Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions – Module 2

Posted on August 13, 2009. Filed under: CCNA, Cisco ICND1 Exam Modules, Practice Exam | Tags: , , , |


Exam Source
Legend
answer   Correct answer
  Your answer, Correct.
  Your answer, Incorrect.
 
1. Which two statements about the functions of a hub are accurate? (Choose two.)
A hub extends an Ethernet LAN.          
  A hub reduces the size of a collision domain.          
  Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth.          
  A hub is a data link layer device.          
A hub amplifies the data signal before retransmitting it.          
2. Which three statements best describe collisions? (Choose three.)
Collisions occur when two or more stations on a shared media transmit at the same time.          
  Larger segments are less likely to have collisions.          
In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.          
  Adding a hub to a network can improve collision issues.          
Collisions are by-products of a shared LAN.          
  More segments on a network mean greater potential for collisions.          
3. Which of these choices best describes a collision domain?
  two or more devices trying to communicate at the same time          
  two networks that are connected          
network segments that share the same bandwidth          
  none of the above          
4. What type of hardware will help eliminate collisions?
  repeater          
bridge          
  hub          
  extender          
5. Which three factors are typical causes of network congestion? (Choose three.)
high-bandwidth applications          
  many network segments          
increasing volume of network traffic          
more powerful computer and network technologies          
  few network segments          
  greater distances for LANs          
6. What are four characteristics of a bridge? (Choose four.)
  Bridges forward but do not filter data frames between LAN segments.          
Bridges maintain MAC address tables.          
Bridges are more “intelligent” than hubs.          
Bridges can buffer and forward frames between two or more LAN segments.          
  Bridges create fewer collision domains.          
Bridges operate at Layer 2 of the OSI model.          
7. What are two major benefits of adding a bridge to a network? (Choose two.)
isolating potential network problems to specific segments          
increasing the speed of a network          
  extending a LAN to cover greater distances by joining multiple segments          
  creating fewer collision domains          
  forwarding data frames between LAN segments          
8a. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame.
  Flooding          
Filtering          
  Forwarding          
8b. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment.
  Flooding          
  Filtering          
Forwarding          
8c. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame.
Flooding          
  Filtering          
  Forwarding          
9. Which three characteristics apply to a switch? (Choose three.)
uses a table of MAC addresses to determine the port to which the data is to be sent          
  connects LAN segments          
  reduces the number of collision domains          
increases the number of collision domains          
filters data before forwarding it to its destination on the network          
10. Which three features differentiate switches from bridges? (Choose three.)
large frame buffers          
  use of a table of MAC addresses to determine the segment to which the data is to be sent          
support for mixed media rates          
high port densities          
  ability to segment LANs          
11. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.)
Switches operate at much higher speeds than bridges.          
  Switches operate at lower speeds than bridges.          
Switches support more advanced functionality than bridges.          
  Switches support less functionality than bridges.          
Switches support dedicated communication between devices.          
  Switches do not support dedicated communication between devices.          
12. Which three statements about microsegmentation are accurate? (Choose three.)
  Implementing a bridge creates microsegmentation.          
Microsegmentation increases bandwidth availability.          
Each device on a network segment is connected directly to a switch port.          
Microsegmentation eliminates collisions.          
  Microsegmentation limits the number of segments on a network.          
  Microsegmentation uses half-duplex operation.          
13a. The network sends and receives data frames one at a time, but not simultaneously.
  Full-duplex communication          
Half-duplex communication          
13b. This communication type effectively doubles the amount of bandwidth between the devices.
Full-duplex communication          
  Half-duplex communication          
13c. The network sends and receives data frames simultaneously.
Full-duplex communication          
  Half-duplex communication          
14a. At the end-user level, gives high-performance, PC workstation 100-Mbps access to a server
  Ethernet 10BASE-T          
Fast Ethernet          
  Gigabit Ethernet          
14b. Not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups; at the backbone level, provides interswitch connectivity for low- to medium-volume applications
  Ethernet 10BASE-T          
  Fast Ethernet          
Gigabit Ethernet          
14c. At the workgroup level, provides high-performance connectivity to the enterprise server
  Ethernet 10BASE-T          
Fast Ethernet          
  Gigabit Ethernet          
14d. At the backbone level, provides backbone and interswitch connectivity
  Ethernet 10BASE-T          
  Fast Ethernet          
Gigabit Ethernet          
14e. At the end-user level, provides connectivity between the end user and the user-level switch
Ethernet 10BASE-T          
  Fast Ethernet          
  Gigabit Ethernet          
14f. Provides interswitch connectivity for low- to medium-volume applications
  Ethernet 10BASE-T          
  Fast Ethernet          
Gigabit Ethernet          
15. When a Cisco device starts up, which of the following does it run to check its hardware?
flash          
  RAM          
  POST          
  TFTP          
16. When a Catalyst switch or Cisco router starts up, what is the first operation performed?
  The device performs system startup routes.          
The device performs hardware checking routines.          
  The device attempts to locate other devices on the network.          
  The device tries to find and apply software configuration settings.          
17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____.
  CD-ROM          
  TFTP server          
console terminal          
  modem connection          
18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration.
  LAN port          
  uplink port          
  console port          
auxilary port          
19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
  user EXEC level          
  setup EXEC level          
  enable EXEC level          
privileged EXEC level          
20. How do you instruct a Cisco device to parse and execute an entered command?
  Press the Send key          
Press the Enter key          
  Add a space at end of the command          
  Wait 5 seconds after you enter the command          
21. Which CLI prompt indicates that you are working in privileged EXEC mode?
hostname#          
  hostname>          
  hostname-exec>          
  hostname-config          
22. Which command would you enter in the privileged EXEC mode to list the command options?
?          
  init          
  help          
  login          
23a. Attach the power cable plug to the switch power supply socket.
  Step 1          
Step 2          
  Step 3          
23b. Observe the boot sequence, including the Cisco IOS software output text on the console.
  Step 1          
  Step 2          
Step 3          
23c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected.
Step 1          
  Step 2          
  Step 3          
24. How do you start a Catalyst 2950 series switch?
  Press the on/off switch.          
  Power up the redundant power supply.          
  Connect a network cable to another switch on the network.          
Attach the power cable plug to the switch power supply socket.          
25. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
the > prompt          
  the privileged EXEC prompt          
  the Management Console logon screen          
  a list of commands available on the switch          
26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch?
c?          
  c ?          
  help c          
  help c*          
27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”?
  config?          
config ?          
  help config          
  help config*          
28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch?
  ip address          
  ip address 196.125.243.10          
  196.125.243.10 ip address          
ip address 196.125.243.10 255.255.255.0          
29. Which configuration mode will you use to configure a particular port on a switch?
  user mode          
  global configuration mode          
interface configuration mode          
  controller configuration mode          
30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
  MTU 1500 bytes          
  Hardware is … 10BaseT          
Address is 0050.BD73.E2C1          
  802.1d STP State: Forwarding          
31. Which show command requires that you have privileged EXEC mode access?
  show ip          
  show version          
show running          
  show interfaces          
32. How should you power up a Cisco router?
  Press the Reset button.          
Turn the power switch to “on.”          
  Connect the fiber cable to another router.          
  Attach the power cable plug to the router power supply socket.          
33. Which two of the following would be considered a physical threat? (Choose 2)
  A user leaving their password in their desk.          
Someone turning off the power to the switch to block network access.          
Someone turning off the air conditioning system in the network closet.          
  Someone breaking into the cabinet that contains the network documentation.          
34. Which four of the following can be protected with a password? (Choose 4)
Console access          
VTY access          
TTY access          
  User level access          
Exec level access          
35. Which two of the following are customized text that is displayed before the username and password login prompts?
Message Of the Day          
Login Banner          
  Access warning          
  User Banner          
  Warning message          
36. Which of the following is the most secure method of remotely accessing a network device?
  http          
  telnet          
ssh          
  rmon          
  snmp          
37. Which of the following is an IOS feature that can be used to control access to the VTY ports?
  shutdown          
  port security          
access list          
  firewall          
38. Which of the following is an IOS command that can be used to control access to a switch port based upon a MAC address?
  shutdown          
port security          
  mac-secure          
  firewall          
39. Which of the following is an IOS command that can be used to increase the security of unused switch ports?
shutdown          
  port security          
  mac-secure          
  firewall          
40. Which problem is caused by redundant connections in a network?
  microsegmentation          
loops          
  degradation          
  collisions          
41. Which statement best describes how loops can affect performance in a switched LAN?
Broadcast storms may be created when loops occur, preventing data from being transmitted over the network.          
  Any multicast, broadcast, or unknown traffic will be flooded out to all ports.          
  Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames.          
  The loop removes the frame from the network.          
42. Which statement accurately describes Spanning-Tree Protocol?
STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time.          
  STP automatically keeps the previously inactive path inactive.          
  STP eliminates the segments in which there are problems.          
  STP allows ports to listen to, forward, and flood data frames.          
43. Which of the following is an IOS command that is the most useful when troubleshooting media issues?
  show controller          
  show run          
show interface          
  show counters          
44. Which of the following is an IOS command that is the most useful when troubleshooting port access issues?
  show controller          
  show run          
show interface          
  show counters          
45. Which three of the following are methods used to mitigate configuration issues? (Choose 3)
  Secure unused ports          
Secure the configuration          
Verify changes before you save          
Know what you have before you start
Advertisements

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

6 Responses to “Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions – Module 2”

RSS Feed for IT Certifications Comments RSS Feed

charming post. due one unimportant where I bicker with it. I am emailing you in detail.

[…] Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions – Module 2 August 2009 1 comment 4 […]

Heya i am for the first time here. I found this board and I to find It really helpful & it helped me out a lot. I am hoping to give something again and help others such as you aided me. Please visit my blog whenever you wish. thx1!

Do you mind if I quote a couple of your posts as long as I provide credit and
sources back to your site? My blog site is in the exact same area of interest as yours and my visitors would definitely
benefit from some of the information you present here.
Please let me know if this ok with you. Thanks a lot!

Which two modes does Cisco recommend when configuring a particular switch port (Choose two.)?

[…] https://kl2217.wordpress.com/2009/08/13/answers-for-interconnecting-cisco-networking-devices-icnd-pr… xxxxx Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions -; Module 2 […]


Where's The Comment Form?

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: