zoukankan      html  css  js  c++  java
  • CCNA 例题精选

    3. Refer to the exhibit. Whichtwo statements are true about interVLAN routing in the topology that is shownin the exhibit?

    (Choose two.)

    A.  Host E and host F use the sameIP gateway address.

    B.  Router1 and Switch2 should beconnected via a crossover cable.

    C.  Router1 will not play a role incommunications between host A and host D.

    D.  The FastEthernet 0/0 interfaceon Router1 must be configured with subinterfaces.

    E.  Router1 needs more LANinterfaces to accommodate the VLANs that are shown in the exhibit.

    F.  The FastEthernet 0/0 interfaceon Router1 and Switch2 trunk ports must be configured using the sameencapsulation type.

    Answer:DF

    4. Refer to the exhibit. Whichtwo statements are true about the loopback address that is configured onRouterB? (Choose two.)

    A.  It ensures that data will beforwarded by RouterB.

    B.  It provides stability for theOSPF process on RouterB.

    C.  It specifies that the router IDfor RouterB should be 10.0.0.1.

    D.  It decreases the metric forroutes that are advertised from RouterB.

    E.  It indicates that RouterBshould be elected the DR for the LAN.

    Answer:BC

    5. A network administrator isexplaining VTP configuration to a new technician. What should the networkadministrator tell the new technician about VTP configuration? (Choose three.)

    A.  A switch in the VTP client modecannot update its local VLAN database.

    B.  A trunk link must be configuredbetween the switches to forward VTP updates.

    C.  A switch in the VTP server modecan update a switch in the VTP transparent mode.

    D.  A switch in the VTP transparentmode will forward updates that it receives to other switches.

    E.  A switch in the VTP server modeonly updates switches in the VTP client mode that have a higher VTP revisionnumber.

    F.  A switch in the VTP server modewill update switches in the VTP client mode regardless of the configured VTPdomain membership.

    Answer:ABD

    8. Refer to the exhibit. Bothswitches are using a default configuration. Which two destination addresseswill host 4 use to send data to host 1?

    (Choose two.)

    A.  the IP address of host 1

    B.  the IP address of host 4

    C.  the MAC address of host 1

    D.  the MAC address of host 4

    E.  the MAC address of the Fa0/0interface of the R1 router

    F.  the MAC address of the Fa0/1interface of the R1 router

    Answer:AF

    9. Refer to the exhibit. Therouter has been configured with these commands:

    hostname Gateway interfaceFastEthernet 0/0

    ip address 198.133.219.14255.255.255.248 no shutdown interface FastEthernet 0/1

    ip address 192.168.10.254255.255.255.0 no shutdown

    interface Serial 0/0

    ip address 64.100.0.2255.255.255.252 no shutdown

    ip route 0.0.0.0 0.0.0.064.100.0.1

    What are the two results ofthis configuration?

    (Choose two.)

    A.  The default route should have anext hop address of 64.100.0.3.

    B.  Hosts on the LAN that isconnected to FastEthernet 0/1 are using public IP addressing.

    C.  The address of the subnetsegment with the WWW server will support seven more servers.

    D.  The addressing scheme allowsusers on the Internet to access the WWW server.

    E.  Hosts on the LAN that isconnected to FastEthernet 0/1 will not be able to access the Internet withoutaddress translation.

    Answer:DE

    11. What are two benefits ofusing VTP in a switching environment? (Choose two.)

    A.  It allows switches to readframe tags.

    B.  It allows ports to be assignedto VLANs automatically.

    C.  It maintains VLAN consistencyacross a switched network.

    D.  It allows frames from multipleVLANs to use a single interface.

    E.  It allows VLAN information tobe automatically propagated throughout the switching environment.

    Answer:CE

    12. Which two statements aretrue about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?

    (Choosetwo.)

