欢迎来到装配图网! | 帮助中心 装配图网zhuangpeitu.com!
装配图网
ImageVerifierCode 换一换
首页 装配图网 > 资源分类 > DOC文档下载
 

CCNA考试题库之二:最新640802v

  • 资源ID:124700330       资源大小:3.43MB        全文页数:45页
  • 资源格式: DOC        下载积分:9.9积分
快捷下载 游客一键下载
会员登录下载
微信登录下载
三方登录下载: 微信开放平台登录 支付宝登录   QQ登录   微博登录  
二维码
微信扫一扫登录
下载资源需要9.9积分
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

 
账号:
密码:
验证码:   换一换
  忘记密码?
    
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

CCNA考试题库之二:最新640802v

101. Which of the following are true regarding the command output shown in the display? (Choose two.)A. There are at least two routers participating in the RIP process.B. A ping to 192.168.168.2 will be successful.C. A ping to .2 will be successful.D. RtrA has three interfaces participating in the RIP process.Answer: AC102. What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)A. protocolB. VLAN numberC. TCP or UDP port numbersD. source switch port numberE. source IP address and destination IP addressF. source MAC address and destination MAC addressAnswer: ACE103. Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown inthe exhibit? (Choose two.)A. Host E and host F use the same IP gateway address. B. Router1 and Switch2 should be connected via a crossover cable.C. Router1 will not play a role in communications between host A and host D. D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.Answer: DF104. What is the effect of using the service password-encryption command? A. Only the enable password will be encrypted.B. Only the enable secret password will be encrypted.C. Only passwords configured after the command has been entered will be encrypted.D. It will encrypt the secret password and remove the enable secret password from the configuration.E. It will encrypt all current and future passwords.Answer: E105. Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.B. Router1 is acting as a TFTP server for other routers. C. Router1 cannot locate a valid IOS image in flash memory.D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.E. Cisco routers will first attempt to load an image from TFTP for management purposes.Answer: AC106. At which OSI layer is a logical path created between two host systems? A. sessionB. transportC. networkD. data link E. physical Answer: C107. What functions do routers perform in a network? (Choose two.) A. packet switchingB. access layer securityC. path selection D. VLAN membership assignmentE. bridging between LAN segmentsF. microsegmentation of broadcast domainsAnswer: AC108. Refer to the exhibit. The show vtp status command is executed at a switch that is generating the exhibited output. Which statement is true for this switch?A. The switch forwards its VLAN database to other switches in the ICND VTP domain.B. The configuration revision number increments each time the VLAN database is updated.C. The switch forwards VTP updates that are sent by other switches in the ICND domain. D. The VLAN database is updated when VTP information is received from other switches.Answer: C109. A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?A. It checks the configuration register.B. It attempts to boot from a TFTP server.C. It loads the first image file in flash memory.D. It inspects the configuration file in NVRAM for boot instructions. Answer: A110. Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose three.)A. All ports will be in a state of discarding, learning, or forwarding.B. Thirty VLANs have been configured on this switch. C. The bridge priority is lower than the default value for spanning tree. D. All interfaces that are shown are on shared media.E. All designated ports are in a forwarding state.F. This switch must be the root bridge for all VLANs on this switch.Answer: ACE111. What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?A. It creates a VLAN 999 interface.B. It designates VLAN 999 for untagged traffic.C. It blocks VLAN 999 traffic from passing on the trunk.D. It designates VLAN 999 as the default for all unknown tagged traffic.Answer: B112. Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table?A. 30 seconds B. 60 seconds C. 90 seconds D. 180 seconds E. 240 secondsAnswer: B113. When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?A. no VLANs B. all VLANsC. only VLANs 1 - 64D. only the VLANs that are specified when creating the trunkAnswer: B114. Which three statements describe the differences between RIP version 1 and RIP version 2? (Choose three.)A. RIP version 1 broadcasts updates whereas RIP version 2 uses multicasts.B. RIP version 1 multicasts updates while RIP version 2 uses broadcasts.C. Both RIP version 1 and RIP version 2 are classless routing protocols. D. RIP Version 2 is a classless routing protocol whereas RIP version 1 is a classful routing protocol.E. Both RIP version 1 and version 2 support authentication.F. RIP version 2 sends the subnet mask in updates and RIP version 1 does not.Answer: ADF 115. An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?A. access-list 10 permit 172.29.16.0 .255B. access-list 10 permit 172.29.16.0 .255C. access-list 10 permit 172.29.16.0 .255D. access-list 10 permit 172.29.16.0 .255Answer: C116. Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)Answer: BD117. At which layers of the OSI model do WANs operate? (Choose two.)A. application layerB. session layerC. transport layerD. network layerE. datalink layerF. physical layerAnswer: EF118. Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but has failed to configure routing properly. Which configuration will allow the hosts on the BranchLAN to access resources on the HQ LAN with the least impact on router processing and WANbandwidth?A.B.HQ(config)# router ripHQ(config-router)# network 192.168.2.0 HQ(config-router)# network 172.16.0.0 Branch(config)# router ripC.HQ(config)# router eigrp 56HQ(config-router)# network 192.168.2.4 Branch(config)# router eigrp 56D. HQ(config)# router ospf 1HQ(config-router)# network 192.168.2.4 .3 area 0 HQ(config-router)# network 172.16.25.0 .255 area 0Branch(config)# router ospf 1Branch (config-router)# network 192.168.1.0 .255 area 0Branch (config-router)# network 192.168.2.4 .3 area 0Answer: A119. Refer to the exhibit. What is the purpose of the configuration that is shown?A. to translate addresses of hosts on the fa0/0 and fa0/1 networks to a single public IP address for Internet access B. to translate the internal address of each host on fa0/0 and fa0/1 to a unique external IP address for Internet accesC. to provide security on fa0/0 and fa0/1 through the application of an access listD. to allow IP hosts on the Internet to initiate TCP/IP connections to hosts on fa0/0 and fa0/1Answer: A120. A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch.The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors. C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.Answer: CE121. The OSPF Hello protocol performs which of the following tasks? (Choose two.)A. It provides dynamic neighbor discovery.B. It detects unreachable neighbors in 90 second intervals.C. It maintains neighbor relationships.D. It negotiates correctness parameters between neighboring interfaces.E. It uses timers to elect the router with the fastest links as the designated router.F. It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.Answer: AC122. Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)A. console passwordB. vty password C. aux passwordD. tty passwordE. enable secret passwordF. username passwordAnswer: BE123. Refer to the exhibit. What IP address should be assigned to Workstation A? Answer: C124. Refer to the exhibit. Which address and mask combination represents a summary of the routes learned by EIGRP? A. 192.168.25.0 255.255.255.240 B. 192.168.25.0 255.255.255.252 Answer: C125. An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)A. FTPB. TelnetC. SMTPD. DNSE. HTTPF. POP3Answer: DEF126. Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network. The network administrator connected to router Coffee via the console port, issued the show ip route command, and was able to ping the server. Based on the output of the show ip route command andthe topology shown in the graphic, what is the cause of the failure?A. The network has not fully converged.B. IP routing is not enabled. C. A static route is configured incorrectly. D. The FastEthernet interface on Coffee is disabled.E. The neighbor relationship table is not correctly updated. F. The routing table on Coffee has not updated .Answer: C127. Why does the data communication industry use the layered OSI reference model? (Choose two.)A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshootingB. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.C. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.D. It encourages industry standardization by defining what functions occur at each layer of the model.E. It provides a means by which changes in functionality in one layer require changes in other layers.Answer: AD 128. Refer to the exhibit. RIPv2 is in use on the network with no standard policy in place for summarization. A packet arrives at CentralRouter with a destination IP address of 208.149.23.91. Given the output that is shown,how will CentralRouter process that packet?A. It will forward the packet to 190.171.23.10.B. It will forward the packet to 190.171.23.12.C. It will forward the packet to 192.168.33.1.D. It will hold the packet for 22 seconds.E. It will hold the packet for 21 seconds.F. It will discard the packet because there is no matching route.Answer: B129. The network security policy requires that only one host be permitted to attach dynamically to each switchinterface. If that policy is violated, the interface should shut down. Which two commands must the networkadministrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)A. Switch1(config-if)# switchport port-security maximum 1B. Switch1(config)# mac-address-table secureC. Switch1(config)# access-list 10 permit ip hostD. Switch1(config-if)# switchport port-security violation shutdown E. Switch1(config-if)# ip access-group 10 Answer: AD 130. Refer to the exhibit. A network associate has configured OSPF with the command:City(config-router)# network 192.168.12.64 .63 area 0After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF.Which three of the interfaces shown in the exhibit will participate in OSPF according to this configurationstatement? (Choose three.)A. FastEthernet0 /0 B. FastEthernet0 /1C. Serial0/0D. Serial0/1.102 E. Serial0/1.103F. Serial0/1.104 Answer: BCD 131. Refer to the exhibit. Explain how the routes in the table are being affected by the status change on Interface Ethernet0.A. The router is requesting updates for these networks from routers that are connected to interface Ethernet1.B. The router is poisoning