
思科试题 一、计算机网络基础知识 1.Which of the following devices can an administrator use to segment their Lan?() (choose all that apply) A.hubs B.repeaters C.switches D.bridges E.routers F.media converters G.all of the above 2.which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?( A.rollover cable B.console cable C.crossover cable D.straight-through cable E.serial cable 3.given the choices below,which address represents a unicast address?( A.224.1.5.2B.FFF℉.FFFF.FFFF C.192.168.24.59/30D.255.255.255.255 E.172.31.128.255/18 4.if a lost on a network has the address 172.16.45.14/30 what is the address of the subnetwork to which this host belong?(n A.172.16.45.0B.172.16.45.4C.172.16.45.8D.172.16.45.12 E.172.16.45.18 5.which one of the binary number ranges shown below corresponds to the value of the first octer in class B address range?() A.10000000--11101111B.11000000--11101111 C.10000000--10111111D.10000000---11111111 E.11000000---10111111 6.how many subnetworks and hosts are avaibable per subnet if you apply a /28 mask to the 210.10.2.0 class C network A.30 networkd and 6 hosts B.6 networks and 30 hosts C.8 networks and 32 hosts D.32 networks and 18 hosts E.14 networks and 14 hosts F.none of the above 7.what is the subnet for the host IP address 172.16.210.0/22 ?( A.172.16.42.0B.172.16.107.0C.172.16.208.0D.172.16.252.0
思科试题 一、计算机网络基础知识 1.Which of the following devices can an administrator use to segment their Lan?() (choose all that apply) A. hubs B. repeaters C.switches D. bridges E.routers F. media converters G.all of the above 2.which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch? ( ) A. rollover cable B.console cable C. crossover cable D. straight-through cable E.serial cable 3.given the choices below,which address represents a unicast address? ( ) A. 224.1.5.2 B. FFFF.FFFF.FFFF C.192.168.24.59/30 D.255.255.255.255 E.172.31.128.255/18 4.if a lost on a network has the address 172.16.45.14/30 ,what is the address of the subnetwork to which this host belong?( n ) A.172.16.45.0 B. 172.16.45.4 C.172.16.45.8 D. 172.16.45.12 E.172.16.45.18 5.which one of the binary number ranges shown below corresponds to the value of the first octer in class B address range?() A.10000000---11101111 B. 11000000----11101111 C.10000000---10111111 D.10000000-----11111111 E.11000000---10111111 6.how many subnetworks and hosts are avaibable per subnet if you apply a /28 mask to the 210.10.2.0 class C network ? A. 30 networkd and 6 hosts B. 6 networks and 30 hosts C.8 networks and 32 hosts D. 32 networks and 18 hosts E. 14 networks and 14 hosts F. none of the above 7.what is the subnet for the host IP address 172.16.210.0/22 ?( ) A. 172.16.42.0 B. 172.16.107.0 C. 172.16.208.0 D. 172.16.252.0

E.172.16.254.0 F.none of the above 8.3 address are shown in binary form below: A.01100100.00001010.11101011.00100111 B.10101100.00010010.10011110.00001111 C.11000000.10100111.10110010.01000101 Below are correct ?(select three )( address C is a public class C address address C is a private class C address address B is a public class B address address A Is a public class A address address B is a private class b address address A is a private class A address. 9.You have a network that supports VLAM and you need to reduce IP address waste in your point to point WAN links.which of the masks below would you useb?( A./38B./30C./27D./23E./18F./32 第二:路由器基本知识 1.While troubleshooting a link problem on one of the routers,the following output was seen: Routerl show interface serial 0 Serial 0 is up,line protocol is down Hardware is HDLC4530A Internet address is 172.16.2.1/24 MTU 1500 bytes,BW 2048 Kbit DLY 20000 usec rely 255/255,load 1/255 Encapsulation HDLC,loopback not set,keepalive set 10 sec Based on the information above,what are possible causes for the status of this interface (select three).( 2.Which of the commands below would you enter if you wanted to see the configuration register of your router ?(
E.172.16.254.0 F. none of the above 8.3 address are shown in binary form below: A. 01100100.00001010.11101011.00100111 B.10101100.00010010.10011110.00001111 C.11000000.10100111.10110010.01000101 Below are correct ?(select three ) ( ) address C is a public class C address . address C is a private class C address address B is a public class B address . address A Is a public class A address . address B is a private class b address . address A is a private class A address. 9.You have a network that supports VLAM and you need to reduce IP address waste in your point to point WAN links .which of the masks below would you useb? ( ) A. /38 B. /30 C. /27 D./23 E. /18 F./32 第二:路由器基本知识 1.While troubleshooting a link problem on one of the routers , the following output was seen: Router1 # show interface serial 0 Serial 0 is up , line protocol is down Hardware is HDLC4530A Internet address is 172.16.2.1/24 MTU 1500 bytes,BW 2048 Kbit ,DLY 20000 usec ,rely 255/255,load 1/255 Encapsulation HDLC,loopback not set,keepalive set ( 10 sec ) Based on the information above ,what are possible causes for the status of this interface ? (select three). ( ) 2.Which of the commands below would you enter if you wanted to see the configuration register of your router ? ( )

