CCNA Guide to Cisco Networking Review Questions Chapters 7-14

Unlock all answers in this set

Unlock answers
question
1) What is the administrative distance of RIP? A) 100 B) 110 C) 120 D) 90
answer
C. 120
question
2) Link-state routing protocols _________. (Choose all that apply) A) Use link-state advertisements to notify neighbor routers of route changes B) Send routing tables to neighbors C) Reach convergence faster than distance vector routing protocols D) Determine the best path via the hop count algorithm
answer
A. Use link-state advertisements to notify neighbor routers of route changes C. Reach convergence faster than distance vector routing protocols.
question
3) RIP has a maximum hop count of ____. A) 255 B) 16 C) 15 D) 254
answer
C. 15
question
4) Which command enables RIP on a router. A) router network RIP B) router rip C) router igrp D) router ospf
answer
B. router rip
question
5) Which command will show the IP routing table of a router? A) show ip route B) show ip protocol C) debug ip igrp events D) show run
answer
A. show ip route
question
6) Nonroutable protocols are able to pass packets among multiple networks? A) True B) False
answer
B. False
question
7) IGRP can use which of the following as metrics? (Choose all that apply) A) Hop count B) Bandwidth C) Delay D) Split horizon
answer
A) Hop count B) Bandwidth C) Delay
question
8) Which of the following is a routed protocol? (Choose all that apply) A) NetBEUI B) TCP/IP C) IPX/SPX D) RIP E) Split horizon
answer
B) TCP/IP C) IPX/SPX
question
9) Which of the following helps to prevent routing loops? (Choose all that apply) A) Split horizon B) Count-to-infinity C) Hold-down timers D) Split horizon with poison reverse
answer
A) Split horizon C) Hold-down timers D) Split horizon with poison reverse
question
10) At which router prompt can you use the router rip command? A) RouterB# B) RouterB> C) RouterB(config)# D) RouterB(config-router)#
answer
C) RouterB(config)#
question
11) At which router prompt can you issue the network [network #] command? A) RouterB# B) RouterB> C) RouterB(config)# D) RouterB(config-router)#
answer
D) RouterB(config-router)#
question
12) The debug ip rip command can be used in user mode and privilege mode. A) True B) False
answer
B. False
question
13) Which of the following routing protocols can route between autonomous systems? (Choose all that apply) A) IGRP B) RIP C) BGP D) EGP
answer
C) BGP D) EGP
question
14) What type of routing protocol is used within autonomous systems? A) Exterior Gateway Protocols B) TCP/IP C) NetBEUI D) Interior Gateway Protocol
answer
D. Interior Gateway Protocol
question
15) RIP and IGRP both advertise a route to a particular network. Which route will be added to the routing table? A) The RIP route B) The IGRP route C) NetBEUI D) BGP-enhanced IGRP
answer
B. The IGRP route
question
16) What command is used to display RIP timers? A) show ip route B) show run C) debug ip rip D) show ip protocol
answer
D. show ip protocol
question
17) What two commands are needed to configure RIP on a router? (Choose all that apply) A) network rip B) router rip C) router network rip D) network [network #]
answer
B) router rip D) network [network #]
question
18) A metric is a variable used to determine the suitability of a route. A) True B) False
answer
A. True
question
19) A major drawback of link-state routing protocols is: A) Routing by rumor B) Increased memory and processing required on routers C) Show time to convergence D) Inability to adapt to network topology changes
answer
B. Increased memory and processing required on routers
question
20) Which of the following commands would enable a routing protocol that is only concerned with hop count? A) router# router igrp B) router(config)# router igrp C) router# router rip D) router(config)# router rip E) router# router ospf
answer
D. router(config)# router rip
question
21) Which of the following are true about administrative distance? (Choose all that apply) A) The higher the administrative distance, the more desirable the route B) Administrative distances are used with static routes C) The default administrative distance for RIP is 120 D) The default administrative distance for static routes is higher than those for dynamic routes. E) The default administrative distance for a connected network is lower that for the default route of IGRP
answer
B) Administrative distances are used with static routes C) The default administrative distance for RIP is 120 E) The default administrative distance for a connected network is lower that for the default route of IGRP
question
22) What does the number 240 stand for in the following command? Router(config)# ip route 192.168.1.0 255.255.255.0 240 A) Number of masked bits B) Decimal subnet mask C) Number of hops D) Administrative distance E) Autonomous network number
answer
D. Administrative distance
question
23) If you want to monitor real-time RIP traffic, which command would you type? A) router> router rip B) router# router rip C) router# show rip D) router(config)# show rip E) router# debug ip rip
answer
E. router# debug ip rip
question
24) Which of the following does RIP support? (Choose all that apply) A) Load balancing B) Link reliability metric C) Bandwidth metric D) Delay metric
answer
A. Load balancing
question
1) What command injects a default route into an OSPF network? A) Passive-interface B) Loopback default C) Router ospf D) Default-information originate
answer
Default-information originate
question
2) Classless routing protocols carry subnet mask information in their routing table updates? A) True B) False
answer
True
question
3) The process ID must match on all routers in an OSPF network? A) True B) False
answer
False
question
4) What command switches RIP to version 2? A) router rip 2 B) version 2 C) rip version 2 D) ripV2 on
answer
version 2
question
5) What command turns off automatic summarization to major network boundaries in both RIPv2 and EIGRP? A) summarization off B) no summary C) no auto-summary D) no ip classless
answer
no auto-summary
question
6) In what state are OSPF neighbors, when bidirectional communication has been established and adjacencies have been formed? A) Passive B) Up C) DR D) FULL
answer
FULL
question
7) Which type of authentication sends only a hash across the link between two authenticating peers? A) MD5 B) Clear text C) Signed secret keys D) Shared keys
answer
MD5
question
8) What command places the 192.168.12.32/27 network into OSPF area 0? A) Network 192.168.12.0 area 0 B) Network 192.168.12.32 area 0 C) Network 192.168.12.32 255.255.255.225 area 0 D) Network 192.168.12.32 0.0.0.31 area 0
answer
Network 192.168.12.32 0.0.0.31 area 0
question
9) EIGRP uses the same metric as IGRP multiplied by________.
answer
256
question
10) What feature of OSPF allows it to use a hierarchical design? A) Areas B) Auto summarization C) Wildcard masks D) Neighbors adjacencies
answer
Areas
question
11) Cisco routers can be configured to send and receive RIPv1 updates on a per-interface basis. A) True B) False
answer
True
question
12) What protocol is used by RIGRP to transport its routing protocol information? A) TCP B) UDP C) RTP D) DR/BDR
answer
RTP
question
13) Which of the following commands enables EIGRP on a router with an autonomous system number of 101? A) Router EIGRP B) Router EIGRP 101 C) Router 101 EIGRP D) As 101
answer
Router EIGRP 101
question
14) What algorithm is used by OSPF for path selection? A) DUAL B) Open Path First C) Shortest Path First D) Default-information Originate
answer
Shortest Path First
question
15) A backup route in EIGRP is a(n)? ______
answer
Feasible Successor
question
16) OSPF timers must match for neighbors to from adjacencies. A) True B) False
answer
True
question
17) EIGRP timers must match for neighbors to form adjacencies. A) True B) False
answer
False
question
18) Which of the following commands would ensure that a router becomes the DR on a broadcast, multi-access network? A) IP OSPF priority 256 B) IP OSPF DR on C) IP OSPF priority 0 D) None of the above
answer
None of the above
question
19) What command displays the successors and feasible successors for EIGRP? A) Show IP route B) Show IP EIGRP topology C) Show IP OSPF topology D) Show IP topology
answer
Show IP EIGRP topology
question
20) What command displays area authentication information? A) show ip route B) show ip ospf C) show ip ospf authentication D) show authentication
answer
show ip ospf
question
21) The OSPF priority range assigned to a router is _____.
answer
D255
question
22) Clear text is the most secure authentication supported by OSPF. A) True B) False
answer
False
question
23) Which of the following is used by EIGRP for path determination? A) DUAL B) Dijkstra's Shortest Path First Algorithm C) Wildcard masks D) Priority
answer
A) DUAL
question
24) What is the default OSPF cost for FastEthernet (assuming the default reference bandwidth)? A) 40 B) 255 C) 0 D) 1
answer
1
question
1) What is used on routers to hide intranet addresses from the Internet? A) PAP B) CHAP C) NAT D) FRAT
answer
NAT
question
2) Which flavor of NAT maps multiple internal IP addresses to a single external IP address? A) PAP B) CHAP C) NAT D) PAT
answer
PAT
question
3) How does overlapping occur? A) The network administrator does not plan for internet connectivity B) The network administrator uses registered IP addresses without getting permission C) Both a and b D) None of the above
answer
C) Both a and b
question
4) When would it be most appropriate to configure static NAT? A) When you want to guarantee that a particular device is always associated with the same public IP address B) When you do not care what public IP address is used by a device C) When the inside-to-outside IP address mapping is not important D) When you want every inside IP address to translate to a single public IP address
answer
When you want to guarantee that a particular device is always associated with the same public IP address
question
5) What is the purpose of the ip nat inside command? A) To tell the router to use static NAT B) To tell the router to use dynamic NAT C) To tell the router to enter NAT configuration mode D) To tell the router that the current interface is the be considered the inside interface
answer
To tell the router that the current interface is the be considered the inside interface
question
6) The DNS service is required in order to browse the web. A) True B) False
answer
False
question
7) Which of the following commands statically maps a name to an IP address? A) ip name-server B) ip host C) ip address D) ip name
answer
ip host
question
8) Which of the following commands disables the default DNS lookup function on a Cisco router? A) no ip domain-lookup B) no lookup C) no ip-lookup D) no ip domain-name lookup
answer
no ip domain-lookup
question
9) Which of the following commands directs the router to a DNS server for IP-to-name resolution? A) ip host B) ip address C) ip name D) ip name-server
answer
ip name-server
question
10) If you have disabled the lookup function on your Cisco router, you will have to re-enable it if you want to use a DNS server to resolve names on your router. A) True B) False
answer
True
question
11) Which of the following is not a DHCP packet type? A) DHCP OFFER B) DHCP SYN C) DHCP REQUEST D) DHCP ACK E) DHCP DISCOVER
answer
DHCP SYN
question
12) What is the purpose of the service dhcp command? A) Starts monitoring the DHCP service B) Turns off DHCP debugging C) Enables DHCP D) Disables DHCP
answer
Enables DHCP
question
13) Where is the DHCP database typically stored? A) On the router B) On the server C) On a CD or DVD D) The database is not stored
answer
On the server
question
14) Which of the following are optional when configuring your router to be a DHCP server? A) Default gateway B) IP address C) Subnet mask D) DNS server address E) WINS server address F) Domain name
answer
A) Default gateway D) DNS server address E) WINS server address F) Domain name
question
15) Which of the following monitoring commands displays any IP addresses leased by the DHCP server and the corresponding MAC address of the host? A) show ip dhcp pool B) show dhcp C) show ip dhcp binding D) show binding
answer
show ip dhcp binding
question
16) Which of the following monitoring commands displays DHCP pool specific information? A) show ip dhcp pool B) show dhcp C) show ip dhcp binding D) show binding
answer
show ip dhcp pool
question
17) Cisco's SDM can be used to configure network services such as DNS and DHCP. A) True B) False
answer
True
question
18) What is the difference between configuring dynamic NAT and PAT on a cisco router using the SDM? A) The access list that defines the inside addresses will be different B) You will select overload instead of dynamic in the Add Address Translation Rule dialog box C) The direction selected for PAT will be from outside to inside rather than from inside to outside D) You will translate to an interface rather than to a pool of addresses
answer
You will translate to an interface rather than to a pool of addresses
question
19) It is easier to configure a pointer to a DNS server using the command-line interface rather than the SDM. A) True B) False
answer
True
question
20) What is another name for a wildcard mask? A) Inverse mask B) Obtuse mask C) Backwards mask D) Flip mask
answer
Inverse mask
question
1) Which wildcard mask would apply an access list line to all packets from network 172.25.0.0? A) 255.255.255.0 B) 255.255.0.0 C) 255.254.0.0 D) 0.0.255.255
answer
0.0.255.255
question
2) Standard IP access lists filter traffic based on which of the following? (Choose all that apply) A) Destination IP address B) IP protocol C) Port number D) Source IP address
answer
Source IP address
question
3) Wildcard masks use a __________ to signify which bits of an address are significant.
answer
Zero
question
4) Which command shows only the IP access lists on a router? A) show access-lists B) show ipx access-lists C) show ip access-lists D) show interface
answer
show ip access-lists
question
5) Which commands allow you to view the interfaces that have IP access lists applied to them? A) show interfaces B) show ip interface C) show ip traffic D) show ip conters
answer
show ip interface
question
6) Which host and wildcard mask pair does the any keyword represent? A) 255.255.255.255 0.0.0.0 B) 0.0.255.255 0.0.0.0 C) 0.0.0.0 0.0.0.0 D) 0.0.0.0 255.255.255.255
answer
0.0.0.0 255.255.255.255
question
7) Which command is used to apply an IP access list to an interface? A) ip access-group [list #] [in | out] B) ip access-group permit 100 C) ip access-group [list #] [permit | deny] D) show ip interface
answer
ip access-group [list #] [in | out]
question
8) Access lists are . (Choose all that apply.) A) Used to filter traffic and control network security B) Applied as either inbound or outbound filters C) Sequential permit or deny statements D) Built into the routers firmware
answer
A) Used to filter traffic and control network security B) Applied as either inbound or outbound filters C) Sequential permit or deny statements
question
9) Standard IP access lists are represented by the number range. A) 100 - 199 B) 1 - 99 C) 1000 - 1099 D) 200 - 299
answer
1 - 99
question
12) The show access-lists command displays . A) Access lists applied to interfaces B) All access lists on the routers C) Only IP access lists on the router D) Only IPX access lists on the router
answer
All access lists on the routers
question
13) At which of the following prompts would you create an access list? A) routerC# B) routerC> C) routerC (config-if) # D) routerC (config)
answer
routerC (config)
question
14) At which of the following prompts would you apply an access list to an interface? A) routerC# B) routerC> C) routerC (config-if) # D) routerC (config)
answer
routerC (config-if) #
question
15) Which of the following host and corresponding wildcard mask pairs represent the same value as host 172.29.2.2 A) 0.0.0.0 255.255.255.255 B) 172.29.2.2 0.0.0.0 C) 255.255.255.255 0.0.0.0 D) 0.0.0.0 172.29.2.2
answer
172.29.2.2 0.0.0.0
question
16) A router can have one access list per protocol, per direction on each interface. A) True B) False
answer
True
question
17) Which of the following is a benefit of using named lists? A) The syntax is identical to using numbered lists B) Fewer lists are allowed, so it is easier to remember them C) You are not constrained by the 100 lists per filter type limit D) Using named lists offers no benefits
answer
You are not constrained by the 100 lists per filter type limit
question
18) What happens if a list is applied to an interface and then the list itself is removed? A) The commands will be executed and all traffic will be denied B) The commands will be executed and all traffic will be permitted C) The commands will not be executed and all traffic will be permitted D) None of the above.
answer
The commands will be executed and all traffic will be permitted
question
19) What is true of the host keyword? (Choose all that apply) A) It can only be used with extended IP lists B) It can be used with standard and extended IP lists. C) It replaces the 0.0.0.255 wildcard mask D) It replaces the 0.0.0.0 wildcard mask E) It is placed before the IP address with which it is associated F) It is placed after the IP address with which it is associated
answer
B) It can be used with standard and extended IP lists. D) It replaces the 0.0.0.0 wildcard mask E) It is placed before the IP address with which it is associated
question
20) What is the purpose of the "established" parameter? A) To establish a connection between the sender and receiver B) To prevent any traffic into a network C) To prevent any traffic into a network that did not originate from that network D) To permit all TCP traffic but not IP traffic into the established network
answer
To prevent any traffic into a network that did not originate from that network
question
21) All access lists presented in this chapter, except standard IP lists, should be placed where? A) As close to the source as possible B) As close to the destination as possible C) As close to the serial interface as possible D) As close to the tftp server as possible
answer
As close to the source as possible
question
22) Which command links an access list to the VTY lines? A) ip access-group B) ip access-class C) vty access-class D) access-class
answer
access-class
question
23) Which SDM wizard allows you to configure a DMZ? A) Firewall configuration wizard B) Security configuration wizard C) Basic firewall wizard D) Advanced firewall wizard
answer
Advanced firewall wizard
question
24) List the three Basic Firewall security settings. A) 1st B) 2nd C) 3rd
answer
A) High B) Medium C) Low
question
25) The SDM cannot be used to create complex access control lists. A) True B) False
answer
False
question
1) If you want to use CHAP authentication, which protocol would you employ? A) Multilink B) PAP C) Frame Relay D) PPP relay
answer
PPP relay
question
2) What is the default encapsulation type on serial interfaces of Cisco routers? A) PPP B) HDLC C) SDLC D) Frame Relay
answer
HDLC
question
3) Which of the following is an NCP? (Choose all that apply) A) IPXCP B) HDLC C) SDLC D) ATCP E) IPCP
answer
A) IPXCP D) ATCP E) IPCP
question
4) PPP was derived from ________. A) Frame Relay B) HDLC C) RBOC D) ISDN
answer
HDLC
question
5) What is a common reason for looping an interface? A) To achieve greater bandwidth B) To drop nonessential frames C) To increase packet size D) testing
answer
testing
question
6) Which of the following is a unique number that helps devices discover looped interfaces? A) MAC B) LCP C) Magic number D) Bandwidth
answer
Magic number
question
7) Which of the following employs the strongest encryption technique? A) Plain text B) PAP C) CHAP D) Clear text
answer
CHAP
question
8) If you want your router to use CHAP and then PAP authentication, which of the following commands would be correct? A) router>ppp au chap pap B) router# ppp authentication chap pap C) router(config-if) #ppp au pap chap D) router (config-if) #ppp au chap pap E) router(config) # ppp authentication chap pap
answer
router (config-if) #ppp au chap pap
question
9) Which WAN protocol did PPP replace? A) HDLC B) SDLC C) SLIP D) APD
answer
SLIP
question
10) Which protocol is used to automatically build the Frame Relay map along with LMI? A) ARP B) RARP C) Inverse ARP D) DLCI
answer
Inverse ARP
question
11) To make DLCI number globally significant, LMI causes routers to issue that advertise the DLCI numbers. A) unicasts B) keepalives C) broadcasts D) multicasts
answer
broadcasts
question
12) When negotiating a data transfer rate for Frame Relay with a telecommunications provider, the rate agreed upon is the A) Keepalive rate B) CIR C) EBS D) DDR
answer
CIR
question
13) The address portion of the Frame Relay frame contains which of the following pieces of information? (Choose all that apply) A) DLCI B) FECN C) Flag D) BECN E) FCS
answer
A) DLCI B) FECN
question
14) The line speed of a frame relay connection is known as the _______. A) Access rate B) CBS C) EBS D) CIR
answer
Access rate
question
15) ______ Numbers are locally significant in Frame Relay connections and are used to identify specific virtual circuits. A) DLCI B) PDN C) ARP D) LMI
answer
DLCI
question
16) To prevent routing loops, Frame Relay uses _________. A) Loopback attack B) Split horizon C) Event horizon D) DLCI numbers
answer
Split horizon
question
17) Frame relay is more efficient than older WAN encapsulation methods because error correction is handled by ________ Frame Relay communications. A) Lower layers B) DLCI C) LMI D) Upper layers
answer
Upper layers
question
18) Frame relay uses ______ to combine multiple data streams on one connection. A) Duplexing B) Simplexing C) Multiplexing D) Encoding
answer
Multiplexing
question
19) What is the purpose of keepalive packets? A) To reduce data transfer rates B) To keep PVCs active C) To increase data transfer rates D) To negotiate connection speed
answer
To keep PVCs active
question
20) Which of the following layers do WAN specifications typically define? (Choose all that apply) A) Physical B) Data Link C) Network D) Transport E) Presentation
answer
A) Physical B) Data Link
question
21) In frame Relay, what would be considered the DCE? A) Customer's router B) Terminal adapter C) PPP D) Frame Relay Switch
answer
Frame Relay Switch
question
22) What was formerly CITT? A) ASCII B) ANSI C) ITU-T D) EBCDIC
answer
ITU-T
question
23) What is another term used to describe a Frame Relay switch? A) FRND B) FRAD C) PDN D) PSTN
answer
FRAD
question
24) Which of the following would be a subinterface for Serial 1/0? A) S0/0.1 B) S0/0.2 C) S0/1.2 D) S0/2.1
answer
S0/1.2
question
25) What does LMI stand for? A) Logical Management Interface B) Local Management Interface C) Logical Maintenance Interconnect D) Logical Maintenance Interface
answer
Local Management Interface
question
26) What are the three possible connection states for a DLCI? (Choose all that apply) A) Interactive B) Active C) Inactive D) Disconnected E) Deleted
answer
A) Interactive B) Active E) Deleted
question
27) Which of the following does not allow broadcasts to be sent to multiple destinations through a single interface? A) LMI B) Subinterfaces C) LCP D) MBA E) NBMA
answer
Subinterfaces
question
28) Which of the following is a type of virtual circuit? (Choose all that apply) A) MVC B) PVC C) SVC D) QVC
answer
PVC
question
29) Which of the following are LMI encapsulation types supported by Cisco routers? (Choose all that apply) A) LMI 2 B) Cisco C) Ansi D) v923i E) q933a
answer
B) Cisco C) Ansi E) q933a
question
30) Which of the following is the default LMI encapsulation type for a Cisco router? A) LMI 2 B) Cisco C) Ansi D) v923i E) q933a
answer
Cisco
question
31) What does the router (config-if)#encap fr command do? A) Sets the enable mode prompt to fr B) Enables Frame Relay on the first serial interface C) Sets the encapsulation to Frame Relay D) Sets the language to French
answer
Sets the encapsulation to Frame Relay
question
32) Which of the following command would show statistics for a virtual circuit? A) router>sh frame map B) router#sh frame map C) router#sh frame pvc D) router(config-if) #sh frame pvc
answer
router#sh frame pvc
question
33) What Frame Relay encapsulation must be configured on Cisco routers that are attached to non-Cisco routers? A) ietf B) cisco C) ansi D) q933a
answer
ietf
question
34) How often are Frame Relay keepalive packets sent by default? A) every 30 seconds B) every 10 seconds C) once every hour on the half-hour D) once every hour on the hour E) once every 30 minutes
answer
every 10 seconds
question
1) What does a switch build into its table to successfully send data to that device? A) Routing address B) IP address C) Bridge address D) MAC address
answer
MAC address
question
2) Which of the following types of switching methods reads the first 64 bytes of a frame before forwarding it? A) Store and forward B) Cut through C) Fragment free D) Adaptive
answer
Fragment free
question
4) Which devices look at a MAC address when making their forwarding decision? (Choose all that apply) A) Switch B) Repeater C) Bridge D) Router
answer
Switch
question
5) Which of the following network media provides the lowest latency? A) STP B) Category 3 UTP C) Category 4 UTP D) Category 5 UTP E) Fiber-optic cable
answer
Fiber-optic cable
question
6) Which of the following correctly describes microsegmentation? A) Creating additional segments with passive hubs B) Creating additional segments with routers C) Creating additional segments wit fewer users per segment via layer 2 D) Limiting network segments to no more than 10 users
answer
Creating additional segments wit fewer users per segment via layer 2
question
7) Which of the following Ethernet error describes a packet that has a bad FCS and is over 1518 bytes? A) Runt B) Short C) Jabber D) Bad FCS frame
answer
Jabber
question
8) When two Ethernet stations are able to send more than 64 bytes of their data frames before detecting a collision, this is called a. A) Jabber B) Jam signal C) Slot time D) Late collision
answer
Late collision
question
9) The minimum size of an Ethernet Frame should be bytes. A) 32 B) 64 C) 512 D) 1518
answer
64
question
10) Collisions and Ethernet errors typically occur with the first bytes of an Ethernet frame, which is why fragment-free switching catches most Ethernet errors. A) 64 B) 512 C) 1024 D) 1518
answer
A) 64
question
11) Which of the following describes a method of Ethernet networking that does not have collisions? A) Fast Ethernet B) 100-Mbps Ethernet C) Full-duplex Ethernet D) Half-duplex Ethernet
answer
C) Full-duplex Ethernet
question
12) Which of the following switching types has the highest latency? A) Store-and-forward B) Cut-through C) Adaptive D) Fragment-free
answer
Store-and-forward
question
13) If a broadcast from one computer causes multiple stations to respond with additional broadcast traffic, and the level of broadcast traffic goes above 126 broadcasts per second, the situation is deemed a(n) ___________________. A) Broadcast storms B) Transmission overload C) Excessive burst D) Jabber
answer
A) Broadcast storms
question
14) Which of the following fall under the heading of Fast Ethernet? (Choose all that apply) A) 10BaseT B) 100BaseT C) 10BaseF D) 100Base-TX E) 100Base-T4
answer
B) 100BaseT D) 100Base-TX E) 100Base-T4
question
15) Which IEEE standard governs Fast Ethernet? A) 802.3a B) 802.3u C) 802.3g D) 802.3b
answer
802.3u
question
16) Which of the following can divide a collision domain? (Choose all that apply) A) Switch B) Bridge C) Router D) Hub
answer
A) Switch B) Bridge C) Router
question
17) Which of the following allows you to limit the number of MAC addresses learned by a switch port? A) max switchport port-security 10 B) switchport port-security maximum 10 C) switch port-security maximum 10 D) switchport security maximum 10
answer
B) switchport port-security maximum 10
question
18) What benefits would your network have by replacing all 10Mbps hubs with 10Mbps Catalyst switches? (Choose all that apply) A) Increase the number of broadcast domains B) Decrease the number of broadcast domains C) Increase the number of collision domains D) Decrease the number of collision domains E) Increase the bandwidth between stations that are directly connected to the switch F) Allow for full-duplex operations between nodes directly connected to the switch.
answer
C) Increase the number of collision domains E) Increase the bandwidth between stations that are directly connected to the switch F) Allow for full-duplex operations between nodes directly connected to the switch
question
19) Which statements are true about half-duplex Ethernet? A) In half-duplex mode, CSMA/CD is turned on B) In half-duplex mode, CSMA/CD is turned off C) On a 10Mbps link, communicating nodes would have 10Mbps of bandwidth available to them D) Half-duplex transmission is mandatory if nodes are directly connected to a hub that is connected to a switch E) Half-duplex transmission is mandatory if nodes are directly connected to a switch F) Because separate circuits are used by communicating end nodes in half-duplex, collisions will not occur
answer
A) In half-duplex mode, CSMA/CD is turned on D) Half-duplex transmission is mandatory if nodes are directly connected to a hub that is connected to a switch
question
20) Which statement is true about store and forward switching? (Choose all that apply) A) Only the header of a frame is read before the switch forwards the frame B) The switch stores the frame and calculates the CRC before forwarding the frame C) Both latency and error rates are decreased D) Both latency and error rates are increased E) Latency is increased while error rate is decreased
answer
B) The switch stores the frame and calculates the CRC before forwarding the frame. E) Latency is increased while error rate is decreased.
question
21) When collisions are above 5% you should consider: A) Segmenting the LAN B) Increasing traffic on the LAN C) Monitoring traffic on the LAN D) Adding hubs to the LAN
answer
Segmenting the LAN
question
22) Which of the following advantages can Cisco switches can provide over hubs? (Choose all that apply) A) Increase the number of collision domains B) Increased bandwidth for individual users C) Reduced latency D) Concurrent frame forwarding
answer
A) Increase the number of collision domains B) Increased bandwidth for individual users D) Concurrent frame forwarding
question
23) Which of the following are true of half-duplex operation on a CSMA/CD network? (Choose all that apply) A) The transmitting NIC loops back its transmission. B) The NIC listens to the media before transmitting C) The transmitting NIC compares the original frame with the looped-back frame to determine whether there was a collision D) Collisions are not possible in a half-duplex Ethernet
answer
A) The transmitting NIC loops back its transmission. B) The NIC listens to the media before transmitting C) The transmitting NIC compares the original frame with the looped-back frame to determine whether there was a collision
question
24) The switching method begins forwarding the incoming frame immediately after reading the destination address. A) Cut-through B) Store and forward C) Adaptive D) Fragment free
answer
Cut-through
question
25) What command is used to set a port on a switch to full-duplex mode? A) mode full-duplex B) duplex full C) switch full D) port full
answer
duplex full
question
1) The IEEE standard 802.1q recommends which type of VLAN identification method? A) Frame filtering B) Frame tagging C) Frame segmenting D) Frame sequencing
answer
Frame tagging
question
2) What are the five STP port states? (Choose all that apply) A) Learning B) Listener C) Disabled D) Forwarding E) Listening F) Forwarder G) Blocking
answer
A) Learning B) Listener C) Disabled D) Forwarding E) Listening G) Blocking
question
3) By default, implementing a switched network increases the number of collision domains. Which switching technology allows for a decrease in the size of broadcast domains? A) Spanning Tree Protocol B) Filtering and forwarding C) Virtual LANs D) VTP Pruning
answer
Virtual LANs
question
4) For what was the Spanning Tree Protocol created? A) Prevent bridges from forwarding information out of ports that received the information B) Prevent routing loops in a routed internetwork C) Avoid loops in a bridged network with redundant paths D) Assist in the depletion of IP addresses
answer
Avoid loops in a bridged network with redundant paths
question
5) Which of the following are reasons that a bridge port would be placed in the forwarding state? (Choose all that apply) A) The port is on the root bridge B) The port is connected to multiple bridges C) The port is the root port D) The port is not working
answer
A) The port is on the root bridge. C) The port is the root port.
question
6) In what three VTP modes can a switch be set? A) Server, client, virtual B) Server, host, transparent C) Server, host, volatile D) Server, client, transparent
answer
Server, client, transparent
question
7) Which statements are true about VTP pruning? A) It is enabled by default B) It is disabled by default C) It is used to allow two spanning-trees to work simultaneously on the same segment of wire D) It increases the available bandwidth E) It increases the amount of needless traffic on a network.
answer
B) It is disabled by default C) It is used to allow two spanning-trees to work simultaneously on the same segment of wire D) It increases the available bandwidth
question
8) For a VLAN to span two or more switches, what must be configured? A) a switches duplex feature B) a VTP management domain C) a VPMs D) a trunk connection
answer
a trunk connection
question
9) After entering the interface configuration mode for a port on a 2950 switch, which command would assign the port to VLAN 10? A) vlan-membership static 10 B) switchport access vlan 10 C) vlan static 10 D) vlan 10 static-membership
answer
switchport access vlan 10
question
10) Which of the following allows you to reorganize broadcast domains no matter what the physical configuration dictates? A) router B) VLAN C) Bridge D) Switch
answer
B) VLAN
question
11) If you attach a hub with five stations to a switch port that is configured for VLANs, in how many different VLANs will the devices on the hubs be located? A) five B) three C) two D) one
answer
D) one
question
12) Which of the following are advantages to VLANs? (Choose all that apply) A) VLANs make relocating devices easier B) Separate VLANs do not require routers C) VLANs increase effective bandwidth utilization D) VLANs restructure broadcast domains
answer
A) VLANs make relocating devices easier C) VLANs increase effective bandwidth utilization D) VLANs restructure broadcast domains
question
13) Which of the following is a security benefit that routers provide on VLANs? A) dividing broadcast domains B) dividing collision domains C) allowing for the creation of access lists D) bridging IP to IPX layer 3 protocol gap
answer
allowing for the creation of access lists
question
14) Which of the following are VTP modes of operation? (Choose all that apply) A) client B) server C) transparent D) blocking
answer
A) client B) server C) transparent
question
15) Which command would delete the VLAN database on a switch? A) delete vlan.dat B) delete flash:vlan.dat C) erase flash:vlan.dat D) erase vlan.dat
answer
delete flash:vlan.dat
question
16) Which command allows you to create a VTP domain named XYZDOM? A) VTP XYZDOM Domain B) Domain VTP XYZDOM C) VTP Domain XYZDOM D) Domain XYZDOM VTP
answer
VTP Domain XYZDOM
question
17) Which statement is true about PortFast? A) PortFast is used when you need to delay the amount of time it takes for a port to transition to the forwarding state. B) PortFast is available on Cisco routers only C) PortFast prevents a port from entering the forwarding state D) PortFast allows a switch port to move to the forwarding state quicker
answer
PortFast allows a switch port to move to the forwarding state quicker
question
18) Which command allows you to create VLAN 2 and name it AccountingVLAN? A) Switch (config-vlan) #Vlan 2 name AccountingVlan B) Switch (vlan) #Vlan 2 name AccountingVlan C) Switch (config) #Vlan 2 name AccountingVlan D) Switch(vlan-config) #Vlan 2 name AccountingVlan
answer
B) Switch (vlan) #Vlan 2 name AccountingVlan C) Switch (config) #Vlan 2 name AccountingVlan
