SlideShare uma empresa Scribd logo
1 de 44
Giảng viên: Hồ Vũ Anh Tuấn
Các chủ đề chính
OSI

Network Basic

IP

Routing
Wireless
OSI
OSI (cont.)
OSI (cont.)
Reliable vs. Best-Effort Comparison
OSI (cont.)
OSI (cont.)
Which network protocol does DNS use ?
a. FTP
b. TFTP
c.

TCP

d. UDP
e. SCP
OSI (cont.)
An inbound access list has been configured on a serial
interface to deny packet entry for TCP and UDP ports 21, 23
and 25. What types of packets will be permitted by this ACL ?
(Choose three.)
a. FTP

b. Telnet
c.

SMTP

d. DNS
e. HTTP
f.

POP3
OSI (cont.)
Which layer of the OSI reference model uses flow control,
sequencing, and acknowledgements to ensure that reliable
networking occurs ?
a. Data link
b. Network
c.

Transport

d. Presentation
e. Physical
Network Basic
 Hub
 Switch
 Router
 Cabling
Network Basic (cont.)
Network Basic (cont.)
Network Basic (cont.)
Network Basic (cont.)

Viet Nam

Thailand
Network Basic (cont.)
Viet Nam

Thailand
Network Basic (cont.)
Which of the following statements describe the network shown
in the graphic? (Choose two.)

a.
b.
c.
d.
e.
f.

There are two broadcast domains in the network.
There are four broadcast domains in the network.
There are six broadcast domains in the network.
There are four collision domains in the network.
There are five collision domains in the network.
There are seven collision domains in the network.
Network Basic (cont.)
For which type of connection should a straight-through cable
be used ?
a. switch to switch
b. switch to hub
c.

switch to router

d. hub to hub

e. router to PC
Network Basic (cont.)
What is the first 24 bits in a MAC address called ?
a. NIC
b. BIA
c.

OUI

d. VAI
Network Basic (cont.)
Refer to the exhibit. What type of connection would be
supported by the cable diagram shown ?

a. PC to router
b. PC to switch
c.

server to switch

d. switch to router
Network Basic (cont.)
Which type of cable is used to connect the COM port of a host
to the COM port of a router or switch ?
a. Crossover
b. straight-through
c.

Rolled

d. shielded twisted-pair
Network Basic (cont.)
When you are logged into a switch, which prompt indicates
that you are in privileged mode ?
a. %
b. @
c.

>

d. $
e. #
Network Basic (cont.)
Which command is used to copy the configuration from RAM
into NVRAM ?
a. copy running-config startup-config
b. copy startup-config: running-config:
c.

copy running config startup config

d. copy startup config running config

e. write terminal
IP Addressing
IP Addressing (cont.)
IP Addressing (cont.)
IP Addressing (cont.)
Class

Private Address Range

A

10.0.0.0 to 10.255.255.255

B

172.16.0.0 to 172.31.255.255

C

192.168.0.0 to 192.168.255
IP Addressing (cont.)
What is the principle reason to use a private IP address on an
internal network ?
a. Subnet strategy for private companies.
b. Manage and scale the growth of the internal network.
c.

Conserve public IP addresses so that we do not run out of
them.

d. Allow access reserved to the devices.
IP Addressing (cont.)
When is it necessary to use a public IP address on a routing
interface ?
a. Connect a router on a local network.
b. Connect a router to another router.
c.

Allow distribution of routes between networks.

d. Translate a private IP address.
e. Connect a network to the Internet.
IP Addressing (cont.)
The network administrator has asked you to check the status
of the workstation's IP stack by pinging the loopback address.
Which address would you ping to perform this task ?
a. 10.1.1.1

b. 127.0.0.1
c.

192.168.0.1

d. 239.1.1.1
IP Addressing (cont.)
Which of the following describe private IP addresses ?
(Choose two.)
a. addresses chosen by a company to communicate with the
Internet
b. addresses that cannot be routed through the public
Internet
c.

addresses that can be routed through the public Internet

d. a scheme to conserve public addresses
e. addresses licensed to enterprises or ISPs by an Internet
registry organization
Routing Overview
Routing Overview
Routing Overview
Routing Overview
RIPv1

RIPv2

Classful

Classless

Supports variable-length subnet mask?

No

Yes

Sends the subnet mask along with the routing
update?

No

Yes

Addressing type

Broadcast

Multicast

Defined in …

RFC 1058

RFCs 1721,
1722, and 2453

Supports manual route summarization?

No

Yes

Authentication support?

No

Yes

Routing protocol
Wireless
ITU-R with FCC Wireless
Wireless (cont.)
IEEE 802.11 Standards Comparison
802.11b

802.11a

802.11g

Frequency
band

2.4 GHz

5 GHz

2.4 GHz

No. of
channels

3

Up to 23

3

Transmission

Direct
Sequence
Spread
Spectrum
(DSSS)

Orthogonal
Frequency
Division
Multiplexing
(OFDM)

Direct
Sequence
Spread
Spectrum
(DSSS)

Data rates
[Mb/s]

1, 2, 5.5, 11

6, 9, 12, 18, 24,
36, 48, 54

1, 2, 5.5, 11

Orthogonal
Frequency
Division
Multiplexing
(OFDM)
6, 9, 12, 18,
24, 36, 48, 54
Wireless (cont.)
Channels and Overlap Issues
Wireless (cont.)
Wireless LAN Security Threats
Wireless (cont.)
Wireless LAN Security
WEP

802.1x EAP

WPA

802.11i / WPA2
Wireless (cont.)
Wi-Fi Certification
Wireless (cont.)
Wireless (cont.)
Refer to the exhibit. What two facts can be determined from the
WLAN diagram ? (Choose two.)

a.
b.
c.
d.
e.

The area of overlap of the two cells represents a basic service set (BSS).
The network diagram represents an extended service set (ESS).
Access points in each cell must be configured to use channel 1.
The area of overlap must be less than 10% of the area to ensure
connectivity.
The two APs should be configured to operate on different channels.
Wireless (cont.)
Which two devices can interfere with the operation of a wireless
network because they operate on similar frequencies ? (Choose
two.)
a. copier
b. microwave oven
c.

toaster

d. cordless phone

e. IP phone
f.

AM radio
Cám ơn các bạn …

Mais conteúdo relacionado

Mais procurados

Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qCisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qkeiko277
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Andriy Berestovskyy
 
Chapter 4 - The Network Layer: Data Plane
Chapter 4 - The Network Layer: Data PlaneChapter 4 - The Network Layer: Data Plane
Chapter 4 - The Network Layer: Data PlaneAndy Juan Sarango Veliz
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_MulticastingAhmar Hashmi
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 

Mais procurados (20)

Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qCisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
 
Part 12 : Local Area Networks
Part 12 : Local Area Networks Part 12 : Local Area Networks
Part 12 : Local Area Networks
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
2
22
2
 
IGMP
IGMPIGMP
IGMP
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)
 
Computer networks protocols
Computer networks protocolsComputer networks protocols
Computer networks protocols
 
Chapter 4 - The Network Layer: Data Plane
Chapter 4 - The Network Layer: Data PlaneChapter 4 - The Network Layer: Data Plane
Chapter 4 - The Network Layer: Data Plane
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Network
NetworkNetwork
Network
 
rip, ospf 13-14
rip, ospf 13-14rip, ospf 13-14
rip, ospf 13-14
 

Destaque

báo cáo cục tần số vtđ
báo cáo cục tần số vtđbáo cáo cục tần số vtđ
báo cáo cục tần số vtđTien Hoang
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky FannyCarl Ford
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
RFC and internet standards presentation
RFC and internet standards presentationRFC and internet standards presentation
RFC and internet standards presentationNaveen Jakhar, I.T.S
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 

Destaque (9)

CCNA Icnd110 s03l01
CCNA Icnd110 s03l01CCNA Icnd110 s03l01
CCNA Icnd110 s03l01
 
báo cáo cục tần số vtđ
báo cáo cục tần số vtđbáo cáo cục tần số vtđ
báo cáo cục tần số vtđ
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
Digital network lecturer8
Digital network  lecturer8Digital network  lecturer8
Digital network lecturer8
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
RFC and internet standards presentation
RFC and internet standards presentationRFC and internet standards presentation
RFC and internet standards presentation
 
Phan Phú Thuận - VNCERT
Phan Phú Thuận - VNCERTPhan Phú Thuận - VNCERT
Phan Phú Thuận - VNCERT
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 

Semelhante a On tap ccent

Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networksimacomobio
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptximacomobio
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptximacomobio
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Networkimacomobio
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+ kappi98a
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumpsccnaguide
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz studentYaser Rahmati
 

Semelhante a On tap ccent (20)

Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptx
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Network
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+
 
Ccna study
Ccna studyCcna study
Ccna study
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumps
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

