a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 467|回复: 3

[考试试题] 思科Cisco认证最新真题详解

[复制链接]
发表于 2012-8-3 19:18:10 | 显示全部楼层 |阅读模式
1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him? 8 f$ e, b) S% j0 o( t* R
  A. 255.0.0.0. C$ v5 G+ ?% U
  B. 255.255.0.0" t' `( s2 |' }
  C. 255.245.255.0
" P/ a* d8 ?' K; w  |8 B' X  D. 255.255.255.06 j4 R* M* Q7 T+ }- u& H. T: G
  E. 255.255.255.2559 g9 z4 u% p/ J9 H! _
  2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?
% O9 X9 p  b6 ^& o/ t( P  A. TCP9 Z( K1 j1 S; a) {
  B. UDP
# F0 W- p' X0 f: r( p9 f  C. IP8 w; T+ J- m2 e) d6 p  |5 ?
  D. ICMP% C3 J  @3 ?: W$ p/ \* H
  3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?* {" q/ s6 W9 @5 \
  A. 255.255.0.01 R$ U/ w# ^" l$ h) v
  B. 255.255.255.00 K7 a" P" }/ i/ [5 s0 U
  C. 255.255.255.192- R- b" ^: ^+ O& v. a
  D. 255.255.255.1606 w/ q7 Q, f/ n/ M0 F
  4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?7 \( k) M& |8 c/ _
  A. 172.16.12.33/287 }. ?9 G* \' F$ i
  B. 172.16.12.32/27' J* j/ S6 Q) s5 X3 j( K" H
  C. 172.16.12.33/27: ?' O) S3 m- @' |' r
  D. 172.16.12.34/27
( \  \) O! D4 K6 S# n( N: A$ f2 z  E. 172.16.12.35/28; @% w9 E! e: C
  F. 172.16.12.38/288 G0 ~- J6 e6 }% `3 ^5 Q
  G. 172.16.12.63/27
回复

使用道具 举报

 楼主| 发表于 2012-8-3 19:18:11 | 显示全部楼层

思科Cisco认证最新真题详解

</p>  5: The address 172.16.208.16/20 is a host address in which of the following subnets?
! g2 b5 T+ {$ h" e5 m5 a  A. 172.16.176.0–255.255.240.0
/ h5 J8 Y; E" H- g  B. 172.16.192.0–255.255.240.0( C/ Z" g* N! v, Z7 V
  C. 172.16.208.0–255.255.240.0
# i. Z; Y2 \" u$ T$ D4 E  D. 172.16.224.0–255.255.240.0
( U$ y1 S1 n* k9 ?  6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?1 z) t; l9 E9 Z+ O4 J; |
  A. 255.255.255.128
$ [  |" }' j# l7 p3 l$ K( [  B. 255.255.255.192
/ a& A0 L( ]/ r  C. 255.255.255.2246 f' @4 Y* s$ L/ l/ x+ f6 v
  D. 255.255.255.240
2 D0 N" ~/ a8 M% A/ x9 m: f  E. 255.255.255.248
% n- Z. i& Y1 e+ d! a- w* Q; m  7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?; s! n0 ?$ ?( o- c8 i8 _. j
  A. One network with 254 hosts) l* _& K3 }  l6 G# k- f5 L# J, D
  B. Two networks with 128 hosts
/ [# `) E$ J4 w  C. Four networks with 64 hosts
/ j% J4 ]& p- ]7 a- |: k  D. Six networks with 30 hosts
8 c/ l" z' I! C7 Y" ?- \3 ?* M  8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)( B  s% @& e  ?8 ?0 r
  A. 201.168.27.33
+ n4 W' K3 E6 s! z  B. 201.168.27.112
5 e; V8 Q1 R4 Y# _  C. 201.168.27.1199 }) j+ V$ f8 w/ v9 j
  D. 201.168.27.126: ~0 m4 J5 L3 r( ^6 v/ a
  E. 201.168.27.175
) _' [0 j6 J, B6 }4 W" W7 y  F. 201.168.27.208
$ T" p& C( F) e0 [* ]% \3 R  9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?
7 K' \1 n; v& e' h) Y2 L  A. 201.100.5.01 x5 A7 V) B& p: ?8 y, [8 ]
  B. 201.100.5.32
9 F4 d3 w4 o% @$ U6 d% D; J& {) B" k# j  C. 201.100.5.64
. Q1 _8 {) S9 i( O9 j  D. 201.100.5.65
9 Q/ x7 f) c; K! Y- b" C0 z  E. 201.100.5.31
! G+ ]' |9 A5 |8 @9 w  F. 201.100.5.1  L% |: t% p% N) {* M
  10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?8 i5 e2 v; c3 u3 h, }! J# i
  A. TCP4 E' O, i: @* v% ^
  B. IP
- n2 H1 j7 G# n  C. UDP
; |+ }0 E7 u9 V' O6 a7 L  D. IPX
% [" L& ]$ v1 c; E1 w# k; ^  E. Frame relay* c' i- H  h" h' ^4 `
  11: Which of the following protocols is connection-oriented?
) G8 T: _! m% V5 m' m  A. TCP
; {$ `) g0 Y& v  B. IP4 N( a5 B! u9 X6 o* P
  C. IPX, R4 h- v* ?$ g! k1 D' N) Q6 P' G( j
  D. Frame relay
5 M0 \6 e) n7 _& L3 L; \( q. M# j1 w  12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?
$ T9 P1 ]! D( b+ k6 ~* n, Z# z  A. TCP3 l7 `5 s* {8 p) j: E6 K- v
  B. IP. R4 T' R) i1 x, P9 f7 }6 F+ l5 t
  C. UDP
5 _  b' w7 Y& M1 S! k- I7 m  D. SPX
) x& L2 c2 [- q# ^2 E. J. z  E. AppleTalk
5 Z! f. b% S& D: S  13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as _________.
; a; I5 `0 d- n: b  A. MTU adjustment
; x% t4 S6 a* s  B. Windowing6 }2 J5 g1 u  y, K8 V% i
  C. Flexible Send Path2 ?# o  {: D1 s: `