question
19) Which command allows you to add ports to VLANs? A) Switchport mode access B) Switchport access mode C) Access mode switchport D) Mode switchport access
answer
A) Switchport mode access
question
20) Which command allows you to give a description to a port on a switch? A) Name B) Information C) Description D) Named port
answer
Named port
question
21) Which command allows you to give a description to a port on a switch? A) Name B) Information C) Description D) Named port
answer
Description
question
22) Which command allows you to see the spanning-tree configuration for VLAN 3 only? A) Switch (config) #show spanning-tree B) Switch#show spanning-tree vlan 3 C) Switch (config) #show spanning-tree vlan 3 D) Switch#show spanning tree vlan 3
answer
Switch#show spanning-tree vlan 3
question
23) Which VLAN is the default VLAN for a switch? A) VLAN A B) VLAN 1 C) VLAN 10 D) VLAN 100
answer
VLAN 1
question
24) What is the default STP priority for a switch on a network? A) 32768 B) 32769 C) 8192 D) 4096
answer
32768
question
25) Which command would set VLAN 1 with a priority of 4096? A) Spanning-tree vlan 1 priority 4096 B) Spanning-tree priority vlan 14096 C) Spanning-tree priority 4096 vlan 1 D) Spanning-tree priority 1
answer
Spanning-tree priority vlan 14096
question
_____ networks have computers that are servers and computers that act as clients to those servers. a. EMI b. Peer-to-peer c. Peer-to-node d. Client/server
answer
Client/Server
question
A _____ spans multiple geographic areas and is usually connected by common telecommunication carriers. a. LAN b. SAN c. WAN d. MAN
answer
WAN
question
The term _____ refers to a series of storage devices, such as tapes, hard drives, & CDs, that are networked together to provide very fast data storage for a network or subnetwork. a. MAN b. WAN c. SAN d. LAN
answer
SAN
question
The part of the company's network that allows access to employees is called the ____, which is completely separate from the Internet. a. intranet b. LAN c. SAN d. extranet
answer
intranet
question
The OSI model _____ layer defines the mechanical, electrical, & procedural events occur during the physical transmission of electronic signals on the wire. a. Physical b. Transport c. Data Link d. Network
answer
Physical
question
The _____ sublayer of the Data Link layer defines how data is packaged for the network. a. MAC b. RPC c. CRC d. LLC
answer
LLC
question
A(n) _____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production. a. CRC b. RPC c. LLC d. MAC
answer
MAC
question
The protocols at the Network Layer allow computer to route packets to remote networks using a _____ address. a. burned in b. BIA c. logical d. physical
answer
Logical
question
_____ protocols, such as User Datagram Protocol (UDP), do not require an ACK. a. Presentation-layer b. Connection-oriented c. Connectionless d. Network-layer
answer
Connectionless
question
Each layer in a protocol stack may add a(n) _____ to the data as it is passed down the layers. a. PDU b. MTU c. CRC d. LLC
answer
Protocol Data Unit (PDU)
question
On analog networks, devices that boost the signal are called _____. a. routers b. amplifiers c. hubs d. repeaters
answer
Amplifiers
question
If a single access point is available in infrastructure mode, then the mode is said to be a(n) _____. a. Virtual Service Set (VSS) b. Extended Service Set (ESS) c. Basic Service Set (BSS) d. Logical Service Set (LSS)
answer
Basic Service Set (BSS)
question
A _____ filters traffic between network segments by examining the destination MAC address. a. hub b. repeater c. router d. bridge
answer
Bridge
question
Switches filter based on _____ addresses. a. logical b. IP c. MAC d. TCP/IP
answer
MAC
question
Routers operate at the _____ layer of the OSI model. a. Network b. Transport c. Data Link d. Physical
answer
Network
question
_____ are commonly used to connect networks to the Internet. a. Bridges b. Switches c. Routers d. Hubs
answer
Routers
question
A(n) _____ is usually a combination of hardware & software. Its purpose is to translate between different protocol suites. a. amplifier b. gateway c. hub d. router
answer
Gateway
question
_____ is a network access method (or media access method) originated by the University of Hawaii. a. FDDI b. AppleTalk c. Ethernet d. Token Ring
answer
Ethernet
question
A _____ is the physical area in which a frame collision might occur. a. signal domain b. jam area c. jam domain d. collision domain
answer
Collision domain
question
Fast Ethernet is defined under the IEEE _____ standard. a. 802.3b b. 802.3f c. 802.3u d. 802.3z
answer
802.3u
question
In _____ communication, devices can send and receive signals simultaneously. a. full-duplex b. mutx c. half-duplex d. single-duplex
answer
Full-duplex
question
The term that describes all the physical components of a network.
answer
Networking hardware
question
A defined method for communicating between systems.
answer
Protocol
question
A wireless transmission media.
answer
Infrared
question
Devices that boost the network signal.
answer
Repeaters
question
Allows communication, security, & distribution of data, files, & applications over a network.
answer
Network Operating system (NOS)
question
Frequently caused by nearby motors or fluorescent lighting.
answer
ElectroMagnetic Interference (EMI)
question
The programs used to run a network.
answer
Networking software
question
When every computer on a network acts as both a client and a server.
answer
Peer-to-peer network
question
Developed as an industry standard for companies to use when developing network hardware and software to ensure complete compatibility.
answer
OSI model
question
A group of network devices that will receive LAN broadcast traffic from each other.
answer
Broadcast domain
question
A generic connection device used to tie several networking cable together to create a link between different stations on a network.
answer
Hub
question
Preventing communications between just two computers from being by computer on the broadcast to every computer on the network or segment.
answer
Microsegmentation
question
When two or more stations in the transmission of excessive broadcast traffic.
answer
Broadcast storm
question
Networks connected by multiple routers.
answer
Internetworks
question
A part of a network that is divided logically or physically from the rest of the network.
answer
Segment
question
Wireless network name.
answer
Service Set Identifier (SSID)
question
A frame destined for all computers on the network.
answer
Broadcast frame
question
Degradation of signal clarity.
answer
Attenuation
question
The _____ is used at the Data Link layer to establish, configure, and test the connection. a. NCP b. ATCP c. IPCP d. LCP
answer
LCP
question
In a production environment, you can use the _____ command from interface configuration mode, which will automatically shut down that interface when looping is detected. a. off-looped-interface b. looped off c. down-when-looped d. off-when-lopped
answer
down-when-looped
question
_____ checks the reliability of the link by monitoring the number of errors, latency between requests, connection retries, and connection failures on the PPP link. a. LQM b. PAP c. CHAP LCDI
answer
LQM
question
_____ is a communications technique for sending data over high-speed digital connections operating at anywhere from 56 Kbps to 44.736 Mbps or higher. a. Frame Relay b. PPP c. Slip d. DLCI
answer
Frame Relay
question
A(n) _____ implementation prevents routing update information received on one physical interface from being rebroadcast to other devices through that same physical interface. a. PVC b. keepalive c. SDLC d. split horizon
answer
Split horizon
question
When the sum of the data arriving over all virtual circuits exceeds that access rate, the situation is called _____. a. undersubscription b. oversubscription c. overrate d. underrate
answer
Oversubscription
question
The Frame Relay _____ topology is like the bus LAN topology; nodes are simply strung along in a daisychained fashion. a. full mesh b. star c. partial mesh d. peer
answer
Peer
question
The _____ is the most popular Frame Relay topology. a. full mesh b. peer c. star d. partial mesh
answer
Star
question
The _____ is the most expensive Frame Relay topology to implement because each router has a direct connection to every other router. a. full mesh b. star c. partial mesh d. peer
answer
Full mesh
question
You can check your Frame Relay configuration by using _____ commands. a. status b. show c. check d. dlci - interface
answer
Show
question
A(n) _____ is the physical area in which a packet collision might occur. a. backoff domain b. collision domain c. IPG domain d. jam domain
answer
Collision domain
question
Stations on a network _____ packets to other stations to make their presence known on the network and to carry out normal network tasks such as IP address-to-MAC address resolution. a. broadcast b. unicast c. multicast d. anycast
answer
Broadcast
question
A(n) _____ occurs when two stations transmit more than 64 bytes of data frames before dete4cting a collision. a. jabber b. NIC error c. late collision d. alignment error
answer
Late collision
question
A bridge maintains a _____ that maps the MAC addresses on each segment to the corresponding port on the bridge to which each segment is connected. a. multicast table b. map table c. bandwidth table d. bridging table
answer
Bridging table
question
A _____operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and makes forwarding decisions based on the layer 3 address. a. switch b. router c. bridge d. hub
answer
Router
question
_____ switches read the entire frame, no matter how large, into their buffers before forwarding. a. Fast-forward b. Store-and-forward c. fragment-free d. cut-through
answer
Store-and-forward
question
_____ represents an effort to provide more error-reducing benefits than cut-through switching, while keeping latency lower than does store-and-forward switching. a. Fragment-free forwarding b. Fast forwarding c. Adaptive cut-through forwarding. d. Adaptive fast forwarding
answer
Fragment-free forwarding
question
Fragment-free switches are also known as _____ switches. a. fast forwading b. error sensing c. cut-through d. modified cut-through
answer
Modified cut-through
question
Two types of operating systems are in use on Cisco switches: IOS-bassed and _____. a. terminal-based b. command-based c. set-based d. prompt-based
answer
Set-based
question
To start configuration mode, first type _____ at the command prompt. a. cfg trmnl b. config tty c. config t d. cfg t
answer
config t
question
Generally speaking, a switch does not require an IP address, because switches operate mainly on Layer 2 (_____ addresses). a. IP b. TCP c. IPX d. MAC
answer
MAC
question
To view the configuration of a port, use the ____ command. a. display b. show c. interface d. port
answer
Show
question
An encapsulation type for serial interface communications.
answer
PPP
question
A routing technique that reduces the chance of routing loops on a network.
answer
Split horizon
question
Allow the simultaneous use of multiple Network layer protocols and are required for each protocol that uses PPP.
answer
NCPs
question
A packet switching & encapsulation technology that functions at the Physical & Data Link layers of the OSI reference model.
answer
Frame relay
question
Switching equipment supplied by a telecommunications provider that serves as a connection to the public data network (PDN).
answer
DCE
question
Virtual interfaces associated with a physical interface.
answer
Subinterfaces
question
A table in RAM that defines the remote interface to which a specific DLCI number is mapped.
answer
Frame Relay map
question
A type of serial device that was developed by Cisco & T3Plus Networking.
answer
HSSI
question
Map virtual circuits to layer 3 protocol addresses.
answer
DLCI numbers
question
A frame with an FCS error and an octet missing.
answer
Alignment error
question
Virtual local area network that allows you to logically segment a network.
answer
VLAN
question
Switches that require all attached network interface devices to use the same transmit/receive speed.
answer
Symmetric switching
question
A sudden rush of network transmissions that causes all other network communication to slow down due to the volume of data competing for access to the same bandwidth on the communication medium.
answer
Broadcast storm
question
Segments a network by filtering traffic at the Data Link layer.
answer
Bridge
question
The length of time that is required to forward, send, or otherwise propagate a data frame.
answer
Latency
question
Also know as error sensing.
answer
Adaptive cut-through forwarding
question
Limits collision domains to five segments of wire, four repeaters, and/or hubs, and three populated hubs between any two stations on a 10-Mbps network.
answer
5-4-3 rule
question
Ethernet contention method.
answer
CSMA/CD
question
Which of the following best describes the Presentation layer? A. establishes, maintains, & manages sessions between applications. B. translates, encrypts, or prepares data from the Application layer for network transmission. C. handles routing information for data packets.
answer
Translates, encrypts, or prepares data from the Application layer for network transmission.
question
Which of the following best describes the Newtork layers? A. handles routing information for data packets. B. provides the electrical & mechanical transmission of data. C. handles link control & uses the MAC address on the (NIC).
answer
Handles routing information for data packets.
question
Which of the following best describes the Session layers? A. handles link control & uses the MAC address on the (NIC). B. provides the electrical & mechanical transmission of data. C. establishes, maintains, & manages sessions between applications.
answer
Establishes, maintains, & manages sessions between applications
question
Which of the following best describes the Transport layer? A. provides the electrical & mechanical transmission of data. B. handles link control & uses the MAC address on the (NIC). C. segments & reassembles data & provides either connection-oriented or connectionless communications.
answer
Segments & reassembles data & provides either connection-oriented or connectionless communications.
question
Which of the following best describes the Data Link layer? A. provides the electrical & mechanical transmission of data. B. handles link control & uses the MAC address on the (NIC). C. establishes, maintains, & manages sessions between applications.
answer
Handles link control & uses the MAC address on the (NIC).
question
Which of the following best describes the Physical layer? A. establishes, maintains, & manages sessions between applications. B. provides network services to the user. C. provides the electrical & mechanical transmission of data.
answer
Provides the electrical & mechanical transmission of data.
question
Which of the following best describes the Application layer? A. establishes, maintains, & manages sessions between applications. B. translates, encrypts, or prepares data for network transmission. C. provides network services to the user.
answer
Provides network services to the user.
question
Connection-oriented services are also known as _____ services. a. reliable b. unreliable c. datagram
answer
Reliable
question
Connectionless services are also called _____ services. a. reliable b. acknowledgment c. unreliable
answer
Unreliable
question
Which of the following describes services that receive an acknowledgment from the destination? (Choose all that apply.) a. datagram b. reliable c. connection-oriented d. connectionless
answer
B. Reliable C. Connection-oriented
question
Place the following steps of data encapsulation in their correct descending order: a. frame headers & trailers added b. segment header added c. bit transmission d. packet creation & network header e. data conversion
answer
1. Data conversion 2. Segment header added 3. Packet creation & network header 4. Frame headers & trailers added 5. Bit transmission
question
Which of the following best describes a LAN? A. a network contained with in a single geographic area such as a building or floor in a building B. a countrywide network that spans multiple geographic locations. C. a large network that is connected by both publicly & privately maintained cabling spread over multiple geographic locations.
answer
A network that is contained in a single geographic area such as a building or floor in a building.
question
Before networks, what did people use to transfer files? a. sneakernet b. protocols c. interface cards d. Ethernet
answer
Sneakernet
question
A protocol is to a computer as a(n) _____ is to a person. a. identity b. personality c. language d. personal philosophy
answer
Language
question
Communications on a network originate at the ______. a. destination b. breaker c. peak d. source
answer
Source
question
Transmitted signals are bound for a _____ computer. a. destination b. breaker c. peak d. source
answer
Destination
question
Information transmitted on a network is called a(n) _____. a. package b. expresser c. data destination d. data frame e. E-pack
answer
Package
question
Which of the following are layers of the OSI model? (Choose all that apply.) a. OSI b. Physical c. IEEE d. Data Link
answer
Physical & Data Link
question
Which layer of the OSI model is responsible for media access & packaging data into frames? a. Network layer b. Physical layer c. Data Link layer d. Transport layer
answer
C. Data Link layer
question
At which layer of the OSI model will encryption & compression occur? a. Presentation layer b. Session layer c. Application layer d. Network layer
answer
Presentation layer
question
Lists the layers of the OSI model from layer 7 to layer 1?
answer
Application, Presentation, Session, Transport, Network, Data Link, Physical
question
The _____ layer is responsible for finding the best path route packets within an internetwork. a. Transport b. Network c. Session d. Data Link
answer
Network
question
The network access method used by Ethernet networks.
answer
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
question
A private communications link over public communications infrastructure, such as the Internet.
answer
Virtual Private Network (VPN)
question
A computer language used to query, manipulate, and communicate with databases.
answer
Structured Query Language (SQL)
question
True or False: In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model.
answer
False: Because: it was in1984.
question
True or False: Computers must use a common protocol to communicate properly.
answer
True
question
True or False: Peer communication allows error checking to occur on two separate layers simultaneously.
answer
True
question
True or False Many LANs & WANs contain several segments. Dividing a network into segments reduces performance.
answer
False: Because: Dividing a network into segments increase performance.
question
Also called the MAC address. It is burned into the network interface (NIC) during the manufacturing process.
answer
Physical address
question
A group of data that is transmitted across a network.
answer
Packet
question
The process that ensures that data was not corrupted during transmission. This is accomplished by comparing CRC calculations before & after transmission.
answer
Cyclic Redundancy check (CRC)
question
A network address that can be assigned and modified by the person in charge of the network.
answer
Logical address
question
A subsystem of networked storage devices that are physically separate from the severs.
answer
Storage area network (SAN)
question
The invention & evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. ____. a. DOD b. SRI c. UCLS d. IEEE
answer
DOD
question
The _____ layer in the TCP/IP model determines the connectionless or connection-oriented services. a. Network Interface b. Transport c. Application d. Internetwork
answer
Transport
question
_____ uses a one-to-one mapping or one-to many mapping method to allow one or more private IP clients to gain access to the Internet by mapping the private IP addresses to public IP addresses. a. DHCP b. NAT c. WINS d. NetBEUI
answer
NAT
question
_____ must be used if you want clients outside your network to access services on your servers. a. Static NAT b. Dynamic NAT c. PAT d. Dynamic PAT
answer
Static NAT
question
To differentiate between the connections, _____ uses multiple public TCP & UDP ports to create unique sockets that map to internal IP addresses. a. PAT b. static NAT c. dynamic NAT d. virtual NAT
answer
PAT
question
NAT servers use ____ to send connections from external clients to the Web server on the internal network. a. nat relay b. port forwarding c. port relay d. dhcp relay
answer
Port forwarding
question
The _____ command enables DNS if it has previously been disabled. a. ip domain-lookup b. domain-lookup on c. ip name-server d. ip dns enable
answer
ip domain-lookup
question
Which statement accurately defines IPsec? a. IPSec is an authentication protocol. b. IPSec is a Cisco-proprietary suite of protocols that allows for secure communication. c. IPSec is an industry-standard suite of protocols that allows for secure communication. d. IPsec supports RADIUS and TACACS+.
answer
c. IPSec is an industry-standard suite of protocols that allows for secure communication.
question
Which command establishes an SSH key pair? a. SshRouter(config)#crypto key generate rsa b. SshRouter(config)#crypto-key generate rsa c. SshRouter(config)#crypto generate rsa d. SshRouter(config)#crypto key-generate rsa
answer
a. SshRouter(config)#crypto key generate rsa
question
What two methods can be used to configure VPNs on a Cisco router? a. IPSec b. RADIUS c. CLI d. SDM e. ESP
answer
c. CLI d. SDM
question
What services are provided by an IPS? (Choose all that apply.) a. examine data packets b. authenticate users c. account for users time on the network d. drop malicious packets
answer
a. examine data packets d. drop malicious packets
question
What services are provided by an IDS? a. examine data packets b. authenticate users c. account for users time on the network d. insert malicious packets
answer
a. examine data packets
question
What is the correct command sequence to protect all five of a router's VTY lines with SSH? a. SshRouter(config)#line vty 0 1 SshRouter)config-line)#transport input ssh b. SshRouter(config)#line vty 0 4 SshRouter)config-line)#transport input ssh c.SshRouter(config)#line con 0 1 SshRouter)config-line)#transport input ssh d. SshRouter(config)#line vty 0 4 SshRouter)config-line)#transport input ssh
answer
d. SshRouter(config)#line vty 0 4 SshRouter)config-line)#transport input ssh
question
Which three protocols are supported by IPSec? a. ESP b. 3DES c. MD5 d. SHA e. IKE f. AH
answer
a. ESP d. SHA f. AH
question
What two modes are supported by IPSec? a. traversing mode b. forwarding mode c. tunnel mode d. transport mode
answer
c. tunnel mode d. transport mode
question
Which command successfully sets the SSH Timeout for connections to 1 minute and 30 seconds? a. ip ssh-time-out 90 b. ip ssh time-out 1min 30sec c. ip ssh-time-out 1min 30sec d. ip ssh time-out 90
answer
d. ip ssh time-out 90
question
What functionality is supported by the Cisco SDM? (Choose all that apply.) a. RADIUS b. Security Audit c. PPTP d. VPN configuration
answer
b. Security Audit d. VPN configuration
question
What authentication algorithms are supported by IPSec? (Choose all that apply.) a. ESP b. 3DE5 c. MD5 d. SHA e. IKE f. AH
answer
c. MD5 d. SHA
question
What encryption algorithms are supported by IPSec? (Choose all that apply.) a. ESP b. 3DES c. MD5 d. SHA e. IKE f. AH g. AES
answer
b. 3DES g. AES
question
Which tunneling protocols provide a secure tunnel for the data to travel through? (Choose all that apply) a. AH b. IPSec c. GRE d. L2TP e. PPTP
answer
a. AH d. L2TP e. PPTP
question
Which protocols provide AAA services on Cisco routers? (Choose all that apply.) a. SSH b. RADIUS c. SSL d. TACACS+ e. ESP
answer
b. RADIUS d. TACACS+
question
The term "authentication" in Cisco's AAA model refers to what service? a. regulation of a user's allowable activities on a device b. process to validate users c. the ability to verify data as it traverses the network d. the ability to verify data as it traverses the network
answer
b. process to validate users
question
The term "authorization" in Cisco's AAA model refers to what service? a. the ability to verify data as it traverses the network b. the ability to track user activity c. process to validate users d. regulation of a user's allowable activities on a device
answer
d. regulation of a user's allowable activities on a device
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New