    A.  It establishes a static routeto the 172.16.3.0 network.

    B.  It establishes a static routeto the 192.168.2.0 network.

    C.  It configures the router tosend any traffic for an unknown destination to the 172.16.3.0 network.

    D.  It configures the router tosend any traffic for an unknown destination out the interface with the address192.168.2.4.

    E.  It uses the defaultadministrative distance.

    F.  It is a route that would beused last if other routes to the same destination exist.

    Answer:AE

    13. What are two advantages ofLayer 2 Ethernet switches over hubs?

    (Choose two.)

    A.  decreasing the number ofcollision domains

    B.  filtering frames based on MACaddresses

    C.  allowing simultaneous frametransmissions

    D.  increasing the size ofbroadcast domains

    E.  increasing the maximum lengthof UTP cabling between devices

    Answer:BC

    14. Refer to the exhibit. Anetwork associate needs to configure the switches and router in the graphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server inVLAN2. Which two Ethernet segments would need to be configured as trunk links?(Choose two.)

    A.  A

    B.  B

    C.  C

    D.  D

    E.  E

    F.  F

    Answer:CF

    15. Which two values are usedby Spanning Tree Protocol to elect a root bridge? (Choose two.)

    A.  amount of RAM

    B.  bridge priority

    C.  IOS version

    D.  IP address

    E.  MAC address

    F.  speed of the links

    Answer:BE

    16. Refer to the exhibit.Assume that the routing protocol referenced in each choice below is configuredwith its default settings and the given routing protocol is running on all therouters. Which two conditional statements accurately state the path that willbe chosen between networks 10.1.0.0 and 10.3.2.0 for the routing protocolmentioned? (Choose two.)

    A.  If OSPF is the routingprotocol, the path will be from R1 to R3 to R4 to R5.

    B.  If OSPF is the routingprotocol, the path will be from R1 to R2 to R5.

    C.  If OSPF is the routingprotocol, the path will be from R1 to R5.

    D.  If RIPv2 is the routingprotocol, the path will be from R1 to R3 to R4 to R5.

    E.  If RIPv2 is the routingprotocol, the path will be from R1 to R5.

    Answer:AE

    17. Refer to the exhibit. Anetwork administrator is adding two new hosts to SwitchA. Which three valuescould be used for the configuration of these hosts? (Choose three.)

    A.  host A IP address: 192.168.1.79

    B.  host A IP address: 192.168.1.64

    C.  host A default gateway:192.168.1.78

    D.  host B IP address:192.168.1.128

    E.  host B default gateway:192.168.1.129

    F.  host B IP address:192.168.1.190

    Answer:ACF

    35. Refer to the exhibit. Whichstatement is true?

    A.  The Fa0/11 role confirms thatSwitchA is the root bridge for VLAN 20.

    B.  VLAN 20 is running the Per VLANSpanning Tree Protocol.

    C.  The MAC address of the rootbridge is 0017.596d.1580.

    D.  SwitchA is not the root bridge,because not all of the interface roles are designated.

    通过图我们能够立即推断出SWA不是vlan20的根桥。由于F0/12是堵塞port。而且桥ID大于Root ID.

    Answer:D

    44. For which type ofconnection should a straight-through cable be used?

    A.  switch to switch

    B.  switch to hub

    C.  switch to router

    D.  hub to hub

    E.  router to PC

    Answer:C

    45. Which set of commands isrecommended to prevent the use of a hub in the access layer?

    A.  switch(config-if)#switchportmode trunk switch(config-if)#switchport port-security maximum 1

    B.  switch(config-if)#switchportmode trunk

    C.  switch(config-if)#switchportport-security mac-address 1

    D.  switch(config-if)#switchportmode access switch(config-if)#switchport port-security maximum 1

    E.  switch(config-if)#switchportmode access switch(config-if)#switchport port-security mac-address 1

    Answer:C

    48. Which type of cable is usedto connect the COM port of a host to the COM port of a router or switch?

    A.  crossover

    B.  straight-through

    C.  rolled

    D.  shielded twisted-pair

    Answer:C

    52. Which layer of the OSIreference model uses the hardware address of a device to ensure messagedelivery to the proper host on a LAN?

