অণুজীব

network – web-dev-net-platform – কুইজ মডেল টেস্ট অনুশীলন – 18

171. The network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

  1. Port security
  2. RSTP
  3. BPDU
  4. STP

172. CDP is being used throughout the network. What are reasons why the network administrator would use CDP?

  1. To verify the type of cable interconnecting two devices
  2. To obtain the IP Address of a connected device in order to telnet to the device
  3. To obtain VLAN information from directly connected switches
  4. To determine the status of network services on a remote device

173. What is a valid reason to assign ports on VLANs on a new LAN switch?

  1. To allow more devices to connect to the network
  2. To isolate broadcast traffic
  3. To make VTP easier to implement
  4. To increase the size of the collision domain

174. The network administrator needs to determine what LAN devices to install on the network. What are advantages of using Layer 2 Ethernet switches over hubs?

  1. Increasing the size of broadcast domains
  2. Filtering packets based on MAC addresses
  3. Allowing simultaneous frame transmissions
  4. Increasing the maximum length of UTP cabling between devices

175. Which of the following can lead to the contribution of LAN traffic congestion?

  1. None of the above
  2. Multicasting
  3. Too many hosts in a broadcast domain
  4. Full duplex operation

176. Why might the network administrator set the configuration register to 0x2142 on a 2600 series Cisco router?

  1. To boot the IOS from ROM
  2. To upload a new version of the configuration file
  3. To reset the console password
  4. To upload a new version of the IOS

177. You are a trainee technician at a company. Your instructor tells you to backup an IOS image of a Cisco device to a Windows 2003 server on the network. What should you do first?

  1. Make sure that the network server can be accessed
  2. Check that the authentication for access is set.
  3. None of the above
  4. Assure that the network can transfer authenticated data.

178. What is ROM Monitor (ROMMON)?

  1. A memory component for storing the saved configuration file
  2. An operating system used for hardware troubleshooting and for password recovery
  3. A memory management tool
  4. Temporary storage space for the router operating files

179. Which statement is true about the operation of a full-duplex Ethernet network, which is being used in the LAN?

  1. Ethernet hub ports are preconfigured for full-duplex mode.In a full-duplex environment
  2. the host network card must check for the availability of the network media before transmittingNone of the above
  3. The host network card and the switch port must be capable of operating in full-duplex mode.

180. When you power up a router; in what memory is the start-up configuration normally stored in?

  1. FLASH
  2. NVRAM
  3. ROM
  4. RAM

আমাদের কাছে থাকা লক্ষ লক্ষ মডেল টেস্ট থেকে প্রাকটিজের জন্য কিছু এখানে তুলে ধরা হল। প্রতিটি অধ্যায়ের উপরে ইশিখন.কম কুইজ চ্যালেঞ্জ এ আছে শত শত মডেল টেস্ট বার বার মডেল টেস্ট দিয়ে নিজেকে যাচাই কর এবং পুরো বাংলাদেশের সকল শিক্ষার্থীর সাথে আপনার মেধা তালিকা দেখুন। প্রশ্নে কোন প্রকার ভুল থাকলে সঠিক উত্তরসহ নিচে কমেন্ট করে জানাবেন, আমরা ঠিক করে দেবো।

Leave a Reply

স্যার, কিভাবে আপনাকে সাহায্য করতে পারি?

Click one of our representatives below

Customer Support
Customer Support

Syeda Nusrat

I am online

I am offline

Technical Support
Technical Support

Ariful Islam Aquib

I am online

I am offline