تم إيقاف المشاركات وأصبح مركز بوابة العرب التعليمي للتصفح فقط


العودة   مركز بوابة العرب التعليمي > قسم الشبكات وأنظمة التشغيل > منتدى الشبكات العام

إضافة رد
 
أدوات الموضوع
  #1  
قديم 02-04-2008, 01:33 PM
الصورة الرمزية eng_bsbs
eng_bsbs eng_bsbs غير متواجد حالياً
 
تاريخ التسجيل: Mar 2008
المشاركات: 11
Thumbs up الى كل من يستطيع حل اسئله اختبار ccna v4.0




1 Which process do routers use to determine the subnet network address
based upon a given IP address and subnet mask?

binary adding
hexadecimal anding
binary division
binary multiplication
binary ANDing




2

Refer to the exhibit. Host A is connected to the LAN, but it cannot get
access to any resources on the Internet. The configuration of the host
is shown in the exhibit. What could be the cause of the problem?

The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
The default gateway is on a different subnet from the host.




3 Which statements are true regarding IP addressing? (Choose two.)

NAT translates public addresses to private addresses destined for the
Internet.
Only one company is allowed to use a specific private network address
space.
Private addresses are blocked from public Internet by router.
Network 172.32.0.0 is part of the private address space.
IP address 127.0.0.1 can be used for a host to direct traffic to
itself.




4 What is the primary reason for development of IPv6?

security
header format simplification
expanded addressing capabilities
addressing simplification




5 Which of the following network devices are recommended to be assigned
static IP addresses? (Choose three.)

LAN workstations
servers
network printers
routers
remote workstations
laptops




6 What subnet mask would a network administrator assign to a network
address of 172.30.1.0 if it were possible to have up to 254 hosts?

255.255.0.0
255.255.255.0
255.255.254.0
255.255.248.0




7 Which IPv4 subnetted addresses represent valid host addresses?
(Choose three.)

172.16.4.127 /26
172.16.4.155 /26
172.16.4.193 /26
172.16.4.95 /27
172.16.4.159 /27
172.16.4.207 /27




8

Refer to the exhibit. A network administrator has to develop an IP
addressing scheme that uses the 192.168.1.0 /24 address space. The network
that contains the ****** link has already been addressed out of a
separate range. Each network will be allocated the same number of host
addresses. Which network mask will be appropriate to address the remaining
networks?

255.255.255.248
255.255.255.224
255.255.255.192
255.255.255.240
255.255.255.128
255.255.255.252




9 What is a group of hosts called that have identical bit patterns in
the high order bits of their addresses?

an internet
a network
an octet
a radix




10

Refer to the exhibit. Which network prefix will work with the IP
addressing scheme shown in the graphic.

/24
/16
/20
/27
/25
/28




11 What two things will happen if a router receives an ICMP packet
which has a TTL value of 1 and the destination host is several hops away?
(Choose two.)

The router will discard the packet.
The router will decrement the TTL value and forward the packet to the
next router on the path to the destination host.
The router will send a time exceeded message to the source host.
The router will increment the TTL value and forward the packet to the
next router on the path to the destination host.
The router will send an ICMP Redirect Message to the source host.




12 Given the IP address and subnet mask of 172.16.134.64
255.255.255.224, which of the following would describe this address?

This is a useable host address.
This is a broadcast address.
This is a network address.
This is not a valid address.




13 What is the network address of the host 172.25.67.99 /23 in binary?

10101100. 00011001.01000011.00000000
10101100. 00011001.01000011.11111111
10101100. 00011001.01000010.00000000
10101100. 00011001.01000010.01100011
10101100. 00010001.01000011. 01100010
10101100. 00011001.00000000.00000000




14 Which three IP addresses are private? (Choose three.)

172.168.33.1
10.35.66.70
192.168.99.5
172.18.88.90
192.33.55.89
172.35.16.5




15 A router interface has been assigned an IP address of 172.16.192.166
with a mask of 255.255.255.248. To which subnet does the IP address
belong?

