Cisco CCNA考试七十九题(1)

1.What is the correct order for     the OSI model?  
  P=Presentation, S=Session, D=Datalink,
  Ph=Physical, T=Transport, A= Application,
  N=Network  
  A. P S A PH D N T  
  B. A P S T N D PH  
  C. PH D N T A S P  
  D. P S A T N D PH  
It is crucial you not only memorize this
and know what each layer does.  
    2. What is encapsulation?  
  A. Putting the header on an incoming frame  
  B. Putting a header on an incoming segment  
  C. Putting a header on an outgoing frame  
  D. Putting a header on an outgoing bit  
  This also includes trailers and can be put on segments,
 packets, and frames.  
   3. Which layer is most concerned with user applications?  
  A. Application  
  B. Presentation  
  C. Network  
  D. Physical  
   4. Which of the following is de-encapsulation?  
  A. Stripping the header from a frame  
  B. Putting a header on a segment  
  C. Putting a header on a frame  
  D. Stripping a frame from a link  
  
This also includes trailers as in question 2.  
   5. What layer converts data into segments?  
  A. Application  
  B. Presentation  
  C. Transport  
  D. Physical  
    
 
   6. What layer converts data into Packets?   
  A. Network  
  B. Application  
  C. Physical  
  D. Data Link  
 
   7. What layer converts data into Frames?
  A. Application  
  B. Physical  
  C. Data Link  
  D. Transport  
    8. What layer converts data into bits?  
  A. Application  
  B. Session  
  C. Data Link  
  D. Physical  
  
  All of the layers need to convert data into something that
  they can pass down to the next level, with the exception of
  the Application layer which hands data to the Presentation layer.
  The Presentation layer encrypts, and compresses
  before sending it to
  the Session layer for it s first conversion.  
   9. Which layer is most concerned with getting data
  from the beginning to the final destination?  
  A. Application  
  B. Presentation  
  C. Session  
  D. Transport  
  The transport layer is most concerned with reliable transportation
  from one end to the other.  
   10. Which of the following is not a part
  of the Session layer?  
  A. Establishing a session  
  B. Ensuring error free segments  
  C. Ending a session
  D. Keeping the sender and receiver from sending a message
  at the same time  That is the job of the Transport layer.  
   11. Which of the following is not a job
 for the presentation layer? Choose 2  
  A. Data representation  
  B. Compression  
  C. Dialog management  
  D. Transmission  
  E. Encryption  
  C is handled by the session layer, and D is handled
  by the Transport layer  
   12. What does Peer to Peer communication involve?  
  A. Each layer communication with the layer below it  
  B. Each layer communication with layer above it  
  C. Each layer communicating with adjacent layer in another system  
  D. Each layer communication with it s corresponding layer in
  another system  
  Answer D.
  Answer C sounds correct also, but adjacent
  and corresponding are two different things.
  The session layer can only communicate with the session
  layer in another system for example.  
   13. Why does the industry use a layered model?
  Choose all correct  
  A. When you enhance one layer it doesn t affect the other layers  
  B. Design and development can be made in a modular fashion  
  C. Network operations can be simplified  
  D. Troubleshooting can be simplified.  
 
     14. Which two of the following are not
       from the physical layer?  
  A. SDLC  
  B. V.35  
  C. HSSI  
  D. ISDN  
  E. RS-232  
  Answer A D.
SDLC and ISDN are WAN protocols that function at the data link layer  
   15. Which two answers are functions of the OSI model"s
network layer?  
  A. Sequencing of frames  
  B. Path determination  
  C. Packet switching  
  D. Packet sequencing  
  Answer B C.
Sequencing is done at the data link layer. D is fictional.
16. What is an example of a MAC address?  
   A. Az32:6362:2434  
   B. Sj:2817:8288  
   C. GGG:354:665  
    D. A625:cbdf:6525     The address is a 48 bit address which
  requires 12 Hex digits.A hex digit can t be past
  the letter F. Hex stands for 16. 1-9 and A-F
  make up numbers that are valid.  
   17. Which of the following is not part of
  the data link layer?  
  A. Transports data across the physical link  
  B. Performs physical addressing  
  C. Performs flow control  
  D. Determines network topology  
  E. Terminates a session  
  This is part of the session layer  
   18. Which of the following are data link protocols?  
  A. HDLC  
  B. FTP  
  C. SQL  
  D. ISDN  
  E. Token Ring  
  FTP is an application and SQL is a session layer protocol.  
   19. Of the following address AA77:3827:EF54,
    which of the following is the vendor portion?  
  A. AA7738  
  B. 27EF54  
  C. AA77  
  D. EF54  
  The vendor code is how you can tell who made the card.
  The last 6 digits are the physical address.
20. Which of the following are examples of layer 3 addressing?  
A. 165.33.4.34  
B. AA77:3827:EF54  
C. HHHH:hg:7654  
D. 76  
The first is a TCPIP address and the second is an IPX address  
21. What is considered Layer 3 addressing?  
A. Data Link Layer  
B. Network Layer  
C. Application Layer  
D. None of these  
Physical is Layer 1, then data link, and then Network. This is the same layer
that routers are on.  
22. What layer are Bridges on?  
A. Data Link  
B. Physical  
C. Application  
D. Transport  
Bridges segment networks but are not able to determine addresses like the network layer
does.  
23. Repeaters are on what layer?  
A. Transport  
B. Session  
C. Physical  
D. Application  
All repeaters can do is boost a signal. An active hub is a good example of a repeater.
A switching hub is a good example of layer 3 addressing, since switches go by network
addresses and IPX addresses rather than just boost signals. Bridges can only read mac
addresses, and not the full IPX or TCPIP addresses.  
24. Which of the following are considered routing protocols?  
A. OSPF  
B. IP  
C. IPX  
D. EIGRP  
E. Token Ring  
Answers B and C are routed protocols, whereas A and D are
the protocols that do the routing. This is easily confused.
You can remember it by thinking that the routing protocols
that haul the routed protocols are like a tug ship pulling a barge.
The barge is full of data.  
25. Which two of the following are considered connection
oriented communication?  
A. Setup and maintenance procedures are performed to ensure
message delievery  
B. A physical circuit exists between two communicating devices  
C. It is a best effort type of communication  
D. A virtual connection exists between the two  
B is not a necessity, and C is not accurate. TCP is connection oriented
and UDP is not.  
26. Which of the following are not WAN protocols? Choose 2  
A. Frame Relay  
B. ATM  
C. Ethernet  
D. FDDI  
E. ISDN  
Ethernet and FDDI are LAN protocols.  
27. Which of the following will allow you to view NVRAM s contents?  
A. show configuration  
B. show protocols  
C. show version  
D. show running-config  
E. show startup-config  
Answer A E. These show the backup configuration stored in NVRAM.
The other anwsers allow youto view RAM.  
28. Which of the following contains the OS image?  
A. Flash   
B. NVRAM  
C. RAM  
D. Interfaces  
ROM will be used if Flash is unavailable. NVRAM is the backup
configuration, and RAM is the active configuration  
29. Which of the following indicates the router is in privilege mode?  
A. Router#  
B. Router>  
C. Router-  
D. Router*  
Answer B shows the router in user mode.  
30. What does "show cdp neighbors" not show? Neighbors_________  
A. device id  
B. hardware platform  
C. ios version  
D. port type and number
31. Which of the following will
show you the clock?  
A. cl?  
B. Cl ?  
C. Clock?  
D. Clock ?  
By typing this the router will finish the command
and show the clock.  
32. CDP operates at which layer?   A. Transport  
B. Network  
C. Data link  
D. Physical  
CDP allows a network device to exchange frames with
other directly connected networked devices.  
33. Which command does not show two devices are not routing packets
between them successfully?  
A. ping  
B. show interface  
C. trace  
D. telnet  
Answer A C D. With these commands you can tell
whether or not you have communication.
Show interface just verifies there is a connection  
34. What keystrokes shows the possible commands in privilege mode?   A. help  
B. h  
C. ctrl+h  
D. ?  
Answers A and B will give a brief description
when typed, and C is not valid.  
35. Which two items contain versions of the router s configuration file?   A. flash  
B. nvram  
C. ram  
D. rom  
A and D contain the OS.  
36. Which of the following commands will allow you
to review the contents of RAM?   A. show configuration  
B. show protocols  
C. show version  
D. show running-config  
E. show startup-config  
A and E allow you to see NVRAM.  
37. Which of the following will allow you to add, modify,
or delete commands in the startup configuration file?   A. show startup-config  
B. show running-config  
C. configure terminal  
D. configure memory  
Answer C allows you to change items in the running configuration file  
38. Which command would be used to restore a configuration file to RAM?   A. router#copy  
________TFTP running-config  
B. router>copy  
C. router*copy  
D. router^copy  
You must be in privilege mode when executing this, which is why you see the # sign.  
39. Which of the following commands will display the running configuration
file to a terminal?   A. show running-config  
B. show router-config  
C. router#show flash  
D. router>show version  
It can only be shown in privilege mode.  
40. If you need to copy the currently executing configuration file into NVRAM,
which command would you use?   A. router#copy startup-config running-config  
B. router#copy startup-config TFTP  
C. router#copy running-config startup-config  
D. router>copy startup-config running-config  
Answers ABC show that the router is in privilege mode
which is necessary to complete this action, but only C shows the correct syntax.
­
41 Which of the following commands would not set a password on a Cisco router?  
A. router(config)#enable secret  
B. router(config-line)#password test  
C. router(config)#service encryption password  
D. router(config)#enable password  
This command is used to encrypt passwords in configuration files.  
42. Which of the following would cause a router to boot into
the initial configuration dialog after powering has cycled?   A. Someone had copied the startup configuration file in a TFTP server  
B. The running configuration file was copied to the startup configuration file  
C. It is the first time router has ever been turned on  
D. The write erase command was executed immediately before powering down the router.  
These two scenarios describe what will happen when the router needs to
use NVRAM to boot if it cannot find the configuration file.  
43. What would cause a router to boot from ROM?   A. 0x3202  
B. 0x2302  
C. 0x2101  
D. 0x2103  
A configuration register of 1 or 0 will cause the router to boot from ROM.  
44. Where does the running config file exist?  
A. NVRAM  
B. ROM  
C. RAM  
D. Flash   
This file is erased if the router is reloaded or rebooted.  
45. How do you back up a router?  
A. router#copy running-config startup-configuration  
B. router(config)#copy TFTP flash  
C. router#copy flash TFTP  
D. router#copy flash NVRAM  
You can copy the file to a TFTP server or other storage device.
 
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值