正文

Skills Review Exam--CCNA2007-06-12 21:39:00

【评论】 【打印】 【字体: 】 本文链接:http://blog.pfan.cn/ccna/26733.html

分享到:

1


Refer to the exhibit. The server was just added to the network and no hosts are able to connect to it. What could be the problem?
The IP address of the server should be dynamic instead of static.
The IP address assigned to the server is the network address for this subnetwork.
The IP address assigned to the server is the broadcast address for this subnetwork.
The network is not subnetted correctly.

2
What address is used by the router to determine the best path through a network?
source MAC address
destination MAC address
source IP address
destination IP address

3
What is the result of a router ANDing the IP address and subnet mask of 172.16.115.73/20?
172.16.0.0
172.16.96.0
172.16.112.0
172.16.115.0

4
A network administrator is monitoring multiple computer labs within the LAN. Excessive broadcasts have slowed the network. The installation of what device would create a solution to the problem?
bridge
hub
transceiver
router
switch

5
What is the network address for the host 192.168.32.52 255.255.255.240?
192.168.32.0
192.168.32.32
192.168.32.48
192.168.32.63
192.168.32.255

6


Host A is sending data to Host B which is located on the same network. Host A knows the IP address of Host B but does not know the MAC address. What protocol would be used by Host A to determine the MAC address of Host B?
DNS
DHCP
RARP
ARP
SNMP

7
Which addresses are valid for use over the Internet? (Choose three.)
14.31.6.12
127.13.64.2
172.16.13.91
182.16.44.5
192.168.100.35
220.225.225.23

8
What is the broadcast address for a host address of 172.16.31.99/21?
172.16.255.255
172.16.31.255
172.16.31.103
172.16.24.255
172.16.24.111

9


Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram? (Choose two.)
192.168.65.31
192.168.65.32
192.168.65.35
192.168.65.60
192.168.65.63
192.168.65.64

10


Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable

11


Refer to the exhibit. What type of cable connection is displayed?
straight-through patch cable
rollover cable
crossover cable
console cable

12
How many bits have been borrowed to subnet the address 189.13.64.45 255.255.255.248?
4
5
12
13
20
21

13
A network administrator must explain to a department manager the difference between how Layer 2 and Layer 3 devices handle data. What should the administrator tell the department manager? (Choose two.)
A Layer 2 device will decide where to send data based solely on the source MAC address.
A Layer 2 device will decide where to send data based solely on the destination MAC address.
A Layer 2 device will decide where to send data based solely on the destination IP address.
A Layer 3 device will decide where to send data based solely on the source IP address.
A Layer 3 device will decide where to send data based solely on the destination IP address.
A Layer 3 device will decide where to send data based solely on the destination MAC address.

14
Which address represents the dotted decimal equivalent of the binary address 10101101.00101011.11001001.00000011?
169.35.200.2
169.43.201.3
173.35.201.2
173.43.201.3
175.13.193.2
175.43.193.3

15


Refer to the exhibit. What would be the effects of replacing the hub with a switch? (Choose two.)
Each host will change from shared bandwidth to dedicated bandwidth.
Each host will change from dedicated bandwidth to shared bandwidth.
The number of collision domains will increase.
The number of collision domains will decrease.
The number of networks will increase.
The number of networks will decrease.
16
What are some of the characteristics of CAT 5 UTP cable? (Choose two.)
It is difficult to terminate the cable.
It is more expensive than any other type of LAN cabling.
It is a four-pair wire medium.
It is not affected by EMI or RFI.
The twisted wire pairs cause a cancellation effect.

17
Which device creates both collision and broadcast domains?
switch
hub
bridge
router
repeater

18
How does a device on a LAN detect an error in a frame?
It sends a copy of the frame back to the sender for verification.
It compares the FCS in the frame to the one that the computer calculates from the contents of the frame.
It checks the destination address to verify that the frame was really intended for it.
It sends out a jam signal to all nodes on the network.

19


Refer to the exhibit. A network administrator is given a single network address of 192.168.16.0 and must configure the networks in the exhibit. The routing protocol being used is RIP version 1. Which subnet mask should be used?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248

20
What can be learned if a ping to address 127.0.0.1 fails?
The remote host located at 127.0.0.1 is not reachable.
The ability to ping has been disabled on the computer.
The TCP/IP protocols are not loaded.
The default gateway is not responding.

21
A network administrator has just connected a new switch to a router with a crossover cable. The Fast Ethernet interface on the router has already been configured but there are no link lights on the router or the switch. What could the problem be?
The crossover cable is faulty and needs to be replaced with a new crossover cable.
The wrong cable was used and needs to be replaced with a straight-through Ethernet cable.
The switch has not been configured yet and the Ethernet port is down.
The router was configured with an incorrect IP address on the Ethernet interface.

22
Host A attempts to send data to another host with a known IP address. When Host A sends an ARP request to find the MAC address of the desired host, Host A receives in reply the MAC address of the local router interface. What can be concluded from this response?
Host A does not have the correct address for the desired host.
The desired host is located on another segment from Host A.
The local router is not functioning properly.
The desired host and the local router have the same IP address.

23


Host A sends data to Host B, which is located on the same network segment. What action is taken by all hosts on that segment?
The NIC in each device checks to see if its MAC address matches the destination MAC address carried by the data frame.
The NIC in each device checks to see if its MAC address matches the source MAC address carried by the data frame.
Because their MAC addresses are different, the NIC in each device checks the IP address for matches.
The NIC in each device checks to see if its IP address matches the source IP address carried by the data frame.

24
When a switch is powered on, it must begin to populate its bridging table. What information is added to the bridging table from incoming packets?
source MAC address and incoming port number
destination MAC address and incoming port number
source IP address and incoming port number
destination IP address and incoming port number

25


HostA and HostB lack connectivity. Which option is a Layer 3 issue that could be causing the problem?
encapsulation mismatch
IP addressing and routing
framing errors
bit synchronization problems

26
A network administrator has noticed an excessive number of collisions on one subnetwork of the LAN. Which device could be added that would create a solution to the problem?
hub
router
switch
transceiver

27
What are two characteristics of link-state protocols? (Choose two.)
use more bandwidth for overhead when converging
work well for stub networks
more router memory required for tables
split-horizon strictly followed
slow to converge
impossible to configure statically

28
Which task does a CSU/DSU perform?
packet routing
security filtering
connects router serial interface to telco
dials the backup WAN connection

阅读(9141) | 评论(5)


版权声明:编程爱好者网站为此博客服务提供商,如本文牵涉到版权问题,编程爱好者网站不承担相关责任,如有版权问题请直接与本文作者联系解决。谢谢!

评论

loading...
您需要登录后才能评论,请 登录 或者 注册