    A.  physical

    B.  data link

    C.  network

    D.  transport

    Answer:B

    53. Which layer of the OSIreference model uses flow control, sequencing, and acknowledgements to ensurethat reliable networking occurs?

    A.  data link

    B.  network

    C.  transport

    D.  presentation E. physical

    Answer:C

    55. Which IP address can beassigned to an Internet interface?

    A.  10.180.48.224

    B.  9.255.255.10

    C.  192.168.20.223

    D.  172.16.200.18

    Answer:B

    63. Which line from the outputof the show ip interface command indicates a layer 1 problem?

    A.  Serial0/1 is up, line protocolis down

    B.  Serial0/1 is down, lineprotocol is down

    C.  Serial0/1 is up, line protocolis up

    D.  Serial0/1 is administrativelydown, line protocol is down

    Answer:B

    67. What is the name of the VTPmode of operation that enables a switch to forward only VTP advertisementswhile still permitting the editing of local VLAN information?

    A.  server

    B.  client

    C.  tunnel

    D.  transparent

    Answer:D

    70. Refer to the exhibit. WhichVLSM mask will allow for the appropriate number of host addresses for NetworkA?

    A.  /25

    B.  /26

    C.  /27

    D.  /28

    Answer:A

    71. Refer to the exhibit. Whichsubnet mask will place all hosts on Network B in the same subnet with the leastamount of wasted addresses?

    A.  255.255.255.0

    B.  255.255.254.0

    C.  255.255.252.0

    D.  255.255.248.0

    Answer:B

    72. Refer to the exhibit. Whichmask is correct to use for the WAN link between the routers that will provideconnectivity while wasting the least amount of addresses?

    A.  /23

    B.  /24

    C.  /25

    D.  /30

    Answer:D

    73. Refer to the exhibit. Whatis the most appropriate summarization for these routes?

    A. 10.0.0.0 /21

    B.  10.0.0.0 /22

    C.  10.0.0.0 /23

    D.  10.0.0.0 /24

    Answer:B

    77. Which two link protocolsare used to carry multiple VLANs over a single link? (Choose two.)

    A.  VTP

    B.  802.1q

    C.  IGP

    D.  ISL

    E.  802.3u

    Answer:BD

    78. Which two protocols areused by bridges and/or switches to prevent loops in a layer 2 network?

    (Choose two.)

    A.  802.1d

    B.  VTP

    C.  802.1q

    D.  STP E. SAP

    Answer:AD

    79. On the network131.1.123.0/27, what is the last IP address that can be assigned to a host?

    A.  131.1.123.30

    B. 131.1.123.31

    C. 131.1.123.32

    D. 131.1.123.33

    Answer:A

    80. The ip subnet zero commandis not configured on a router. What would be the IP address of Ethernet 0/0using the first available address from the sixth subnet of the network192.168.8.0/29?

    A.  192.168.8.25

    B.  192.168.8.41

    C.  192.168.8.49

    D.  192.168.8.113

    Answer:C

    81. For the network192.0.2.0/23, which option is a valid IP address that can be assigned to ahost?

    A. 192.0.2.0

    B. 192.0.2.255

    C. 192.0.3.255

    D.  192.0.4.0

    Answer:B

    85. Which switch would STPchoose to become the root bridge in the selection process?

    A.  32768: 11-22-33-44-55-66

    B.  32768: 22-33-44-55-66-77

    C.  32769: 11-22-33-44-55-65

    D.  32769: 22-33-44-55-66-78

    Answer:A

    86. A switch is configured withall ports assigned to vlan 2 with full duplex FastEthernet to segment existingdepartmental traffic. What is the effect of adding switch ports to a new VLANon the switch?

    A.  More collision domains will becreated.

    B.  IP address utilization will bemore efficient.

    C.  More bandwidth will be requiredthan was needed previously.

    D.  An additional broadcast domainwill be created.

    Answer:D

    87. Which two statements aboutthe use of VLANs to segment a network are true?

    (Choose two.)

    A.  VLANs increase the size ofcollision domains.

    B.  VLANs allow logical grouping ofusers by function.

    C.  VLANs simplify switchadministration.

    D.  VLANs enhance network security.    

     这个题目考查的还是VLAN的作用

    不外乎三个逻辑上隔开port

    添加安全性与隔离广播域

     

    从中选就能够了。

    Answer:BD

    88. On corporate network, hostson the same VLAN can communicate with each other, but they are unable tocommunicate with hosts on different VLANs. What is needed to allowcommunication between the VLANs?

    A.  a router with subinterfacesconfigured on the physical interface that is connected to the switch

    B.  a router with an IP address onthe physical interface connected to the switch

    C.  a switch with an access linkthat is configured between the switches

    D.  a switch with a trunk link thatis configured between the switches

    Answer:A

    94. An administrator attempts atraceroute but receives a "Destination Unreadable" message. Whichprotocol is responsible for that message?

    A.  RARP

    B.  RUDP

    C.  ICMP

    D.  SNMP

    Answer:C

    100. Which two addresses can beassigned to a host with a subnet mask of 255.255.254.0? (Choose two.)

    A.  113.10.4.0

    B.  186.54.3.0

    C.  175.33.3.255

    D.  26.35.2.255 E. 17.35.36.0

    Answer:BD

    101. The network administratorhas asked you to check the status of the workstation's IP stack by pinging theloopback address. Which address would you ping to perform this task?

    A.  10.1.1.1

    B.  127.0.0.1

    C.  192.168.0.1

    D.  239.1.1.1

    Answer:B

    107. Which command is used toconfigure a default route?

    A.  ip route 172.16.1.0255.255.255.0 0.0.0.0

    B.  ip route 172.16.1.0255.255.255.0 172.16.2.1

    C.  ip route 0.0.0.0 255.255.255.0172.16.2.1

    D.  ip route 0.0.0.0 0.0.0.0172.16.2.1

    Answer:D

    147. Refer to the exhibit.Which value will be configured for Default Gateway of the Local AreaConnection?

    A.  10.0.0.0

    B.  10.0.0.254

    C.  192.223.129.0

    D.  192.223.129.254

    Answer:B

    151. Refer to the exhibit. Whatwill happen to HTTP traffic coming from the Internet that is destined for172.16.12.10 if the traffic is processed by this ACL?

    A.  Traffic will be dropped perline 30 of the ACL.

    B.  Traffic will be accepted perline 40 of the ACL.

    C.  Traffic will be dropped,because of the implicit deny all at the end of the ACL.

    D.  Traffic will be accepted,because the source address is not covered by the ACL.

    Answer:C

    190. Refer to the diagram. Allhosts have connectivity with one another. Which statements describe theaddressing scheme that is in use in the network?

    (Choose three.)

    A.  The subnet mask in use is255.255.255.192.

    B.  The subnet mask in use is255.255.255.128.

    C.  The IP address 172.16.1.25 canbe assigned to hosts in VLAN1

    D.  The IP address 172.16.1.205 canbe assigned to hosts in VLAN1

    E.  The LAN interface of the routeris configured with one IP address.

    F.  The LAN interface of the routeris configured with multiple IP addresses.

    Answer:BCF

    191. Refer to the diagram.Which three statements describe the router port configuration and the switchport configuration as shown in the topology? (Choose three.)

    A.  The Router1 WAN port is configured as atrunking port.

    B.  The Router1 port connected to Switch1 isconfigured using subinterfaces.

    C.  The Router1 port connected to Switch1 isconfigured as 10 Mbps.

    D.  The Switch1 port connected to Router1 isconfigured as a trunking port.

    E.  The Switch1 port connected to Host B isconfigured as an access port.

    F.  The Switch1 port connected to Hub1 isconfigured as full duplex.

    Answer: BDE

    192. Which routing protocolswill support the following IP addressing scheme?

    (Choose three.)

    Network 1 -192.168.10.0 /26

    Network 2 -192.168.10.64 /27

    Network 3 -192.168.10.96 /27

    Network 4 -192.168.10.128 /30

    Network 5 -192.168.10.132 /30

    A.  RIP version 1

    B.  RIP version 2

    C.  IGRP

    D.  EIGRP

    E.  OSPF

    Answer:BDE

    198. Anetwork associate is trying to understand the operation of the FLD Corporationby studying the network in the exhibit. The associate knows that the server inVLAN 4 provides the necessary resources to support the user hosts in the otherVLANs. The associate needs to determine which interfaces are access ports.Which interfaces are access ports? (Choose three.)

    A.  Switch1 -Fa 0/2

    B.  Switch1 -Fa 0/9

    C.  Switch2 -Fa 0/3

    D.  Switch2 -Fa 0/4

    E.  Switch2 -Fa 0/8

    F.  Router -Fa 1/0

    Answer:ACD

    199. Refer to the exhibit.Which destination addresses will Host A use to send data to Host B? (Choose two.)

    A. the IP address of Switch1

    B.  the IP address of Router1 Fa0/0

    C.  the IP address of HostB

    D.  the MAC address of Switch1

    E.  the MAC address of Router1 Fa0/0

    F.  the MAC address of HostB

    Answer:CE

    200. The network securitypolicy requires that only one host be permitted to attach dynamically to eachswitch interface. If that policy is violated, the interface should shut down.Which two commands must the network administrator configure on the 2950Catalyst switch to meet this policy? (Choose two.)

    A.  Switch1(config-if)# switchportport-security maximum 1

    B.  Switch1(config)#mac-address-table secure

    C.  Switch1(config)# access-list 10permit ip host

    D.  Switch1(config-if)# switchportport-security violation shutdown

    E.  Switch1(config-if)# ipaccess-group 10

    Answer:AD

    201. Refer to the graphic. Astatic route to the 10.5.6.0/24 network is to be configured on the HFD router.Which commands will accomplish this? (Choose two.)

    A.  HFD(config)# ip route 10.5.6.00.0.0.255 fa0/0

    B.  HFD(config)# ip route 10.5.6.00.0.0.255 10.5.4.6

    C.  HFD(config)# ip route 10.5.6.0255.255.255.0 fa0/0

    D.  HFD(config)# ip route 10.5.6.0255.255.255.0 10.5.4.6

    E.  HFD(config)# ip route 10.5.4.60.0.0.255 10.5.6.0

    F.  HFD(config)# ip route 10.5.4.6255.255.255.0 10.5.6.0

    Answer:CD

    205. Refer to the graphic. Host1 cannot receive packets from Host 2. Assuming that RIP v1 is the routingprotocol in use, what is wrong with the IP configuration information shown?

    (Choose two.)

    A.  The fa0/1 interface of routerR2 has been assigned a broadcast address.

    B.  The fa0/1 network on router R2overlaps with the LAN attached to R1.

    C.  Host 2 has been assigned theincorrect subnet mask.

    D.  Host 1 has been configured withthe 255.255.248.0 subnet mask.

    E.  Host 2 on router R2 is on adifferent subnet than its gateway.

    Answer:BC

    206. What are three validreasons to assign ports to VLANs on a switch?

    (Choose three.)

    A.  to make VTP easier to implement

    B.  to isolate broadcast traffic

    C.  to increase the size of thecollision domain

    D.  to allow more devices toconnect to the network

    E.  to logically group hostsaccording to function

    F.  to increase network security

    Answer:BEF

    207.Refer to the topology shown in the exhibit. Which ports will be STP designatedports if all the links are operating at the same bandwidth? (Choose three.)

