77范文网 - 专业文章范例文档资料分享平台

IP题库(3)

来源:网络收集 时间:2019-04-10 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

.

| English | Chinese(Traditional) | Chinese(Simplified) | - 21 - . Information Co., Ltd. All rights reserved.

E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory. Answer: BC

39. What are three basic parameters to configure on a wireless access point? (Choose three.) A. SSID B. RTS/CTS C. AES-CCMP D. TKIP/MIC E. RF channel

F. authentication method Answer: AEF

40. Refer to the exhibit. A system administrator installed a new switch using a script to configure it. IP

connectivity was tested using pings to SwitchB. Later attempts to access NewSwitch using Telnet from

SwitchA failed. Which statement is true? A. Executing password recovery is required. B. The virtual terminal lines are misconfigured.

C. Use Telnet to connect to RouterA and then to NewSwitch to correct the error. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 22 - . Information Co., Ltd. All rights reserved.

D. Power cycle of NewSwitch will return it to a default configuration. Answer: C

41. Which two of these statements regarding RSTP are correct? (Choose two.) A. RSTP cannot operate with PVST+. B. RSTP defines new port roles. C. RSTP defines no new port states.

D. RSTP is a proprietary implementation of IEEE 802.1D STP. E. RSTP is compatible with the original IEEE 802.1D STP. Answer: BE

42. Which three of these statements regarding 802.1Q trunking are correct? (Choose three.) A. 802.1Q native VLAN frames are untagged by default. B. 802.1Q trunking ports can also be secure ports. C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.

D. 802.1Q trunks require full-duplex, point-to-point connectivity.

E. 802.1Q trunks should have native VLANs that are the same at both ends. Answer: ACE

43. Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as

being configured to run RSTP. No other configuration changes have been made. Which three of these

show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 23 - . Information Co., Ltd. All rights reserved.

A. SwitchA, Fa0/2, designated B. SwitchA, Fa0/1, root C. SwitchB, Gi0/2, root

D. SwitchB, Gi0/1, designated E. SwitchC, Fa0/2, root F. SwitchD, Gi0/2, root Answer: ABF

44. Refer to the exhibit. A junior network administrator was given the task of configuring port security on

SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is

detected, the port is to drop frames from this device. The administrator configured the interface and tested

it with successful pings from PC_A to RouterA, and then observes the output from these two show

commands.

Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.) .

| English | Chinese(Traditional) | Chinese(Simplified) | - 24 - . Information Co., Ltd. All rights reserved.

A. Port security needs to be globally enabled.

B. Port security needs to be enabled on the interface.

C. Port security needs to be configured to shut down the interface in the event of a violation. D. Port security needs to be configured to allow only one learned MAC address.

E. Port security interface counters need to be cleared before using the show command. F. The port security configuration needs to be saved to NVRAM before it can become active. Answer: BD

45. Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer divides a data stream into segments and may add reliability and flow control

information.

B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host

addresses and protocol-related control information.

D. Packets are created when the network layer adds Layer 3 addresses and control information to a

segment.

E. The presentation layer translates bits into voltages for transmission across the physical link.

.

| English | Chinese(Traditional) | Chinese(Simplified) | - 25 - . Information Co., Ltd. All rights reserved. Answer: AD

46. For which type of connection should a straight-through cable be used? A. switch to switch B. switch to hub C. switch to router D. hub to hub E. router to PC Answer: C

47. Which set of commands is recommended to prevent the use of a hub in the access layer? A. switch(config-if)#switchport mode trunk

switch(config-if)#switchport port-security maximum 1 B. switch(config-if)#switchport mode trunk

switch(config-if)#switchport port-security mac-address 1 C. switch(config-if)#switchport mode access

switch(config-if)#switchport port-security maximum 1 D. switch(config-if)#switchport mode access

switch(config-if)#switchport port-security mac-address 1 Answer: C

48. By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations

are key to avoid unauthorized management access? (Choose two.) A. Create an additional ACL to block the access to VLAN 1.

B. Move the management VLAN to something other than default. C. Move all ports to another VLAN and deactivate the default VLAN. D. Limit the access in the switch using port security configuration. E. Use static VLAN in trunks and access ports to restrict connections. F. Shutdown all unused ports in the Catalyst switch. Answer: BF .

| English | Chinese(Traditional) | Chinese(Simplified) | - 26 - . Information Co., Ltd. All rights reserved.

49. Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?

A. BackboneFast B. UplinkFast C. Root Guard D. BPDU Guard E. BPDU Filter Answer: D

50. Which type of cable is used to connect the COM port of a host to the COM port of a router or

switch? A. crossover

B. straight-through C. rolled

D. shielded twisted-pair Answer: C

51. What is known as \A. global unicast B. anycast C. multicast

D. unspecified address Answer: B

52. Which option is a valid IPv6 address? A. 2001:0000:130F::099a::12a B. 2002:7654:A1AD:61:81AF:CCC1 C. FEC0:ABCD:WXYZ:0067::2A4 D. 2004:1:25A4:886F::1 Answer: D .

| English | Chinese(Traditional) | Chinese(Simplified) | - 27 - . Information Co., Ltd. All rights reserved.

53. How many bits are contained in each field of an IPv6 address? A. 24 B. 4 C. 8 D. 16

Answer: D

54. Which layer of the OSI reference model uses the hardware address of a device to ensure message

delivery to the proper host on a LAN? A. physical B. data link C. network D. transport Answer: B

55. Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to

ensure that reliable networking occurs? A. data link B. network C. transport D. presentation E. physical Answer: C

56. What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies.

B. Manage and scale the growth of the internal network.

C. Conserve public IP addresses so that we do not run out of them. D. Allow access reserved to the devices. .

| English | Chinese(Traditional) | Chinese(Simplified) | - 28 - . Information Co., Ltd. All rights reserved. Answer: C

57. Which IP address can be assigned to an Internet interface? A. 10.180.48.224 B. 9.255.255.10 C. 192.168.20.223 D. 172.16.200.18 Answer: B

58. What will happen if a private IP address is assigned to a public interface connected to an ISP? A. Addresses in a private range will be not routed on the Internet backbone. B. Only the ISP router will have the capability to access the public network. C. The NAT process will be used to translate this address in a valid IP address. D. Several automated methods will be necessary on the private network.

E. A conflict of IP addresses happens, because other public routers can use the same range. Answer: A

59. When is it necessary to use a public IP address on a routing interface? A. Connect a router on a local network. B. Connect a router to another router.

C. Allow distribution of routes between networks. D. Translate a private IP address. E. Connect a network to the Internet. Answer: E

60. What is the first 24 bits in a MAC address called? A. NIC B. BIA C. OUI D. VAI .

| English | Chinese(Traditional) | Chinese(Simplified) | - 29 - . Information Co., Ltd. All rights reserved. Answer: C

61. In an Ethernet network, under what two scenarios can devices transmit? (Choose two.) A. when they receive a special token B. when there is a carrier

C. when they detect no other devices are sending D. when the medium is idle

E. when the server grants access

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库IP题库(3)在线全文阅读。

IP题库(3).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/584005.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: