📄 301-350.txt
字号:
301. a hosta in the sale department cant connect to the hostb in management department.
choose the reason!
routera(e0)-----------------------(e0)routerb
192.168.23.1 192.168.21.5
| |
| |
| |
hosta hostb
192.168.23.2 192.168.21.2
255.255.240.0 255.255.255.240
A. the routerb inteface's ip addresss.
B. hosta's bad ip address
C. hostb's bad ip address
D. bad broadcast address
E. the routera interface's ip addresss.
Answer: C
302. Which of the following are options for frame relay LMI types?(choose three)
A. IETF
B. q.931
C. q933a
D. IEEE
E. CISCO
F. ANSI
Answer: C E F
303. Using the TCP/IP protocol suite, a message is sent from host A to a destination
IP address on the same LAN. How does host A determine the destination's MAC
address?
A. It uses a proxy ARP.
B. It uses ARP requests.
C. It uses RARP requests.
D. It uses a router lookup table.
Answer: B
304. Which statement about Ethernet networks is true?
A. The advantage of a full duplex is the ability to transmit data over Mbase2 cable
B. Full duplex Ethernet requires a point-to-point connection when only two nodes are
present
C. Ethernet switches can use full duplex mode to connect multiple nodes
to a single port of a switch
D. Half duplex is a cut through packet processing method that is very fast with little error
correction, full duplex is store and forward method that is slower but has better error
correction
ANSWER: B
305. What is the layer of TCP/IP comfront the OSI layer network.
A. The Process/Application layer
B. The Host-to-Host layer
C. The Internet layer
D. The Network Access layer
Answer: C
306. Which IOS command could be used to copy the saved configuration to an
TFTP serve?
A. copy nvram tftp
B. copy net tftp
C. copy startup-config tftp
D. copy running-config tftp
Answer: C
307. Which statement about Ethernet switches is true?
A. Symmetric switching allows connection between ports of unlike bandwidth and does not require
memory buffering.
B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected
on a symmetric switch.
C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store
and forward is better for error detection.
D. The cut-trough method of switching is faster because the switch forwards the packet to the
destination as soon as it reads the destination address.
Answer: D
308. Exhibit:
The exhibit shows an IP address and its subnet mask. What is the last available host address for
this IP subnet?
A. 172.20.7.255
B. 172.20.7.197
C. 172.20.7.190
D. 172.20.7.129
E. 172.20.255.255
Answer: C
309. What is the bit length and expression form of a MAC address?
A. 24 bits expression as a decimal number.
B. 24 bits expression as a hexadecimal number.
C. 36 bits expression as a binary number.
D. 48 bits expression as a decimal number.
E. 48 bits expression as a hexadecimal number.
Answer: E
310. Which command displays all the commands in the history buffer?
A. Control header.
B. Show buffer.
C. Show history.
D. Show history buffer.
Answer: C
311. Which two solutions are used to reduce the chance of distance vector routing loops. (Choose
two)
A. Split horizon.
B. Route Poison.
C. Area Hierarchies.
D. Link State Algorithms.
Answer: A B
312. Which command should you use to configure a router so that it can become a TFTP host for
router system image that is run in Flash?
A. Copy flash tftp
B. Config tftp server
C. Write network <router name>
D. Tftp-server system <filename>
E. Setup server tftp <systemname>
Answer: D
313. When you enter router password during the setup dialogue what is the difference between
enable secret passwords?
A. The enable password is encrypted.
B. The enable secret password uses IPSec password authentication.
C. The enable secret password cannot be seen as clear text when viewing the configuration.
D. The enable secret password acts as a backup in case the enable password is compromised.
Answer: C
314. Which three commands are used to configure information into RAM on a router. (Choose three)
A. Configure memory.
B. Configure terminal.
C. Configure overwrite.
D. Copy TFTP startup-Config.
E. Copy running-Config startup-Config.
F. Copy startup-Config running-Config.
Answer: A B F
315. How do you get help on a command after you have received “% INCOMPLETE COMMAND”
response from a switch CLI?
A. Type “history” to review the prompt before the error.
B. Enter a question mark to display all console commands.
C. Type “help” followed by the command to see the command parameter.
D. Re enter the command followed by question mark to view key words.
Answer: D
316. Which command assigns the login password Cisco on the console terminal line?
A. Line vty 0
Log in
Password Cisco
B. Line console
Login
Password Cisco
C. Line login terminal
Password Cisco
D. Line console 0
Login
Password CISCO
E. Line console 0
Login
Password Cisco
Answer: E
317. You just entered the following command
routers(config) #line console 0
Which operation is most likely to follow?
A. Configure terminal type.
B. Enter protocol parameters for a serial line.
C. Create a password on the console terminal line.
D. Establish a terminal type 4 connection to a remote host.
E. Change from configuration mode to console privilege mode.
Answer: C
318. Which information must a router have in order to perform proper and efficient routing?
A. Destination application of an incoming packet.
B. Number of other packets in a single flow of data.
C. Destination network address of an incoming packet.
D. Number of routers that know a path to the destination.
Answer: C
319. Which symbol in the router prompt indicates you are in the privileged mode?
A. >
B. !
C. #
D. :
Answer: C
320. Which statement about half-duplex Ethernet operation is true?
A. With half duplex transmission frames feed into a single cable in one direction at a time.
B. Half duplex transmission between stations is achieved by using point-to-point Ethernet and fast
Ethernet connection.
C. Half duplex transmission between stations is achieved by using point to multi point Ethernet and
fast Ethernet connection.
D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the
receiver circuit at the other end of the connection.
Answer: A
321. What is back off on an 802.3 network?
A. It is latency stored and forward switching.
B. It is the time used to token passing from machine to machine.
C. It is re transmission delay that is encountered when a collision occurs.
D. It the result of two nodes transmitting at the same time the frames from each transmitting device
collide and are damaged.
Answer: C
322. Which are two steps are required to configure and apply standard access list on an interface?
(Choose two)
A. Define and access list number and its parameter.
B. Enable an interface to become part of the access list group.
C. Define the number of access list to be supported on an interface.
D. Copy the access list definition to each interface that will support it.
Answer: A B
323. Which command displays access list 111?
A. Show access-list 111
B. Show IP access list 111
C. Display IP address list 111
D. Display access-list 111 details
Answer: A
324. Given the following criteria for granting access from a remote site to your LAN :
restrict access on interface E0
E0=128.12.22.55
Deny access to telnet, FTP
All other types of operations.
Which line should come last in configuring your access list?
A. Access-List 101
B. Access-List 101 deny E0 telnet FTP
C. Access list 101 allow all except FTP telnet
D. Access list 101 permit IP 0.0.0.0 255.255.255.255 any
E. Access List 101 deny IP 128.12.22.55 TCP EQ 20 21 23
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -