2014年10月10日 星期五

CCNA 1~50題

( ) 1.Why does the Industry Technology need a layerd networking model?(choose2)
           A. To make the change of the applications of one layer without change everything else easier.
           B. To make the change of the integrated applications easier.
           C. To make sure everybody understands the application.
           D. To make sure that every vendor uses the same application.

( ) 2.What is the right sequence in decapsulation data?
           A. bits,   Frames,  Data grams,  Segments,  Data
           B. bits,  Data grams,  Segments,  Frames,  Data
           C. Data,  Segments,  Data grams,  Frames,  bits
           D. Data,  Data grams,  Segments,  Frames,  bits

( ) 3.What is the right sequence in encapsulation data?
           A. bits,   Frames,  Data grams,  Segments,  Data
           B. bits,  Data grams,  Segments,  Frames,  Data
           C. Data,  Segments,  Data grams,  Frames,  bits
           D. Data,  Data grams,  Segments,  Frames,  bits

( ) 4.What are the right description of data link layer?(choose3)
           A. Assigned by IEEE
           B. Assigned by AAA
           C. 4 bytes long
           D. 6 bytes long
           E. Used as a MAC address
           F. Used as a Network address

( ) 5.Which one of following is used as transmitting and receiving system in data link layer?           
           A. Bits
           B. Ethernet frames
           C. TCP packets
           D. IP packets
           E. data

( ) 6.What is difference between Network address and data link address?             
           A. Network address is a physical address and data link address is a logical address.
           B. Network address is a logical address and data link address is a logical address.
           C. Network address is a physical address and data link address is a physical address.
           D. Network address is a logical address and data link address is a physical address.

( ) 7.When the device receiving data,which one of the method is used to temporarily store excess data?            
           A. addressing
           B. encapsulation
           C. decapsulation
           D. Buffering
           E. Windowing

( ) 8.Which one of the message is used to the decrease the speed of the data transmission to sending device, when          the buffer of receiving device is full?            
           A. Source-quench
           B. Buffering
           C. Full
           D. Windowing
           E. Syn

( ) 9.Which three of the following devices can an administrator use to segment their LAN?            
           A. Hubs
           B. Repeaters
           C. Switches
           D. Bridges
           E. Routers

( ) 10.Which functions are used at the physical layer?(choose2)      
           A. Windowing
           B. Voltage level
           C. Network layer
           D. Data rate
           E. Assigned IP address

( ) 11.In the transport layer, which one of the following is used with connection-oriented transmission?     
           A. Physical Circuit
           B. Virtual Circuit
           C. Assigned IP address
           D. connectionless

( ) 12.Which functions are used in the Network layer?(choose2)     
           A. Physical addressing
           B. Logical addressing
           C. Windowing
           D. Path selection
           E. Conneection-Oriented

( ) 13.Which OSI layer is associated with the acknowledgement of transmission, sequencing, and flow control across          a network?     
           A. Layer 7
           B. Layer 6
           C. Layer 5
           D. Layer 4
           E. Layer 3

( ) 14.The Magic corporate LAN consists of one large flat network. You use a router to segment this LAN into two                 separate network. What will be the affect of this change?     
           A. It will increase the number of collisions.
           B. The number of broadcast domains will be decreased.
           C. It will make the broadcasting of traffic between domains more efficient between segments.
           D. It will prevent segment 1's broadcasts from getting to segment 2.
           E. It will allow segment 1's broadcasts to segment 2.

( ) 15.Which functions are used at the data link layer?     
           A. Assigned IP address
           B. Physical adressing
           C. Error notification
           D. Flow control
           E. Routing
           F. Convert data into segments

( ) 16.Which one of the layer deal with physical address (a flat address)?     
           A. Data Link
           B. Network
           C. Transport
           D. Session

( ) 17.Which one of the layer deal with logical address?     
           A. Data Link
           B. Network
           C. Transport
           D. Session   
        
( ) 18.In the network layer,which one of the potocols use to find the Mac address?     
           A. TCP
           B. UDP
           C. RARP
           D. ARP 
            
( ) 19.Which one of layer deal with conversion and code formatting Service?     
           A. Physical
           B. Network
           C. Data link
           D. Transport 
           E. Session 
           F. Presentation
           
( ) 20.Which datas are the presentation layer for dealing with?(choose4)     
           A. SMTP
           B. PICT
           C. ASCII
           D. MIDI
           E. SQL
           F. EBCDIC
            
( ) 21.Which one of the name is the same as hardware address?     
           A. Session address
           B. Logical address
           C. Mac address
           D. Email address
           E. Network address
            
( ) 22.which one of layer does arouter operate at?   
           A. Transport
           B. Data link
           C. Application
           D. Session
           E. Network
            
( ) 23.Which applications cannot tolerate paclets resequencing and delays?(choose2)   
           A. Voice
           B. E-mail
           C. Work
           D. Video
           E. Excel
            
( ) 24.Which method is used to allow a fixed number of data sending before an acknowledge?   
           A. Caching
           B. Buffering
           C. Source-quench messages
           D. Windowing
            
( ) 25.which methods are used to implement flow control?(choose3)   
           A. Assigned IP address
           B. Acknowledgements
           C. RIP
           D. Windows
           E. Sliding windoes
           F. DNS
            
( ) 26.Why do we need a layer networking model?(choose3)   
           A. For the same application
           B. TO make it easier to learn,understand and change
           C. IN modular internetworkung functions,it is easier to make the integration for multivendor
           D. TO promote a single vendor solution
           E. For separate layer,it is easier to develop mutivendor integration solutions.
            
( ) 27.What will data encapsulation take place at the network layer?   
           A. Convert ti bits
           B. Add the segment data
           C. Add the network address
           D. Add the local address
            
( ) 28.What will data encapsulation happens at the data link layer?
           A. Add the segment data
           B. Add the Application data
           C. Add the network address
           D. Add the local address
           E. Convert ti bits
            
( ) 29.what will data encapsulation happens at the physical layer?
           A. Convert ti bits
           B. Add the local address
           C. Add the network address
           D. Add the segment data
            
( ) 30.Which one of the Ethernet Implementations use a Rj45 connector
           A. 10 Base 2
           B. 10 Base 5
           C. 100 Base TX
           D. 100 Base FX
            
( ) 31.Which type of cable will you use to connect a pc to switch?
           A. straight through cable
           B. thin cable
           C. crossover cable
           D. thick cable
            
( ) 32.Which connection will need a straight through cable?(choose3)
           A. PC to Hub
           B. Hub to switch
           C. switch to Router
           D. Router to Router
           E. Switch to server
            
( ) 33.Which to of following one limited to a 100 mater length(choose2)
           A. 10 Base 2
           B. 10 Base 5
           C. 10 Base T
           D. 100 Base TX
           E. 100 Base FX
            
( ) 34.Which type of cable will you use to connect two routers?
           A. straight through
           B. rollover
           C. RG58
           D. Crossover
            
( ) 35.Which type of cable will you use to connect switch to a router?
           A. straight through
           B. rollover
           C. Crossover
           D. RG58
            
( ) 36.Which type of connector will you use to connect the serial port on Cisco routers?
           A. Rj-11
           B. Cisco 60 pin connector
           C. Rj-45
           D. EIA/TIA-232
            
( ) 37.Which one of following is used at physical layer?
           A. Segments
           B. Datagrams
           C. Frames
           D. Bits
            
( ) 38.Which two of followings are used at the session layer?
           A. ping
           B. SQL
           C. NFS
           D. TCP
           E. LLC
            
( ) 39.Which two of followings will LLC(Data link layer) provide?
           A. RIP
           B. OSPF
           C. flow control
           D. IP sddress
           E. Service Access Points
            
( ) 40.Which two of followings will you used at the network layer?
           A. IP
           B. IPX
           C. TCP
           D. UDP
           E. SPX
            
( ) 41.Which followings are used at presentation layer?(choose3)
           A. SQL
           B. ASCII
           C. ABCD
           D. JPEG
           E. MIDI
           F. RPC
            
( ) 42.Which layer controls the communication between applications?
           A. Session
           B. Transport
           C. Network
           D. Data Link
           E. Physical
            
( ) 43.Which two of followings are used at the transport layer?
           A. IP
           B. IPX
           C. TCP
           D. SPX
           E. SQL
            
( ) 44.Which command can be used to test connectivity of application layer between 2 hosts?
           A. ping
           B. show
           C. show running-config
           D. telnet
           E. traceroute
            
( ) 45.Which one of following is the last step in data encapsulation?
           A. User information --> data
           B. Frames --> bits
           C. Segment --> datagrams
           D. data --> segment
           E. datagrams --> Frames
            
( ) 46.Which layer will MIDI and EBCDIC work at?
           A. Session layer
           B. Network layer
           C. Presentation layer
           D. Application layer
            
( ) 47.Which one of following is used to transmit at a time?
           A. Full Duplex
           B. Half Duplex
           C. Multiplex
           D. Demultiplex
            
( ) 48.Which following are used at the Application layer?(choose2)
           A. TCP
           B. IP
           C. E-mail
           D. SQL
           E. Word Processor
            
( ) 49.Which one of the statements is true about Ethernet?(choose2)
           A. The station listens before transmitting data
           B. The station transmits before listening data
           C. The station backs off when the collision occurs
           D. The station forward data when the collision occurs
            
( ) 50.Which layer will control end to end communication?
           A. Application layer
           B. Presentation layer
           C. Session layer
           D. Transport layer
           E. Network layer

沒有留言:

張貼留言