CCNA第一學(xué)期Finalexam考試英文版答案_第1頁
CCNA第一學(xué)期Finalexam考試英文版答案_第2頁
CCNA第一學(xué)期Finalexam考試英文版答案_第3頁
CCNA第一學(xué)期Finalexam考試英文版答案_第4頁
CCNA第一學(xué)期Finalexam考試英文版答案_第5頁
已閱讀5頁,還剩21頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、ccna第一學(xué)期finalexam考試英文版答案(r&s.)c1 a medium-sized business is researching available options for connecting to the internet. the company is looking for a high speed option with dedicated, symmetric access. which connection type should the company choose?dsl r dialupsatelliteleased linecable modem2

2、what is the purpose of having a converged network? to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of datato reduce the cost of deploying and maintaining thecommunication infrastr

3、ucture3 what characteristic of a network enables it to quickly grow to support new users andapplications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility4 which connection provides a secure cli session with encry

4、ption to a cisco switch?a console connectionan aux connectiona telnet connectionan ssh connection5 a network technician is attempting to configureaninterface by entering the followingcommand:sanjose(config)# ip address . the command isrejected by the device. what is the reaso

5、n for this?the command is being entered from the wrong modeof operation.the command syntax is wrong.rthe subnet mask information is incorrect.cthe interface is shutdown and must be enabled beforethe switch will accept the ip address.r6 after several configuration changes are made to arouter, the cop

6、y running-configurationstartup-configuration command is issued. where willthe changes be stored?flashrromrnvramramrthe configuration registerca tftp serverr7refer to the exhibit. from global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command

7、 banner motd v authorized access only!violators will be prosecuted! v when users log in usingtelnet, the banner does not appear correctly. what is the problem?the banner message is too long.cthe delimiting character appears in the banner message.the symbol “ ! ” signals the end of a banner message.r

8、message-of-the-day banners will only appear when a user logs in through the console port. r 8 what are three characteristics of an svi? (choose three.)it is designed as a security protocol to protect switchports.it is not associated withany physical interfaceon aswitch.it is a special interfacethat

9、allows connectivity bydifferent types of media.it is required to allow connectivity by any device at any location.it provides a means to remotely manage a switch.it is associated with vlan1 by default.9 a technician configures a switch with these commands:switcha(config)# interface vlan 1switcha(con

10、fig-if)#ip address switcha(config-if)# no shutdownwhat is the technician configuring?telnet accesssvipassword encryption physical switchport access10 in computer communication, what is the purpose of message encoding?to convert information to the appropriate form for transmis

11、sionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication11 what protocol is responsible for controlling the sizeof segments and the rate at whichsegments are exchanged between a web client and a web server?tcpiphttpnetworkaffecti

12、ngethernet12 what are two benefits of using a layered model? (choose two.)it assists in protocol design. diit speeds up packet delivery.it prevents designers from creating their own model.it prevents technology in one layer from other layers.it ensures a device at one layer can function at the next

13、higher layer.13 what is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control14 when ipv4 addressing is manually configured on aweb server, which property of the ipv4 configuration identifies the network and host portion for an ip

14、v4 address?dns server addresssubnet maskdefault gatewaydhcp server address15 a network administrator is troubleshooting connectivity issues on a server. using a tester, the administrator notices that the signals generated by the server nic are distorted and not usable. in which layer of the osi mode

15、l is the error categorized?presentation layernetwork layerphysical layerdata link layer 16 a network engineer is measuring the transfer of bits across the company backbone for amission critical database application. the engineer notices that the network throughputappears lower than the bandwidth exp

16、ected. whichthree factors could influence thedifferences in throughput? (choose three.)the amount of traffic that is currently crossing the networkthe sophistication of the encapsulation method appliedto the datathe type of traffic that is crossing the networkthe latency that is created by the numbe

17、r of network devices that the data is crossingthe bandwidth of the wan connection to the internetthe reliability of the gigabit ethernet infrastructure ofthe backbone17 which type of utp cable is used to connect a pc to aswitch port?consolerollover crossoverstraight-through18 what is a characteristi

18、c of the llc sublayer?it provides thelogical addressing required thatidentifies the device.it provides delimitation of data according to the physical signaling requirements of the medium.it places informationin the frame allowing multiplelayer 3 protocols to use the same network interface and media.

19、it defines software processes that provide services to the physical layer.19 what are the three primary functions provided by layer 2 data encapsulation? (choose three.)error correction through a collision detection method session control using port numbersdata link layer addressing placement and re

20、moval of frames from the mediadetection of errors through crc calculationsdelimiting groups of bits into framesconversion of bits into data signals20 what will a host on an ethernet network do if it receives a frame with a destination macaddress that does not match its own mac address?it will discar

21、d the frame.it will forward the frame to the next host.it will remove the frame from the media.it will strip off the data-link frame to check the destination ip address.21 what are two actions performed by a cisco switch?(choose two.)building a routing table that is based on the first ip address in

22、the frame headerusing the source mac addresses of frames to build andmaintain a mac address tableforwarding frames with unknown destination ipaddresses to the default gatewayutilizing the mac address table to forward frames viathe destination mac addressexamining the destination mac address to add n

23、ewentries to the mac address table22 what are two examples of the cut-throughswitching method? (choose two.)store-and-forward switchingfast-forward switchingcrc switchingfragment-free switchingqos switching23refer to the exhibit.if host a sends an ip packet to host b, what will the destination addre

24、ss be in the frame when it leaves hosta?dd:dd:dd:dd:dd:dd9cc:cc:cc:cc:cc:cc5rbb:bb:bb:bb:bb:bbaa:aa:aa:aa:aa:aar24 what are two services provided by the osi network layer? (choose two.)performing error detection rirouting packets toward the destinationi7|encapsulating pdus fr

25、om the transport layer 叼placement of frames on the media collision detection25 what information is added during encapsulation atosi layer 3?source and destination mac csource and destination application protocolrsource and destination port numberrsource and destination ip address*26 what are two fun

26、ctions of nvram? (choose two.)to store the routing tablento retain contents when power is removedi7|to store the startup configuration filei7|to contain the running configuration file rito store the arp table n 27refer to the exhibit. the network administrator for a small advertising company has cho

27、sen to use the 6/27 network for internal lan addressing.as shown in the exhibit, a static ip address is assignedto the company web server. however, the web server cannot access the internet. the administrator verifies that local workstations with ip addresses that are assigned by a dhcp s

28、erver can access the internet, and the web server is able to ping local workstations. which component is incorrectly configured?subnet maskrdns address r host ip address r default gateway address28 why does a layer 3 device perform the anding process on a destination ip address and subnet mask?to id

29、entify the broadcast address of the destination networkto identify the host address of the destination hostto identify faulty frames to identify the network address of the destinationnetwork29 what are the three ranges of ip addresses that arereserved for internal private use? (choosethree.)

30、/8/14/12/12/24addresses?/1630 which three addresses are valid public(choose three.)74517192.15.301.2402731 what type of ipv6 address is fe80:1?loopbacklink-localmulticastglobal unicast32refer

31、 to the exhibit. on the basis of the output, whichtwo statements about network connectivity are correct?(choose two.)there is connectivity between this device and the device at .flthe connectivity between these two hosts allows for videoconferencing calls. nthere are 4 hops between this

32、 device and the device at.the average transmission time between the two hosts is 2 milliseconds.this host does not have a default gateway configured.addressn33 which subnet would include the6 as a usable host address?4/262/27c2/28r4

33、/29r34 how many hosts are addressable on a network thathas a mask of 48?2r6 8r14r16254c35 which statement is true about variable-length subnet masking?each subnet is the same size.rthe size of each subnet may be different, depending on requirements.subnets may only be subnetted one addi

34、tional time.rbits are returned, rather than borrowed, to create additional subnets.r36refer to the exhibit. consider the ip address of/24 that has been assigned to a highschool building. the largest network in this building has 100 devices. if is the network number for the l

35、argest network, what would be the network number for the next largest network, which has 40 devices?r9224r40r37 in what two situations would udp be the preferred transport protocol over tcp? (choosepackettwo.) when applications need to guarantee that a

36、 arrives intact, in sequence, and unduplicated ri when a faster delivery mechanism is neededi7|when delivery overhead is not an issue r when applications do not need to guarantee delivery of the data when destination port numbers are dynamic ri 38 what important information is added to the tcp/iptra

37、nsport layer header to ensurecommunicationand connectivity with aremotenetwork device?timing and synchronizationcdestination and source port numbersdestination and source physical addressesdestination and source logical network addresses39 what is the tcp mechanism used in congestionavoidance?three-

38、way handshakesocket pairtwo-way handshakesliding window40 which three statements characterize udp? (choosethree.)udp provides basic connectionless transport layerfunctions.udp provides connection-oriented, fast transport offor errordata at layer 3.udp relies on application layer protocolsdetection.u

39、dp is a low overhead protocol that does not provide sequencing or flow control mechanisms.udp relies on ip for error detection and recovery.udp provides sophisticated flow control mechanisms.41 which two tasks are functions of the presentation layer? (choose two.) compressionaddressingencryptionsession controlauthentication42 which two protocols operate at the highest layer ofthe tcp/ip protocol stack? (choose two.)dnsblethernetippoptcpudp43 which two roles can a computer assume in a peer-to-peer network where a file is beingshared between two computers? (choose t

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論