首页计算机思科认证思科640-802 > 思科认证640-802模拟试卷27
When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link? no VLANs all VLANs only VLANs 1 - 64 only the VLANs that are specified when creating the trunk
Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but has failed to configure routing properly. Which configuration will allow the hosts on the Branch LAN to access resources on the HQ LAN with the least impact on router processing and WAN bandwidth? [*] HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5 Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6 HQ(config)# router rip HQ(config-router)# network 192.168.2.0 HQ(config-router)# network 172.16.0.0 Branch(config)# router rip Branch (config-router)# network 192.168.1.0 Branch (config-router)# network 192.168.2.0 HQ(config)# router eigrp 56 HQ(config-router)# network 192.168.2.4 HQ(config-router)# network 172.16.25.0 Branch(config)# router eigrp 56 Branch (config-router)# network 192.168.1.0 Branch (config-router)# network 192.168.2.4 HQ(config)# router ospf 1 HQ(config-router)# network 192.168.2.4 0.0.0.3 area 0 HQ(config-router)# network 172.16.25.0 0.0.0.255 area 0 Branch(config)# router ospf 1 Branch (config-router)# network 192.168.1.0 0.0.0.255 area 0 Branch (config-router)# network 192.168.2.4 0.0.0.3 area 0
Refer to the exhibit. What is the purpose of the configuration that is shown? [*] to translate addresses of hosts on the fa0/0 and fa0/1 networks to a single public IP address for Internet access to translate the internal address of each host on fa0/0 and fa0/1 to a unique external IP address for Internet acces to provide security on fa0/0 and fa0/1 through the application of an access list to allow IP hosts on the Internet to initiate TCP/IP connections to hosts on fa0/0 and fa0/1
Refer to the exhibit. Explain how the routes in the table are being affected by the status change on interface Ethernet0. [*] The router is requesting updates for these networks from routers that are connected to interface Ethernet1. The router is poisoning the routes and broadcasting the new path costs via interface Ethernet1. The router is receiving updates about unreachable networks from routers that are connected to interface Ethernet1. The router is poisoning the routes and multicasting the new path costs via interface Ethernet1.
What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch? It creates a VLAN 999 interface. It designates VLAN 999 for untagged traffic. It blocks VLAN 999 traffic from passing on the trunk. It designates VLAN 999 as the default for all unknown tagged traffic.
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next? It checks the configuration register. It attempts to boot from a TFTP server. It loads the first image file in flash memory. It inspects the configuration file in NVRAM for boot instructions.
Refer to the exhibit. The show vtp status command is executed at a switch that is generating the exhibited output. Which statement is true for this switch? [*] The switch forwards its VLAN database to other switches in the ICND VTP domain. The configuration revision number increments each time the VLAN database is updated. The switch forwards VTP updates that are sent by other switches in the ICND domain. The VLAN database is updated when VTP information is received from other switches.
Why has the network shown in the exhibit failed to converge? [*] The no auto-summary command needs to be applied to the routers. The network numbers have not been properly configured on the routers. The subnet masks for the network numbers have not been properly configured. The autonomous system number has not been properly configured. The bandwidth values have not been properly configured on the serial interfaces.
Which of the following is true regarding the use of switches and hubs for network connectivity? Switches take less time to process frames than hubs take. Switches do not forward broadcasts. Hubs can filter frames. Using hubs can increase the amount of bandwidth available to hosts. Switches increase the number of collision domains in the network.
Which statement is correct about the internetwork shown in the diagram? [*] Switch 2 is the root bridge. Spanning Tree is not running. Host D and Server 1 are in the same network. No collisions can occur in traffic between Host B and Host C. If Fa0/0 is down on Router 1, Host A cannot access Server 1.
Refer to the exhibit. RIPv2 is in use on the network with no standard policy in place for summarization. A packet arrives at CentralRouter with a destination IP address of 208.149.23.91. Given the output that is shown, how will CentralRouter process that packet? [*] It will forward the packet to 190.171.23.10. It will forward the packet to 190.171.23.12. It will forward the packet to 192.168.33.1. It will hold the packet for 22 seconds. It will hold the packet for 21 seconds.
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network. The network administrator connected to router Coffee via the console port, issued the show ip route command, and was able to ping the server. Based on the output of the show ip route command and the topology shown in the graphic, what is the cause of the failure? [*] The network has not fully converged. IP routing is not enabled. A static route is configured incorrectly. The FastEthernet interface on Coffee is disabled. The neighbor relationship table is not correctly updated.
Refer to the exhibit. Which address and mask combination represents a summary of the routes learned by EIGRP? [*] 192.168.25.0 255.255.255.240 192.168.25.0 255.255.255.252 192.168.25.16 255.255.255.240 192.168.25.16 255.255.255.252 192.168.25.28 255.255.255.240
Refer to the exhibit. What IP address should be assigned to Workstation A? [*] 192.168.1.143/28 192.168.1.144/28 192.168.1.145/28 192.168.1.159/28 192.168.1.160/28
An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect? [*] access-list 10 permit 172.29.16.0 0.0.0.255 access-list 10 permit 172.29.16.0 0.0.1.255 access-list 10 permit 172.29.16.0 0.0.3.255 access-list 10 permit 172.29.16.0 0.0.15.255 access-list 10 permit 172.29.0.0 0.0.255.255
Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table? [*] 30 seconds 60 seconds 90 seconds 180 seconds 240 seconds
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? Switch1(config-if)# switchport port-security maximum 1 Switch1(config)# mac-address-table secure Switch1(config)# access-list 10 permit ip host Switch1(config-if)# switchport port-security violation shutdown Switch1(config-if)# ip access-group 10
Refer to the exhibit. A network associate has configured OSPF with the command: City(config-router)# network 192.168.12.64 0.0.0.63 area 0 After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? [*] FastEthernet0 /0 FastEthernet0 /1 Serial0/0 Serial0/1.102 Serial0/1.103
Which statements are true about EIGRP successor routes? A successor route is used by EIGRP to forward traffic to a destination. Successor routes are saved in the topology table to be used if the primary route fails. Successor routes are flagged as “active“ in the routing table. A successor route may be backed up by a feasible successor route. Successor routes are stored in the neighbor table following the discovery process.
Why does the data communication industry use the layered OSI reference model? It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers. It encourages industry standardization by defining what functions occur at each layer of the model. It provides a means by which changes in functionality in one layer require changes in other layers.

    相关试卷

    • 思科认证640-802模拟试卷29

    • 思科认证640-802模拟试卷28

    • 思科认证640-802模拟试卷27

    • 思科认证640-802模拟试卷26

    • 思科认证640-802模拟试卷25

    • 思科认证640-802模拟试卷24

    • 思科认证640-802模拟试卷23

    • 思科认证640-802模拟试卷22

    • 思科认证640-802模拟试卷21

    • 思科认证640-802模拟试卷20

    • 思科认证640-802模拟试卷19

    • 思科认证640-802模拟试卷18

    • 思科认证640-802模拟试卷17

    • 思科认证640-802模拟试卷16

    • 思科认证640-802模拟试卷15

    • 思科认证640-802模拟试卷14

    • 思科认证640-802模拟试卷13

    • 用Cisco控制器进行简单网络配置和监控、将独立AP转换为LWAPP练习试卷1

    • 无线网络概念、标准机构练习试卷1

    • 无线流量和AP发现、其他无线技术练习试卷1