1、ccna考试题库QUESTION 101 Refer to the exhibit. The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a frame leaving host A. What can be concluded from this inform
2、ation A. The MAC address of host A is B. The router will forward the packet in this frame to the Internet. C. The switch will only forward this frame to the attached router interface. D. All devices in this LAN except host A will pass the packet to Layer 3. QUESTION 102 What is an appropriate use of
3、 a default route A. to provide routing to a local web server B. to provide routing from an ISP to a stub network C. to provide routing that will override the configured dynamic routing protocol D. to provide routing to a destination that is not specified in the routing table and which is outside the
4、 local network QUESTION 103 Refer to the exhibit. A junior network engineer has prepared the exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1 (Choose two.) A. The two FastEthernet interfaces will require NAT configured on two outside serial
5、interfaces. B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet. C. The fa0/1 IP address overlaps with the space used by s0/0. D. The fa0/1 IP address is invalid for the IP subnet on which it resides. E. Internet hosts may not initiate connections to DMZ Devices th
6、rough the configuration that is shown. QUESTION 104 Refer to the exhibit. Two routers have just been configured by a new technician. All interfaces are up. However, the routers are not sharing their routing tables. What is the problem A. Split horizon is preventing Router2 from receiving routing inf
7、ormation from Router1. B. Router1 is configured for RIP version 2, and Router2 is configured for RIP version 1. C. Router1 has an ACL that is blocking RIP version 2. D. There is a physical connectivity problem between Router1 and Router2. E. Router1 is using authentication and Router2 is not. QUESTI
8、ON 105 A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of The company has decided it would be a good idea to split the network into three smaller subnets and create t
9、he option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets A. Convert all the routers to EIGRP and use and as the new subnetworks. B. Maintain the use of RIP version 1 and use and as the new subnetworks. C. Conver
10、t all the routers to EIGRP and use and as the new subnetworks. D. Convert all the routers to RIP version 2 and use and as the new subnetworks. E. Convert all the routers to OSPF and use and as the new subnetworks. F. Convert all the routers to static routes and use and QUESTION 106 Refer to the exhi
11、bit. Why has this switch not been elected the root bridge for VLAN1 A. It has more than one interface that is connected to the root network segment. B. It is running RSTP while the elected root bridge is running spanning tree. C. It has a higher MAC address than the elected root bridge. D. It has a
12、higher bridge ID than the elected root bridge. QUESTION 107 Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role A. Switch3, port fa0/1 B. Switch3, port fa0/12 C. Switch4, port fa0/11 D. Switch4, port fa0/2 E. Switch3, port Gi0/
13、1 F. Switch3, port Gi0/2 QUESTION 108 Refer to the exhibit. How many paths can the EIGRP routing process use to forward packets from HQ_Router to a neighbor router A. two equal-cost paths B. two unequal-cost paths C. three equal-cost paths D. three unequal-cost paths E. four equal-cost paths F. four
14、 unequal-cost paths QUESTION 109 Select the action that results from executing these commands. Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky A. A dynamically learned MAC address is saved in the startup-configuration file. B. A dynamically
15、learned MAC address is saved in the running-configuration file. C. A dynamically learned MAC address is saved in the VLAN database. D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received. E. Statically configured MAC addresses are
16、saved in the running-configuration file if frames from that address are received. QUESTION 110 Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch. 2950Switch(config-if)# switchport port-security 2950Switch(config-if)# switchport port-security mac-address stick
17、y 2950Switch(config-if)# switchport port-security maximum 1 The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch (Choose two.) A. The MAC address table will now have an additional entry of fa0/1 B. Only host A will be al
18、lowed to transmit frames on fa0/1. C. This frame will be discarded when it is received by 2950Switch. D. All frames arriving on 2950Switch with a destination of will be forwarded out fa0/1. E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded ou
19、t fa0/1. F. Only frames from source the first learned MAC address of 2950Switch, will be forwarded out fa0/1. QUESTION 111 Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conferenc
20、e room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were n
21、ot intended to support multiple workstations. What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use A. Configure static entries in the switch MAC address table to include the rang
22、e of addresses used by visiting employees. B. Configure an ACL to allow only a single MAC address to connect to the switch at one time. C. Use the mac-address-table 1 global configuration command to limit each port to one source MAC address. D. Implement Port Security on all interfaces and use the p
23、ort-security maximum 1 command to limit port access to a single MAC address. E. Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address. F. Implement Port Security at global configuration mode and use the port-security ma
24、ximum 1 command to allow each switch only one attached hub. QUESTION 112 Running both IPv4 and IPv6 on a router simultaneously is known as what A. 4to6 routing B. 6to4 routing C. binary routing D. dual-stack routing E. NextGen routing QUESTION 113 What are three IPv6 transition mechanisms (Choose th
25、ree.) A. 6to4 tunneling B. VPN tunneling C. GRE tunneling D. ISATAP tunneling E. PPP tunneling F. Teredo tunneling QUESTION 114 Identify the four valid IPv6 addresses. (Choose four.) A. : B. :192:168:0:1 C. 2000: D. 2001:3452:4952:2837: E. 2002:c0a8:101:42 F. 2003:dead:beef:4dad:23:46:bb:101 QUESTIO
26、N 115 Which protocol should be used to establish a secure terminal connection to a remote network device Select the best response. A. ARP B. SSH C. Telnet D. WEP E. SNMPv1 F. SNMPv2 QUESTION 116 Refer to the exhibit. A network administrator wants Switch3 to be the root bridge. What could be done to
27、ensure Switch3 will be the root A. Configure the IP address on Switch3 to be higher than the IP addresses of Switch1 and Switch2. B. Configure the priority value on Switch3 to be higher than the priority values of Switch 1 and Switch2. C. Configure the BID on Switch3 to be lower than the BIDs of Swi
28、tch1 and Switch2. D. Configure the MAC address on Switch3 to be higher than the Switch1 and Switch2 MAC addresses. E. Configure a loopback interface on Switch3 with an IP address lower than any IP address on Switch1 and Switch2. QUESTION 117 What is the maximum data rate specified for IEEE WLANs A.
29、10 Mbps B. 11 Mbps C. 54 Mbps D. 100 Mbps QUESTION 118 How does using the service password encryption command on a router provide additional security A. by encrypting all passwords passing through the router B. by encrypting passwords in the plain text configuration file C. by requiring entry of enc
30、rypted passwords for access to the device D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges E. by automatically suggesting encrypted passwords for use in configuring the router QUESTION 119 Refer to the exhibit. When running OSPF, What would cause r
31、outer A not to form an adjacency with router B A. The loopback addresses are on different subnets. B. The value of the dead timers on the router are different. C. Route summarization is enabled on both routers. D. The process indentifier on router A is different than the process identifier on router
32、 B. QUESTION 120 Refer to the exhibit. What statement is true of the configuration for this network A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported. B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configu
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1