CCENT Final Exam

CCENT Final Exam 1 — 50 Question Set

Posted on September 9, 2009. Filed under: CCENT Final Exam, Practice Exam |

Exam Source

Question 1: (QID=2961)

We want to assign port 3 of our Catalyst 2950 switch to VLAN 3. What command will achieve this?

1. switch(config)#switchport access vlan 3

2. switch#switchport access vlan 3

3. switch(config-if)#switchport vlan 3

4. switch(config-if)#switchport access vlan 3

———————————————

Correct answer(s): 4

Explanation: The switchport access vlan [number] command will configure a switch port to that VLAN. You can also use the switchport access vlan dynamic command to configure the switch port automatically in a certain VLAN depending on the VLAN membership of the incoming packets. For both commands to work properly the switch port needs to be in access mode.

[Implement a small switched network]

——————————————————————————–

Question 2: (QID=25148)

Which command will allow only ssh connections to the router?

1. transport input telnet ssh

2. transport input ssh

3. transport ssh

4. transport ssh enable

———————————————

Correct answer(s): 2

Explanation: The transport input ssh line configuration commands allows ssh connections only to the router.

[Implement a small switched network]

——————————————————————————–

Question 3: (QID=2986)

Which utility would we use to test all 7 OSI layers?

1. Ping

2. Trace route

3. Telnet

4. Show arp

———————————————

Correct answer(s): 3

Explanation: If we can telnet from one device to the other we have proven that the routing (layer 3) and the physical layer are working properly. Since telnet is an application layer utility it gives us confirmation that all 7 OSI layers are working correctly between the two devices.

[Implement a small switched network]

——————————————————————————–

Question 4: (QID=1286)

You are the network administrator and are given the tasks to plan for the future expansion of the network. You decide to subnet the current network of 172.15.0.0. What will be the subnet mask be if every subnet has to allocate 500 hosts.

1. 255.255.0.0

2. 255.0.0.0

3. 255.255.240.0

4. 255.255.254.0

———————————————

Correct answer(s): 4

Explanation: The requirement of having to allocate 500 hosts on each subnet can be achieved by the following: 2^9 = 512. So deducting the broadcast and network address we have 510 possible hosts on each subnet. We used 9 bits to allocate the hosts, this leaves us 7 bits for possible subnets. Those 7 bits in binary is 1111 1110 or 254 in decimal.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 5: (QID=2359)

What address range is commonly used for testing purposes?

1. 10.0.0.0/16

2. Any available IP Address

3. 127.0.0.0/8

4. 240.0.0.0 – 255.255.255.255

———————————————

Correct answer(s): 3

Explanation: The 127.0.0.0/8 address range in the Class A range is a reserved address range and used for testing purposes.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 6: (QID=2975)

If we have multiple IOS versions on our router, how can we view which ones are available?

1. Show version

2. Show memory

3. Show file systems

4. Show flash:

———————————————

Correct answer(s): 4

Explanation: The show flash: command displays the contents of the flash file system.

[Implement a small routed network]

——————————————————————————–

Question 7: (QID=2375)

What do you use when you want to display a message to all the terminals connected to a router?

1. banner login

2. banner motd

3. banner exec

4. banner slip-ppp

———————————————

Correct answer(s): 2

Explanation: This MOTD banner is displayed to all terminals connected and is useful for sending messages that affect all users (such as impending system shutdowns). Use the no exec-banner or no motd-banner command to disable the MOTD banner on a line. The no exec-banner command also disables the EXEC banner on the line. When a user connects to the router, the MOTD banner appears before the login prompt. After the user logs in to the router, the EXEC banner or incoming banner will be displayed, depending on the type of connection. For a reverse Telnet login, the incoming banner will be displayed. For all other connections, the router will display the EXEC banner. Connection, Menu, and System Banner Commands

[Implement a small switched network]

——————————————————————————–

Question 8: (QID=1294)

Given the following IP Address 172.16.0.0/27 what is the 4th subnet’s network address, host range and broadcast address? The router is running IOS version 12.2.

1. Subnet address 172.16.1.0, host range 172.16.1.1 – 172.16.1.30, broadcast address 172.16.1.31

2. Subnet address 172.16.0.128, host range 172.16.0.129 – 172.16.0.158, broadcast address 172.16.0.159

3. Subnet address 172.16.0.96, host range 172.16.0.97 – 172.16.0.126, broadcast address 172.16.0.127

4. Subnet address 172.16.1.128, host range 172.16.1.129 – 172.16.1.158, broadcast address 172.16.0.159

———————————————

Correct answer(s): 3

Explanation: The default subnet mask for a class B address is /16 so we will have 11 bits for subnets.

12.2 is the IOS mentioned and that has the IP Subnet-Zero command enabled by default.

So the total amount of subnets is 2^11 = 2048 subnets. On each subnet we will have 2^5 – 2 = 30 hosts on each subnet.

Now we will calculate the subnet ranges. The following table is the binary version of the last octet.

subnet bits host bits IP address role

000 00000 172.16.0.0 1st subnet network address

000 00001 172.16.0.1 host # 1

000 00010 172.16.0.2 host # 2

000 11110 172.16.0.30 host # 30

000 11111 172.16.0.31 broadcast address for 1st subnet

001 00000 172.16.0.32 2nd subnet network address

001 00010 172.16.0.34 host # 2 on 2nd subnet

001 11111 172.16.0.63 broadcast address for 2nd subnet

010 00000 172.16.0.64 3rd subnet network address

010 11111 172.16.0.95 broadcast address 3rd subnet

011 00000 172.16.0.96 4th subnet network address

011 11111 172.16.0.127 broadcast address 4th subnet

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 9: (QID=2995)

Which of the following symbols indicate that a ping was successful?

1. !

2. .

3. ?

4. U

———————————————

Correct answer(s): 1

Explanation: The following table explains the output generated by ping:

! – reply received

. – timed out

U – unreachable

C – congestion

? – unknown packet type

& packet lifetime exceeded

[Implement a small routed network]

——————————————————————————–

Question 10: (QID=25114)

Which layer of the OSI Model does a gateway operate at?

1. Session

2. Application

3. Network

4. Datalink

5. Physical

———————————————

Correct answer(s): 2

Explanation: [Describe the operation of data networks]

——————————————————————————–

Question 11: (QID=3629)

What are the 2 sublayers of the Data Link layer of the OSI model?

1. Logical Layer Control

2. Logical Link Control

3. Media Access Control

4. Medium Access Control

———————————————

Correct answer(s): 2 3

Explanation:

Layer Name Protocol/Services Details

7 Application Telnet, FTP, WWW, SMTP Provides and interface by which user applications access the network

6 Presentation ASCIIm, EBCDICm JPG, MIDI Encryption, compression and translation

5 Session RPC, NetBIOS Establishing, maintaining and mananging communication sessions

4 Transport TCP, UDP, SPX Flow and error control but for the end-to-end connection of 2 devices whose logical connection traverses a series of data links

3 Network IP, IPX, ARP, ICMP Routing of data across logical network paths is enabled here and defines packet and addressing format

2 Data Link (Sub-layers are Media Access Control and Logical Link Control) Frame Relay, LAPB, PPP, Ethernet, Token Ring, FDDI Controls how the medium is shared and accessed, how the devices are identified, how data is framed before transmission on the medium

1 Physical Electrical/optical protocols Voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors and other similar attributes are defined here

[Describe the operation of data networks]

——————————————————————————–

Question 12: (QID=25126)

Which of the following are valid actions of port-security?

1. shutdown

2. restrict

3. protect

4. reset

———————————————

Correct answer(s): 1 2 3

Explanation: The switchport port-security violation interface configuration command has the following options:

Shutdown (the default)

Restrict

Protect

[Implement a small switched network]

——————————————————————————–

Question 13: (QID=2341)

Why would a network administrator implement VLANs?

1. Security

2. Higher latency

3. Performance enhancement

4. No more need for routers

5. Broadcast control

———————————————

Correct answer(s): 1 3 5

Explanation: Here are some common reasons that a company might have VLANs:

Security – Separating systems with sensitive data from the rest of the network decreases the chance that someone will gain access to information they are not authorized to see.