A.show boot B.show flash C.show register D.show version E.show config 3.You attempt to telnet from the router Rl to Router R2 192.1.2.65.the telnet connection is unsuccessful however,a ping to 192.1.2.65 is successful. What could cause this problem (select two )( PPP authentication configuration problem. IP address subnet mask configuration error Access control list filtering Defective serial cable No clock rate on interface s0 on R2 Missing VTY password 4.What command verifies connectivity between two hosts by sending and receiving ICMP echo messages?() A.ping B.tracert C.netstat D.show cdp neighbors edtail E.show ip route F.traceroute 5.Which router IOS commands can be used to troubleshoot LAN connectivity problems ?(select three )( A.ping B.tracert C.ipconfig D.show ip route E.winipcfg F.show interfaces 三、路由器基本配置 1.Which of the routing protocols shown below support both VLSM and route summarization (select three ) A.IGRP B.EIGRP C.RIP v1 D.RIP v2 E.OSPF F.VTP G.CDP 2.A routing table contains static,RIP,and IGRP routers destined to the same network with each route set to its default administrative distance,which route will be the preferred route A.the RIP route B.the static route C.the IGRP route D.all three will load babance
A. show boot B. show flash C. show register D. show version E. show config 3.You attempt to telnet from the router R1 to Router R2 192.1.2.65 . the telnet connection is unsuccessful .however, a ping to 192.1.2.65 is successful. What could cause this problem (select two ) ( ) PPP authentication configuration problem. IP address / subnet mask configuration error Access control list filtering Defective serial cable No clock rate on interface s0 on R2 Missing VTY password 4.What command verifies connectivity between two hosts by sending and receiving ICMP echo messages ? ( ) A.ping B. tracert C. netstat D. show cdp neighbors edtail E. show ip route F. traceroute 5.Which router IOS commands can be used to troubleshoot LAN connectivity problems ?(select three ) ( ) A. ping B. tracert C. ipconfig D. show ip route E. winipcfg F . show interfaces 三、路由器基本配置 1.Which of the routing protocols shown below support both VLSM and route summarization (select three ) ? A. IGRP B. EIGRP C. RIP v1 D. RIP v2 E . OSPF F. VTP G. CDP 2. A routing table contains static ,RIP , and IGRP routers destined to the same network with each route set to its default administrative distance ,which route will be the preferred route ? A. the RIP route B. the static route C. the IGRP route D. all three will load babance

3.which of the following technologies can be used in distance vector routing protocols to prevent routing loops choose two )( A.spanning tree-protocol B.shortest path first tree C.link-state advertisements D.hold down timers E.split horizon F.VRRP 4.five different routers are connected via varying point to point circuit types as displayed below: Which of the following statement are true regarding how router A will chose a path to router E (choose three )( if RIP is the routing protocol,router A will determine all paths have an equal cost if RIP is the routing protocol,router A will install only the ADE path in its routing table if IGRP is the routing protocol,router A will determine that path ACE has the lowest cost if IGRP is the routing protocol,router A will determine that path ADE has the lowest cost if RIP and IGRP are both configured on router A,the router will use the route information learned by IGRP if RIP and IGRP are both configured on router A,the router will use the route information learned by RIP? 5.you are a network administrator and you need to implement a routing protocol on your network that provides: scalability
3. which of the following technologies can be used in distance vector routing protocols to prevent routing loops ? ( choose two ) ( ) A. spanning tree-protocol B. shortest path first tree C. link-state advertisements D. hold – down timers E. split horizon F. VRRP 4. five different routers are connected via varying point to point circuit types as displayed below: Which of the following statement are true regarding how router A will chose a path to router E (choose three ) ( ) if RIP is the routing protocol ,router A will determine all paths have an equal cost if RIP is the routing protocol,router A will install only the ADE path in its routing table if IGRP is the routing protocol ,router A will determine that path ACE has the lowest cost if IGRP is the routing protocol,router A will determine that path ADE has the lowest cost if RIP and IGRP are both configured on router A ,the router will use the route information learned by IGRP if RIP and IGRP are both configured on router A , the router will use the route information learned by RIP? 5.you are a network administrator and you need to implement a routing protocol on your network that provides: * scalability

*VLSM support *minimal overhead *support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs ?( A.VTP B.RIP verdion 1 C.EIGRP D.OSPF E.IGRP F.CDP 四、路由器高级配置 1.What Is the maximum number of hops OSPF allows before it deems a network unreachable ?( A.15 B.16 C.99 D.255.E.unlimited 2.if the bandwidth of an OSPF interface is configured with the "bandwidth 64 command,what would be the calculated cost of the link ?( A·1B.64C.1562D.64000E.1500 3.which statements are true about EIGRP successor routes (choose two )( A.A successor route is used by EIGRP to forward traffic to a destination B.successor routes are saved in the topology table to be used if the primary route fails C.successor routes are flagged as "active"in the routing table D.A successor route may be backed up by a feasible successor route E.successor routes are stored in the neighbor table following the discovery process F.successors are not used in EIGRP 4.which command will configure a default route on a router ?( A.router (config)#ip route 0.0.0.0 10.1.1.0 10.1.1.1 B.router (config )ip default-route 10.1.1.0 C.router (config )ip default-gateway 10.1.1.0 D.router (config)#ip route 0.0.0.0 0.0.0.0 10.1.1.1 5.You are implementing a new frame relay network to provide connectivity between you offices.to do this,you set up the frame relay network using poing -to-point subinterfaces
*VLSM support *minimal overhead *support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs ? ( ) A. VTP B. RIP verdion 1 C. EIGRP D. OSPF E. IGRP F . CDP 四、路由器高级配置 1.What Is the maximum number of hops OSPF allows before it deems a network unreachable ?( ) A . 15 B. 16 C. 99 D . 255 . E. unlimited 2. if the bandwidth of an OSPF interface is configured with the “bandwidth 64 “ command ,what would be the calculated cost of the link ? ( ) A . 1 B. 64 C. 1562 D. 64000 E . 1500 3.which statements are true about EIGRP successor routes (choose two ) ( ) A. A successor route is used by EIGRP to forward traffic to a destination B.successor routes are saved in the topology table to be used if the primary route fails C.successor routes are flagged as “active” in the routing table D. A successor route may be backed up by a feasible successor route E . successor routes are stored in the neighbor table following the discovery process F. successors are not used in EIGRP 4.which command will configure a default route on a router ? ( ) A. router (config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1 B.router (config )# ip default-route 10.1.1.0 C. router (config )# ip default-gateway 10.1.1.0 D.router (config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 5.You are implementing a new frame relay network to provide connectivity between you offices .to do this ,you set up the frame relay network using poing –to- point subinterfaces

