欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    思科认证考试真题及答案9节.docx

    • 资源ID:81111899       资源大小:25.51KB        全文页数:37页
    • 资源格式: DOCX        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    思科认证考试真题及答案9节.docx

    思科认证考试真题及答案9节思科认证考试真题及答案9节 第1节 下列哪项对OSI第1层协议主要功能的描述最准确()A.成帧B.将比特从一台设备传递到另一台设备C.编址D.DLCI正确答案:B 下面哪一项正确描述了路由协议()A.允许数据包在主机间传送的一种协议B.定义数据包中的格式和用法的一种方式C.通过执行一个算法来完成路由选择的一种协议D.指定MAC地址和IP地址捆绑的方式和时间的一种协议正确答案:C 在配置0SPF时,网络管理员使用环回接口的原因是()A.只有环回地址可以用作OSPF的路由器IDB.环回接口用于设置OSPF度量C.环回地址高于配置的路由器优先级值D.环回接口是逻辑接口,不会失效正确答案:D 在一个运行OSPF的自治系统之内:()A.骨干区域自身也必须是连通的B.非骨干区域自身也必须是连通的C.必须存在一个骨干区域(区域号为0)D.非骨干区域与骨干区域必须直接相连或逻辑上相连正确答案:ACD “ipaccess-group”命令在接口上缺省的应用方向是什么"()。A.inB.具体取决于接口应用哪个访问控制列表C.outD.无缺省值正确答案:C R1上执行show ip interface brief命令的输出中显示接口S0/0/0状态码为“up”和“down”,那么以下哪种情况可能属实A.接口当前配置了shutdown命令B.R1的串行接口两端协议不同C.R1的串行接口没有安装串行电缆D.两台路由器的串行链路,只有一端配置了IP地址正确答案:B思科认证考试真题及答案9节 第2节 Why would the Ezonexam administrator change the value of the spanning-tree priority of a switch?A. in order to optimize the path that frames take from source to destinationB. to increase the priority so a designated port will become a root portC. to increase the BID, so the switch is more likely to become root bridgeD. in order to allow VLANs to be sent from one switch to another across a single linkE. to force a given switch to become an STP serverF. None of the above正确答案:AA 解析:Explanation:The Bridge Priority is used to measure the preference of a bridge in the spanning-tree Algorithm. The possible values range between 0 and 65,535. The default setting is 32,768. By adjusting the priority, the root bridge can be manually assigned to meet the needs of the network administrator. Which command on router EzonexamA will assign the last usable IP address from the 192.168.32.128/28 subnetwork to a router interface?A. EzonexamA(config-if) ip address 192.168.32.142 255.255.255.240B. EzonexamA(config-if) ip address 192.168.32.143 255.255.255.240C. EzonexamA(config-if) ip address 192.168.32.158 255.255.255.240D. EzonexamA(config-if) ip address 192.168.32.145 255.255.255.240E. EzonexamA(config-if) ip address 192.168.32.144 255.255.255.240F. EzonexamA(config-if) ip address 192.168.32.158 255.255.255.240G. None of the above正确答案:AA 解析:Explanation:The last usable IP address would be 128 + (16-2) = 142 because only the last 4 bits of the last octet are used for host addressing. 通过路由器的“配置端口console”对路由器进行配置,应该使用的线缆为()A.交叉线缆B.直通线缆C.反转线缆D.任意线缆正确答案:C 禁止RIP协议的路由聚合功能的命令是()A.noripB.no-summanyC.noauto-summanyD.nonetwork 10.0.0.0正确答案:C 在路由器上,命令show access-list的功能是()A.显示访问控制列表内容B.显示路由表内容C.显示端口配置信息D.显示活动配置文件正确答案:A 以下哪些答案列出了一个可用于标准编号IPACL的有效数字()A.1987B.2187C.187D.87正确答案:AD思科认证考试真题及答案9节 第3节 哪一个命令可以设置路由器特权用户的“明文密码”()A.enable passwordB.passwordC.enable secretD.secret正确答案:A要在连接到服务器的端口上禁用STP,可使用下面哪个命令?()A.disable spanning-treeB.spanning-tree offC.spanning-tree securityD.spanning-tree portfast答案:D You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?A225.225.224.0.B225.225.240.0.C225.225.255.0.D255.255.255.224E225.225.255.240正确答案:D解析:Explanation:ThedefaultsubnetmaskforclassCnetworkis255.255.255.0.Ifonehastocreate5subnets,then3bitsarerequired.With3bitswecancreate8subnets.Theremaining5bitsareusedforHosts.Onecancreate30hostsusing5bitsinhostfield.Thismatcheswiththerequirement.IncorrectAnswers:A,B:ThisisanillegalsubnetmaskforaclassCnetwork,asthethirdoctetcannotbedividedwhenusingaclassCnetwork.C:ThisisthedefaultsubnetmaskforaclassCnetwork.Itprovidesforonenetwork,with254usablehostIPaddresses.E:Thissubnetmaskwillprovidefor14separatenetworkswith14hostseach.Thisdoesnotmeettherequirementofaminimumof18hosts. 