manually assigned by the operating system manually assigned by the administrator statically assigned by the component to a preset resource * dynamically assigned between the component an
Trang 1ccna 1 chapter1
1 Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
RAM
* CPU
video card
sound card
operating system
2 What are two advantages of purchasing a preassembled computer? (Choose two
* usually a lower cost
exact components may be specified
extended waiting period for assembly
* adequate for performing most general applications
suited for customers with special needs
3 A user plans to run multiple applications simultaneously on a computer Which
computer component is essential to accomplish this?
* RAM
NIC
video card
sound card
storage device
4 Which adapter card enables a computer system to exchange information with other systems on a local network?
modem card
controller card
video card
sound card
* network interface card
5 What is the main storage drive used by servers, desktops, and laptops?
tape drive
* hard drive
optical drive (DVD)
floppy disk drive
6 Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
CPU
* surge suppressor
motherboard
hard drive
7 What are two examples of output peripheral devices? (Choose two.)
* printer
* speakers
flash drive
external DVD
external modem
8 What two functions does a UPS provide that a surge protector does not ? (Choose two.)
protects the computer from voltage surges
* provides backup power from an internal battery
protects the computer from sudden voltage spikes
Trang 2gives the user time to phone the electrical company
* gives the user time to safely shut down the computer if the power fails
provides backup power through a generator provided by the wall outlet
9 What is a word processor?
It is a physical computer component.
* It is a program designed to perform a specific function.
It is a program that controls the computer resources.
It is a functional part of an operating system.
10 What is the purpose of the ASCII code?
translates bits into bytes
interprets graphics digitally
translates digital computer language into binary language
* represents letters, characters, and numbers with bits
11 Why do servers often contain duplicate or redundant parts?
Servers require more power and thus require more components.
* Servers should be accessible at all times.
Servers can be designed as standalone towers or rack mounted.
Servers are required by networking standards to have duplicate parts.
12 What are two benefits of hooking up a laptop to a docking station? (Choose two.) Mobility is increased.
* An external monitor can be used.
* Alternate connectivity options may be available.
The keyboard can be changed to a QWERTY-style keyboard.
More wireless security options are available.
13 Applications can be grouped into general use software or industry specific software What are two examples of industry specific software? (Choose two.)
* CAD
presentation
spreadsheet
word processing
* medical practice management
contacts/scheduling management
14 Which three terms describe different types of computers? (Choose three.)
operating system
network
* laptop
* desktop
Windows
* mainframe
15 How is a server different from a workstation computer?
The server works as a standalone computer.
* The server provides services to clients.
The workstation has fewer applications installed.
The workstation has more users who attach to it.
16 How many values are possible using a single binary digit?
1
* 2
4
8
Trang 316
17 What measurement is commonly associated with computer processing speed?
bits
pixels
* hertz
bytes
18 What can be used to prevent electrostatic discharge (ESD)?
dry and non humid conditions
carpeted floor
* grounding strap
uncluttered work space
19 If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
* Use the testing functionality on the peripheral itself, if available.
* Verify that all cables are connected properly.
Disconnect all cables connected to the computer except those connected to the
peripheral.
* Ensure that the peripheral is powered on.
Disconnect the peripheral and verify that the computer is operating normally.
Reload the computer operating system.
20 Which two steps should be performed when installing a peripheral device? (Choose two.)
* Download and install the most current driver.
Connect the peripheral using any cable and any available port on the computer.
* Connect the peripheral using an appropriate cable or wireless connection.
Test the peripheral on another machine before installing it on the one where it will be used.
Check the computer documentation to see if the peripheral vendor is compatible with the
PC vendor.
21 In newer operating systems, how are system resources assigned by default when components are installed?
manually assigned by the operating system
manually assigned by the administrator
statically assigned by the component to a preset resource
* dynamically assigned between the component and the operating system
Trắc Nghiệm Final CCNA 1
Câu 1 : Refer to the exhibit A host is connected to hub 1 Which
combination of IP address, subnet mask and default gateway can allow this host to function in the network?
IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35
Trang 4IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1
IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35
IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
Câu 2 :An organization has been assigned network ID 10.10.128.0 and
subnet mask 255.255.224.0 Which IP address range can be used for
this organization?
10.10.128.0 to 10.10.159.255 10.10.128.0 to 10.10.160.255 10.10.128.0
to 10.10.159.0 10.10.128.0 to 10.10.192.255 10.10.128.0 to 10.10.0.159
Câu 3 : Which OSI layer addressing is required to route packets
between two networks?