172.16.0.0
172.16.192.0
172.16.192.128
172.16.192.160
172.16.192.168
172.16.192.176




16 Which of the following are features of IPv6? (Choose three.)

larger address space
faster routing protocols
data types and classes of service
authentication and encryption
improved host naming conventions
same addressing scheme as IPv4




17

Refer to the exhibit. A network administrator discovers that host A is
having trouble with Internet connectivity, but the server farm has full
connectivity. In addition, host A has full connectivity to the server
farm. What is a possible cause of this problem?

The router has an incorrect gateway.
Host A has an overlapping network address.
Host A has an incorrect default gateway configured.
Host A has an incorrect subnet mask.
NAT is required for the host A network.




18 How many bits make up an IPv4 address?

128
64
48
32




19

Refer to the exhibit. Why would the response shown be displayed after
issuing the command ping 127.0.0.1 on a PC?

The IP settings are not properly configured on the host.
Internet Protocol is not properly installed on the host.
There is a problem at the physical or data link layer.
The default gateway device is not operating.
A router on the path to the destination host has gone down.




20

Refer to the exhibit. The network administrator has assigned the
internetwork of LBMISS an address range of 192.168.10.0. This address range
has been subnetted using a /29 mask. In order to accommodate a new
building, the technician has decided to use the fifth subnet for configuring
the new network (subnet zero is the first subnet). By company
policies, the router interface is always assigned the first usable host address
and the workgroup server is given the last usable host address. Which
configuration should be entered into the workgroup server's properties
to allow connectivity to the network?

IP address: 192.168.10.38 subnet mask: 255.255.255.240 default
gateway: 192.168.10.39
IP address: 192.168.10.38 subnet mask: 255.255.255.240 default
gateway: 192.168.10.33
IP address: 192.168.10.38 subnet mask: 255.255.255.248 default
gateway: 192.168.10.33
IP address: 192.168.10.39 subnet mask: 255.255.255.248 default
gateway: 192.168.10.31
IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway:
192.168.10.1




21 What three facts are true about the network portion of an IPv4
address? (Choose three.)

identifies an individual device
is identical for all hosts in a broadcast domain
is altered as packet is forwarded
varies in length
is used to forward packets
uses flat addressing
























16 Which statements are correct concerning the role of the MTA in
handling email? (Choose three.)

routes email to the MDA on other servers
receives email from the client's MUA
receives email via the POP3 protocol
passes email to the MDA for final delivery
uses SMTP to route email between servers
delivers email to clients via the POP3 protocol




17 What are three properties of peer-to-peer applications? (Choose
three.)

acts as both a client and server within the same communication
requires centralized account administration
hybrid mode includes a centralized directory of files
can be used in client-server networks
does not require specialized software
centralized authentication is required




18 What are two forms of application layer software? (Choose two.)

applications
dialogs
requests
services
syntax




19 What is the automated service that matches resource names with the
required IP address?

HTTP
SSH
FQDN
DNS
Telnet
SMTP




20 What is the role of the OSI application layer?

provides segmentation of data
provides encryption and conversion of data
provides the interface between the applications on either end of the
network
provides control of all the data flowing between the source and
destination devices




1 What application layer protocol is commonly used to support for file
transfers between a client and a server?

HTML
HTTP
FTP
Telnet




2 Which application layer protocols correctly match a corresponding
function? (Choose two.)

DNS dynamically allocates IP addresses to hosts
HTTP transfers data from a web server to a client
POP delivers email from the client to the server email server
SMTP supports file sharing
Telnet provides a virtual connection for remote access




3 Which email components are used to forward mail between servers?
(Choose two.)

MDA
IMAP
MTA
POP
SMTP
MUA




4 Which layer of the OSI model supplies services that allow user to
interface with the network?

physical
session
network
presentation
application
transport




5 How does the application layer on a server usually process multiple
client request for services?

ceases all connections to the service
denies multiple connections to a single daemon
suspends the current connection to allow the new connection
uses support from lower layer functions to distinguish between
connections to the service




6 As compared to SSH, what is the primary disadvantage of telnet?

not widely available
does not support encryption
consumes more network bandwidth
does not support authentication




7 What three protocols operate at the Application layer of the OSI
model? (Choose three.)

ARP
DNS
PPP
SMTP
POP
ICMP




8 What are two characteristics of clients in data networks? (Choose
two.)

use daemons
initiate data exchanges
are repositories of data
may upload data to servers
listen for requests from servers




9

Refer to the exhibit. What is the destination port for the
communication that is represented on line 5?

80
1261
15533
3912
65520




10 Which two protocols are used to control the transfer of web
resources from a web server to a client browser? (Choose two.)

ASP
FTP
HTML
HTTP
HTTPS
IP




11 What application layer protocol describes the services that are used
for file sharing in Microsoft networks?

DHCP
DNS
SMB
SMTP
Telnet




12 What are two characteristics of peer-to-peer networks? (Choose two.)

scalable
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server




13 What is the purpose of resource records in DNS?

temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a query
passes authentication information between the server and client




14 A small home network has been installed to interconnect three
computers together for gaming and file sharing. What two properties represent
this network type? (Choose two.)

User accounts are centralized.
Security is difficult to enforce.
Specialized operating system software is required.
File permissions are controlled by a single computer.
A computer that responds to a file sharing request is functioning as a
server.




15 A network administrator is designing a network for a new branch
office of twenty-five users. What are the advantages of using a
client-server model? (Choose two.)

centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure
__________________
[IMG][/IMG]

التعديل الأخير تم بواسطة eng_bsbs ; 02-04-2008 الساعة 01:37 PM
رد مع اقتباس
  #2  
قديم 05-04-2008, 01:41 AM
الصورة الرمزية eng_bsbs
eng_bsbs eng_bsbs غير متواجد حالياً
 
تاريخ التسجيل: Mar 2008
المشاركات: 11
افتراضي

بليييييييييييييييز ارجو الحل امتحاني الاسبوع القادم
__________________
[IMG][/IMG]
رد مع اقتباس
  #3  
قديم 07-04-2008, 01:27 PM
الصورة الرمزية thedove75
thedove75 thedove75 غير متواجد حالياً
 
تاريخ التسجيل: Mar 2002
المشاركات: 1,260
افتراضي

إنشاء الله أقوم بحلها و بعثها لك
رد مع اقتباس
  #4  
قديم 29-03-2010, 04:07 PM
البرنس 55 البرنس 55 غير متواجد حالياً
 
تاريخ التسجيل: Jan 2010
المشاركات: 6
افتراضي

اقتباس:
المشاركة الأصلية كتبت بواسطة eng_bsbs مشاهدة المشاركة
1 Which process do routers use to determine the subnet network address
based upon a given IP address and subnet mask?

binary adding
hexadecimal anding
binary division
binary multiplication
binary ANDing




2

Refer to the exhibit. Host A is connected to the LAN, but it cannot get
access to any resources on the Internet. The configuration of the host
is shown in the exhibit. What could be the cause of the problem?

The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
The default gateway is on a different subnet from the host.







12 What are two characteristics of peer-to-peer networks? (Choose two.)

scalable
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server




13 What is the purpose of resource records in DNS?

temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a query
passes authentication information between the server and client








15 A network administrator is designing a network for a new branch
office of twenty-five users. What are the advantages of using a
client-server model? (Choose two.)

centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure
السلام عليكم ورحمة الله وبركاته
اخويeng_bsbs
لو سمحت اذا كانت عندك اسئلة النهائي لccna2 ياليت ترسلها
هذا ايميلي
?????????????????????????????
ولك خالص الشكر (واتمنى لك التوفيق)

التعديل الأخير تم بواسطة Abo Samra ; 29-03-2010 الساعة 07:08 PM سبب آخر: يمنع وضع عناوين الايملات الشخصية
رد مع اقتباس
إضافة رد

أدوات الموضوع

تعليمات المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code is متاحة
كود [IMG] متاحة
كود HTML معطلة

الانتقال السريع

المواضيع المتشابهه
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
400 برنامج، والأروع انها..... The Godfather منتدى البرامج 2 05-10-2007 04:25 PM


الساعة الآن 07:49 PM.


جميع الحقوق محفوظة لشبكة بوابة العرب
New Page 4
 
 
Copyright © 2000-2018 ArabsGate. All rights reserved
To report any abuse on this website please contact abuse@arabsgate.com