免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3188 | 回复: 1
打印 上一主题 下一主题

cisco网络学院第三学期习题 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2002-01-08 22:41 |只看该作者 |倒序浏览
Question 1: \r\nWhat is the recommended maximum number of users in a peer-to-peer network?\r\nA.   5 \r\nB.   10 \r\nC.   15 \r\nD.   20 \r\n\r\nQuestion 2: \r\nWhat happens to a packet that does not match any of the tests in an access list?\r\nA.   It is discarded. \r\nB.   It is sent to the recipient. \r\nC.   It is stored until the access list is updated. \r\nD.   It is returned to the sender. \r\n\r\nQuestion 3: \r\nWhich configuration command is used to set the number of routes used for load sharing?\r\nA.   ipx routing \r\nB.   ipx networks \r\nC.   ipx maximum-paths \r\nD.   router rip \r\n\r\nQuestion 4: \r\nWhat describes the time necessary to move a packet from the data link layer to the physical layer?\r\nA.   Packet delay \r\nB.   Transmission time \r\nC.   Convergence \r\nD.   Queuing \r\n\r\nQuestion 5: \r\nAt which Layer of the OSI model would you classify the loss of network connectivity due to a loose patch cable?\r\nA.   Layer 7 \r\nB.   Layer 5 \r\nC.   Layer 3 \r\nD.   Layer 1 \r\n\r\nQuestion 6: \r\nWhat is the first step in LAN design?\r\nA.   Establish the design goals \r\nB.   Estimate the design cost \r\nC.   Determine the network users \r\nD.   Determine the physical size \r\n\r\nQuestion 7: \r\nWhat do routers use to maintain tables?\r\nA.   Broadcast forwarding \r\nB.   IP Tunneling \r\nC.   Routed protocols \r\nD.   Routing protocols \r\n\r\nQuestion 8: \r\nSwitches that receive the entire frame before sending it, use what type of frame forwarding?\r\nA.   Cut-through \r\nB.   Receive and send \r\nC.   Copy and send \r\nD.   Store-and-forward \r\n\r\nQuestion 9: \r\nWhich of the following refers to the data capacity of a link?\r\nA.   Bandwidth \r\nB.   Reliability \r\nC.   Hop Count \r\nD.   Delay \r\n\r\nQuestion 10: \r\nWhat routing protocol does Novell use?\r\nA.   Novell IGRP \r\nB.   NOvell RIP \r\nC.   Novell EIGRP \r\nD.   Novell IPX \r\n\r\nQuestion 11: \r\nA peer-to-peer network is also known as what type of network?\r\nA.   Client-server \r\nB.   Thin client \r\nC.   Workgroup \r\nD.   Home office \r\n\r\nQuestion 12: \r\nWhich type of route is used when no other routes are known to the destination?\r\nA.   Static \r\nB.   Default \r\nC.   Dynamic \r\nD.   Next available \r\n\r\nQuestion 13: \r\nWhich IPX routing command is used to show the number and type of packets received and transmitted by the router?\r\nA.   show ipx servers \r\nB.   show ipx route \r\nC.   show ipx traffic \r\nD.   show ipx interface \r\n\r\nQuestion 14: \r\nWhich metric is used in RIP?\r\nA.   Bandwidth \r\nB.   Delay \r\nC.   Hop count \r\nD.   Traffic load \r\n\r\nQuestion 15: \r\nWhat is a benefit of using VLANs?\r\nA.   Extended collision domains \r\nB.   Increased administration \r\nC.   Multiple cable runs \r\nD.   Tighter network security \r\n\r\nQuestion 16: \r\nWhich wildcard mask would match the host range for the subnet 192.16.5.32 /27?\r\nA.   0.0.0.32 \r\nB.   0.0.0.63 \r\nC.   0.0.63.255 \r\nD.   0.0.0.31 \r\n\r\nQuestion 17: \r\nWhich OSI layer does a router use to make its forwarding decisions?\r\nA.   1 \r\nB.   2 \r\nC.   3 \r\nD.   4 \r\n\r\nQuestion 18: \r\nWhat is the term used when switch ports are automatically assigned to a VLAN?\r\nA.   Dynamic \r\nB.   Static \r\nC.   Port-centric \r\nD.   Default \r\n\r\nQuestion 19: \r\nWhich OSI layer is responsible for finding the best path through the internetwork?\r\nA.   1 \r\nB.   2 \r\nC.   3 \r\nD.   4 \r\n\r\nQuestion 20: \r\nA switch segments a LAN into which of the following?\r\nA.   