《CCNA认证基础课程-课后功课习题谜底.pdf》由会员分享,可在线阅读,更多相关《CCNA认证基础课程-课后功课习题谜底.pdf(64页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、CCNA认证基础-习题分析讲义第一部分第一章1.Convert the binary number 10111010 into its hexadecimal equivalent.Select thecorrect answer from the list below.(3)1)852)903)BA4)A15)B36)1C2.Convert the Hexadecimal number A2 into its Base 10 equivalent.Select thecorrect answer from the list below.(4)1)1562)1583)1604)1625)164
2、6)1663.Which binary number is a representation of the decimal number 248?(3)1)111010002)111101003)111110004)111110104.Which of the following will test the internal loopback of a node?(3)1)ping 10.10.10.12)ping 192.168.1.13)ping 127.0.0.14)ping 223.223.223.2235)ping 255.255.255.2555.What can be verif
3、ied by successfully pinging the reserved loopback address ona host?(2)1)Connectivity exists between two hosts on the LAN.2)The TCP/IP stack of the local host is configured correctly.3)A connection exists between a host and the default gateway.4)The route a packet takes from the local host to a remot
4、e host is valid.6.Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system?(Choose two.)(3,4)1)configip2)ifconfig3)ipconfig4)winipcfg5)Winipconfig7.Refer to the exhibit.What must be configured on Host B to allow it to communicate wit
5、hthe Host C?(Choose three.)(2,4,6)1)the MAC address of RTA router interface connected to Switch 12)a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8.What are important characteristics to consider when purchasing
6、 a networkinterface card?(Choose two.)(2,3)1)security used on the network2)media used on the network3)system bus used on the computer4)software installed on the network5)diagnostic tools installed on the network第一章-HF-1.Select the necessary information that is required to compute the estimated timei
7、t would take to transfer data from one location to another.(Choose two.)(1,5)1)file size2)data format3)network in use4)type of medium5)bandwidth of the link2.Using the data transfer calculation T=S/BW,how long would it take a 4MB file tobe sent over a 1.5Mbps connection?(2)1)52.2 seconds2)21.3 secon
8、ds3)6.4 seconds4)2 seconds5)0.075 seconds6)0.0375 seconds3.What are features of the TCP/IP Transport layer?(Choose two.)(3,5)1)path determination2)handles representation,encoding and dialog control3)uses TCP and UDPp rotocols4)packet switching5)reliability,flow control and error correction4.Which of
9、 the following is the Layer 4 PD U?(4)1)bit2)frame3)packet4)Segment5.What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication?(Choose three.)(3,4,5)1)It links data to the transport layer.2)It encapsulates frames into packets.3)It provides a
10、service to the network layer.4)It encapsulates the network layer information into a frame.5)Its header contains a physical address which is required to complete the datalink functions.6)It encodes the data link frame into a pattern of 1s and Os(bits)for transmissionon the medium.6.Which statement de
11、scribes a star topology?(2)1)Each host in the network is connected to a backbone cable that is terminated atboth ends.2)Each host is connected to a hub or switch,either of which acts as a central pointfor all network connections.3)Each host is directly connected to two other hosts to form a long cha
12、in of hosts.4)Each host has a connection to all other hosts in the network.7.Which statements describe the logical token-passing topology?(Choose two.)(2)1)Network usage is on a first come,first serve basis.2)Computers are allowed to transmit data only when they possess a token.3)Data from a host is
13、 received by all other hosts.Electronic tokens are passedsequentially to each other.4)Token passing networks have problems with high collision rates.8.Which technologies are considered to be LAN technologies?(Choose two.)(2,5)1)DSL2)Token Ring3)Frame Relay4)ISDN5)Ethernet9.Refer to the exhibit.Host
14、A wants to send a message to host B.Place the following stepsin the correct order so that the message can be sent.(4)A-add network layer addressesB-transmit bitsC-create application dataD-add data link layer addresses10J9.18.17 f13 1019.18.18 fl31)B,A,D,C2)D,A,C,B3)A,D,A,B4)C,A,D,B5)C,D,A,B6)C,B,A,D
15、10.After an unsuccessful ping to the local router,the technician decides to investigate therouter.The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring?(4)1)transport2)network3)data link4)physical11.Refe
16、r to the exhibit.What is the order of the TCP/IP Protocol D ata Units as datais moved as indicated through the OSI model?(3)7 Application Data6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical1)data,segments,frames,packets,bits2)data,packets,segments,frames,bits3)data,segments,packets,
17、frames,bits4)data,packets,frames,segments,bits第三章1.Which combinations of charges will be repelled by electric force?(Choose two.)(4,6)1)neutral and neutral2)neutral and positive3)neutral and negative4)positive and positive5)positive and negative6)negative and negative2.Which of the following are con
18、sidered the best media for use in data networkcommunications?(Choose three.)(2,3,6)1)glass2)fibers3)copper4)gold5)plastic6)silicon7)Silver3.Which of the following wireless standards increased transmission capabilitiesto 11 Mbps?(2)1)802.11a2)802.11b3)802.11c4)802.11d4.What is attenuation?(3)1)opposi
19、tion to the flow of current2)measurement of electrical signals relative to time3)degradation of a signal as it travels along the medium4)amount or volume of traffic that is flowing on the medium5.Which cable specifications are indicated by 10BASE-T?(3)1)10 Mbps transmission speed,baseband signal,500
20、 meter cable length,coaxialcable2)10 Mbps transmission speed,broadband signal,100 meter cable length,coaxialcable3)10 Mbps transmission speed,baseband signal,100 meter cable length,twisted-pair cable4)10 Gbps transmission speed,broadband signal,500 meter cable length,twisted-pair cable6.For which Et
21、hernet installations would fiber optic rather than Cat5 UTP be abetter media choice?(Choose two.)(2,4)1)a 3 meter connection between two 10BASE-T hubs2)an environment with many potential sources of EMI and RFI3)a peer to peer connection between two NICs with RJ45 connectors4)an installation between
22、two buildings that are located 500 meters apart5)a single building installation where installation costs are the major concern7.Refer to the exhibit.Which type of UTP cable should be used to connect Host Ato Switch 1?(4)Host A马iSwitchlHostB1)rollover2)console3)crossover4)straight-through8.Refer to t
23、he exhibit.Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B?(3)1)coax cable2)rollover cable3)crossover cable4)straight-through cable第四章1.D uring cable testing,which of the following are used to calculate theinformation carrying capacity of a data cable?(
24、Choose two.)(2,5)1)bit speed2)attenuation3)wire map4)saturation limit5)analog bandwidth2.What type of wiring problem is depicted in this sample of a cable tester?(3)1)a fault2)a short3)an open4)a split a good map3.In a new network installation,the network administrator has decided to use amedium tha
25、t is not affected by electrical noise.Which cable type will best meetthis standard?(5)1)coaxial2)screened twisted pair3)shielded twisted pair4)unshielded twisted pair5)fiber optic4.How does network cable length affect attenuation?(3)1)Category 5 cable that is run in metal conduit has the highest att
26、enuation in theshortest distance.2)Shorter cable lengths have greater signal attenuation.3)Longer cable lengths have greater signal attenuation.4)The length of the cable has no effect on signal attenuation.第五章1.The highest capacity Ethernet technologies should be implemented in whichareas of a netwo
27、rk?(Choose three.)(3,4,5)1)between workstation and backbone switch2)between individual workstations3)between backbone switches4)between enterprise server and switch5)on aggregate access links2.What device must be used between an AUI port of a networking device and themedia to which it is being conne
28、cted?(3)1)a transducer2)a transmitter3)a transceiver4)a transponder5)a port replicator3.An ISD N Basic Rate Interface(BRI)is composed of how many signalingchannels?(1)1)12)23)34)44.Which layer of the OSI model covers physical media?(1)1)Layer 12)Layer 23)Layer 34)Layer 45)Layer 56)Layer 65.What type
29、 of network cable is used between a terminal and a console port?(3)1)cross-over2)straight-through3)rollover4)patch cable6.What is the recommended maximum number of workstations configured on apeer-to-peer network?(3)1)252)153)104)55)27.Which of the following increases the potential for a collision t
30、o occur?(4)1)the use of an active hub instead of an intelligent hub2)the use of an intelligent hub instead of an active hub3)a reduction in the number of devices attached to the hub4)an increase in the number of devices attached to the hub8.What is the maximum length of a media segment used for 100B
31、ASE-TX?(1)1)100 meters2)185 meters3)400 meters4)500 meters9.Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices?(3)1234567-A 78 -8Cable A-A 1-2 3-4-A 5-61 一 A 82-73 一-A 64 4-55 一-A 4。*7 一-2Cable B1-A 32,A 03-4-45-A 567-A 78Cable C1 A 32 3 5/.host bits=3The
32、n the borrowed bits=7-3 =4Network bits+subnet bits=25+4=29Mask=255.255.255.248Subnet IDMaskIP rangebroadcast191.15.18.128255.255.255.248191.15.18.136191.15.18.144191.15.18.152191.15.18.160.191.15.18.2485.案例学习:已知如下拓扑,给定地址范围10.0.0.0/24。进行合理地址规划。Answer:1)标注子网数量及子网大小,如图所示:2)从最大子网开始按需使用变长子网掩码进行划分 10.0.0.
33、0/26-子网 10.0.0.64/26-子网 10.0.0.128/26-子网 10.0.0.192/27-子网 10.0.0.224/29-子网 10.0.0.232/30-子网 10.0.0.236/30-子网3)思考:若不按照从最大子网开始划分的顺序进行子网规划,如何保证地址规划的正确性?!第二部分第一章1.Terminal emulation software,such as HyperTerminal,can be used to configurea router.Which of the following HyperTerminal options shown in the
34、graphic arecorrectly set to allow configuration of a Cisco router?(Choose three.)(2、3、4)1)bits per second2)data bits3)parity4)stop bits5)flow control2.Which of the following describes the function of a WAN?(4)1)connects peripherals in a single location2)connects multiple networks in a single buildin
35、g3)provides connectivity on a LAN4)provides connectivity over a large geographic area3.A router is composed of many internal components.Which of the followingcomponents stores a copy of the routers configuration file?(4)1)Metal-Oxide memory2)read only memory3)flash memory4)non-volatile random access
36、 memory4.Which of the following layers of the OSI model are incorporated in WANstandards?(Choose two.)(1、4)1)physical layer2)application layer3)transport layer4)data link layer5)session layer5.Which of the following devices are used in the construction of a WAN?(Choosethree.)(2、3、5)1)hubs2)routers3)
37、communication servers4)transceivers5)modems6)multi-port repeaters6.Why is a console connection to a router or switch preferred whentroubleshooting?(Choose two.)(2、3)1)can be accessed remotely2)does not depend on network services3)displays startup and error messages by default4)does not require speci
38、al components7.Which ports on Cisco routers can be used for initial configuration?(Choosetwo.)(2、3)1)Ethernet2)console3)auxiliary4)serial5)AUI6)BRI8.Which of the following are functions of RAM?(Choose three.)(2 3、5)1)contains startup configuration file2)stores routing table3)holds fast switching cac
39、he4)retains contents when power is removed5)stores running configuration file9.D uring the initial configuration of a 2600 series Cisco router,which cable isrequired for connecting a PC to the console port?(3)1)twisted2)crossover3)rollover4)straight10.D uring the initial configuration of a 2600 seri
40、es Cisco router,which cable isrequired for connecting a PC to the console port?(3)1)twisted2)crossover3)rollover4)straight11.What contains the instructions that a router uses to control the flow of trafficthrough its interfaces?(2)1)packet configuration2)configuration files3)flash memory4)internal c
41、omponents12.Which of the following are true regarding router interfaces?(Choose three.)(2、3、5)1)provides temporary memory for the routers configuration files2)connects the router to network for frame entry and exit3)can be on the motherboard or on a separate module4)holds the IOS image5)connects the
42、 router to LANs and WANs13.What do routers use to select the best path for outgoing data packets?(3)1)ARP tables2)bridging tables3)routing tables4)switching tables14.ABC Company just purchased three new routers to start their company network.Which items are needed to establish a terminal session bet
43、ween a PC and therouter for the initial configuration?(Choose three.)(2、3、4)1)straight-through cable2)terminal emulation software3)rollover cable4)RJ-45 to DB-9 connector5)V.35 cable第一章1.What is the maximum number of commands allowed in the history buffer?(5)1)102)203)1284)2555)2562.Which keystrokes
44、 can be used to return to the privileged mode from theinterface configuration mode?(2、4)1)Ctrl-P2)Ctrl-Shift-6,then X3)Ctrl-Z4)Esc3.Which of the following connection methods can be used to perform the initialconfiguration of a router?(Choose two.)(1、4)1)use a serial connection of a computer connecte
45、d to the console port of a router2)telnet to the router through a serial port3)use a vty port using the ethernet interface4)use a null modem cable connected to the AUX port of the router4.Which of the following statements concerning router interface modes arecorrect?(Choose three.)(1、4、6)1)User EXEC
46、 mode provides commands to monitor router operation.2)Privileged EXEC mode only provides commands to change or configure routerperation.3)Password protected configuration modes can be accessed from either userEXEC or privileged EXEC modes.4)On a router with the name Corel,the prompt indicating privi
47、leged EXEC modeis Corel#.5)The command to enter privileged EXEC mode is Router#enable.6)A username and password may be required to enter privileged EXEC mode.5.What information does the name of the IOS file provide to the networkadministrator?(Choose three.)(2、4、6)1)the amount of NVRAM required to r
48、un the image2)the hardware platform the image runs on3)the various software platforms the image can run on4)special features and capabilities of the image5)the bandwidth supported by the IOS6)where the image executes from and if it has been compressed6.What baud rate needs to be configured on termin
49、al emulation software to allowa connection to the console port of a router?(3)1)24002)48003)96004)142005)384007.Which tasks can be accomplished by using the command history feature?(Choose two.)(3、4)1)View a list of commands entered in a previous session.2)Recall up to 15 command lines by default.3)
50、Set the command history buffer size.4)Recall previously entered commands.5)Save command lines in a log file for future reference.8.When the router output is being viewed through a terminal program,whichstatements are true regarding the-M ore-prompt at the bottom of the routerdisplay?(Choose two.)(2