1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?
A. 255.0.0.0
B. 255.255.0.0
C. 255.245.255.0
D. 255.255.255.0
E. 255.255.255.255
2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?
A. TCP
B. UDP
C. IP
D. ICMP
3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.192
D. 255.255.255.160
4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?
A. 172.16.12.33/28
B. 172.16.12.32/27
C. 172.16.12.33/27
D. 172.16.12.34/27
E. 172.16.12.35/28
F. 172.16.12.38/28
G. 172.16.12.63/27
5: The address 172.16.208.16/20 is a host address in which of the following subnets?
A. 172.16.176.0–255.255.240.0
B. 172.16.192.0–255.255.240.0
C. 172.16.208.0–255.255.240.0
D. 172.16.224.0–255.255.240.0
6: You are designing an IP address scheme for your brand new remote Office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?
A. One network with 254 hosts
B. Two networks with 128 hosts
C. Four networks with 64 hosts
D. Six networks with 30 hosts
8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)
A. 201.168.27.33
B. 201.168.27.112
C. 201.168.27.119
D. 201.168.27.126
E. 201.168.27.175
F. 201.168.27.208
9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1
10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?
A. TCP
B. IP
C. UDP
D. IPX
E. Frame relay
11: Which of the following protocols is connection-oriented?
A. TCP
B. IP
C. IPX
D. Frame relay
12: You are using an application on your windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?
A. TCP
B. IP
C. UDP
D. SPX
E. AppleTalk
13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.
A. MTU adjustment
B. Windowing
C. Flexible Send Path
D. FCS
14: If the destination did not receive a segment, how will the TCP host know to resend the information?
A. The ACK received will not include the segment number that was not received.
B. The ACK received will include the segment number that was not received.
C. The sending host will send a PACK to verify segment receipt.
D. The destination host will send a YACK message back to the sending host.
15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)
A. 10.23.45.67
B. 126.21.34.56
C. 172.16.32.1
D. 172.31.234.55
E. 192.169.4.5
17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?
Department
Number of Users
Corporate
7
Customer Support
15
Financial
13
HR
7
Engineering
16
A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?
A. UDP
B. TCP
C. SNMP
D. ICMP
19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)
A. MAC address resolution
B. Sequence numbers
C. Acknowledgments
D. Ping
E. Routing updates
20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?
A. Increased throughput
B. Decreased throughput
C. Increased latency
D. Decreased reliability
21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.224
E. 255.255.255.240
F. 255.255.255.248
22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?
A. ARP
B. RARP
C. SLARP
D. DHCP
23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him?
A. The host's default gateway is down.
B. The destination host is not powered on.
C. The IP address of the router interface is incorrect.
D. The IP address of the switch to which the destination host connects is incorrect.
E. The host is in a different subnet.
24: Which of the following classes of IP addresses is utilized for multicasting?
A. Class A
B. Class B
C. Class C
D. Class D
25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs aSKINg what the /26 means next to the IP addresses. You tell her:
A. It represents the number of hosts possible on that subnetwork.
B. It represents the number of subnetworks that are being used.
C. It represents the class of IP address being used.
D. It represents the number of bits in the subnet mask that are 1.
26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240
27: Which of the following would a Class A network be assigned to?
A. Government agency
B. Small-to-medium sized corporation
C. SOHO
D. An individual
28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)
A. 192.168.5.95
B. 192.168.5.100
C. 192.168.5.128
D. 192.168.5.110
29: Which of the following IP addresses is not a public IP address that can be routed over the Internet?
A. 2.3.4.5
B. 11.12.13.14
C. 165.23.224.2
D. 172.31.45.34
E. 203.33.45.22
30: You are given a Class B network. What is the default subnet mask assigned to the Class B network?
A. 255.255.255.255
B. 255.255.0.0
C. 255.224.0.0
D. 0.0.0.0
31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following eXPlains the router's refusal to take the IP address?
A. Class C addresses cannot be assigned to Ethernet interfaces.
B. The /27 is an invalid mask.
C. It is a broadcast address.
D. It is a public IP address.
E. It is a private IP address.
32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?
A. 255.255.255.254
B. 255.255.254.0
C. 255.255.240.254
D. 255.255.0.0
33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of 255.255.255.248?
A. 192.168.2.24/192.168.2.31
B. 192.168.2.32/192.168.2.39
C. 192.168.2.40/192.168.2.47
D. 192.168.2.48/192.168.2.55
E. 192.168.2.56/192.168.2.63
34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?
A. 218
B. 219
C. 220
D. 221
E. 222
35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?
A. 75
B. 83
C. 90
D. 97
36: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?
A. 198
B. 214
C. 252
D. 255
37: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?
A. 182
B. 192
C. 202
D. 212
38: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)
A. 15.234.118.63
B. 92.11.178.93
C. 134.178.18.56
D. 192.168.16.87
E. 201.45.116.159
F. 217.63.12.192
39: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?
A. 62 networks and 2 hosts
B. 6 networks and 30 hosts
C. 8 networks and 32 hosts
D. 16 networks and 16 hosts
E. 16 networks and 14 hosts
QQread.com
推出各大专业服务器评测 Linux服务器的安全性能
SUN服务器
HP服务器
DELL服务器
IBM服务器
联想服务器
浪潮服务器
曙光服务器
同方服务器
华硕服务器
宝德服务器
40: What is a disadvantage of using a connection-oriented protocol sUCh as TCP?
A. Packet acknowledgment might add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss or duplication of data packets is more likely to occur.
D. The application layer must assume responsibility for the correct sequencing of the data packets.
41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?
A. 62 networks and 2 hosts
B. 6 networks and 30 hosts
C. 8 networks and 32 hosts
D. 16 networks and 16 hosts
E. 14 networks and 14 hosts
42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)
A. 165.203.2.0
B. 165.203.5.192
C. 165.203.6.63
D. 165.203.6.191
E. 165.203.8.255
43: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)
A. 192.168.32.33
B. 192.168.32.112
C. 192.168.32.119
D. 192.168.32.126
E. 192.168.32.175
F. 192.168.32.208
44: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?
A. 198.57.78.33
B. 198.57.78.64
C. 198.57.78.97
D. 198.57.78.97
E. 198.57.78.159
F. 198.57.78.254
45: What is the subnetwork address for a host with IP address 165.100.5.68/28?
A. 165.100.5.0
B. 165.100.5.32
C. 165.100.5.64
D. 165.100.5.65
E. 165.100.5.31
F. 165.100.5.1
46: Your boss wants to know what TCP stands for. What do you tell him?
A. Transmission Check Protocol
B. Transport Check Protocol
C. Transmission Control Protocol
D. Transport Control Protocol
47: Your boss wants to know what UDP stands for. What do you tell him?
A. Unreliable Data Protocol
B. Unreliable Data Program
C. User-Defined Protocol
D. User Datagram Protocol
48: Which of the following statements accurately describes UDP?
A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).
B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.
C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.
D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP).
49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)
A. 10.20.12.64
B. 172.16.32.129
C. 172.64.32.34
D. 192.168.23.252
E. 196.104.12.95
F. 214.192.48.254
50: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)
A. Assign a public IP address.
B. Use the shutdown command.
C. Use the no shutdown command.
D. Make sure the interface is running in full-duplex.