lehuy0305's Blog

Thông tin cá nhân

lehuy0305
Họ tên: Lê Thanh Huy
Nghề nghiệp: Developer PHP
Sinh nhật: 3 Tháng 5
Nơi ở: Hà Nội
Trạng thái: User is offline (Vắng mặt)
Thêm vào nhóm bạn bè
Gửi tin nhắn
Chào tất cả các bạn!************ ^_^ *********** !Dù Thế Nào Đi Nữa*******Anh vẫn mãi yêu em,Ngốc ạ!*************

Xem theo danh mục
Xem theo danh mục:
     


Tìm kiếm:
     



CHBTNSB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31

Tik Tik Tak ! ^_^..........?


   Trong: CCNA
 
1.
After several configuration changes are made to a router, the copy run start command is issued. Where will the changes be stored?
flash
ROM
NVRAM
RAM
the configuration register
a TFTP server
2.
On a Cisco router, which of the following can be configured during setup mode? (Choose three.)
IP addresses
a message of the day banner
routed protocols
the clock rate for a serial interface
the enable password
host tables
3.
Which commands can a network administrator use to monitor and verify access list operations? (Choose two.)
Router# show IOS version
Router# show access-lists
Router# show ip route
Router# show protocols
Router# show ip interface
Router# show cdp neighbor
4.
Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)
improper placement of enterprise level servers
addition of hosts to a physical segment
replacement of hubs with workgroup switches
increasing use of bandwidth intensive network applications
creation of new collision domains without first adding network hosts
migration to full-duplex Ethernet within the LAN
5.


Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two).
3 collision domains
3 broadcast domains
5 broadcast domains
9 collision domains
10 collision domains
13 collision domains
6.
Which of the following are true concerning full-duplex operation on an Ethernet network? (Choose three.)
There are no collisions in full-duplex mode.
A dedicated switch port is required for each node.
Hub ports are preconfigured for full-duplex mode.
The host network card must detect the availability of the media before transmitting.
The host network card and the switch port must be capable of operating in full-duplex mode.
7.
Which of the following best describes the operation of distance vector routing protocols?
They use hop count as their only metric.
They only send out updates when a new network is added.
They send their routing tables to directly connected neighbors.
They flood the entire network with routing updates.
8.
A router has learned about a network through static and dynamic routing processes. Which route will be used to reach network 192.168.168.0?
D 192.168.168.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Ethernet0
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0
S 192.168.168.0/24 [1/0] via 192.168.200.1
9.


A company has outgrown the address space provided by its 192.168.10.0 network. To accommodate new users, the network administrator decided to implement VLANs and do the following:

1. Place the users of the 192.168.10.0 network in VLAN 168.
2. Assign new users an IP address from the 172.30.10.0/24 network.
3. Place users of the 172.30.10.0 network in VLAN 30.

After implementing the planned VLANs and connecting the network as shown in the graphic, the administrator finds that the users in VLAN 30 are unable to access the Internet or communicate with users in VLAN 168. However, VLAN 168 users are able to access the Internet and each other.

Using the graphic, what should be done to enable users in VLAN 30 to communicate with VLAN 168 users and the Internet? (Choose three.)
Configure E1 with an address in the 172.30.10.0/24 network.
Place all VLAN 30 hosts on the same switch.
Configure all hosts with 192.168.10.1 as the default gateway.
Connect the router's E1 port to a switch port configured for VLAN 30.
Connect the router's E1 port to a switch port configured for VLAN 168.
Add the network 172.30.10.0 to the dynamic routing protocol process
10.


Which hosts will receive ARP requests from host A, assuming that port 4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)
host B
host C
host D
host E
host F
11.


The network administrator shown in the graphic is unable to access the TFTP server attached to the Miami router. Consider only the IP addressing scheme to identify the causes of this problem. (Choose two.)
The default gateway configured on the network administrator's workstation is not a valid host address.
The default gateway configured on the TFTP server in incorrect.
The IP address of the TFTP server is a subnetwork address.
The IP address of the S0 interface of the Detroit router is a broadcast address.
The IP addresses for the Miami S1 interface and the Detroit S0 are not in the same subnet.
12.
Assuming a subnet mask of 255.255.224.0, which of the following would be valid host addresses? (Choose three.)
124.78.103.0
125.67.32.0
125.78.160.0
126.78.48.0
176.55.96.0
186.211.100.0
13.
The router reads each bit to determine the class of an address. Which of the following binary numbers would the router identify as public class A addresses? (Choose three.)
00001010.10101100.11001100.00000111
00011111.11110011.11111111.00111011
01011101.11100001.11001100.11011011
10000000.11111000.11000111.11110011
00010111.11011011.11000001.11001100
14.
Which of the following applications use the UDP protocol? (Choose two.)
Telnet
SNMP
SMTP
SQL
TFTP
15.
What must be done to enable a network administrator to configure a switch remotely?
The switch must be assigned a host name.
The remote management terminal must be assigned to the management VLAN.
The management IP address of the switch must be set.
The managment port must be configured for full-duplex operation.
Cisco Discovery Protocol must be active on the switch.
SNMP must be configured with the IP address of the management console.
16.
Which of the following are characteristics of the Internet layer of the TCP/IP model? (Choose two)
provides a logical connection between a source host and a destination host
provides end-to-end control
selects the best path through the network
defines the procedures used to interface with the network hardware
packet switching occurs at this layer
handles high-level protocols
17.
Where should extended access control lists be placed?
They should be placed as close as possible to the source of the traffic to be denied.
They should be placed as close as possible to the destination of the traffic to be denied.
They should be placed on the fastest interface available.
They should be placed on the destination WAN link.
18.
Which of the following statements are true regarding the meaning of the access control list wildcard mask 0.0.0.15? (Choose two.)
The first 28 bits of a supplied IP address will be ignored.
The last four bits of a supplied IP address will be ignored.
The first 32 bits of a supplied IP address will be matched.
The first 28 bits of a supplied IP address will be matched.
The last five bits of a supplied IP address will be ignored.
The last four bits of a supplied IP address will be matched.
19.
What is the purpose of the Spanning Tree Protocol (STP)?
prevents Layer 2 loops
prevents routing loops on a router
creates smaller collision domains
creates smaller broadcast domains
allows Cisco devices to exchange routing table updates
20.
A router with two LAN interfaces, two WAN interfaces, and two loopback interfaces configured is operating with OSPF as its routing protocol. What is used by the OSPF process to assign the router ID?
the IP address of the interface configured with priority 0
the OSPF area ID configured on the interface with the highest IP address
the loopback with the highest IP address configured
the highest IP address on the LAN interfaces
the highest IP address configured on the WAN interfaces
21.
Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?
Ports are manually configured to be in the forwarding state.
Ports listen and learn before going into the forwarding state.
Ports must be blocked before they can be placed in the disabled state.
It takes 15 seconds for a port to go from blocking to forwarding
22.
A company is using an address range of 172.18.0.0/23. Which of the following are valid host addresses if the zero subnet is usable? (Choose three.)
172.18.0.0
172.18.0.174
172.18.1.0
172.18.1.236
172.18.1.255
172.18.2.182
23.
Which of the following are features of a link-state routing protocol? (Choose two.)
Routers send periodic updates only to neighboring routers.
Routers send triggered updates in response to a change.
Routers calculate best paths based on the Dijkstra algorithm.
The database information for each router is obtained from the same source.
Paths are chosen based on the lowest number of hops to the designated router.
24.


R1 can not ping R2 through the ISDN connection. Based on the output shown in the graphic, what is the problem?
The dialer-group command is missing.
Incorrect SPIDs are configured.
There is a faulty cable.
Incorrect encapsulation is configured.
25.
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
26.
Which of the following must be in an extended access control list? (Choose three.)
access list number between 1 and 99
access list number between 100 and 199
default gateway address and wildcard mask
destination address and wildcard mask
source address and wildcard mask
subnet mask and wild card mask
27.
Which of the following statements are true regarding PPP? (Choose three.)
PPP can use synchronous and asynchronous physical media.
PPP can only be used between two Cisco devices.
PPP carries packets from several network layer protocols in LCPs.
PPP uses LCPs to establish, configure, and test the data link connection.
PPP uses LCPs to agree on format options such as authentication, compression, and error detection.
28.
What is the default encapsulation protocol for a synchronous serial interface on a Cisco router?
PPP
HDLC
Frame Relay
LAPB
SMDS
29.


Refer to the graphic. Which of the following outputs will be displayed if the command show interfaces serial 0/0 is performed on R1?
Serial 0/0 is down, line protocol is down
Serial 0/0 is up, line protocol is down
Serial 0/0 is up, line protocol is up (looped)
Serial 0/0 is up, line protocol is down (disabled)
Serial 0/0 is administratively down, line protocol is down
30.
Which three aspects of an ISDN connection can be defined when using dialer profiles to different locations? (Choose three.)
physical interface
IP addressing
routing protocol
error correction
encapsulation
bandwidth

 

> Trả lời nhanh
Bình luận của bạn sẽ được đăng sau khi chủ blog kiểm duyệt và chấp nhận
Nhập vào tên của bạn:
Nhập mã số xác nhận (bắt buộc):
» Hiển thị cửa sổ mặt cười       » Download bộ gõ tiếng Việt Unikey
 Bạn có muốn chuyển các ký hiệu như :) :( :D ...thành mặt cười trong bài viết này?
 Bạn có muốn chèn thêm chữ ký vào bài viết này ?
 


 
Lượt xem thứ:





Mạng xã hội của người Việt Nam.
VnVista I-Shine © 2005 - 2024 VnVista.com