分类: 系统运维
2007-03-09 16:50:52
Cisco CCNA考题
1.What is the correct order for the OSI model?
P=Presentation, S=Session, D=Datalink, Ph=Physical, T=Transport, A= Application, N=Network
A. P S A PH D N T
B. A P S T N D PH
C. PH D N T A S P
D. P S A T N D PH
It is crucial you not only memorize this and know what each layer does.
2. What is encapsulation?
A. Putting the header on an incoming frame
B. Putting a header on an incoming segment
C. Putting a header on an outgoing frame
D. Putting a header on an outgoing bit
This also includes trailers and can be put on segments, packets, and frames.
3. Which layer is most concerned with user applications?
A. Application
B. Presentation
C. Network
D. Physical
4. Which of the following is de-encapsulation?
A. Stripping the header from a frame
B. Putting a header on a segment
C. Putting a header on a frame
D. Stripping a frame from a link
This also includes trailers as in question 2.
5. What layer converts data into segments?
A. Application
B. Presentation
C. Transport
D. Physical
6. What layer converts data into Packets?
A. Network
B. Application
C. Physical
D. Data Link
7. What layer converts data into Frames?
A. Application
B. Physical
C. Data Link
D. Transport
8. What layer converts data into bits?
A. Application
B. Session
C. Data Link
D. Physical
All of the layers need to convert data into something that they can pass down to the next level, with the exception of the Application layer which hands data to the Presentation layer.The Presentation layer encrypts, and compresses before sending it to the Session layer for it s first conversion.
9. Which layer is most concerned with getting data
from the beginning to the final destination?
A. Application
B. Presentation
C. Session
D. Transport
The transport layer is most concerned with reliable transportation from one end to the other.
10. Which of the following is not a part of the Session layer?
A. Establishing a session
B. Ensuring error free segments
C. Ending a session
D. Keeping the sender and receiver from sending a message at the same time That is the job of the Transport layer.
11. Which of the following is not a job for the presentation layer? Choose 2
A. Data representation
B. Compression
C. Dialog management
D. Transmission
E. Encryption
C is handled by the session layer, and D is handled by the Transport layer
12. What does Peer to Peer communication involve?
A. Each layer communication with the layer below it
B. Each layer communication with layer above it
C. Each layer communicating with adjacent layer in another system
D. Each layer communication with it s corresponding layer in another system
Answer D.
Answer C sounds correct also, but adjacent and corresponding are two different things. The session layer can only communicate with the session layer in another system for example.
13. Why does the industry use a layered model?
Choose all correct
A. When you enhance one layer it doesn t affect the other layers
B. Design and development can be made in a modular fashion
C. Network operations can be simplified
D. Troubleshooting can be simplified.
14. Which two of the following are not from the physical layer?
A. SDLC
B. V.35
C. HSSI
D. ISDN
E. RS-232
Answer A D.SDLC and ISDN are WAN protocols that function at the data link layer
15. Which two answers are functions of the OSI model"s network layer?
A. Sequencing of frames
B. Path determination
C. Packet switching
D. Packet sequencing
Answer B C. Sequencing is done at the data link layer. D is fictional.
16. What is an example of a MAC address?
A. Az32:6362:2434
B. Sj:2817:8288
C. GGG:354:665
D. A625:cbdf:6525
The address is a 48 bit address which requires 12 Hex digits.A hex digit can t be past the letter F. Hex stands for 16. 1-9 and A-F make up numbers that are valid.
17. Which of the following is not part of the data link layer?
A. Transports data across the physical link
B. Performs physical addressing
C. Performs flow control
D. Determines network topology
E. Terminates a session
This is part of the session layer
18. Which of the following are data link protocols?
A. HDLC
B. FTP
C. SQL
D. ISDN
E. Token Ring
FTP is an application and SQL is a session layer protocol.
19. Of the following address AA77:3827:EF54, which of the following is the vendor portion?
A. AA7738
B. 27EF54
C. AA77
D. EF54
The vendor code is how you can tell who made the card. The last 6 digits are the physical address.
20. Which of the following are examples of layer 3 addressing?
A. 165.33.4.34
B. AA77:3827:EF54
C. HHHH:hg:7654
D. 76
The first is a TCPIP address and the second is an IPX address
21. What is considered Layer 3 addressing?
A. Data Link Layer
B. Network Layer
C. Application Layer
D. None of these
Physical is Layer 1, then data link, and then Network. This is the same layer that routers are on.
22. What layer are Bridges on?
A. Data Link
B. Physical
C. Application
D. Transport
Bridges segment networks but are not able to determine addresses like the network layer does.
23. Repeaters are on what layer?
A. Transport
B. Session
C. Physical
D. Application
All repeaters can do is boost a signal. An active hub is a good example of a repeater. A switching hub is a good example of layer 3 addressing, since switches go by network addresses and IPX addresses rather than just boost signals. Bridges can only read mac addresses, and not the full IPX or TCPIP addresses.
24. Which of the following are considered routing protocols?
A. OSPF
B. IP
C. IPX
D. EIGRP
E. Token Ring
Answers B and C are routed protocols, whereas A and D are the protocols that do the routing. This is easily confused. You can remember it by thinking that the routing protocols that haul the routed protocols are like a tug ship pulling a barge. The barge is full of data.
25. Which two of the following are considered connection oriented communication?
A. Setup and maintenance procedures are performed to ensure message delievery
B. A physical circuit exists between two communicating devices
C. It is a best effort type of communication
D. A virtual connection exists between the two
B is not a necessity, and C is not accurate. TCP is connection oriented and UDP is not
26. Which of the following are not WAN protocols? Choose 2
A. Frame Relay
B. ATM
C. Ethernet
D. FDDI
E. ISDN
Ethernet and FDDI are LAN protocols.
27. Which of the following will allow you to view NVRAM s contents?
A. show configuration
B. show protocols
C. show version
D. show running-config
E. show startup-config
Answer A E. These show the backup configuration stored in NVRAM. The other anwsers allow youto view RAM.
28. Which of the following contains the OS image?
A. Flash
B. NVRAM
C. RAM
D. Interfaces
ROM will be used if Flash is unavailable. NVRAM is the backup configuration, and RAM is the active configuration
29. Which of the following indicates the router is in privilege mode?
A. Router#
B. Router>
C. Router-
D. Router* Answer B shows the router in user mode.
30. What does "show cdp neighbors" not show? Neighbors_________
A. device id
B. hardware platform
C. ios version
D. port type and number
31. Which of the following will show you the clock?
A. cl?
B. Cl ?
C. Clock?
D. Clock ?
By typing this the router will finish the command and show the clock.
32. CDP operates at which layer?
A. Transport
B. Network
C. Data link
D. Physical
CDP allows a network device to exchange frames with other directly connected networked devices.
33. Which command does not show two devices are not routing packets between them successfully?
A. ping
B. show interface
C. trace
D. telnet
Answer A C D. With these commands you can tell whether or not you have communication. Show interface just verifies there is a connection
34. What keystrokes shows the possible commands in privilege mode?
A. help
B. h
C. ctrl+h
D. ?
Answers A and B will give a brief description when typed, and C is not valid.
35. Which two items contain versions of the router s configuration file?
A. flash
B. nvram
C. ram
D. rom
A and D contain the OS.
36. Which of the following commands will allow you to review the contents of RAM?
A. show configuration
B. show protocols
C. show version
D. show running-config
E. show startup-config
A and E allow you to see NVRAM.
37. Which of the following will allow you to add, modify, or delete commands in the startup configuration file?
A. show startup-config
B. show running-config
C. configure terminal
D. configure memory
Answer C allows you to change items in the running configuration file
38. Which command would be used to restore a configuration file to RAM? ________TFTP running-config
A. router#copy
B. router>copy
C. router*copy
D. router^copy
You must be in privilege mode when executing this, which is why you see the # sign.
39. Which of the following commands will display the running configuration file to a terminal?
A. show running-config
B. show router-config
C. router#show flash
D. router>show version
It can only be shown in privilege mode.
40. If you need to copy the currently executing configuration file into NVRAM,which command would you use?
A. router#copy startup-config running-config
B. router#copy startup-config TFTP
C. router#copy running-config startup-config
D. router>copy startup-config running-config
Answers ABC show that the router is in privilege mode which is necessary to complete this action, but only C shows the correct syntax.