    A.  Switch A -Fa0/0

    B.  Switch A -Fa0/1

    C.  Switch B -Fa0/0

    D.  Switch B -Fa0/1

    E.  Switch C -Fa0/0

    F.  Switch C -Fa0/1

    Answer:BCD

    208. Which statements describetwo of the benefits of VLAN Trunking Protocol? (Choose two.)

    A.  VTP allows routing betweenVLANs.

    B.  VTP allows a single switch portto carry information to more than one VLAN.

    C.  VTP allows physically redundantlinks while preventing switching loops.

    D.  VTP simplifies switchadministration by allowing switches to automatically share VLAN configurationinformation.

    E.  VTP helps to limitconfiguration errors by keeping VLAN naming consistent across the VTP domain.

    F.  VTP enhances security bypreventing unauthorized hosts from connecting to the VTP domain.

    Answer:DE

    209. What are two results ofentering the Switch(config)# vtp mode client command on a Catalyst switch?

    (Choose two.)

    A.  The switch will ignore VTPsummary advertisements.

    B.  The switch will forward VTPsummary advertisements.

    C.  The switch will process VTPsummary advertisements.

    D.  The switch will originate VTPsummary advertisements.

    E.  The switch will create, modifyand delete VLANs for the entire VTP domain.

    Answer:BC

    210. A network administratorissues the ping 192.168.2.5 command and successfully tests connectivity to ahost that has been newly connected to the network. Which protocols were usedduring the test? (Choose two.)

    A.  ARP

    B.  CDP

    C.  DHCP

    D.  DNS

    E.  ICMP

    Answer:AE

    211. Refer to the exhibit. HostA is to send data to Host B. How will Router1 handle the data frame receivedfrom Host A? (Choose three.)

    A.  Router1 will strip off thesource MAC address and replace it with the MAC address on the forwardingFastEthernet interface.

    B.  Router1 will strip off thesource IP address and replace it with the IP address on the forwardingFastEthernet interface.

    C.  Router1 will strip off thedestination MAC address and replace it with the MAC address of Host B.

    D.  Router1 will strip off thedestination IP address and replace it with the IP address of Host B.

    E.  Router1 will forward the dataframe out interface FastEthernet0/1.

    F.  Router1 will forward the dataframe out interface FastEthernet0/2.

    Answer:ACF

    212. Refer to the exhibit. Whatwill Router1 do when it receives the data frame shown? (Choose three.)

    A.  Router1 will strip off thesource MAC address and replace it with the MAC address 0000.0c36.6965.

    B.  Router1 will strip off thesource IP address and replace it with the IP address 192.168.40.1.

    C.  Router1 will strip off thedestination MAC address and replace it with the MAC address 0000.0c07.4320.

    D.  Router1 will strip off thedestination IP address and replace it with the IP address of 192.168.40.1.

    E.  Router1 will forward the datapacket out interface FastEthernet0/1.

    F.  Router1 will forward the datapacket out interface FastEthernet0/2.

    Answer:ACF

    315. 

    Answer: 

    321. 

    Answer: 

    325. 

    Answer: 

    338. All hosts in the samesubnet with 172.16.5.118/26 must be denied Telnet access to hosts outside theLAN. To complete the bracketed command, [ access-list list-number deny tcp172.16.5.__ address 0.0.0.__ mask___ any eq port__], drag each appropriateoption on the left to its proper placeholder on the right. (Not all options areused.)

    Answer: 

  • 相关阅读:
    烟台的两大建筑均初具规模,看一看现在的样子。
    ExpressBars Suite V6.29的安装
    又是一年返乡时,春运又开始了!
    C# 3.0新特性之扩展方法
    ObservableCollection<T> 类
    ControlTemplate和ItemTemplate的区别
    teechart属性和方法
    UpdateSourceTrigger 属性控制绑定源更新的执行时间
    "Lc.exe已退出 代码为1 "
    ObservableCollection 类
  • 原文地址:https://www.cnblogs.com/bhlsheji/p/5357853.html
Copyright © 2011-2022 走看看