这是我学习过程中遇见的ccna试题,中文一份,英文一份,很经典呀。
1 技术人员需要为某幢已经布设有线以太网络的大厦提供无线连接。
哪三个因素会影响需要的接入点数目?(选择三项。
)大厦的规模大厦中实体内墙的数目多个办公室中有微波炉无线网络中使用的加密方法Windows 和Appletalk 操作系统的同时使用AP 中短波或红外线的使用2 下列关于无线网桥的陈述,哪一项是正确的?通过无线链路连接两个网络连接无线局域网的固定设备允许无线客户端连接到有线网络增强无线信号的强度3 接入点默认使用哪一类身份验证?开放式PSKWEPEAP4请参见图示。
在Linksys 集成路由器的Wireless 菜单选项中,Network Mode 选项Mixed 是什么意思?路由器支持加密和身份验证。
路由器支持有线和无线两种连接。
路由器支持802.11b、802.11g 和802.11n 设备。
路由器支持通过红外和无线电射频连接。
5 接入点可以使用哪两种身份验证方法?(选择两项。
)WEPWPAEAPASCII预共享密钥6 哪项接入点功能允许网络管理员定义可以进入无线网络的数据类型?加密黑客攻击拦截通信过滤MAC 地址过滤身份验证7 下列关于服务集标识符(SSID) 的陈述中,哪两个是正确的?(选择两项。
)标识无线设备所属的WLAN是一个包含32 个字符的字符串,不区分大小写负责确定信号强度同一WLAN 中的所有无线设备必须具有相同的SSID用于加密通过无线网络发送的数据8请参见图示。
在Linksys 集成路由器的Wireless 菜单中,哪个配置选项可用于让附近的客户端知道接入点的存在。
Network ModeNetwork Name (SSID)Radio BandWide ChannelStandard ChannelSSID Broadcast9 下列哪个术语准确描述了为防止黑客读取截取到的数据而进行的无线数据编码?地址过滤身份验证广播加密密码短语编码10 两种WEP 密钥长度分别是多少?(选择两项。
)8 位16 位32 位64 位128 位11 使用开放式身份验证与使用预共享密钥有何差异?开放式身份验证需要密码。
预共享密钥不需要密码。
开放式身份验证用于无线网络。
预共享密钥用于有线网络。
预共享密钥需要加密的密码。
开放式身份验证不需要加密密码。
预共享密钥需要将MAC 地址编程到接入点中。
开放式身份验证不需要这种编程。
12 下列关于在接入点上启用开放式身份验证的陈述,哪一项是正确的?不需要身份验证使用64 位加密算法需要使用身份验证服务器需要共同商定的密码13 Wi-Fi 徽标对无线设备意味着什么?该设备已通过IEEE 认证。
该设备能够与所有其它无线标准交互操作。
该设备能够与其它符合Wi-Fi 标准并贴有Wi-Fi 徽标的其它设备交互操作。
该设备与所有以前的无线标准后向兼容。
14 下列哪两项陈述说明了无线网络安全的特征?(选择两项。
)无线网络提供的安全功能与有线网络相同。
驾驶攻击增强了无线网络的安全性。
禁用SSID 广播后,攻击者必须知道SSID 才能连接。
在接入点上使用默认IP 地址使黑客攻击更容易。
攻击者需要物理接触至少一台网络设备才能发动攻击。
15 与有线技术相比,无线技术有哪三大优势?(选择三项。
)更安全范围更大连接不受时间和地点限制安装简单、经济许可空间的使用很方便便于增加设备16 下列关于无线对等网络的陈述,哪一项是正确的?由点对点网络的无线客户端互联组成由无线客户端与一个中央接入点互联组成由多个无线基本服务集通过分布系统互联组成由无线客户端通过ISR 与有线网络互联组成17 完成以下句子:WEP 用于______,而EAP 则用于在无线网络中_____。
加密;验证用户身份过滤通信量;选择工作频率识别无线网络;压缩数据创建最小的无线网络;限制用户数量18 为什么安全性在无线网络中如此重要?无线网络的速度通常比有线网络慢。
电视及其它设备可能干扰无线信号。
无线网络采用了非常易于接入的介质来广播数据。
雷暴等环境因素可能影响无线网络。
19 无线网络与有线网络相比有哪两项优势?(选择两项)速度安全性移动性减少安装时间用户可以共享更多资源不易受到其它设备干扰20 为什么IEEE 802.11 无线技术传输的距离比蓝牙技术更远?传输的频率低得多功率输出更高传输的频率高得多使用更好的加密方法21 哪个WLAN 组件通常被称为STA?移动电话天线接入点无线网桥无线客户端Under what conditions does the router enter setup mode? (Choose three.)immediately after issuing the command Router#erase startafter issuing the command Router#setupduring the initial configuration of a routerafter deleting the backup configuration and reloading the routerafter deleting the running configuration2What information about the router and its startup process can be gathered from the output of the show version command?three.)the last restart methodthe command buffer contentsthe amount of NVRAM and FLASH usedthe configuration register settingsthe location from where the IOS loaded3Which tasks can be performed in the ROM monitor mode? (Choose two.)recover from system failurescreate startup configuration filesrecover from lost passwordsconfigure IP addresses on all router interfacesperform high level diagnostics4After the active IOS image has been loaded into RAM from flash memory, which commands could be used to display the fil active IOS? (Choose two.)Router# show IOSRouter# show flashRouter# show nvramRouter# show versionRouter# show startup-configRouter# show running-config5 Cisco IOS software is separated into two levels as a security feature. What are those two levels? (Choose two.)globalprivilegedlocaluserinterface6What does the command sh? return as output if issued at the Router# prompt?all show commands allowed in privileged modeall commands beginning with the letters shan incomplete command error messagean invalid command error message7Which tasks can be accomplished by using the command history feature? (Choose two.)View a list of commands entered in a previous session.Recall up to 15 