Ccna Answers

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ccna Answers as PDF for free.

More details

  • Words: 8,732
  • Pages: 40
CCNA 640- 607 exam Questions and answers 1. Which of the following terms are used as synonyms for a MAC address? a. NIC address b. LAN address c. Burned-in address d. Card address e. All of the above 2. The following function is performed by what layer of the OSI Reference model: Establishes and terminates communication sessions between host processes. a. Application b. Presentation c. Session d. Transport e. Network 3. Encapsulation occurs at which OSI Layer(s)? a. All layers b. Layers 2, 3, and 4 c. Layers 1, 3, 5, and 6 d. Layers 3, 5, and 7 e. Layers 1, 2, and 3 4. During the process of flow control which of the following statements concerning its operation is true? a. The transmitting device monitors the flow of data and stops transmitting as needed. b. In Novell networks flow control is know as pacing. c. The receiving device tells the transmitting device to stop until the data in its buffers has been processed. d. The receiving device is told by the transmitting device to stop until the data in its buffers has been processed. e. The transmitting device is told by the receiving device to stop until the data in its buffers has been processed. 5. Which type of data transfer network service does NOT require the existence of a virtual circuit? a. Connection-oriented b. Connectionless c. Neither connection-oriented nor connectionless d. Both e. None of the above 6. Which of the following would reside on OSI layer 3? 1

a. SRB b. IS-IS c. RSRB d. SRTB e. TB 7. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data Link e. Physical 8. Which of the following do not fall under OSI layer 7? a. Directory Services b. Virtual Terminal Protocol c. CLNS d. Message Handling System 9. How may bits make up a data link address?: a. 32 bits b. 48 bits c. 16 bits d. 24 bits e. 64 bits 10. Routing is performed on which of the following OSI layers? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5 e. Layer 1 11. How many bits are in an IP Address? a. 6 b. 16 c. 24 d. 36 e. None of the above 12. UDP is what type of network service? a. Connection-oriented b. Connectionless-oriented c. Media independent d. Connectionless with acknowledgement 2

e. Connection-oriented with no acknowledgement 13.The following function is performed by what layer of the OSI Reference model: Provides synchronization between address and name databases a. Application b. Presentation c. Session d. Transport e. Network 14. An IP address is an address burned into a NIC card by the manufacturer a. True b. False 15. The following function is performed by what layer of the OSI Reference model: Fragments and reassembles packets while managing network layer connections a. Presentation b. Session c. Transport d. Network e. Data Link 16. Windowing is used by network devices to temporarily store bursts of excess data in memory until they can be processed. a. True b. False 17. Which layer of the OSI reference model enables multiple data links to be combined into an inter-network? a. Layer 5 b. Layer 3 c. Layer 4 d. Layer 7 e. Layer 6 18. The following function is performed by what layer of the OSI Reference model: Provides data compression and encryption a. Application b. Presentation c. Session d. Transport e. Network 3

19. The following function is performed by what layer of the OSI Reference model: Provides protocols to end user applications a. Application b. Presentation c. Session d. Transport e. Network 20. What type of address refers to a logical network device? a. Network address b. Burned-in address c. MAC address d. Protocol address e. None of the above 21. The following function is performed by what layer of the OSI Reference model: Addresses, switches and routes packets. a. Session b. Transport c. Network d. Data Link e. Physical 22. The OSI layer 6 has which of the following functions? a. Specifies architecture independent data transfer format b. Encodes and decodes data c. Encrypts and decrypts data d. Compresses data e. All of the above 23. The following function is performed by what layer of the OSI Reference model: Provides the interface to network devices a. Session b. Transport c. Network d. Data Link e. Physical 24. The following function is performed by what layer of the OSI Reference model: Provides standardized services to applications a. Application b. Presentation c. Session d. Transport e. Network 4

25. The following function is performed by what layer of the OSI Reference model: Provides error free and reliable packet delivery. a. Presentation b. Session c. Transport d. Network e. Data Link 26. The following function is performed by what layer of the OSI Reference model: Translates the senders data to the format of the receiver. a. Application b. Presentation c. Session d. Transport e. Network 27. BGP, OSPF, IGRP, EIGRP and RIP would fall under which layer of the OSI reference model? a. Layer 4 b. Layer 3 c. Layer 5 d. Layer 6 e. None of the above 28. Which of the following IOS commands would you use to find out the amount of DRAM your router contains? a. show processor cpu b. show version c. show router d. None of the above 29. Which IOS command would you use to put a new image in Flash memory of a Cisco router? a. copy tftp flash b. copy tftp bootflash c. copy system flash d. copy flash tftp e. copy nvram flash 30. Which of the following router commands will enable you to enter the entire motd from the router's command line? a. banner motd c ****caution access is RESTRICTED!!!!**** b. banner motd c ****careless use will result in problems**** c. banner motd c *****Caution access is restricted***** d. banner motd c *****cRazY NetoRk enGINeerS stINK***** e. banner motd c *****UNAUTHORIZED USE IS CONSIDERED ILLEGAL***** 5

31. Which IOS command would you use to copy the your saved configuration to a TFTP server? a. copy nvram tftp b. copy startup tftp c. copy running tftp 32. A "#" symbol at the end of your router's hostname prompt indicates: a. That you are in configuration mode b. That you are in read-only mode c. That you are in enabled mode (privileged mode) d. That you are in EXEC mode 33. What is the syntax to add a banner to a Cisco router configuration? a. banner b. banner # c. banner motd # d. motd banner # 34. Which IOS command would you use to make your configuration in NVRAM your active configuration? a. write memory b. copy startup running c. copy running startup d. copy runn start e. write net 35. What is the first thing that you are asked when running setup on a Cisco IOS router? a. Would you like to enter the initial configuration dialog? b. Would you like to see the current interface summary? c. Enter host name [Router]: e. Enter an initial configuration using the setup command. 36. What command can you use on a Cisco IOS router to display the session commands that you have used? a. show users b. who c. show memory e. show history 37. Which of the statements would be valid for configuring the IP address on a router's interface? a. ip address 200.111.5.1 255.255.255. b. ip address 200.285.100.254 255.255.255.224 6

c. ip unnumbered ethernet0 d. ip-address 200.111.5.1 e. ip address 255.255.255.0 200.111.5.1 38. The following function is performed by what layer of the OSI Reference model: Establishes and terminates communication sessions between host processes. a. Application b. Presentation c. Session d. Transport e. Network 39. Which of the following statements would you use to configure a router to authenticate local connected console connections? a. Set user with an account name and password b. Configure login local under line con 0 c. Cannot be done, we need a TACAS server d. Must use the secret password of Cisco e. Both a and b 40. How do you customize how the router ">" character appears when you are logged into its CLI? a. no prompt > b. prompt Newsetting c. service prompt newsetting d. it can't be changed e. Can only be completed via a vty session 41. What is the proper set of commands to enable logging in a router and allow it to save log entries? a. Router# logging console debugging Router# logging buffered b. Router# log console Router# buffer log c. Router(conf)# logging console debugging Router(conf)# logging buffered d. Router(conf)# log console Router(conf)# buffer log 42. Which IOS command would you use to backup your IOS image to a TFTP server? a. copy running tftp b. copy startup tftp c. copy flash tftp 7

43. Which of the following would reside on OSI layer 3? a. SRB b. IS-IS c. RSRB d. SRTB e. TB 44. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data Link e. Physical 45. What command would you enter on an IOS router to view the possible commands? a. ? b. show commands c. list commands 46. Which IOS command would you use to copy a running configuration to a TFTP server? a. copy start run b. copy running-config start c. copy tftp start d. copy run tftp e. copy running-confg flash 47. On an IOS router, which configuration command would you use to disable IP routing? a. set ip routing off b. disable ip routing c. no ip routing 48. What is the syntax for changing the name of a Cisco router? a. host name newhostname b. hostname newhostname c. routername newhostname d. You can not change the hostname 49. If you have two Cisco routers connected with DTE/DCE cables, to which router would you add the command clock rate in order to facilitate a CSU/DSU? a. The serial interface running as a DCE b. The serial interface running as a DTE 8

c. The Ethernet interface running as a DTE d. The Ethernet interface running as a DCE 50. What is the command to set the clock rate on your DCE interfaces? a. clockrate 56 b. clock rate 56 c. clockrate 56000 d. clock rate 56000 51. What command do you use to change your enable password? a. config t, enable secret password b. config t, enable password password c. config t, line vty 0 4, login, password password d. config t, line con 0, login, password password 52. The following function is performed by what layer of the OSI Reference model?: Provides standardized services to applications a. Application b. Presentation c. Session d. Transport e. Network 53. The following function is performed by what layer of the OSI Reference model?: Provides error free and reliable packet delivery. a. Presentation b. Session c. Transport d. Network e. Data Link 54. When attaching a console cable to a Cisco router, how do you log in to user mode? a. Press return, type password if prompted b. login <password> c. Press return, d. login 55. What is the syntax to add a banner to a Cisco router configuration? a. banner b. banner # c. banner motd # d. motd banner # 56. Which IOS command would you use to make your configuration in NVRAM 9

your active configuration? a. write memory b. copy startup running c. copy running startup d. copy runn start e. write net 57. The correct command to configure RIP version 2 on a Cisco Router is: a. router (conf)> router rip b. router(config-if)#router rip c. router (conf)# router rip d. router# router rip_v2 58. How would you enable IGRP on a Cisco IOS router? a. set igrp on b. enable igrp c. router igrp 100 d. router igrp e. None of the above 59. The following function is performed by what layer of the OSI Reference model?: Establishes and terminates communication sessions between host processes. a. Application b. Presentation c. Session d. Transport e. Network 60. Which IOS command would you use to backup your IOS image to a TFTP server? a. copy running tftp b. copy startup tftp c. copy flash tftp 61. What is the default administrative distance for OSPF? a. 110 b. 100 c. 120 d. 90 e. 1 62. Which of the following defines the addressing and Layer 3 header in the packet that is actually forwarded by a router? a. Routed protocol b. Routing protocol 10

c. Bridging protocol d. Bridgeable protocol e. Both c and d 63. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data Link e. Physical 64. What is the syntax for changing the name of a Cisco router? a. host name newhostname b. hostname newhostname c. routername newhostname d. You can not change the hostname 65. The following function is performed by what layer of the OSI Reference model: Provides standardized services to applications a. Application b. Presentation c. Session d. Transport e. Network 66. Routing protocol convergence time a. is determined by the Network Time Protocol (NTP). b. is affected by the data-link layer technology in use. c. includes the time to detect a fault, but not the time to determine a new route. d. is the same for distance-vector protocols and link-state protocols. 67. Which of the following are connection-oriented protocols? a. Frame Relay b. IPX c. IP d. TCP e. PPP 68. Which of the following routing protocols employ the HELLO protocol? a. RIP b. IGRP c. EIGRP d. IS-IS e. OSPF 11

69. When writing the access list portion of an IPX filter using an extended access lists how are they identified? a. numbered 700-799 b. numbered 800-899 c. numbered 900-999 d. through the use of the IPX keyword e. none of the above 70. GNS is a request packet sent by what to locate the nearest server it is part of: a. IPX SAP b. IPX DNS c. Routing update d. Broadcast e. None of the above 71. Which of the following are reasons to receive an ICMP destination unreachable message? a. network unreachable c. host unreachable d. protocol unreachable e. port unreachable 72. Which of the following is true of the node number portion of an IPX address? a. It is 32 bits long and is represented by hexadecimal and is automatically assigned b. It is 48 bits long and is represented by hexadecimal and is usually the MAC address of the device c. It is 32 bits long and is represented by hexadecimal and is never the MAC address of the device d. It is 48 bits long and is represented by hexadecimal and assigned by the network administrator 73. Which IOS command would you use to find out what IPX routes your router knows? a. show ip route b. show ipx cache c. show ipx route 74. Which of the following are benefits of network segmentation using Cisco routers? a. Smaller broadcast domain b. Easier to manage c. Easier to configure 12

75. In IP addressing, what is the range of numbers in the first octet for a class D address? a. 240-254 b. 224-239 c. 128-191 d. 192-223 76. Which of the follow are functions of the OSI layer 3? a. Frames packets b. Controls physical layer data flow c. Routing between networks d. Provides interface to end-user processes 77. An internetworking device working at the network layer of the OSI reference model has two major jobs. What are they? a. Forwarding packets and learning the network topology b. Detecting collisions and propagating collisions to all devices in a collision domain c. Defining addresses for network segments and learning the addresses of all stations on an internetwork d. Observing the source MAC addresses on frames received and updating a database that maps addresses to port 78. Which of the following IOS commands could you use to show what IP address if assigned to each interface on your router? a. show running b. write terminal c. show ip interface brief d. All of the above e. None of the above 79. In IP addressing, what is the purpose of the subnet mask? a. To borrow bits from the subnet field of the IP address for host addresses b. To borrow bits from the host field and designate them as the subnet field c. None of the above 80. Which of the following would you use to run a debug operation against IP access list 101? a. debug access-list 101 b. debug ip packet list 101 c. debug packet list 101 d. debug ip packet 101 detail 81. Which of the following access lists will deny DNS? Two answers. a. access-list 99 deny ip any host eq DNS b. access-list 101 deny tcp any any eq 21 c. access-list 120 deny tcp any any eq 53 13

d. access-list 105 deny udp any any eq 53 e. None of the above 82. How would you remove access-list 105 from serial0 (outbound) on a 2501 Cisco router? a. Interface s0 no access-group 105 b. no access-list 105 in c. Interface e0 no access-list 105 d. None of the above e. B or C is correct 83. What is the syntax to add a banner to a Cisco router configuration? a. banner b. banner # c. banner motd # d. motd banner # 84. Which IOS command would you use to make your configuration in NVRAM your active configuration? a. write memory b. copy startup running c. copy running startup d. copy runn start e. write net 85. The number range that corresponds to an IP standard access list is: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 86. The number range that corresponds to an extended 48-bit MAC address access-list is: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 87. Which range of numbers is valid in an extended IP access list? 14

a. 100-199 b. 101-299 c. 1-99 d. 500-599 e. 300-399 88. The correct command to configure RIP version 2 on a Cisco Router is: a. router (conf)> router rip b. router(config-if)#router rip c. router (conf)# router rip d. router# router rip_v2 89. How would you enable IGRP on a Cisco IOS router? a. set igrp on b. enable igrp c. router igrp 100 d. router igrp e. None of the above 90. The following access list will deny what type of traffic? permit 100 host 127.5.5.7 any 25 permit 100 host 127.5.5.7 any 80 a. All traffic unless it is HTTP or DNS b. All traffic destined to the 127.5.5.7 network c. this acl is not in the improper format d. any traffic 91. The following function is performed by what layer of the OSI Reference model: Establishes and terminates communication sessions between host processes a. Application b. Presentation c. Session d. Transport e. Network 92. What is the default administrative distance for OSPF? a. 110 b. 100 c. 120 d. 90 e. 1 93. When a router examines an access list, it checks each statement in the access list in the order in which it was entered? a. True b. False 15

94. The number range that corresponds to a Protocol type-code access-list: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 95. Which of the following defines the addressing and Layer 3 header in the packet that is actually forwarded by a router. a. Routed protocol b. Routing protocol c. Bridging protocol d. Bridgable protocol e. Both c and d 96. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data Link e. Physical 97. What is the syntax for changing the name of a Cisco router? a. host name newhostname b. hostname newhostname c. routername newhostname d. You can not change the hostname 98. Which of the following access-list would block IP RIP broadcast? a. access-list 101 deny tcp any host 255.255.255.255 b. access-list 801 deny udp any host 255.255.255.0 c. access-list 101 deny ip any host 255.255.255.255 99. Which type of access lists can be named? Two answers. a. Standard b. Reflexive c. Extended d. Timed e. None of the above 100. What is the maximum cable length for 100BaseTX using Category 5 copper cable? a. 100 meters 16

