Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

1000 CCNA

Certification Exam
Preparation Questions
and Answers:

One Thousand
Practice Questions
for Passing the CCNA
Exams -

Pass On Your
First Try
1
Copyright © 2009

Notice of rights

All rights reserved. No part of this book may be reproduced or


transmitted in any form by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written
permission of the publisher.

Notice of Liability
The information in this book is distributed on an “As Is” basis
without warranty. While every precaution has been taken in the
preparation of the book, neither the author nor the publisher shall
have any liability to any person or entity with respect to any loss
or damage caused or alleged to be caused directly or indirectly
by the instructions contained in this book or by the products
described in it.

Trademarks

Many of the designations used by manufacturers and sellers to


distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of
a trademark claim, the designations appear as requested by the
owner of the trademark. All other product names and services
identified throughout this book are used in editorial fashion
only and for the benefit of such companies with no intention of
infringement of the trademark. No such use, or the use of any
trade name, is intended to convey endorsement or other affiliation
with this book.

2
This self-study exam preparation guide for the CCNA exams
contains everything you need to test yourself and pass the Exam.

Including all the exam topics, covered indepth and insider


secrets, complete explanations of all CCNA subjects, ONE
THOUSAND highly realistic sample questions, designed to
strengthen understanding of the CCNA concepts and prepare
you for exam success on the first attempt are provided.

Can you imagine valuing a book so much that you send the
author a “Thank You” letter?

This book includes new exercises and sample questions


never before in print. Offering 1000 sample questions, plus
information available nowhere else, this book will help you pass
the CCNA exams on your FIRST try.

Buy this. Read it. And Pass the CCNA exams.

This book provides a laser sharp focus on all the exam objectives
with a cohesive, concise, yet comprehensive coverage of all the
topics included in the CCNA Exams.

It includes A THOUSAND questions modeled after the real exam


with answers and extensive answer indications to recap all the
important points for the last hour preparation before taking the
exam.

3
CCNA Practice exam Questions D. show ipx nodes.

1 As system administrator, you type “debug ipx Ans A


sap” and receive the following lines as part of the
IOS response: 5 The “ipx delay number” command will allow an
type 0x4, “HELLO2”, 199.0002.0003.0006 (451), administrator to change the default settings. What
2 hops are the default settings?
type 0x4, “HELLO1”, 199.0002.0003.0008 (451),
2 hops A. For LAN interfaces, one tick; for WAN interfaces,
What does “0x4” signify? six ticks
B. For LAN interfaces, six ticks; for WAN interfaces,
A. That is a Get Nearest Server response. one tick
B. That it is a General query. C. For LAN interfaces, zero ticks; for WAN interfaces,
C. That it is a General response. five ticks
D. That it is a Get Nearest Server request. D. For LAN interfaces, five ticks; for WAN interfaces,
zero Ticks
Ans A
Ans A
2 To monitor IP igrp traffic, you can use “debug IP The default is--for LAN interfaces, one tick; for WAN
igrp transaction” or “debug IP igrp events”. How do interfaces, six ticks
you display information about IPX routing update
packets? 6 As a system administrator, you need to set up one
Ethernet interface on the Cisco router to allow for
A. debug routing both sap and Novell-ether encapsulations. Which set
B. debug ipx transaction of commands will accomplish this?
C. debug ipx routing activity
D. debug ipx events A. interface ethernet 0.1
ipx encapsulation Novell-ether
Ans: C ipx network 9e
interface ethernet 0.2
3 To monitor ipx traffic on a network, what ipx network 6c
command would you use?
B. interface ethernet 0
A. debug ipx transaction ipx encapsulation Novell-ether
B. show ipx traffic ipx network 9e
C. show ipx events interface ethernet 0
D. display ipx traffic ipx encapsulation sap
ipx network 6c
Ans B
C. interface ethernet 0.1
4 What command would you use to find out the ipx encapsulation Novell-ether
names of Novell servers on a network? interface ethernet 0.2
ipx encapsulation sap
A. show ipx servers
B. show ipx hosts D. interface ethernet 0.1
C. show ipx sap ipx encapsulation Novell-ether

