⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 251-300.txt

📁 用jsp编的一个网络程序
💻 TXT
字号:
251. What is the most common mail to device?
A. Hub
B. Router
C. Repeater
D. Switch

Answer: D

252. While you are preparing the initial configuration of your router and enable IP you find that you
need to use a telnet session to check for a network address parameter. Your telnet logging and your
virtual transmission session on the other device are successful. What is the default that you must enter
to suspend your Telnet session and return to the original router?
A. Suspend.
B. The command exit.
C. CTRL – ESC followed by x.
D. CTRL – ALT – DEL followed b ESC.
E. CTRL- Shift-6 followed by x.

Answer: E

253. Which ex command displays system configuration information, software version and the names
and sources of configuration files and boot images on a router?
A. Show boot.
B. Show flash.
C. Show Config.
D. Show version.

Answer: D

254. The exhibit shows the Cisco routers startup messages.
Which group of messages identifies the router components that you can configure during set up
the initial system configuration?
A. System Bootstrap, Version 11.3(1)XA, PLATFORM SPECIFIC RELEASE SOFTWARE (fc1)
Copyright (c) 1998 by cisco Systems, Inc,
CS2600 platform with 32768 Kbytes of main memory
B. Rp,,pm 1 b f
program load complete, entry point: 0x800008000, size: 0xef4e0
Self decompressing the image :############################[OK]
C. Notice: NVRAM invalid, possible due to write erase,
program load complete, entry point:0x80008000, size 0x415b20
Self decompressing the image: ###################################
##########################################################[OK]
Restricted Rights Legend….(abridged)
D. Cisco Internetwork Operating System Software
IOC (tm) C2600 Software (C2600-JS-M), Version 11.3(2)XA,
PLATFORM SPECIFIC RELEASE SOFTWARE (fc1)
Copyright 1996-1998 by Cisco Systems Inc.
Compiled 10-Mar-98 14:25 by gneale
Image text-bas: 0x80008084, database: 0x809CD49C
E. Cisco 2611 (MP C860) processor (revision 0x100) with 24576K/8192K bytes of memory,
Processor board ID 04614954
M860 processor, part number 0 mask 32,
Bridging software, X.25 software, Version 3.0.0,
2 Ethernet/IEEE 802.3 interface(s)

Answer: D

255. What does the word "any" mean in the following extended access list statement?
access-list 101 permit ip any 192.168.69.0 0.0.0.255 eq tcp
A. check any of the bits in the source address
B. permit any wildcard mask for the address
C. accept any source address
D. check any bit in the destination address
E. permit 255.255.255.255 0.0.0.0
F. accept any destination address

Answer: C

256. Which of the following WAN services sue two data link layer encapsulations, one for data and one
for signaling?
A. ISDN
B. Frame Relay
C. ATM
D. FDDI

Answer: A

257. Which encapsulation type should be used for the e1 port of Router R3?
A. SAP
B. HDLC
C. ARPA
D. Novell-Ether

Answer: D

258. What is the bandwidth capacity of an ISDN B channel?
A. 16 Kbps
B. 64 Kbps
C. 128 Kbps
D. 512 Kbps
E. 1.54 Mbps

Answer: B

259. Which prompt and command combination sets RIP as the routing protocol?
A. Router# rip.
B. Router rip.
C. Router (Config)# rip.
D. Router (Config)# router rip.

Answer: D

260. What are 4 ways network management can be simplified by using the virtual LANs (VLANs)?
(Choose four)
A. VLANs allow you to implement multiple layers switching easily.
B. VLAN can group several broadcasts domains into multiple logical subnets.
C. It is no longer necessary to install cables to move a user from a new network to another.
D. Network adds, moves and changes are achieved by configuring a port into a VLAN.
E. A group of users needing high security can be put into a VLAN so that no users outside the VLANs
can communicate with them.
F. As a logical grouping of users, VLANs can be considered independent from their physical or
geographic locations.

Answer: C D E F

261. With one method of transmitting fames through a switch the switch receives the complete frame
and checks the frame CRC before forwarding the frame. What is this transmitting method called?
A. CSMA/CD
B. Full duplex.
C. Cut through.
D. Half duplex.
E. Fragmentation.
F. Stored and forwarded.

Answer: F

262. Switching methods include cut-through, store and forwarded and a modified version of the first
two methods. Which statement about switching methods is true?
A. The stored and forward method has low latency.
B. The cut through method and switching has high latency.
C. The modified version holds the packet in memory until 50% of the packet reaches the switch.
D. The modified version holds the packet in memory until the data portion of the packet reaches the
switch.

Answer: D

263. Which technology do catalyst switches use to resolve topology loops and ensure data use flows
properly through a single network path?
A. Virtual LANs.
B. Frame filtering.
C. Cut through switching.
D. Spanning tree protocol.

Answer: D

264. Which two statements are true? (Choose two)
A. Ethernet 802.3 utilizes a half duplex method for data transfer.
B. In a 100mbps point to point connect, a full duplex connection can provide 400mbs of data transfer.
C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single port office
switch.
D. Full duplex Ethernet takes advantage of UTP using one pair of transmission and other pair for
reception.

Answer: A D

265. What is a backoff on an 802.3 network?
A. It is latency in store and forward switching.
B. It is the time used for token passing for machine to machine.
C. It is the retransmission delay that is reinforced when a collision occurs.
D. It is the result of two nodes transmitting at a same time the frames from each transmitting device
collide and are damaged.

Answer: C

266. You have just issued an erase startup-config command and reloaded your router. In which
mode will your router be when you reboot?
A. Setup.
B. Startup.
C. User EXEC.
D. User privileged.
E. Global configuration.

Answer: A

267. What is a key use of a device hardware address?
A. To obtain a vendor code/serial number from the user.
B. To transmit a frame from one interface to another interface.
C. To transmit a packet from one local device to another local device.
D. To transmit data from one local device to remote device across Internet.
E. To contain logical information about a device to use an end-to-end transmission.

Answer: B

268. Which command verifies encapsulation as well as layer 1 and layer 2 statistics on a router
configured for Frame Relay?
A. Show IP
B. Show interface
C. Show statistics
D. Show frame-relay

Answer: B

269. How many valid host IP addresses are available on the following network/subnetwork?
176.12.44.16/30
A. 2
B. 30
C. 254
D. 16,382
E. 65,534

Answer: A

270. Which command displays the IP addresses assigned to specific host names?
A. Show hosts.
B. Show interface.
C. Ping host name.
D. Config host name.
E. Show host mapping.
F. Show host name IP address.
G. Trace IP addresses host name.

Answer: A

271. At which layer of the OSI model does the ping command operate?
A. Session
B. Network
C. Transport
D. Maintenance

Answer: B

272. Given an IP address of 172.16.2.160 and a subnet mask of 255.255.255.192, to which subnet does
the host belong?
A. 172.16.2.32
B. 172.16.2.64
C. 172.16.2.96
D. 172.16.2.128
E. 172.16.2.192

Answer: D

273. Given the following IP address from the Class B address range:
172.35.21.12
Your network plan requires no more than 126 hosts on a subnet that includes this address.
When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask?
A. 255.255.0.0
B. 255.255.128.0
C. 255.255.255.128
D. 255.255.255.252

Answer: C

274. In Cisco IOS software, which command displays the backup configuration?
A. Show flash.
B. Show version.
C. Show tftp-config.
D. Show backup-config.
E. Show startup-config .

Answer: E

275. What are the characteristics of UDP?
A. It is reliable and acknowledged.
B. It is unreliable and acknowledged.
C. It is reliable and unacknowledged.
D. It is unreliable and unacknowledged.

Answer: D

276. What are the two sublayers of the data link layer? (Choose two)
A. MAC
B. LLC
C. SAP
D. LCP
E. NetWare Core Protocol (NCP)
Answer: A B

277. Which two types of route table entries does a Layer3 router to determine the appropriate path
to a destination use? (Choose two)
A. Static route entry.
B. Default route entry.
C. Dynamic route entry.
D. Temporary route entry.
E. Permanent route entry.
Answer: A C

278. Which keystroke allows IOS to complete a partial command entry?
A. Tab
B. Ctrl R
C. Spacebar
D. Right Arrow

Answer: A

279. Eight stations connected to separate 10Mbps ports on a layer 2 switch will give each station how
many Mbps of bandwidth?
A. 1.25
B. 4
C. 16
D. 10
E. 60

Answer: D

280. Which two WAN data link layer protocols support multiple upper layer protocols? (Choose
Two)
A. PPP
B. LAPD
C. ISDN
D. HDLC

Answer: A D

281. Which command enables directly connected network 199.55.72.0 to be used by RIP?
A. Router(Config)# rip 199.55.0.0
B. Router(Config-router)# rip 199.55.72.0
C. Router(Config-router)# network 199.55.0.0
D. Router(Config-router)# network 199.55.72.0

Answer: D

282. What does the command show access-list 101 list?
A. All extended access lists.
B. All access lists within the router.
C. The contents of standard access list 101
D. The contents of extended access list 101

Answer: D

283. Which two commands show your access lists? (Choose two)
A. Show filters.
B. Show access-lists.
C. Show IP access-list.
D. Show running-Config.