b. 200 meters c. 500 meters d. 1000 meters 101. Routing protocol convergence time a. is determined by the Network Time Protocol (NTP). b. is affected by the data-link layer technology in use. c. includes the time to detect a fault, but not the time to determine a new route. d. is the same for distance-vector protocols and link-state protocols. 102. Which of the following are connection oriented protocols? a. Frame Relay b. IPX c. IP d. TCP e. PPP 103. Which of the following routing protocols employ the HELLO protocol? List all. a. RIP b. IGRP c. EIGRP d. IS-IS e. OSPF 104. When writing the access list portion of an IPX filter using an extended access lists how are they identified? a. numbered 700-799 b. numbered 800-899 c. numbered 900-999 d. through the use of the IPX keyword e. none of the above 105. GNS is a request packet sent by what to locate the nearest server it is part of: a. IPX SAP b. IPX DNS c. Routing update d. Broadcast e. None of the above 106. Which of the following are reasons to receive an ICMP destination unreachable message? List all. a. network unreachable b. host unreachable c. protocol unreachable d. port unreachable 17

107. Which of the following is true of the node number portion of an IPX address? a. It is 32 bits long and is represented by hexadecimal and is automatically assigned b. It is 48 bits long and is represented by hexadecimal and is usually the MAC address of the device c. It is 32 bits long and is represented by hexadecimal and is never the MAC address of the device d. It is 48 bits long and is represented by hexadecimal and assigned by the network administrator 108. Which IOS command would you use to find out what IPX routes your router knows? a. show ip route b. show ipx cache c. show ipx route 109. In IP addressing, what is the range of numbers in the first octet for a class D address? a. 240-254 b. 224-239 c. 128-191 d. 192-223 110. Which of the follow are functions of the OSI layer 3? a. Frames packets b. Controls physical layer data flow c. Routing between networks d. Provides interface to end-user processes 111. An internetworking device working at the network layer of the OSI reference model has two major jobs. What are they? a. Forwarding packets and learning the network topology b. Detecting collisions and propagating collisions to all devices in a collision domain c. Defining addresses for network segments and learning the addresses of all stations on an internetwork d. Observing the source MAC addresses on frames received and updating a database that maps addresses to port 112. Which of the following IOS commands could you use to show what IP address if assigned to each interface on your router? a. show running b. write terminal c. show ip interface brief d. All of the above 18

e. None of the above 113. In IP addressing, what is the purpose of the subnet mask? a. To borrow bits from the subnet field of the IP address for host addresses b. To borrow bits from the host field and designate them as the subnet field c. None of the above 114. Which of the following are benefits of network segmentation using Cisco routers? a. Smaller broadcast domain b. Easier to manage c. Easier to configure 115. What is the maximum distances for 10Base5 and 10Base2? a. 200 meters b. 500 meters c. 500 yards d. 200 yards e. 10 miles 116. What do the letters MAC stand for? a. Multiple Access Controller b. Mac Address Controller c. Media Access Control d. Multiple Address Control e. Mortal adaptation Climate 117. What routing protocol does a transparent bridge use to learn about layer 3 addressing groupings. a. IP b. IPX c. OSPF d. IGRP e. All of the above f. None of the above 118. What is the distance limitation of 10BaseT and 100BaseTX? a. 10 meter b. 100 meters c. 1000 meters 119. Encapsulation occurs at which layer(s)? a. layers 2 and 3 b. layers 3 and 4 c. layers 5,6 and 7 d. none of the above e. all of the above 19

120. How fast is FastEthernet? a. Real Fast b. 10 Mbps c. 100 Mbps d. 1 Gigbps e. 200 Mbps 121. How many bytes long is a MAC address? a. 32 b. 48 c. 6 d. 4 e. 64 122. Choose all of the following that are needed to support fullduplex Ethernet. a. Multiple paths between multiple stations on a link b. Loopback and collision detection disabled c. Full-Dulplex NIC cards d. Automatic detection of full-duplex operation by all connected stations. 123. What two types of technology does 100BaseT use? a. Swithcing with 53-byte cells. b. CSMA/CD c. IEEE 802.5 d. 802.3u e. FDDI 222 124. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data-link e. Physical 125. Some advantages to segmenting with Bridges are _____? a. Datagram filtering b. Maageability (manageability) c. Reliability d. Scalability e. Discobility 126. Which of the following describes a full-duplex transmission? a. uses a single cable 20

b. Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station c. Data transmission in only both directions, but only on way at a time. d. Data transmission in only one direction 127. Which of the following switching types is the default for Cisco 5505s? a. Cut-through b. Store-and-Forward c. Store-and Cut d. Fragment Free 128. The following function is performed by what layer of the OSI Reference model: Provides synchronization between address and name databases a. Application b. Presentation c. Session d. Transport e. Network 129. What is the syntax to add a banner to a Cisco router configuration? a. banner b. banner # c. banner motd # d. motd banner # 130. What is the command to set the clock rate on your DCE interfaces? a. clockrate 56 b. clock rate 56000 c. clockrate 56000 d. clock rate 56 131. When attaching a console cable to a Cisco router, how do you log in to user mode? a. Press return, type password if prompted b. login <password> c. Press return, d. login 132. What is the IEEE specification for Spanning Tree? a. 802.2u b. 802.3q c. 802.1d d. 802.6 21

e. None of the above 133. The number range that corresponds to an IP standard access list is: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 134.Which of the statements would be valid for configuring the IP address on a router's interface? a. ip address 200.111.5.1 255.255.255. b. ip address 200.285.100.254 255.255.255.224 c. ip unnumbered ethernet0 d. ip-address 200.111.5.1 e. ip address 255.255.255.0 200.111.5.1 135. Of the three switching types, which one has the lowest latency? a. Cut-through b. FragmentFree c. Store-and-Forward d. None 136. Of the three swithcing types, which one has the highest latency? a. Cut-through b. FragmentFree c. Store-and-Forward d. None 137. Which of the following IOS commands could you use to show what IP address if assigned to each interface on your router? a. show running b. write terminal c. show ip interface brief d. all of the above e. none of the above 138. Which of the following would you use to run a debug operation against IP access list 101? a. debug access-list 101 b. debug ip packet list 101 c. debug packet list 101 d. debug ip packet 101 detail 22

139. What does a gateway do? a. Routes traffic from physically different locations b. Connects dissimiliar network systems c. Protect networks from hackers e. Allows secure access to dial-up users 140. How would you disable fast-switching for IP on an Ethernet interface (for a Cisco router)? a. no fast-switching b. no ip route-cache c. no ip mroute-cache d. no fair-queue 141. Which of the following access lists will deny DNS? a. access-list 99 deny ip any host eq DNS b. access-list 101 deny tcp any any eq 21 c. access-list 120 deny tcp any any eq 53 d. access-list 105 deny udp any any eq 53 e. None of the above 142. Windowing is used by network devices to temporarily store bursts of excess data in memory until they can be processed. a. True b. False 143. What physical layer defines the specification for 100Base-T Ethernet over two pairs of Category 5 UTP cable? a. 100BASE-TX b. 100BASE-T4 c. 100BASE-FX 144. The Fast Ethernet (100Base-T) standard is comprised of how many component specifications? a. 2 b. 3 c. 5 d. 7 145. Which layer of the OSI reference model enables multiple data links to be combined into an internetwork? a. Layer 5 b. Layer 3 c. Layer 4 d. Layer 7 e. Layer 6

23

146. How would you remove access-list 105 from serial0 (outbound) on a 2501 Cisco router? a. Interface s0 no access-group 105 b. no access-list 105 in c. Interface e0 no access-list 105 d. None of the above e. B or C is correct 147. What do the letters BRI stand for? a. Begin Reading Information b. Basic Routing Interface c. Basic Rate Interface d. Basic Routing Information 148. If packets are destined for a specific set of networks what is this called? a. unicast b. broadcast c. flexlycast d. monocast e. Multicast 149. Why is it important to limit broadcast traffic on LANs? a. A broadcast frame is more likely to cause a collision than a unicast frame. b. Hackers can see the data in broadcast frames and use the data to bring down a LAN. c. Broadcast traffic uses more bandwidth than unicast and multicast traffic. d. A broadcast frame interrupts the CPU of every network station on a LAN. 150. Which bit is used in Frame Relay to indicate that a frame has a lower importance than other frames? a. Cyclic Redundancy Check b. Discard Eligibility c. Forward-Explicit Congestion Notification 151. What is the syntax to add a banner to a Cisco router configuration? a. banner b. banner # c. banner motd # d. motd banner # 152. Which IOS command would you use to make your configuration in NVRAM your active configuration? a. write memory 24

b. copy startup running c. copy running startup d. copy runn start e. write net 153. What does a bridge do? a. Allows you to cross deserts b. Connects multiple WAN networks c. Makes packet routing decisions d. Allows packets to move from different media types or collision domains 154. On an Ethernet interface, what mode of operation will allow the simultaneous TX and RX of packets? a. Half-duplex b. Simplex c. Full-duplex 155. The number range that corresponds to an IP standard access list is: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 156. What types of addresses are seen on the data-link layer of the OSI model? a. IP addresses b. MAC addresses c. Logical addresses 157. Which of following statements would be correct for configuring LMI on a Cisco IOS router to ANSI ? a. frame-relay set lmi ansi b. frame_relay lmi type ansi c. frame-relay lmi-type ansi d. frame-relay lmi type=ansi 158. The number range that corresponds to an extended 48-bit MAC address access list is: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199

25

159. Which of the following IOS commands would you use to find out the amount of DRAM your router contains? a. show processor cpu b. show version c. show router d. None of the above 160. What is one of the major benefits of VLANs? a. Simplified adds, moves, and changes b. Ability to run routing protocols c. Cheaper to build 161. Which IOS command would you use to put a new image in Flash memory of a Cisco router? a. copy tftp flash b. copy tftp bootflash c. copy system flash d. copy flash tftp e. copy nvram flash 162. Which range of numbers is valid in an extended IP access list? a. 100-199 b. 101-299 c. 1-99 d. 500-599 e. 300-399 163. The correct command to configure RIP version 2 on a Cisco Router is: a. router (conf)> router rip b. router(config-if)#router rip c. router (conf)# router rip d. router# router rip_v2 164. How would you enable IGRP on a Cisco IOS router? a. set igrp on b. enable igrp c. router igrp 100 d. router igrp e. None of the above 165. Which is the correct order of events when a PPP connection first comes up: a. LCP, Authentication, IPCP b. Authentication, LCP, IPCP c. LCP, IPCP, Authentication 26

d. IPCP, Authentication, LCP 166. Which of the following statements regarding either full or halfduplex Ethernet operation is true? a. In full-duplex the Ethernet physical connector can provide connectivity for several circuits. b. Both full- and half-duplex can be considered collision free. c. Full-duplex eliminates contention on Ethernet point-to-point links. d. Full-duplex provides only a small performance increase over half duplex 167. The following access list will deny what type of traffic? permit 100 host 127.5.5.7 any 25 permit 100 host 127.5.5.7 any 80 a. All traffic unless it is HTTP or DNS b. All traffic destined to the 127.5.5.7 network c. this acl is not in the improper format d. any traffic 168. The following function is performed by what layer of the OSI Reference model: Establishes and terminates communication sessions between host processes a. Application b. Presentation c. Session d. Transport e. Network 169. What are some of the disadvantages of bridging vs. routing? a. Bridges cannot provide flow control b. Bridges cannot provide congestive feedback information to end node. c. a and b 170. How would you apply access list 101 to the Ethernet interface of a 2501 Cisco router for outbound traffic? a. ip access-group 100 out b. ip access-class 101 out c. access-list 101 out d. ip access-group 101 e. None of the above 171. What is the default administrative distance for OSPF? a. 110 b. 100 c. 120 d. 90 e. 1

27

172. When a router examines an access list, it checks each statement in the access list in the order in which it was entered? a. True b. False 173. The number range that corresponds to a Protocol type-code access list: a. 1-99 b. 100-199 c. 200-299 d. 700-799 e. 1100-1199 174. When an ISDN BRI initially comes up for the first time, what is assigned to it by the ISDN switch? a. Service Access Point Identifier b. Terminal Endpoint Identifier c. Call Reference number 175. What access method algorithm is used in Ethernet? a. CSMA/CD b. CSMD/CD c. CDMC/CD d. None of the above 176. Which ISDN high-speed, full-duplex channel operates at 384 Kbps? a. B channel b. D channel c. E channel d. F channel e. H channel 177. Which of the following defines the addressing and Layer 3 header in the packet that is actually forwarded by a router. a. Routed protocol b. Routing protocol c. Bridging protocol d. Bridgable protocol e. Both c and d 178. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers a. Session b. Transport c. Network d. Data Link 28

e. Physical 179. What is the syntax for changing the name of a Cisco router? a. host name newhostname b. hostname newhostname c. routername newhostname d. You can not change the hostname 180. What is the first thing that you are asked when running setup on a Cisco IOS router? a. Would you like to enter the initial configuration dialog? b. Would you like to see the current interface summary? c. Enter host name [Router]: e. Enter an initial configuration using the setup command. 181. Which of the following statement would be correct for configuring keepalives on a Frame Relay Interface (Cisco IOS router)? a. frame-relay keepalive 15 b. frame relay keepalive 10 c. frame-relay keepalive 1 d. frame relay keepalive 10 182. On a Cisco IOS router, multiple ISDN PRI lines can be configured to share a single D-channel a. True b.False 183. What command can you use on a Cisco IOS router to display the session commands that you have used? a. show users b. who c. show memory d. show history 184. Which of the following access-list would block IP RIP broadcast? a. access-list 101 deny tcp any host 255.255.255.255 b. access-list 801 deny udp any host 255.255.255.0 c. access-list 101 deny ip any host 255.255.255.255 185. Which type of access lists can be named? a. Standard b. Reflexive c. Extended d. Timed e. None of the above 29

186. What is the maximum cable length for 100BaseTX using Category 5 copper cable? a. 100 meters b. 200 meters c. 500 meters d. 1000 meters 187. Routing protocol convergence time a. is determined by the Network Time Protocol (NTP). b. is affected by the data-link layer technology in use. c. includes the time to detect a fault, but not the time to determine a new route. d. is the same for distance-vector protocols and link-state protocols. 188. Which of the following are acceptable techniques to help relieve network congestion? a. Customize timers b. Configure a local loopback interface on the router to handle broadcasts c. Prioritize traffic through the use of standard ACL's d. a and c e. b and c 189. Which of the following routing protocols employ the HELLO protocol? a. RIP b. IGRP c. EIGRP d. IS-IS e. OSPF 190. Which of the following does a router generally handle better than a switch? a. Loop avoidance through the use of the spanning-tree algorithm b. Quickly learning the MAC addresses of stations on the LAN c. Redundant paths and effective path selection d. Forwarding packets after simply looking at the destination MAC address 191. In Frame Relay, what is meant by the CIR ? a. The rate the network supports under normal operations b. The rate the network supports under heavy load operations c. The rate the network supports under maximum load operations 192. Which of the following terms are used as synonyms for a MAC address? a. NIC address b. LAN address c. Burned-in address d. Card address 30

e. All of the above 193. Generally, ISDN is considered to be which of the following types of service? a. Switched b. Nonswitched c. Dedicated d. Analog e. Digital 194. Frame Relay specifies only the lower two layers of the OSI reference model a. True b. False 195. When writing the access list portion of an IPX filter using an extended access lists how are they identified? a. numbered 700-799 b. numbered 800-899 c. numbered 900-999 d. through the use of the IPX keyword e. none of the above 196. GNS is a request packet sent by what to locate the nearest server it is part of: a. IPX SAP b. IPX DNS c. Routing update d. Broadcast e. None of the above 197. Before migrating a mostly routed internetwork to a mostly switched network, you should a. set the default Time to Live value to 1 on all IP stations. b. investigate the characteristics of the network traffic. c. recable the network. d. try using VLANs first because they are easier to configure than switched LANs. 198. Which statement is true about differences between store-andforward switching and cut-through switching? a. A cut-through switch copies all of a received frame into its buffers and computes the cyclic redundancy check (CRC). b. A store-and-forward switch discards a frame if it contains a CRC error. c. A store-and-forward switch copies only the destination address of a received frame into its buffers. 31

d. Unlike a cut-through switch, a store-and-forward switch learns the MAC addresses of every station on the LAN. 199. Which of the statements would be valid for configuring the IP address on a router's interface? a. ip address 200.111.5.1 255.255.255. b. ip address 200.285.100.254 255.255.255.224 c. ip unnumbered ethernet0 d. ip-address 200.111.5.1 e. ip address 255.255.255.0 200.111.5.1 200. A port on a switch using the Spanning-Tree Protocol moves through five states, are these states in the correct order? 1. From initialization to blocking 2. From blocking to listening or to disabled 3. From listening to learning or to disabled 4. From learning to forwarding or to disabled 5. From forwarding to disabled a. Yes they are in correct order b. No they are not 201. On an Ethernet segment, a station is permitted to transmit only one packet at a time, and then it must contend with all the other station for subsequent transmissions a. True b. False 202. What condition is most accurate when the Spanning-Tree Protocol is not in operation or fails? a. When loops occur, some switches see stations appear on both sides of the switch. This condition confuses the forwarding algorithm and allows duplicate frames to be forwarded. b. A routing loop occurs and the switches put that port into standby mode. c. A failure of the Spanning-Tree Protocol causing a lock condition within the router port because of multiple paths to the destination. d. The Spanning-Tree Protocol is a faultless protocol so this is a trick question e. All of the above 203. Which of the following is true of the node number portion of an IPX address? a. It is 32 bits long and is represented by hexadecimal and is automatically assigned b. It is 48 bits long and is represented by hexadecimal and is usually the MAC address of the device c. It is 32 bits long and is represented by hexadecimal and is never the MAC address of the device d. It is 48 bits long and is represented by hexadecimal and assigned by the network administrator 32

204. Which IOS command would you use to find out what IPX routes your router knows? a. show ip route b. show ipx cache c. show ipx route 205. Which of the following are benefits of network segmentation using Cisco routers? a. Smaller broadcast domain b. Easier to manage c. Easier to configure 206. In IP addressing, what is the range of numbers in the first octet for a class D address? a. 240-254 b. 224-239 c. 128-191 d. 192-223 207. Encapsulation occurs at which OSI Layer(s)? a. All layers b. Layers 2, 3, and 4 c. Layers 1, 3, 5, and 6 d. Layers 3, 5, and 7 e. Layers 1, 2, and 3 208. During the process of flow control which of the following statements concerning its operation is true? a. The transmitting device monitors the flow of data and stops transmitting as needed. b. In Novell networks flow control is know as pacing. c. The receiving device tells the transmitting device to stop until the data in its buffers has been processed. d. The receiving device is told by the transmitting device to stop until the data in its buffers has been processed. e. The transmitting device is told by the receiving device to stop until the data in its buffers has been processed. 209. Which type of data transfer network service does NOT require the existence of a virtual circuit? a. Connection-oriented b. Connectionless c. Neither connection-oriented nor connectionless d. Both e. None of the above

33

210. At which layer on the OSI reference model does ISDN Q.921 reside? a. Layer 2 b. Layer 3 c. Layer 1 211. Which of the following are the switching methods available in a switch? a. First in first out b. Cut through c. Store and forward d. Fast switching e. Both b and c 212. How do you customize how the router ">" character appears when you are logged into its CLI? a. no prompt > b. prompt Newsetting c. service prompt newsetting d. it can't be changed e. Can only be completed via a vty session 213. What is the proper set of commands to enable logging in a router and allow it to save log entries? a. Router# logging console debugging Router# logging buffered b. Router# log console Router# buffer log c. Router(conf)# logging console debugging Router(conf)# logging buffered d. Router(conf)# log console Router(conf)# buffer log 214. What is the IEEE standard for the Spanning-Tree Protocol? a. 802.1 b. 802.1d c. 802.1g d. 802.1a 215. What are the different types of xxxxxxcasts? a. unicast b. broadcast c. flexlycast d. monocast e. Multicast 216. Which of the follow are functions of the OSI layer 3? 34

a. Frames packets b. Controls physical layer data flow c. Routing between networks d. Provides interface to end-user processes 217. An internetworking device working at the network layer of the OSI reference model has two major jobs. What are they? a. Forwarding packets and learning the network topology. b. Detecting collisions and propagating collisions to all devices in a collision domain. c. Defining addresses for network segments and learning the addresses of all stations on an Internetwork. d. Observing the source MAC addresses on frames received and updating a database that maps addresses to port. 218. Which of the following IOS commands could you use to show what IP address if assigned to each interface on your router? a. show running b. write terminal c. show ip interface brief d. All of the above e. None of the above 219. For a Cisco router to support a point-to-multipoint configuration, what needs to be configured? a. Physical addresses b. DLCIs c. CIRs d. Subinterfaces 220. When a bridge receives a frame it does what with it? a. Immediately forwards on all frames b. Receives the entire stream of frames and then forwards them c. Bridges don't care about frames; they just connect two dissimilar networks d. Store the frame and then forward all frames e. c and d 221. The following function is performed by what layer of the OSI Reference model: Controls the physical layer flow of data by mapping between the layers. a. Session b. Transport c. Network d. Data Link e. Physical 222. Which of the following do not fall under OSI layer 7? a. Directory Services 35

b. Virtual Terminal Protocol c. CLNS d. Message Handling System 223. In IP addressing, what is the purpose of the subnet mask? a. To borrow bits from the subnet field of the IP address for host addresses b. To borrow bits from the host field and designate them as the subnet field c. None of the above 224. How may bits make up a data link address: a. 32 bits b. 48 bits c. 16 bits d. 24 bits e. 64 bits 225. Routing is performed on which of the following OSI layers? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5 e. Layer 1 226. How many bits are in an IP Address? a. 6 b. 16 c. 24 d. 36 e. None of the above 227. On a Cisco router running late 11.2 IOS, which of the following commands will show you the switching method for the packets transmitted for interface Ethernet0? a. show interface e0 b. show interface e0 accounting c. show interface e0 stats d. show interface e0 crb e. It cannot be done 228. Segmenting a network with a switch will give you which of the following benefits? a. Low latency b. High frame-forwarding rates c. Increases available bandwidth of a network d. Works with existing 802.3 compliant network interface cards and cabling e. All of the above 36

229. ISDN uses what type of signaling? a. Out-of-band b. In-band c. Distributed d. None of the above ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Fill in the blank Question. 1. Name the seven layers of the OSI model. Physical, Data Link, Network, Transport, Session, Presentation, Application 2. What is the main purpose of Layer 3? Ip address, Routing 3. What is the main purpose of Layer 2? Data switching 4. What is the purpose of ROM in a Cisco router? Store the IOS 5. What does CDP stand for? Cisco Discovery Protocol 6. If two IOS files are stored in a router's flash memory, one called c2500-j-l.111-3.bin and one called c2500-j-l.112-14.bin. a. Which one does the router use when it boots up? b. How could you force the other IOS file to be used? Config-register c. Without looking at the configuration, what command could be used to discover which file was used for the latest boot of the router? Show version 7. What are the two different names for the router's mode of operation that when accessed enable you to issue commands that could be disruptive to router operation? 37

Exec mode and global terminal mode 8. What is the purpose of Flash Memory in a Cisco router? Store Cisco IOS file 9. Name the parts of an IP address. An IP address consists of 32 bits of information. These bits are divided into four section, referred to as octets or bytes, each containing 1bytes (8 bits) 10. Name the three classes of unicast IP addresses and list their default masks, respectively. Class A 1-127 S/N 255.0.0.0 Class B 128-191 S/N 255.255.0.0 Class C 192-223 S/N 255.255.255.0 11. Define the purpose of ICMP redirect message. ICMP is a Network layer Internet protocol for purpose of reporting errors and providing information pertinent to IP packet procedures. 12. Name four types of Ethernet Framing for IPX. Ethernet_802.3; Ethernet_802.2; Ethernet_II; Ethernet_SNAP 13. Name the command that lists all the SAP entries in a Cisco Router. Debug IPX SAP activity 14. What is SAP? Service Advertising Protocol (The Novell Network protocol that supplies a way to inform network clients of resources and services availability on network, using routers and server).

15. For each of the following examples, define the subnet address, broadcast address, first and last usable addresses for that subnet. IP address 172.16.129.201 S/N address

Subnet Mask 255.255.255.240 38

172.16.129.192

V/A 193-206

IP address 192.168.200.50 S/N address 192.168.200.50 V/N 51-52

B/C 172.16.129.207 Subnet Mask255.255.255.252 B/C 192.168.200.54

IP address 172.16.22.133 Subnet Mask255.255.252.0 S/N address 172.16.22.0 V/A 172.16.22.1-172.16.23.254 B/C 192.168.30.127 IP address 192.168.30.101 S/N address 192.168.30.96 V/A 97-126

Subnet Mask255.255.255.224 B/C 192.168.30.127

IP address 10.16.193.6 Subnet Mask 255.255.248.0 S/N address 10.16.192.0 V/A 10.16.192.1-10.16.207.254 B/C 10.16.207.255 16. What does CDP stand for? Cisco Discovery Protocol 17. What does CDP stand for? Cisco Discovery Protocol 18. Name two methods of internal switching on switches today. Store and Forward and Cut-Through 19. Define VLAN. A group of devices on one or more logically segmented LANs, enable devices to communicate as if attached to the same physical medium, when they are actually located on numerous different LAN segments. VLANs are base on logical instead of physical connections and thus are tremendously flexible. 20. What does CDP stand for? Cisco Discovery Protocol 21. If two IOS files are stored in a router’s flash memory, one called c2500-j-l.111-3.bin and one called c2500-j-l.112-14.bin. a. Which one does the router use when it boots up? b. How could you force the other IOS file to be used? c. Without looking at the configuration, what command could be used to 39

discover which file was used for the latest boot of the router? 22. What is the main purpose of Layer 3? IP address, routing 23. What is the main purpose of Layer 2? Data Switching 24. What are the two different names for the router’s mode of operation that when accessed enable you to issue commands that could be disruptive to router operation? Exec Mode and Global terminal Mode 25. What is the purpose of Flash Memory in a Cisco router? Store Cisco IOS file

40

Related Documents