অণুজীব

router – web-dev-net-platform – কুইজ মডেল টেস্ট অনুশীলন – 3

21. Which form of PPP error detection on Cisco routers monitors data dropped on a link?

  1. Quality
  2. Droplink
  3. Error Monitor
  4. Magic Number

22. Identify the order of the 5 step encapsulation. 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data

  1. 12
  2. 42
  3. 55

23. As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish?

  1. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0.
  2. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0.
  3. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0.
  4. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.

24. What does the command "IP name-server 255.255.255.255" accomplish?

  1. It disables domain name lookup.
  2. It sets the domain name lookup to be a local broadcast.
  3. This is an illegal command.
  4. The command is now defunct and has been replaced by "IP server-name ip any"

25. What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out

  1. All traffic is allowed.
  2. All traffic is blocked.
  3. This will block traffic from subnet 172.16.4.0 and allow all other traffic.
  4. This will allow traffic from subnet 172.16.4.0 and block all other traffic.

26. Identify the purpose of ICMP.

  1. Transporting routing updates
  2. Send error and control messages
  3. Collision detection
  4. Avoiding routing loops

27. Which protocol allows the administrator to assign a cost for passing through a network based on the type of service required

  1. RIP
  2. BGP
  3. OSPF
  4. CBT

28. Which delimiter is used for component selection

  1. ,
  2. :
  3. .
  4. %

29. You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary?

  1. 10101100 00000000
  2. 00000010 10100000
  3. 11100000 11110000
  4. 10101100 00010000

30. When using access lists, it is important where those access lists are placed. Which statement best describes access list placement?

  1. Put access lists as close to corporate headquarters as possible.
  2. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible.
  3. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible.
  4. It isn’t import where access lists are placed since the router will read and cache the whole list.

আমাদের কাছে থাকা লক্ষ লক্ষ মডেল টেস্ট থেকে প্রাকটিজের জন্য কিছু এখানে তুলে ধরা হল। প্রতিটি অধ্যায়ের উপরে ইশিখন.কম কুইজ চ্যালেঞ্জ এ আছে শত শত মডেল টেস্ট বার বার মডেল টেস্ট দিয়ে নিজেকে যাচাই কর এবং পুরো বাংলাদেশের সকল শিক্ষার্থীর সাথে আপনার মেধা তালিকা দেখুন। প্রশ্নে কোন প্রকার ভুল থাকলে সঠিক উত্তরসহ নিচে কমেন্ট করে জানাবেন, আমরা ঠিক করে দেবো।

Leave a Reply

স্যার, কিভাবে আপনাকে সাহায্য করতে পারি?

Click one of our representatives below

Customer Support
Customer Support

Syeda Nusrat

I am online

I am offline

Technical Support
Technical Support

Ariful Islam Aquib

I am online

I am offline