On tap ccent

  • 1. Giảng viên: Hồ Vũ Anh Tuấn
  • 2. Các chủ đề chính OSI Network Basic IP Routing Wireless
  • 3. OSI
  • 5. OSI (cont.) Reliable vs. Best-Effort Comparison
  • 7. OSI (cont.) Which network protocol does DNS use ? a. FTP b. TFTP c. TCP d. UDP e. SCP
  • 8. OSI (cont.) An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL ? (Choose three.) a. FTP b. Telnet c. SMTP d. DNS e. HTTP f. POP3
  • 9. OSI (cont.) Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs ? a. Data link b. Network c. Transport d. Presentation e. Physical
  • 10. Network Basic  Hub  Switch  Router  Cabling
  • 16. Network Basic (cont.) Which of the following statements describe the network shown in the graphic? (Choose two.) a. b. c. d. e. f. There are two broadcast domains in the network. There are four broadcast domains in the network. There are six broadcast domains in the network. There are four collision domains in the network. There are five collision domains in the network. There are seven collision domains in the network.
  • 17. Network Basic (cont.) For which type of connection should a straight-through cable be used ? a. switch to switch b. switch to hub c. switch to router d. hub to hub e. router to PC
  • 18. Network Basic (cont.) What is the first 24 bits in a MAC address called ? a. NIC b. BIA c. OUI d. VAI
  • 19. Network Basic (cont.) Refer to the exhibit. What type of connection would be supported by the cable diagram shown ? a. PC to router b. PC to switch c. server to switch d. switch to router
  • 20. Network Basic (cont.) Which type of cable is used to connect the COM port of a host to the COM port of a router or switch ? a. Crossover b. straight-through c. Rolled d. shielded twisted-pair
  • 21. Network Basic (cont.) When you are logged into a switch, which prompt indicates that you are in privileged mode ? a. % b. @ c. > d. $ e. #
  • 22. Network Basic (cont.) Which command is used to copy the configuration from RAM into NVRAM ? a. copy running-config startup-config b. copy startup-config: running-config: c. copy running config startup config d. copy startup config running config e. write terminal
  • 26. IP Addressing (cont.) Class Private Address Range A 10.0.0.0 to 10.255.255.255 B 172.16.0.0 to 172.31.255.255 C 192.168.0.0 to 192.168.255
  • 27. IP Addressing (cont.) What is the principle reason to use a private IP address on an internal network ? a. Subnet strategy for private companies. b. Manage and scale the growth of the internal network. c. Conserve public IP addresses so that we do not run out of them. d. Allow access reserved to the devices.
  • 28. IP Addressing (cont.) When is it necessary to use a public IP address on a routing interface ? a. Connect a router on a local network. b. Connect a router to another router. c. Allow distribution of routes between networks. d. Translate a private IP address. e. Connect a network to the Internet.
  • 29. IP Addressing (cont.) The network administrator has asked you to check the status of the workstation's IP stack by pinging the loopback address. Which address would you ping to perform this task ? a. 10.1.1.1 b. 127.0.0.1 c. 192.168.0.1 d. 239.1.1.1
  • 30. IP Addressing (cont.) Which of the following describe private IP addresses ? (Choose two.) a. addresses chosen by a company to communicate with the Internet b. addresses that cannot be routed through the public Internet c. addresses that can be routed through the public Internet d. a scheme to conserve public addresses e. addresses licensed to enterprises or ISPs by an Internet registry organization
  • 34. Routing Overview RIPv1 RIPv2 Classful Classless Supports variable-length subnet mask? No Yes Sends the subnet mask along with the routing update? No Yes Addressing type Broadcast Multicast Defined in … RFC 1058 RFCs 1721, 1722, and 2453 Supports manual route summarization? No Yes Authentication support? No Yes Routing protocol
  • 36. Wireless (cont.) IEEE 802.11 Standards Comparison 802.11b 802.11a 802.11g Frequency band 2.4 GHz 5 GHz 2.4 GHz No. of channels 3 Up to 23 3 Transmission Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency Division Multiplexing (OFDM) Direct Sequence Spread Spectrum (DSSS) Data rates [Mb/s] 1, 2, 5.5, 11 6, 9, 12, 18, 24, 36, 48, 54 1, 2, 5.5, 11 Orthogonal Frequency Division Multiplexing (OFDM) 6, 9, 12, 18, 24, 36, 48, 54
  • 38. Wireless (cont.) Wireless LAN Security Threats
  • 39. Wireless (cont.) Wireless LAN Security WEP 802.1x EAP WPA 802.11i / WPA2
  • 42. Wireless (cont.) Refer to the exhibit. What two facts can be determined from the WLAN diagram ? (Choose two.) a. b. c. d. e. The area of overlap of the two cells represents a basic service set (BSS). The network diagram represents an extended service set (ESS). Access points in each cell must be configured to use channel 1. The area of overlap must be less than 10% of the area to ensure connectivity. The two APs should be configured to operate on different channels.
  • 43. Wireless (cont.) Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies ? (Choose two.) a. copier b. microwave oven c. toaster d. cordless phone e. IP phone f. AM radio
  • 44. Cám ơn các bạn …