose all that apply.) B. 83.121.178.93 C. 134.178.18.56 D. 192.168.19.37 Which of the following statements are true regarding a network using a subnet mask of 255.255.248.0? (Choose three) A. It corresponds to a Class A address with 13 bits borrowed. B. The network address of the last subnet will have 248 in the 3rd octet. C. The subnetwork numbers will be in multiples of 8. 15.Which of the following IP addresses is a private IP address? Select all that apply. C. 172.20.14.36 D. 192.168.42.34 Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? Select three. A. 115.54.7.64 B. 115.54.6.255 D. 115.54.5.128 17.Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? (Choose three) B. 27.35.16.33 C. 27.35.16.45 D. 27.35.16.44 练习4:1.The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is con-figured on the router? (Choose three) 172.25.78.243 C. 172.25.72.0 D. 172.25.94.255 Refer to the exhibit. All of the routers in the TestKing network are configured with the "ip subnet-zero" command. Which network addresses should be used for Link A and Network A? (Choose two) Link A -172.16.3.0/30 C. Network A -172.16.3.128/25 When designing OSPF networks; what is the purpose of using a hierarchical design? (Select all choices that apply) B. To speed up convergence C. To confine network instability to single areas of the network D. To reduce routing overhead You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement? (Select two) C. IGRP D. EIGRP Which of the routing protocols shown below support both VLSM and route summarization? (Select three) EIGRP C. RIP v2 D. OSPF 6.Which of the following routing protocols support the use of VLSM (Variable Length Subnet Masking)? (Select three)B. EIGRP C. OSPF D. RIPv2 7.Which of the following routing protocols do NOT support VLSM (variable length subnet masking)? (Choose all that apply). A. RIPv1 B. IGRP 8.RIP version 2 is being used as the routing protocol within the TestKing network. What does RIP version 2 use to prevent routing loops? (Choose two)A. Hold-down timers B. Split horizon 9.Based on the information shown above, which routing protocols can be used within the TestKing network show in the diagram? (Choose three). B. RIP v2 C. OSPF D. EIGRP 10.The TestKing Network consists of the following 5 IP networks: NETWORK 1: 192.168.10.0/26 NETWORK 2: 192.168.10.64/27 NETWORK 3: 192.168.10.96/27 NETWORK 4: 192.168.10.128/30 NETWORK 5: 192.168.10.132/30 Which of the following routing protocols will support this IP addressing scheme?(Choose all that apply).A. OSPF C. EIGRP D. RIP version 2 11.Which routing protocols can be used within the enterprise network shown in the diagram? (Choose three.) A. RIP v2 B. OSPF C. EIGRP 12.Consider the 192.1.1.0/24 network in this exhibit. This network uses RIP v2. Which combi-nation of subnetwork assignments will satisfy the requirements for networks A, B, and C of this design? (Select three) A. Network A = 192.1.1.128/25 B. Network B = 192.1.1.4/30 C. Network C = 192.1.1.64/26 13.You are a technician at TestKing. Your newly appointed TestKing trainee wants to know what the CDP is. What would your reply be? (Choose all that apply.)A. It is globally enabled by default on Cisco routers. C. It is a proprietary protocol. D. It can be used to gather hardware and protocol information about neighbor devices. 14.Which of the following statements are true regarding how router A will chose a path to router E? (Choose three)A. If RIP and IGRP are both configured on router A, the router will use the route learned by RIP. B. If RIP is the routing protocol, router A will determine all paths have an equal cost. C. If IGRP is the routing protocol, router A will determine that path ADE has the lowest cost.15.Based on this diagram, which two devices can be used to complete the connection between the WAN router at the customer site and the service provider? (Choose two.) A. CSU/DSU B. modem 练习五: The TestKing switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows: Router Ethernet port - 1st usable address Core - 2nd usable address Core2 - 3rd usable address For this network, which of the following commands must be configured on Core2 to allow it to be managed remotely from any subnet on the network? (Choose three) A. Core2(config)# ip default-gateway 192.168.1.9 B. Core2(config)# interface vlan 1 Core2(config-if)# ip address 192.168.1.11 255.255.255.248 C. Core2(config)# line vty 0 4 Core2(config-line)# password cisco 2.Which of the following OSPF commands, when used together, will put the network 192.168.10.0/24 into OSPF area 0? (Select all valid responses) A. Router(config-router)# network 192.168.10.0 0.0.0.255 area 0 D. Router(config)# router ospf 1 What are the characteristic of link state routing protocols? (Choose all that apply.) A. The exchange of advertisement is triggered by a change in the network C. Packets are routed based upon the shortest path to the destination D. Every router in an OSPF area is capable of representing the entire network topology On the topic of the OSPF hello protocol; which of the statements below are true? (Select two answer choices) A. The OSPF Hello protocol provides dynamic neighbor discovery C. The OSPF Hello protocol maintains neighbor relationships A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (Choose three) B. Restart the switch C. Delete the VLAN database D. Erase the startup configuration Which of the following technologies can be used in distance vector routing protocols to prevent routing loops? (Select all valid answer choices) C. Hold-down timers D. Split horizon Which of the following describe private IP addresses? (Choose two) B. Addresses that cannot be routed through the public Internet. D. A scheme to conserve public addresses. A TestKing Switch is connected as shown below: Which IOS commands should you enter if you wanted to link the router TestKing1 with switch port 1? (Select three answer choices) A. Switch(config)# interface fastethernet 0/1 C. Switch(config-if)# switchport mode trunk D. Switch(config-if)# switchport trunk encapsulation dot1q In EIGRP, what kind of route information is stored in the RAM of the router and main-tained by way of hello packets and update packets? (Select two answer choices) A. Neighbor Table D. Topology Table 10.What will cause a TestKing router to enter setup mode? (Choose two) A. The configuration file is missing in NVRAM. D. The setup command was issued from the privileged mode prompt. Two TestKing routers are connected together as shown in the diagram below: You work as a network administrator at TestKing.com. You attempt to telnet from the console port on Router TestKing1 to 192.1.2.65. The Telnet connection is unsuccessful. However, a ping to 192.1.2.65 is successful. What could cause this problem? (Select two) A. access control list filtering D. missing VTY password Which of the following routing protocols are less likely prone routing loops and network reachability problems when used in discontiguous networks? (Select all valid responses) A. OSPF D. EIGRP 