lehuy0305's Blog

Thông tin cá nhân

lehuy0305
Họ tên: Lê Thanh Huy
Nghề nghiệp: Developer PHP
Sinh nhật: 3 Tháng 5
Nơi ở: Hà Nội
Trạng thái: User is offline (Vắng mặt)
Thêm vào nhóm bạn bè
Gửi tin nhắn
Chào tất cả các bạn!************ ^_^ *********** !Dù Thế Nào Đi Nữa*******Anh vẫn mãi yêu em,Ngốc ạ!*************

Xem theo danh mục
Xem theo danh mục:
     


Tìm kiếm:
     



CHBTNSB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Tik Tik Tak ! ^_^..........?


   Trong: CCNA
 
1.
Which of the following are functions of a router? (Choose three.)
packet switching
extension of network segments
segmentation of local area networks
selection of best path based on a logical addressing
selection of best path based on a physical addressing
2.

What types of messages are sent periodically by devices configured for CDP?
probes
beacons
signals
advertisements
routing updates
unicast
3.


Which command will produce the output shown in the graphic?
show cdp
show cdp neighbors
show cdp neighbors detail
show cdp detail
4.
How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?
4
5
8
10
5.
A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)
The ip host table on the router is not configured.
The command telnet Boston was issued from the wrong router prompt.
The routing table is missing.
Domain name services are not available.
6.
If the config-register on a router is set to 0x2102, where is the first place the router will look for boot system commands?
RAM
ROM
Flash
NVRAM
7.
In the configuration register value 0x2104, which value represents the boot field setting?
x
2
1
0
4
8.
Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?
Router# boot system tftp 163.150.9.31 c2500-d-l.120-9
Router# copy run start
Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router# copy run start
Router# config t
Router(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router(config)# exit
Router# copy run start
Router# config t
Router(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.bin
Router(config)# exit
Router# copy run start
9.



Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)
Updates start broadcasting every 30 seconds.
Updates start broadcasting every 90 seconds.
Link-state advertisements are flooded.
Link-state advertisements are sent only to neighboring routers.
All routers note the change and adjust routes.
All routers ignore the change until the route becomes active again.
10.
What can be determined from the partial output of the show ip route command displayed below? (Choose two.)

R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0
C 192.168.10.0/24 is directly connected, Serial0/0

The next update will be in 76 seconds.
The next update will be in 16 seconds.
The administrative distance is 120 and the metric is 1.
The metric is 120 and the administrative distance is 1.
200.200.200.0 is configured on Serial0/0.
192.168.10.2 is configured on Serial0/0.
11.


Given the above topology, which of the following statements are true? (Choose two.)
If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.
If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.
If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.
If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.
If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.
12.
Which command is used to redirect debug information to a device that is connected though a Telnet session?
Router# monitor
Router# terminal redirect vty 0
Router# terminal monitor
Router# monitor output vty 0
13.



The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.

access-list 22 deny host 204.204.7.122
access-list 22 permit any


Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?
RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 in
RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 out
RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 22 in
RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 in
RouterB(config)# interface s0/0
RouterB(config-if)# ip access-group 22 in
RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 out
14.

Refer to the output from the show ip route command. What can be concluded from the output of this router command?
A preferred route to the destination has not been set.
There are two equal cost paths to network 1.0.0.0.
Both interfaces are being used equally to route traffic.
A variance must be set to load-balance across multiple paths.
15.
Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user's PC has successfully booted but can not see the network. What should be checked first?
the PC power cord
the file server
the PC network interface card LEDs
the LAN switch in the wiring closet
the configuration of the router interface attached to the LAN
16.
What are the major characteristics of a wide area network? (Choose three.)
connect devices separated by wide geographical areas
includes technologies of FDDI and Ethernet
uses serial connections to access bandwidth
common carriers are needed for connections
type of connection between a router and a switch
17.
Which of the following WAN connection services typically use synchronous communications? (Choose two.)
circuit-switched
leased line
packet-switched
Ethernet
analog modem services
18.

Which of the following are true regarding the setup configuration mode? (Choose three.)
To abort the setup mode, use the CTRL+SHIFT+6 keys.
To abort the setup mode, use the CTRL+C keys.
Setup mode allows a complete configuration of the router.
To enter setup mode, use the privileged mode setup command.
A router that does not find a valid IOS during the boot process will start the system configuration dialog.
A router that does not find a valid configuration file during the boot process will start the system configuration dialog
19.
Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name.
Router# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5
Router(config-if)# ip host Fontana 200.100.50.5
Router(config)# ip host Fontana 200.100.50.5/24
20.
Which statements are true regarding VTY passwords? (Choose two.)
VTY passwords must be encrypted.
All VTY lines do not need to use the same password.
A VTY password is required to establish telnet sessions.
The VTY password is set with the command line console 0.
The VTY password must be identical with the enable secret password.
21.
Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)
telnetting into the router
initiating a debug session
configuring a router for the first time
using the Aux port to check the current configuration
using the console port to check the current configuration
22.



The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?
no update timers
holdown-timer 96
poison reverse E0
passive-interface E0
no triggered updates
23.


Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)
by forwarding packets over paths of equal cost
by forwarding packets according to hop count and speed of the link
by determining which interface has the least traffic and sending to it first
by first determining the speed of the links and then cycling packets through the fastest links first
by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time
24.

The following line was displayed in the output of the show ip route command.

R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0

What is the value of the routing metric?
3
12
20
30
120
25.
Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)
TCP/IP must be installed and properly configured on each device.
Multiple subnets must be configured on the router to ensure accurate delivery.
A default gateway must be configured for datagrams to travel outside of the LAN.
The hosts must be directly connected to a switch to travel outside of the LAN.
To ensure accurate delivery, a router must be configured and accessible by hosts on the network.
26.


The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)
Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1
Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0
Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2
Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1
Utah(config)# ip route 172.31.3.0 255.255.255.0 s1
Utah(config)# ip route 0.0.0.0 0.0.0.0 s0
27.

Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)
functions as a link-state routing protocol
discards packets when the hop count is greater than 15
calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)
created as a proprietary routing protocol
floods updates as topology changes occur
broadcasts routing updates every 90 seconds or as triggered by topology changes
28.



Refer to the exhibit. An ACL has been created that will deny the host 192.168.7.89 access to an FTP server located at 10.6.13.254.

access-list 111 deny tcp 192.168.7.89 0.0.0.0 10.6.13.254 0.0.0.0 eq 21
access-list 111 deny tcp 192.168.7.89 0.0.0.0 10.6.13.254 0.0.0.0 eq 20
access-list 111 permit ip any any

Which group of commands will place this ACL in the proper location?
Router2(config)#interface s0/0
Router2(config-if)#ip access-group 111 in
Router2(config)#interface fa0/0
Router2(config-if)#ip access-group 111 out
Router3(config)#interface s0/1
Router3(config-if)#ip access-group 111 out
Router3(config)#interface fa0/0
Router3(config-if)#ip access-group 111 in
Router2(config)#interface fa0/0
Router2(config-if)#ip access-group 111 in
29.
When would the ROM monitor mode be used? (Choose two.)
maintaining routing configuration settings
modifying the IOS image stored in Flash
running a limited IOS feature set
performing the bootstrap process
30.

An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?
There was a POST failure.
The incorrect IOS loaded.
There was an error in the startup configuration file.
The configuration register was set to ignore NVRAM.
31.


Which of the following are valid static IP routes? (Choose three.)
RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1
RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1
RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2
RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2
RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1
32.

After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)
There is a mismatch in the encapsulation type on both ends of the link.
A Layer 1 issue exists.
An interface problem exists.
The clockrate was not set during configuration.
There is no usable media for the protocol.
Keepalive messages are not being sent.
33.
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
34.
Which statement about datagram life is true?
Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.
The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.
Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.
The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.
35.



Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)
Router B received a configuration change.
Router A sent a message requesting an update.
Router C came online after Router B sent the RIP update.
Router B received an error message indicating the last update was not received.
36.
Why is it useful to have an interface description?
A user can telnet to the router using the interface description.
The interface description is a shortcut way to edit the running-config.
The interface description helps identify distant network connections.
The interface will remain inactive until an interface description is applied.
37.
ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?
The packets will be placed in a buffer and forwarded when the ACL is removed.
The packets will be sent to the source with an error notification message.
The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.
The implicit deny any statement placed at the end of the list will cause the packets to be dropped.
38.
Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)
It can be used to verify the operation of application layer software between the source and destination.
Telnet can use the ICMP protocol to verify a hardware connection and network layer address.
It is the most complete testing mechanism available.
Remote networks may be accessed via a Telnet session for troubleshooting.
Time to Live values are used by Telnet to identify a failure of device between source and destination.
39.
Which of the following are true statements about creating and applying access lists? (Choose three.)
Access list entries should filter in the order from general to specific.
One access list per port per protocol per direction is permitted.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.
There is an implicit deny at the end of all access lists.
Statements are processed sequentially from top to bottom until a match is found.
The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.
40.



A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?
The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.
The wrong port was configured for the ACL so Telnet traffic was still allowed.
The access list has not been assigned to an interface.
The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.
41.
Which two statements are true about route metrics? (Choose two.)
The more factors that make up a metric, the greater the flexibility to tailor network operations.
The larger the metric number, the better the path.
Routing protocols use metrics to send routing updates to directly connected neighbors.
Bandwidth and delay are static metrics used by RIP v1.
Ticks, delay, and cost are metrics used by routing protocols.
42.



Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?
F, G, E, D, B, A
F, E, D, C, A
F, E, D, A
F, E, D, B, A
43.



Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?
It will be forwarded through interface S1.
It will be forwarded to the default route.
It will be directed toward the Internet.
It will be discarded.
44.



The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)

 

> Trả lời nhanh
Bình luận của bạn sẽ được đăng sau khi chủ blog kiểm duyệt và chấp nhận
Nhập vào tên của bạn:
Nhập mã số xác nhận (bắt buộc):
» Hiển thị cửa sổ mặt cười       » Download bộ gõ tiếng Việt Unikey
 Bạn có muốn chuyển các ký hiệu như :) :( :D ...thành mặt cười trong bài viết này?
 Bạn có muốn chèn thêm chữ ký vào bài viết này ?
 


 
Lượt xem thứ:





Mạng xã hội của người Việt Nam.
VnVista I-Shine © 2005 - 2024 VnVista.com