ccna第一学期final_exam考试英文版答案(r&s 5.0)c

上传人:101****457 文档编号:89366313 上传时间:2019-05-24 格式:DOC 页数:13 大小:355.78KB
返回 下载 相关 举报
ccna第一学期final_exam考试英文版答案(r&s 5.0)c_第1页
第1页 / 共13页
ccna第一学期final_exam考试英文版答案(r&s 5.0)c_第2页
第2页 / 共13页
ccna第一学期final_exam考试英文版答案(r&s 5.0)c_第3页
第3页 / 共13页
ccna第一学期final_exam考试英文版答案(r&s 5.0)c_第4页
第4页 / 共13页
ccna第一学期final_exam考试英文版答案(r&s 5.0)c_第5页
第5页 / 共13页
点击查看更多>>
资源描述

《ccna第一学期final_exam考试英文版答案(r&s 5.0)c》由会员分享,可在线阅读,更多相关《ccna第一学期final_exam考试英文版答案(r&s 5.0)c(13页珍藏版)》请在金锄头文库上搜索。

1、1窗体顶端A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?DSLdialupsatelliteleased linecable modem窗体底端2窗体顶端What is the purpose of havin

2、g a converged network?to provide high speed connectivity to all end devicesto make sure that all types of data packets will be treated equallyto achieve fault tolerance and high availability of data network infrastructure devicesto reduce the cost of deploying and maintaining the communication infra

3、structure窗体底端3窗体顶端What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?reliabilityscalabilityquality of serviceaccessibility窗体底端4窗体顶端Which connection provides a secure CLI

4、session with encryption to a Cisco switch?a console connectionan AUX connectiona Telnet connectionan SSH connection窗体底端5窗体顶端A network technician is attempting to configure an interface by entering the following command: SanJose(config)#ip address 192.168.2.1 255.255.255.0. The command is rejected by

5、 the device. What is the reason for this?The command is being entered from the wrong mode of operation.The command syntax is wrong.The subnet mask information is incorrect.The interface is shutdown and must be enabled before the switch will accept the IP address.窗体底端6窗体顶端After several configuration

6、changes are made to a router, thecopy running-configuration startup-configurationcommand is issued. Where will the changes be stored?flashROMNVRAMRAMthe configuration registera TFTP server窗体底端7窗体顶端Refer to the exhibit. From global configuration mode, an administrator is attempting to create a messag

7、e-of-the-day banner by using the commandbanner motd V Authorized access only! Violators will be prosecuted! VWhen users log in using Telnet, the banner does not appear correctly. What is the problem?The banner message is too long.The delimiting character appears in the banner message.The symbol “!”

8、signals the end of a banner message.Message-of-the-day banners will only appear when a user logs in through the console port.窗体底端8窗体顶端What are three characteristics of an SVI? (Choose three.)It is designed as a security protocol to protect switch ports.It is not associated with any physical interfac

9、e on a switch.It is a special interface that allows connectivity by different types of media.It is required to allow connectivity by any device at any location.It provides a means to remotely manage a switch.It is associated with VLAN1 by default.窗体底端9窗体顶端A technician configures a switch with these

10、commands:SwitchA(config)#interface vlan 1SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0SwitchA(config-if)#no shutdownWhat is the technician configuring?Telnet accessSVIpassword encryptionphysical switchport access窗体底端10窗体顶端In computer communication, what is the purpose of message encoding?t

11、o convert information to the appropriate form for transmissionto interpret informationto break large messages into smaller framesto negotiate correct timing for successful communication窗体底端11窗体顶端What protocol is responsible for controlling the size of segments and the rate at which segments are exch

12、anged between a web client and a web server?TCPIPHTTPEthernet窗体底端12窗体顶端What are two benefits of using a layered network model? (Choose two.)It assists in protocol design.It speeds up packet delivery.It prevents designers from creating their own model.It prevents technology in one layer from affectin

13、g other layers.It ensures a device at one layer can function at the next higher layer.窗体底端13窗体顶端What is the process of dividing a data stream into smaller pieces before transmission?segmentationencapsulationencodingflow control窗体底端14窗体顶端When IPv4 addressing is manually configured on a web server, wh

14、ich property of the IPv4 configuration identifies the network and host portion for an IPv4 address?DNS server addresssubnet maskdefault gatewayDHCP server address窗体底端15窗体顶端A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the s

15、ignals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?presentation layernetwork layerphysical layerdata link layer窗体底端16窗体顶端A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 中学教育 > 其它中学文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号