Вы находитесь на странице: 1из 27

TRUNG TÂM ĐÀO TẠO Đề thi ……………….......

LẬP TRÌNH VIÊN QUỐC TẾ HƯNG YÊN APTECH Khối : …………………...


http://www.aptech.utehy.vn Thời gian thi : …………..

®Ò thi sè

C©u In a Cisco IOS device, where is the startup-configuration file stored?


1:
B. NVRAM

C©u If an administrator wished to return a router to the default state, what additional step must be taken after
2 : issuing the command erase start-up config?

D. Reload the device.


C©u Which memory contents will change as a result of using the Router# erase startup-config command
3 : on a router?
A. NVRAM

C©u
4:

Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the
data leaves the Router1 Fa0/1 interface?

D. Destination IP: 192.168.10.4 Source MAC:


0030.8596.DE81
C©u
5:

Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server
with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session
before data can be exchanged?

C. The session will be initiated using TCP. A


three-way handshake must be successfully
completed before the session is established.
C©u Which OSI layer uses the header information to reassemble the data segments into streams?
6:
A. transport layer

C©u What is the result of using the clock rate 56000 command at the serial interface of the router?
7:

The interface is configured as a DCE device.


C©u
8:
Refer to the exhibit. An employee wants to access the organization intranet from home. Which
intermediary device should be used to connect the organization intranet to the Internet to enable
this access?
A. Router

C©u
9:

Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network.
Which action will indicate if there is remote connectivity?
A. B.
C. D.

C©u A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly
10 : addresses Router1 and host A into the second subnet created?
A. B.
C. D.
C©u
11 :

Refer to the exhibit. A technician is working on a network problem that requires verification of the router
LAN interface. What address should be pinged from this host to confirm that the router interface is
operation

D. 192.168.254.1
C©u
12 :

Refer to the exhibit. Which set of devices contains only intermediary devices?
B. A,B,D,G
C©u
13 :

Refer to the exhibit. Which logical topology describes the exhibited network?

D. poin to poin
C©u Which range of port numbers are reserved for services that are commonly used by applications that run on
14 : servers?
B. 0 to 1023

C©u An organization has decided to use IP addresses in the range 172.20.128.0 to 172.20.143.255. Which
15 : combination of network ID and subnet mask identifies all IP addresses in this range?
A. Network ID: 172.20.128.0 Subnet mask:
255.255.240.0

C©u
16 : Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
A. 255.255.248.0

C©u A network administrator uses the copy startup-config running-config command on a router to make
17 : configuration changes. Which component is affected by this command?
A. NVRAM

C©u
18 :

Refer to the exhibit. The serial interface of the router was configured with the use of the commands that
are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What
should the network technician do to solve this problem?

C. configure an IP address on interface serial


0/0/0
C©u
19 :

Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to
the web server?
B. 198.133.219.25:80

C©u
20 :

Refer to the exhibit. A technician is working on a network problem that requires verification of the router
LAN interface. What address should be pinged from this host to confirm that the router interface is
operational?
B. 192.168.254.1

C©u Which prompt represents the appropriate mode used for the copy running-config startup-config
21 : command ?
A. Switch-6J#
C©u
22 :

Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the
destination IP and MAC addresses in this communication?
B. Destination MAC: EEEE:EEEE:EEEE Destination
IP: 172.22.0.75

C©u
23 :

Refer to the
exhibit. Host A is transmitting data to host B. Which address combination will be used as the data
leaves the Router1 Fa0/1 interface?
A. Destination IP: 192.168.10.4 Source MAC:
0030.8596.DE81

C©u
24 :
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has
isolated the issue in this network to router B. What action can be preformed to correct the network issue?
B. issue the no shutdown command on interface
FastEthernet 0/1

C©u
25 :

Refer to the exhibit. An administrator made several changes to the configuration of the router but did not
accomplish the desired result. To undo the changes the reload command was used. What will happen if
the administrator answers yes to the prompt?

D. The changes will be saved and the configuration file


in NVRAM will be loaded.
C©u
26 :

Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a
frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the
captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is
the destination MAC address of the frame at the time of capture?

C. 0060.7320.D631
C©u How does the transport layer allow a host to maintain multiple, simultaneous communication
27 : streams across different applications?
A. It uses a connectionless protocol only for
multiple simultaneous transmissions
C©u An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP
28 : address range can be used for this organization?

D. 10.10.128.0 to 10.10.159.255
C©u Which topology divides the collision domain and provides full media bandwidth to the hosts in the
29 : network
A. B.
C. D.

C©u During the encapsulation process, which identifiers are added at the transport layer?
30 :

C. two applications communicating the data


C©u
31 :

Refer to the exhibit. Host A is unable to reach the remote network. On the basis of the provided output,
what is the cause of the problem?

D. There is no path to the remote network in the


routing table of router R1.
C©u
32 :

Refer to the exhibit. Which layered network model is shown in the diagram?

C. TCP/IP
C©u
33 :

Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown.
What information in this frame determines the correct destination application?
B. destination and source process numbers

C©u
34 :

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C
and D in the Education office are able to ping each other, but they are unable to access the hosts in the
Accounts office. What is the likely cause of the problem?

C. The subnet mask at the fa0/1 interface of the


router is incorrectly entered
C©u Which device should be used for enabling a host to communicate with another host on a different network
35 :

C. Router
C©u
36 :

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required
to address the topology that is shown?

C. 3
C©u Which of the following OSI layers offers reliable, connection-oriented data communication services?
37 :
B. transport

C©u
38 :

Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address
192.168.33.2 represent?
B. Primary domain name server for the host

C©u Which prompt represents the appropriate mode used for the copy running-config startup-config
39 : command ?

C. Switch-6J#
C©u
40 :
Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced.
Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company
network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause
of the problem?

C. Subnet mask incorrect enterd


C©u Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request
41 : retransmission?
A. transport

C©u Which combination of network id and subnet mask correctly identifies all IP addresses
42 : from 172.16.128.0 through 172.16.159.255?

D. 172.16.128.0 255.255.224.0
C©u
43 :

Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address
will uniquely identify a particular process running on a specific server?

D. Ip address of the server and port number of the


service
C©u
44 :

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different
devices?

C. Connection 1 - straight-through cable


Connection 2 - crossover cable
Connection 3 - straight-through cable
C©u
45 :

Refer to the exhibit. What is required on host A for a network technician to create the initial configuration
on Router1?
B. a terminal emulation program
C©u
46 :

Refer to the exhibit. The network containing router B is experiencing problems. A network associate has
isolated the issue in this network to router B. What action can be preformed to correct the network issue

C. issue the no shutdown command on interface


FastEthernet 0/1
C©u
47 :

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using
Telnet. Which statement is true about this connection?

C. The connection is made through a VTY


session on the router.
C©u A network administrator wants to restrict access to the router privileged EXEC mode. Which
48 : password should the administrator use?
A. enable

C©u Which device should be used for enabling a host to communicate with another host on a different
49 : network?
A. router

C©u Due to a security violation, the router passwords must be changed. What information can be learned from
50 : the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login

D. The entries specify three Telnet lines for remote


access.
C©u
51 :

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts
A and B in the organization. What is the likely cause of the problem?
B. The subnet mask on host C is improperly configured

C©u When connectionless protocols are implemented at the lower layers of the OSI model, what are usually
52 : used to acknowledge the data receipt and request the retransmission of missing data?
A. upper-layer connection-oriented protocols

C©u As network administrator, what is the subnet mask that allows 510 hosts given the IP
53 : address 172.30.0.0?

D. 255.255.254.0
C©u
54 :

The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address,
subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
A. IP address: 10.10.9.37 Subnet mask:
255.255.255.224 Default gateway: 10.10.9.35

C©u Which password is automatically encrypted when it is created?


55 :
A. enable secret

C©u A routing issue has occurred in you internetwork. Which of the following type of devices should be
56 : examined to isolate this error?
A. router

C©u
57 :

Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to
confirm that the next hop interface is operational. Which default gateway address should the technician
ping from PC1 to confirm this?
B. 10.0.0.254

C©u
58 :

Refer to the exhibit. Which logical topology best describes the exhibited network?
B. multi- access

C©u Which information is used by the router to determine the path between the source and destination hosts?
59 :
B. The network portion of the IP address

C©u When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used
60 : to acknowledge that the data was received and to request the retransmission of missing data?
B. an upper-layer, connection-oriented protocol or
service

C©u Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0
61 : through 172.16.159.255?
A. 172.16.128.0 255.255.224.0

C©u While configuring a router, a network technician wants to name the router. Which prompt should
62 : the technician see when entering the hostname command?
A. Router(config)#

C©u A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true
63 : about this transaction?

D. The "www.cisco.com" is the name of the web page


file that is called.
C©u Which password is automatically encrypted when it is created?
64 :
B. enable secret

C©u A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
65 :

D. Configure individual interfaces


C©u As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
66 :

C. 255.255.254.0
C©u
67 :

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running
configuration of the router is shown. Which default gateway IP address should be configured at the
PC to enable this access?
A. 10.1.192.1
C©u
68 :

Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and
Host B are unable to communicate outside the local network?

C. The getway address was assigned a broadcast


address
C©u
69 :

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

C. only computer D
C©u
70 :

Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?

C. Ethernet
C©u What is the effect of using the Router# copy running-config startup-config command on a router?
71 :

D. The contents of NVRAM will change.


C©u
72 :

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a
response to the initial tracert packet from PC1?

C. LuanDon
C©u what information can be gathered by using the command netstat?
73 :

D. active TCP connections


C©u The Layer 4 header contains which type of information to aid in the delivery of data?
74 :
B. Service port number
C©u
75 :

Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and
default gateway can allow this host to function in the network?
B. IP address: 172.16.31.37 Subnet mask:
255.255.255.224 Default gateway: 172.16.31.35

C©u Which memory contents will change as a result of using the Router# erase startup-config command on a
76 : router?

D. NVRAM
C©u Which OSI layer addressing is required to route packets between two networks?
77 :

D. Layer 3
C©u
78 :

Refer to the exhibit. Host A sends 1000 bytes of Telnet data to host B. What does host B send back if it
only receives the first 500 bytes?

D. Source 23 Destination 49321 Seq 1000 Ack 501


C©u The Layer 4 header contains which type of information to aid in the delivery of data?
79 :
B. service port number

C©u What information is used at each hop to determine where the packet will be forwarded next?
80 :
D. the source MAC address
C©u
81 :

Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X
to determine which intermediary device is responsible for this failure?

D. tracert 192.168.1.1
C©u
82 :

Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4.
How will router treat the packet?
B. The packet will be forwarded to the destination host

C©u
83 :
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for
Host A. What is a valid configuration for Host A?

C. IP address: 192.168.100.20; Subnet Mask:


255.255.255.240; Default Gateway:
192.168.100.17
C©u
84 :

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in
this network?

C. Address translation
C©u During the encapsulation process, which identifiers are added at the transport layer?
85 :
B. two applications communicating the data

C©u Which router component will have contents erased when the command erase startup-config is issued?
86 :

D. NVRAM
C©u As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
87 :
B. 255.255.254.0

C©u
88 :
Refer to the exhibit. How will data files get retrieved from the server?

C. There is a connection established to send files


from the client to the server and a second
connection to get files from the server to the
client
C©u which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0
89 : through 172.16.159.255?
B. 172.16.128.0 255.255.224.0

C©u
90 :

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using
Telnet. Which statement is true about this connection?
B. The connection is made thought a VTY session on
the router

C©u Which range of port numbers is assigned dynamically to client applications when initiating a
91 : connection to the server?
A. 49152 to 65535
C©u
92 :

Host A attempts to establish a TCP/IP session with host C...

Refer to the exhibit. Host A attempts to establish a TSP/IP session with host C. During this attempt,
a frame was captured at the FastEthernet interface fa0/1 of router Y. The packet inside the
captured frame has the IP source address 172.16.1.5 and the destination IP address is 172.16.7.24 .
What is the source MAC address of the frame at the time of capture?
A. 0060.7320.B826

C©u A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which
93 : type of password would require this login and be considered the most secure?
A. enable secret

C©u When must a router serial interface be configured with the clock rate command?
94 :
A. when the interface is functioning as a DCE
device
C©u
95 :

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which
list correctly identifies the component or protocol used at each numbered stage of the diagram?
A. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA
6.MDA 7.POP 8.MUA

C©u Two routers are connected via their serial ports in a lab environment. The routers are configured
96 : with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command
shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this
problem?
A. The clock rate command has not been entered
on the DCE interface

C©u Which statement is true about Layer 3 addresses?


97 :

C. They are used in routing decisions.


C©u
98 :
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a
frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address
0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the
destination IP address is 192.168.219.24. At which point in the network was this packet captured?

C. Leaving dallas
C©u When connectionless protocols are implemented at the lower layers of the OSI model,
99 : what are usually used to acknowledge the data receipt and request the retransmission of
missing data?

D. upper-layer connection-oriented protocols


C©u Which OSI layer offers ordered data reconstruction services?
100 :

D. application services
phiÕu soi - ®¸p ¸n (Dµnh cho gi¸m kh¶o)
m«n : ………..
m· ®Ò: ………..

01 { ) } ~ 28 { | } ) 55 ) | } ~
02 { | } ) 29 { | } ) 56 ) | } ~
03 ) | } ~ 30 { | ) ~ 57 { ) } ~
04 { | } ) 31 { | } ) 58 { ) } ~
05 { | ) ~ 32 { | ) ~ 59 { ) } ~
06 ) | } ~ 33 { ) } ~ 60 { ) } ~
07 { | } ) 34 { | ) ~ 61 ) | } ~
08 ) | } ~ 35 { | ) ~ 62 ) | } ~
09 { | ) ~ 36 { | ) ~ 63 { | } )
10 { | ) ~ 37 { ) } ~ 64 { ) } ~
11 { | } ) 38 { ) } ~ 65 { | } )
12 { ) } ~ 39 { | ) ~ 66 { | ) ~
13 { | } ) 40 { | ) ~ 67 ) | } ~
14 { ) } ~ 41 ) | } ~ 68 { | ) ~
15 ) | } ~ 42 { | } ) 69 { | ) ~
16 ) | } ~ 43 { | } ) 70 { | ) ~
17 ) | } ~ 44 { | ) ~ 71 { | } )
18 { | ) ~ 45 { ) } ~ 72 { | ) ~
19 { ) } ~ 46 { | ) ~ 73 { | } )
20 { ) } ~ 47 { | ) ~ 74 { ) } ~
21 ) | } ~ 48 ) | } ~ 75 { ) } ~
22 { ) } ~ 49 ) | } ~ 76 { | } )
23 ) | } ~ 50 { | } ) 77 { | } )
24 { ) } ~ 51 { ) } ~ 78 { | } )
25 { | } ) 52 ) | } ~ 79 { ) } ~
26 { | ) ~ 53 { | } ) 80 { | } )
27 ) | } ~ 54 ) | } ~ 81 { | } )

Вам также может понравиться