Layer 1 Layer 2 Layer 3 Layer 4
Câu 4 : Refer to the exhibit What three statements are true about the
IP configuration that is shown? (Choose three)
The computer is unable to communicate outside of the local network The address that is assigned to the computer represents private addressing The IP address that is assigned to the computer is routable on the Internet The network of this computer can have 126 hosts The IP address that is assigned
to the computer is a broadcast address The prefix of the computer address is /27
Câu 5 : When connectionless protocols are implemented at the lower
layers of the OSI model, what is usually used to acknowledge that the
data was received and to request the retransmission of missing data?
Ethenet UDP an upper-layer, connection-oriented protocol or service IP
a connectionless acknowledgement
Câu 6 : Refer to the exhibit Host A is able to access resources on the
local LAN but is unable to access any resources on the Internet What
is the likely cause of this problem?
The host address is a network address The network uses private addresses The default gateway is on
Trang 5a different subnet from the host The host subnet mask in incorrect.
Câu 7 : Refer to the exhibit Assume all devices are using default
configurations How many subnets are required to address the
topology that is shown?
1 3 5 4 7
Câu 8 : Which service is used when the nslookup command is issued
on a computer?
DNS DHCP Telnet FTP
Câu 9 : Which statement is true about the ICMP protocol?
It is often filtered out of networks for security purposes If a host does not
respond to an ICMP echo request, the host is not functioning It is an application
layer protocol It is designed to make IP a reliable protocol
Câu 10 : Which range of port numbers are reserved for services that
are commonly used by applications that run on servers?
1024 to 49151 0 to 255 0 to 1023 49152 to 65535
Câu 11 : Which device should be used for enabling a host to communicate with
another host on a different network?
host router switch hub
Câu 12 : Refer to the exhibit Each media link is labeled What type of
cable should be used to connect the different devices?
Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
Câu 13 : Refer to the exhibit Host C is able to ping 127.0.0.1
successfully, but is unable to communicate with hosts A and B in the
organization What is the likely cause of the problem?
Hosts A and B are not on the same subnet as host C The subnet mask on host C is improperly
configured The FastEthernet interface fa0/0 of router 1 is wrongly configured The IP addresses
on the router serial interfaces are wrong
Trang 6Câu 14 : What information is contained in the header of Layer 3 to
help data delivery?
virtual connection identifier device physical address port number destination
host logical address
Câu 15 : Refer to the exhibit The tracert command is initiated from
PC1 to PC4 Which device will send a response to the initial tracert
packet from PC1?
London PC4 Athens Paris Ankara
Câu 16 : Refer to the exhibit A PC is communicating with another PC
on a remote network The two networks are connected by three
routers Which action will help to identify the path between the hosts?
Use the ping command at the destination Use the tracert command at the host
Use the ipconfig command at the host Use the ipconfig/all command at the
destination
Câu 17: Which application belongs to the category of the client/server model?
using Telnet to access a router scanning a document with a directly connected scanner exchanging information via instant messaging printing a document to a locally connected printer
Câu 18: Refer to the exhibit Which list refers only to end devices?
A,H,B,C A,D,E,F A,D,E,G D,E,F,G
Câu 19: What information can be gathered by using the command netstat?
the default gateway the locally configured subnet mask the routing protocol
active TCP connections
Câu 20: Which two types of media can provide bandwidth up to 1 Gb/s?(Choose two)
1000 BASE-TX 100 BASE-FX 100 BASE-T 10 BASE-T 1000 BASE-SX
Câu 21: A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on
from any of the six computers What type of network should be used?
peer-to-peer network P2P applications workgroup client-server network
Trang 7Câu 22: Which option shows how a router will route packets to a
remote network?
Câu 23: Refer to the exhibit A PC is connected to a network Which
action will verify that the PC can communicate with its default gateway?
Use the ipconfig/all command Use the ping 10.0.0.254 command Use the ipconfig command Use the ping 127.0.0.1 command
Câu 24: Refer to the exhibit While configuring a network, a
technician wired each end of a Category 5e cable as shown Which two
statements are true about this setup? (Choose two.)
The cable simulates a point-to-point WAN link The cable is terminated in a way that the transmit pin
is wired to the receive pin The cable is unusable and must be rewired The cable is suitable for connecting dissimilar types of devices The cable is suitable for connecting a switch to a router Ethernet port
Câu 25: During the encapsulation process, what identifiers are added
at the transport layer?
source and destination IP addresses source and destination port numbers
source and destination channel identifiers source and destination MAC addresses
Câu 26: Which combination of network id and subnet mask correctly
identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.192 172.16.128.0 255.255.192.0 172.16.128.0
255.255.255.224 172.16.128.0 255.255.0.0 172.16.128.0 255.255.224.0
Câu 27: Refer to the exhibit Host A is requesting a web page from the
web server Which option represents the socket to which the request is
made?
The cable simulates a point-to-point WAN link The cable is terminated in a way that the transmit pin is wired to the receive pin The cable is unusable and must be rewired The cable is suitable for connecting dissimilar types of devices The cable is suitable for connecting a switch to a router Ethernet port
Câu 25: During the encapsulation process, what identifiers are added
at the transport layer?
source and destination IP addresses source and destination port numbers
Trang 8source and destination channel identifiers source and destination MAC addresses
Câu 26: Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.192 172.16.128.0 255.255.192.0 172.16.128.0
255.255.255.224 172.16.128.0 255.255.0.0 172.16.128.0 255.255.224.0
Câu 27: Refer to the exhibit Host A is requesting a web page from the web server Which option represents the socket to which the request is made?
10.0.0.130:80 www.cisco.com 80 10.0.0.130
Câu 28: Refer to the exhibit All routers in the network are configured with the correct IP addresses and routing protocol Host A sends a packet to host B Which exhibited steps will be executed on each of the routers in the network?
Routers R1 and R2 execute all six steps Router R1 executes steps 1,2,3,4, and 6 Router R2 executes all six steps Router R1 executes all six steps Router R2 executes steps 1,2,3,4, and 6 Routers R1 and R2 execute steps 1, 2, 3, 4, and 6
Câu 29: Refer to the exhibit Which type of network design is shown?
client/server dedicated server wide area peer-to-peer
Câu 30: To send data through a network, what two flags are used to establish a session? (Choose two.)
CRC ACK Port # Ack # Seq # SYN
Câu 31: Refer to the exhibit The router of the company failed and was replayced After the replaycement, host C and D in the Education office are able to ping each other, but they are unable to access the host in the Account office What is the likely cause of the problem?
The subnet mask at the fa0/1 interface of the router is incorrectly entered The hosts in the Accounts office are not on the same subnet as the hosts in the Education office The IP address at the serial interface of the router is incorrectly configured The IP address
at the fa0/0 interface of the router is incorrectly configured
Trang 9Câu 32: Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and
retransmission of data?
application transport network access internet
Câu 33: Refer to the exhibit Which layered network model is shown
in the diagram?
Cisco TCP/IP OSI IETF
Câu 34: Which of the following are the address ranges of the private
IP addresses? (Choose three.)
127.16.0.0 to 127.31.255.255 200.100.50.0 to 200.100.25.255 172.16.0.0 to 172.31.255.255 150.150.0.0 to 150.150.255.255 10.0.0.0 to 10.255.255.255192.168.0.0 to 192.168.255.255
Câu 35: Refer to the exhibit Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
Câu 36: Which two functions of the OSI model occur at layer two? (Choose two.)
encoding routing media access control cabling physical addressing
Câu 37: Refer to the exhibit What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation DHCP services ftpd web server
Câu 38: Refer to the exhibit A host is using NAT to connect to the Internet Which three IP addresses enable this connection? (Choose three.)
10.1.1.37 10.1.1.39 10.1.1.63 10.1.1.32 10.1.1.2 10.1.1.60
Câu 39: Refer to the exhibit Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface How will a packet that is sent from host A to host B be handled by the devices on the network? network?
R1 will forward the packet to its default gateway, the next hop router R2 R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.R1 will forward
Trang 10the packet to its default gateway, the next hop router R2 R2 will forward the packet to the directly connected network 10.1.1.0/24 R1 will drop the packet because R1 does not have
a specific route in its routing table to the 10.1.1.0/24 network R1 will forward the packet to its default gateway, the next hop router R2 R2 will drop the packet because it does not
have a route that is learned by a routing protocol to network 10.1.1.0/24
Câu 40: Refer to the exhibit A network technician is trying to
determine the correct IP address configuration for Host A What is a valid configuration for Host A?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
Câu 41: Refer to the exhibit A host is using NAT to
connect to the Internet Which three IP addresses enable this connection? (Choose three.)
192.168.4.63 /26 192.168.4.129 /26 192.168.4.221 /27 192.168.4.95 /27
192.168.4.191 /26 192.168.4.51 /27
Câu 42: Refer to the exhibit Communication for hosts X and Y is
restricted to the local network What is the reason for this?
Host X and host Y belong to different networks The gateway addresses are broadcast addresses Host Y is assigned a multicast address Host X is assigned a network address
Câu 43: A network administrator is asked to design a new addressing scheme for a corporate network There are 60 users in the main office,
40 users in the branch office, 28 users in manufacturing, 12 in the
sales office, and 4 users in the research office Which VLSM
addressing scheme that uses the 192.168.88.0/24 network will fulfill
the requirements while wasting the fewest addresses?
192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28
manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research
192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28
manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research
192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27
manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research
192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26
manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research