Projects/Special applications – Managing a project or working with a specialized application can be simplified by the use of VLAN that brings all of the required nodes together.

Performance/Bandwidth – Careful monitoring of network use allows the network administrator to create VLANs that reduce the number of router hops and increase the apparent bandwidth for network users.

Broadcasts/Traffic flow – Since a principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces broadcasts. Access lists provide the network administrator with a way to control who sees what network traffic. An access list is a table the network administrator creates that lists what addresses have access to that network.

Departments/Specific job types – Companies may want VLANs set up for departments that are heavy network users (such as Multimedia or Engineering) or a VLAN across departments that is dedicated to specific types of employees (such as managers or sales people).

[Implement a small switched network]

——————————————————————————–

Question 14: (QID=2354)

Which of the following describe full-duplex Ethernet?

1. it uses point-to-point connections

2. is limited to speeds of 100Mb

3. stations can transmit and receive at the same time

4. it uses point-to-multipoint connections

———————————————

Correct answer(s): 1 3

Explanation: Using full-duplex Ethernet makes it possible for devices to transmit and receive at the same time which results in bandwidth optimization. Point-to-point connections are used between the device and switch. The IEEE802.x committee designed a standard for full duplex that covers 10BaseT, 100BaseX and 1000BaseX.

[Implement a small switched network]

——————————————————————————–

Question 15: (QID=25140)

Which of the following would you use if you wanted to transfer data securely across the internet?

1. VPN

2. Leased Line

3. URL Filtering

4. Anti-x

———————————————

Correct answer(s): 1

Explanation: A VPN is used to securely transfer data across insecure media, like the Internet.

[Identify security threats to a network and describe general methods to mitigate those threats]

——————————————————————————–

Question 16: (QID=25145)

The address field in a frame-relay header is called?

1. MAC

2. DLCI

3. PVC

4. SVC

———————————————

Correct answer(s): 2

Explanation: The DLCI (Data-Link Connection Identifier) is the address field in a frame-relay header.

[Implement and verify WAN links]

——————————————————————————–

Question 17: (QID=3619)

What is the default encapsulation on a Cisco router serial interface?

1. Frame-Relay

2. SDLC

3. PPP

4. HDLC

———————————————

Correct answer(s): 4

Explanation: High-Level Data Link Control. Bit-oriented synchronous data link layer protocol developed by ISO. Derived from SDLC, HDLC specifies a data encapsulation method on synchronous serial links using frame characters and checksums. [Describe the operation of data networks]

——————————————————————————–

Question 18: (QID=25144)

viewimage1

What type of cable is shown in the exhibit?

1. AEIA/TIA-232

2. EIA-530

3. X.21

4. V.35

———————————————

Correct answer(s): 4

Explanation: [Implement and verify WAN links]

——————————————————————————–

Question 19: (QID=1282)

Which of the following OSI layers is responsible for reliable transmission of data segments?

1. Session

2. Application

3. Transport

4. Data-Link

———————————————

Correct answer(s): 3

Explanation: Layer Name Protocol/Services Details

7 Application Telnet, FTP, WWW, SMTP Provides and interface by which user applications access the network

6 Presentation ASCIIm, EBCDICm JPG, MIDI Encryption, compression and translation

5 Session RPC, NetBIOS Establishing, maintaining and mananging communication sessions

4 Transport TCP, UDP, SPX Flow and error control but for the end-to-end connection of 2 devices whose logical connection traverses a series of data links

3 Network IP, IPX, ARP, ICMP Routing of data across logical network paths is enabled here and defines packet and addressing format

2 Data Link (Sub-layers are Media Access Control and Logical Link Control) Frame Relay, LAPB, PPP, Ethernet, Token Ring, FDDI Controls how the medium is shared and accessed, how the devices are identified, how data is framed before transmission on the medium

1 Physical Electrical/optical protocols Voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors and other similar attributes are defined here

[Describe the operation of data networks]

——————————————————————————–

Question 20: (QID=1307)

Which of the following protocols operate at Layer 3 of the OSI model? [Select all that apply]

1. IP

2. TCP

3. ICMP

4. UDP

5. ARP

6. SPX

———————————————

Correct answer(s): 1 3 5

Explanation: Layer Name Protocol/Services Details

7 Application Telnet, FTP, WWW, SMTP Provides and interface by which user applications access the network

6 Presentation ASCIIm, EBCDICm JPG, MIDI Encryption, compression and translation

5 Session RPC, NetBIOS Establishing, maintaining and mananging communication sessions

4 Transport TCP, UDP, SPX Flow and error control but for the end-to-end connection of 2 devices whose logical connection traverses a series of data links

3 Network IP, IPX, ARP, ICMP Routing of data across logical network paths is enabled here and defines packet and addressing format

2 Data Link (Sub-layers are Media Access Control and Logical Link Control) Frame Relay, LAPB, PPP, Ethernet, Token Ring, FDDI Controls how the medium is shared and accessed, how the devices are identified, how data is framed before transmission on the medium

1 Physical Electrical/optical protocols Voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors and other similar attributes are defined here

[Describe the operation of data networks]

——————————————————————————–

Question 21: (QID=1297)

What command will change the hostname of a router?

1. router#host name new name

2. router(config-router)#hostname new name

3. router>host name new name

4. router(config)#hostname new name

———————————————

Correct answer(s): 4

Explanation: To specify or modify the host name for the network server, use the hostname command in global configuration mode.

[Implement a small switched network]

——————————————————————————–

Question 22: (QID=2362)

What command do we use to find out how long our router has been online?

1. Show version

2. Show hardware

3. Show uptime

4. Show history

———————————————

Correct answer(s): 1

Explanation: The results of the show version command are shown below:

[Implement a small routed network]

——————————————————————————–

Question 23: (QID=25128)

802.11a uses which frequency range?

1. 900 MHz

2. 2.4 GHz

3. 5 GHz

4. 7 GHz

———————————————

Correct answer(s): 3

Explanation: The 5GHz frequency band is used by 802.11a wireless standard.

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 24: (QID=25118)

Which of the following protocols are routing protocols? [Select all that apply]

1. BGP

2. FTP

3. OSPF

4. SMTP

5. SNMP

6. RIP

7. NNTP

8. IGRP

———————————————

Correct answer(s): 1 3 6 8

Explanation: Routing protocols are used by intermediate systems to build tables used in determining path selection of routed protocols. Examples of these protocols include Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (Enhanced IGRP), Open Shortest Path First (OSPF), Exterior Gateway Protocol (EGP), Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), and Routing Information Protocol (RIP).

[Implement a small routed network]

——————————————————————————–

Question 25: (QID=25123)

What is the meaning of amber SYST led on a 2960 switch?

1. This is normal operation

2. There is a bridging loop

3. The switch IOS is loading

4. The switch failed its POST

———————————————

Correct answer(s): 4

Explanation: When the switch failed its POST, Power-On Self Test, the SYST led will turn amber and the IOS did not load.

[Implement a small switched network]

——————————————————————————–

Question 26: (QID=2379)

We want to go back to user EXEC from privileged EXEC. What command do we use to achieve this without exiting the session?

1. Exit

2. Log out

3. Disable

4. Logout

———————————————

Correct answer(s): 3

Explanation: Click here for more information.

[Implement a small switched network]

——————————————————————————–

Question 27: (QID=3632)

As a network administrator we want to make it easy to assign IP addresses to hosts. What protocol do we use?

1. DNS

2. DHCP

3. HSRP

4. NTP

———————————————

Correct answer(s): 2

Explanation: DHCP, as described by RFC 1541, or Dynamic Host Configuration Protocol is used for dynamically assigning network addresses and host specific configuration parameters.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 28: (QID=2343)

Which of the following Routing Protocols are considered Interior Protocols?

1. OSPF

2. EGP

3. RIP

4. EIGRP

5. BGP

———————————————

Correct answer(s): 1 3 4

Explanation: Interior protocols are used for routing networks that are under a common network administration. All IP interior gateway protocols must be specified with a list of associated networks before routing activities can begin. A routing process listens to updates from other routers on these networks and broadcasts its own routing information on those same networks. Cisco IOS software supports the following interior routing protocols:

Internet Gateway Routing Protocol (IGRP)

Enhanced Internet Gateway Routing Protocol (Enhanced IGRP)

Open Shortest Path First (OSPF)

Routing Information Protocol (RIP)

Intermediate System-to-Intermediate System (IS-IS)

[Implement a small routed network]

——————————————————————————–

Question 29: (QID=25116)

Wireless LANs are defined by which IEEE standard?

