Anda di halaman 1dari 40

CCNA 640- 607 exam Questions and answers

1. Which of the following terms are used as synonyms for a MAC


address?
a. NIC address
b. LAN address
c. Burned-in address
d. Card address
e. All of the above

2. The following function is performed by what layer of the OSI


Reference model: Establishes and terminates communication
sessions between host processes.
a. Application
b. Presentation
c. Session
d. Transport
e. Network

3. Encapsulation occurs at which OSI Layer(s)?


a. All layers
b. Layers 2, 3, and 4
c. Layers 1, 3, 5, and 6
d. Layers 3, 5, and 7
e. Layers 1, 2, and 3

4. During the process of flow control which of the following


statements concerning its operation is true?
a. The transmitting device monitors the flow of data and stops
transmitting as needed.
b. In Novell networks flow control is know as pacing.
c. The receiving device tells the transmitting device to stop until the
data in its buffers has been processed.
d. The receiving device is told by the transmitting device to stop until the
data in its buffers has been processed.
e. The transmitting device is told by the receiving device to stop
until the data in its buffers has been processed.

5. Which type of data transfer network service does NOT require the
existence of a virtual circuit?
a. Connection-oriented
b. Connectionless
c. Neither connection-oriented nor connectionless
d. Both
e. None of the above

6. Which of the following would reside on OSI layer 3?


1
a. SRB
b. IS-IS
c. RSRB
d. SRTB
e. TB

7. The following function is performed by what layer of the OSI


Reference model:
Controls the physical layer flow of data by mapping between the
layers
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

8. Which of the following do not fall under OSI layer 7?


a. Directory Services
b. Virtual Terminal Protocol
c. CLNS
d. Message Handling System

9. How may bits make up a data link address?:


a. 32 bits
b. 48 bits
c. 16 bits
d. 24 bits
e. 64 bits

10. Routing is performed on which of the following OSI layers?


a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
e. Layer 1

11. How many bits are in an IP Address?


a. 6
b. 16
c. 24
d. 36
e. None of the above

12. UDP is what type of network service?


a. Connection-oriented
b. Connectionless-oriented
c. Media independent
d. Connectionless with acknowledgement
2
e. Connection-oriented with no acknowledgement

13.The following function is performed by what layer of the OSI


Reference model:
Provides synchronization between address and name databases
a. Application
b. Presentation
c. Session
d. Transport
e. Network

14. An IP address is an address burned into a NIC card by the


manufacturer
a. True
b. False

15. The following function is performed by what layer of the OSI


Reference model:
Fragments and reassembles packets while managing network layer
connections
a. Presentation
b. Session
c. Transport
d. Network
e. Data Link

16. Windowing is used by network devices to temporarily store


bursts of excess data in memory until they can be processed.
a. True
b. False

17. Which layer of the OSI reference model enables multiple data
links to be combined into an inter-network?
a. Layer 5
b. Layer 3
c. Layer 4
d. Layer 7
e. Layer 6

18. The following function is performed by what layer of the OSI


Reference model:
Provides data compression and encryption
a. Application
b. Presentation
c. Session
d. Transport
e. Network

3
19. The following function is performed by what layer of the OSI
Reference model:
Provides protocols to end user applications
a. Application
b. Presentation
c. Session
d. Transport
e. Network

20. What type of address refers to a logical network device?


a. Network address
b. Burned-in address
c. MAC address
d. Protocol address
e. None of the above

21. The following function is performed by what layer of the OSI


Reference model:
Addresses, switches and routes packets.
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

22. The OSI layer 6 has which of the following functions?


a. Specifies architecture independent data transfer format
b. Encodes and decodes data
c. Encrypts and decrypts data
d. Compresses data
e. All of the above

23. The following function is performed by what layer of the OSI


Reference model: Provides the interface to network devices
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

24. The following function is performed by what layer of the OSI


Reference model: Provides standardized services to applications
a. Application
b. Presentation
c. Session
d. Transport
e. Network

4
25. The following function is performed by what layer of the OSI
Reference model: Provides error free and reliable packet delivery.
a. Presentation
b. Session
c. Transport
d. Network
e. Data Link

26. The following function is performed by what layer of the OSI


Reference model: Translates the senders data to the format of the
receiver.
a. Application
b. Presentation
c. Session
d. Transport
e. Network

27. BGP, OSPF, IGRP, EIGRP and RIP would fall under which layer of
the OSI reference model?
a. Layer 4
b. Layer 3
c. Layer 5
d. Layer 6
e. None of the above

28. Which of the following IOS commands would you use to find out
the amount of DRAM your router contains?
a. show processor cpu
b. show version
c. show router
d. None of the above

29. Which IOS command would you use to put a new image in Flash
memory
of a Cisco router?
a. copy tftp flash
b. copy tftp bootflash
c. copy system flash
d. copy flash tftp
e. copy nvram flash

30. Which of the following router commands will enable you to enter
the entire motd from the router's command line?
a. banner motd c ****caution access is RESTRICTED!!!!****
b. banner motd c ****careless use will result in problems****
c. banner motd c *****Caution access is restricted*****
d. banner motd c *****cRazY NetoRk enGINeerS stINK*****
e. banner motd c *****UNAUTHORIZED USE IS CONSIDERED ILLEGAL*****
5
31. Which IOS command would you use to copy the your saved
configuration to a TFTP server?
a. copy nvram tftp
b. copy startup tftp
c. copy running tftp

32. A "#" symbol at the end of your router's hostname prompt


indicates:
a. That you are in configuration mode
b. That you are in read-only mode
c. That you are in enabled mode (privileged mode)
d. That you are in EXEC mode

33. What is the syntax to add a banner to a Cisco router


configuration?
a. banner
b. banner #
c. banner motd #
d. motd banner #

34. Which IOS command would you use to make your configuration
in NVRAM
your active configuration?
a. write memory
b. copy startup running
c. copy running startup
d. copy runn start
e. write net

35. What is the first thing that you are asked when running setup on
a Cisco IOS router?
a. Would you like to enter the initial configuration dialog?
b. Would you like to see the current interface summary?
c. Enter host name [Router]:
e. Enter an initial configuration using the setup command.

36. What command can you use on a Cisco IOS router to display the
session commands that you have used?
a. show users
b. who
c. show memory
e. show history

37. Which of the statements would be valid for configuring the IP


address on a router's interface?
a. ip address 200.111.5.1 255.255.255.
b. ip address 200.285.100.254 255.255.255.224
6
c. ip unnumbered ethernet0
d. ip-address 200.111.5.1
e. ip address 255.255.255.0 200.111.5.1

38. The following function is performed by what layer of the OSI


Reference model: Establishes and terminates communication
sessions between host processes.
a. Application
b. Presentation
c. Session
d. Transport
e. Network

39. Which of the following statements would you use to configure a


router to authenticate local connected console connections?
a. Set user with an account name and password
b. Configure login local under line con 0
c. Cannot be done, we need a TACAS server
d. Must use the secret password of Cisco
e. Both a and b

40. How do you customize how the router ">" character appears
when you
are logged into its CLI?
a. no prompt >
b. prompt Newsetting
c. service prompt newsetting
d. it can't be changed
e. Can only be completed via a vty session

41. What is the proper set of commands to enable logging in a


router and allow it to save log entries?
a. Router# logging console debugging
Router# logging buffered
b. Router# log console
Router# buffer log
c. Router(conf)# logging console debugging
Router(conf)# logging buffered
d. Router(conf)# log console
Router(conf)# buffer log

42. Which IOS command would you use to backup your IOS image to
a TFTP
server?
a. copy running tftp
b. copy startup tftp
c. copy flash tftp

7
43. Which of the following would reside on OSI layer 3?
a. SRB
b. IS-IS
c. RSRB
d. SRTB
e. TB

44. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

45. What command would you enter on an IOS router to view the
possible
commands?
a. ?
b. show commands
c. list commands

46. Which IOS command would you use to copy a running


configuration to a TFTP server?
a. copy start run
b. copy running-config start
c. copy tftp start
d. copy run tftp
e. copy running-confg flash

47. On an IOS router, which configuration command would you use


to disable IP routing?
a. set ip routing off
b. disable ip routing
c. no ip routing

48. What is the syntax for changing the name of a Cisco router?
a. host name newhostname
b. hostname newhostname
c. routername newhostname
d. You can not change the hostname

49. If you have two Cisco routers connected with DTE/DCE cables, to
which router would you add the command clock rate in order to
facilitate a CSU/DSU?
a. The serial interface running as a DCE
b. The serial interface running as a DTE
8
c. The Ethernet interface running as a DTE
d. The Ethernet interface running as a DCE

50. What is the command to set the clock rate on your DCE
interfaces?
a. clockrate 56
b. clock rate 56
c. clockrate 56000
d. clock rate 56000

51. What command do you use to change your enable password?


a. config t, enable secret password
b. config t, enable password password
c. config t, line vty 0 4, login, password password
d. config t, line con 0, login, password password

52. The following function is performed by what layer of the OSI


Reference model?: Provides standardized services to applications
a. Application
b. Presentation
c. Session
d. Transport
e. Network

53. The following function is performed by what layer of the OSI


Reference model?: Provides error free and reliable packet delivery.
a. Presentation
b. Session
c. Transport
d. Network
e. Data Link

54. When attaching a console cable to a Cisco router, how do you


log in to user mode?
a. Press return, type password if prompted
b. login <password>
c. Press return, <login name>
d. login <name, password>

55. What is the syntax to add a banner to a Cisco router


configuration?
a. banner
b. banner #
c. banner motd #
d. motd banner #

56. Which IOS command would you use to make your configuration
in NVRAM
9
your active configuration?
a. write memory
b. copy startup running
c. copy running startup
d. copy runn start
e. write net

57. The correct command to configure RIP version 2 on a Cisco


Router is:
a. router (conf)> router rip
b. router(config-if)#router rip
c. router (conf)# router rip
d. router# router rip_v2

58. How would you enable IGRP on a Cisco IOS router?


a. set igrp on
b. enable igrp
c. router igrp 100
d. router igrp
e. None of the above

59. The following function is performed by what layer of the OSI


Reference model?: Establishes and terminates communication
sessions between host processes.
a. Application
b. Presentation
c. Session
d. Transport
e. Network

60. Which IOS command would you use to backup your IOS image to
a TFTP
server?
a. copy running tftp
b. copy startup tftp
c. copy flash tftp

61. What is the default administrative distance for OSPF?


a. 110
b. 100
c. 120
d. 90
e. 1

62. Which of the following defines the addressing and Layer 3


header in the packet that is actually forwarded by a router?
a. Routed protocol
b. Routing protocol
10
c. Bridging protocol
d. Bridgeable protocol
e. Both c and d

63. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

64. What is the syntax for changing the name of a Cisco router?
a. host name newhostname
b. hostname newhostname
c. routername newhostname
d. You can not change the hostname

65. The following function is performed by what layer of the OSI


Reference model: Provides standardized services to applications
a. Application
b. Presentation
c. Session
d. Transport
e. Network

66. Routing protocol convergence time


a. is determined by the Network Time Protocol (NTP).
b. is affected by the data-link layer technology in use.
c. includes the time to detect a fault, but not the time to determine a new
route.
d. is the same for distance-vector protocols and link-state protocols.

67. Which of the following are connection-oriented protocols?


a. Frame Relay
b. IPX
c. IP
d. TCP
e. PPP

68. Which of the following routing protocols employ the HELLO


protocol?
a. RIP
b. IGRP
c. EIGRP
d. IS-IS
e. OSPF
11
69. When writing the access list portion of an IPX filter using an
extended access lists how are they identified?
a. numbered 700-799
b. numbered 800-899
c. numbered 900-999
d. through the use of the IPX keyword
e. none of the above

70. GNS is a request packet sent by what to locate the nearest


server it is part of:
a. IPX SAP
b. IPX DNS
c. Routing update
d. Broadcast
e. None of the above

71. Which of the following are reasons to receive an ICMP


destination unreachable message?
a. network unreachable
c. host unreachable
d. protocol unreachable
e. port unreachable

72. Which of the following is true of the node number portion of an


IPX address?
a. It is 32 bits long and is represented by hexadecimal and is automatically
assigned
b. It is 48 bits long and is represented by hexadecimal and is usually
the MAC address of the device
c. It is 32 bits long and is represented by hexadecimal and is never the MAC
address of the device
d. It is 48 bits long and is represented by hexadecimal and assigned by the
network administrator

73. Which IOS command would you use to find out what IPX routes
your router knows?
a. show ip route
b. show ipx cache
c. show ipx route

74. Which of the following are benefits of network segmentation


using Cisco routers?
a. Smaller broadcast domain
b. Easier to manage
c. Easier to configure

12
75. In IP addressing, what is the range of numbers in the first octet
for a class D address?
a. 240-254
b. 224-239
c. 128-191
d. 192-223

76. Which of the follow are functions of the OSI layer 3?


a. Frames packets
b. Controls physical layer data flow
c. Routing between networks
d. Provides interface to end-user processes

77. An internetworking device working at the network layer of the


OSI reference model has two major jobs. What are they?
a. Forwarding packets and learning the network topology
b. Detecting collisions and propagating collisions to all devices in a collision
domain
c. Defining addresses for network segments and learning the
addresses of all stations on an internetwork
d. Observing the source MAC addresses on frames received and updating a
database that maps addresses to port

78. Which of the following IOS commands could you use to show
what IP address if assigned to each interface on your router?
a. show running
b. write terminal
c. show ip interface brief
d. All of the above
e. None of the above

79. In IP addressing, what is the purpose of the subnet mask?


a. To borrow bits from the subnet field of the IP address for host addresses
b. To borrow bits from the host field and designate them as the
subnet field
c. None of the above

80. Which of the following would you use to run a debug operation
against IP access list 101?
a. debug access-list 101
b. debug ip packet list 101
c. debug packet list 101
d. debug ip packet 101 detail

81. Which of the following access lists will deny DNS? Two answers.
a. access-list 99 deny ip any host eq DNS
b. access-list 101 deny tcp any any eq 21
c. access-list 120 deny tcp any any eq 53
13
d. access-list 105 deny udp any any eq 53
e. None of the above

82. How would you remove access-list 105 from serial0 (outbound)
on a
2501 Cisco router?
a. Interface s0
no access-group 105
b. no access-list 105 in
c. Interface e0
no access-list 105
d. None of the above
e. B or C is correct

83. What is the syntax to add a banner to a Cisco router


configuration?
a. banner
b. banner #
c. banner motd #
d. motd banner #

84. Which IOS command would you use to make your configuration
in NVRAM
your active configuration?
a. write memory
b. copy startup running
c. copy running startup
d. copy runn start
e. write net

85. The number range that corresponds to an IP standard access list


is:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

86. The number range that corresponds to an extended 48-bit MAC


address
access-list is:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

87. Which range of numbers is valid in an extended IP access list?


14
a. 100-199
b. 101-299
c. 1-99
d. 500-599
e. 300-399

88. The correct command to configure RIP version 2 on a Cisco


Router is:
a. router (conf)> router rip
b. router(config-if)#router rip
c. router (conf)# router rip
d. router# router rip_v2

89. How would you enable IGRP on a Cisco IOS router?


a. set igrp on
b. enable igrp
c. router igrp 100
d. router igrp
e. None of the above

90. The following access list will deny what type of traffic?
permit 100 host 127.5.5.7 any 25
permit 100 host 127.5.5.7 any 80
a. All traffic unless it is HTTP or DNS
b. All traffic destined to the 127.5.5.7 network
c. this acl is not in the improper format
d. any traffic

91. The following function is performed by what layer of the OSI


Reference model: Establishes and terminates communication
sessions between host processes
a. Application
b. Presentation
c. Session
d. Transport
e. Network

92. What is the default administrative distance for OSPF?


a. 110
b. 100
c. 120
d. 90
e. 1

93. When a router examines an access list, it checks each statement


in the access list in the order in which it was entered?
a. True
b. False
15
94. The number range that corresponds to a Protocol type-code
access-list:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

95. Which of the following defines the addressing and Layer 3


header in the packet that is actually forwarded by a router.
a. Routed protocol
b. Routing protocol
c. Bridging protocol
d. Bridgable protocol
e. Both c and d

96. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

97. What is the syntax for changing the name of a Cisco router?
a. host name newhostname
b. hostname newhostname
c. routername newhostname
d. You can not change the hostname

98. Which of the following access-list would block IP RIP broadcast?


a. access-list 101 deny tcp any host 255.255.255.255
b. access-list 801 deny udp any host 255.255.255.0
c. access-list 101 deny ip any host 255.255.255.255

99. Which type of access lists can be named? Two answers.


a. Standard
b. Reflexive
c. Extended
d. Timed
e. None of the above

100. What is the maximum cable length for 100BaseTX using


Category 5
copper cable?
a. 100 meters
16
b. 200 meters
c. 500 meters
d. 1000 meters

101. Routing protocol convergence time


a. is determined by the Network Time Protocol (NTP).
b. is affected by the data-link layer technology in use.
c. includes the time to detect a fault, but not the time to determine a
new route.
d. is the same for distance-vector protocols and link-state protocols.

102. Which of the following are connection oriented protocols?


a. Frame Relay
b. IPX
c. IP
d. TCP
e. PPP

103. Which of the following routing protocols employ the HELLO


protocol? List all.
a. RIP
b. IGRP
c. EIGRP
d. IS-IS
e. OSPF

104. When writing the access list portion of an IPX filter using an
extended access lists how are they identified?
a. numbered 700-799
b. numbered 800-899
c. numbered 900-999
d. through the use of the IPX keyword
e. none of the above

105. GNS is a request packet sent by what to locate the nearest


server it is part of:
a. IPX SAP
b. IPX DNS
c. Routing update
d. Broadcast
e. None of the above

106. Which of the following are reasons to receive an ICMP


destination unreachable message? List all.
a. network unreachable
b. host unreachable
c. protocol unreachable
d. port unreachable
17
107. Which of the following is true of the node number portion of an
IPX address?
a. It is 32 bits long and is represented by hexadecimal and is automatically
assigned
b. It is 48 bits long and is represented by hexadecimal and is usually
the MAC address of the device
c. It is 32 bits long and is represented by hexadecimal and is never the MAC
address of the device
d. It is 48 bits long and is represented by hexadecimal and assigned by the
network administrator

108. Which IOS command would you use to find out what IPX routes
your router knows?
a. show ip route
b. show ipx cache
c. show ipx route

109. In IP addressing, what is the range of numbers in the first octet


for a class D address?
a. 240-254
b. 224-239
c. 128-191
d. 192-223

110. Which of the follow are functions of the OSI layer 3?


a. Frames packets
b. Controls physical layer data flow
c. Routing between networks
d. Provides interface to end-user processes

111. An internetworking device working at the network layer of the


OSI reference model has two major jobs. What are they?
a. Forwarding packets and learning the network topology
b. Detecting collisions and propagating collisions to all devices in a collision
domain
c. Defining addresses for network segments and learning the
addresses of all stations on an internetwork
d. Observing the source MAC addresses on frames received and updating a
database that maps addresses to port

112. Which of the following IOS commands could you use to show
what IP
address if assigned to each interface on your router?
a. show running
b. write terminal
c. show ip interface brief
d. All of the above
18
e. None of the above

113. In IP addressing, what is the purpose of the subnet mask?


a. To borrow bits from the subnet field of the IP address for host addresses
b. To borrow bits from the host field and designate them as the
subnet field
c. None of the above

114. Which of the following are benefits of network segmentation


using Cisco routers?
a. Smaller broadcast domain
b. Easier to manage
c. Easier to configure

115. What is the maximum distances for 10Base5 and 10Base2?


a. 200 meters
b. 500 meters
c. 500 yards
d. 200 yards
e. 10 miles

116. What do the letters MAC stand for?


a. Multiple Access Controller
b. Mac Address Controller
c. Media Access Control
d. Multiple Address Control
e. Mortal adaptation Climate

117. What routing protocol does a transparent bridge use to learn


about layer 3 addressing groupings.
a. IP
b. IPX
c. OSPF
d. IGRP
e. All of the above
f. None of the above

118. What is the distance limitation of 10BaseT and 100BaseTX?


a. 10 meter
b. 100 meters
c. 1000 meters

119. Encapsulation occurs at which layer(s)?


a. layers 2 and 3
b. layers 3 and 4
c. layers 5,6 and 7
d. none of the above
e. all of the above
19
120. How fast is FastEthernet?
a. Real Fast
b. 10 Mbps
c. 100 Mbps
d. 1 Gigbps
e. 200 Mbps

121. How many bytes long is a MAC address?


a. 32
b. 48
c. 6
d. 4
e. 64

122. Choose all of the following that are needed to support full-
duplex Ethernet.
a. Multiple paths between multiple stations on a link
b. Loopback and collision detection disabled
c. Full-Dulplex NIC cards
d. Automatic detection of full-duplex operation by all connected stations.

123. What two types of technology does 100BaseT use?


a. Swithcing with 53-byte cells.
b. CSMA/CD
c. IEEE 802.5
d. 802.3u
e. FDDI 222

124. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers
a. Session
b. Transport
c. Network
d. Data-link
e. Physical

125. Some advantages to segmenting with Bridges are _____?


a. Datagram filtering
b. Maageability (manageability)
c. Reliability
d. Scalability
e. Discobility

126. Which of the following describes a full-duplex transmission?


a. uses a single cable

20
b. Uses a point-to-point connection from the transmitter of the
transmitting station to the receiver of the receiving station
c. Data transmission in only both directions, but only on way at a time.
d. Data transmission in only one direction

127. Which of the following switching types is the default for Cisco
5505s?
a. Cut-through
b. Store-and-Forward
c. Store-and Cut
d. Fragment Free

128. The following function is performed by what layer of the OSI


Reference model: Provides synchronization between address and
name databases
a. Application
b. Presentation
c. Session
d. Transport
e. Network

129. What is the syntax to add a banner to a Cisco router


configuration?
a. banner
b. banner #
c. banner motd #
d. motd banner #

130. What is the command to set the clock rate on your DCE
interfaces?
a. clockrate 56
b. clock rate 56000
c. clockrate 56000
d. clock rate 56

131. When attaching a console cable to a Cisco router, how do you


log in to user mode?
a. Press return, type password if prompted
b. login <password>
c. Press return, <login name>
d. login <name, password>

132. What is the IEEE specification for Spanning Tree?


a. 802.2u
b. 802.3q
c. 802.1d
d. 802.6
21
e. None of the above

133. The number range that corresponds to an IP standard access


list is:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

134.Which of the statements would be valid for configuring the IP


address on a router's interface?
a. ip address 200.111.5.1 255.255.255.
b. ip address 200.285.100.254 255.255.255.224
c. ip unnumbered ethernet0
d. ip-address 200.111.5.1
e. ip address 255.255.255.0 200.111.5.1

135. Of the three switching types, which one has the lowest
latency?
a. Cut-through
b. FragmentFree
c. Store-and-Forward
d. None

136. Of the three swithcing types, which one has the highest
latency?
a. Cut-through
b. FragmentFree
c. Store-and-Forward
d. None

137. Which of the following IOS commands could you use to show
what IP
address if assigned to each interface on your router?
a. show running
b. write terminal
c. show ip interface brief
d. all of the above
e. none of the above

138. Which of the following would you use to run a debug operation
against IP access list 101?
a. debug access-list 101
b. debug ip packet list 101
c. debug packet list 101
d. debug ip packet 101 detail

22
139. What does a gateway do?
a. Routes traffic from physically different locations
b. Connects dissimiliar network systems
c. Protect networks from hackers
e. Allows secure access to dial-up users

140. How would you disable fast-switching for IP on an Ethernet


interface (for a Cisco router)?
a. no fast-switching
b. no ip route-cache
c. no ip mroute-cache
d. no fair-queue

141. Which of the following access lists will deny DNS?


a. access-list 99 deny ip any host eq DNS
b. access-list 101 deny tcp any any eq 21
c. access-list 120 deny tcp any any eq 53
d. access-list 105 deny udp any any eq 53
e. None of the above

142. Windowing is used by network devices to temporarily store


bursts of excess data in memory until they can be processed.
a. True
b. False

143. What physical layer defines the specification for 100Base-T


Ethernet over two pairs of Category 5 UTP cable?
a. 100BASE-TX
b. 100BASE-T4
c. 100BASE-FX

144. The Fast Ethernet (100Base-T) standard is comprised of how


many component specifications?
a. 2
b. 3
c. 5
d. 7

145. Which layer of the OSI reference model enables multiple data
links
to be combined into an internetwork?
a. Layer 5
b. Layer 3
c. Layer 4
d. Layer 7
e. Layer 6

23
146. How would you remove access-list 105 from serial0 (outbound)
on a 2501 Cisco router?
a. Interface s0
no access-group 105
b. no access-list 105 in
c. Interface e0
no access-list 105
d. None of the above
e. B or C is correct

147. What do the letters BRI stand for?


a. Begin Reading Information
b. Basic Routing Interface
c. Basic Rate Interface
d. Basic Routing Information

148. If packets are destined for a specific set of networks what is


this called?
a. unicast
b. broadcast
c. flexlycast
d. monocast
e. Multicast

149. Why is it important to limit broadcast traffic on LANs?


a. A broadcast frame is more likely to cause a collision than a unicast frame.
b. Hackers can see the data in broadcast frames and use the data to bring
down a LAN.
c. Broadcast traffic uses more bandwidth than unicast and multicast
traffic.
d. A broadcast frame interrupts the CPU of every network station on a LAN.

150. Which bit is used in Frame Relay to indicate that a frame has a
lower importance than other frames?
a. Cyclic Redundancy Check
b. Discard Eligibility
c. Forward-Explicit Congestion Notification

151. What is the syntax to add a banner to a Cisco router


configuration?
a. banner
b. banner #
c. banner motd #
d. motd banner #

152. Which IOS command would you use to make your configuration
in NVRAM your active configuration?
a. write memory
24
b. copy startup running
c. copy running startup
d. copy runn start
e. write net

153. What does a bridge do?


a. Allows you to cross deserts
b. Connects multiple WAN networks
c. Makes packet routing decisions
d. Allows packets to move from different media types or collision
domains

154. On an Ethernet interface, what mode of operation will allow the


simultaneous TX and RX of packets?
a. Half-duplex
b. Simplex
c. Full-duplex

155. The number range that corresponds to an IP standard access


list is:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

156. What types of addresses are seen on the data-link layer of the
OSI model?
a. IP addresses
b. MAC addresses
c. Logical addresses

157. Which of following statements would be correct for configuring


LMI on a Cisco IOS router to ANSI ?
a. frame-relay set lmi ansi
b. frame_relay lmi type ansi
c. frame-relay lmi-type ansi
d. frame-relay lmi type=ansi

158. The number range that corresponds to an extended 48-bit MAC


address access list is:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

25
159. Which of the following IOS commands would you use to find out
the amount of DRAM your router contains?
a. show processor cpu
b. show version
c. show router
d. None of the above

160. What is one of the major benefits of VLANs?


a. Simplified adds, moves, and changes
b. Ability to run routing protocols
c. Cheaper to build

161. Which IOS command would you use to put a new image in Flash
memory
of a Cisco router?
a. copy tftp flash
b. copy tftp bootflash
c. copy system flash
d. copy flash tftp
e. copy nvram flash

162. Which range of numbers is valid in an extended IP access list?


a. 100-199
b. 101-299
c. 1-99
d. 500-599
e. 300-399

163. The correct command to configure RIP version 2 on a Cisco


Router is:

a. router (conf)> router rip


b. router(config-if)#router rip
c. router (conf)# router rip
d. router# router rip_v2

164. How would you enable IGRP on a Cisco IOS router?


a. set igrp on
b. enable igrp
c. router igrp 100
d. router igrp
e. None of the above