Microsegments \r\nB.   Workgroups \r\nC.   Broadcast domains \r\nD.   Access groups \r\n\r\nQuestion 21: \r\nWhich metrics does Novell RIP use?\r\nA.   Bandwidth and delay \r\nB.   Ticks and hop count \r\nC.   Distance and cost \r\nD.   Size and throughput \r\n\r\nQuestion 22: \r\nWhere should extended access lists be placed?\r\nA.   Close to the source \r\nB.   Close to the destination \r\nC.   On any router in the network \r\nD.   Midway between source and destination \r\n\r\nQuestion 23: \r\nThe star/extended star topology uses what type of standard?\r\nA.   Token ring \r\nB.   Ethernet 802.3 \r\nC.   Ethernet 802.5 \r\nD.   ARCNET \r\n\r\nQuestion 24: \r\nWhat is used to alleviate congestion?\r\nA.   Install more hubs \r\nB.   Use an extended star \r\nC.   Use a bus topology \r\nD.   Increase the bandwidth \r\n\r\nQuestion 25: \r\nWhich Layer of the OSI model is concerned with the topology of a network?\r\nA.   Transport \r\nB.   Network \r\nC.   Data Link \r\nD.   Physical \r\n\r\nQuestion 26: \r\nWhat protocol is used to allow redundant paths in a switched/bridged network?\r\nA.   RIP \r\nB.   Spanning Tree \r\nC.   IGRP \r\nD.   ISL \r\n\r\nQuestion 27: \r\nHow are link-state routing updates triggered?\r\nA.   By timers \r\nB.   By topology changes \r\nC.   By protocol changes \r\nD.   By changing the NIC \r\n\r\nQuestion 28: \r\nWhich backup type does NOT reset the archive bit and stores all files that have been created and modified since the last full backup?\r\nA.   Hierarchical \r\nB.   Differential \r\nC.   Copy \r\nD.   Daily \r\n\r\nQuestion 29: \r\nSelect the correct IOS command for configuring IGRP as the routing protocol.\r\nA.   Router#router igrp 100 \r\nB.   Router(config-router)>router igrp 100 \r\nC.   Router(config)#router igrp 100 \r\nD.   Router(config-if)#set router igrp 100 \r\n\r\nQuestion 30: \r\nWhat is the effect of a switch on bandwidth?\r\nA.   Dedicates bandwidth \r\nB.   Shares bandwidth \r\nC.   Decreases bandwidth \r\nD.   Eliminates bandwidth \r\n\r\nQuestion 31: \r\nHow often are RIP updates broadcast?\r\nA.   Every 15 seconds \r\nB.   Every 30 seconds \r\nC.   Every 60 seconds \r\nD.   Every 90 seconds \r\n\r\nQuestion 32: \r\nAt what time interval does IGRP send routing updates?\r\nA.   120 seconds \r\nB.   30 seconds \r\nC.   60 seconds \r\nD.   90 seconds \r\n\r\nQuestion 33: \r\nWhat is the encapsulation type on a router for a Novell network running version 3.12?\r\nA.   Novell-ether \r\nB.   ARPA \r\nC.   SNAP \r\nD.   SAP \r\n\r\nQuestion 34: \r\nWhat is the maximum size of an IPX network number?\r\nA.   Eight binary digits \r\nB.   Eight hexadecimal digits \r\nC.   Eight decimal digits \r\nD.   Eight octal digits \r\n\r\nQuestion 35: \r\nWhich routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)?\r\nA.   RIP \r\nB.   IGRP \r\nC.   OSPF \r\nD.   EIGRP \r\n\r\nQuestion 36: \r\nWhat allows a router to accept a packet on one interface and forward it to another interface?\r\nA.   Broadcast forwarding \r\nB.   Switching function \r\nC.   Filter and control function \r\nD.   Path determination \r\n

论坛徽章:
0
2 [报告]
发表于 2002-01-08 22:43 |只看该作者

cisco网络学院第三学期习题

Question 37: \r\nWhat is correct regarding the node number using Novell\'s IPX addressing scheme?\r\nA.   80 bits long \r\nB.   Written in decimal \r\nC.   Same as the MAC address \r\nD.   Number assigned by an administrator \r\n\r\nQuestion 38: \r\nWhich type of access list would permit or deny part of a protocol suite?\r\nA.   Standard \r\nB.   General \r\nC.   Specific \r\nD.   Extended \r\n\r\nQuestion 39: \r\nWhich routing protocol is used to communicate between autonomous systems?\r\nA.   RIP \r\nB.   Ethernet \r\nC.   Token Ring \r\nD.   Exterior routing protocols \r\n\r\nQuestion 40: \r\nWhich of the following is used to keep a list of equipment repairs?\r\nA.   Security record \r\nB.   Software record \r\nC.   Maintenance record \r\nD.   Policy record \r\n\r\nQuestion 41: \r\nEntries made by an administrator to manipulate a routing table are referred to as which of the following?\r\nA.   Static routes \r\nB.   Dynamic routes \r\nC.   ARP tables \r\nD.   Routing tables \r\n\r\nQuestion 42: \r\nWhat is the term used when ports on a switch are administratively assigned to a VLAN?\r\nA.   Dynamic \r\nB.   Static \r\nC.   Default \r\nD.   Polled \r\n\r\nQuestion 43: \r\nWhere should workgroup servers be placed?\r\nA.   MDF \r\nB.   POP \r\nC.   VCC \r\nD.   IDF \r\n\r\nQuestion 44: \r\nWhat does the split horizon rule help prevent?\r\nA.   Static routes \r\nB.   Routing loops \r\nC.   Dynamic routes \r\nD.   Large ARP tables \r\n\r\nQuestion 45: \r\nInternetwork design seeks to provide the greatest availability for the least _________.\r\nA.   design time \r\nB.   cost \r\nC.   network downtime \r\nD.   installation time \r\n\r\nQuestion 46: \r\nWhich of the following are used with VLANs to tighten network security?\r\nA.   Access control lists \r\nB.   Frame tagging \r\nC.   Source-bridging \r\nD.   ARP tables \r\n\r\nQuestion 47: \r\nWhich represents the time it takes a frame to travel from its source station to its final destination on the network?\r\nA.   Hop count \r\nB.   Bits per second \r\nC.   Latency \r\nD.   Tick time \r\n\r\nQuestion 48: \r\nWhat would the wildcard mask be to deny traffic only on network 195.67.52.0?\r\nA.   0.0.255.255 \r\nB.   255.255.255.0 \r\nC.   0.0.0.255 \r\nD.   255.255.0.0 \r\n\r\nQuestion 49: \r\nWhich device is one of the most common Layer 2 devices?\r\nA.   LAN switch \r\nB.   Active hub \r\nC.   Passive hub \r\nD.   Router \r\n\r\nQuestion 50: \r\nWhat is a VLAN used to create?\r\nA.   Autonomous systems \r\nB.   Broadcast domains \r\nC.   Network Sectors \r\nD.   Virtual sections \r\n\r\n\r\n   \r\n\r\nQuestion 51: \r\nWhich of the following is another term for shortest path first routing algorithm?\r\nA.   Source bridging \r\nB.   Store-and-forward \r\nC.   Distance-vector \r\nD.   Link state \r\n\r\nQuestion 52: \r\nWhich of the following devices establishes a bandwidth domain also known as the collision domain?\r\nA.   Repeater \r\nB.   Switch \r\nC.   Active hub \r\nD.   Passive hub \r\n\r\nQuestion 53: \r\nIn an access list, what word can replace 0.0.0.0 255.255.255.255?\r\nA.   Permit \r\nB.   Accept \r\nC.   Any \r\nD.   All \r\n\r\nQuestion 54: \r\nA numbered access list in the range of 800-899 would be what type of access list?\r\nA.   IPX standard \r\nB.   Appletalk \r\nC.   IP standard \r\nD.   IP extended \r\n\r\nQuestion 55: \r\nWhat effect does upgrading to a bridge from a hub have on latency of the network?\r\nA.   Decreases it \r\nB.   No effect \r\nC.   Eliminates it \r\nD.   Increases it \r\n\r\nQuestion 56: \r\nAt which Layer of the OSI model would flow control problems exist?\r\nA.   Application \r\nB.   Presentation \r\nC.   Session \r\nD.   Transport \r\n\r\nQuestion 57: \r\nWhich command will test the loopback function on the NIC?\r\nA.   Ping 127.0.0.1 \r\nB.   Telnet 127.0.0.1 \r\nC.   Ping 127.0.0.0 \r\nD.   Telnet 127.0.0.0 \r\n\r\nQuestion 58: \r\nA wildcard mask bit of \"0\" means that the corresponding bit must be _________.\r\nA.   matched \r\nB.   ignored \r\nC.   deleted \r\nD.   passed \r\n\r\nQuestion 59: \r\nWhat is your first step in the troubleshooting process?\r\nA.   Analyze data \r\nB.   Undo previous network changes \r\nC.   Gather data \r\nD.   Ignore the call
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP