44
Ôn tập CCENT quốc tế Giảng viên: Hồ Vũ Anh Tuấn

On tap ccent

Embed Size (px)

Citation preview

1. Ging vin: H V Anh Tun 2. Cc ch chnh OSINetwork BasicIPRouting Wireless 3. OSI 4. OSI (cont.) 5. OSI (cont.) Reliable vs. Best-Effort Comparison 6. OSI (cont.) 7. OSI (cont.) Which network protocol does DNS use ? a. FTP b. TFTP c.TCPd. UDP e. SCP 8. OSI (cont.) An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL ? (Choose three.) a. FTPb. Telnet c.SMTPd. DNS e. HTTP f.POP3 9. OSI (cont.) Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs ? a. Data link b. Network c.Transportd. Presentation e. Physical 10. Network Basic Hub Switch Router Cabling 11. Network Basic (cont.) 12. Network Basic (cont.) 13. Network Basic (cont.) 14. Network Basic (cont.)Viet NamThailand 15. Network Basic (cont.) Viet NamThailand 16. Network Basic (cont.) Which of the following statements describe the network shown in the graphic? (Choose two.)a. b. c. d. e. f.There are two broadcast domains in the network. There are four broadcast domains in the network. There are six broadcast domains in the network. There are four collision domains in the network. There are five collision domains in the network. There are seven collision domains in the network. 17. Network Basic (cont.) For which type of connection should a straight-through cable be used ? a. switch to switch b. switch to hub c.switch to routerd. hub to hube. router to PC 18. Network Basic (cont.) What is the first 24 bits in a MAC address called ? a. NIC b. BIA c.OUId. VAI 19. Network Basic (cont.) Refer to the exhibit. What type of connection would be supported by the cable diagram shown ?a. PC to router b. PC to switch c.server to switchd. switch to router 20. Network Basic (cont.) Which type of cable is used to connect the COM port of a host to the COM port of a router or switch ? a. Crossover b. straight-through c.Rolledd. shielded twisted-pair 21. Network Basic (cont.) When you are logged into a switch, which prompt indicates that you are in privileged mode ? a. % b. @ c.>d. $ e. # 22. Network Basic (cont.) Which command is used to copy the configuration from RAM into NVRAM ? a. copy running-config startup-config b. copy startup-config: running-config: c.copy running config startup configd. copy startup config running confige. write terminal 23. IP Addressing 24. IP Addressing (cont.) 25. IP Addressing (cont.) 26. IP Addressing (cont.) ClassPrivate Address RangeA10.0.0.0 to 10.255.255.255B172.16.0.0 to 172.31.255.255C192.168.0.0 to 192.168.255 27. IP Addressing (cont.) What is the principle reason to use a private IP address on an internal network ? a. Subnet strategy for private companies. b. Manage and scale the growth of the internal network. c.Conserve public IP addresses so that we do not run out of them.d. Allow access reserved to the devices. 28. IP Addressing (cont.) When is it necessary to use a public IP address on a routing interface ? a. Connect a router on a local network. b. Connect a router to another router. c.Allow distribution of routes between networks.d. Translate a private IP address. e. Connect a network to the Internet. 29. IP Addressing (cont.) The network administrator has asked you to check the status of the workstation's IP stack by pinging the loopback address. Which address would you ping to perform this task ? a. 10.1.1.1b. 127.0.0.1 c.192.168.0.1d. 239.1.1.1 30. IP Addressing (cont.) Which of the following describe private IP addresses ? (Choose two.) a. addresses chosen by a company to communicate with the Internet b. addresses that cannot be routed through the public Internet c.addresses that can be routed through the public Internetd. a scheme to conserve public addresses e. addresses licensed to enterprises or ISPs by an Internet registry organization 31. Routing Overview 32. Routing Overview 33. Routing Overview 34. Routing Overview RIPv1RIPv2ClassfulClasslessSupports variable-length subnet mask?NoYesSends the subnet mask along with the routing update?NoYesAddressing typeBroadcastMulticastDefined in RFC 1058RFCs 1721, 1722, and 2453Supports manual route summarization?NoYesAuthentication support?NoYesRouting protocol 35. Wireless ITU-R with FCC Wireless 36. Wireless (cont.) IEEE 802.11 Standards Comparison 802.11b802.11a802.11gFrequency band2.4 GHz5 GHz2.4 GHzNo. of channels3Up to 233TransmissionDirect Sequence Spread Spectrum (DSSS)Orthogonal Frequency Division Multiplexing (OFDM)Direct Sequence Spread Spectrum (DSSS)Data rates [Mb/s]1, 2, 5.5, 116, 9, 12, 18, 24, 36, 48, 541, 2, 5.5, 11Orthogonal Frequency Division Multiplexing (OFDM) 6, 9, 12, 18, 24, 36, 48, 54 37. Wireless (cont.) Channels and Overlap Issues 38. Wireless (cont.) Wireless LAN Security Threats 39. Wireless (cont.) Wireless LAN Security WEP802.1x EAPWPA802.11i / WPA2 40. Wireless (cont.) Wi-Fi Certification 41. Wireless (cont.) 42. Wireless (cont.) Refer to the exhibit. What two facts can be determined from the WLAN diagram ? (Choose two.)a. b. c. d. e.The area of overlap of the two cells represents a basic service set (BSS). The network diagram represents an extended service set (ESS). Access points in each cell must be configured to use channel 1. The area of overlap must be less than 10% of the area to ensure connectivity. The two APs should be configured to operate on different channels. 43. Wireless (cont.) Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies ? (Choose two.) a. copier b. microwave oven c.toasterd. cordless phonee. IP phone f.AM radio 44. Cm n cc bn