云南大學(xué)2011年網(wǎng)絡(luò)實用技術(shù)期中(易超).doc_第1頁
云南大學(xué)2011年網(wǎng)絡(luò)實用技術(shù)期中(易超).doc_第2頁
云南大學(xué)2011年網(wǎng)絡(luò)實用技術(shù)期中(易超).doc_第3頁
云南大學(xué)2011年網(wǎng)絡(luò)實用技術(shù)期中(易超).doc_第4頁
云南大學(xué)2011年網(wǎng)絡(luò)實用技術(shù)期中(易超).doc_第5頁
已閱讀5頁,還剩3頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

云南大學(xué)2011年春季學(xué)期軟件學(xué)院實用網(wǎng)絡(luò)技術(shù)期中考試(閉卷)試卷A滿分100分 考試時間:120分鐘 任課教師:易超序號: 學(xué)號: 姓名: 一 Choice(2 mark for each item, total 60marks) 1234567891011121314151617181920212223242526272829301Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.) ( )A. show flash B. show NVRAM C. show startup-config D. show running-config E. show version 2Users in the network are experiencing slow response time when doing file transfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors? ( )A. show running-config B. show startup-config C. show interfaces D. show ip route E. show version F. show memory 3. The connection between routers B and C has been successfully tested. However, after rebooting router C, the administrator noticed the response time between networks and is slower. Ping between the two routers is successful. A trace route indicates three hops from router B to router C. What else can be done to troubleshoot the problem? ( ) A. Ping router B S0/1 connection from router C. B. Trace the connection between router B to router C S0/1. C. Issue a show ip route command in router B to verify routing is enabled. D. Issue a show ip interface brief command on router C. 4. What command is used to change the default router name to Fontana? ( )A. Router# name Fontana B. Router# hostname Fontana C. Router(config)# name Fontana D. Router(config)# hostname Fontana 5. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) ( )A. Sydney(config-if)# ip address B. Sydney(config-if)# no shutdown C. Sydney(config-if)# ip address 24 D. Sydney(config-if)# clock rate 56000 E. Sydney(config-if)# ip host Melbourne 6 .Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address represent?( ) A. Gateway for the network B. Gateway for the network C. IP assigned to the serial port on Router A D. IP assigned to the serial port on Router B 7.Refer to the exhibit. What additional command is required to allow remote access to this switch from hosts outside the local network? ( ) A. NA-SW1(config-if)# no shutdown B. NA-SW1(config)# enable password password C. NA-SW1(config)# ip default-gateway address D. NA-SW1(config-if)# description description 8. In a Cisco device, where is the IOS file stored prior to system startup? ( )A. RAM B. ROM C. Flash D. NVRAM 9. When network services fail, which port is most often used to access a router for management purposes? ( )A. AUX B. Ethernet C. Console D. Telnet E. SSH 10. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen? ( ) A. Telnet B. Console C. AUX D. SSH 11. In a Cisco router, when do changes made to the running-configuration take effect? ( )A. after a system restart B. as the commands are entered C. when logging off the system D. when the configuration is saved to the startup-configuration 12.Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.) ( )A. The host A is turned off. B. The Fa0/0 interface on Dallas is shutdown. C. The LAN cable is disconnected from host B. D. The S0/0/1 IP address of Dallas is improperly configured. E. The Fa0/0 interface on Dallas is in a different subnet than host B. F. The clock rate is missing on the serial link between Dallas and NYC. 13. Which two statements correctly describe the components of a router? (Choose two.) ( )A. RAM permanently stores the configuration file used during the boot sequence. B. ROM contains diagnostics executed on hardware modules. C. NVRAM stores a backup copy of the IOS used during the boot sequence. D. Flash memory does not lose its contents during a reboot. E. ROM contains the most current and most complete version of the IOS. F. Flash contains boot system commands to identify the location of the IOS. 14. If a router cannot find a valid configuration file during the startup sequence, what will occur? ( ) A. The startup sequence will reset. B. The router will prompt the user for a response to enter setup mode. C. The startup sequence will halt until a valid configuration file is acquired. D. The router will generate a default configuration file based on the last valid configuration. E. The router will monitor local traffic to determine routing protocol configuration requirements. 15. Which of the following is the correct flow of routines for a router startup? ( )A. load bootstrap, load IOS, apply configuration B. load bootstrap, apply configuration, load IOS C. load IOS, load bootstrap, apply configuration, check hardware D. check hardware, apply configuration, load bootstrap, load IOS 16. What is the default sequence for loading the configuration file? ( ) A. NVRAM, FLASH, ROM B. FLASH, TFTP,CONSOLE C. NVRAM, TFTP, CONSOLE D. FLASH, TFTP, ROM 17. From what location can a router load the Cisco IOS during the boot process? (Choose two.) ( )A. RAM B. TFTP server C. NVRAM D. setup routine E. Flash memory F. terminal 18. Which are functions of a router? (Choose three.) ( )A. packet switching B. extension of network segments C. segmentation of broadcast domains D. selection of best path based on logical addressing E. selection of best path based on physical addressing 19. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.) ( )A. decapsulates the Layer 3 packet by stripping off the Layer 2 frame header B. uses the destination MAC Address in the IP Header to look up the next-hop address in the routing table C. leaves the Layer 2 frame header intact when decapsulating the Layer 3 packet D. uses the destination IP Address in the IP header to look up the next-hop address in the routing table E. encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface F. encapsulates the Layer 3 packet into a special Layer 1 frame and forwards it to the exit interface 20. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use? ( )A. straight-through B. rollover C. cross-over D. serial 21.Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.) ( ) A. This router only has two interfaces. B. The router interfaces are not operational yet. C. This router is configured to forward packets to remote networks. D. The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command. E. An IP packet received by this router with a destination address of will be forwarded out of the Serial0/0/0 interface. 22.The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) ( ) A. Sydney(config-if)# ip address B. Sydney(config-if)# no shutdown C. Sydney(config-if)# ip address 24 D. Sydney(config-if)# clock rate 56000 E. Sydney(config-if)# ip host Melbourne 23. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) ( )A. VTY interface B. console interface C. Ethernet interface D. secret EXEC mode E. privileged EXEC mode F. router configuration mode 24. What is the outcome of entering these commands?( )R1(config)# line vty 0 4 R1(config-line)# password check123 R1(config-line)# login A. ensures that a password is entered before entering user EXEC mode B. sets the password to be used for connecting to this router via Telnet C. requires check123 to be entered before the configuration can be saved D. creates a local user account for logging in to a router or switch 25. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem? ( ) A. The destination networks do not exist. B. The IP addresses on the router interfaces must be configured as network addresses and not host addresses. C. The interfaces must be enabled with the no shutdown command. D. Each interface must be configured with the clock rate command. 26. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM? ( )A. Router1# copy running-config flash B. Router1(config)# copy running-config flash C. Router1# copy running-config startup-config D. Router1(config)# copy running-config startup-config E. Router1# copy startup-config running-config F. Router1(config)# copy startup-config running-config 27. What header address information does a router change in the information it receives from an attached Ethernet interface before

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論