Questions and Answers (Answers Are in Bold)

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 11

If you study these questions, you are guaranteed to pass the exam with ease.

Questions and Answers (Answers are in bold)


3) The maximum distance of a 10BaseT network is which of the following? A. 100 meters B. 500 meters C. 1000 meters D. 1500 meters

9) Which three of the following are true statements about connection-oriented sessions? A. Any segments not acknowledged are dropped B. The segments delivered are acknowledged back to the sender upon their reception C. A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D. Segments are sequenced back into their proper order upon arrival at their destination

14) Which layer is responsible for putting 1s and 0s into a logical group? A. Data Link

B. Physical C. Network D. Transport E. Application F. Session

16) Which layer defines bit synchronization? A. Application B. Session C. Transport D. Session E. Physical F. Network

18) Which layer is responsible for routing through an internetwork? A. Physical B. Session

C. Transport D. Application E. Network F. Data Link

20) Which layer is responsible for coordinating communication between systems? A. Application B. Session C. Physical D. Data Link E. Network F. Presentation

29) Which of the following is a characteristic of a switch, but not of a repeater?(1) A. Switches forward packets based on the IPX or IP address in the frame B. Switches forward packets based only on the IP address in the packet C. Switches forward packets based on the MAC address in the frame D. Switches forward packets based on the IP address in the frame

33) What is required to support full-duplex Ethernet? (choose 2)

A. Full-duplex NIC cards B. Multiple paths between multiple stations on a link C. Loopback and collision detection disabled D. Automatic sensing operation by all connected stations

35) Choose the following that are benefits to segmenting with router.(choose all that apply) A. Manageability B. Flow Control C. Multiple Active Paths D. Explicit packet lifetime control

36) The benefits to segmenting with Bridges are which of the following?(choose all that apply) A. Manageability B. Reliability C. Scalability D. Datagram filtering

40) What is the default switching method for the Cisco 5000 series?(1) A. Latency

B. Cut-through C. Store-and-forward D. Store-and-splice

51) Which port numbers are used by TCP and UDP to set up sessions with other hosts?(1) A. 1-25 B. 6-17 C. 1023 and above D. 6 and 17 respectively

52) Which protocol will send a message to routers if a network outage or congestion occurs? A. ARP B. IP C. ICMP D. TCP , but UDP is connectionless

60) Which protocol gets a hardware address from a known IP address?(1) A. ARP B. RARP

C. ICMP D. BootP E. IP F. TCP

66) What which of the following is an invalid host address using a netmask of 255.255.255.192 A. 10.1.1.1 B. 10.1.1.66 C. 10.1.1.127 D. 10.1.1.130

75) You have an IP address of 172.16.3.57 with an 11-bit subnet mask. What are the valid hosts?(1) A. 172.16.3.32 to 172.16.3.62 B. 172.16.3.33 to 172.16.3.62 C. 172.16.3.34 to 172.16.3.62 D. 172.16.3.57 to 172.16.3.62

96) Which is true regarding half duplex Ethernet operation?

A. Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet B. With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge C. Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet D. Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end

204) What is Cisco's default encapsulation method on serial interfaces? (1) A. ANSI B. Q933a

53.privilledged mode symbol ? # 56.console terminal line password cisco ? line console 0 login password cisco

21) Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A. Network B. Physical C. Application

D. Session E. Transport F. Presentation 28) The two sublayers of the IEEE Data Link Layer are which of the following?(1) A. Data Link and MAC B. Data Link and LLC C. Logical Link Control and Media Access Control D. Link and Logical Control 31) How does the cut-through switching technique work?(1) A. The LAN switch copies the entire frame into its onboard buffers and then looks up the destination interface B. The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C. By using broadcast address as source addresses D. By using a Class I repeater in a collision domain 32) How does a switch use store and forward?(1) A. The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets B. The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C. By using a Class I repeater in a collision domain D. By using broadcast addresses as source addresses 33) What is required to support full-duplex Ethernet? (choose 2) A. Full-duplex NIC cards B. Multiple paths between multiple stations on a link C. Loopback and collision detection disabled D. Automatic sensing operation by all connected address in its forwarding, or switching, table and determines the outgoing

36) The benefits to segmenting with Bridges are which of the following?(choose all that apply) A. Manageability

B. Reliability C. Scalability D. Datagram filtering

41) Which is true regarding store-and-forward switching method?(1) A. It is default for all Cisco switches B. It only reads the destination hardware address before forwarding the frame C. Latency varies depending on frame-length D. Latency is constant51) Which port numbers are used by TCP and UDP to set up sessions with other hosts?(1) A. 1-25 B. 6-17 C. 1023 and above D. 6 and 17 respectively 60) Which protocol gets a hardware address from a known IP address?(1) A. ARP B. RARP C. ICMP D. BootP E. IP F. TCP 75) You have an IP address of 172.16.3.57 with an 11-bit subnet mask. What are the valid hosts?(1) A. 172.16.3.32 to 172.16.3.62 B. 172.16.3.33 to 172.16.3.62 C. 172.16.3.34 to 172.16.3.62 D. 172.16.3.57 to 172.16.3.62 82) What is the command to copy the configuration from NVRAM to RAM? A. copy flash start B. copy running-config startup-config C. copy startup-config running-config D. wr mem 91) What command do you type to change the enable password to Cisco?(1) A. Config t, enable secret Cisco B. Config t, line con 0, login, password Cisco

C. Config t, enable password Cisco D. config t, line vty 0 4, login, password Cisco 217) What three occurrences will reset the holddown timer after a triggered update? A. HD Timer expires B. Infinity is finally defined as some max number C. Another update is received indicating net status changed D. Another update is received indicating a better metric E. The router receives a processing task proportional to the number of links in the internetwork F. The router detects fault LSP's propagating through the internetwork

177) Which access list configuration allows only traffic from network 172.17.0.0 to enter int s0?(1) A. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-group 10 out B. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-group 10 in C. Access-group 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-list 10 out D. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-list 10 in

16. 10BaseT Base ? 5 .


a. signaling type -

b. spectrum type c. ? 28. secure ? a. Repeater . b. Switch .


c. Router .

d. ? 34.bridge network segment ? a. reduce collision ---> b. add collision domains ---> c. increase collision .. d. reduce collision domains

45. . (he needs to use big clent-server aplications and send large amount of data to company) cost/benefit ? a. isdn ---> b. token ring c. dedicated lan d? 56.console terminal line password cisco ? a. line console 0 ---> login password cisco b. line console 0 login password CISCO . . . .

63.sh version ( ) sh version

Layer3 Copyright 1999 by Layer 3, Inc., All rights reserved. Revised:

You might also like