4
ipx network 9e ipx ethernet 0.1
interface ethernet 0.2 ipx encapsulation novell-ether
ipx encapsulation sap ipx network 9e
ipx network 6c interface ethernet 0.2
ipx encapsulation sap
Ans D ipx network 6c
The following commands setup the subinterfaces to
allow for two types of encapsulation: 8 By default, Cisco routers forward GNS SAPs to
interface ethernet 0.1 remote networks.
ipx encapsulation Novell-ether
ipx network 9e A. False
interface ethernet 0.2 B. True
ipx encapsulation sap
ipx network 6c Ans A
GNS is Novell’s protocol to Get Nearest Server.
7 What does the “IPX maximum-paths 2” command If there is a server on the local network, that server
accomplish? will
respond. If there isn’t, the Cisco router has to be
A. It enables load sharing on 2 paths if the paths configured to forward the GNS SAP.
are equal metric paths.
B. It sets up routing to go to network 2. 9 To prevent Service Advertisements (SAPs) from
C. It is the default for Cisco IPX load sharing. flooding a network, Cisco routers do not forward
D. It enables load sharing on 2 paths if the paths them. How are services advertised to other
are unequal metric paths. networks?

Ans A A. Each router builds its own SAP table and forwards
It enables load sharing on 2 paths if the paths are that every 60 seconds.
equal metric paths. The default is 1 path and the B. Each router assigns a service number and
maximum is 512 paths. broadcasts that.
C. SAPs aren’t necessary with Cisco routers.
8 You want to enable both arpa and snap D. Cisco routers filter out all SAPs.
encapsulation on one router interface. How do you
do this? Ans: A
Cisco routers build SAP tables and forward the table
A. The interface can handle multiple encapsulation every 60 seconds. All SAPs can’t be filtered even
types with no extra configuration. with 4.x since NDS and time synchronization uses
B. Assign two network numbers, one for each SAPs.
encapsulation type.
C. Enable Novell-ether to run multiple encapsulation 10 Novell’s implementation of RIP updates routing
types. tables every ____ seconds.
D. Both arpa and snap are enabled by default so
you don’t have to configure anything. A. 60
B. 90
Ans B C. 10
To assign multiple network numbers, you usually D. 30
use subinterfaces. A sample configuration follows:

5
Ans A Token-Ring, and Novell’s FDDI_802.2. Cisco uses
Novell’s RIP updates routing tables every 60 snap for
seconds, Apple’s RTMP is every 10 seconds, routers Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP.
ARP every 60 seconds, IGRP signal every 90 Cisco uses
seconds, arpa for Ethernet_II and, finally the default is
and Banyan VINES signals every 90 seconds. Novell-ether for Novell’s Ethernet_802.3.

11 In Novell’s use of RIP, there are two metrics used 14 “snap” is used by the Cisco IOS for which
to make encapsulation
routing decisions. Select the two metrics. types?
A. Ethernet_SNAP
A. Ticks. B. Token-Ring_SNAP
B. Hops C. FDDI_SNAP
C. Loops D. Novell-SNAP
D. Counts E. Novell-FDDI.

Ans:A &B Ans: A,B &C


It first uses ticks (which is about 1/18 sec.); Novell’s IPX and Cisco’s IOS name their
if there is a tie, it uses hops; if hops are equal, then protocols differently. Cisco uses sap for
it Ethernet_802.2,
uses an administratively assigned tiebreaker. Token-Ring, and Novell’s FDDI_802.2. Cisco uses
snap for
12 What is the Cisco name for the encapsulation Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP.
type used on a Cisco uses
serial interface? arpa for Ethernet_II and, finally the default is
Novell-ether for Novell’s Ethernet_802.3.
A. HDLC
B. SDLC 15”sap” is used by the Cisco IOS for which
C. SAP encapsulation
D. SNAP types?

Ans A A. Ethernet_802.2
B. Token-Ring
13 “arpa” is used by the Cisco IOS for which C. FDDI_SNAP
encapsulation D. Ethernet_802.3
types? E. FDDI_802.2

A. Ethernet_II Ans A,B &E


B. Ethernet_802.3
C. Ethernet_802.2 Novell’s IPX and Cisco’s IOS name their
D. Ethernet_SNAP protocols differently. Cisco uses sap for
Ethernet_802.2,
Ans A Token-Ring, and Novell’s FDDI_802.2. Cisco uses
Novell’s IPX and Cisco’s IOS name their snap for
protocols differently. Cisco uses sap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP.
Ethernet_802.2, Cisco uses

6
arpa for Ethernet_II and, finally the default is B. NetWare 4.11 defaults to 802.3 encapsulation
Novell-ether for Novell’s Ethernet_802.3. C. Cisco routers only work with NetWare 3.11.
D. NetWare 3.11 defaults to 802.2 encapsulation.
16 Which type of Ethernet framing is used for TCP/
IP and Ans A
AppleTalk? The default encapsulation on Cisco routers is
Novell Ethernet_802.3 and NetWare 3.12 and later
A. Ethernet 802.3 defaults to
B. Ethernet 802.2 802.2 encapsulation, 3.11 and earlier defaults to
C. Ethernet II 802.3.
D. Ethernet SNAP
19 NetWare IPX addressing uses a network number
Ans D and a node
Ethernet 802.3 is used with NetWare versions 2 number. Which statements are true?
through 3.11, Ethernet 802.2 is used with NetWare
3.12 and A. The network address is administratively assigned
later plus OSI routing, Ethernet II is used with TCP/ and can
IP and be up to 16 hexadecimal digits long.
DECnet, and Ethernet SNAP is used with TCP/IP and B. The node address is always administratively
AppleTalk. assigned.
C. The node address is usually the MAC address.
17 Which type of Ethernet framing is used for TCP/ D. If the MAC address is used as the node address,
IP and then IPX
DECnet? eliminates the use of ARP.

A. Ethernet 802.3 Ans A, C &D


B. Ethernet 802.2 The network address can be up to 16
C. Ethernet II hexadecimal digits in length. The node number is 12
D. Ethernet SNAP hexadecimal digits. The node address is usually the
MAC
Ans: C address. An example IPX address is
Ethernet 802.3 is used with NetWare versions 2 4a1d.0000.0c56.de33.
through 3.11, Ethernet 802.2 is used with NetWare The network part is 4a1d. The node part is
3.12 and 0000.0c56.de33.
later plus OSI routing, Ethernet II is used with TCP/ The network number is assigned by the system
IP and administrator
DECnet, and Ethernet SNAP is used with TCP/IP and of the Novell network.
AppleTalk.
20 Which NetWare protocol works on layer
18 You are a system administrator on a NetWare 3--network layer--of
network, you are the OSI model?
running NetWare 4.11 and you cannot communicate
with your A. IPX
router. What is the likely problem? B. NCP
C. SPX
A. NetWare 4.11 defaults to 802.2 encapsulation. D. NetBIOS

7
Ans A 23 What does the following series of commands
IPX (Internetwork Packet Exchange) is a NetWare accomplish?
network layer 3 protocol used for transferring
information router igrp 71
on LANs. network 10.0.0.0
router igrp 109
21Which NetWare protocol provides link-state network 172.68.7.0
routing?
A. It isolates networks 10.0.0.0 and 172.68.7.0.
A. NLSP B. It loads igrp for networks 109 and 71.
B. RIP C. It disables RIP.
C. SAP D. It disables all routing protocols.
D. NCP
Ans A
Ans: A It isolates network 10.0.0.0 and 172.68.7.0 and
associates autonomous systems 109 and 71 with
NetWare Link Services Protocol (NLSP) provides IGRP. IGRP
link-state routing. SAP (Service Advertisement does not disable RIP, both can be used at the same
Protocol) time.
advertises network services. NCP (NetWare Core
Protocol) 24 In the command “router igrp 109” what does
provides client-to-server connections and 109 signify?
applications. RIP
is a distance vector routing protocol. A. an autonomous system
B. any network number which the router is attached
22 As a system administrator, you want to debug to
igrp but are C. the allowable length of the routing table
worried that the “debug IP igrp transaction” D. the network socket number
command will
flood the console. What is the command that you Ans A
should The Cisco IOS global configuration command
use? “router igrp xxx” is used to configure the Interior
Gateway Routing Protocol. In this case, the 109 is
A. debug IP igrp event called the process-id , which can also be used for an
B. debug IP igrp-events autonomous system number.
C. debug IP igrp summary
D. debug IP igrp events 25 IGRP supports a feature that allows traffic to be
distributed among up to 6 (4 default) paths to
Ans D provide
The “debug IP igrp events” is used to only greater overall throughput and reliability. What is
display a summary of IGRP routing information. this
You can called?
append an IP address onto either command to see
only the A. unequal-cost load balancing
IGRP updates from a neighbor. B. equal-cost load balancing

8
C. proportionate load balancing
D. low cost load balancing A. 30
B. 10
Ans A C. 60
An unequal-cost load balancing is used to D. 90
provide alternate paths for data distribution on an
internetwork. Cisco developed this method to use Ans: A
unused or Novell’s RIP updates routing tables every 60
under utilized links to increase bandwidth and seconds, Apple’s RTMP is every 10 seconds, routers
network ARP every
availability. 60 seconds, DECnet hosts and IGRP signal every 15
seconds,
26 IGRP uses flash updates, poison reverse updates, and Banyan VINES signals every 90 seconds.
holddown
times, and split horizon. How often does it 29 An autonomous system can only exist if all
broadcast its routers in that
routing table updates? system meet which criteria?

A. 90 seconds A. interconnected
B. 10 seconds B. run the same routing protocol
C. 30 seconds C. assigned same autonomous system number
D. 45 seconds D. run IGRP only
E. run RIP only
Ans A
Ans A,B &C
27 The command “show IP protocol” displays which An autonomous system is a set of routers and
information? networks under the same administration. Each
router must be
A. routing timers interconnected, run the same routing protocol, and
B. network information assigned
C. contents of the IP routing table the same autonomous system number. The network
D. information about all known network and Information
subnetworks Center (NIC) assigns a unique autonomous system
number to
Ans A & B enterprises.

“show IP protocol” displays routing timers and 30 A default route is analogous to a


network information. “show IP route” displays the _________.
routing
table with information about all known networks A. default gateway
and B. static route
subnetworks. C. dynamic route
D. one-way route
28 When using RIP, routing updates are broadcast
every ____ Ans: A
seconds. A default route is analogous to a default

9
gateway. It is used to reduce the length of routing the privileged EXEC prompt. As part of the display,
tables you see
and to provide complete routing capabilities when “Set DF bit in IP header? [yes] :” What would
a router happen if you
might not know the routes to all other networks. answered no at the prompt.

31 Routers can learn about destinations through A. This lets the router fragment the packet.
static routes, B. It tells the router not to fragment the packet.
default, or dynamic routing. By default, a router C. This lets the router direct the packet to the
will use destination
information derived from __________. it finds in its routing table.
D. It tell the router to send the packet to the next
A. IGRP hop
B. RIP router.
C. IP
D. TCP Ans A
“Set DF bit in IP header?” is a response to an
Ans A extended ping at the router. If you answer yes (the
The quality of information is rated: default)
Connected interface 0 the router will not fragment the packet. If you
Static route 1 answer no,
IGRP 100 the router will fragment the packet.
RIP 120
Unknown 255
The lower the value, the more reliable the source 34 You have typed “ping” 172.16.101.1 and get the
with 255 following display:
signifying information that the router will ignore. Type escape sequence to abort.
So, the Sending 5, 100-byte ICMP Echoes to 172.16.101.1,
router will use IGRP, rated at 100, before RIP, rated timeout is 2 seconds:
at .!!!!
120. What does the “.” signify?
A. That one message timed out.
32 You are logged into a router, what command B. That all messages were successful.
would C. That one message was successful.
show you the IP addresses of routers connected to D. That one message completed in under the
you? allotted
timeframe.
A. show cdp neighbors detail
B. show run Ans A
C. show neighbors The possible responses from the ping command are:
D. show cdp
! Successful receipt of an echo reply.
Ans A . Timed out waiting for a reply
U Destination unreachable
33 As a system administrator, you perform an C Congestion-experienced packet
extended ping at I Ping interrupted

10
? Packet type unknown A. 6
& Packet TTL exceeded B. 1
C. 2
35 Which command, that is used to test address D. 4
configuration,
uses Time-To-Live (TTL) values to generate messages Ans A
from You can only specify six name servers in one
each router. command. The syntax is “IP name-server server-
address1 [[
A. trace server-address2 ]...server-address6]. You must also
B. ping enable
C. telnet DNS.
D. bootp
38 How would you configure one host name that
Ans: A points to two IP
The Cisco IOS EXEC command “trace [protocol] addresses?
[destination]” is used to discover routes that
packets will A. IP host jacob 1.0.0.5 2.0.0.8
travel to their destination hosts. Trace uses TTL B. IP jacob 1.0.0.5 2.0.0.8
(Time to C. IP host jacob 1.0.0.5
Live) values to report destination route information. D. IP host duplicate “all”

36 What does the command “IP name-server Ans A


255.255.255.255” The correct syntax is IP host name [
accomplish? TCP-port-number ] address [ address ]..... So, “IP
host
A. It sets the domain name lookup to be a local P1R1 1.0.0.5 2.0.0.8” is the correct choice. “IP host
broadcast. jacob
B. This is an illegal command. 1.0.0.5” only points the host name jacob to one IP
C. It disables domain name lookup. address--1.0.0.5.
D. The command is now defunct and has been
replaced by “IP 39 The following selections show the command
server-name ip any” prompt and the
configuration of the IP network mask. Which two
Ans A are
By default DNS is enabled on a router with a correct?
server address of 255.255.255.255, which provides
for a A. Router#term IP netmask-format { bitcount |
local broadcast. decimal | hexadecimal }
B. Router(config-if)#IP netmask-format { bitcount |
37 As a system administrator, you need to provide decimal | hexadecimal }
your routers C. Router(config-if)#netmask-format { bitcount |
with a Domain Name System (DNS) server. How decimal | hexadecimal }
many DNS D. Router#ip netmask-format { bitcount | decimal
servers can you specify with one command? | hexadecimal }

11
Ans A & B
Router#term IP netmask-format { bitcount | 43 You are given the following address:
decimal | hexadecimal } and Router(config-if)#IP 15.16.193.6/21.
netmask-format { bitcount | decimal | Determine the subnet mask, address class, subnet
hexadecimal } are address,
correct. You can configure the mask for the current and broadcast address.
session
and you can configure it for a specific line. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255
B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255
C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0
40 When configuring the subnet mask for an IP D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
address, which
formats can be used?A. dotted-decimal. Ans A

B. Hexadecimal 44 You have an IP host address of 201.222.5.121


C. Bit-count and a subnet
D. Octal mask of 255.255.255.248. What is the broadcast
E. Binary address?

Ans A, B &C A. 201.222.5.127


B. 201.222.5.120
41 You are given the following address: C. 201.222.5.121
153.50.6.27/25. D. 201.222.5.122
Determine the subnet mask, address class, subnet
address, Ans A
and broadcast address. The easiest way to calculate this is to subtract
255.255.255.248 (subnet mask) from
A. 255.255.255.128, B,153.50.6.0, 153.50.6.127 255.255.255.255, this
B. 255.255.255.128, C,153.50.6.0, 153.50.6.127 equals 7. Convert the address 201.222.5.121 to
C. 255.255.255.128, C,153.50.6.127, 153.50.6.0 binary--11001001 11011110 00000101 01111001.
D. 255.255.255.224, C,153.50.6.0, 153.50.6.127 Convert the
mask 255.255.255.248 to binary--11111111
Ans A 11111111 11111111
11111000. AND them together to get: 11001001
42 You are given the following address: 11011110
128.16.32.13/30. 00000101 01111000 or 201.222.5.120.
Determine the subnet mask, address class, subnet 201.222.5.120 is the
address, subnet address, add 7 to this address for
and broadcast address. 201.222.5.127 or
the broadcast address. 201.222.5.121 through
A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 201.222.5.126
B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 are the valid host addresses.
C. 255.255.255.252, B,128.16.32.15, 128.16.32.12
D. 255.255.255.248, B,128.16.32.12, 128.16.32.15 45 Given the address 172.16.2.120 and the subnet
mask of
Ans A 255.255.255.0. How many hosts are available?