9 |- U" A3 B6 j* S" F+ D  D. FCS
回复 支持 反对

使用道具 举报

 楼主| 发表于 2012-8-3 19:18:12 | 显示全部楼层

思科Cisco认证最新真题详解

</p>  14: If the destination did not receive a segment, how will the TCP host know to resend the information?; D: u' i% A2 W+ j* O$ I: J. `5 @1 |
  A. The ACK received will not include the segment number that was not received.
  c7 _1 I* M0 w! ]0 t4 U0 R% m) [* t  B. The ACK received will include the segment number that was not received.; x" H1 |) p/ P, z1 D' q, G
  C. The sending host will send a PACK to verify segment receipt.
% @+ ]5 `! L+ b* x, D  D. The destination host will send a YACK message back to the sending host.( {6 Z3 @! Y4 _7 H) K! S: l: J
  15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?
/ ~: Q! a& G, p3 l5 T  A. Class A
' A6 b  m( t' H+ k2 F  B. Class B
; b3 {& c/ i2 [  C. Class C
( a& t& n# H' }& n  D. Class D. s# c2 E) \9 W; m: Y
  E. Class E0 g3 S2 }+ i' s7 \
  16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)
' {! O! R4 t' e$ k/ I3 X; y( P  A. 10.23.45.67
+ P4 w7 u) J7 r* P  B. 126.21.34.56+ X( i2 @" `- |- H/ B
  C. 172.16.32.1# P" U/ G* R; k5 O
  D. 172.31.234.553 R$ w# @& r/ ^# ]( x' T0 x, X
  E. 192.169.4.51 A  s' e. ~1 x' e! ]0 s: ~# K1 r
  17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?
! W, N1 @9 H  d" \6 V  Department% ]% Z9 q7 e7 D
  Number of Users
+ b* x# k( T* q/ ^, R  Corporate1 B& c; \- I+ U" }2 o8 h
  72 u, V# ]8 f9 o% N" B9 s/ q
  Customer Support
* J# |  `; ?( a: m! f, |7 g# E  15
  R. F! w" V: G% p2 C. b  Financial5 F' t" ^- e8 d
  13! _/ Z. m. R4 j1 }) u+ |
  HR! r5 \% \( Z6 o$ d
  7# B4 S( m2 G0 F2 I
  Engineering: l% @4 s. a" g; J1 C
  16. U9 g8 |  q% O5 B/ E! q# t
  A. 255.255.255.0
/ G* J% B* n& E9 f( I2 g/ j  B. 255.255.255.192
% }" |- u8 A1 O' t  {5 Q  C. 255.255.255.224
, P' i- T  \9 w6 f# w  @  D. 255.255.255.240- B8 h$ z( D7 l# Z& I: Y8 d
  E. 255.255.255.248
4 ?: |4 U; S/ B5 s$ F: [* |  18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?
4 k% }; m" X2 O1 ^+ H/ r  A. UDP
! }# J1 w8 t" ~* q, \  B. TCP7 S, a6 `8 b! y% H/ ~
  C. SNMP
: b5 |$ a3 X+ |6 Z( p$ U  D. ICMP8 _- V. E' T+ U5 g: n
  19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.). i0 _- N- J: C) q$ E7 L
  A. MAC address resolution
- c" m  p- X5 F$ a. j  B. Sequence numbers+ R; W1 w% \" {. a3 h% e5 K
  C. Acknowledgments2 Q5 `$ S; R3 t' d; j1 {
  D. Ping0 U0 F; A( k0 R8 U+ r
  E. Routing updates: k% u- G, r3 a
  20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?8 {$ V/ _! B& g* ~
  A. Increased throughput9 Y: `; O" P! P: V
  B. Decreased throughput
7 t3 I* n9 U! V; m  C. Increased latency
" p; s, f* l  s  ]5 k& F. R
: y4 z( \9 [$ v' R2 u8 [. Z( V  D. Decreased reliability
回复 支持 反对

使用道具 举报

 楼主| 发表于 2012-8-3 19:18:13 | 显示全部楼层

思科Cisco认证最新真题详解

</p>  21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?
0 k5 C) b8 h: \- a: m9 r  ~5 F  A. 255.255.255.0
* [% T+ L; E. k  d  B. 255.255.255.128; Q2 w9 d' M4 i% J- k
  C. 255.255.255.192
5 U6 j6 u1 z5 q% Q( e& R  D. 255.255.255.224, Y1 q7 s, q5 ]# ]! X- B5 S; g
  E. 255.255.255.240& i( b# d' N) {4 p) b
  F. 255.255.255.248
9 |& K) o$ v& {: E  22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?
: [/ ?1 E6 ^# B* t  [  A. ARP
7 l& E9 t0 e+ L- o7 C  B. RARP
: G1 Z2 }0 K7 o/ V5 J  C. SLARP9 g; p/ p! Z0 t( Q& y" L
  D. DHCP9 t6 e5 c! `9 I. @+ I
  23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?+ @! s+ U, X8 `2 o' E5 j9 ^% W
  A. The host's default gateway is down.+ A7 V! J8 s4 ~' @' X) b
  B. The destination host is not powered on.2 s6 c5 {5 a* P& F
  C. The IP address of the router interface is incorrect.; w( K( o8 o* y% Q' P
  D. The IP address of the switch to which the destination host connects is incorrect.
. k% Q, M5 e8 l( g- J4 R  E. The host is in a different subnet.1 R! f% {2 J) H
  24: Which of the following classes of IP addresses is utilized for multicasting?
. E  U& \+ r2 b) z* C  A. Class A+ n; E, g. C9 S3 h2 `9 f
  B. Class B9 M1 ]( H+ d6 g
  C. Class C
$ ]" g1 `$ U$ C% Y& W  D. Class D
- b5 d# y  X0 r4 x1 m4 b; Y5 K  25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her:' D$ o: D- O0 q; N/ ^
  A. It represents the number of hosts possible on that subnetwork., T0 V- B0 S; ^6 O  v
  B. It represents the number of subnetworks that are being used.
. l% K: g$ g3 k( Z  C. It represents the class of IP address being used.* U" Y8 N+ R. S- o) a5 z. d9 U& z2 Q& d& X
  D. It represents the number of bits in the subnet mask that are 1.
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-5-5 16:55 , Processed in 0.204335 second(s), 27 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表