思科网络技术学院复习题.doc_第1页
思科网络技术学院复习题.doc_第2页
思科网络技术学院复习题.doc_第3页
思科网络技术学院复习题.doc_第4页
思科网络技术学院复习题.doc_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

思科网络技术学院复习题广西大学思科网络技术学院 2006.9第一部分、网络基础1、Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model? A. data, segments, frames, packets, bits B. data, packets, segments, frames, bitsC. data, segments, packets, frames, bitsD. data, packets, frames, segments, bits2、Which protocols are TCP/IP application layer protocols? (Choose two.) A. UDP B. FTP C. IP D. SMTP E. TCP3、Which of the following are primary functions of a router? (Choose two.) A. packet switching B. microsegmentation C. domain name resolution D. path selection E. flow control4、Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.)A. Ethernet switch B.DTE C. ModemD. hubE. DCE device F. CSU/DSU5、A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?A. FTP and SNMP will use the same port number.B. FTP uses TCP to establish a session before any data is transferred.C. The UDP session will reorder the SNMP data as it is received by the network management system.D. The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.6、Which technologies are considered to be WAN technologies? (Choose two.)A Ethernet B.DSL C. Token RingD. Frame RelayE. FDDI7、What are three characteristics of the TCP protocol? (Choose three.) Aexchanges datagrams unreliably Bis used to send IP error messages Cforces the retransmission of unacknowledged packets Dcreates a virtual session between end-user applications Ecarries the IP address of the destination host in the TCP header Fis responsible for breaking messages into segments and reassembling them at their destination8、Which binary number is a representation of the decimal number 248? A11101000 B.11110100 C. 11111000 D.11111010第二部分 以太网技术1、Refer to the exhibit. Which type of cabling should be used at each of the connection points shown?A、A-crossoverB- straight-throughC-straight-throughD-fiberE-straight-through B、A-crossoverB-crossoverC-straight-throughD-fiberE-crossover C、A-straight-throughB-crossoverC-straight-throughD-fiberE-straight-through D、A-fiberB-crossoverC-straight-throughD-crossoverE-straight-through E、A-straight-throughB-crossoverC-crossoverD-fiberE-straight-throughF、A-crossoverB-crossoverC-straight-throughD-fiberE-straight-through2、How many broadcast domains are shown in the diagram?A. ThreeB. fourC. five D. SixE. sevenF. eight3、Refer to the exhibit. A company needs to attach workstation E at a point 150 meters from an existing hub. What device should be placed at location D to allow the new host to connect to the network with the least amount of latency?ARouterB. switchC. bridgeD. repeater4、What is the correct number of usable subnetworks and hosts for the IP network address subnetted with a /29 mask? A6 networks / 32 hostsB. 14 networks / 14 hosts C. 30 networks / 6 hostsD. 62 networks / 2 hosts5、Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?A. 00-06-5B-88-DF-C3B. 00-B0-D0-7F-F7-46C. 00-0F-24-85-75-C0D. 00-0B-E5-64-BD-44E. 00-08-A3-B6-CE-02F. 00-08-A3-B6-CE-036、A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)A. After the jam signal, all transmission stops for a random period.B. When the collision is detected, the hosts stop transmission immediately. C. When the collision is detected, the hosts stop transmission after eight microseconds.D. When the backoff period expires, the hosts involved in the collision have priority to transmit.E. When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit.F. When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision.7、Refer to the exhibit. What is the purpose of the highlighted address?A. It allows the NIC to communicate with other devices on the same network.B. It identifies which part of the IP address is to be considered the network portion.C. It provides an address to which all packets that do not have a specific route are sent.D. It uniquely identifies the NIC to the free token that is passed on the Ethernet network. 第三部分 TCP/IP协议集和IP寻址1、Which combination of network id and subnet mask correctly identifies all IP addresses from through 55?A 24B C D E 922、A company has the following addressing scheme requirements:-currently has 25 subnets-uses a Class B IP address-has a maximum of 300 computers on any network segment-needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?A. B. C. D. E. 28F. 483、A NIC of a computer has been assigned an IP address of 66 with a mask of 48. To which subnet does the IP address belong?A. B. C. D. E. 60F. 484、Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configuratio

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论