
network – web-dev-net-platform – কুইজ মডেল টেস্ট অনুশীলন – 12
111. As the network security administrator, you are concerned with the various possible network attacks. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
- Reconnaissance
- Trojan Horse
- Denial of Service
- Brute Force
112. You want to influence the root bridge selection within the LAN. Which value is used by spanning tree protocol to elect a root bridge?
- Amount of RAM
- Speed of the links
- MAC Address
- IOS Version
113. Which of the following are associated with the application layer (layer 7) of the OSI model?
- TCP
- Ping
- Telnet
- None of the above
114. Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
- Serial0/1 is up line protocol is up
- Serial0/1 is down line protocol is down
- Serial0/1 is up line protocol is down
- Serial0/1 is administratively down line protocol is down
115. At which OSI layer is a logical path created between two host systems named PC1 and PC2 on the LAN?
- Data link
- Network
- Session
- Physical
116. Users have noticed extremely slow network performance, intermittent connectivity, and connection losses. After entering the "show interfaces" command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?
- Trunking mode mismatch
- Improperly configured root bridge
- Duplex mismatch
- A routing loop
117. While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out." At which OSI layer is this problem associated with?
- The data link layer
- The network layer
- The access layer
- The application layer
118. After making some network changes you power off and then power on your Cisco router named PC1. What sequence of events occurs when PC1 is powered up?
- Perform POST
- locate Cisco IOS software
- load the Cisco IOS software
- locate configuration statements
119. A receiving host on the network named PC1 computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
- Application
- Data Link
- Presentation
- Session
120. Network equipment supporting the use of flow control mechanisms has been recently installed in the network. What is the purpose of flow control in a data network?
- It reassembles segments in the correct order on the destination device.
- It provides a mechanism for the receiver to control the transmission speed.
- It ensures that data is retransmitted if an acknowledgment is not received.
- It regulates the size of each datagram segment.
আমাদের কাছে থাকা লক্ষ লক্ষ মডেল টেস্ট থেকে প্রাকটিজের জন্য কিছু এখানে তুলে ধরা হল। প্রতিটি অধ্যায়ের উপরে ইশিখন.কম কুইজ চ্যালেঞ্জ এ আছে শত শত মডেল টেস্ট বার বার মডেল টেস্ট দিয়ে নিজেকে যাচাই কর এবং পুরো বাংলাদেশের সকল শিক্ষার্থীর সাথে আপনার মেধা তালিকা দেখুন। প্রশ্নে কোন প্রকার ভুল থাকলে সঠিক উত্তরসহ নিচে কমেন্ট করে জানাবেন, আমরা ঠিক করে দেবো।