the routes and broadcasting the new path costs via interface Ethernet1. C. The router is receiving updates about unreachable networks from routers that are connected to interface Ethernet1.D. The router is poisoning the routes and multicasting the new path costs via interface Ethernet1. Answer: D132. Which statement is correct about the internetwork shown in the diagram?A. Switch 2 is the root bridge.B. Spanning Tree is not running.C. Host D and Server 1 are in the same network.D. No collisions can occur in traffic between Host B and Host C.E. If Fa0/0 is down on Router 1, Host A cannot access Server 1.F. If Fa0/1 is down on Switch 3, Host C cannot access Server 2.Answer: E133. Which statements are true about EIGRP successor routes? (Choose two.)A. A successor route is used by EIGRP to forward traffic to a destination.B. Successor routes are saved in the topology table to be used if the primary route fails.C. Successor routes are flagged as "active" in the routing table.D. A successor route may be backed up by a feasible successor route.E. Successor routes are stored in the neighbor table following the discovery process. Answer: AD 134. Which of the following is true regarding the use of switches and hubs for network connectivity?A. Switches take less time to process frames than hubs take.B. Switches do not forward broadcasts.C. Hubs can filter frames.D. Using hubs can increase the amount of bandwidth available to hosts.E. Switches increase the number of collision domains in the network. Answer: E135. Why has the network shown in the exhibit failed to converge?A. The no auto-summary command needs to be applied to the routers. B. The network numbers have not been properly configured on the routers.C. The subnet masks for the network numbers have not been properly configured.D. The autonomous system number has not been properly configured. E. The bandwidth values have not been properly configured on the serial interfaces.Answer: A136. DNS servers provide what service? A. Given an IP address, they determine the name of the host that is sought.B. They convert domain names into IP addresses.C. They run a spell check on host names to ensure accurate routing.D. They map individual hosts to their specific IP addresses.Answer: B137. What are two characteristics of Telnet? (Choose two.)A. It sends data in clear text format.B. It is no longer supported on Cisco network devices.C. It is more secure than SSH.D. It requires an enterprise license in order to be implemented.E. It requires that the destination device be configured to support Telnet connections. Answer: AE138. What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)A. default gateway B. DNS serversC. FTP server D. helper addressE. subnet maskF. TFTP serverAnswer: ABE139. Which of the following are key characteristics of PPP? (Choose three.)A. can be used over analog circuitsB. maps Layer 2 to Layer 3 addressC. encapsulates several routed protocolsD. supports IP only E. provides error correctionAnswer: ACE140. Refer to the exhibit. The network administrator has discovered that the VLAN configuration of SwitchC Is not synchronized with the rest of the switched network. Why is SwitchC not receiving VTP updates?A. SwitchB is not relaying VTP advertisements to SwitchC.B. SwitchC has fewer existing VLANs than does SwitchA.C. SwitchA supports a greater number of VLANs than does SwitchC. D. SwitchC has a revision number higher than that being advertised.E. SwitchC should be operating in VTP server mode to receive VTP updates.F. SwitchB should be operating in VTP server or client mode to relay VTP updates. Answer: D141. The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command? (Choose two.)A. The command establishes a static route. B. The command invokes a dynamic routing protocol for 192.168.12.0. C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.D. Traffic for all networks is forwarded to 172.16.12.1. E. This route is automatically propagated throughout the entire network.F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network.Answer: AC142. What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?A. The switch will not forward unicast frames.B. The switch will forward the frame to a specific port. C. The switch will return a copy of the frame out the source port.D. The switch will remove the destination MAC from the switch table. E. The switch will forward the frame to all ports except the port on which it was received.Answer: B143. A Cisco router that was providing Frame Relay connectivity at a remote site was replaced with a different vendor's frame relay router. Connectivity is now down between the central and remote site. What is the most likely cause of the problem?A. mismatched LMI typesB. incorrect DLCIC. mismatched encapsulation typesD. incorrect IP address mappingAnswer: C144. The Ethernet networks connected to router R1 in the graphic have been summarized for router R2 as 192.1.144.0/20. Which of the following packet destination addresses will R2 forward to R1, according to this summary? (Choose two.)F. 192.1.1.144 Answer: AD 145. Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)A. assigning a private IP address to the APB. changing the default

注意事项

本文(CCNA考试题库之二:最新640802v)为本站会员(wu****ei)主动上传,装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知装配图网(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!