The following devices that work at the data link layer of the OSI reference model are______.
- A . WAN switch
- B . Router
- C . Repeater
- D . Hub
During the establishment process of the TCP connection as shown in the figure, the Z part in SYN should be filled with ________.
- A . a
- B . b.
- C . a+1
- D . b+1
The control protocol port used by FTP by default is ______.
- A . 20
- B . 21
- C . 23
- D . 22
Use the ______ command to specify the operating system software to be used for next startup.
- A . startup
- B . boot-loader
- C . bootfile
- D . boot startup
Normally, routers will fragment packets whose length is greater than the interface MTU. In order to detect the line MTU, you can ping the destination address with the ______ parameter.
- A . -a
- B . -d
- C . -f
- D . -c
If a port running STP in an Ethernet switch does not receive or forward data, receives and sends BPDUs, and does not perform address learning, then the port should be in the ______ state.
- A . Blocking
- B . Listening
- C . Learning
- D . Forwarding
- E . Waiting
- F . Disable
The command to configure the bridge priority of the switch SWA to 0 is ______.
- A . [SWA] stp priority 0
- B . [SWA-Ethernet1/0/1] stp priority 0
- C . [SWA] stp root priority 0
- D . [SWA-Ethernet1/0/1] stp root priority 0
The IP address 10.0.10.32 and the mask 255.255.255.224 represent a ______.
- A . Host address
- B . Network address
- C . Broadcast address
- D . None of the above is correct
The subnet mask of IP address 132.119.100.200 is 255.255.255.240, then the broadcast address of the subnet where it is located is ______.
- A . 132.119.100.207
- B . 132.119.100.255
- C . 132.119.100.193
- D . 132.119.100.223
The well-known port number of the transport layer used by TFTP is ______.
- A . 67
- B . 68
- C . 69
- D . 53
In Windows operating system, which command can display ARP entry information?
- A . display arp
- B . arp-a
- C . arp -d
- D . show arp
Two empty-configured MSR routers are connected as shown in the figure. By configuring IP addresses, the GE0/0 interfaces of the two routers can communicate with each other. Now add the following configurations to the two routers:
RTA:
[RTA]ospf
[RTA-ospf-1] area 0
[RTA-ospf-1-area-0.0.0.0] network 192.168.1.1 0.0.0.3
[RTA-GigabitEthernet0/0] ospf dr-priority 2
RTB:
[RTB]ospf
[RTB-ospf-1] area 0
[RTB-ospf-1-area-0.0.0.0] network 192.168.1.1 0.0.0.3
[RTB-GigabitEthernet0/0] ospf dr-priority
Then after the OSPF neighbor status is stable, ______.
- A . The OSPF interface priorities are the same, and OSPF DR election is not performed on the 192.168.1.0/30 network segment.
- B . Of the two routers, one is DR and the other is BDR.
- C . Of the two routers, one is DR and the other is DRother.
- D . The neighbor status of the two routers is FULL and 2-Way respectively.
In the network environment as shown in the figure, perform the following NAT configuration on RTA:
[RTA]acl number 2000
[RTA-acl-basic-2000] rule 0 permit source 10.0.0.0 0.0.0.255
[RTA-acl-basic-2000] nat address-group 1 200.76.28.11 200.76.28.11
[RTA]interface Ethernet0/1
[RTA-Ethernet0/1] nat outbound 2000 address-group 1
After configuration, both Client_A and Client_B are accessing the Server, so the NAT table of RTA may be ______ at this time.
- A . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
VPN: 0, status: NOPAT, TTL: 00:01:00, Left: 00:00:59
1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51 - B . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
1 200.76.28.12 12288 100.0.0.2 512 200.76.29.4 512
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51 - C . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
1 200.76.28.12 12289 100.0.0.1 1024 200.76.29.4 1024
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51 - D . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51
In the network environment as shown in the figure, two routers are connected back-to-back through serial ports. The rate of the interconnection link must be set to 2Mbps. Which of the following statement below is correct?
- A . It is necessary to confirm that the interface type and cable meet the V.24 regulations
- B . Use the baudrate 2048000 command to configure the synchronization port of RTA.
- C . Use the baudrate 2048000 command to configure the RTB synchronization port.
- D . Use the virtual-baudrate 2048000 command to configure the synchronization port of RTB.
- E . Use the bandrate2048000 command to configure the synchronization port of RTA, and use the virtual-baudrate2048000 command to configure the synchronization port of RTB.
When configuring ISDN DCC, the customer configured the following dialer-rule on his MSR router:
[MSR] dialer-rule 1 acl 3000. So which of the following statements about this configuration are correct?
- A . Only data packets matching ACL3000 can trigger dial-up
- B . Only data packets matching ACL3000 will be sent by the router through the dial-up link
- C . There is no permit or deny defined, and the configuration is wrong.
- D . The correct configuration should be: [MSR] dialer-rule 1 acl 3000 permit
The hub works on ______ of the OSI reference model.
- A . Physical layer
- B . Data link layer
- C . Network layer
- D . Transport layer
The device that implements network interconnection at the network layer is ______.
- A . Router
- B . Switch
- C . Hub
- D . Repeater
In the Open Systems Interconnection reference model (OSI), ______ transmits data streams in the form of frames.
- A . Network layer
- B . Session layer
- C . Transport layer
- D . Data link layer
Which of the following statement about the OSI reference model is correct?
- A . The data at the transport layer is called a frame (Frame)
- B . The data at the network layer is called a segment (Segment)
- C . The data at the data link layer is called a packet (Packet)
- D . The data in the physical layer is called bit (Bit)
The main function of the physical layer of the OSI reference model is ______.
- A . Physical address definition
- B . Establish an end-to-end connection
- C . Transmitting bit streams between terminal devices, defining voltage, interface, cable standard and transmission distance, etc.
- D . Transfer data from one host to another
Configure a static route on the router. It is known that the destination address is 192.168.1.0, the mask is 20 bits, the outbound interface is GigabitEthernet0/0, and the outbound interface IP address is 10.10.202.1. Which of the following configurations are correct?
- A . ip route-static 192.168.1.0 255.255.240.0 GigabitEthernet0/0
- B . ip route-static 192.168.1.0 255.255.248.0 10.10.202.1
- C . ip route-static 192.168.1.0 255.255.240.0 10.10.202.1
- D . ip route-static 192.168.1.0 255.255.248.0 GigabitEthernet0/0
The IP protocol corresponds to layer ______ of the OSI reference model.
- A . 5
- B . 3
- C . 2
- D . 1
In the OSI reference model, the function of the network layer is mainly ______.
- A . Transmit the original bit stream on the channel
- B . Ensure that each piece of information reaching the other party is correct
- C . Determine how data packets are routed from source to destination
- D . Strengthen the function of transmitting raw bit streams of physical layer data and perform traffic control
Data segmentation is done in ______ in the OSI reference model.
- A . Physical layer
- B . Network layer
- C . Transport layer
- D . Access layer
Providing end-to-end reliable data transmission and flow control is the ______ of the OSI reference model.
- A . Presentation layer
- B . Network layer
- C . Transport layer
- D . Session layer
In the OSI reference model, encryption is a function of ______.
- A . Physical layer
- B . Transport layer
- C . Session layer
- D . Presentation layer
TCP belongs to ______ of the OSI reference model.
- A . Network layer
- B . Transport layer
- C . Session layer
- D . Presentation layer
UDP belongs to ______ of the OSI reference model.
- A . Network layer
- B . Transport layer
- C . Session layer
- D . Presentation layer
SPX belongs to ______ of the OSI reference model.
- A . Network layer
- B . Transport layer
- C . Session layer
- D . Presentation layer
DNS works on ______ of the OSI reference model.
- A . Network layer
- B . Transport layer
- C . Session layer
- D . Application layer
Use an Ethernet cable to connect the two switches. The MDI type of the interconnection port is configured as across, so the Ethernet cable should be ________.
- A . Only crossover network cables can be used
- B . Only direct network cables can be used
- C . Both parallel network cables and crossover network cables are acceptable
- D . Neither parallel network cables nor crossover network cables are allowed.
The standard physical medium of 100BASE-TX is ______.
- A . Thick coaxial cable
- B . Thin coaxial cable
- C . Category 3 twisted pair
- D . Category 5 twisted pair
- E . Optical fiber
802.11b protocol defines 14 channels in the 2.4GHz frequency band, and adjacent channels overlap in the spectrum. In order to maximize the use of frequency band resources, which of the following sets of channels can be used for wireless coverage?
- A . 1, 5, 9
- B . 1, 6, 11
- C . 2, 6, 10
- D . 3, 6, 9
802.11b protocol defines 14 channels in the 2.4GHz frequency band, and adjacent channels overlap in the spectrum. In order to maximize the use of frequency band resources, which of the following sets of channels can be used for wireless coverage?
- A . 1, 5, 9
- B . 1, 6, 10
- C . 2, 7, 12
- D . 3, 6, 9
There are many types of WAN interfaces, which of the following description of WAN interfaces is incorrect?
- A . V24 protocol interface can work in both synchronous and asynchronous modes. In the asynchronous mode, the link layer uses PPP encapsulation.
- B . V35 protocol interface can work in both synchronous and asynchronous modes. In the asynchronous mode, the link layer uses PPP encapsulation.
- C . The BRI/PRI interface is used for ISDN access. The default link encapsulation is PPP.
- D . G.703 interface provides high-speed data synchronization communication services.
ping is actually an application developed based on ______ protocol.
- A . ICMP
- B . IP
- C . TCP
- D . UDP
IP address 203.108.2.110 is ______ address.
- A . Class A
- B . Class B
- C . Class C
- D . Class D
IP address 133.18.2.110 is ______ address.
- A . Class A
- B . Class B
- C . Class C
- D . Class D
When the source host pings the destination device, if the network is working normally, the destination device will respond with an ICMP______ message to the source host after receiving the message.
- A . Echo Request
- B . Echo Reply
- C . TTL-Exceeded
- D . Port-Unreachable
Which of the following options describes parameters that uniquely determine a TCP connection?
- A . Source port number, source IP address
- B . Destination port number, destination IP address
- C . Source port number, destination port number
- D . Source MAC address, destination MAC address
- E . None of the above is correct
TCP protocol distinguishes different connections through ______.
- A . Port number
- B . Port number and IP address
- C . Port number and MAC address
- D . IP address and MAC address
During the establishment process of the TCP connection as shown in the figure, the X part in SYN should be filled with ________.
- A . a
- B . b
- C . a+1
- D . b+1
During the establishment process of the TCP connection as shown in the figure, the Y part in SYN should be filled with ________.
- A . a
- B . b
- C . a+1
- D . b+1
During the teardown process of the TCP connection as shown in the figure, the X part in the ACK should be filled with ______.
- A . p
- B . q
- C . p+1
- D . q+1
During the teardown process of the TCP connection as shown in the figure, the Y part in FIN should be filled in with ______.
- A . p
- B . q
- C . p+1
- D . q+1
Configure the MSR router that has just left the factory without configuration through the console port. The serial port baud rate of the terminal should be set to _____.
- A . 9600
- B . 2400
- C . 115200
- D . 38400
Which of the following description of VTY features in H3C equipment is correct?
- A . Only used for Telnet to the device
- B . Each device can support simultaneous access by multiple VTY users
- C . Each VTY user corresponds to a physical interface
- D . Passwordless verification is not supported
SSH uses the TCP port number ______ by default.
- A . 20
- B . 21
- C . 22
- D . 23
If you need to configure the IP address of the Ethernet port on the MSR, you should configure it under ______.
- A . System view
- B . User view
- C . Interface view
- D . Routing protocol view
Which of the following description of the startup process of the router system is correct?