Answer: B D

284. Which statement about the Point-to-Point protocol (PPP) is true?
A. PPP supports TCP/IP, but not Novell IPX.
B. PPP is being phased out of existence by the Serial Line Internet protocol.
C. PPP provides router-to-router and host-to-network connections over both synchronous and
asynchronous circuits.
D. PPP is an ITU-T and ANSI standard that defines the process for sending data over a
packet-switched data network.

Answer: C

285. Which encapsulation methods are most commonly used with dialup integrated services Digital
Network(ISDN)?
A. IP and IPX
B. IP and PPP
C. PPP and SDLC
D. PPP and HDLC

Answer: D

286. Which two steps are parts of the process of creating Frame Relay subinterfaces on a point-point
connection? (Choose Two)
A. Configure the router to forward all broadcast packets.
B. Remove any network address assigned to the physical interface.
C. Configure the local data-link connection identifier for the subinterfaces.
D. Partition the total committed information rate available among the subinterfaces.

Answer: B C

287. Your network is having IP problems connecting to one or more Frame Relay peer routers.
Which two commands should you use to show the routers that are reachable? (Choose two)
A. Show IP map.
B. Show IP route.
C. Show frame-relay map.
D. Debug frame-relay map.

Answer: B C

288. What are three benefits of integrated services digital network (ISDN)? (Choose three)
A. PVCs are faster and more reliable.
B. No specialized equipment is required.
C. Data transfer is faster than typical modems.
D. Call setup is faster than with standard telephone service.
E. It carries many types of data traffic such as voice, video, and data.

Answer: C D E

289. What are two functions of ICMP protocol? (Choose Two)
A. To map IP addresses to Ethernet addresses.
B. To map common names to network addresses.
C. To forward SNMP alerts to management consoles.
D. To generate an echo reply in response to a ping test.
E. To send a host or post unreachable message from a router to the source of an undeliverable packet.

Answer: D E

290. Novell IPX network addresses have two configurable parts. The network administrator specifies
the IPX network number.
How is the node number determined?
A. It is the serial number of the given device.
B. It is assigned as a lease by Novell DHCP.
C. It is also set by the network administrator.
D. It is usually the MAC address of one interface.
E. It is downloaded by NetWare Core Protocol (NCP).

Answer: D

291. Which IP address range is allowable given an IP address of 172.37.2.56 and 28-bits of
subnetting?
A. 172.37.2.48 to 172.37.2.63
B. 172.37.2.48 to 172.37.2.6.2
C. 172.37.2.49 to 172.37.2.62
D. 172.37.2.49 to 172.37.2.63
E. 172.37.2.55 to 172.37.2.126

Answer: C

292. When you use the Cisco ISO command show configuration on a router, which part of the output
shows the specific configured IP addresses and subnet masks?
A. The IP host table.
B. The interfaces output.
C. Each section of the output.
D. Each section of the output.
E. The global configuration statements.
F. The section under the autonomous system number.

Answer: B

293. What is the connection-oriented protocol in the TCP/IP protocol stack?
A. IP
B. UDP
C. TCP
D. DNS
E. OSPF

Answer: C

294. What does the term ‘Base’ refer to in 100BaseT?
A. Cabling type.
B. Signaling type.
C. 100 mode type.
D. Spectrum used.
E. Speed category.

Answer: B

295. Which command displays the interfaces using a given access list?
A. Show filters.
B. Show IP interface.
C. Show active list.
D. Show interface parameters.
E. Configure IP access list.
F. Show access-list interfaces.

Answer: B

296. You have a Frame Relay Link on serial1. Which command displays the Local Management
Interface(LMI), data link connection identifier (DLCI), and bandwidth for that link?
A. Show interface serial1.
B. Show frame-relay serial1.
C. Show protocol frame-relay serial1.
D. Show serial1 encapsulation frame-relay.

Answer: A

297. When you configure an IP address on a Cisco Router, which command starts the IP processing
on the interface?
A. IP-Space enable.
B. Network IP-Address.
C. IP address IP-address subnet mask.
D. The exit command from the enable configuration.
E. Copy running-configuration to startup-configuration.

Answer: C

298. When you issue the command show version, your router returns:
"Configuration register is 0x0101"
From where does the router boot?
A. ROM
B. NVRAM
C. FLASH
D. A TFTP server

Answer: A

299. Which range of possible numbers do standard IPX access lists have?
A. 100 - 199
B. 600 - 699
C. 800 - 899
D. 1000 - 1099

Answer: C

300. Which statement about the data-link connection identifier (DLCI) is true?
A. It is a number that identifies a local virtual circuit in Frame Relay network.
B. It is a signaling standard between the CPE device and the Frame Relay switch.
C. It is check speed port speed of the connection (local loop) to the Frame Relay cloud.
D. It is maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer
beyond the committed information rate (CIR).

Answer: A

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -