2022思科认证历年真题和解答6卷.docx
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《2022思科认证历年真题和解答6卷.docx》由会员分享,可在线阅读,更多相关《2022思科认证历年真题和解答6卷.docx(33页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2022思科认证历年真题和解答6卷2022思科认证历年真题和解答6卷 第1卷 路由表中的直接路由(Direct)可能有以下几种来源()A.本路由器自身接口的主机路由B.本路由器自身接口所在的网段路由C.与本路由器直连的对端路由器的接口的主机路由D.缺省路由正确答案:ABC IGP包括如下哪些协议()A.RIPB.BGPC.IS-ISD.OSPF正确答案:ACD During startup, router VE1 displays the following error message:boot: cannot open flash:What will VE1 do next?A. It wi
2、ll attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.B. It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM.C. It will attempt to locate the configuration file from a TFTP server. If this
3、 fails, it will load a limited configuration from ROM.D. Because of damaged flash memory, the router will fail the POST.E. It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.F. None of the above正确答案:BB 解析:Explanation:The boot sequence of a Cisco ro
4、uter is shown below:Booting up the router and locating the Cisco IOS1. POST (power on self test)2. Bootstrap code executed3. Check Configuration Register value (NVRAM) which can be modified using the config-register command0 = ROM Monitor mode1 = ROM IOS2 - 15 = startup-config in NVRAM4. Startup-con
5、fig file: Check for boot system commands (NVRAM)If boot system commands in startup-configa. Run boot system commands in order they appear in startup-config to locate the IOSb. If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?If no boot system commands
6、in startup-config use the default fallback sequence in locating the IOS:a. Flash (sequential)b. TFTP server (netboot)c. ROM (partial IOS) or keep retrying TFTP depending upon router model5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for l
7、ocating the IOS and then it will enter setup mode or the setup dialogue.6. If no IOS can be loaded, the router will get the partial IOS version from ROM Two stations on the Ezonexam LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network? (Choose
8、all that apply)AEach device on the Ethernet segment stops transmitting for a short time.BA jam signal informs all devices that a collision occurred.CWhen data transmission resumes, the devices that were involved in the collision have priority to transmit.DThe devices that are involved in the collisi
9、on stops transmitting for a short time.EThe collision invokes a random back-off algorithm.正确答案:BDE解析:Explanation:When a host on an Ethernet LAN has information to send, the following steps are taken:1. A device with a frame. to send listens until Ethernet is not busy.2. When the Ethernet is not busy
10、, the sender begins sending the frame.3. The sender listens to make sure that no collision occurred.4. Once the senders hear the collision, they each send a jamming signal, to ensure that all stations recognize the collision.5. After the jamming is complete, each sender randomizes a timer and waits
11、that long.6. When each timer expires, the process starts over with step 1.Incorrect Answers:A. Only the stations involved in the collision stop transmitting for a short time, not all stations on the LAN.C. No priority is given to any stations once a collision has occurred. The network administrator
12、has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?ATo prevent unauthorized hosts from getting access to the LANBTo limit the number of Layer 2 broadcasts on a particular switch portCTo prevent unauthorized Telnet or S
13、SH access to a switch portDTo prevent the IP and MAC address of the switch and associated portsENone of the above正确答案:A解析:Explanation:You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you
14、 assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full band
15、width of the port.If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a s
16、ecure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. IP地址为:192.168.50.70,掩码为:255.255.255.248,则该IP地址所在子网的子网有效IP为()A.192.168.50.33-192.168.50.39B.192.168.50.41-192.168.50.50C.192.168.50.65-192.168.50.70D.192.168.50.66-192.168.50.75正
17、确答案:C 网络中经常使用“帧中继”服务,请选出帧中继的优点()A.偷占带宽B.提供拥塞管理机制C.可以使用任意广域网协议D.灵活的接入方式正确答案:ABD Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)AFull-duplex Ethernet uses CSMA/CD to prevent collisions.BHalf-duplex Ethernet
18、 uses a loopback circuit to detect collisions.CA full-duplex Ethernet card allows 20Mbps for data transmission.DFull-duplex Ethernet makes use of two pairs of wires for data.EAn Ethernet hub can operate both half and full duplex simultaneously.正确答案:BD解析:Explanation:Half-duplex Ethernet send and rece
19、ives on the same line, so a loopback needs to be set to detect collisions. Alternatively, full-duple Ethernet doesnt have to because it uses two pairs of wire, one to send and the other to receive. Collisions are not possible on full duplex Ethernet networks.Incorrect Answers:A. Full duplex uses bot
20、h pairs of wires, so transmissions are sent on the first pair, and data that is received come in on the other pair. This prevents collisions.C. Full duplex allows for data to be sent and received at the same time. It will not double the amount of bandwidth at any given time. The speed of the Etherne
21、t link will remain at 10/100.E. Hubs are shared devices and can only support one mode, unlike switches.2022思科认证历年真题和解答6卷 第2卷 路由器“全局模式”的提示符为()A.B.C.(config)D.(config-router)正确答案:C 禁止RIP协议的路由聚合功能的命令是()A.noripB.no-summanyC.noauto-summanyD.nonetwork 10.0.0.0正确答案:C Which of the following components must
22、be elected before the Spanning Tree Protocol can converge in a switched LAN?A. Designated ports.B. Duplex operating mode.C. Fast mode ports.D. Root bridge.E. Root ports.F. BDPU priority.正确答案:ADEA,D,E 解析:Explanation:Designated port: Either a root port or a port that has been determined as having the
23、best (lower) cost-a designated port will be marked as a forwarding port. Root bridge: The root bridge is the bridge with the best bridge ID. With STP, the key is for all the switches in the network to elect a root bridge that becomes the focal point in the network. All other decisions in the network
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2022 思科 认证 历年 解答
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内