Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4

Posted on August 21, 2009. Filed under: CCNA, Cisco ICND1 Exam Modules, Practice Exam | Tags: , , , |


 

Exam Source

Legend
answer   Correct answer
  Your answer, Correct.
  Your answer, Incorrect.
 
 1. Which three of the following components are common to routers, switches, and computers? (Choose 3)
RAM           
CPU           
motherboard           
  keyboard           
 2. Which two types of ports do routers have? (Choose 2.)
  printer           
console           
network           
  CD-ROM           
  USB           
 3. Which two statements best describe the functions of a router in a network? (Choose 2.)
Routers maintain their routing tables and ensure that other routers know of changes in the network.            
Routers use the routing table to determine where to forward packets.            
  Routers strengthen the signal over large distances in a network.           
  Routers create larger collision domains.           
  Routers use ICMP to communicate network information from the router’s own routing table with other routers.           
 4. Which three of the following statements about the path determination process are accurate? (Choose 3.)
Routers evaluate the available paths to a destination           
The routing process uses metrics and administrative distances when evaluating network paths.           
  Dynamic routing occurs when the network administrator configures information on each router.           
Dynamic routing occurs when information is learned using routing information that is obtained from routing protocols.           
  A default route holds an explicit route to every network.           
  The routing table holds multiple entries per network           
 5a. The router de-encapsulates the frame and uses the protocol information of the frame to determine that the network layer packet will pass to the IP process.
  Step 1           
Step 2           
  Step 3           
  Step 4           
  Step 5           
 5b. If the destination network is on a directly attached network, the router will use the ARP process to obtain the MAC address of the host and forward it to the network segment. If the network is reachable through another router, the router will use the MAC address of the next-hop router and forward the packet out the interface indicated in the routing table.
  Step 1           
  Step 2           
  Step 3           
Step 4           
  Step 5           
 5c. The router checks the destination address in the IP header. Either the packet is destined for the router itself or it needs to be forwarded. If the packet needs to be forwarded, the router searches its routing table to determine where to send the packet.
  Step 1           
  Step 2           
Step 3           
  Step 4           
  Step 5           
 5d. The outgoing interface process encapsulates the packet appropriately to the media and sends the packet onto the network segment.
  Step 1           
  Step 2           
  Step 3           
  Step 4           
Step 5           
 5e. The router receives a packet on one of its interfaces.
Step 1           
  Step 2           
  Step 3           
  Step 4           
  Step 5           
 6. Which of the following contains routing information that helps a router in determining the routing path?
  IP Address           
  MAC Address           
routing table           
  routing protocol           
 7. Which three of the following statements describe the function of routing tables? (Choose 3.)
Routing tables provide an ordered list of known network addresses.           
  Routing tables are maintained through the transmission of MAC addresses.            
Routing tables contain metrics that are used to determine the desirability of the route.           
Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next-hop router) on the way to the final destination.           
  When a router receives an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source.           
  Although routing protocols vary, routing metrics do not.           
 8a. This entry comes from having interfaces attached to network segments. This entry is obviously the most certain; if the interface fails or is administratively shut down, the entry for that network will be removed from the routing table.
  Static routing           
  Dynamic routing           
  Default route           
Directly connected network           
 8b. This is an optional entry that is used when no explicit path to a destination is found in the routing table. This entry can be manually inserted or be populated from a dynamic routing protocol.
  Static routing           
  Dynamic routing           
Default route           
  Directly connected network           
 8c. These routes are entered manually by a system administrator directly into the configuration of a router.
Static routing           
  Dynamic routing           
  Default route           
  Directly connected network           
 8d. These routes are learned by the router, and the information is responsive to changes in the network so that it is constantly being updated.
  Static routing           
Dynamic routing           
  Default route           
  Directly connected network           
 9. Which three metrics are most commonly used by routing protocols to determine a network path? (Choose 3.)
hop count           
bandwidth           
delay           
  packet length           
  distance           
  quantity           
 10. Which three statements accurately describe a distance vector protocol? (Choose 3.)
  IGRP was developed by Cisco to address the issues associated with routing in medium-size LANs.           
Examples of this protocol include RIP and IGRP.           
This protocol determines the direction and distance to any network in the internetwork.            
  Using this protocol, a router needs to know the entire path to every network segment.           
This process is also known as “routing by rumor.”           
 11. Which three statements accurately describe a link-state routing protocol? (Choose 3.)
  The link-state database is used to calculate the paths with the highest bandwidths on the network.           
Link-state routing protocols respond quickly to network changes.           
  In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active.           
Link-state routing protocols send periodic updates (link-state refreshes) at long time intervals, approximately once every 30 minutes.            
In link-state routing protocols, every router tries to build its own internal map of the network topology.            
  Link-state routing protocols send periodic updates even if no network changes have occurred.           
 12. All computers function using the _____.
  base-10 system           
  decimal system           
  numeric system           
binary system           
 13. The decimal number 10 converts to the binary number _____.
  10           
1010           
  110           
  1000           
 14. Which of the following binary octets has an LSB of 0? (tip: LSB stands for least significant bit, a fancy name of the right-most bit)
  01100011           
  10100101           
10011010           
  10011001           
 15. IP addresses are represented using _____.
32-bit binary numbers           
  16-bit decimal numbers           
  8-bit binary numbers           
  8 sets of 4-bit decimal numbers           
 16. 2 to the fifth power is _____.
  2 X 5           
  128           
2 multiplied by itself 5 times           
  none of the above           
 17. The decimal number 205 converted into a binary number is _____.
  11011101           
  11001001           
  11000101           
11001101           
 18. The binary equivalent of decimal number 452 is _____.
111000100           
  110000100           
  111001100           
  101000100           
 19. What is the decimal equivalent of the binary number 11000111?
  218           
199           
  179           
  208           
 20. The binary number 11101000111 converted into a decimal number is _____.
  1183           
  1873           
  1638           
1863           
 21. How many octets does a Class A network have in the host field?
         
