ICode9

精准搜索请尝试: 精确搜索
首页 > 其他分享> 文章详细

【福利】10道CCNA经典测试题你能对几题?(附最新版CCNA题库下载链接)

2021-03-05 13:57:56  阅读:212  来源: 互联网

标签:10 when route QUESTION 点击 CCNA 最新版 空白处 must


近期备考的CCNA的小伙伴比较多,所以小微赠送最新版的CCNA题库给大家,老规矩,需要完整版题库的小伙伴,公众号后台回复“题库”,即可下载。

 

图片

 

 

QUESTION 1

A network engineer must create a diagram of a multivendor network.which command must be configured on the Cisco devices so that the topology of the network can be mapped?

 

A.Device(config)#lldp run

B.Device(config)#cdp run

C.Device(config)# cdp enable

D.Device(config)# flow-sampler-map topology

点击空白处查看答案

A

 

QUESTION 2

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

 

A.CPU ACL

B.TACACS

C.Flex ACL

D.RADIUS

点击空白处查看答案

A

 

QUESTION 3

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

 

A.IKEv2

B.IKEv1

C.IPsec

D.MD5

点击空白处查看答案

C

 

QUESTION 4

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

 

A.TCP use the three-way handshake,and UDP dose no guarantee message delivery

B.TCP use synchronization packets,and UDP uses acknowledgement packets

C.UDP provides reliable message transfer,and TCP is a connectionless protocol.

D.UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.

点击空白处查看答案

A

 

QUESTION 5

What are two reasons that cause late collisions to increment on an Ethernet interface?(choose two)

 

A.when the sending device waits 15 seconds before sending the frame again

B.when the cable length limits are exceeded

C.when one side of the connection is configured for half-duplex

D.when Carner Sense Multiple Access/Collision Detection is used

E.when a collision occurs after the 32nd byte of a frame has been transmitted

点击空白处查看答案

BD

 

QUESTION 6

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

 

A.It allows the traffic to pass through unchanged

B.It drops the traffic

C.It tags the traffic with the default VLAN

D.It tags the traffic with the native VLAN

点击空白处查看答案

A

 

QUESTION 7

What benefit does controller-based networking provide versus traditional networking?

 

A.provides an added layer of security to protect from DDoS attacks

B.combines control and data plane functionality on a single device to minimize latency

C.moves from a two-tier to a three-tier network architecture to provide maximum redundancy

D.allows configuration and monitoring of the network from one centralized point

点击空白处查看答案

D

 

QUESTION 8

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

 

A、The floating static route must have a higher administrative distance than the primary route so it is used as a backup

B、The administrative distance must be higher on the primary route so that the backup route becomes secondary.

C、The floating static route must have a lower administrative distance than the primary route so it is used as a backup

D、The default-information originate command must be configured for the route to be installed into the routing table

点击空白处查看答案

A

 

QUESTION 9

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?

 

A.on

B.auto

C.active

D.desirable

点击空白处查看答案

A

QUESTION 10

What are two descriptions of three-tier network topologies? (Choose two.)

 

A.The distribution layer runs Layer 2 and Layer 3 technologies.

B.The network core is designed to maintain continuous connectivity when devices fail.

C.The core layer maintains wired connections for each host.

D.The core and distribution layers perform the same functions

E.The access layer manages routing between devices in different domains.

点击空白处查看答案

AB

标签:10,when,route,QUESTION,点击,CCNA,最新版,空白处,must
来源: https://blog.csdn.net/XMWS_IT/article/details/114393694

本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享;
2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关;
3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关;
4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除;
5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有