1. 802.10

2. 802.5

3. 802.3

4. 802.11

———————————————

Correct answer(s): 4

Explanation: Introduction to Wireless LANs

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 30: (QID=3685)

What are some advantages of having a layered OSI Model? [Select all that apply]

1. Changes at one layer do not affect the other layers

2. Networks are harder to design

3. Different vendor’s equipment can easily interoperate

4. Changes at one layer are propagated throughout the other layers

5. Prevents routing loops

———————————————

Correct answer(s): 1 3

Explanation: The main goal of the OSI model is to allow different vendors’ networks to interoperate. Some benefits of the OSI model are:

changes at a certain layer do no affect the other layers.

various types of hardware & software can communicate with each other.

networks are more extensible.

[Describe the operation of data networks]

——————————————————————————–

Question 31: (QID=3696)

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

1. /24

2. /25

3. /26

4. /27

———————————————

Correct answer(s): 3

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 32: (QID=1299)

Which key-sequence would you use to move the cursor to the beginning of the line?

1. CTRL+ P

2. CTRL+ E

3. CTRL + A

4. CTRL + F

———————————————

Correct answer(s): 3

Explanation: Keystrokes Purpose

Press Ctrl-B or press the left arrow key Moves the cursor back one character

Press Ctrl-F or press the right arrow key Moves the cursor forward one character

Press Ctrl-A Moves the cursor to the beginning of the command line

Press Ctrl-E Moves the cursor to the end of the command line

Press Esc B Moves the cursor back one word

Press Esc F Moves the cursor forward one word

Ctrl-P or the up arrow key Recalls commands in the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands

Ctrl-N or the down arrow key Returns to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively more recent commands

[Implement a small switched network]

——————————————————————————–

Question 33: (QID=1301)

viewimage2

You are the administrator of network X. You decided to implement RIP in the following topology (click exhibit). You do not want R3 to receive RIP updates. What configuration changes need to be implemented?

1. Implement a passive-interface on R1

2. Nothing needs to be configured

3. Create a sub-interface on R1

4. Change the routing protocol to OSPF

———————————————

Correct answer(s): 1

Explanation: To block RIP broadcasts on an interface connected to a subnet of a RIP-enabled network add the passive-interface command to the RIP Process.

[Implement a small routed network]

——————————————————————————–

Question 34: (QID=25124)

How do you enable SSH on your switch?

1. switch(config-line)#input ssh

2. switch(config-line)#transport input ssh

3. switch(config-line)#transport ssh

4. SSH is enabled by default

———————————————

Correct answer(s): 3

Explanation: The transport input ssh command will allow SSH sessions to your switch. You also need to create a user and password and generate a public and private key pair.

[Implement a small switched network]

——————————————————————————–

Question 35: (QID=25136)

When we have a variation in delay it is called?

1. Loss

2. Latency

3. Delay

4. Jitter

———————————————

Correct answer(s): 4

Explanation: Jitter occurs when there is a variation in the delay.

[Describe the operation of data networks]

——————————————————————————–

Question 36: (QID=2998)

viewimage3

After connecting two routers back-to-back we are unable to ping across the serial connection. A closer look reveals that both serial interfaces have the following status:

‘Serial0 is up, line protocol is down’

What needs to be configured on one of the routers to bring the serial interface up? [See the exhibit for network topology]

A) router1(config)# interface serial 0

router1(config-if)#clock rate 64000

B) router1(config)#interface serial 0

router1(config-if)#clockrate 64000

C) router2(config)#interface serial 0

router2(config-if)#clockrate 64000

D) router2(config)#interface serial 0

router2(config-if)#clock rate 64000

1. A

2. B

3. C

4. D

———————————————

Correct answer(s): 4

Explanation: When connecting router back-to-back with a DTE/DCE cross-over cable we need to set the clocking on the DCE side of the connection. The show controllers serial [interface nr] command tells you what side is DTE or DCE.

[Implement and verify WAN links]

——————————————————————————–

Question 37: (QID=3002)

viewimage4

We try to look at the log on the router but we get the following [see exhibit]. What do we need to do in order to view the log?

1. Reboot the router

2. Use the logging buffered global configuration command

3. Use the enable log all global configuration command

4. We can not do anything since there is no such thing as a log

———————————————

Correct answer(s): 2

Explanation: To enable system messages to a local buffer use the logging buffered [size] command in global configuration mode. The default size is 4096k and once this is full older messages will be overwritten with newer ones.

[Implement a small routed network]

——————————————————————————–

Question 38: (QID=3633)

HTTP and FTP are found at which OSI layer?

1. Network layer

2. Transport layer

3. Application layer

4. Presentation layer

———————————————

Correct answer(s): 3

Explanation:

Layer Name Protocol/Services Details

7 Application Telnet, FTP, WWW, SMTP Provides and interface by which user applications access the network

6 Presentation ASCIIm, EBCDICm JPG, MIDI Encryption, compression and translation

5 Session RPC, NetBIOS Establishing, maintaining and mananging communication sessions

4 Transport TCP, UDP, SPX Flow and error control but for the end-to-end connection of 2 devices whose logical connection traverses a series of data links

3 Network IP, IPX, ARP, ICMP Routing of data across logical network paths is enabled here and defines packet and addressing format

2 Data Link (Sub-layers are Media Access Control and Logical Link Control) Frame Relay, LAPB, PPP, Ethernet, Token Ring, FDDI Controls how the medium is shared and accessed, how the devices are identified, how data is framed before transmission on the medium

1 Physical Electrical/optical protocols Voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors and other similar attributes are defined here

[Describe the operation of data networks]

——————————————————————————–

Question 39: (QID=25117)

For the network 192.168.1.0/27, what is the 5th subnet’s network address, broadcast address and host range? IP Subnet-zero is configured.

1. Subnet 192.168.1.0, Broadcast 192.168.1.31, hosts 192.1683.1.1 – 192.168.1.30

2. Subnet 192.168.1.160, Broadcast 192.168.1.191, hosts 192.168.1.161 – 192.168.1.190

3. Subnet 192.168.1.96, Broadcast 192.168.1.127, hosts 192.168.1.97 – 192.168.1.126

4. Subnet 192.168.1.128, Broadcast 192.168.1.159, hosts 192.168.1.129 – 192.168.1.158

———————————————

Correct answer(s): 4

Explanation: The default subnet mask for a class C address is /24 so we will have 3 bits for subnets.

So the total amount of subnets is 2^3 = 8 subnets

On each subnet we will have 2^5 – 2 = 30 hosts on each subnet

Now we will calculate the subnet ranges:

The following table is the binary version of the last octet.

Subnet bits Host Bits IP Address Role

000 00000 192.168.1.0 1st subnet network address

000 00001 192.168.1.1 host nr 1

000 00010 192.168.1.2 host nr 2

000 11110 192.168.1.30 host nr 30

000 11111 192.168.1.31 broadcast address for 1st subnet

001 00000 192.168.1.32 2nd subnet network address

001 00010 192.168.1.34 host nr 2 on 2nd subnet

001 11111 192.168.1.63 broadcast address for 2nd subnet

011 00000 192.168.1.96 4th subnet network address

011 11111 192.168.1.127 broadcast address 4th subnet

100 00000 192.168.1.128 5th subnet network address

100 11111 192.168.1.159 broadcast address 5th subnet

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 40: (QID=25137)

What kind of attack is designed to gather information?

1. DoS attack

2. DDoS attack

3. Reconnaissance attack

4. Access attack

———————————————

Correct answer(s): 3

Explanation: A reconnaissance attack is an attack aimed at gathering information as preparation for further attacks.

[Identify security threats to a network and describe general methods to mitigate those threats]

——————————————————————————–

Question 41: (QID=25143)

Which of the following are considered CPE?

1. CSU/DSU

2. Telco switch

3. Router

4. Demarcation point

———————————————

Correct answer(s): 1 3

Explanation: The CSU/DSU and router are considered CPE, Customer Premises Equipment.

[Implement and verify WAN links]

——————————————————————————–

Question 42: (QID=2378)

What command do we use to determine if a Serial interface on a Cisco router is either DTE or DCE?

1. Show interface serialx

2. Show ip interface serialx

3. Show controllers serial x

4. Show role serial x

———————————————

Correct answer(s): 3

Explanation: Click here for sample output of this command.

[Implement and verify WAN links]

——————————————————————————–

Question 43: (QID=25115)

Which of the following protocols can you find at the Transport layer of TCP/IP model? [Select all that apply]

1. ICMP

2. TCP

3. IP

4. FTP

5. ARP

6. UDP

———————————————

Correct answer(s): 2 6

Explanation: The Transport layer of the TCP/IP model corresponds with the Transport layer of the OSI model. TCP and UDP is found at these layers of the TCP/IP or OSI model.

[Describe the operation of data networks]

——————————————————————————–

Question 44: (QID=2987)

Our router has restarted and we want to know what caused this. Which command can we use to find out?

1. Show history

2. Show version

3. Show startup-config

4. Show ip protocols

———————————————

Correct answer(s): 2

Explanation: When issuing the show version command we the output displays a line ‘System restarted by’ followed by a reason. This line will give a good indication what the reason was why the router restarted.

[Implement a small routed network]

——————————————————————————–

Question 45: (QID=1479)

Which of the following statements are true? [Select all that apply]

1. Switches control broadcast domains

2. Hubs control collision domains

3. Routers control broadcast domains

4. Hubs control broadcast domains

5. Switches control collision domains

———————————————

Correct answer(s): 3 5

Explanation: Routers are the border of a broadcast domain because they don’t forward broadcasts by default. A switch can control a broadcast domain if VLANs are configured on the switch otherwise they divided the network in separate collision domains.

domains

[Implement a small switched network]

——————————————————————————–

Question 46: (QID=25138)

What is described by a self-propagating piece of software that replicates itself on the network and usually used in DoS attacks?

1. Virus

2. Trojan

3. Spyware

4. Worm

———————————————

Correct answer(s): 4

Explanation: A worm is a program that self-propagates on the network without user intervention and is commonly used in DoS attacks.

[Identify security threats to a network and describe general methods to mitigate those threats]

——————————————————————————–

Question 47: (QID=25122)

Which of the following terms describes an IP address that represents a host on an enterprise network?

1. Inside global

2. Inside local

3. Outside global

4. Outside local

———————————————

Correct answer(s): 2

Explanation: The inside local address is the IP Address of a host that is local to the enterprise network.

[Implement and verify WAN links]

——————————————————————————–

Question 48: (QID=25142)

How many bytes make up the network portion of a class C address?

1. 1

2. 2

3. 3

4. 4

5. 6

6. 8

———————————————

Correct answer(s): 3

Explanation: The first 3 octets of a class C address represents the network part, an octet is 1 byte long.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 49: (QID=2965)

We want to create an additional VLAN on our Catalyst 2950 switch. Which command do we use?

A) Switch1(config)#vlan 45

Switch1(config-vlan)#end

B) Switch1(config-vlan)#vlan 45

Switch1(config-vlan)#end

C) Switch1(enable)#vlan 45

D) Switch1(config-vlan)#vlan 45

Switch1(config-vlan-database)#end

1. A

2. B

3. C

4. D

———————————————

Correct answer(s): 1

Explanation: We create a new VLAN in global configuration mode. After creating the VLAN with the vlan VLAN_ID command we exit the VLAN database by using the end command to update this database.

[Implement a small switched network]

——————————————————————————–

Question 50: (QID=25134)

Which of the following is a mechanism used by TCP/IP to protect buffer space and routing devices?

1. Flow control using windowing

2. Connection establishment and termination

3. Error recovery

4. Multiplexing using ports

———————————————

Correct answer(s): 1

Explanation: Flow control using windowing is a mechanism used by TCP/IP to protect buffer space and routing devices in the transport layer of the OSI model.

[Describe the operation of data networks]

Advertisements
Read Full Post | Make a Comment ( 19 so far )

CCENT Final Exam 3 — 51 question set

Posted on August 27, 2009. Filed under: CCENT Final Exam, CCNA | Tags: , , , |

Exam Source

1. Which devices segment collision domains? (Choose two.)

a. transceiver
#b. router
#c. switch
d. hub
e. media

02. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
(A) static NAT
(B) dynamic NAT
#(C) overloading
(D) overlapping
(E) port loading

03. What should be part of a comprehensive network security plan?
(A) Allow users to develop their own approach to network security
#(B) Physically secure network equipment from potential access by unauthorized individuals
(C) Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
(D) Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
(E) Minimize network overhead by deactivating automatic antivirus client updates
 

04. Which of the following commands will configure a default route to any destination network not found in the routing table?
(A) Router(config)# ip default-route 0.0.0.0 255.255.255.255 s0
(B) Router(config)# ip route 0.0.0.0 255.255.255.255 s0
(C) Router(config)# ip default-route 0.0.0.0 s0
#(D) Router(config)# ip route 0.0.0.0 0.0.0.0 s0
(E) Router(config)# ip route any any e0

05. For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RT A. Which command or series of commands will accomplish these objectives?
(A) RTA(config)#no cdp run
(B) RTA(config)#no cdp enable
(C) RTA(config)#interface s0/0
RTA(config-if)#no cdp run
#(D) RTA(config)#interface s0/0
RTA(config-if)#no cdp enable
 

06. What is the purpose of flow control?
(A) to ensure data is retransmitted if an acknowledgment is not received
(B) to reassemble segments in the correct order at the destination device
#(C) to provide a means for the receiver to govern the amount of data sent by the sender
(D) to regulate the size of each segment

7. A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)

#a. After the jam signal, all transmission stops for a random period.

b. When the collision is detected, the hosts stop transmission immediately.

c. When the collision is detected, the hosts stop transmission after eight microseconds.

d. When the backoff period expires, the hosts involved in the collision have priority to transmit.

#e. When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit.

#f. When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision.

8. Which of the following devices extend a collision domain? (Choose two.)

a. switch

#b. hub

c. bridge

#d. router

e. repeater

9. What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)

#a. Existing NICs might need to be upgraded.

#b. Existing switches might need to be upgraded.

c. Existing NICs must support half-duplex mode.

d. Existing UTP wiring must be replaced with fiber.

e. Existing UTP must be tested for CAT 5e compatibility.

f. Existing network topology must support shared media.

10. which prompt is the global configuration mode on a Cisco router identified?
(A) Router>
(B) Router#
#(C) Router(config)#
(D) Router(config-if)#
(E) Router(config-line)#c
(F) Router(config-router)#

11. Which binary number is a representation of the decimal number 248?

a. 11101000

b. 11110100

#c. 11111000

d. 11111010

12. Which type of address is 223.168.17.167/29?

a. host address

b. multicast address

c. broadcast address

d. subnetwork address

13. Workstation A sends data to workstation B. What will have to be altered as the data passes through the router? (Choose two.)

#a. Layer 1 bit pattern

#b. Layer 2 frames

c. Layer 3 packets

d. Layer 4 segments

e. Layer 5 -7 data

14. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

a. 172.16.128.0 255.255.255.224

b. 172.16.128.0 255.255.0.0

c. 172.16.128.0 255.255.192.0

#d. 172.16.128.0 255.255.224.0

e. 172.16.128.0 255.255.255.192

15. What is the correct number of usable subnetworks and hosts for the IP network address 192.168.99.0 subnetted with a /29 mask?

a. 6 networks / 32 hosts

b. 14 networks / 14 hosts

#c. 30 networks / 6 hosts

d. 62 networks / 2 hosts

16. Which command is used on a Cisco router to reach the global configuration mode?
(A) Router> enable
(B) Router# router
(C) Router# setup
(D) Router# interface
#(E) Router# configure terminal

17. A NIC of a computer has been assigned an IP address of 172.31.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?

a. 172.31.0.0

b. 172.31.160.0

c. 172.31.192.0

d. 172.31.248.0

#e. 172.31.192.160

f. 172.31.192.248

18. What are three characteristics of the TCP protocol? (Choose three.)

#a. exchanges datagrams unreliably

#b. is used to send IP error messages

c. forces the retransmission of unacknowledged packets

d. creates a virtual session between end-user applications

#e. carries the IP address of the destination host in the TCP header

f. is responsible for breaking messages into segments and reassembling them at their destination

19. A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?

a. FTP and SNMP will use the same port number.

