النتائج 1 إلى 8 من 8

الموضوع: ادخلوا فورا عاجل جدا جدا جدا

  1. #1
    عضو
    تاريخ التسجيل
    Aug 2006
    المشاركات
    97
    معدل تقييم المستوى
    0

    ادخلوا فورا عاجل جدا جدا جدا

    السلام عليكم
    ارجوكم يوم غد امتحاني وعندي كم سؤال غير متأكده من جوابه الصحيح ارجوكم ساعدوني وبأقرب وقت رجاءا لان ليس لدي مجال غير الكم ساعه الباقيه .
    سوف ادرج لكم الاسئله مع حلولها وارجوا ابلاغي بالصح والخطأ وما هو التصحيح.
    مشكوووووووووووووره جدا جدا ولن انسى فضل اي احد عليّ
    الاسئله هي

    1-
    Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true concerning the retransmission of the datagram?

    *Datagram retransmission occurs when the retransmission timer expires in the source host.

    Datagram retransmission occurs when the retransmission timer expires in the destination host.

    Datagram retransmission is controlled by the application layer protocol.

    Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.

    2-
    A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?

    *SNMP

    SMTP

    HTTP

    TFTP

    3-
    Which of the following commands could be used on a Windows-based computer to view the current IP configuration of the system? (Choose two.)

    configip

    ifconfig

    *ipconfig

    *winipcfg

    winipconfig

    4-
    Which of the following describe the token-passing logical topology? (Choose two.)

    *FDDI is an example of a token-passing network.

    Token-passing logical topologies must also be physical ring topologies.

    One of the disadvantages of the token-passing logical topology is the high collision rate.

    Computers transmit data after "listening" to the wire to detect other traffic.

    *Computers are allowed to transmit data only when they possess a token.

    5-
    How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?

    with a routed protocol

    with a routing protocol

    *with a static route

    with a directly connected route

    6-
    Which type of address is 192.168.17.134/29?

    *host address

    network address

    broadcast address

    multicast address


    7-

    Refer to the exhibit. A network administrator attempts to increase the available bandwidth for workstation A by setting the NIC to full-duplex mode. After the configuration is changed, there are increased collisions and errors occurring. Why is this occurring in the network?

    The NIC is no longer detecting collisions. 
    The switch will not support full-duplex mode.
    The hub will be continually producing a jam signal.
    The cabling will not support bidirectional transmissions.

    8-

    A company has the following addressing scheme requirements:

    -currently has 25 subnets
    -uses a Class B IP address
    -has a maximum of 300 computers on any network segment
    -needs to leave the fewest unused addresses in each subnet

    What subnet mask is appropriate to use in this company?

    255.255.240.0
    255.255.248.0
    255.255.254.0 
    255.255.255.0
    255.255.255.128
    255.255.255.248

    9-
    الرسم هو الصندوق الاول مربوط به اربع حاسبات ومربوط بالصندوق الثاني الذي هو مربوط عالانترنيت
    Refer to the exhibit. An instructor in the network class has given the students the network diagram and asks the students to select the appropriate network devices. The goals are to provide a collision-free LAN environment and to provide Internet connectivity. What is the correct design?

    Replace Box 1 with a hub and Box 2 with a router. 
    Replace Box 1 with a router and Box 2 with a bridge.
    Replace Box 1 with a Layer 2 switch and Box 2 with a router.
    Replace Box 1 with a router and Box 2 with a Layer 2 switch.
    Replace Box 1 with a bridge and Box 2 with a Layer 2 switch.

    10-
    Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?

    255.255.224.0
    255.255.240.0
    255.255.248.0
    255.255.252.0 
    255.255.254.0
    255.255.255.0

    11-
    Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?

    00-06-5B-88-DF-C3
    00-B0-D0-7F-F7-46
    00-0F-24-85-75-C0
    00-0B-E5-64-BD-44
    00-08-A3-B6-CE-02 
    00-08-A3-B6-CE-03

    12-
    Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configurations that can be applied to the host for connectivity? (Choose two.)

    Address - 192.168.1.14
    Gateway - 192.168.1.33

    Address - 192.168.1.45
    Gateway - 192.168.1.33

    Address - 192.168.1.32
    Gateway - 192.168.1.33

    Address - 192.168.1.82 
    Gateway - 192.168.1.65

    Address - 192.168.1.63
    Gateway - 192.168.1.65

    Address - 192.168.1.70 
    Gateway - 192.168.1.65

    13-
    A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)

    After the jam signal, all transmission stops for a random period. 
    When the collision is detected, the hosts stop transmission immediately.
    When the collision is detected, the hosts stop transmission after eight microseconds.
    When the backoff period expires, the hosts involved in the collision have priority to transmit.
    When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit. 
    When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision. 

    14-
    A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?

    FTP and SNMP will use the same port number.
    FTP uses TCP to establish a session before any data is transferred. 
    The UDP session will reorder the SNMP data as it is received by the network management system.
    The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.

    15-
    A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?

    16-

    Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

    172.16.128.0 255.255.255.224
    172.16.128.0 255.255.0.0
    172.16.128.0 255.255.192.0
    172.16.128.0 255.255.224.0 
    172.16.128.0 255.255.255.192

    17-
    Which subnet masks would be valid for a subnetted Class B address? (Choose two.)

    255.0.0.0 
    255.254.0.0
    255.224.0.0 
    255.255.0.0
    255.255.252.0
    255.255.255.192

    18-

    A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?

    The switch drops the frame.
    The switch sends the frame out port 3.
    The switch sends the frame out ports 1, 2, and 4.
    The switch sends the frame out ports 2, 3, and 4. 
    The switch sends the frame out ports 1, 2, 3, and 4.

    19-
    A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?

    The cable will be able to pass traffic between the devices. 
    The cable has reversed-pairs, which will degrade the signal quality.
    The cable has split-pairs, which will increase crosstalk and create an unreliable link.
    The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.

    20-
    What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)

    Existing NICs might need to be upgraded. 
    Existing switches might need to be upgraded. 
    Existing NICs must support half-duplex mode.
    Existing UTP wiring must be replaced with fiber.
    Existing UTP must be tested for CAT 5e compatibility. 
    Existing network topology must support shared media.

    21-
    Refer to the received frame in the exhibit. In what two ways is the information from the received frame used by a switch? (Choose two.)

    192.168.10.5 is used to create an ARP request.
    192.168.10.5 is used to build the forwarding table.
    1234.5678.1abc is stripped from the frame header.
    192.168.10.11 is left intact as the frame is forwarded

    هذه هي الاسئله وحلولها ارجوكم من يعرف الجواب الصحيح يجاوب فأنا عندي هذه الاسئله وحلولها لكن بعض منها عندما احلها تخرج غير نتيجه ارجوكم ساعدوني وبسرعهههههههههه.
    شكري الى الجميع على هذا التعاون وخصوصا الاخ العزيز يحيى من سوريا ليته يتأكد من الاجوبه بنفسه لأن كثير من الاسئله منه لكن قد تكون الاسهم زحفت فبعض الاجابات خاطئه مثلا كما موجود في الملزمه وليس هذا الترقيم سؤال 12 وسؤال 15
    مع خالص شكري وتقديري

    انا بانتظار الاجوبه الله يخليكم بسرعه غدا امتحاني

  2. #2
    عضو
    تاريخ التسجيل
    Aug 2006
    المشاركات
    97
    معدل تقييم المستوى
    0

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    هنالك نقطتين اضافيه نسيتها من السؤال الاخير رقم 21 وهي
    The switch compares 192.168.10.11 to the addresses in the routing table to make the forwarding decision.
    To make the forwarding decision, the switch looks in its switch table for address aaaa.bbbb.cccc. 

    شكرا جزيلا بأنتظار اجاباتكم بسرعهههههههههههههههههههههه ارجوكم محتاجه الاسئله كثيرا
    مع السلامه وفقكم الله جميعا

  3. #3
    عضو
    تاريخ التسجيل
    May 2006
    المشاركات
    326
    معدل تقييم المستوى
    0

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    in my thin and allah a3lam
    two is TFTP
    three is IPCONFIG ..try it from the cmd
    five is routing protocol
    six is Host address
    seven we need the exhibit

  4. #4
    الصمود
    زائر

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    الاجابات باللون الازرق

    اقتباس المشاركة الأصلية كتبت بواسطة ccna instructor
    السلام عليكم
    ارجوكم يوم غد امتحاني وعندي كم سؤال غير متأكده من جوابه الصحيح ارجوكم ساعدوني وبأقرب وقت رجاءا لان ليس لدي مجال غير الكم ساعه الباقيه .
    سوف ادرج لكم الاسئله مع حلولها وارجوا ابلاغي بالصح والخطأ وما هو التصحيح.
    مشكوووووووووووووره جدا جدا ولن انسى فضل اي احد عليّ
    الاسئله هي

    1-
    Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true concerning the retransmission of the datagram?

    *Datagram retransmission occurs when the retransmission timer expires in the source host.

    Datagram retransmission occurs when the retransmission timer expires in the destination host.

    هذا هو الجواب وذلك لأن الUDP هو عبارة عن best effort ولا يهتم اذا وصلت المعلومات ام لم تصل فهو يبعث المعلومات ولا يبحث في وصولها من عدمه وذلك لانه لا يستخدم ACK
    Datagram retransmission is controlled by the application layer protocol.



    Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.

    2-
    A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?

    *SNMP

    SMTP

    HTTP

    هذا هو الجواب وذلك لان هذا البروتوكول نستطيع من خلاله تحميل نسخة من الios على الراوتر ونستطيع عمل update and backup من خلاله
    TFTP

    3-
    Which of the following commands could be used on a Windows-based computer to view the current IP configuration of the system? (Choose two.)

    configip

    ifconfig

    *ipconfig

    *winipcfg

    winipconfig

    4-
    Which of the following describe the token-passing logical topology? (Choose two.)

    *FDDI is an example of a token-passing network.
    Token-passing logical topologies must also be physical ring topologies.

    One of the disadvantages of the token-passing logical topology is the high collision rate.

    Computers transmit data after "listening" to the wire to detect other traffic.

    *Computers are allowed to transmit data only when they possess a token.
    5-
    How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?

    with a routed protocol

    with a routing protocol
    *with a static route

    with a directly connected route

    6-
    Which type of address is 192.168.17.134/29?

    *host address
    network address

    broadcast address

    multicast address


    7-

    Refer to the exhibit. A network administrator attempts to increase the available bandwidth for workstation A by setting the NIC to full-duplex mode. After the configuration is changed, there are increased collisions and errors occurring. Why is this occurring in the network?

    The NIC is no longer detecting collisions. 
    The switch will not support full-duplex mode.
    The hub will be continually producing a jam signal. The cabling will not support bidirectional transmissions.

    8-

    A company has the following addressing scheme requirements:

    -currently has 25 subnets
    -uses a Class B IP address
    -has a maximum of 300 computers on any network segment
    -needs to leave the fewest unused addresses in each subnet

    What subnet mask is appropriate to use in this company?

    255.255.240.0
    255.255.248.0 255.255.254.0 
    255.255.255.0
    255.255.255.128
    255.255.255.248

    9-
    الرسم هو الصندوق الاول مربوط به اربع حاسبات ومربوط بالصندوق الثاني الذي هو مربوط عالانترنيت
    Refer to the exhibit. An instructor in the network class has given the students the network diagram and asks the students to select the appropriate network devices. The goals are to provide a collision-free LAN environment and to provide Internet connectivity. What is the correct design?

    Replace Box 1 with a hub and Box 2 with a router. 
    Replace Box 1 with a router and Box 2 with a bridge.
    Replace Box 1 with a Layer 2 switch and Box 2 with a router.
    Replace Box 1 with a router and Box 2 with a Layer 2 switch.
    Replace Box 1 with a bridge and Box 2 with a Layer 2 switch.

    10-
    Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?

    255.255.224.0
    255.255.240.0
    255.255.248.0
    255.255.252.0 
    255.255.254.0
    255.255.255.0

    11-
    Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?

    00-06-5B-88-DF-C3
    00-B0-D0-7F-F7-46
    00-0F-24-85-75-C0
    00-0B-E5-64-BD-44
    00-08-A3-B6-CE-02 
    00-08-A3-B6-CE-03

    12-
    Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configurations that can be applied to the host for connectivity? (Choose two.)

    Address - 192.168.1.14
    Gateway - 192.168.1.33

    Address - 192.168.1.45
    Gateway - 192.168.1.33

    Address - 192.168.1.32
    Gateway - 192.168.1.33

    Address - 192.168.1.82 
    Gateway - 192.168.1.65

    Address - 192.168.1.63
    Gateway - 192.168.1.65

    Address - 192.168.1.70 
    Gateway - 192.168.1.65

    13-
    A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)

    After the jam signal, all transmission stops for a random period. 
    When the collision is detected, the hosts stop transmission immediately.
    When the collision is detected, the hosts stop transmission after eight microseconds.
    When the backoff period expires, the hosts involved in the collision have priority to transmit.
    When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit. 
    When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision. 

    14-
    A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?

    FTP and SNMP will use the same port number.
    FTP uses TCP to establish a session before any data is transferred. 
    The UDP session will reorder the SNMP data as it is received by the network management system.
    The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.

    15-
    A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?

    16-

    Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

    172.16.128.0 255.255.255.224
    172.16.128.0 255.255.0.0
    172.16.128.0 255.255.192.0
    172.16.128.0 255.255.224.0  172.16.128.0 255.255.255.192

    17-
    Which subnet masks would be valid for a subnetted Class B address? (Choose two.)

    255.0.0.0 
    255.254.0.0
    255.224.0.0 
    255.255.0.0
    255.255.252.0
    255.255.255.192


    18-

    A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?

    The switch drops the frame.
    The switch sends the frame out port 3.
    The switch sends the frame out ports 1, 2, and 4.
    The switch sends the frame out ports 2, 3, and 4. 
    The switch sends the frame out ports 1, 2, 3, and 4.

    19-
    A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?

    The cable will be able to pass traffic between the devices. 
    The cable has reversed-pairs, which will degrade the signal quality.
    The cable has split-pairs, which will increase crosstalk and create an unreliable link.
    The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.

    20-
    What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)

    Existing NICs might need to be upgraded.  Existing switches might need to be upgraded.  Existing NICs must support half-duplex mode.
    Existing UTP wiring must be replaced with fiber.
    Existing UTP must be tested for CAT 5e compatibility.  Existing network topology must support shared media.

    21-
    Refer to the received frame in the exhibit. In what two ways is the information from the received frame used by a switch? (Choose two.)

    192.168.10.5 is used to create an ARP request.
    192.168.10.5 is used to build the forwarding table.
    1234.5678.1abc is stripped from the frame header.
    192.168.10.11 is left intact as the frame is forwarded

    أما بالنسبة لبقية الاسئلة فلا استطيع الاجابة عنها لعدم وجود الصورة المرفقة
    أرجو أن تكون الاجوبة التي قدمتها مفيدة

  5. #5
    عضو
    تاريخ التسجيل
    May 2006
    المشاركات
    326
    معدل تقييم المستوى
    0

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    eight i think not sure is 255.255.255.128
    nine is box one is hub snd box2 is outer
    ten is 255.255.254.0
    eleven and twilve where the exhibit
    i will back

  6. #6
    عضو
    تاريخ التسجيل
    May 2006
    المشاركات
    326
    معدل تقييم المستوى
    0

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    Brother somod
    q3 i think its IPCONFIG not ifconfig
    !!!

  7. #7
    عضو
    تاريخ التسجيل
    Aug 2006
    المشاركات
    97
    معدل تقييم المستوى
    0

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    اشكركم جميعا يا اخوتي الاعزاء وفقكم الله جميعا وحقق جميع امانيكم يوم غد امتحاني سوف ابشركم بنجاحي بتفوق بفضل الله وفضلكم ان شاء الله
    مشكوووووووووووووره جدا جدا

  8. #8
    الصمود
    زائر

    مشاركة: ادخلوا فورا عاجل جدا جدا جدا

    العفو وان شاء الله نسمع الاخبار الطيبة

    بالتوفيق

المواضيع المتشابهه

  1. مووووهم ادخلوا
    بواسطة متنحه بتركيز في المنتدى البرمجه والتصميمات الفنيه ( الجرافيكس )
    مشاركات: 1
    آخر مشاركة: 01-01-2011, 19:49
  2. مشاركات: 0
    آخر مشاركة: 18-10-2009, 19:55
  3. الى خبراء المعالجات ادخلوا هنا
    بواسطة ابن الرافدين 1 في المنتدى الأرشيف
    مشاركات: 5
    آخر مشاركة: 15-07-2009, 20:40
  4. مطلوب فورا فورا مصصم Adobe In Design
    بواسطة OracleGate في المنتدى البرمجه والتصميمات الفنيه ( الجرافيكس )
    مشاركات: 0
    آخر مشاركة: 28-05-2008, 15:10
  5. للمصريين ارجوكم ادخلوا
    بواسطة علوان في المنتدى الأرشيف
    مشاركات: 1
    آخر مشاركة: 02-11-2002, 18:00

الكلمات الدلالية لهذا الموضوع

المفضلات

ضوابط المشاركة

  • لا تستطيع إضافة مواضيع جديدة
  • لا تستطيع الرد على المواضيع
  • لا تستطيع إرفاق ملفات
  • لا تستطيع تعديل مشاركاتك
  •