Tải bản đầy đủ (.docx) (15 trang)

De thi CCNA on lccuyen

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (83.57 KB, 15 trang )

1. Which of the following common networking problems is eliminated when an Ethernet

network uses separate transmit and receive wire pairs and a switched topology?
Choose one answer.
a. the maximum bandwidth available on CAT 3 wiring
b. single segment distance limitations
c. Multi-port bridge replication errors
d. CSCD/MA maximum repeater rules
e. collisions on the physical bus
2. Which of the following is a transport layer protocol of the TCP/IP model?
Choose one answer.

3. Which switching mode has the highest latency?

Choose one answer.

4. What impact does a bridge have on a network? (Choose two.)

Choose at least one answer.
a. increases number of collision domains
b. reduces collision domains
c. has no impact on broadcast domains
d. adds additional broadcast domains


e. breaks collision domains into equal parts
5. What type of network cable is used between a terminal and a console port?
Choose one answer.

6. Which of the following are layers of the TCP/IP model? (Choose three.)


Choose at least one answer.

7. Which of the following are TCP services? (Choose three.)

Choose at least one answer.

a. address resolut
b. flow control

c. end-to-end com

d. data representa

e. reliability of da

f. path determinat
8. Which processes occur each time a packet is switched from one router interface to

another? (Choose two.)
Choose at least one answer.

a. Fas


b. enc

c. de-

d. circ


e. AR

f. RA
9. What does TCP use to begin the three-way handshaking process?

Choose one answer.
a. The sending host sends a SYN segment.
b. The sending host sends a SYN and ACK segment.
c. The destination host sends an ACK segment.
d. The destination host sends a SYN segment.
10. What valid host range is the IP address 172.16.10.22 255.255.255.240 a part of?

Choose one answer.

a. 172.16.10.16 through 172.16.10.2

b. 172.16.10.20 through 172.16.10.2

c. 172.16.10.17 through 172.16.10.3

d. 172.16.10.1 through 172.16.10.25

e. 172.16.10.17 through 172.16.10.3
11. Convert the decimal number 231 into its binary equivalent. Select the correct answer

from the list below.
Choose one answer.


12. Which of the following protocols is used to eliminate loops?


Choose one answer.

13. Which of the following are the functions of CSMA/CD? (Choose three.)

Choose at least one answer.
a. detecting errors within data packets or on the network
b. transmitting and receiving data packets
c. passing a token to each station on the network
d. releasing a token when the network is clear

e. decoding data packets and checking them for valid addresses before passing
14. Why is the half-duplex operation undesirable for Gigabit Ethernet? (Choose three.)

Choose at least one answer.

a. Half-duplex Gigabit Ethernet will need thicker cable for full operation sup
b. Gigabit Ethernet is inherently full-duplex.
c. Half-duplex operation reduces the effective cable lengths.
d. Half-duplex Gigabit Ethernet requires native mode NRZ conversion.

e. Half-duplex requires the use of more expensive equipment with larger siz

f. Half-duplex operation introduces increased overhead by the carrier extens
15. Which criteria identify a Class B address? (Choose two.)
Choose at least one answer.


a. first bit of binary IP address is 0
b. decimal number in first octet between 127-191

c. decimal number in first octect between 128-191
d. first two bits of binary IP address are 10
e. decimal number in first octect between 128-192
f. first three bits of IP binary address are 110
16. Which of the following characteristics describe STP cable? (Choose three.)
Choose at least one answer.

a. twisted pairs are not required because of the shield
b. must be grounded at both ends for high frequency signals
c. costs more than UTP
d. uses the shield to carry data signals
e. reduces both internal and external sources of interference
f. easier to install than UTP
17. Which of the following does a router use to make a forwarding decision?

Choose one answer.

a.

b.

c.

d.

e.
18. Which of the following are Fast Ethernet technologies? (Choose two.)

Choose at least one answer.



19. Which of the following terms refers to end-user devices that provide users with a

connection to the network?
Choose one answer.

20. Using the IP address 208.159.163.125 and subnet mask 255.255.255.192, determine the

network address.
Choose one answer.

21. Which of the following are typical specifications for data transmission cables? (Choose

three.)
Choose at least one answer.
a. intended transmission type
b. minimum distance between hosts
c. supported data encoding schemes
d. achievable bit transmission speeds
e. intended bit level protocols type


f. maximum distance before fatal attenuation
22. Which of the following is the address that is changed when a frame is received at a router

interface?
Choose one answer.

23. What are the benefits of replacing a hub with a switch? (Choose three.)
Choose at least one answer.


a. contains broadcasts
b. consolidates segments

c. reduces network congest

d. reduces collision domain

e. increases collision doma
f. maximizes bandwidth
24. Which protocol is typically used to carry data over an ISDN B channel?

Choose one answer.

25. A network administrator has a multi-floor LAN to monitor and maintain. Through careful

monitoring, the administrator has noticed a large amount of broadcast traffic slowing the
network. Which device would you use to best solve this problem?
Choose one answer.


26. What are the features of the User Datagram Protocol (UDP). (Choose three.)
Choose at least one answer.

a. connectionless
b. provides reliable full-duplex data transmission
c. reliability provided by the application layer
d. connection-oriented
e. utilizes sliding windowing techniques
f. no guaranteed delivery of datagrams

27. The corporate user at 210.98.105.70 is having problems communicating with the remote PC at
192.5.5.25. The computers internal loopback has been tested successfully. Which of the
following commands could be next in the troubleshooting process? (Choose three.)

28. Which of the following are ways that bandwidth is commonly measured? (Choose three.)
Choose at least one answer.


29. What is the broadcast address of the subnet address 10.10.8.159 255.255.255.192?
Choose one answer.

30. Which TCP/IP layer provides services that support a logical connection between the

sending and receiving hosts?
Choose one answer.

31. How do some computer operating systems prevent duplicate IP addresses on a local area

network?
Choose one answer.
a. They use UDP packets to bypass IP addresses.
b. The network DNS server reconciles IP address duplication.
c. They send ARP requests throughout a local area network.

d. They are able to allow duplicate IP addresses on a single LAN segm
32. Which of the following are considered WAN technologies? (Choose three)

Choose at least one answer.



33. What does the "S" in 1000BASE-SX mean?
Choose one answer.

a. short wavelength ligh
b. short range fiber

c. shielded fiber claddin
d. single-mode fiber
e. shielded twisted pair
34. Which of the following are considered to be "always on" services? (Choose two.)
Choose at least one answer.

35. Where does the MAC address originate?
Choose one answer.

a. configured by the administrator
b. included in the creation of the processor chip
c. network configuration on the computer
d. burned into ROM on the NIC card


e. DHCP server database
36. Which protocols are commonly part of the application layer of the TCP/IP model?

(Choose three.)
Choose at least one answer.

37. For a network manager planning the installation of a new network, which of the

following will be needed to implement a typical 10BASE-T network installation?

(Choose three.)
Choose at least one answer.

a. BNC

b. RJ-4

c. hubs

d. Cate

e. RJ-4

f. RJ-1
38. Which device uses full-duplex mode to provide full bandwidth between two nodes on a

network?
Choose one answer.


39. Which of the following is a non-routable protocol?
Choose one answer.

40. Which of the following are considered parts of an IP packet header? (Choose three.)
Choose at least one answer.

41. A small company has a class C network license and needs to create five usable subnets,

each subnet capable of accommodating at least 20 hosts. Which of the following is the
appropriate subnet mask?

Choose one answer.

42. Which model would a networking professional use to better understand the data

communication process?
Choose one answer.

a. AN


b. OS

c. Inte

d. IEE
43. Which of the following are benefits of coaxial cable within a LAN environment? (Choose

two.)
Choose at least one answer.
a. requires fewer repeaters than UTP
b. easily accommodates additions to network
c. faster transport speeds than fiber
d. easier to install than UTP
e. less expensive than fiber
44. Which of the following will test the internal loopback of a node?

Choose one answer.

a.


b.

c.

d.

e.
45. Which of the following wireless standards increased transmission capabilities to 11

Mbps?
Choose one answer.

46. What is the numeric base of hexadecimal numbers?

Choose one answer.


47. Which of the following are sublayers of the OSI data link layer? (Choose two.)

Choose at least one answer.

a. Media Access Communicatio
b. Media Access Control

c. Physical Access Communica
d. Logical Link Control
e. Logical Layer Control

f. Logical Link Communication
48. Which of the following is created with switched full-duplex transmission?

Choose one answer.

a. more broadcast domains
b. fewer collision domains
c. more collision domains
d. no collision domains

e. no increase in broadcast dom
49. Name the protocols that operate at the transport layer of the TCP/IP model. (Choose two.)
Choose at least one answer.


50. Using the IP address 208.159.163.125 and subnet mask 255.255.255.192, determine the

network address.
Choose one answer.

51. Which of the following are disadvantages of using SMTP for e-mail servers? (Choose

two.)
Choose at least one answer.
a. strong reliability

b. does not work well with email servers
c. offers very little security
d. no authentication




Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×