#b. FTP uses TCP to establish a session before any data is transferred.

c. The UDP session will reorder the SNMP data as it is received by the network management system.

d. The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.

20. Which protocols are TCP/IP application layer protocols? (Choose two.)

a. UDP

#b. FTP

c. IP

#d. SMTP

e. TCP

21. Which technologies are considered to be WAN technologies? (Choose two.)

a. Ethernet

#b. DSL

c. Token Ring

#d. Frame Relay

e. FDDI

22. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. How can this problem be corrected?
#(A) Enable the Serial 0/0 interface
(B) Correct the IP address for Serial 0/0
(C) Correct the IP address for FastEthernet 0/0
(D) Change the encapsulation type on Serial 0/0
(E) Enable autoconfiguration on the Serial 0/0 interface
23. Why would a network administrator configure port security on a switch?
(A) to prevent unauthorized Telnet access to a switch port
(B) to limit the number of Layer 2 broadcasts on a particular switch port
#(C) to prevent unauthorized hosts from accessing the LAN
(D) to protect the IP and MAC address of the switch and associated ports
(E) to block unauthorized access to the switch management interfaces over common TCP ports

24. Host A has established a communication session with host B for the first time. What enabled R1 to forward this traffic in the appropriate direction to reach the nework to which host B is attached?
(A) DNS
(B) DHCP
(C) TCP/IP
(D) a Layer 4 protocol
#(E) a routing protocol
(F) a default gateway

25. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?

a. 1 and 2; 4 and 5

#b. 1 and 2; 3 and 6

c. 3 and 6; 7 and 8

d. 4 and 5; 7 and 8

26. What does the “Inside Global” address represent in the configuration of NAT?
(A) the summarized address for all of the internal subnetted addresses
(B) the MAC address of the router used by inside hosts to connect to the Internet
(C) a globally unique, private IP address assigned to a host on the inside network
#(D) a registered address that represents an inside host to an outside network
27. How many simultaneous Telnet sessions does a Cisco router support by default?
(A) 1
(B) 2
(C) 3
(D) 4
#(E) 5
(F) 6

28. Which cable diagram displays the end to end pinout for a console cable used with Cisco devices?

a. Cable A

#b. Cable B

c. Cable C

d. Cable D

29. Which subnet masks would be valid for a subnetted Class B address? (Choose two.)

a. 255.0.0.0

b. 255.254.0.0

c. 255.224.0.0

d. 255.255.0.0

#e. 255.255.252.0

#f. 255.255.255.192

30. What type of routing is it when the network administrator manually configures a route?

#a. static

b. dynamic

c. interior

d. exterior

31. Which statement describes a star topology?

a. Each host in the network is connected to a backbone cable that is terminated at both ends.

#b. Each host is connected to a hub or switch, either of which acts as a central point for all network connections.

c. Each host is directly connected to two other hosts to form a long chain of hosts.

d. Each host has a connection to all other hosts in the network.

32. Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server?
#(A) the MAC address of router interface e0
(B) the MAC address of router interface e1
(C) the MAC address of the server network interface
(D) the MAC address of host A

33. A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?

#a. The cable will be able to pass traffic between the devices.

b. The cable has reversed-pairs, which will degrade the signal quality.

c. The cable has split-pairs, which will increase crosstalk and create an unreliable link.

d. The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.

34. Which IP address is a private address?
(A) 12.0.0.1
(B) 168.172.19.39
#(C) 172.20.14.36
(D) 172.33.194.30
(E) 192.169.42.34

35. Which layer of the OSI model defines the process of adding the source and destination IP address to a data packet?

a. transport

#b. network

c. data link

d. physical

36. Which encryption type does WPA2 use?
#(A) AES-CCMP
(B) PPK via IV
(C) PSK
(D) TKIP/MIC

37. Which of the following protocols uses both TCP and UDP ports?
(A) FTP
(B) SMTP
(C) Telnet
#(D) DNS

38. When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission?

a. network

b. application

c. session

#d. transport

39. A company has the following addressing scheme requirements: -currently has 25 subnets -uses a Class B IP address -has a maximum of 300 computers on any network segment -needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?

a. 255.255.240.0

b. 255.255.248.0

#c. 255.255.254.0

d. 255.255.255.0

e. 255.255.255.128

f. 255.255.255.248

40. What can be verified by successfully pinging the reserved loopback address on a host?

a. Connectivity exists between two hosts on the LAN.

#b. The TCP/IP stack of the local host is installed correctly.

c. A connection exists between a host and the default gateway.

d. The route a packet takes from the local host to a remote host is valid.

41. Three access points have been installed and configured to cover a small office. What term defines the wireless topology?
(A) BSS
(B) IBSS
#(C) ESS
(D) SSID

42. Which command will set the default gateway to 192.168.12.1 on a Cisco switch?
(A) Switch(config)# ip default-network 192.168.12.1
(B) Switch(config)# ip route-default 192.168.12.1
#(C) Switch(config)# ip default-gateway 192.168.12.1
(D) Switch(config)# ip route 192.168.12.1 0.0.0.0

43. A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?

a. The switch drops the frame.

b. The switch sends the frame out port 3.

c. The switch sends the frame out ports 1, 2, and 4.

#d. The switch sends the frame out ports 2, 3, and 4.

e. The switch sends the frame out ports 1, 2, 3, and 4.

44. Which of the following increases the potential for a collision to occur?

a. the use of an active hub instead of an intelligent hub

b. the use of an intelligent hub instead of an active hub

c. a reduction in the number of devices attached to the hub

#d. an increase in the number of devices attached to the hub

45. What is the effect of using the service password-encryption command?
(A) Only the enable password will be encrypted
(B) Only the enable secret password will be encrypted
(C) Only passwords configured after the command has been entered will be encrypted
(D) It will encrypt the secret password and remove the enable secret password from the configuration
#(E) It will encrypt all current and future passwords
 

46. A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?

#a. Gambar 1

b. Gambar 2

c. Gambar 3

d. Gambar 4

47. What is the purpose of a default route?
(A) It is a route to be used when the routing protocol fails
(B) It is a route configured by an ISP that sends traffic into a corporate network
#(C) It is a route used when a packet is destined for a remote network that is not listed in the routing table.
(D) It is a route manually configured for a specific remote network for which a routing protocol is not configured.
(E) It is used to send traffic to a stub network.
48. Workstation A must be able to telnet to switch SW-A through router RTA for management purposes. What must be configured for this connection to be successful?
(A) VLAN 1 on RTA
#(B) default gateway on SW-A
(C) IP routing on SW-A
(D) cross-over cable connecting SW-A and RTA

49. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?

a. application

#b. session

c. transport

d. network

e. data link

50. At which layer of the OSI model does the protocol that provides the information displayed by the show cdp neighbors command operate?
(A) physical
#(B) data link
(C) network
(D) transport
(E) application

51. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. How can this problem be corrected?
#(A) Enable the Serial 0/0 interface
(B) Correct the IP address for Serial 0/0
(C) Correct the IP address for FastEthernet 0/0
(D) Change the encapsulation type on Serial 0/0
(E) Enable autoconfiguration on the Serial 0/0 interface

Read Full Post | Make a Comment ( 5 so far )

CCENT Final Exam 2 – 50 question set

Posted on August 26, 2009. Filed under: CCENT Final Exam, CCNA, Practice Exam | Tags: , , , |

Exam Source

Question 1: (QID=25141)

Which DHCP message is sent as a broadcast on the network?

1. DHCP Discover

2. DHCP Offer

3. DHCP Request

4. DHCP Acknowledgement

———————————————

Correct answer(s): 1

Explanation: The DHCP Discover message is sent as a broadcast on the network.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 2: (QID=2352)

Given the following IP Address 172.45.34.1/24. What is the network and host portion?

1. Network 172.45.34 Host 1

2. Network 172 Host 45.34.1

3. Network 172.45 Host 34.1

4. This is an invalid IP Address

———————————————

Correct answer(s): 1

Explanation: 172.45.34.1/24 is the same as 172.45.34.1 255.255.255.0. So we can see from the subnet mask that the first 3 octets belong to the network portion of the IP Address and the 4th octet is the host portion.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 3: (QID=25120)

You want to use RIPv2 as your routing protocol. Which commands will enable RIPv2 on your router?

A

router#configure terminal

router (config)#router rip version2

router(config-router)#network 10.0.0.0

router(config-router)#network 172.16.0.0

router(config-router)#^Z

B

router#router rip

router(config-router)#network 10.0.0.0

router(config-router)#network 172.16.0.0

router(config-router)#^Z

C

router#configure terminal

router(config)#router rip v2

router(config-router)#network 10.0.0.0

router(config-router)#network 172.16.0.0

router(config-router)#^Z

D

router#configure terminal

router(config)#router rip

router(config-router)#version 2

router(config-router)#network 10.0.0.0

router(config-router)#network 172.16.0.0

router(config-router)#^Z

1. A

2. B

3. C

4. D

———————————————

Correct answer(s): 4

Explanation: Only three steps are necessary to configure RIPv2:

Enable RIP with the command router rip.

Specify the version with the version 2 command

Specify each major network on which to run RIP with the network command.

[Implement a small routed network]

——————————————————————————–

Question 4: (QID=25125)

You want to implement port-security on your 2960 but you don’t know all of the MAC addresses. How can you still enable port-security and protect the currently attached devices?

1. switch(config-if)#switchport port-security mac-address sticky

2. switch(config-if)#switchport port-security mac-address enable

3. switch(config-if)#switchport port-security mac-address learn

4. switch(config-if)#switchport port-security mac-address dynamic

———————————————

Correct answer(s): 1

Explanation: When we use the switchport port-security mac-address sticky interface configuration command the switch looks at the the header of the first frame to determine the mac-address of the host that is currently connected to that port.

[Implement a small switched network]

——————————————————————————–

Question 5: (QID=25121)

How do you enable ppp on a serial interface?

1. router(config)#ppp enable

2. router(config-if)#encapsulation ppp

3. router(config-if)#ppp enable

4. router(config-if)#no encapsulation hdlc

———————————————

Correct answer(s): 2

Explanation: The encapsulation ppp interface configuration command enables ppp on the interface.

[Implement and verify WAN links]

——————————————————————————–

Question 6: (QID=2368)

What command do we use if we want to discover other Cisco devices on the network?

1. Discover neighbors

2. Show neighbors

3. CDP run

4. CDP enable

———————————————

Correct answer(s): 3

Explanation: To enable Cisco Discovery Protocol (CDP), use the cdp run global configuration command. To disable CDP, use the no form of this command.

no cdp run

[Implement a small switched network]

——————————————————————————–

Question 7: (QID=1323)

Spanning Tree is used in a switched network to:

1. Create a loop-free switched network

2. Manage a switched network

3. Avoid collisions on the switched network

4. Route between VLAN’s

———————————————

Correct answer(s): 1

Explanation: Spanning Tree is a technology that allows bridges to communicate with each other to discover physical loops in the network. The protocol then specifies an algorithm that bridges use to create a loop-free logical topology.

[Implement a small switched network]

——————————————————————————–

Question 8: (QID=3620)

What switching method is described by the following:

“The switch receives the entire frame and calculates a CRC. This method has high latency because of this behaviour.”

1. Cut-Through

2. Cisco Express Forwarding

3. Fragment-Free

4. Store-and-Forward

———————————————

Correct answer(s): 4

Explanation: The Store-and-Forward switching mode receives the entire frame before beginning the switching process. When it receives the complete frame, the switch examines it for the source and destination addresses and any errors it may contain, and then it possibly applies any special filters created by the network administrator to modify the default behaviour. If the switch observes any errors in the frame, it is discarded, preventing errored frames from consuming bandwidth on the destination segment.

[Implement a small switched network]

——————————————————————————–

Question 9: (QID=2365)

What command is used during an IOS upgrade to place the IOS image on the router?

1. Show version

2. Copy TFTP: Flash:

3. Copy TFTP: RAM:

4. Copy running-config startup-config

———————————————

Correct answer(s): 2

Explanation: Router Memory Commands

[Implement a small routed network]

——————————————————————————–

Question 10: (QID=2380)

Which command do we use to move from interface configuration mode to global configuration mode without exiting configuration mode?

1. Disable

2. Logout

3. End

4. Exit

———————————————

Correct answer(s): 4

Explanation: Click here for more information.

[Implement a small switched network]

——————————————————————————–

Question 11: (QID=25131)

In 802.11b, how many non-overlapping channels are available?

1. 1

2. 3

3. 5

4. 7

5. 11

———————————————

Correct answer(s): 2

Explanation: 802.11b has 3 non-overlapping channels, channel 1, 6 and 11

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 12: (QID=2999)

What command do we use if we want to see the output of our debugs during our session?

1. Show debug all

2. u all

3. Terminal monitor

4. Show all debug

———————————————

Correct answer(s): 3

Explanation: The terminal monitor command in EXEC mode will display all debug outputs and system error messages for the current terminal and session.

[Implement a small switched network]

——————————————————————————–

Question 13: (QID=2996)

You have lost telnet access to your switch which is located on-site. When trying to access the switch via the console port we are unable to get a connection going. Our terminal emulation program settings are: 9600 baud, 8N1, no flow-control. What could be the cause of the problem?

1. We are using a cross-over cable

2. We are using a roll-over cable

3. Our terminal emulation program is not configured correctly

4. The operating system on our PC/laptop is not compatible with Cisco

———————————————

Correct answer(s): 1

Explanation: In order to use the console port on a router we need to configure our Terminal Emulation program (Hyper Terminal, TerraTerm Pro, …) with the following parameters:

Baud rate: 9600

Data bits:8

Parity: none

Stop bits: 1

Flow control: none

The cable type we use is a cross-over cable. [Implement a small switched network]

——————————————————————————–

Question 14: (QID=25139)

What can we use to detect an attack that has a specific packet pattern?

1. Firewall

2. IPS

3. Anti-virus

4. URL filtering

5. DMZ

———————————————

Correct answer(s): 2

Explanation: An IPS, Intrusion Prevention System or IDS, Intrusion Detection System, is used to detect/prevent attacks that have a distinctive packet pattern.

[Identify security threats to a network and describe general methods to mitigate those threats]

——————————————————————————–

Question 15: (QID=1324)

According to the IEEE 802.3 standard, Ethernet can run on what type of media? [Select all that apply]

1. 10BaseF

2. 100BaseTX

3. 1000BaseF

4. 10Base5

5. 10Base4

———————————————

Correct answer(s): 1 4

Explanation: 10BaseT – Ethernet over Twisted Pair Media

10BaseF – Ethernet over Fiber Media

10Base2 – Ethernet over Thin Coaxial Media

10Base5 – Ethernet over Thick Coaxial Media

[Implement a small switched network]

——————————————————————————–

Question 16: (QID=25127)

Which of the following encourages the interoperability of wireless products?

1. IEEE

2. FCC

3. Wi-Fi alliance

4. ITU-R

———————————————

Correct answer(s): 3

Explanation: The Wi-Fi alliance encourages the interoperability of wireless products using their Wi-Fi certified program.

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 17: (QID=2383)

Which of the following describes the correct order when a router is powered on?

1. Locate the IOS image, hardware is initialized, load configuration file, decompress the IOS image

2. Load configuration file, hardware is initialized, locate the IOS image, decompress the IOS image

3. Locate the IOS image, decompress the IOS image, hardware is initialized, load configuration file

4. Hardware is initialized, locate the IOS image, decompress the IOS image, load configuration file

———————————————

Correct answer(s): 4

Explanation: The boot sequence of a Cisco router is as follows:

ROM Monitor is the first to start and together with the BOOTSTRAP the following functions are performed:

Power-on register settings are configured

NVRAM and DRAM is tested

Hardware is initialized

Software structures are initialized

ROMmon looks for the IOS image in the flash

Once the IOS image is located the router decompresses it and loads it into DRAM. The IOS itself performs the following functions:

recognition of interfaces and other hardware

setting up proper data structures

allocating buffers

loading the configuration file from NVRAM to RAM

[Implement a small routed network]

——————————————————————————–

Question 18: (QID=3680)

When our information is travelling down the OSI model what name do we give it when it reaches layer 3?

1. Frames

2. Segments

3. Bits

4. Packets

5. Data

———————————————

Correct answer(s): 4

Explanation: When user data travels through the OSI layers each layer adds its own information to the data. User data is called ‘Data’ at the application, presentation and session layer, when it moves through the transport layer it is called ‘Segments’. Packets can be found at the network layer of the OSI model. At layer 2 or Datalink layer we are talking about ‘Frames’ that will be put on the wire at the physical layer in the form of ‘Bits’.

[Describe the operation of data networks]

——————————————————————————–

Question 19: (QID=25135)

Which of the following are parts of a socket?

1. IP address

2. Transport protocol

3. Sequence number

4. Port number

———————————————

Correct answer(s): 1 2 4

Explanation: A socket has three parts:

IP Address

Transport protocol (TCP or UDP)

Port number

[Describe the operation of data networks]

——————————————————————————–

Question 20: (QID=3677)

What protocol is used to resolve MAC Addresses to a known IP Address?

1. ICMP

2. RARP

3. IGMP

4. ARP

———————————————

Correct answer(s): 4

Explanation: A host that wants to communicate with another host of which the IP Address is known will send out an ARP request to discover the MAC Address.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 21: (QID=2338)

What type of connection do you recommended for the following scenario: The remote sites need fast downloads while their uploads to the head office can be slower, cost has to be taken into account.

1. ATM

2. ISDN

3. Frame-Relay

4. ADSL

———————————————

Correct answer(s): 4

Explanation: Asymmetric Digital Subscriber Line. One of four DSL technologies. ADSL is designed to deliver more bandwidth downstream (from the central office to the customer site) than upstream. Downstream rates range from 1.5 to 9 Mbps, whereas upstream bandwidth ranges from 16 to 640 kbps. ADSL transmissions work at distances up to 18,000 feet (5,488 meters) over a single copper twisted pair.

[Describe the operation of data networks]

——————————————————————————–

Question 22: (QID=3006)

One of the software engineers in the company wants to test a new application. When he connects the PC to a free port on the switch he does not get a link light. When he temporarily connects the PC to a different port there is a link light. What is the most likely cause of this problem?

1. The NIC in the PC is 100Mb and the switch port is configured for 10MB

2. All the switch ports are faulty

3. The application is not working properly

4. The cable is faulty

———————————————

Correct answer(s): 1

Explanation: Because there is a speed mismatch between the PC and the switch port a link will not be established.

[Implement a small switched network]

——————————————————————————–

Question 23: (QID=2376)

We want to configure a password in order to secure the Privileged EXEC mode? Which of the following are commands we can use?

1. Password enable password

2. Enable password password

3. Secret Password password

4. Enable Secret password

———————————————

Correct answer(s): 2 4

Explanation: To set a local password to control access to various privilege levels, use the enable password command in global configuration mode. To specify an additional layer of security over the enable password command, use the enable secret command in global configuration mode.

[Implement a small routed network]

——————————————————————————–

Question 24: (QID=2373)

We want to know which routing protocols are active on the router. Which command do we use?

1. Show IP Protocols

2. Show IP Routing Protocols

3. Show Active Protocols

4. Show IP Active Protocols

———————————————

Correct answer(s): 1

Explanation: To display the parameters and current state of the active routing protocol process, use the show ip protocols command in privileged EXEC mode.

[Implement a small routed network]

——————————————————————————–

Question 25: (QID=3611)

Users complain that they are not able access resources at the head office. You ping a few hosts on the head office LAN and the responses are all unsuccessful. What would be the next step you do to locate the problem?

1. Use the trace route utility

2. Reboot the router

3. Clear the routing table

4. Replace the faulty router

———————————————

Correct answer(s): 1

Explanation: When we use the trace route utility to one of the IP Addresses we pinged we will find out at which hop the problem lies. We then can continue our troubleshooting from that point.

[Implement a small routed network]

——————————————————————————–

Question 26: (QID=2988)

Which of the following commands would you use to troubleshoot a routing problem?

1. Show version

2. Show IP route

3. Show IP interface brief

4. Ping

5. Show users

6. Traceroute

7. Show hosts

8. Show history

———————————————

Correct answer(s): 2 4 6

Explanation: When troubleshooting a routing issue we usually start by ‘pinging’ a host on the remote network we try to reach. If we don’t get a response back we check the routing table to see if we have a route to the remote network. If there is a route we do a ‘traceroute’ to the remote network to find out at which hop the possible cause of the problem might lie.

Understanding the Ping and Traceroute Commands Troubleshooting Tools

[Implement a small routed network]

——————————————————————————–

Question 27: (QID=2989)

What command do we use to show us all the RIP entries in the routing table but no other routes?

1. Show ip route

2. Show ip rip route

3. Show rip route

4. Show ip route rip

———————————————

Correct answer(s): 4

Explanation: The show ip route command can be ‘extended’ with the name of the routing protocol running on the router. Adding the name of the routing protocol displays only entries of that protocol in the routing table.

[Implement a small routed network]

——————————————————————————–

Question 28: (QID=25132)

Which of the following wireless parameters has to be the same on both the client and AP?

1. SSID

2. ESS

3. radio power setting

4. BSS

———————————————

Correct answer(s): 1

Explanation: In order to get an association with the AP the SSID, Service Set Identifier, has to be same on the AP and wireless client.

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 29: (QID=3683)

viewimage

Look at the network topology in the exhibit. How many collision domains are there?

1. 1

2. 2

3. 3

4. 4

5. 5

6. 6

———————————————

Correct answer(s): 5

Explanation: A Collision Domain is defined as all of the Ethernet segments between a pair of bridges or other layer 2 devices.

coldom2

[Implement a small switched network]

——————————————————————————–

Question 30: (QID=2367)

After making configuration changes, you want to save them. What command do you use? [Select best answer]

1. Save config

2. write memory

3. Copy startup-config running-config

4. Copy running-config startup-config

———————————————

Correct answer(s): 4

Explanation: Copy running-config startup-config will save your changes to NVRAM. Although write memory will do the same thing it is better to use the copy command.

[Implement a small switched network]

——————————————————————————–

Question 31: (QID=1295)

RIP Version 2 uses which multicast address to update its routing tables.

1. 224.0.0.10

2. 224.0.0.5

3. 224.0.0.1

4. 224.0.0.9

———————————————

Correct answer(s): 4

Explanation: More information about RIP version 2 can be found at RIP Version 2 RFC 2453. The other multicast addresses are used by different routing protocols (EIGRP, OSPF).

[Implement a small routed network]

——————————————————————————–

Question 32: (QID=25146)

Which proprietary Cisco field is added to the HDLC standard frame?

1. Type

2. Flag

3. Destination

4. Control

———————————————

Correct answer(s): 1

Explanation: Cisco added a type field to the HDLC standard frame to make it Cisco proprietary.

[Implement and verify WAN links]

——————————————————————————–

Question 33: (QID=2377)

What command do we use to show us a summary of the all the interfaces on a router?

1. Show IP interface brief

2. Show interfaces all

3. Show IP interface detail

4. Show interfaces brief

———————————————

Correct answer(s): 1

Explanation: The show ip interface brief command will give you all the interfaces of the router and their status, IP Address, etc… This command can be useful troubleshooting tool if you quickly want to view the interface details.

click here for sample output of this command.

[Implement a small routed network]

——————————————————————————–

Question 34: (QID=3623)

Which switching method will store the first 64 bytes of the packet?

1. Store-and-Forward

2. Cut-Through

3. Cisco Express Forwarding

4. Fragment-Free

———————————————

Correct answer(s): 4

Explanation: A less common method is fragment-free. It works like cut-through but stores the first 64 bytes of the packet before sending it on. The reason for this is that most errors and all collisions occur during the initial 64 bytes of a packet.

[Implement a small switched network]

——————————————————————————–

Question 35: (QID=2358)

When implementing a switched network we have to make sure that the following is running?

1. VTP Pruning

2. IGMP

3. A routing protocol

4. Spanning Tree

———————————————

Correct answer(s): 4

Explanation: Spanning tree will provide a loop free switched environment.

[Implement a small switched network]

——————————————————————————–

Question 36: (QID=3624)

Which port does TFTP use?

1. 53

2. 21

3. 69

4. 20

———————————————

Correct answer(s): 3

Explanation: TFPT uses port 69. Well-known Port Numbers

[Describe the operation of data networks]

——————————————————————————–

Question 37: (QID=1285)

What is the administrative distance of the following Static Route:

IP Route 192.168.3.0 255.255.255.0 Serial0/1

1. 1

2. 110

3. 0

4. 255

5. 170

———————————————

Correct answer(s): 3

Explanation: Static routes using an exit interface have an administrative distance of 0. Administrative Distance.

[Implement a small routed network]

——————————————————————————–

Question 38: (QID=25129)

Which two modes exist in a wireless network?

1. Ad-hoc mode

2. Peer-to-peer mode

3. Shared mode

4. Infrastructure mode

———————————————

Correct answer(s): 1 4

Explanation: Wireless networks operate either in Ad-Hoc mode or Infrastructure mode.

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 39: (QID=3631)

In which of the following configurations would you use a crossover cable?

1. Host to switch

2. Switch to router

3. Host to router

4. Hub to Switch

5. Hosts to hub

———————————————

Correct answer(s): 3 4

Explanation: Crossover cables can be used in the following situations:

to connect 2 hosts together

to connect 2 switches or hubs

to connect a router to a host

Modern switches come with MDIX ports but the speed and duplex setting must remain on auto.

[Implement a small switched network]

——————————————————————————–

Question 40: (QID=3694)

We need a minimum of 2500 hosts on each of the subnets. Our network address is 10.0.0.0/8. What is the subnet mask?

1. 255.255.224.0

2. 255.255.248.0

3. 255.255.240.0

4. 255.255.192.0

———————————————

Correct answer(s): 3

Explanation: To provide 2500 hosts on each subnet we need 12 bits available for host addressing.

Following the rules: 2^12 – 2 = 4096 – 2 = 4094 possible hosts on each subnet. Now we have 12 bits available for the subnet mask or in binary 1111 1111.1111 1111.1111 0000. The first 8 bits are from the default subnet mask of the network, convert the previous into decimal and it gives us 255.255.240.0 or /20.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 41: (QID=2974)

We want to see a summary of the VLANs configured on our Catalyst 2960 switch. What command do we use?

1. Show vlan

2. Show vlan summary

3. Show vlan detail

4. Show vlan brief

———————————————

Correct answer(s): 4

Explanation: The show vlan brief command displays one line for each of the VLANs configured on the switch. The line contains the VLAN name, status and port membership.

[Implement a small switched network]

——————————————————————————–

Question 42: (QID=3695)

Given the following network 172.16.1.0/26. How many hosts do we have available on each of the subnets?

1. 62

2. 4096

3. 64

4. 128

———————————————

Correct answer(s): 1

Explanation: /26 or 255.255.255.192 leaves us 6 bits for possible hosts on each subnet. Following the rule for hosts 2^n -2 = available hosts, 2^6 – 2 = 64 – 2 = 62 hosts. The -2 is to deduct the network address and the broadcast address of the subnet.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 43: (QID=1481)

We need 30 hosts on each of the subnets we create from the following network 192.168.3.0/24. What is the correct subnet mask?

1. 255.255.0.0

2. 255.255.255.0

3. 255.255.252.0

4. 255.255.255.224

———————————————

Correct answer(s): 4

Explanation: We need 30 hosts on each subnet and in order to accommodate those we need 5 bits of the last octet to be allocated to hosts 2^5 -2 = 30. This leaves us 3 bits for the available subnets 2^3 = 8 subnets. In binary that becomes 111, first 3 bits for the subnet or 224 and the remaining 5 positions for the hosts on each subnet.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 44: (QID=1281)

RFC1918 specifies the allocation of IP Addresses for Private Internetworks. What are they?

1. 10.0.0.0 – 10.255.255.255

2. 192.168.0.0 – 192.168.255.255

3. 172.16.0.0 – 172.32.0.0

4. 172.16.0.0 – 172.31.255.255

5. 192.169.0.0 – 192.169.255.255

———————————————

Correct answer(s): 1 2 4

Explanation: 10.0.0.0, 172.16.0.0 – 172.31.255.255 and 192.168.0.0 are the IP Address ranges that must be used in private internetworks. These address ranges are not routed on the internet. To find out more about this: RFC1918.

[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]

——————————————————————————–

Question 45: (QID=25130)

When we have more than one AP in our infrastructure mode it is called?

1. BSS

2. ESS

3. CSS

4. EBSS

———————————————

Correct answer(s): 2

Explanation: A extended service set or ESS is created when we use more than one AP with overlap in infrastructure mode.

[Explain and select the appropriate administrative tasks required for a WLAN]

——————————————————————————–

Question 46: (QID=3614)

We notice a huge number of FCS errors on one of the switch ports that is running in full-duplex mode. What could be the cause of this?

1. Faulty switch port

2. Faulty cable

3. It is normal to have FCS errors in full-duplex mode

4. The switch is running out of memory

5. Software/hardware issues with the NIC

———————————————

Correct answer(s): 1 2 5

Explanation: In full-duplex mode the collision counter is not active. If the FCS, CRC errors increment then the most likely cause is a duplex mismatch. Other causes can be a faulty cable, a faulty switch port or hardware/software issues with the NIC.

[Implement a small switched network]

——————————————————————————–

Question 47: (QID=2970)

We have acquired a new Catalyst 3550 switch with Enhanced IOS image. What command allows us to remotely manage that switch using Cisco’s defaults?

A) Switch(config)#interface vlan1

Switch(config-if)#ip address 10.1.1.5 255.255.255.0

B) Switch(config)#interface fastethernet0/1

Switch(config-if)#ip address 10.1.1.5 255.255.255.0

C) Switch(config)#interface vlan1

Switch(config-vlan)#ip address 10.1.1.5 255.255.255.0

D) Switch(config)#interface ip 10.1.1.5 255.255.255.0

1. A

2. B

3. C

4. D

———————————————

Correct answer(s): 1

Explanation: We assign an ip address to the default management VLAN 1 using interface configuration mode. By default the management VLAN is 1 but it can be any VLAN between 1 to 1001.

[Implement a small switched network]

——————————————————————————–

Question 48: (QID=2369)

We want to try a new IOS release but we don’t have enough space on our Flash memory to hold both IOS’s. What needs to be done to use the new image?

1. Add the following line to the configuration: no boot system flash [filename]

2. Add the following line to the configuration: boot system tftp [filename] [ip address]

3. Add the following line to the configuration: no boot system rom

4. This can not be done; we need to upgrade the IOS

———————————————

Correct answer(s): 2

Explanation: To specify the system image that the router loads at startup, use one of the following boot system global configuration commands. To remove the startup system image specification, use the no form of the command.

boot system file-url

no boot system file-url

boot system flash [flash-fs:][partition-number:][filename]

no boot system flash [flash-fs:][partition-number:][filename]

boot system mop filename [mac-address] [interface]

no boot system mop filename [mac-address] [interface]

boot system rom

no boot system rom

boot system {rcp | tftp | ftp} filename [ip-address]

no boot system {rcp | tftp | ftp} filename [ip-address]

no boot system

[Implement a small routed network]

——————————————————————————–

Question 49: (QID=1478)

What is the maximum cable length for UTP cable?

1. 185m

2. 2000m

3. 100m

4. 500m

———————————————

Correct answer(s): 3

Explanation: 10 BaseT & 100 BaseT 100m

10 Base2 185m

10 Base5 500m

10 BaseFL 2000m

[Describe the operation of data networks]

——————————————————————————–

Question 50: (QID=25147)

Which ppp protocol is used to test the data link connection?

1. UDP

2. Q.931

3. NCP

4. LCP

———————————————

Correct answer(s): 4

Explanation: LCP or Link Control Protocol is used in the PPP protocol suite to test the data link connection.

[Implement and verify WAN links]

Read Full Post | Make a Comment ( 1 so far )

Liked it here?
Why not try sites on the blogroll...