路由器“全局模式”的提示符为()A.>B.C.(config)D.(config-router)正确答案:C下面哪项是一种第2层协议,用于确保网络没有环路?()A.VTPB.STPC.RIPD.CDP答案:B Ezonexam has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?AVTP will allow physically redundant links while preventing switching loopsBVTP will allow switches to share VLAN configuration informationCVTP will allow a single port to carry information to more than one VLANDVTP will allow for routing between VLANsENone of the above正确答案:B思科认证考试真题及答案9节 第4节配置LACP时,在要使用的接口上必须将哪三个参数配置得完全相同?()A.虚拟MAC地址B.端口速度C.双工模式D.PortFastE.VLAN信息答案:BCE While troubleshooting a network connectivity problem, a Ezonexam technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?A. The data link layerB. The application layerC. The protocol layerD. The access layerE. The session layerF. The network layerG. None of the above正确答案:FF The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)AConfigure port Fa0/1 to accept connections only from the static IP address of the serverBConfigure the MAC address of the server as a static entry associated with port Fa0/1CEmploy a proprietary connector type on Fa0/1 that is incomputable with other host connectorsDConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverEBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address正确答案:BD解析:Explanation:You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port.When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host. The port's behavior. depends on how you configure it to respond to a security violation. When a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation. 请参见图示。主机A无法访问Internet。此问题的原因是什么A.主机A的IP地址不正确B.主机A的默认网关不正确C.两台路由器的Fa0/1接口配置了不同的子网D.R1Fa0/0的子网掩码不正确正确答案:C 路由器上,设置端口速率的命令是()A.clock rateB.bandwidthC.setD.encap正确答案:B Which of the following a true statements regarding the use of VLANs to segment a network? (Select three)A. They increase the size of collision domainsB. They allow logical grouping of users by function.C. They can enhance network security.D. They increase the size of the broadcast domain while decreasing the number of collision domains.E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.F. They simplify switch administration.正确答案:BCEB,C,E 解析:Explanation:VLANs are used to segment a LAN into multiple, smaller LANs. This can be used to enhance security as local traffic from one VLAN will not be passed to users in other VLANS.Incorrect Answers:A. VLANs are used to decrease the size of a collision domain, not increase it.D. The opposite is true.F. The default operation of a switch is to allow all traffic and to enable all ports in VLAN1. The use of VLANs will increase the complexity of the switch environment, making for more difficult administration.思科认证考试真题及答案9节 第5节 请参见图示10.4.0.0网络发生故障哪种机制可防止R2接收有关10.4.0.0网络的错误更新信息()A.水平分割B.抑制计时器C.路由毒化D.触发更新正确答案:A 请参见图示图中的所有网络都带有/24前缀假设网络中的所有路由器均已获知所有路由,哪个地址最适合总结图中的网络()A.192.168.8.0/21B.192.168.8.0/24C.192.168.16.0/24D.192.168.16.0/21正确答案:D While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?AThe data link layerBThe application layerCThe access layerDThe session layerEThe network layer正确答案:E解析:Explanation:TCP/IP includes ICMP, a protocol designed to help manage and control the operation of a TCP/IP network. The ICMP protocol provides a wide variety of information about a network's health and operational status. Control message is the most descriptive part of a name. ICMP helps control and manage IP's work and therefore is considered part of TCP/IP's network layer.你使用命令copy runningconfig startupconfig保存路由器的配置,并重启路由器,但路由器启动后没有任何运行配置。请问可能出现了什么问题?()A.启动路由器时使用的命令不对B.NVRAM受损C.配置寄存器的设置不正确D.新升级到的IOS与路由器硬件不兼容E.保存的配置与硬件不兼容答案:C The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)AConfigure port Fa0/1 to accept connections only from the static IP address of the serverBConfigure the MAC address of the server as a static entry associated with port Fa0/1CEmploy a proprietary connector type on Fa0/1 that is incomputable with other host connectorsDConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverEBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address正确答案:BD解析:Explanation:You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port.When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host. The port's behavior. depends on how you configure it to respond to a security violation. When a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation. IP扩展访问列表的数字标示范围是多少()。A.0-99B.1-99C.100-199D.101-200正确答案:C思科认证考试真题及答案9节 第6节 VLAN主干协议VTP的默认工作模式是()A.服务器模式B.客户端模式C.透明模式D.以上三者都不是正确答案:A 下列哪种广域网连接方式是电路交换()A.ISDNB.E1C.DDND.Frame-relay正确答案:A 下列有关标准ACL和扩展ACL的说法中哪两种正确()A.扩展ACL仅过滤源地址,必须放置在靠近目的地址的位置B.通常放置标准ACL后,所有数据包会通过网络并在目的地被过滤C.过滤要求较复杂时(例如根据特定协议进行过滤)使用标准ACLD.扩展ACL根据多种条件进行过滤,其放置在靠近源地址的位置,以减少通过网络的流量。正确答案:BD CHAP验证属于双向认证。此题为判断题(对,错)。正确答案: The Ezonexam network Topology is displayed in the exhibit below:A switch has been configured for three different VLANs: VLAN 2, VLAN 3, and VLAN 4. For the purposes of communication between VLANs a router is to be added. Host from one VLAN should be able to reach the hosts in the other VLANs.Based on this requirement, what type of connection is acceptable between the router and switch?(Select all valid answers)A10 Mbps EthernetB56 kbps serialC100 Mbps EthernetD1,544 Mbps serialE1000 Mbps Ethernet正确答案:CE解析:Explanation:Forallhoststobeabletoreacheachother,inter-VLANroutingwillneedtobeconfigured.InordertoprovideInter-VLANroutingbetweentherouterandtheswitch,atrunkwillneedtobesetup.ThistrunkcanbeeitherISLor802.1Q.Onarouter,theinterfacethatistobeusedasthetrunkcanbe100MbpsEthernet,GigabitEthernet,or10GigabitEthernet.Therefore,onlychoicesCorEarecorrect. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode正确答案:BB 解析:Explanation:Understanding How Port Security Works:You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.思科认证考试真题及答案9节 第7节 You are working as a network technician at Ezonexam University, when you get a call from the Engineering Faculty. They're complaining that they're receiving obsolete information from the Business Faculty's network traffic broadcasts.What can you do to contain the Business Faculty's broadcast while still keeping it connected to the internet and the enterprise services of the University? (Select all valid answer choices)A. Use half and full-duplex Ethernet on the Engineering Department LANB. Establish

    注意事项

    本文(思科认证考试真题及答案9节.docx)为本站会员(w***)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开