Which of the following does NOT need to be configured ( the frame relay encapsulation on the physical interface the local DLCI on each subinterface an IP address on the physical interface the subinterface type as point to point 6.the following configuration command was issued on router Ip route172.16.3.0255.255.255.0192.168.2.1 Which of the following statements are true regarding this command ?(select two () the command is used to establish a static route the default administrative distance is used the command is used to configure the default route the subnet mask for the source address is 255.255.255.0 the command is used to establish a stub network 7.the following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN Access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any Access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?() FTP traffic from 192.169.1.22 will be denied No traffic,except for FTP traffic will be allowed to exit E0 FTP traffic from 192.169.1.9 to any host will be denied All traffic exiting E0 will be denied All FTP traffic to network 192.169.1.9/29 will be denied 8.which of following commands would successfully implement an access list on a routers virtual terminal line?() A.routerTK(config-line)#access-class 10 in B.routerTK(config-if)#ip access-class 23 out C.routerTK(config-line)access-list 150 in D.routerTK(config-if)#ip access-list 128 out
Which of the following does NOT need to be configured ? ( ) the frame relay encapsulation on the physical interface the local DLCI on each subinterface an IP address on the physical interface the subinterface type as point – to – point 6.the following configuration command was issued on router : Ip route 172.16.3.0 255.255.255. 0 192. 168.2.1 Which of the following statements are true regarding this command ?(select two ) ( ) the command is used to establish a static route the default administrative distance is used the command is used to configure the default route the subnet mask for the source address is 255.255.255.0 the command is used to establish a stub network 7.the following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN Access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any Access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?( ) FTP traffic from 192.169.1.22 will be denied No traffic,except for FTP traffic will be allowed to exit E0 FTP traffic from 192.169.1.9 to any host will be denied All traffic exiting E0 will be denied All FTP traffic to network 192.169.1.9/29 will be denied 8. which of following commands would successfully implement an access list on a routers virtual terminal line?( ) A. routerTK(config-line)#access-class 10 in B.routerTK(config-if)# ip access-class 23 out C.routerTK(config-line)access-list 150 in D.routerTK(config-if)# ip access-list 128 out

E.routerTK(config-line)#access-group 15 out F.routerTK(config-if)#ip access-group 110 in 五、交换机的基本配置 1.With regard to bridges and switches,which of the following statements are true (choose three )( switchs are primarily software based while bridges are hardware based both bridges and switches forward layer 2 broadcasts bridges ard frequently faster than switches switches typically hace a higher number of ports than bridges bridges define broadcast domain shile switches define collision domains both bridges and switches make forwarding decisilns based on layer 2 addresses 2.which switching mode provides the highest level of integrity and error-free transport,rather then maximizing speed?( A.802.1Q forwarding B.VTP transparent mode C.cut-through D.store-and -forward E.fragment -free F.frame-filtering 3.the LAN consists of 2 switches connected together as shown in the diagram below What is the name of the potential problem of this switch setup,and what protocol can prevents its occurrence.() A.routing loops hold down timers B.switching loops split horizon C.routing loops,split horizon D.switching loops VTP E.routing loops STP F.switching loops STP 4.A simple network is displayed in the diagram below(如图所示):
E.routerTK(config-line)# access-group 15 out F. routerTK(config-if)# ip access-group 110 in 五、交换机的基本配置 1.With regard to bridges and switches,which of the following statements are true ? (choose three ) ( ) switchs are primarily software based while bridges are hardware based both bridges and switches forward layer 2 broadcasts bridges ard frequently faster than switches switches typically hace a higher number of ports than bridges bridges define broadcast domain shile switches define collision domains both bridges and switches make forwarding decisilns based on layer 2 addresses 2.which switching mode provides the highest level of integrity and error-free transport,rather then maximizing speed? ( ) A.802.1Q forwarding B. VTP transparent mode C. cut-through D. store-and – forward E.fragment –free F. frame- filtering 3.the LAN consists of 2 switches connected together as shown in the diagram below What is the name of the potential problem of this switch setup ,and what protocol can prevents its occurrence. ( ) A. routing loops ,hold down timers B. switching loops ,split horizon C.routing loops,split horizon D. switching loops ,VTP E. routing loops , STP F. switching loops ,STP 4.A simple network is displayed in the diagram below (如图所示):

When PC1 sends an ARP requests for the MAC address of PC1,network performance slows dramatically and the switches detect an unusually high number of broadcast frames.What is the most likely cause of this ?( the portfast feature is not enabled on all switch ports the PCs are in two different VLANs spanning tree protocol is not running on the switches PC2 is down and is not able to respond to the request The VTP version running on the two switches do not match 5.the spanning tree information from 4 switches on the network is displayed below despite their names all four switches are on the same LAN. Tampa#show spanning-tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 32768,address 0002.fd29.c505 Configured hello time 2,max age 20.forward delay 15 Miami#show spanning -tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 16348,address 0002.fd29.c504 Configured hello time 2,max age 20,forward delay 15 Londdon#show spanning tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 8192,address 0002.fd29.c503 Configured hello time 2,maxage 20,forward delay 15 Cairo show spanning -tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifief has priority 4096,address 0002.fd29.c502 Configured hello time 2,maxage 20,foreard delay 15 Based on the outputs of the above exhihbit,which one of the switches is the spanning tree root bridge (
When PC1 sends an ARP requests for the MAC address of PC1, network performance slows dramatically ,and the switches detect an unusually high number of broadcast frames. What is the most likely cause of this ?( ) the portfast feature is not enabled on all switch ports the PCs are in two different VLANs spanning tree protocol is not running on the switches PC2 is down and is not able to respond to the request The VTP version running on the two switches do not match 5. the spanning tree information from 4 switches on the network is displayed below .despite their names ,all four switches are on the same LAN. Tampa# show spanning-tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 32768,address 0002.fd29.c505 Configured hello time 2 ,max age 20.forward delay 15 Miami# show spanning – tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 16348,address 0002.fd29.c504 Configured hello time 2, max age 20,forward delay 15 Londdon# show spanning – tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifier has priority 8192, address 0002.fd29.c503 Configured hello time 2 ,maxage 20,forward delay 15 Cairo # show spanning –tree Spanning tree 1 is executing the IEEE compatible spanning tree protocol Bridge identifief has priority 4096,address 0002.fd29.c502 Configured hello time 2, maxage 20 ,foreard delay 15 Based on the outputs of the above exhihbit , which one of the switches is the spanning tree root bridge ? ( )

A.Miami B.London C.tampa D.cairo 六、交换机高级配置 1.which one of the following protocol allows the information about the configuration of a new VLAN to be distributed across entire switched network () A.STP B.VTP C.EIGRP D.SNMP E.CDP F.none of the above 2.which commands,when used together,would create an 802.1Q link ?(select to answer choices )( A.switch(vlan)#mode trunk B.switch(config )switchport access mode trunk C.switch(config-if)switchport mode trunk D.switch(config-if)switchport trunk encapsulation dotl q E.switch(config)#switchport access mode 1 F.switch(vlan)#trunk encapsulation dot 1 q 3.which of the following are benefits of VLANs?(choose three )( A.they increase the size of collision domains B.they allow logical grouping of users by function C.they can enhance network security D.the increase the size of broadcast domains while decreasing the number of the broadcast domains E.the increase the number of broadcast domains while decreasing the size of the broadcast domains F.they simplify switch administration 4.when a new trunk link is configured on an IOS based switch,which VLANs are allowed over the link ( A.by default,all defined VLANs are allowed on the trunk. B.each single VLAN,or VLAN range,must be specified with the switchport mode command C.each single VLAN,or VLAN range,must be specified with the vtp domain command
A. Miami B. London C. tampa D. cairo 六、交换机高级配置 1.which one of the following protocol allows the information about the configuration of a new VLAN to be distributed across entire switched network ? ( ) A.STP B.VTP C. EIGRP D. SNMP E. CDP F. none of the above 2. which commands , when used together , would create an 802.1Q link ? (select to answer choices ) ( ) A. switch(vlan)# mode trunk B. switch(config )# switchport access mode trunk C. switch(config-if) switchport mode trunk D.switch(config-if)switchport trunk encapsulation dot1 q E.switch(config)# switchport access mode 1 F.switch(vlan)# trunk encapsulation dot 1 q 3.which of the following are benefits of VLANs? (choose three ) ( ) A.they increase the size of collision domains B.they allow logical grouping of users by function C.they can enhance network security D.the increase the size of broadcast domains while decreasing the number of the broadcast domains E.the increase the number of broadcast domains while decreasing the size of the broadcast domains F.they simplify switch administration 4.when a new trunk link is configured on an IOS based switch , which VLANs are allowed over the link ( ) A.by default ,all defined VLANs are allowed on the trunk . B.each single VLAN, or VLAN range ,must be specified with the switchport mode command C. each single VLAN, or VLAN range, must be specified with the vtp domain command

D.each single VLAN,or VLAN range,must be specified with the vlan database command 5.a network administrator wants to control which user hosts can access the network based on their MAC address,what will prevent workstation with unauthorized MAC addresses from connecting to the network through a switch ?( A.BPDU B.port security C.RSTP D.STP E.VTP F.blocking mode
D.each single VLAN, or VLAN range , must be specified with the vlan database command 5.a network administrator wants to control which user hosts can access the network based on their MAC address , what will prevent workstation with unauthorized MAC addresses from connecting to the network through a switch ? ( ) A.BPDU B. port security C. RSTP D. STP E. VTP F . blocking mode