165. Which is the correct order of events when a PPP connection


first comes up:
a. LCP, Authentication, IPCP
b. Authentication, LCP, IPCP
c. LCP, IPCP, Authentication
26
d. IPCP, Authentication, LCP

166. Which of the following statements regarding either full or half-


duplex Ethernet operation is true?
a. In full-duplex the Ethernet physical connector can provide
connectivity for several circuits.
b. Both full- and half-duplex can be considered collision free.
c. Full-duplex eliminates contention on Ethernet point-to-point links.
d. Full-duplex provides only a small performance increase over half duplex

167. The following access list will deny what type of traffic?
permit 100 host 127.5.5.7 any 25
permit 100 host 127.5.5.7 any 80
a. All traffic unless it is HTTP or DNS
b. All traffic destined to the 127.5.5.7 network
c. this acl is not in the improper format
d. any traffic

168. The following function is performed by what layer of the OSI


Reference model: Establishes and terminates communication
sessions between host processes
a. Application
b. Presentation
c. Session
d. Transport
e. Network

169. What are some of the disadvantages of bridging vs. routing?


a. Bridges cannot provide flow control
b. Bridges cannot provide congestive feedback information to end node.
c. a and b

170. How would you apply access list 101 to the Ethernet interface
of a 2501 Cisco router for outbound traffic?
a. ip access-group 100 out
b. ip access-class 101 out
c. access-list 101 out
d. ip access-group 101
e. None of the above

171. What is the default administrative distance for OSPF?


a. 110
b. 100
c. 120
d. 90
e. 1

27
172. When a router examines an access list, it checks each
statement in the access list in the order in which it was entered?
a. True
b. False

173. The number range that corresponds to a Protocol type-code


access list:
a. 1-99
b. 100-199
c. 200-299
d. 700-799
e. 1100-1199

174. When an ISDN BRI initially comes up for the first time, what is
assigned to it by the ISDN switch?
a. Service Access Point Identifier
b. Terminal Endpoint Identifier
c. Call Reference number

175. What access method algorithm is used in Ethernet?


a. CSMA/CD
b. CSMD/CD
c. CDMC/CD
d. None of the above

176. Which ISDN high-speed, full-duplex channel operates at 384


Kbps?
a. B channel
b. D channel
c. E channel
d. F channel
e. H channel

177. Which of the following defines the addressing and Layer 3


header in the packet that is actually forwarded by a router.
a. Routed protocol
b. Routing protocol
c. Bridging protocol
d. Bridgable protocol
e. Both c and d

178. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers
a. Session
b. Transport
c. Network
d. Data Link
28
e. Physical

179. What is the syntax for changing the name of a Cisco router?
a. host name newhostname
b. hostname newhostname
c. routername newhostname
d. You can not change the hostname

180. What is the first thing that you are asked when running setup
on a Cisco IOS router?
a. Would you like to enter the initial configuration dialog?
b. Would you like to see the current interface summary?
c. Enter host name [Router]:
e. Enter an initial configuration using the setup command.

181. Which of the following statement would be correct for


configuring keepalives on a Frame Relay Interface (Cisco IOS
router)?
a. frame-relay keepalive 15
b. frame relay keepalive 10
c. frame-relay keepalive 1
d. frame relay keepalive 10

182. On a Cisco IOS router, multiple ISDN PRI lines can be


configured to share a single D-channel
a. True
b.False

183. What command can you use on a Cisco IOS router to display
the session commands that you have used?
a. show users
b. who
c. show memory
d. show history

184. Which of the following access-list would block IP RIP


broadcast?
a. access-list 101 deny tcp any host 255.255.255.255
b. access-list 801 deny udp any host 255.255.255.0
c. access-list 101 deny ip any host 255.255.255.255

185. Which type of access lists can be named?


a. Standard
b. Reflexive
c. Extended
d. Timed
e. None of the above

29
186. What is the maximum cable length for 100BaseTX using
Category 5 copper cable?
a. 100 meters
b. 200 meters
c. 500 meters
d. 1000 meters

187. Routing protocol convergence time


a. is determined by the Network Time Protocol (NTP).
b. is affected by the data-link layer technology in use.
c. includes the time to detect a fault, but not the time to determine a new
route.
d. is the same for distance-vector protocols and link-state protocols.

188. Which of the following are acceptable techniques to help


relieve network congestion?
a. Customize timers
b. Configure a local loopback interface on the router to handle broadcasts
c. Prioritize traffic through the use of standard ACL's
d. a and c
e. b and c

189. Which of the following routing protocols employ the HELLO


protocol?
a. RIP
b. IGRP
c. EIGRP
d. IS-IS
e. OSPF

190. Which of the following does a router generally handle better


than a switch?
a. Loop avoidance through the use of the spanning-tree algorithm
b. Quickly learning the MAC addresses of stations on the LAN
c. Redundant paths and effective path selection
d. Forwarding packets after simply looking at the destination MAC address

191. In Frame Relay, what is meant by the CIR ?


a. The rate the network supports under normal operations
b. The rate the network supports under heavy load operations
c. The rate the network supports under maximum load operations

192. Which of the following terms are used as synonyms for a MAC
address?
a. NIC address
b. LAN address
c. Burned-in address
d. Card address
30
e. All of the above

193. Generally, ISDN is considered to be which of the following


types of service?
a. Switched
b. Nonswitched
c. Dedicated
d. Analog
e. Digital

194. Frame Relay specifies only the lower two layers of the OSI
reference model
a. True
b. False

195. When writing the access list portion of an IPX filter using an
extended access lists how are they identified?
a. numbered 700-799
b. numbered 800-899
c. numbered 900-999
d. through the use of the IPX keyword
e. none of the above

196. GNS is a request packet sent by what to locate the nearest


server it is part of:
a. IPX SAP
b. IPX DNS
c. Routing update
d. Broadcast
e. None of the above

197. Before migrating a mostly routed internetwork to a mostly


switched network, you should
a. set the default Time to Live value to 1 on all IP stations.
b. investigate the characteristics of the network traffic.
c. recable the network.
d. try using VLANs first because they are easier to configure than switched
LANs.

198. Which statement is true about differences between store-and-


forward switching and cut-through switching?
a. A cut-through switch copies all of a received frame into its buffers and
computes the cyclic redundancy check (CRC).
b. A store-and-forward switch discards a frame if it contains a CRC
error.
c. A store-and-forward switch copies only the destination address of a
received frame into its buffers.

31
d. Unlike a cut-through switch, a store-and-forward switch learns the MAC
addresses of every station on the LAN.

199. Which of the statements would be valid for configuring the IP


address on a router's interface?
a. ip address 200.111.5.1 255.255.255.
b. ip address 200.285.100.254 255.255.255.224
c. ip unnumbered ethernet0
d. ip-address 200.111.5.1
e. ip address 255.255.255.0 200.111.5.1

200. A port on a switch using the Spanning-Tree Protocol moves


through five states, are these states in the correct order?
1. From initialization to blocking
2. From blocking to listening or to disabled
3. From listening to learning or to disabled
4. From learning to forwarding or to disabled
5. From forwarding to disabled
a. Yes they are in correct order
b. No they are not

201. On an Ethernet segment, a station is permitted to transmit


only one packet at a time, and then it must contend with all the
other station for subsequent transmissions
a. True
b. False

202. What condition is most accurate when the Spanning-Tree


Protocol is not in operation or fails?
a. When loops occur, some switches see stations appear on both
sides of the switch. This condition confuses the forwarding
algorithm and allows duplicate frames to be forwarded.
b. A routing loop occurs and the switches put that port into standby mode.
c. A failure of the Spanning-Tree Protocol causing a lock condition within the
router port because of multiple paths to the destination.
d. The Spanning-Tree Protocol is a faultless protocol so this is a trick question
e. All of the above

203. Which of the following is true of the node number portion of an


IPX address?
a. It is 32 bits long and is represented by hexadecimal and is automatically
assigned
b. It is 48 bits long and is represented by hexadecimal and is usually
the MAC address of the device
c. It is 32 bits long and is represented by hexadecimal and is never the MAC
address of the device
d. It is 48 bits long and is represented by hexadecimal and assigned by the
network administrator
32
204. Which IOS command would you use to find out what IPX routes
your router knows?
a. show ip route
b. show ipx cache
c. show ipx route

205. Which of the following are benefits of network segmentation


using Cisco routers?
a. Smaller broadcast domain
b. Easier to manage
c. Easier to configure

206. In IP addressing, what is the range of numbers in the first octet


for a class D address?
a. 240-254
b. 224-239
c. 128-191
d. 192-223

207. Encapsulation occurs at which OSI Layer(s)?


a. All layers
b. Layers 2, 3, and 4
c. Layers 1, 3, 5, and 6
d. Layers 3, 5, and 7
e. Layers 1, 2, and 3

208. During the process of flow control which of the following


statements concerning its operation is true?
a. The transmitting device monitors the flow of data and stops transmitting
as needed.
b. In Novell networks flow control is know as pacing.
c. The receiving device tells the transmitting device to stop until the
data in its buffers has been processed.
d. The receiving device is told by the transmitting device to stop until the
data in its buffers has been processed.
e. The transmitting device is told by the receiving device to stop until the
data in its buffers has been processed.

209. Which type of data transfer network service does NOT require
the existence of a virtual circuit?
a. Connection-oriented
b. Connectionless
c. Neither connection-oriented nor connectionless
d. Both
e. None of the above

33
210. At which layer on the OSI reference model does ISDN Q.921
reside?
a. Layer 2
b. Layer 3
c. Layer 1

211. Which of the following are the switching methods available in a


switch?
a. First in first out
b. Cut through
c. Store and forward
d. Fast switching
e. Both b and c

212. How do you customize how the router ">" character appears
when you
are logged into its CLI?
a. no prompt >
b. prompt Newsetting
c. service prompt newsetting
d. it can't be changed
e. Can only be completed via a vty session

213. What is the proper set of commands to enable logging in a


router and allow it to save log entries?
a. Router# logging console debugging
Router# logging buffered
b. Router# log console
Router# buffer log
c. Router(conf)# logging console debugging
Router(conf)# logging buffered
d. Router(conf)# log console
Router(conf)# buffer log

214. What is the IEEE standard for the Spanning-Tree Protocol?


a. 802.1
b. 802.1d
c. 802.1g
d. 802.1a

215. What are the different types of xxxxxxcasts?


a. unicast
b. broadcast
c. flexlycast
d. monocast
e. Multicast

216. Which of the follow are functions of the OSI layer 3?


34
a. Frames packets
b. Controls physical layer data flow
c. Routing between networks
d. Provides interface to end-user processes

217. An internetworking device working at the network layer of the


OSI reference model has two major jobs. What are they?
a. Forwarding packets and learning the network topology.
b. Detecting collisions and propagating collisions to all devices in a collision
domain.
c. Defining addresses for network segments and learning the
addresses of all stations on an Internetwork.
d. Observing the source MAC addresses on frames received and updating a
database that maps addresses to port.

218. Which of the following IOS commands could you use to show
what IP address if assigned to each interface on your router?
a. show running
b. write terminal
c. show ip interface brief
d. All of the above
e. None of the above

219. For a Cisco router to support a point-to-multipoint


configuration, what needs to be configured?
a. Physical addresses
b. DLCIs
c. CIRs
d. Subinterfaces

220. When a bridge receives a frame it does what with it?


a. Immediately forwards on all frames
b. Receives the entire stream of frames and then forwards them
c. Bridges don't care about frames; they just connect two dissimilar networks
d. Store the frame and then forward all frames
e. c and d

221. The following function is performed by what layer of the OSI


Reference model: Controls the physical layer flow of data by
mapping between the layers.
a. Session
b. Transport
c. Network
d. Data Link
e. Physical

222. Which of the following do not fall under OSI layer 7?


a. Directory Services
35
b. Virtual Terminal Protocol
c. CLNS
d. Message Handling System

223. In IP addressing, what is the purpose of the subnet mask?


a. To borrow bits from the subnet field of the IP address for host addresses
b. To borrow bits from the host field and designate them as the
subnet field
c. None of the above

224. How may bits make up a data link address:


a. 32 bits
b. 48 bits
c. 16 bits
d. 24 bits
e. 64 bits

225. Routing is performed on which of the following OSI layers?


a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
e. Layer 1

226. How many bits are in an IP Address?


a. 6
b. 16
c. 24
d. 36
e. None of the above

227. On a Cisco router running late 11.2 IOS, which of the following
commands will show you the switching method for the packets
transmitted for interface Ethernet0?
a. show interface e0
b. show interface e0 accounting
c. show interface e0 stats
d. show interface e0 crb
e. It cannot be done

228. Segmenting a network with a switch will give you which of the
following benefits?
a. Low latency
b. High frame-forwarding rates
c. Increases available bandwidth of a network
d. Works with existing 802.3 compliant network interface cards and cabling
e. All of the above

36
229. ISDN uses what type of signaling?
a. Out-of-band
b. In-band
c. Distributed
d. None of the above

-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
Fill in the blank Question.

1. Name the seven layers of the OSI model.

Physical, Data Link, Network, Transport, Session, Presentation, Application

2. What is the main purpose of Layer 3?

Ip address, Routing

3. What is the main purpose of Layer 2?

Data switching

4. What is the purpose of ROM in a Cisco router?

Store the IOS

5. What does CDP stand for?

Cisco Discovery Protocol

6. If two IOS files are stored in a router's flash memory, one called
c2500-j-l.111-3.bin and one called c2500-j-l.112-14.bin.

a. Which one does the router use when it boots up?

b. How could you force the other IOS file to be used?

Config-register

c. Without looking at the configuration, what command could be used to


discover which file was used for the latest boot of the router?

Show version

7. What are the two different names for the router's mode of operation
that when accessed enable you to issue commands that could be
disruptive to router operation?
37
Exec mode and global terminal mode

8. What is the purpose of Flash Memory in a Cisco router?

Store Cisco IOS file

9. Name the parts of an IP address.

An IP address consists of 32 bits of information. These bits are


divided into four section, referred to as octets or bytes, each containing
1bytes (8 bits)

10. Name the three classes of unicast IP addresses and list their
default masks, respectively.

Class A 1-127 S/N 255.0.0.0


Class B 128-191 S/N 255.255.0.0
Class C 192-223 S/N 255.255.255.0

11. Define the purpose of ICMP redirect message.

ICMP is a Network layer Internet protocol for purpose of reporting


errors and providing information pertinent to IP packet procedures.

12. Name four types of Ethernet Framing for IPX.

Ethernet_802.3; Ethernet_802.2; Ethernet_II; Ethernet_SNAP

13. Name the command that lists all the SAP entries in a Cisco Router.

Debug IPX SAP activity

14. What is SAP?

Service Advertising Protocol (The Novell Network protocol that


supplies a way to inform network clients of resources and services
availability on network, using routers and server).

15. For each of the following examples, define the subnet address,
broadcast address, first and last usable addresses for that subnet.

IP address 172.16.129.201 Subnet Mask 255.255.255.240


S/N address
38
172.16.129.192 V/A 193-206 B/C 172.16.129.207

IP address 192.168.200.50 Subnet Mask255.255.255.252


S/N address
192.168.200.50 V/N 51-52 B/C 192.168.200.54

IP address 172.16.22.133 Subnet Mask255.255.252.0 S/N


address
172.16.22.0 V/A 172.16.22.1-172.16.23.254 B/C 192.168.30.127

IP address 192.168.30.101 Subnet Mask255.255.255.224


S/N address
192.168.30.96 V/A 97-126 B/C 192.168.30.127

IP address 10.16.193.6 Subnet Mask 255.255.248.0


S/N address
10.16.192.0 V/A 10.16.192.1-10.16.207.254 B/C 10.16.207.255

16. What does CDP stand for?

Cisco Discovery Protocol

17. What does CDP stand for?


Cisco Discovery Protocol

18. Name two methods of internal switching on switches today.

Store and Forward and Cut-Through

19. Define VLAN.

A group of devices on one or more logically segmented LANs, enable


devices to communicate as if attached to the same physical medium, when
they are actually located on numerous different LAN segments. VLANs are
base on logical instead of physical connections and thus are
tremendously flexible.

20. What does CDP stand for?

Cisco Discovery Protocol


21. If two IOS files are stored in a router’s flash memory, one called
c2500-j-l.111-3.bin and one called c2500-j-l.112-14.bin.

a. Which one does the router use when it boots up?

b. How could you force the other IOS file to be used?

c. Without looking at the configuration, what command could be used to


39
discover which file was used for the latest boot of the router?

22. What is the main purpose of Layer 3?

IP address, routing

23. What is the main purpose of Layer 2?

Data Switching

24. What are the two different names for the router’s mode of operation
that when accessed enable you to issue commands that could be
disruptive to router operation?

Exec Mode and Global terminal Mode

25. What is the purpose of Flash Memory in a Cisco router?

Store Cisco IOS file

40

Anda mungkin juga menyukai