- A . Memory detection——start bootrom——application decompression——-application loading
- B . Start bootrom——memory detection——application loading
- C . Application decompression——Application loading——Start bootrom——Memory detection
- D . Memory detection——application decompression——application loading
If you want to upgrade the router but do not have a network cable, you can use the configuration cable and use the ______ protocol to upgrade through the Hyper Terminal.
- A . TFTP
- B . Xmodem
- C . Ymodem
- D . Zmodem
On MSR routers , configuration files are files saved in ______ format.
- A . Batch file
- B . Text file
- C . Executable file
- D . Database files
If the user-specified configuration file does not exist, the router is initialized with _____.
- A . Default configuration
- B . Last saved configuration
- C . The most used configuration
- D . Use minimal configuration
The default data transmission port used by FTP is ______.
- A . 20
- B . 21
- C . 23
- D . 22
FTP protocol is a protocol based on ______.
- A . UDP
- B . TCP
- C . IPX
- D . SSH
TFTP protocol is a protocol based on ______.
- A . UDP
- B . TCP
- C . IPX
- D . SSH
Use the ______ command on the MSR router to turn off the information center function.
- A . info-center disable
- B . undo info-center enable
- C . disable info-center
- D . undo info-center
On the MSR router, if you want to modify some configurations after logging in to the device with access level, you can use the ______ command to switch to level 3.
- A . super
- B . level 3
- C . password
- D . login
When viewing the configuration, if there are too many configuration commands to be displayed on one screen, you can press ______ to display the next page after one screen is displayed.
- A . <Ctrl+c> keys
- B . <Enter> key
- C . <Ctrl+p> keys
- D . <Space> key
On the MSR router, by default, the configuration file is suffixed with ______.
- A . .bin
- B . .sys
- C . .txt
- D . .cfg
Use the ______ command on the MSR series router to display the current path of the file system.
- A . dir
- B . pwd
- C . path
- D . current-path
In the command line, if the user wants to return to the previous view from the current view, he should use ______.
- A . return command
- B . quit command
- C . <Ctrl+z> key
- D . <Ctrl+c> key
Users can use the ______ command to view historical commands.
- A . display history-cli
- B . display history-area
- C . display history-command
- D . display history-cache
On the MSR router, type the first few letters of a keyword in the command and press ______ to complete the command.
- A . <Esc> key
- B . <Space> key
- C . <Enter> key
- D . <Tab> key
On the MSR router, if a certain file has been set as a startup file, you can use the ______ command to check whether the setting is correct.
- A . display boot
- B . display begin
- C . display startup
- D . display start-configuration
On the MSR router, if you want to download files from the FTP Server, you should use the ______ command in the FTP command.
- A . get
- B . put
- C . download
- D . load
On the MSR router, once the system time is inaccurate, you can use the ______ command to adjust the system time.
- A . time
- B . clock
- C . clock datetime
- D . set datetime
On the MSR router, use the ______ command to view the current running version of the device.
- A . display running
- B . display software
- C . display version
- D . display current-version
On the MSR router, each functional module has its corresponding information display command. Generally, to view the running information of each functional module, you need to run the corresponding display commands one by one. In order to collect more information at one time and facilitate daily maintenance or problem location, you can execute the ______ command in any view to display the statistical information about the current operation of each major functional module of the system.
- A . display all
- B . display ip interface
- C . display system-information
- D . display diagnostic-information
During system startup, type ______ according to the prompts, and the system will interrupt booting and enter BootROM mode.
- A . <Ctrl+a>
- B . <Ctrl+b>
- C . <Ctrl+z>
- D . <Ctrl+c>
On the MSR router, when you use the delete command without parameters to delete files, the deleted files will be saved in ______.
- A . RAM
- B . ROM
- C . Memory
- D . Recycle-bin
On the MSR router, if you want to completely delete a discarded file in the Recycle Bin, you can execute the ______ command.
- A . clear trash
- B . reset recycle-bin
- C . clear all
- D . reset trash-bin
On the MSR router, if you want to view the files in the recycle bin, you can use the ______ command.
- A . dir recycle-bin
- B . dir trash
- C . dir /all
- D . dir all-file
On the MSR router , the -t parameter of the ping command specifies the timeout time of the ICMPEchoReply message . The value range is 1 ~ 65535, and the unit is milliseconds . Its default value is ______ milliseconds.
- A . 200
- B . 100
- C . 2000
- D . 1000
On the MSR router , the -m parameter of the ping command specifies the time interval for sending ICMPEchoRequest messages . The value range is 1 ~ 65535, in milliseconds . Its default value is ______ milliseconds.
- A . 1000
- B . 100
- C . 200
- D . 2000
There are two hops from the source device to the destination device. Use the tracert command to detect the path. When detecting the first hop, the source device sends a UDP packet with a TTL of 1 to a larger port of the destination device. When the packet reaches the intermediate hop, the TTL will change to 0, so the device sends a message to the source device. Respond to an ICMP______ message.
- A . Time Exceeded
- B . Echo Request
- C . Echo Reply
- D . Port Unreachable
There are two hops from the source device to the destination device. Use the tracert command to detect the path. When detecting the first hop, the source device sends a UDP packet with a TTL of 1 to the intermediate hop; when detecting the second hop, the source device sends a UDP packet with a TTL of 2. The packet reaches the intermediate hop first, and the TTL decreases. is 1. When the packet reaches the destination, the TTL will be decremented to 0. At this time, the destination device will send an ICMP______ message to the source to inform the source device that it has tracked the destination address.
- A . Time Exceeded
- B . Echo Request
- C . Echo Reply
- D . Port Unreachable
On the MSR router, the -tos parameter of the ping command specifies the ToS (Type of Service, service type) field value in the ICMPEchoRequest message. The value range is 0~255, and the default value is ______.
- A . 46
- B . 0
- C . 63
- D . 2
After turning on debugging, you can use the ______ command to turn off debugging.
- A . no debugging all
- B . undo debugging all
- C . undo terminal monitor
- D . undo terminal debugging
When using the ping command on the MSR router, you can use the ______ parameter to set the length of the ICMP message sent.
- A . -n
- B . -c
- C . -b
- D . -s
On the MSR router, if you want to specify the source address of the packet sent during the ping operation, you should use the ______ parameter.
- A . -s
- B . -i
- C . -a
- D . -d
The MSR router sent 5 packets by default during the last ping. If you want to specify the number of packets to send, you can use the ______ parameter.
- A . -n
- B . -d
- C . -s
- D . -c
After turning on the console’s system information monitoring function, use the ______ command to turn on the screen output of debugging information.
- A . terminal monitor
- B . terminal debugging
- C . terminal screen
- D . terminal information
The Layer 2 Ethernet switch searches for an entry in the MAC address table that matches the destination MAC address of the frame and forwards the frame out of the corresponding interface. If the search fails, the switch will ______.
- A . Drop the frame
- B . Send the frame out through all other ports except the incoming port
- C . Find the fast forward table
- D . Find the routing table
The MAC address table on a layer 2 switch is as shown in the figure. When the switch receives a frame with the destination MAC address 00-13-72-8E-4B-C1 from the E1/0/2 interface, the switch ______ the frame.
- A . Sent from the E1/0/1 interface
- B . Sent from the E1/0/2 interface
- C . Sent from the E1/0/3 interface
- D . Sent from the E1/0/4 interface
- E . Send out from all interfaces on the switch
- F . Discard directly
To configure Trunk on the link between Ethernet switches and allow the transmission of VLAN 10 and VLAN 20 information, ______ must be configured on the switch.
- A . [Switch-Ethernet0/1] port link-type trunk
- B . [Switch] port link-type trunk
- C . [Switch] port link-type access
- D . [Switch-Ethernet0/1] port trunk pvid 10
If a port of an Ethernet switch running STP does not receive or forward data, receives but does not send BPDUs, and does not perform address learning, then the port should be in the ______ state.
- A . Blocking
- B . Listening
- C . Learning
- D . Forwarding
- E . Waiting
- F . Disable
If a port running STP in an Ethernet switch receives and forwards data, receives, processes and sends BPDUs, and performs address learning, then the port should be in the ______ state.
- A . Blocking
- B . Listening
- C . Learning
- D . Forwarding
- E . Waiting
- F . Disable
In the switched network as shown in the figure, all switches have the STP protocol enabled. Based on the information in the figure, which switch will be selected as the root bridge?
- A . SWA
- B . SWB
- C . SWC
- D . Insufficient information to judge
In the switching network as shown in the figure, all switches have the STP protocol enabled. Based on the information in the figure, which switch will be selected as the root bridge?
- A . SWA
- B . SWB
- C . SWC
- D . Insufficient information to judge
In the switching network as shown in the figure, all switches have the STP protocol enabled.
Based on the information in the figure, which switch will be selected as the root bridge?
- A . SWA
- B . SWB
- C . SWC
- D . SWD
- E . Insufficient information to judge
In the switched network as shown in the figure, all switches have the STP protocol enabled.
Based on the information in the figure, which switch will be selected as the root bridge?
- A . SWA
- B . SWB
- C . SWC
- D . SWD
- E . Insufficient information to judge
In the switched network as shown in the figure, all switches have the STP protocol enabled. SWA was chosen as the root bridge.
According to the information in the figure, the ______ port should be set to the Blocking state. (select one or more)
- A . P1 of SWB
- B . P2 of SWB
- C . P1 of SWC
- D . P2 of SWC
- E . Insufficient information to judge
802.1x defines a port-based network access control protocol, and only defines the point-to-point connection method between access devices and access ports. The access port can only be a physical port.
- A . True
- B . False
Both VLAN technology and port isolation technology can achieve Layer 2 isolation of data.
- A . True
- B . False
A company purchased switches from two manufacturers, A and B, for network engineering implementation. Link aggregation technology needs to be used between switches from two vendors. After consulting the relevant documents, I learned that the switch of manufacturer A does not support the LACP protocol.
In this case, which of the following configuration methods are reasonable?
- A . One side configures static aggregation and the other side configures dynamic aggregation.
- B . One side configures static aggregation and the other side configures dynamic aggregation.
- C . Configure dynamic aggregation on both sides
- D . Configure static aggregation on both sides
- E . Unable to use link aggregation
According to user requirements, the administrator needs to configure the switch SWA port Ethernet1/0/1 as a Trunk port. Which of the following commands is the correct configuration command?
- A . [SWA] port link-type trunk
- B . [SWA-Ethernet1/0/1] port link-type trunk
- C . [SWA] undo port link-type access
- D . [SWA-Ethernet1/0/1] undo port link-type access
The port Ethernet1/0/1 of the switch SWA was originally an Access port type, and now it needs to be configured as a Hybrid port type. Which of the following commands is the correct configuration command?
- A . [SWA]port link-type hybrid
- B . [SWA-Ethernet1/0/1] port link-type hybrid
- C . [SWA]undo port link-type trunk
- D . [SWA-Ethernet1/0/1] undo port link-type trunk
The switch SWA port Gigabi Ethernet1/0/24 has been configured as a Trunk port type.
If you want to allow this port to allow VLAN2 and VLAN3 to pass, which of the following commands needs to be used?
- A . [SWA] port trunk permit vlan 2 3
- B . [SWA- Gigabi Ethernet1/0/24] port trunk permit vlan 2 3
- C . [SWA] undo port trunk permit vlan 1
- D . [SWA- Gigabi Ethernet1/0/24] undo port trunk permit vlan 2
If you want to check which VLANs currently exist on the switch , which of the following commands should be used ?
- A . [SWA]display vlan all
- B . [SWA]display vlan
- C . [SWA]display vlan 1
- D . [SWA]display vlan 2