发信人: sobt(好懒)
整理人: reynolds(2001-11-08 08:48:10), 站内信件
|
158. With the hierarchical numbering of IP addressing what determines the part
of the address that will identify the network number?
A subnet mask
B dots between octets
C class of the first octet
D assignments of DHCP
E address resolution process
Answer: A
159. What is the link state routing protocol in the TCP/ IP protocol stack?
A IP
B Is- Is
C NLSP
D OSPF
E RIP version 2
Answer: D
160. In which two modes can the ICMP ping command be used? (Choose two )
A user
B privileged
C global configuration
D Interface configuration
Answer: A, B
161. Which two 1W encapsulation names are correctly paired with the Cisco IOS
encapsulation names? (Choose two )
A Ethernet_ II- ARPA
B Ethernet_ 802.3- SAP
C Ethernet_ 802.2- LLC
D Ethernet_ SNAP- SNAP
Answer: A, D
162. Which network mask should you place on a Class C address to accommodate
a user requirement for five networks with a maximum of 17 hosts on each networks
A 255 255 255 192
B 255 255 255 224
C 255 255 255 240
D 255 255 255 248
Answer: B
163. Which two commands allow you to verify address configuration in your
unternetword? (Choose two )
A ping
B trace
C verify
D test ip
E echo ip
F config ip
Answer: A, B
164. What are four benefits that can result from applying ISDN ne~ orking? (Choose
four )
A Full time connectivity across the ISDN is spoofed by Cisco IOS routers
using dial on demand routing (DDR)
B Small Once and Home Once sites can be economically supported with ISDN
Basic Rate Interface (BRI) servkps
C ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone
Network (PSTN) backbone
D ISDN can be used as a backup service for a leased line connection between
the remote and central chaps
E Modem racking and cabling can be eliminated by integration of digital modem
cards on Cisco IOS Network Access Servers (NAS)
Answer: A, B, D, E
165. What does the Frame Relay switch use to distinguish between each PVC
connection?
A data- link connection identifiers (DLCIs)
B BECNs
C FECNs
D the Local Management Interface (LMI)
Answer: A
166. You have a Frame Relay link on serial 1 Which command displays the Local
Management Interface (LMI) data link connection identifier (DLCI) and
bandwidth for that link?
A show interface serial1
B show frame- relay serial1
C show protocol frame- relay serial1
D show serial1 encapsulation frame- relay
Answer: A
167. What is the total bandwidth of all channels on a BRI circuit?
A 56 kps
B 64 kps
C 112 kps
D 128 kps
E 144 kps
Answer: E
168. Given the following criteria for granting access from a remote site to
your LAN
restrict access on interface e0
e0 = 128.12.22.55
deny access to Telnet, FTP
allow all other types of operations
Which line should come last in conferring your access list?
A access list 101 end
B access list 101 deny elf toured ftp
C access list 101 allow all except ftp toured
D access list 101 permit ip 0 0 0 0 255 255 255 255 any
E access list 101 deny ip 128 12 22 55 tcp eq 20 21 23
Answer: D
169. Which command displays the interfaces using a given access list?
A show filters
B show ip interface
C show active lists
D show interface parameters
E configure ip access lists
F show access- list interfaces
Answer: B
170. Which command displays access list 111 ?
A show access- list 111
B show ip access- list 111
C display ip access- list 111
D display access- list 111 details
Answer: B
171. Which statement about half duplex Ethernet operations is true?
A With half duplex transmission frames feed into a single cable in one direction
at a time
B Half duplex transmission between stations is achieved by using point to
point Ethernet and Fast Ethernet connections
C Half duplex transmission between stations is achieved by using point to
munificent Ethernet and Fast Ethernet connections
D Half duplex Ethernet technology provides a transmit circuit connection wired
directly to the receiver circuit at the other end of the connection
Answer: A
172. What is the maximum length of the Fast Ethernet cable (100BaseTx) standard?
A 10 meters
B 50 meters
C 100 meters
D 1,000 meters
Answer: C
173. Which three commands are used to configure information into RAM on a router?
(Choose three )
A configure memory
B configure terminal
C configure overwrite
D copy tftp startup- config
E copy running- config startup- config
F copy startup- config running- config
Answer: A, B, F
174. When you enter router passwords during the setup dialog what is the
difference between enable and the enable secret passwords?
A The enable password is encrypted
B The enable secret password uses IPSec password authentication
C The enable secret password cannot be seen as clear text when viewing
the configuration
D The enable secret password acts as a backup in case the enable password
is compromised
Answer: C
175. You just entered the following command
Router( config#) line console 0
Which operation is most likely to follow?
A confound terminal type
B enter protocol parameters for a serial line
C create a password on the console terminal line
D establish a terminal type 4 connection to a remote host
E change from configuration mode to console privileged mode
Answer: C
|
|