command lines by default.Set the command history buffer size.Recall previously entered commands.Save command lines in a log file for future reference.8When the router output is being viewed through a terminal program, which statements are true regarding the --More-- prom bottom of the router display? (Choose two.)Press the Spacebar to display the next line.Press the Spacebar to view the next screen.Press the PgDn key to view the next screen.Press the Enter key to display the next line.Press the Enter key to view the next screen.9What is the default sequence for loading the configuration file?NVRAM, FLASH, ROMFLASH, TFTP,CONSOLENVRAM, TFTP, CONSOLEFLASH, TFTP, ROM10.Which connection method can be used to perform the initial configuration of a router?use a serial connection of a computer connected to the console port of a routertelnet to the router through a serial portuse a vty port through the Ethernet interfaceuse a modem connected to the AUX port of the router11Which keystrokes can be used to return to the privileged mode from the interface configuration mode?Ctrl-PCtrl-Shift-6, then XCtrl-ZEsc12Which command takes precedence if the commands enable password and enable secret are both configured on a rouenable passwordenable secretNeither. They are both enabled.Neither. They cancel each other out.13Which of the following identifies the correct items needed to initially configure a router?1) DB-9-to-RJ-45 on the PC's serial port2) a straight through cable3) the router's console port1) PC's Ethernet port2) a crossover cable3) the router's Ethernet port1) DB-9-to-RJ-45 on the PC's serial port2) a rollover cable3) the router's Ethernet port1) PC's Ethernet port2) a rollover cable3) the router's console port1) DB-9-to-RJ-45 on the PC's serial port2) a rollover cable3) the router's console port1) PC's Ethernet port2) a rollover cable3) the router's Ethernet port14.A network administrator needs to configure a router. Which of the following connection methods requires network functionalitaccessible?consoleAUXTelnetmodem15What baud rate needs to be configured on terminal emulation software to allow a connection to the console port of a route240048009600142003840016 What information does the name of the IOS file provide to the network administrator? (Choose three.)the amount of NVRAM required to run the imagethe hardware platform the image runs onthe various software platforms the image can run onspecial features and capabilities of the imagethe bandwidth supported by the IOSwhere the image executes from and if it has been compressed17Which of the following is the correct flow of routines for a router startup?load bootstrap, load IOS, apply configurationload bootstrap, apply configuration, load IOSload IOS, load bootstrap, apply configuration, check hardwarecheck hardware, apply configuration, load bootstrap, load IOS18Which of the following statements concerning router interface modes are correct? (Choose three.)User EXEC mode provides commands to monitor router operation.Privileged EXEC mode only provides commands to change or configure router operation.Password protected configuration modes can be accessed from either user EXEC or privileged EXEC modes.On a router with the name Core1, the prompt indicating privileged EXEC mode is Core1#.The command to enter privileged EXEC mode is Router# enable.A username and password may be required to enter privileged EXEC mode.19Which keystroke is used to move to the beginning of a command line?Ctrl-ACtrl-BEsc-AEsc-BCtrl-CCtrl-Z。