           
           
           
 22. What is the practical minimum number of bits that can be borrowed to form a subnet?
         
           
           
           
 23. Using 6 subnet bits, how many usable subnets are created?
  58           
  60           
64           
  66           
 24. How many host addresses can be used in a Class C network?
  253           
254           
  255           
  256           
 25. What is the maximum number of bits that can be borrowed to create a subnet for a Class C network?  (hint: Number of Valid Hosts On A Subnet = (2 to the power of the number fo host bits) – 2, leave 2 bits for host field in order to get 2 hosts per subnet.)
           
           
         
           
 26. A subnet mask tells the router to look at which portions of an IP address?
  mask and host bits           
  host and network bits           
  host and subnet bits           
network and subnet bits           
 27. If a router does not match the appropriate address portions to a number on its routing table, it _____.
  sends the packet back to the sender           
  passes the packet to the next router in the hierarchy           
  adds that number to its table           
discards the packet           
 28. Which of the following subnet masks falls on octet boundaries?
  255.0.0.0           
  255.255.0.0           
  255.255.255.0           
all of the above           
 29. Which two of the following are binary default subnet masks? (Choose 2.)
  11111111.00000000.00000000.00000000           
  11111111.11111111.01000000.00000000           
11111111.11111111.11111111.00000000           
  255.255.224.0           
 30. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?
  172.17.128.47           
  172.17.128           
172.17           
  10.172.47           
 31. 255.255.224.0 translates into the binary number _____.
  11111111.00000000.11100000.00000000           
  11111111.11100000.00000000.00000000           
11111111.11111111.11100000.00000000           
  11111111.11111111.11110000.00000000           
 32. To see how many bits you should borrow from the host portion of the network address to give you the number of subnets you need, you should _____.
  subtract the number of subnets you need from the host portion           
  add the bit values from right to left until the total (decimal value) is just greater than the number of subnets you need           
  add the bit values from left to right until the total (decimal value) is just greater than the number of subnets you need           
none of the above           
 33. How should you power up a Cisco router?
  Press the Reset button.           
Turn the power switch to “on.”           
  Connect the fiber cable to another router.           
  Attach the power cable plug to the router power supply socket.           
 34. When you start a Cisco router, what should you see on the console?
  Cisco IOS debug messages           
  the Diagnostic Console menu           
Cisco IOS software output text           
  a graphical picture showing the real-time status of the LED           
 35. What is the primary purpose of setup mode on a Cisco router?
  to display the current router configuration           
  to complete hardware and interface testing           
to bring up a minimal feature configuration           
  to fully configure a Cisco router for IP routing           
 36. Which statement best describes what the user EXEC mode commands allow you to configure on a Cisco router?
You cannot configure anything; the user mode commands are used to display information.           
  The user EXEC mode allows you to perform global configuration tasks that affect the entire router.            
  The user EXEC mode commands allow you to enter a secret password so that you can configure the router.           
  The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers.            
 37. Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
  exit           
  quit           
disable           
  userexec           
 38a. Provides a list of commands and the arguments associated with a specific command
context-sensitive help           
  console error messages           
  command history buffer           
 38b. Allows recall of long or complex commands or entries for reentry, review, or correction
  context-sensitive help           
  console error messages           
command history buffer           
 38c. Identifies problems with router commands incorrectly entered so that you can alter or correct them
  context-sensitive help           
console error messages           
  command history buffer           
 39. What information does the show running-config command provide on a Cisco router?
current (running) configuration in RAM           
  system hardware and names of configuration files           
  amount of NVRAM used to store the configuration           
  version of Cisco IOS software running on the router           
 40. Which Cisco IOS command displays the configuration of the system hardware and the software information?
show version            
  show interfaces           
  show startup-config           
  show running-config           
 41a. Router(config-if)#
  Line           
  Router           
Interface           
  Controller           
  Subinterface           
 41b. Router(config-line)#
Line           
  Router           
  Interface           
  Controller           
  Subinterface           
 41c. Router(config-subif)#
  Line           
  Router           
  Interface           
  Controller           
Subinterface           
 14d. Router(config-router)#
  Line           
Router           
  Interface           
  Controller           
  Subinterface           
 41e. Router(config-controller)#
  Line           
  Router           
  Interface           
Controller           
  Subinterface           
 42. If you enter a major command on a Cisco router, what happens?
  The router returns you to user EXEC mode.           
  The router returns a list of possible commands.           
  The router invokes a global configuration command.           
The router switches you from one configuration mode to another.           
 43. Which Cisco IOS command creates a message to be displayed upon router login?
  hostname hostname           
banner motd message           
  hostname interface description           
  description interface description           
 44. If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt?
Enter the enable secret command.           
  Enter the enable password command.           
  Enter either the enable secret or the enable password command.           
  Enter both the enable secret and the enable password commands.           
 45. Which Cisco IOS command will you use to set the console session timeout to 15 minutes and 30 seconds?
  set exec timeout 15 30           
  console timeout 15 30           
  timeout 15 30           
exec-timeout 15 30           
 46. Which Cisco IOS command configures a serial port in slot 0, port 1 on a modular router?
  interface serial 0-0-1           
  interface serial 0 0 1           
interface serial 0/0/1           
  interface serial 0/0-1           
 47. Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
  clock rate 64           
  clock speed 64           
clock rate 64000           
  clock speed 64000           
 48. A serial interface displays “Serial1 is up, line protocol is down.” Which two situations may cause this error? (Choose 2.)
The clock rate has not been set.           
  The interface has been manually disabled.           
  No cable is attached to the serial interface.           
  There are no keepalives.           
There is a mismatch in the encapsulation type.           
 49. Which two of the following would be considered a physical threat? (Choose 2)
  A user leaving their password in their desk.           
Someone turning off the power to the switch to block network access.           
Someone turning off the air conditioning system in the network closet.           
  Someone breaking into the cabinet that contains the network documentation.           
 50. Which four of the following can be protected with a password? (Choose 4)
Console access           
VTY access           
TTY access           
  User level access           
Exec level access           
 51. Which of the following is the most secure method of remotely accessing a network device?
  http           
  telnet           
ssh           
  rmon           
  snmp           
 52. Which of the following describes the Cisco Router and Security Device Manager ?
  It is a PC based management system that can be used to configure features like DHCP sever.           
It is a WEB based management system that can be used to configure features like DHCP sever.           
  It is a server based management system that can be used to configure features like DHCP sever.           
  It is a client based management system that can be used to configure features like DHCP sever.           
 53. Where do the Cisco Router and Security Device Manager files reside?
  The PC           
The Router           
  The local client           
  A Network server           
 54. What the two of the following are functions of DHCP? (Choose 2.)
  DHCP dynamically assigns host names to client devices           
DHCP dynamically assigns IP addresses to client devices.           
DHCP dynamically assigns a default gateway to client devices.           
  DHCP dynamically assigns security access levels to client devices.           
 55. Which of the following describes the DHCP server provided by Cisco IOS?
It is a full DHCP server            
  Its support is limited to assigning IP addresses to clients.           
  It has to get is DHCP information for a master DHCP server.           
  It has limited DHCP support and can only assign IP addresses and default gateways to clients.           
 56. Which of the following are required DHCP parameters when configuring a DHCP server on a Cisco router? (Choose 2)
Pool Name           
  Domain Name           
  Default Router           
  DNS Server Address           
  WINS Server Address           
DHCP Network and Subnet           
 57. Which command can be used to see if an address in the DHCP pool is already in use by another device?
  sh ip dhcp bindings           
  sh ip dhcp database           
  sh ip dhcp mapping            
sh ip dhcp conflict           
 58. Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?
SSH           
  SDM           
  ping           
  Telnet           
  traceroute           
 59. Which command would you use to see who has Telnet sessions to your router?
show user           
  show telnet           
  show sessions           
  show connections           
 60. Which of the following would you use to suspend a Telnet sessions?
  end keyword           
  suspend keyword           
CTRL-Shift-6 key sequence           
  CTRL-Shift-Del key sequence           
12660 participants so far
Number answered correctly: 71 out of 73
Advertisements

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

3 Responses to “Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4”

RSS Feed for IT Certifications Comments RSS Feed

[…] Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4 August 2009 […]

I have a problem with question 16. 2 to the fifth power is not 2 multiplied by itself 5 times. 2^5 is actually 2 multiplied by itself 4 times, because 2^1 = 2 and 2^2 = 4, therefor the first time is is multiplied to itself is on the power of 2.

[…] https://kl2217.wordpress.com/2009/08/21/answers-for-interconnecting-cisco-networking-devices-icnd-pr… xxxxx Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4 […]


Where's The Comment Form?

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: