⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 101-150.txt

📁 用jsp编的一个网络程序
💻 TXT
字号:
101. Which of the following are characteristics of a Layer 2 Ethernet switch? (Choose two)
A. establishes a single collision domain
B. establishes multiple collision domains
C. builds a dynamic MAC address mapping table
D. maintains a routing table
E. forwards unicast frames only

Answer: B C

102. At which OSI layer is the best path to a network determined?
A. Data Link
B. Network
C. Physical
D. Presentation
E. Session
F. Transport

Answer: B

103. Which WAN service would a small office/Home Office (SOHO)most likely choose as a backup for
leased lines?
A. Frame relay with svc
B. Dedicated serial link
C. isdn with ddr
D. atm

Answer: C

104. Which devices can be used to segment a network?(choose three)
A. hub
B. repeater
C. switch
D. bridge
E. router
F. media converter

Answer: C D E

105. A network administrator is verifying the configuration of a newly installed host by establishing an
ftp connection to a remote server. which layer of the protocol stack is the network administrator using
for this operation?
A. application
B. presentation
C. session
D. transport
E. data link
F. internet

Answer: A

106. Which of the following should be done prior to backing up an ios image to a network server?
(choose three)
A. make sure that the network server can be accessed.
B. check that the authentication for access is set
C. assure that the network server has adequate space for the code image
D. verify any file naming and path requirements
E. make sure that the server can load and run the bootstrap code

Answer: A C D

107. A small enterprise has a class c network license. The enterprise requires 5 usable subnets. each
capable of accommodating at least 18 hosts. Enter the appropriate subnet mask below/
A. 255.255.255.224

Answer: A 

108. Which osi layer ensures reliable end-to-end delivery of data?
A. application
B. presentation
C. session
D. transport
E. network

Answer: D

109. Which of the following describes isdn bri service?
A. 2d+b
B. 23d+b
C. 2b+d
D. 23b+d

Answer: C

110. Which of the following need to be modified in the password recovery process? (choose two)
A. nvram
B. configuration register
C. boot flash
D. cmos
E. flash

Answer: A B

111. Which of the following Ethernet standards can operate in full-duplex mode? (choose two)
A. 10 base2
B. 10 base5
C. 10 base T
D. 100 base T

Answer: C D

112. Which commands will allow you to identify the local dlci number?(choose two)
A. show frame-relay local-dlci
B. show frame-relay pvc
C. show frame-relay dlci
D. show frame-relay map
E. show ip route

Answer: B D

113. Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the
same LAN. How does host A determine the destination's MAC address?
A. It uses a proxy ARP.
B. It uses ARP requests.
C. It uses RARP requests.
D. It uses a router lookup table.

Answer: B

114. Which encapsulation type should be used for the S0 port of Router R2?
A. SAP
B. HDLC
C. ARPA
D. Novell-Ether

Answer: B

115. Your network uses a Class C address of 210.10.10.0. You must now split up the network into
separate subnets to handle multiple buildings separated by routers. Which two steps must you take to
determine the proper subnet mask for your network? (choose two)
A. determine the number of separate networks required
B. determine how many devices will require DHCP addressing
C. determine the maximum number of hosts that will be on each subnet
D. determine the minimum number of hosts that will be on each subnet
E. determine which router will be the IP default gateway for each subnet

Answer: A C

116. What are the two most common request/reply pair with ICMP messages when using the ping
command?(choose two)
A. echo reply
B. echo request
C. source quench
D. fragment offset
E. information redirect
F. destination reachable
G. echo control message

Answer: A B

117. The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of
458 IP address. What would be the correct subnet mask to accomplish this division keeping the number
of subnets at the maximum.
Type the correct value in each box below.
A. 255.255.254.0

Answer: A

118. Which of the following are used to prevent routing loops in networks that use distance vector
routing protocols?(choose two)
A. link-state advertisement(ISA)
B. Spanning Tree Protocol
C. storest path first tree
D. split horizon
E. hold-down timers

Answer: D E

119. Which of the following are application layer protocols?(choose two)
A. ping
B. telnet
C. FTP
D. TCP
E. IP

Answer: B C

120. A user issues the command, ping 204.211.38.52. Which of the following is used to test physical
connectivity between two devices?
A. ICMP echo request
B. Information request
C. timestamp reply
D. redirect
E. source quench

Answer: A

121. Which of the following metrics does IGRP use by default to determine the best path to a
destination?(choose two)
A. Maximum Transmission Unit
B. cumulative Interface delay
C. path bandwidth value
D. reliability from source to destination
E. link loading In bits-per-second
F. hold-down timers for updates

Answer: B C

122. Which of the following are associated with the Presentation Layer of the OSI model?(choose three)
A. Rich Text Format(RTF)
B. QuickTime movie
C. FTP
D. TFTP
E. SMTP
F. MIDI

Answer: A B F

123. What are the advantages of using the OSI layered network model? (choose three)
A. Allows multiple-vendor development through standardization of network components.
B. Creates a list of communication rules that all companies must implement to get onto the Internet.
C. Allows various types of network hardware and software to communicate.
D. Prevents changes In one layer from affecting other layers, so It does not hamper development
E. Allows companies to develop proprietary Interfaces

Answer: A C D

124. Which OSI layer uses positive acknowledgement and retransmission to ensure reliable delivery?
A. Application
B. presentation
C. Session
D. Transport
E. Data link
F. Physical

Answer: D

125. Which of the following are reasons to use a bridge to segment a network?(choose two)
A. to reduce broadcasts within collision domains
B. to reduce collisions within broadcast domains
C. to increase the number of broadcast domains
D. to increase broadcasts within collision domains
E. to increase the number of collisions domains
F. to increase the efficiency of routing

Answer: B E

126. What are possible causes of LAN traffic congestion?(choose four)
A. too many hosts in a broadcast domain
B. full duplex operation
C. Broadcast storms
D. multicasting
E. segmentation
F. low bandwidth

Answer: A C D F

127. Which connections allow the use of full-duplex Ethernet?(choose three)
A. switch to host
B. switch to switch
C. hub to hub
D. switch to hub
E. to host

Answer: A B E

128. Which WAN technology uses high-quality digital lines and IS packet switched?
A. FDDI
B. ISDN
C. ATM
D. Frame Relay

Answer: D

129. Which Frame Relay feature Is responsible for transmitting keepalives to ensure that the PVC does
not shut down because of Inactivity?
A. DLCI
B. BECN
C. FECN
D. LMI
E. CIR
F. de

Answer: D

130. Which of the following access list statements will deny all telnet connections to subnet
10.0.1.0/24?
A. access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet
B. access-list 115 deny tcp any 10.0.1.0 eq telnet
C. access-list 115 deny udp any 10.0.1.0 eq 23
D. access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23
E. access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23

Answer: D

131. You have just finished configuring a router. The changes have been made successfully and
everything Is working correctly. You then save your changes and reboot the router.
None of your changes are active after the reboot. However, when you look at the contents of
startup-config, your changes are there. Which of the following Indicates the source of the problem?
A. hardware failure NMVRAM prevents the router from loading the configuration.
B. Starup-config in flash is corrupt and cannot be analyzed.
C. Router configuration register set to bypass startup configuration.
D. Startup-config in NVRAM is corrupt and cannot be analyzed.

Answer: C

132. Which of the following are benefits of VLANs?(choose three)
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security.
D. They increase the size of broadcast domains while decreasing the number of broadcast domains
E. They increase the number of broadcast domains while decreasing their size.
F. They simplify switch administration.

Answer: B C E

133. What Is the purpose of Spanning-Tree In a Switched LAN?
A. to provide a mechanism for network monitoring In switched environments
B. to prevent routing loops in networks with redundant paths
C. to prevent switching loops In networks with redundant switched paths
D. to manage, the addition, deletion, and naming of VLANs across multiple switches
E. to segment a network into multiple collision domains

Answer: C

134. Which of the following statements describe the codes displayed in the show ip route
command?(choose two)
A. I-Indicates a route was learned through an Internal protocol.
B. S-Indicates a route was learned through static command.
C. R-Indicates that the route was learned through RIP.
D. S-Indicates that the route was learned through a serial port.
E. R-Indicates that the route was learned through a reliable port.

Answer: B C

135. What is the correct order of protocol data units in data encapsulation?
A. Data,Frame,Packet,Segment,Bit
B. Data,Frame,Segment,Packet,Bit
C. Data,Packet,Frame,Segment,Bit
D. Data,Packet,Segment,Frame,Bit
E. Data,Segment,Frame,Packet,Bit
F. Data,Segment,Packet,Frame,Bit

Answer: F

136. A new host has been connected to a workgroup switch. Although it’s Layer 3 configuration is
correct, the host is unable to access the server resources in its network segment. What is a likely cause
of this problem?
A. The router lacks a routing table entry for the new host
B. The host switch port is assigned to the incorrect VLAN.
C. The host MAC address is incorrectly configured
D. A VTP instance for the new host has not been initialiazed.

Answer: B

137. Which configuration register selling tells the router to look in NVRAM for the boot sequence?
A. 0x42
B. 0x2102
C. 0x001
D. 0x2101

Answer: B

138. Which of the following statements regarding routed and routing protocols are true?(choose 2)
A. A routed protocol Is assigned to an Interface and determines the method of packet delivery.
B. A routing protocol determines the path of a packet through a network.
C. A routed protocol determines the path of a packet through a network.
D. A routing protocol operates at the transport layer of the OS1 model.
E. A routed protocol updates the routing table of a router.

Answer: A B

139. You have a Class B network address with a subnet mask of 255.255.255.0.
Which of the following statements are true regarding the resulting network? (Choose two)
A. There are 254 usable hosts per subnet
B. There is one usable network.
C. There are 255 usable hosts per subnet.
D. There are 254 usable subnets.
E. There are 30 usable subnets.
F. There are 62 usable hosts per subnet.

Answer: A D

140. What does IGRP use to determine the best path to a destination?
A. The highest metric value
B. The lowest composite metric value
C. The lowest hop-count and delay
D. The highest bandwidth and reachability
E. The lowest administrative distance

Answer: B

141. A network administrator has installed a new router in the lisbon office and is unable to backup the
ios image of the new router to a TFTP server located in the Gibraltar office given the network diagrarm,
idenify the source of the problem
A. incorrect default gateway of the tftp server
B. incorrect subnet mask of the tftp server
C. incorrect IP address of the tftp server
D. incorrect IP address on E0 of the gibraltar server
E. incorrect subnet mask on the lisbon router

Answer: B

142. Which WAN technology was designed to work over traditional phone lines and provide small
offices and user with higher speed digital dial-up service?
A. frame relay
B. x.25
C. ATM
D. ISDN

Answer: D

143. Which two statements about frame tagging are true? (Choose two )
A. A filtering table is developed for each switch
B. Frame tagging assigns a unique user defined ID to each frame
C. A unique identifier is placed in the header of each frame as it is forwarded between switches
D. Frame tagging is a technique that examines particular information about each frame based on user
defined offsets

Answer: B C

144. Choose the correct cable to connect a router to an Ethernet switch.
A. Cable #1
B. Cable #2
C. Cable #3
D. Cable #4

Answer: B

145. A host with a MAC address of ad23.3455.134f is to be inserted into ipx network 4e.
Enter the ipx address for this host
A. 4e.ad23.3455.134f

Answer: A

146. Which of the following are generally considered to be characteristics of connectionless network
services?
A. no-reliable
B. reliable
C. less bandwidth-intensive
D. handshaking

Answer: A

147. Calculate the number of usable networks and usable hosts for the network 201.105.13.0/26
A. 64 networks and 4 hosts
B. 4 networks and 64 hosts
C. 3 networks and 63 hosts
D. 62 networks and 2 hosts

Answer: C

148. You are given A PC, A router, and a cable. Select the correct combination that will allow you to log
into the router locally using a terminal emulation program such as HyperTerminal.
A. Connect the PC’s COM port to the router’s console port using a straight-through cable.
B. Connect the PC’s COM port to the router’s console port using a rollover cable.
C. Connect the PC’s COM port to the router’s Ethernet port using a slight-through cable.
D. Connect the PC’s Ethernet port to the router’s Ethernet port using a rollover cable.
E. Connect the PC’s Ethernet port to the router’s Ethernet port using a straight-through cable.

Answer: B

149. You are the network administrator of the Tasti-Treats Cereal Company. You receive a call from a
user who is unable to reach a server at a remote site. After further review you discover the following
information:
Local PC 10.0.3.35/24
Default Gateway 10.0.3.1
Remote Server 10.0.5.250/24
You then conduct the following tests from the offending Local PC.:
Ping 127.0.0.1 – Successful
Ping 10.0.3.35 – Successful
Ping 10.0.3.1 – Unsuccessful
Ping 10.0.5.250 – Unsuccessful
Which of the following problems would create the test results listed above?
A. TCP/IP not correctly installed
B. Local physical layer problem
C. NIC not functioning
D. remote physical layer problem

Answer: B

150. Which type of router memory normally stores the start-up configuration?
A. RAM
B. ROM
C. FLASH
D. NVRAM

Answer: D

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -