1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 106 potx

10 430 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 160,69 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

What transport layer protocol does TFTP use.. Which of the following protocols operate at the TCP/IP Internet layer.. How does the network layer forward packets from the source to the de

Trang 1

2. What is the maximum distance for thick Ethernet without using a repeater?

C 500m (1640.4 ft.)

3. 10-Mbps Ethernet operates within the timing limits offered by a series of no

repeaters

C Five, four

4. Fast Ethernet supports up to what transfer rate?

C 100 Mbps

5. Identify two Gigabit Ethernet cable specifications

C 1000BASE-SX

D 1000BASE-LX

D Short-wave laser over multimode fiber

7. 4D-PAM5 encoding method is used in which of the following Gigabit Ethernet?

C 1000BASE-T

8. What is the IEEE standard for 10-Gb Ethernet?

C 802.3ae

9. Which of the following is not a feature of microsegmentation?

D It increases collisions.

10. Which of the following is used by LAN switches for making the forwarding

decision?

B MAC address

11. Which of the following is a feature of full-duplex transmission?

D All of the above.

Answer: store-and-forward, cut-through, and fragment-free

13. The Spanning-Tree Protocol allows which of the following?

B A redundant network path without suffering the effects of loops in the network

Trang 2

14. Which of the following is not one of the STP port states?

D Transmitting

15. Which of the following is true concerning a bridge and its forwarding decisions?

C Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.

16. Which of the following is not a feature of bridges?

C They do not make any forwarding decisions.

17. Which of the following statements is true of microsegmentation?

A Each workstation gets its own dedicated segment through the network.

18. Which of the following is true for LAN switches?

B They are very high-speed multiport bridges.

Chapter 7

1. What transport layer protocol does TFTP use?

C UDP

2. Which of the following is a basic service of the transport layer?

D All of the above

3. Which of the following protocols operate at the TCP/IP Internet layer?

D All of the above

4. What is the first thing that happens when a DHCP client boots?

C DHCPDISCOVER

5. How does the network layer forward packets from the source to the destination?

A By using a routing table

6. If a device doesn’t know the MAC address of a device on an adjacent network, it sends an ARP request to what?

D All of the above

7. What is in a RARP request?

A A MAC header and the RARP request message

Trang 3

8. What are the two parts of an IP address?

A Network address and host address

9. What Internet protocol is used to map a known IP address to an unknown MAC

address?

C ARP

10. Which of the following initiates an ARP request?

D A device that cannot locate the destination MAC address in its ARP table

11. Which of the following best describes an ARP table?

D A section of RAM on each device that maps IP addresses to MAC addresses

12. Which of the following best describes the ARP reply?

A A device sends its MAC address to a source in response to an ARP request

13. Why are current, updated ARP tables important?

B For limiting the number of broadcasts

A A source knows its MAC address but not its IP address.

15. Which of the following best describes TCP/IP?

A It is a suite of protocols that can be used to communicate across any set of interconnected networks.

16. Which of the following does not describe the TCP/IP protocol stack?

A It maps closely to the OSI reference model’s upper layers.

17. The TCP/IP protocol suite has specifications for which layers of the OSI model?

C 3, 4, and 5 through 7

18. Which of the following is not a function of the network layer?

D UDP provides connectionless exchange of datagrams without acknowledgments.

19. Which of the following is one of the protocols found at the transport layer?

B UDP

Trang 4

Chapter 8

1. How many bits are in an IP address?

B 32

2. What is the maximum value of each octet in an IP address?

B 255

3. The network number plays what part in an IP address?

A It specifies the network to which the host belongs.

4. The host number plays what part in an IP address?

B It designates which node on the subnetwork is being addressed.

5. What is the decimal equivalent of the binary number 101101?

C 45

6. Convert the decimal number 192.5.34.11 to its binary form

A 11000000.00000101.00100010.00001011

7. Convert the binary IP address 11000000.00000101.00100010.00001011 to its decimal form

D None of the above

8. What portion of the Class B address 154.19.2.7 is the network address?

B 154.19

9. What portion of the IP address 129.219.51.18 represents the network?

A 129.219

10. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0?

B 123.10.255.255

11. How many host addresses can be used in a Class C network?

B 254

12. How many subnets can a Class B network have?

D None of the above

13. What is the minimum number of bits that can be borrowed to form a subnet?

B 2

Trang 5

14. What is the primary reason for using subnets?

C To reduce the size of the broadcast domain

15. How many bits are in a subnet mask?

B 32

16. Performing the Boolean function as a router would on the IP addresses 131.8.2.5

and 255.0.0.0, what is the network/subnetwork address?

D None of the above

17. How many bits can be borrowed to create a subnet for a Class C network?

C 6

18. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224,

how many bits have been borrowed to create a subnet?

C 3

19. Performing the Boolean function as a router would on the IP addresses

172.16.2.120 and 255.255.255.0, what is the subnet address?

C 172.16.2.0

20. Which of the following best describes one function of Layer 3, the network layer,

in the OSI model?

C It determines which is the best path for traffic to take through the network.

21. What function allows routers to evaluate available routes to a destination and to

establish the preferred handling of a packet?

B Path determination

22. How does the network layer forward packets from the source to the destination?

A By using an IP routing table

23. What are the two parts of a network layer address that routers use to forward

traffic through a network?

A Network address and host address

Trang 6

Chapter 9

1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly Repeating

A Reliability; flow control

2. The following characteristics describe what TCP/IP protocol: connection-oriented; resends anything not received; divides outgoing messages into segments

B TCP

3. What does the window field in a TCP segment indicate?

D Number of octets that the device is willing to accept

4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery?

A UDP

5. What do TCP and UDP use to keep track of different conversations crossing a network at the same time?

A Port numbers

6. How does TCP synchronize a connection between the source and the destination before data transmission?

B Three-way handshake

7. Which range of port numbers is unregulated?

D Above 1023

8. With TCP transmission, what occurs if a segment is not acknowledged in a certain time period?

D Retransmission occurs.

9. Which best describes flow control?

C A method of preventing buffer overrun

10. Which of the following best describes the purpose of the TCP/IP protocol stack?

C Transfers information from one host to another in a sequence of datagrams

Trang 7

11. Which of the following is one of the protocols found in the transport layer?

B UDP

12. What is the purpose of port numbers?

A They keep track of different upper-layer conversations crossing the network

at the same time.

13. Why are TCP three-way handshake/open connections used? Select all that apply

A To ensure that lost data can be recovered if problems occur later

B To determine how much data the receiving station can accept at one time

C It allows the window size to be negotiated dynamically during the TCP session, which results in more efficient use of bandwidth.

15. UDP segments use what protocols to provide reliability?

B Application layer protocols

D None of the above

A E-mail

B The requestor of services

19. Which of the following best describes a domain name?

A It represents the numeric address of an Internet site.

20. com is the domain typically assigned to

D Corporations

21. During a Telnet connection, the remote computer is responsible for

B Processing

22. At which three layers of the OSI model does Telnet primarily work?

D Application layer, presentation layer, session layer

Trang 8

23. Typical anonymous FTP sessions use as the login ID and

as the password

A Anonymous; the user e-mail address

24. Instead of working with specific application programs, redirectors work with

A Computer operating systems

Chapter 10

1. Which of the following best describes a WAN?

A Connects LANs that are separated by a large geographic area

A WANs emphasize access over serial interfaces operating at lower speeds.

3. Which of the following are examples of WAN technologies?

B Frame Relay, ISDN

4. Which layers of the OSI model do WAN standards describe?

D Physical and data link

5. Which best describes data circuit-terminating equipment (DCE)?

D Consists of physical devices at the end of a WAN connection

6. Which of the following components provides interface voice-grade services, channel service units/digital service units (CSUs/DSUs) that interface T1/E1 services, and terminal adapters/Network Termination 1 (TAs/NT1s) that interface Integrated Services Digital Network (ISDN) services?

C Modems

7. Which of the following concentrates the dial-in and dial-out user connections?

D Communication servers

8. Some WAN physical and data link layer standards are:

D All of the above

Trang 9

9. Match the functions with the components.

C. ROM

E. Interface Options:

A. RAM that retains its contents when a unit is powered off

B. Volatile memory that can be read and written by the microprocessor

C. Volatile memory that can be read but not written by a microprocessor

D. Nonvolatile storage that can be electrically erased and reprogrammed so that software images can be stored, booted, and rewritten as necessary

E. Connection between two systems or devices

D 1-b, 2-a, 3-c, 4-d, 5-e

10. Any internetwork will probably include the following:

D All of the above

11. Which of the following are data link encapsulations for WAN?

D All of the above

12. What are the main functions of routers?

D Both A and B

13. Which is an IBM-designed WAN data link for Systems Network Architecture

(SNA) environments, largely being replaced by the more versatile HDLC?

C Synchronous Data Link Control Protocol

14. Which WAN data link protocol is used for signaling and call setup on an ISDN D

channel?

A LAPD

15. Identify the WAN circuit-switched service(s):

D Both A and C

Trang 10

16. Which service has become an extremely popular WAN technology in its own right, is more efficient than X.25 but with similar services, has a maximum band-width of 44.736 Mbps, and offers extremely popular 56-Kbps and 384-Kbps implementations in the United States?

A Frame Relay

17. Identify the cell-switched technology/technologies:

D Both A and B

18. Identify the common type(s) of DSL technology/technologies:

D All of the above

19. Which is a family of very high-speed physical layer technologies with a series of data rates available with special designations, implemented at different Optical Carrier (OC) levels ranging from 51.84 Mbps (OC-1) to 9952 Mbps (OC-192), that can achieve these amazing data rates by using wavelength division multi-plexing (WDM)?

A SONET

20. Which are the kind of routers that form the primary paths for traffic that is sourced from and destined to other networks?

C Backbone routers

Chapter 11

1. A router initializes by doing which of the following?

C Loading the bootstrap, the setup procedure, and the operating system

2. During the setup process in a router, what keys can be used to escape the sequence?

C Ctrl + c

3. Match the configuration setting on the right with the items on the left that are needed to establish a HyperTerminal session:

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN