CCNA第一学期Finalexam考试英文版答案_第1页
CCNA第一学期Finalexam考试英文版答案_第2页
CCNA第一学期Finalexam考试英文版答案_第3页
CCNA第一学期Finalexam考试英文版答案_第4页
CCNA第一学期Finalexam考试英文版答案_第5页
已阅读5页,还剩21页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、ccna第一学期finalexam考试英文版答案(r&s.)c1 a medium-sized business is researching available options for connecting to the internet. the company is looking for a high speed option with dedicated, symmetric access. which connection type should the company choose?dsl r dialupsatelliteleased linecable modem2

2、what is the purpose of having a converged network? to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of datato reduce the cost of deploying and maintaining thecommunication infrastr

3、ucture3 what characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4 which connection provides a secure cli session with encry

4、ption to a cisco switch?a console connectionan aux connectiona telnet connectionan ssh connection5 a network technician is attempting to configureaninterface by entering the followingcommand:sanjose(config)# ip address . the command isrejected by the device. what is the reaso

5、n for this?the command is being entered from the wrong modeof operation.the command syntax is wrong.rthe subnet mask information is incorrect.cthe interface is shutdown and must be enabled beforethe switch will accept the ip address.r6 after several configuration changes are made to arouter, the cop

6、y running-configurationstartup-configuration command is issued. where willthe changes be stored?flashrromrnvramramrthe configuration registerca tftp serverr7refer to the exhibit. from global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command

7、 banner motd v authorized access only!violators will be prosecuted! v when users log in usingtelnet, the banner does not appear correctly. what is the problem?the banner message is too long.cthe delimiting character appears in the banner message.the symbol “ ! ” signals the end of a banner message.r

8、message-of-the-day banners will only appear when a user logs in through the console port. r 8 what are three characteristics of an svi? (choose three.)it is designed as a security protocol to protect switchports.it is not associated withany physical interfaceon aswitch.it is a special interfacethat

9、allows connectivity bydifferent types of media.it is required to allow connectivity by any device at any location.it provides a means to remotely manage a switch.it is associated with vlan1 by default.9 a technician configures a switch with these commands:switcha(config)# interface vlan 1switcha(con

10、fig-if)#ip address switcha(config-if)# no shutdownwhat is the technician configuring?telnet accesssvipassword encryption physical switchport access10 in computer communication, what is the purpose of message encoding?to convert information to the appropriate form for transmis

11、sionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11 what protocol is responsible for controlling the sizeof segments and the rate at whichsegments are exchanged between a web client and a web server?tcpiphttpnetworkaffecti

12、ngethernet12 what are two benefits of using a layered model? (choose two.)it assists in protocol design. diit speeds up packet delivery.it prevents designers from creating their own model.it prevents technology in one layer from other layers.it ensures a device at one layer can function at the next

13、higher layer.13 what is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14 when ipv4 addressing is manually configured on aweb server, which property of the ipv4 configuration identifies the network and host portion for an ip

14、v4 address?dns server addresssubnet maskdefault gatewaydhcp server address15 a network administrator is troubleshooting connectivity issues on a server. using a tester, the administrator notices that the signals generated by the server nic are distorted and not usable. in which layer of the osi mode

15、l is the error categorized?presentation layernetwork layerphysical layerdata link layer 16 a network engineer is measuring the transfer of bits across the company backbone for amission critical database application. the engineer notices that the network throughputappears lower than the bandwidth exp

16、ected. whichthree factors could influence thedifferences in throughput? (choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method appliedto the datathe type of traffic that is crossing the networkthe latency that is created by the numbe

17、r of network devices that the data is crossingthe bandwidth of the wan connection to the internetthe reliability of the gigabit ethernet infrastructure ofthe backbone17 which type of utp cable is used to connect a pc to aswitch port?consolerollover crossoverstraight-through18 what is a characteristi

18、c of the llc sublayer?it provides thelogical addressing required thatidentifies the device.it provides delimitation of data according to the physical signaling requirements of the medium.it places informationin the frame allowing multiplelayer 3 protocols to use the same network interface and media.

19、it defines software processes that provide services to the physical layer.19 what are the three primary functions provided by layer 2 data encapsulation? (choose three.)error correction through a collision detection method session control using port numbersdata link layer addressing placement and re

20、moval of frames from the mediadetection of errors through crc calculationsdelimiting groups of bits into framesconversion of bits into data signals20 what will a host on an ethernet network do if it receives a frame with a destination macaddress that does not match its own mac address?it will discar

21、d the frame.it will forward the frame to the next host.it will remove the frame from the media.it will strip off the data-link frame to check the destination ip address.21 what are two actions performed by a cisco switch?(choose two.)building a routing table that is based on the first ip address in

22、the frame headerusing the source mac addresses of frames to build andmaintain a mac address tableforwarding frames with unknown destination ipaddresses to the default gatewayutilizing the mac address table to forward frames viathe destination mac addressexamining the destination mac address to add n

23、ewentries to the mac address table22 what are two examples of the cut-throughswitching method? (choose two.)store-and-forward switchingfast-forward switchingcrc switchingfragment-free switchingqos switching23refer to the exhibit.if host a sends an ip packet to host b, what will the destination addre

24、ss be in the frame when it leaves hosta?dd:dd:dd:dd:dd:dd9cc:cc:cc:cc:cc:cc5rbb:bb:bb:bb:bb:bbaa:aa:aa:aa:aa:aar24 what are two services provided by the osi network layer? (choose two.)performing error detection rirouting packets toward the destinationi7|encapsulating pdus fr

25、om the transport layer 叼placement of frames on the media collision detection25 what information is added during encapsulation atosi layer 3?source and destination mac csource and destination application protocolrsource and destination port numberrsource and destination ip address*26 what are two fun

26、ctions of nvram? (choose two.)to store the routing tablento retain contents when power is removedi7|to store the startup configuration filei7|to contain the running configuration file rito store the arp table n 27refer to the exhibit. the network administrator for a small advertising company has cho

27、sen to use the 6/27 network for internal lan addressing.as shown in the exhibit, a static ip address is assignedto the company web server. however, the web server cannot access the internet. the administrator verifies that local workstations with ip addresses that are assigned by a dhcp s

28、erver can access the internet, and the web server is able to ping local workstations. which component is incorrectly configured?subnet maskrdns address r host ip address r default gateway address28 why does a layer 3 device perform the anding process on a destination ip address and subnet mask?to id

29、entify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty frames to identify the network address of the destinationnetwork29 what are the three ranges of ip addresses that arereserved for internal private use? (choosethree.)

30、/8/14/12/12/24addresses?/1630 which three addresses are valid public(choose three.)74517192.15.301.2402731 what type of ipv6 address is fe80:1?loopbacklink-localmulticastglobal unicast32refer

31、 to the exhibit. on the basis of the output, whichtwo statements about network connectivity are correct?(choose two.)there is connectivity between this device and the device at .flthe connectivity between these two hosts allows for videoconferencing calls. nthere are 4 hops between this

32、 device and the device at.the average transmission time between the two hosts is 2 milliseconds.this host does not have a default gateway configured.addressn33 which subnet would include the6 as a usable host address?4/262/27c2/28r4

33、/29r34 how many hosts are addressable on a network thathas a mask of 48?2r6 8r14r16254c35 which statement is true about variable-length subnet masking?each subnet is the same size.rthe size of each subnet may be different, depending on requirements.subnets may only be subnetted one addi

34、tional time.rbits are returned, rather than borrowed, to create additional subnets.r36refer to the exhibit. consider the ip address of/24 that has been assigned to a highschool building. the largest network in this building has 100 devices. if is the network number for the l

35、argest network, what would be the network number for the next largest network, which has 40 devices?r9224r40r37 in what two situations would udp be the preferred transport protocol over tcp? (choosepackettwo.) when applications need to guarantee that a

36、 arrives intact, in sequence, and unduplicated ri when a faster delivery mechanism is neededi7|when delivery overhead is not an issue r when applications do not need to guarantee delivery of the data when destination port numbers are dynamic ri 38 what important information is added to the tcp/iptra

37、nsport layer header to ensurecommunicationand connectivity with aremotenetwork device?timing and synchronizationcdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39 what is the tcp mechanism used in congestionavoidance?three-

38、way handshakesocket pairtwo-way handshakesliding window40 which three statements characterize udp? (choosethree.)udp provides basic connectionless transport layerfunctions.udp provides connection-oriented, fast transport offor errordata at layer 3.udp relies on application layer protocolsdetection.u

39、dp is a low overhead protocol that does not provide sequencing or flow control mechanisms.udp relies on ip for error detection and recovery.udp provides sophisticated flow control mechanisms.41 which two tasks are functions of the presentation layer? (choose two.) compressionaddressingencryptionsession controlauthentication42 which two protocols operate at the highest layer ofthe tcp/ip protocol stack? (choose two.)dnsblethernetippoptcpudp43 which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers? (choose t

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论