
network – web-dev-net-platform – কুইজ মডেল টেস্ট অনুশীলন – 11
101. You want the text "Unauthorized access prohibited!" to be displayed before the login prompt every time someone tries to initiate a Telnet session to a router, as shown in the example below: Router#telnet 192.168.15.1 Trying 192.168.15.1 … Open Unauthorized access prohibited! User Access Verification Password: Which command can be used to configure this message?
- vty motd "Unauthorized access prohibited!"
- banner exec y Unauthorized access prohibited! Y
- banner motd x Unauthorized access prohibited! X
- login banner x Unauthorized access prohibited! X
102. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
- Start a new session using UDP
- Obtain a new IP address from the DHCP server
- Decrease the window size
- Use a different source port for the session
103. After working on a router, some problems arise and you wish to view the commands that you recently entered. Which IOS command opens the history buffer and displays the most recently entered commands?
- Show buffers
- Show history
- Show terminal buffer
- Show typed commands
104. What is a characteristic of Telnet?
- It requires an enterprise license in order to be implemented
- It is no longer supported on Cisco network devices.
- It is more secure than SSH
- It sends data in clear text format.
105. What is a technique that directly connects the sender and the receiver in an unbroken path
- |ATM|Trunk switching|Packet switching
106. You need to add a wireless access point to a new office. Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?
- Configure MAC address filtering to permit the client to connect to the AP
- Configure open authentication on the AP and the client
- Set the SSID value in the client software to public
- Set the SSID value on the client to the SSID configured on the AP
107. How many types of metadata exists?
- 2
- 1
- 4
- 3
108. In a relational schema, each tuple is divided into fields called…?
- Queries
- Relations
- All of these
- Domains
109. Which of the following commands would be applied to a WAN interface, but not on LAN Interface?
- None of the above
- IP address
- no shutdown
- encapsulation PPP
110. Which of the following are true of Ethernet technology?
- Hosts use a logical ring topology.
- Hosts must wait for an electronic signal to transfer data.
- Hosts are directly connected to a wiring concentrator called a MSAU.
- Hosts use a logical bus topology
আমাদের কাছে থাকা লক্ষ লক্ষ মডেল টেস্ট থেকে প্রাকটিজের জন্য কিছু এখানে তুলে ধরা হল। প্রতিটি অধ্যায়ের উপরে ইশিখন.কম কুইজ চ্যালেঞ্জ এ আছে শত শত মডেল টেস্ট বার বার মডেল টেস্ট দিয়ে নিজেকে যাচাই কর এবং পুরো বাংলাদেশের সকল শিক্ষার্থীর সাথে আপনার মেধা তালিকা দেখুন। প্রশ্নে কোন প্রকার ভুল থাকলে সঠিক উত্তরসহ নিচে কমেন্ট করে জানাবেন, আমরা ঠিক করে দেবো।