hard ,如果na考试这么难,我不混了
What is the purpose behind the concept of "sliding windows," with regard to internetworking? <br><br>It allows the full bandwidth of the circuit to be utilized at all times, regardless of whether a particular application actually uses it. <br>What is the purpose of the ICMP Source Quench? <br><br>The source quench message informs the originating host that the gateway or receiving host is being overrun and can't keep up with the traffic. The originating host then lowers the rate at which it sends datagrams to the receiving host, until it stops receiving "source quench" messages. After some time, the originating host may then gradually increase the rate at which it sends out datagrams. <br><br>What are the two different types of routing protocols and how do they differ? <br><br>The two types of routing protocols are distance vector and link state. Routers employing distance vector types periodically send neighboring routers their entire routing table, which includes the distance, in hops, it takes to get to a destination network and what the next hop is to get to that destination. Distance vector routers build their routing tables based on updates gotten from neighboring routers. Link state routing protocols describe the network topology, including the "cost" of the route (bandwidth, congestion, hop count). These routers flood the network with any change in network topology, as opposed to passing it on to its neighbors only, so that all routers on the network receive the same information. <br>What is a bridge tap and how can it affect ISDN? <br><br>A bridge tap is now used as a generic term for any bit of grounded wire connected, whether accidentally or not, to an ISDN line. The tap steals voltage from the ISDN line, which can prevent a strong enough signal getting across to the NT1. The "bridge" portion is taken from the analog-only days when techs could split a signal to go to two different places with no noticible loss in signal strength. <br>When a frame relay circuit bursts over capacity, what happens to the bursted packets? <br><br>The bursted packets are marked Discard Eligible (DE). If there is sufficient bandwidth, the packets will go through; if not, they will be preferencially discarded.<br><br>Where is the operating system stored in a Cisco router, and where is the<br>startup-configuration file stored? <br><br>The operating system (IOS) is stored in flash memory; <br>the startup-configuration file is stored in NVRAM. <br><br>What is BONDing and what does it stand for? <br><br>BONDing stands for Bandwidth ON Demand INteroperability Group. This is the standard for inverse multiplexing that describes the four modes of inverse multiplexers available from different manufacturers to subdivide a wideband signal into multiple 56- or 64 Kbps channels, pass these individual channels over a switched digital network, and recombine them into a single high-speed signal at the receiving end. It is also the name of the consortium that developed this standard. <br><br>What is a MAC address? <br><br>MAC stands for Media Access Control. It is an address physically embedded in certain hardware (Network Interface Cards, for example) and used for layer 2 (data link) addressing in bridging and switching and in the data link portion of routing (e.g. figuring out the next hop toward thedestination).<br><br> <br>What can you infer from the Router(boot)> prompt? <br><br>There is no IOS stored in memory, the flash memory has been removed (or damaged), or the configuration register has been set to start up in boot mode<br><br>What will cause a router to boot to the ROM monitor? <br><br>The last bit of the configuration register must be set to 0<br><br><br>What is the difference between TACACS and Radius? <br><br>TACACS+ = Terminal Access Controller Access Control System <br>RADIUS = Remote Access Dial-In User Service <br><br>TACACS and RADIUS are two prominent security protocols used to control dial-up access into networks. Cisco created TACACS and Livingston Enterprise created RADIUS. <br><br>Differences: <br><br>1. RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over UDP. TCP offers a connection-oriented transport, while UDP offers best effort delivery. <br><br>2. RADIUS encrypts only the password in the access-request packet, from the client to the server and TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header. <br><br>3. RADIUS combines authentication and authorization, whereas TACACS+ uses the AAA architecture, which separates authentication, authorization, and accounting. <br><br>4. TACACS+ offers multiprotocol support and RADIUS does not support the following protocols: AppleTalk Remote Access (ARA) protocol, Net BIOS Frame Protocol Control protocol, Novell Asynchronous Services Interface (NASI) and X.25 PAD connection. <br><br>5. RADIUS does not allow users to control which commands can be executed on a router and which cannot; therefore, it is not as useful for router management or as flexible for terminal services. TACACS+ provides two ways to control the authorization of router commands on a per-user or per-group basis. The first way is to assign privilege levels to commands and have the router verify with the TACACS+ server whether or not the user is authorized at the specified privilege level. The second way is to explicitly specify in the TACACS+ server, on a per-user or per-group basis, the commands that are allowed. <br><br>6. RADIUS Standard does not guarantee interoperability and TACACS+ does. <br><br> 救命啊,怎么na又换题型了啊,想在家狠闷一个暑假的<br>换了,又怎么办啊 找胡大退钱 <br>以下这些绝对是CCNP-远程访问那门课的内容<br>你哪里找的,这些不是CCNA的题目。不过,练习一下挺好的。<br>--------------------------------------------------------------------------------<br> <br>What is the purpose behind the concept of "sliding windows," with regard to internetworking? <br><br>It allows the full bandwidth of the circuit to be utilized at all times, regardless of whether a particular application actually uses it. <br>What is the purpose of the ICMP Source Quench? <br><br>The source quench message informs the originating host that the gateway or receiving host is being overrun and can't keep up with the traffic. The originating host then lowers the rate at which it sends datagrams to the receiving host, until it stops receiving "source quench" messages. After some time, the originating host may then gradually increase the rate at which it sends out datagrams. <br><br>What are the two different types of routing protocols and how do they differ? <br><br>The two types of routing protocols are distance vector and link state. Routers employing distance vector types periodically send neighboring routers their entire routing table, which includes the distance, in hops, it takes to get to a destination network and what the next hop is to get to that destination. Distance vector routers build their routing tables based on updates gotten from neighboring routers. Link state routing protocols describe the network topology, including the "cost" of the route (bandwidth, congestion, hop count). These routers flood the network with any change in network topology, as opposed to passing it on to its neighbors only, so that all routers on the network receive the same information. <br>What is a bridge tap and how can it affect ISDN? <br><br>A bridge tap is now used as a generic term for any bit of grounded wire connected, whether accidentally or not, to an ISDN line. The tap steals voltage from the ISDN line, which can prevent a strong enough signal getting across to the NT1. The "bridge" portion is taken from the analog-only days when techs could split a signal to go to two different places with no noticible loss in signal strength. <br>When a frame relay circuit bursts over capacity, what happens to the bursted packets? <br><br>The bursted packets are marked Discard Eligible (DE). If there is sufficient bandwidth, the packets will go through; if not, they will be preferencially discarded.<br><br>Where is the operating system stored in a Cisco router, and where is the<br>startup-configuration file stored? <br><br>The operating system (IOS) is stored in flash memory; <br>the startup-configuration file is stored in NVRAM. <br><br>What is BONDing and what does it stand for? <br><br>BONDing stands for Bandwidth ON Demand INteroperability Group. This is the standard for inverse multiplexing that describes the four modes of inverse multiplexers available from different manufacturers to subdivide a wideband signal into multiple 56- or 64 Kbps channels, pass these individual channels over a switched digital network, and recombine them into a single high-speed signal at the receiving end. It is also the name of the consortium that developed this standard. <br><br>What is a MAC address? <br><br>MAC stands for Media Access Control. It is an address physically embedded in certain hardware (Network Interface Cards, for example) and used for layer 2 (data link) addressing in bridging and switching and in the data link portion of routing (e.g. figuring out the next hop toward thedestination).<br><br><br>What can you infer from the Router(boot)> prompt? <br><br>There is no IOS stored in memory, the flash memory has been removed (or damaged), or the configuration register has been set to start up in boot mode<br><br>What will cause a router to boot to the ROM monitor? <br><br>The last bit of the configuration register must be set to 0<br><br><br>What is the difference between TACACS and Radius? <br><br>TACACS+ = Terminal Access Controller Access Control System <br>RADIUS = Remote Access Dial-In User Service <br><br>TACACS and RADIUS are two prominent security protocols used to control dial-up access into networks. Cisco created TACACS and Livingston Enterprise created RADIUS. <br><br>Differences: <br><br>1. RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over UDP. TCP offers a connection-oriented transport, while UDP offers best effort delivery. <br><br>2. RADIUS encrypts only the password in the access-request packet, from the client to the server and TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header. <br><br>3. RADIUS combines authentication and authorization, whereas TACACS+ uses the AAA architecture, which separates authentication, authorization, and accounting. <br><br>4. TACACS+ offers multiprotocol support and RADIUS does not support the following protocols: AppleTalk Remote Access (ARA) protocol, Net BIOS Frame Protocol Control protocol, Novell Asynchronous Services Interface (NASI) and X.25 PAD connection. <br><br>5. RADIUS does not allow users to control which commands can be executed on a router and which cannot; therefore, it is not as useful for router management or as flexible for terminal services. TACACS+ provides two ways to control the authorization of router commands on a per-user or per-group basis. The first way is to assign privilege levels to commands and have the router verify with the TACACS+ server whether or not the user is authorized at the specified privilege level. The second way is to explicitly specify in the TACACS+ server, on a per-user or per-group basis, the commands that are allowed. <br><br>6. RADIUS Standard does not guarantee interoperability and TACACS+ does. <br> 一定又是你给他的 x3自己找的。他经常找到一些藏得很深的资源 呵呵,别一下把人民群众划开,你做黑五类可别拉上别人哦。 说你是神你还不要? <BLOCKQUOTE><strong>引用</strong>:<HR Size=1>原文由 <b>有人喜欢蓝</b> 发表:<br>救命啊,怎么na又换题型了啊,想在家狠闷一个暑假的<br>换了,又怎么办啊<HR SIZE=1></BLOCKQUOTE><br>其实,和以前没有很大的差别,如果你基础扎实,完全不用担心啊。:) 其实也英语也不是太难,更多的是象这样的题目。<br>Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What is the default encapsulation type for Frame Relay on a Cisco router?<br>A. HDLC<br>B. PPP<br>C. IETF<br>D. Cisco<br>E. ANSI<br>
页:
[1]
2