概述
1.Refer to the exhibit. Both switches are using a default configuration. Which two destination addresses will host 4 use to send data to host 1?
A. the IP address of host 1
B. the IP address of host 4
C. the MAC address of host 1
D. the MAC address of host 4
E. the MAC address of the Fa0/0 interface of the R1 router
F. the MAC address of the Fa0/1 interface of the R1 router<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
A. the IP address of host 1
B. the IP address of host 4
C. the MAC address of host 1
D. the MAC address of host 4
E. the MAC address of the Fa0/0 interface of the R1 router
F. the MAC address of the Fa0/1 interface of the R1 router<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
ANSWER: A F
2.Refer to the exhibit. Host A pings Host B. What source MAC address and source IP address are contained in the frame as the frame leaves R2 destined for host B? (Choose two.)
A. abcd.abcd.a001
B. abcd.abcd.b<?xml:namespace prefix = st1 ns = "urn:schemas-microsoft-com:office:smarttags" />002
C. abcd.abcd.c003
D. 10.2.0.15
E. 10.0.64.1
F. 10.0.128.15
A. abcd.abcd.a001
B. abcd.abcd.b<?xml:namespace prefix = st1 ns = "urn:schemas-microsoft-com:office:smarttags" />002
C. abcd.abcd.c003
D. 10.2.0.15
E. 10.0.64.1
F. 10.0.128.15
ANSWER: BD
3.Which of the following are true regarding the command output shown in the display? (Choose two.)
A. There are at least two routers participating in the RIP process.
B. A ping to 192.168.168.2 will be successful.
C. A ping to 10.0.15.2 will be successful.
D. RtrA has three interfaces participating in the RIP process.
ANSWER: AC
4.Refer to the exhibit. Which of these statements correctly describes the state of the switch .ce the boot process has been completed?
A. As FastEthernet0/12 will be the last to come up, it will be blocked by STP.
B. Remote access management of this switch will not be possible without configuration change.
C. More VLANs will need to be created for this switch.
D.The switch will need a different IOS code in order to support VLANs and STP.
ANSWER: B
5.Drop
Refer to the exhibit. Three Cisco 2950 switches are set to their default priority settings. During the spanning-tree process, which switch will be elected as the root bridge?
A. Switch1
B.Switch2
C. Switch3
D. Switch4
Refer to the exhibit. Three Cisco 2950 switches are set to their default priority settings. During the spanning-tree process, which switch will be elected as the root bridge?
A. Switch1
B.Switch2
C. Switch3
D. Switch4
ANSWER: A
6.What are some of the advantages of using a router to segment the network? (Choose two.)
A. Filtering can occur based . Layer 3 information.
B. Broadcasts are eliminated.
C. Routers generally cost less than switches.
D. Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
ANSWER: AD
7.At which layers of the OSI model do WANs operate? (Choose two.)
A. application layer
B.session layer
C. transport layer
D. network layer
E. datalink layer
F. physical layer
ANSWER: EF
8.What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5?
A. It creates a global address pool for all outside NAT transactions.
B. It establishes a dynamic address pool for an inside static address.
C. It creates dynamic source translations for all inside local PAT transactions.
D.It creates a .e-to-one mapping between an inside local address and an inside global address.
E. It maps .e inside source address to a range of outside global addresses.
ANSWER: D
9.A Cisco router that was providing Frame Relay connectivity at a remote site was replaced with a different vendor's frame relay router. Connectivity is now down between the
central and remote site. What is the most likely cause of the problem?
A. mismatched LMI types
B. incorrect DLCI
C. mismatched encapsulation types
D. incorrect IP address mapping
ANSWER: C
A. mismatched LMI types
B. incorrect DLCI
C. mismatched encapsulation types
D. incorrect IP address mapping
ANSWER: C
10.In the 802.11 specification, what are the allowable channels in the 2.4GHz ISM band?
A. channels 1, 5, 9
B. channels 1, 6, 11
C.channels 1, 4, 7, 10
D. channels 2, 6, 10
ANSWER: B
A. channels 1, 5, 9
B. channels 1, 6, 11
C.channels 1, 4, 7, 10
D. channels 2, 6, 10
ANSWER: B
11.Given the partial router configuration in the graphic, why does the workstation with the IP address 192.168.1.153/28 fail to access the Internet? (Choose two.)
A. The NAT inside interfaces are not configured properly.
B. The NAT outside interface is not configured properly.
C. The router is not properly configured to use the access control list for NAT.
D. The NAT pool is not properly configured to use routable outside addresses.
E. The access control list does not include the IP address 192.168.1.153/28 to access the Internet.
ANSWER: AC
12.Refer to the exhibit. Given this output for SwitchC, what should the network administrator's next action be?
A. Check the trunk encapsulation mode for SwitchC's fa0/1 port.
B.Check the duplex mode for SwitchC's fa0/1 port.
C .Check the duplex mode for SwitchA's fa0/2 port.
D .Check the trunk encapsulation mode for SwitchA's fa0/2 port.
ANSWER:
C
13.What does a Layer 2 switch use to decide where to forward a received frame?
A source MAC address
B source IP address
C source switch port
D destination IP address
E destination port address
F destination MAC address
A source MAC address
B source IP address
C source switch port
D destination IP address
E destination port address
F destination MAC address
ANSWER:
F
14.Refer to the exhibit. Which two statements are true about the loopback address that is configured . RouterB? (Choose two.)
A It ensures that data will be forwarded by RouterB.
B It provides stability for the OSPF process . RouterB.
C It specifies that the router ID for RouterB should be 10.0.0.1.
D It decreases the metric for routes that are advertised from RouterB.
E It indicates that RouterB should be elected the DR for the LAN.
ANSWER: BC
15.When a new trunk link is configured . an IOS based switch, which VLANs are allowed over the link?
A By default, all defined VLANs are allowed . the trunk.
B Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D Each single VLAN, or VLAN range, must be specified with the vlan database command.
A By default, all defined VLANs are allowed . the trunk.
B Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D Each single VLAN, or VLAN range, must be specified with the vlan database command.
ANSWER:
A
16.Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)
A transparent
B auto
C .
D desirable
E blocking
F forwarding
A transparent
B auto
C .
D desirable
E blocking
F forwarding
ANSWER: BCD
17.Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network has converged, and the routers in this network are functioning
17.Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network has converged, and the routers in this network are functioning
properly. The FastEthernet0/0 interface . R1 goes down. In which two ways will the routers in this network respond to this change? (Choose two.)
A All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.
B Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-down timers expire.
C Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 about connectivity to the 192.168.1.0 network.
D When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond by sending a route back to R1 with an infinite metric to the 192.168.1.0
A All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.
B Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-down timers expire.
C Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 about connectivity to the 192.168.1.0 network.
D When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond by sending a route back to R1 with an infinite metric to the 192.168.1.0
network.
E R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updates at an increased rate until the network again converges.
E R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updates at an increased rate until the network again converges.
ANSWER: CD
18.How does replacing a hub with a switch affect CSMA/CD behavior in an Ethernet network?
A It effectively eliminates collisions.
B In increases the size of the collision domain by allowing more devices to be connected at .ce.
C It decreases the amount of time that a jam signal must be sent to reach all network devices.
D It reduces the total amount of bandwidth available to each device.
E It eliminates Layer 3 broadcast traffic.
A It effectively eliminates collisions.
B In increases the size of the collision domain by allowing more devices to be connected at .ce.
C It decreases the amount of time that a jam signal must be sent to reach all network devices.
D It reduces the total amount of bandwidth available to each device.
E It eliminates Layer 3 broadcast traffic.
ANSWER: A
19.Refer to the exhibit. A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 . Switch1 is disconnected. What
would be an effect of this cable being disconnected?
A Host B would not be able to access the server in VLAN9 until the cable is reconnected.
B Communication between VLAN3 and the other VLANs would be disabled.
C The transfer of files from Host B to the server in VLAN9 would be significantly slower.
D For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.
ANSWER:
D
20.Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made.
Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)
A SwitchA, Fa0/2, designated
B SwitchA, Fa0/1, root
C SwitchB, Gi0/2, root
D SwitchB, Gi0/1, designated
E SwitchC, Fa0/2, root
F SwitchD, Gi0/2, root
ANSWER: ABF
21.Refer to the exhibit. In order to determine the cause of the excessive collisions, what step would be appropriate concerning fastEthernet 0/2?
A Check the continuity of the cable.
B Inspect the cable environment for excessive electromagnetic noise.
C Ensure Category 5 cabling is being used.
D Verify that the cable length does not exceed the specified length.
A Check the continuity of the cable.
B Inspect the cable environment for excessive electromagnetic noise.
C Ensure Category 5 cabling is being used.
D Verify that the cable length does not exceed the specified length.
ANSWER: D
22.Which two devices can interfere with the operation of a wireless network because they operate . similar frequencies? (Choose two.)
A copier
B microwave oven
C toaster
D cordless phone
E IP phone
F AM radio
ANSWER: BD
A copier
B microwave oven
C toaster
D cordless phone
E IP phone
F AM radio
ANSWER: BD
23.The network administrator has configured NAT as shown in the graphic. Some clients can access the Internet while others cannot. What should the network administrator do to
resolve this problem?
A Configure an IP NAT pool.
B Properly configure the ACL.
C Apply the ACL to the S0 interface.
D Configure another interface with the ip nat outside command.
A Configure an IP NAT pool.
B Properly configure the ACL.
C Apply the ACL to the S0 interface.
D Configure another interface with the ip nat outside command.
ANSWER:
B
24.Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise
server in VLAN2. Which two Ethernet segments would need to be configured as trunk links? (Choose two.)
A A
B B
C C
D D
E E
F F
ANSWER: CF
25.Which of the following are key characteristics of PPP? (Choose three.)
A can be used over analog circuits
B maps Layer 2 to Layer 3 address
C encapsulates several routed protocols
D supports IP .ly
E provides error correction
A can be used over analog circuits
B maps Layer 2 to Layer 3 address
C encapsulates several routed protocols
D supports IP .ly
E provides error correction
ANSWER: ACE
26.A network administrator is designing a new corporate internetwork. The corporation is concerned about downtime due to link failure and also about link costs. Which topology
will provide some redundancy to increase reliability for all sites but will cost less than a fully redundant topology?
ANSWER:B
27.The Ethernet networks connected to router R1 in the graphic have been summarized for router R2 as 192.1.144.0/20. Which of the following packet destination addresses will R2
forward to R1, according to this summary? (Choose two.)
A 192.1.159.2
B 192.1.160.11
C 192.1.138.41
D 192.1.151.254
E 192.1.143.145
F 192.1.1.144
ANSWER:
AD
28.Which two of these statements are true of IPv6 address representation? (Choose two.)
A There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B A single interface may be assigned multiple IPv6 addresses of any type.
C Every IPv6 interface contains at least .e loopback address.
D The first 64 bits represent the dynamically created interface ID.
E Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
A There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B A single interface may be assigned multiple IPv6 addresses of any type.
C Every IPv6 interface contains at least .e loopback address.
D The first 64 bits represent the dynamically created interface ID.
E Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
ANSWER:
BC
29.Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this router?
A 10.1.1 .2
B 10.154.154.1
C 172.16.5.1
D 192.168.5.3
A 10.1.1 .2
B 10.154.154.1
C 172.16.5.1
D 192.168.5.3
ANSWER:
C
30.A network administrator wants to control which user hosts can access the network based . their MAC address. What will prevent workstations with unauthorized MAC addresses
from connecting to the network through a switch?
A BPDU
B port security
C RSTP
D STP
E VTP
F blocking mode
A BPDU
B port security
C RSTP
D STP
E VTP
F blocking mode
ANSWER:
B
31.RouterA is unable to reach RouterB. Both routers are running IOS version 12.0. After reviewing the command output and graphic, what is the most likely cause of the problem?
A incorrect bandwidth configuration
B incorrect LMI configuration
C incorrect map statement
D incorrect IP address
ANSWER: C
32.Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made.
Which switch will have .ly .e forwarding interface?
A SwitchA
B SwitchB
C SwitchC
D SwitchD
ANSWER: B
33.Refer to the exhibit. Host A needs to send data to Host B. Which Layer 2 and Layer 3 destination addresses will be used to send the data from Host A to Host B?
A 192.168.60.5 and 0011.43da.2c98
B 192.168.60.5 and 0007.0e56.ab2e
C 192.168.24.1 and 0007.0e56.ab2e
D 192.168.24.2 and 0007.0e84.acef
ANSWER: B
34.Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard? (Choose two.)
A alternate
B backup
C designated
D disabled
E root
A alternate
B backup
C designated
D disabled
E root
ANSWER: CE
35.Which spread spectrum technology does the 802.11b standard define for operation?
A IR
B DSSS
C FHSS
D DSSS and FHSS
E IR, FHSS, and DSSS
A IR
B DSSS
C FHSS
D DSSS and FHSS
E IR, FHSS, and DSSS
ANSWER: B
36.Refer to the graphic. Which of the following access list statements are necessary to allow FTP access to the HR server from the Internet while blocking all other traffic?
(Select two.)
A access-list 101 permit tcp any 192.168.44.252 0.0.0.0 eq 21
B access-list 101 permit tcp any 192.168.44.252 0.0.0.0 eq 20
C access-list 101 permit tcp 192.168.44.252 0.0.0.0 any eq 20
D access-list 101 permit tcp 192.168.44.252 0.0.0.0 any eq 21
E access-list 101 deny tcp any 192.168.44.252 0.0.0.0 gt 21
F access-list 101 deny tcp 192.168.44.252 0.0.0.0 any gt 21
ANSWER: AB
37.Refer to the exhibit. This command is executed . 2960Switch:
2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1
Which two of these statements correctly identify results of executing the command? (Choose two.)
2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1
Which two of these statements correctly identify results of executing the command? (Choose two.)
A Port security is implemented . the fa0/1 interface.
B MAC address 0000.00aa.aaaa does not need to be learned by this switch.
C .ly MAC address 0000.00aa.aaaa can source frames . the fa0/1 segment.
D Frames with a Layer 2 source address of 0000.00aa.aaaa will be forwarded out fa0/1.
E MAC address 0000.00aa.aaaa will be listed in the MAC address table for interface fa0/1 .ly.
ANSWER: BE
38.Refer to the exhibit. Two buildings . the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is
concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection?
A UTP cable
B STP cable
C coaxial cable
D fiber optic cable
ANSWER: D
39.Refer to the exhibit. What is the correct addressing for a frame and packet received by Host B from Host A?
A. Destination MAC: 0011.43da.2c98
Source MAC: 0070.0e8f.088a
Destination IP: 192.168.60.5
Source IP: 192.168.24.5
B. Destination MAC: 0011.43da.2c98
Source MAC: 00b0.d0ef.5f6a
Destination IP: 192.168.60.5
Source IP: 192.168.24.5
C. Destination MAC: 0011.43da.2c98
Source MAC: 0070.0e8f.088a
Destination IP: 192.168.60.5
Source IP: 192.168.60.1
D. Destination MAC: 0011.43da.2c98
Source MAC: 0070.0e97.af4e
Destination IP: 192.168.60.5
Source IP: 192.168.60.2
ANSWER: A
40.Refer to the exhibit. All switches have the default STP configuration and all links are Fast Ethernet. Which port . which switch will Spanning Tree place in blocking mode?
A Switch S1 - Port Fa1/1
B Switch S1 - Port Fa1/2
C Switch S2 - Port Fa1/2
D Switch S2 - Port Fa1/1
E Switch S3 - Port Fa1/2
F Switch S3 - Port Fa1/1
A Switch S1 - Port Fa1/1
B Switch S1 - Port Fa1/2
C Switch S2 - Port Fa1/2
D Switch S2 - Port Fa1/1
E Switch S3 - Port Fa1/2
F Switch S3 - Port Fa1/1
ANSWER: E
41.What are two characteristics of Telnet? (Choose two.)
A It sends data in clear text format.
B It is no longer supported . Cisco network devices.
C It is more secure than SSH.
D It requires an enterprise license in order to be implemented.
E It requires that the destination device be configured to support Telnet connections.
A It sends data in clear text format.
B It is no longer supported . Cisco network devices.
C It is more secure than SSH.
D It requires an enterprise license in order to be implemented.
E It requires that the destination device be configured to support Telnet connections.
ANSWER: AE
42.Which of the following are true regarding the debug output shown in the graphic? (Choose two.)
A.
This router was configured with the commands:
RtrA(config)# router rip
RtrA(config-router)# network 172.16.0.0
RtrA(config-router)# network 10.0.0.0
B.
This router was configured with the commands:
RtrA(config)# router rip
RtrA(config-router)# network 192.168.1.0
RtrA(config-router)# network 10.0.0.0
RtrA(config-router)# network 192.168.168.0
C
This router was configured with the commands:
RtrA(config)# router rip
RtrA(config-router)# version 2
RtrA(config-router)# network 172.16.0.0
RtrA(config-router)# network 10.0.0.0
D Split horizon was disabled . this router.
E Network 192.168.168.0 will be displayed in the routing table.
F Network 10.0.0.0 will be displayed in the routing table.
ANSWER: AF
43.Point-to-point subinterfaces offer greater security compared to a multipoint interface configuration.
A It avoids split-horizon issues with distance vector routing protocols.
B .ly .e IP network address needs to be used to communicate with all the spoke devices.
C Point-to-point subinterfaces offer greater security compared to a multipoint interface configuration.
D .ly a single physical interface is needed with point-to-point subinterfaces, whereas a multipoint interface logically combines multiple physical interfaces.
B .ly .e IP network address needs to be used to communicate with all the spoke devices.
C Point-to-point subinterfaces offer greater security compared to a multipoint interface configuration.
D .ly a single physical interface is needed with point-to-point subinterfaces, whereas a multipoint interface logically combines multiple physical interfaces.
ANSWER: A
44.A network administrator wants to ensure that .ly the server can connect to port Fa0/1 . a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network
administrator is about to bring the server .line. What can the administrator do to ensure that .ly the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)
A.Configure port Fa0/1 to accept connections .ly from the static IP address of the server.
B.Employ a proprietary connector type . Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address . the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security . Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list . the switch to deny server traffic from entering any port other than Fa0/1.
ANSWER: C
45.Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?
ANSWER: D
45.Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?
ANSWER: D
46.Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?
A. 0.0.0.240
B. 255.255.255.252
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240
A. 0.0.0.240
B. 255.255.255.252
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240
ANSWER: D
47.Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends
A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends
ANSWER: ACE
48.Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be
the .ly computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server? (Choose two.)
A. access lists
B. encrypted router passwords
C. STP
D. VLANs
E. VTP
F. wireless LANs
A. access lists
B. encrypted router passwords
C. STP
D. VLANs
E. VTP
F. wireless LANs
ANSWER: A D
49.The exhibited network is stable and operating properly. Assuming that default STP configurations are running . both switches, which port will be in blocking mode?
A. Port Fa0/1 . Switch1
B. Port Fa0/2 . Switch1
C. Port Fa0/1 . Switch2
D. Port Fa0/2 . Switch2
A. Port Fa0/1 . Switch1
B. Port Fa0/2 . Switch1
C. Port Fa0/1 . Switch2
D. Port Fa0/2 . Switch2
ANSWER: A
50.What is the effect of using the service password-encryption command?
A. .ly the enable password will be encrypted.
B. .ly the enable secret password will be encrypted.
C. .ly passwords configured after the command has been entered will be encrypted.
D. It will encrypt the secret password and remove the enable secret password from the configuration.
E. It will encrypt all current and future passwords
A. .ly the enable password will be encrypted.
B. .ly the enable secret password will be encrypted.
C. .ly passwords configured after the command has been entered will be encrypted.
D. It will encrypt the secret password and remove the enable secret password from the configuration.
E. It will encrypt all current and future passwords
ANSWER: E
转载于:https://blog.51cto.com/hj0822/123310
最后
以上就是兴奋羊为你收集整理的cisco的ccna题的拷贝(4)的全部内容,希望文章能够帮你解决cisco的ccna题的拷贝(4)所遇到的程序开发问题。
如果觉得靠谱客网站的内容还不错,欢迎将靠谱客网站推荐给程序员好友。
本图文内容来源于网友提供,作为学习参考使用,或来自网络收集整理,版权属于原作者所有。
发表评论 取消回复