a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 127|回复: 1

[考试试题] CCNA真题(1)TCP/IP:地址和协议(1)

[复制链接]
发表于 2012-8-3 19:18:10 | 显示全部楼层 |阅读模式
1: your junior network administrator wants to know what the default subnet mask is for a class c ip address. what do you tell him? 6 u  \/ D4 q+ g, ~' p
a. 255.0.0.0 2 U, u" n! C7 ]  W6 G
b. 255.255.0.0 . d: E2 I( @7 q+ l  L
c. 255.245.255.0 " S# G8 ^5 @5 {; i/ B3 {
d. 255.255.255.0 / F9 o: C0 F" \3 R9 U% x
e. 255.255.255.255
9 o7 M9 l# O) h 4 F) F  i  @3 o. |1 s" ]4 W. w
2: an application needs to have reliable, end-to-end connect-ivity. which of the following protocols will give you reliable connectivity? ) M! J3 _+ Z1 C2 s; a; s8 B" K& M- u3 C
a. tcp 3 s0 Z4 j6 O5 Q' y
b. udp
0 W; N7 ]. Y3 g( Pc. ip " t. m6 G* s6 e1 ]6 m% Q* O
d. icmp
2 |$ `; z) T* `* K4 p! F  t
4 P" Z% a% A& M) r+ q5 ~3 \3: you are designing a network, which needs to support 55 users. you don't plan to extend the segment beyond the current number of users. which subnet mask would best meet your needs?
; ]$ S9 P% Z9 J: }: M. ^% D4 ma. 255.255.0.0
4 c, w% e9 g4 l* Sb. 255.255.255.0
  u  q) f2 l1 M& bc. 255.255.255.192
  T4 S! @, ^4 l8 r' Jd. 255.255.255.160" g3 Q. g9 b% x6 E! v5 H
- P; A6 }, U4 }1 j( x
4: you have added a new switch to your network. you want to manage it remotely, so you need to assign it an ip address. your router that connects to the switch has an ip address of 172.16.12.33/27. which of the following addresses can you assign to this switch? - S9 Q) U' j- G' ^2 V
a. 172.16.12.33/28
8 L0 G/ r) x9 S& ]! i* Fb. 172.16.12.32/27
5 J, b7 }2 ~# I& y' g2 Bc. 172.16.12.33/27 ; v! q5 U9 W, k, A1 t" e3 B
d. 172.16.12.34/27
; k; ?' l8 R9 x5 j' |e. 172.16.12.35/28
$ |! S+ c2 S  i8 X4 sf. 172.16.12.38/28 , u$ N$ O& b1 K; R- d6 v7 Y- E+ O# k
g. 172.16.12.63/27: v# d- B) v" K$ h

4 P* ?  K; M: o) ~' G; e; l5: the address 172.16.208.16/20 is a host address in which of the following subnets?
( E$ I4 Q; m" u4 ua. 172.16.176.0–255.255.240.0
/ T1 N* T/ E6 X3 M+ {7 d' B# J: c* {b. 172.16.192.0–255.255.240.0 0 C! u  G+ H' M7 w& L4 x3 X
c. 172.16.208.0–255.255.240.0
& p9 v9 o3 x6 G  ~d. 172.16.224.0–255.255.240.0- D7 i  F2 m" f6 g# V# G' e

# r! c) @. }. H; V0 l) b8 T6: you are designing an ip address scheme for your brand new remote Office. the vice president of it calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. this supplies you with a single subnetwork with 62 hosts. you need to have at least two subnets with 14 hosts in each subnet. what custom subnet mask should you use?
. z$ }) V( |# o' K5 m+ ea. 255.255.255.128
3 J: p% g/ f0 |b. 255.255.255.192 % O- k: _/ c- H/ ?' N$ m
c. 255.255.255.224 % _8 h3 H' z& H* Y
d. 255.255.255.240 1 z9 N5 Z% I, S
e. 255.255.255.248
' E+ i! o( B2 S% t
0 y+ P" k- T( B$ N" J1 O7: you have subnetted the 210.106.14.0 network with a /24 mask. your boss at acme, inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. what should you tell her? 8 L) u# S4 G+ m9 R) h
a. one network with 254 hosts
- k) b: @6 W6 o- e3 k2 Q* ?# `; ^b. two networks with 128 hosts 9 S5 j7 u3 |2 w5 m
c. four networks with 64 hosts ; ^: ]* u& T) y* a3 R
d. six networks with 30 hosts
. T! m& ^, w" c4 r# ] ; b7 _3 Q1 n/ j
8: identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (choose three.) - `" z8 ?/ Y$ p% _
a. 201.168.27.33
# E5 n: [. \: Y- b, c8 E: F7 C. Nb. 201.168.27.112
# p( q: H1 q) H. sc. 201.168.27.119 2 N  ?- `8 G5 f% t" h, K
d. 201.168.27.126 , }' H& Y$ Y1 \
e. 201.168.27.175 2 C* l6 q+ x* d4 |
f. 201.168.27.208
2 M3 E9 n  g$ ?- ~! ` ' T/ B: m) w! f  Q  N% j; v+ ?% Y5 p
9: what is the subnetwork address for a host with the ip address 201.100.5.68/28? % Z6 E: G1 g8 X( f
a. 201.100.5.0 0 A1 [7 U# Z* y8 J
b. 201.100.5.32
7 x% K9 {* v# n; Yc. 201.100.5.64 ) c3 I: ~6 ~) h: S( }# |
d. 201.100.5.65 7 }1 |3 H. q8 n4 s% u: k" |
e. 201.100.5.31
% ^- Y& a! @8 ~( e5 j/ k  U; Tf. 201.100.5.1
- s( z/ N7 O8 r- {+ | ) N1 f3 ^+ v2 k6 W' ]
10: which of the following protocols uses a three-way handshake mechanism to establish sessions?
4 ^, t* n7 E- I9 F5 Ha. tcp
5 p1 k. l% ^% ?; G2 c; }" `! Hb. ip : U8 n# U: E* g$ R# f
c. udp 9 U6 f2 n, p0 G1 p8 J; c3 b
d. ipx - ?" }; N; K. Y  O  k* S; P" {
e. frame relay7 l+ V! `6 o9 k$ v
* J* j: {1 ^, O! `4 t0 |) S, P
11: which of the following protocols is connection-oriented? # j# Q: Y; w* v- l% @
a. tcp . c5 Z/ d' T3 a
b. ip 4 q5 A2 D" Z% R5 x+ C. T
c. ipx
: \6 |, H% l* M! `( B" O2 Vd. frame relay
7 \: B' a( r1 p; E - f  h# L6 m9 |: D2 K
12: you are using an application on your Windows 2000 client machines that provides error correction. you need a protocol to provide fast transport. which protocol should your application use?
8 n, D& v5 m' D- ia. tcp ( D' K+ m4 ]9 {6 Y
b. ip
# b5 [4 T5 J9 H2 S7 N0 M5 j/ q3 oc. udp
8 h2 m- f& t2 md. spx * s9 ^2 I, f" _& h
e. appletalk
. t: g* L* @1 ^9 ]. K( x: a$ P ! K9 \6 J! K8 b( _! S0 p
13: when using tcp, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. this behavior is known as ______________.
8 e7 B6 D  N# S( V( Sa. mtu adjustment
) }; {7 D' V& x' l6 eb. windowing
4 }" j& \$ ^+ g: K; r; m  Jc. flexible send path 8 S0 L: c( ^" U; ?  Q% U
d. fcs7 Z; j6 a: F& X6 s; b1 ^$ ~

. L9 l! J7 C5 m6 t# G% m14: if the destination did not receive a segment, how will the tcp host know to resend the information? . s, {( x1 ~# }/ u6 [
a. the ack received will not include the segment number that was not received.
0 E6 e) B6 }$ P" h( |' H) Xb. the ack received will include the segment number that was not received.
4 J8 h4 D* |+ Xc. the sending host will send a pack to verify segment receipt. 4 H$ Y( {9 q! X+ b0 q* c
d. the destination host will send a yack message back to the sending host.
9 L8 W0 }3 N/ T& m 6 x% k7 j" v. V5 a. [
15: you are planning on using a single network that supports 208 users. which ip address class would you choose to be the most efficient?
: [' w( G9 j, T3 Da. class a - r$ l0 c/ l+ U0 h" `
b. class b 6 G( m* R5 \! ~9 K' Q1 J
c. class c
4 E% u: d- Q! |4 Vd. class d
$ I  \" S/ Y/ Te. class e
9 T, u! c$ K9 ?
1 H% ~4 H: N+ T16: rfc 1918 defines the private ip address ranges. which of the following ip addresses are considered part of these ranges? (choose three.) . e# |, f$ b' D$ l3 C& J0 T" T+ w
a. 10.23.45.67 6 \: j6 f) p4 R3 U- k) b
b. 126.21.34.56 9 Z2 q2 x  L; z9 |3 K
c. 172.16.32.1
回复

使用道具 举报

 楼主| 发表于 2012-8-3 19:18:11 | 显示全部楼层

CCNA真题(1)TCP/IP:地址和协议(1)

d. 172.31.234.55
5 S9 F" {1 ]! M+ L* \  w$ Xe. 192.169.4.5. D! m- M1 f  Z" }6 o

0 K. Q8 @# s7 b: v' d17: a new network is being designed for your company, acme, inc. if you use a class c ip network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?
2 ~$ e: U( D: ~! E+ t' z; tdepartment
+ _: l. U- a' g number of users. j$ g! G( @5 r) x/ x& y

  ~  f  t" \, a; {0 `# Z6 v0 Xcorporate
9 c, Q( S. S2 ?; g2 j0 ]: N 7
! u! D$ ^" B$ e& t$ u/ x& I
  i$ \1 f4 V2 G1 f" ~0 q: ecustomer support1 s. T' G3 O  ?: V* Z; s8 T
15# y" h0 t" j, [
2 L7 b7 f: E4 K7 q2 L1 n( A$ O8 y
financial
) `* n# f3 K! ~0 M0 P( E 13
+ |5 {2 b' U2 F8 s 7 Z# g: }0 Q. y3 G& w1 b0 S% f
hr6 F4 R* ]2 I4 c
7
" D" U* _5 u" e# o: v
+ v) u7 C( T/ I( M' `# Z/ ^engineering
2 [! V3 X  h, D) F, f 16
+ f, P# T* H+ N  m( H3 J2 k  ! k$ f; f  h% N4 T- A
  </p>a. 255.255.255.0 0 W( _8 u' {% f0 P1 b
b. 255.255.255.192 8 ~* {/ m( @7 X$ W
c. 255.255.255.224
) v) m* V, X4 N. Id. 255.255.255.240 5 o$ W0 Z$ u- h7 B  _$ u
e. 255.255.255.248  g; ^* D" W$ N- W3 m: D

4 ^& Y( F2 I9 m# J0 U5 q7 v18: which of these protocols provides data transport, relying on the error correction capabilities of the application itself? " M7 w. U* a1 o" r( {
a. udp
% O4 k! K( r% \; Gb. tcp
8 A6 i1 ]( B2 jc. snmp
- R3 f4 w5 \# c" S' p9 V. K. Jd. icmp. N% ]/ u& ^- |- ]
7 \0 f5 J9 t7 Q% F4 z( g
19: which of the following are used by tcp to ensure reliable delivery of data? (choose two.) - E5 r$ y" F( f7 s
a. mac address resolution 6 E* X/ U3 d. o  l9 V* a
b. sequence numbers
* ]" I/ N3 b& b- qc. acknowledgments ' S  L# l; k$ P, v
d. ping ' C& b9 z+ p9 n* Q: r( r, h
e. routing updates3 e7 X3 n: c2 e5 H! Y. ^, l  M
& e9 H+ P. p' I- ~# k* U  t9 J
20: you discover that you are able to adjust the window size of the tcp segment. you increase the window size to test the results. what will you observe happening on your network? 8 Y  K: q+ M* y; K: f" v
a. increased throughput
# u- J( Y7 u5 J2 E6 w. nb. decreased throughput , g- Y. z  O: |7 o' ~9 E
c. increased latency 1 A* z$ t. _# A! o' `
d. decreased reliability
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-5-5 19:33 , Processed in 0.190982 second(s), 23 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表