13.An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two) A. The switch must be reachable through a port connected to its management VLAN D. The switch must be configured with an IP address, subnet mask, and default gateway What are the possible trunking modes for a switch port? (Choose three) B. Auto C. On D. Desirable Which of the following OSPF commands, when used together, will put the network 192.168.10.0/24 into OSPF area 0? (Select all valid responses) A. Router(config-router)# network 192.168.10.0 0.0.0.255 area 0 D. Router(config)# router ospf 1 16.Which interface commands would you enter on a Catalyst 2900 switch, if your goal was to bring all VLAN traffic to another directly connected switch? (Select the two valid responses) C. Switch(config-if)# switchport access vlan all D. Switch(config-if)# switchport mode trunk 练习六: 哪个是一种为一个公司到其他业务伙伴之间提供安全连接的网络。 C. Extranet(外部网络) 将下列各层从高到低排列为正确的顺序:会话层(a),示层(b),物理层(c),数据链路层(d),网络层(e),应用层(f),传输层(g)。 f,b,a,g,e,d,c 哪个使用类型字段? A. EthernetII 4.下面哪个同时具有物理星型拓扑和逻辑环型拓扑? C. 令牌环 下面哪个提供高速的基础设施,以便在存储设备和文件服务器间传送数据? A. SAN 6.哪个拓扑描述的是设备之间如何通信的? B. 逻辑 下面哪个使用吉比特以太网介质类型? D. LAN和MAN 哪个拓扑在所有设备之间使用单一线路来连接? A. 总线 9.下面哪个同时具有物理星型拓扑和逻辑环型拓扑? C. 令牌环 下面哪个使用吉比特以太网介质类型? D. LAN和MAN 哪个同时具有物理和逻辑环型拓扑? B. FDDI 下面的以太网哪个同时具有物理和逻辑总线拓扑? B. 10Base2和10Base5 用于连接一个很小地域内的连网设备,例如大厦的一层、一座大厦或一个园区? B. LAN 会话层使用下列哪种标准或协议? B. NFS 哪层提供硬件寻址? C. 数据链路 CSMA/CD代表下面哪个? B. Carrier Sense Multiple Access 哪个拓扑描述的是设备之间如何通信的? B. 逻辑 下面哪个描述可从任何位置连网的用户。 C. 移动用户 下面哪个是SAN的缺点? A. 成本 20.下面哪个可感知OSI参考模型的4―7层,以便对如何为用户获得信息做出智能的决策? A. CN 练习七: 给定如下寻址信息:192.168.37.192/25。这是一个什么类别的地址? C. 主机 关于TCP下面哪个是不正确的? D. 比UDP更高效 给定一个有25个建网比特的C类网络。能拥有多少个子网? B. 2 哪层利用高速交换机提供高速连接。 A. 核心 哪层控制广播? A. 核心 可靠的连接经历3次握手过程。把以下过程排列为正确的顺:ACK(1),SYN(2),SYN/ACK(3)。 C. 2,3,1 网络层解决以下所有的问题除了哪个? C. 通过使用物理地址分层 线路的多路复用是通过哪个的使用实现的? A. 套接字 9.网络层传输什么PDU。 A. 数据报 10.191.75.39.24是一个什么类地址? B. B 下面哪个是TCP/IP协议栈网络层协议? D. 这些都不是 12.172.16.240.256是一个什么类地址。 D. 上面都不是 给定一个子网掩码为255.255.255.248的C类网络。每个子网上有多少个主机地址? B. 6 下面哪个是有效子网掩码值? C. 255.255.254.0 哪个用于提供可靠的连接。 B. 序号和确认 CSMA/CD代表下面哪个? B. Carrier Sense Multiple Access IEEE数据链路层的哪个组件指定网络协议? A. LLC 给定一个子网掩码为255.255.255.192的B类网络。每个子网上有多少个主机地址? B. 62 哪个使用类型字段? A. EthernetII 一个A类地址有几个主机比特。 D. 24 练习八: 要查看用户输入的最后几条命令,应该键入哪条命令? D. show history 在配置模式中执行了line console 0 命令后。路由器的提示符将会是什么? B. Router(config-line)# 用户将使用哪条路由器命令查看配置寄存器的值? D. show version 哪条命令为2950 系列交换机指定默认网关? D. (config)# ip default-gate 如何挂起一个telnet会话? B. CTRL-SHIFT-6 X IOS镜像可以从以下位置加载,除了: C. NVRAM 哪条路由器命令将当前的配置保存到NVRAM? D. copy running-config start 哪个控制序列将光标移动到某一行的末尾? C. ctrl-e 程序寻找并加载IOS? B. Bootstrap 怎样进入1900 系列交换机的用户EXEC 模式? C. Enter the letter K 在用户EXEC 模式中键入e,将出现什么信息? B. % Ambiguous command: Examine interfaces,and the Ethernet 0 interface status says: Ethernet 0 is up,line protocol is down. What does this indicate? B. There is a data link layer 哪条命令为2950 系列交换机指定用户EXEC模式口令? A. password 在掉电状态下哪种类型的存储器不保留其内容? C. RAM 哪个提示符表明已处于用户EXEC模式? A. > 如果在用户EXEC模式或特权EXEC 模式中输入一条IOS不认识的命令,交换机和路由器将 B. 试图将这条命令解析为IP地址 给定一个Mac地址01A2.0482.FE12。二进制的OUI值是什么? C. 00000001.10100001.0000001 要恢复一个先前的命令,使用下面哪个控制序列? A. CTRL-P 19.利用哪条命令可以从特权EXEC 模式进入用户EXEC 模式? A. enable 要将光标向后移动一个字,应该使用哪个控制序列? A. ESC-B 练习九: 怎样进入1900 系列交换机的用户EXEC 模式? C. Enter the letter K 要将光标向后移动一个字,应该使用哪个控制序列? ESC-B 测试一: 要在路由器上启用IP路由选择,必须做什么? A. 启用路由选择协议 C. 向路由器接口分配IP地址 2.下面哪个使用吉比特以太网介质类型? D. LAN和MAN Which
/
本文档为【CCNA考试必看】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。 本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。 网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。

历史搜索

    清空历史搜索