12
have 14 subnets. The formula is (2 to the power of
A. 254 n)-2.
B. 510 By borrowing 4 bits, you have (2x2x2x2)-2=14. By
C. 126 borrowing
D. 16,372 5 bits, you have (2x2x2x2x2)-2=30. To get 20
subnets, you
Ans A would need to borrow 5 bits so the subnet mask
172.16.2 120 is a standard Class B address with would be
a subnet mask that allows 254 hosts. 255.255.255.248.
You are a network administrator and have been
assigned the 48 You are given the IP address of 172.16.2.160
IP address of 201.222.5.0. You need to have 20 with a subnet
subnets with mask of 255.255.0.0. What is the network address
5 hosts per subnet. The subnet mask is in binary?
255.255.255.248.
A. 10101100 00010000
46 Which addresses are valid host addresses? B. 00000010 10100000
C. 10101100 00000000
A. 201.222.5.17 D. 11100000 11110000
B. 201.222.5.18
C. 201.222.5.16 Ans: A
D. 201.222.5.19 To find the network address, convert the IP
E. 201.222.5.31 address to binary--10101100 000100000 00000010
10100000--then ANDed it with the subnet mask--
Ans A,B & D 11111111
Subnet addresses in this situation are all in 11111111 00000000 00000000. The rest is 10101100
multiples of 8. In this example, 201.222.5.16 is the 00010000
subnet, 201.22.5.31 is the broadcast address. The 00000000 00000000, which is 172.16.0.0 in
rest are decimal.
valid host IDs on subnet 201.222.5.16. The first octet rule states that the class of an address
can
47 You are a network administrator and have been be determined by the numerical value of the first
assigned the octet.
IP address of 201.222.5.0. You need to have 20
subnets with 49 Which addresses are INCORRECTLY paired with
5 hosts per subnet. What subnet mask will you use? their class?

A. 255.255.255.248 A. 128 to 191, Class B


B. 255.255.255.128 B. 192 to 223 Class B
C. 255.255.255.192 C. 128 to 191, Class C
D. 255.255.255.240 D. 192 to 223, Class C

Ans A Ans B & C


By borrowing 5 bits from the last octet, you can. Address classes are: 1 to 126, Class A; 128 to
have 30 subnets. If you borrowed only 4 bits you 191, Class B, 192 to 223, Class C; 224 to 239, Class
could only D; and

13
240 to 255, Class E. C. Class B addresses include 128.0.0.0 through
The first octet rule states that the class of an address 191.255.0.0
can D. Class C addresses include 192.0.0.0 through
be determined by the numerical value of the first 223.255.255.0
octet. E. Class D addresses include 224.0.0.0 through
239.255.255.0
50 Which addresses are INCORRECTLY paired with
their class? Ans A
Class A addresses include 1.0.0.0 through
A. 1 to 126, Class A 126.0.0.0
B. 128 to 191, Class A Class B addresses include 128.0.0.0 through
C. 1 to 126, Class B 191.255.0.0
D. 128 to 191, Class B Class C addresses include 192.0.0.0 through
223.255.255.0
Ans:B & C. Class D addresses include 224.0.0.0 through
Address classes are: 1 to 126, Class A; 128 to 239.255.255.0
191, Class B, 192 to 223, Class C; 224 to 239, Class
D; and 53 Which IP Address Class can have 16 million
240 to 255, Class E. subnets but
The first octet rule states that the class of an address support 254 hosts?
can
be determined by the numerical value of the first A. Class C
octet. B. Class A
C. Class B
51 Which addresses are INCORRECTLY paired with D. Class D
their class?
Ans A
A. 240 - 255, Class D Possible Subnets IP Address Class Possible Hosts
B. 240 - 255, Class E 254 A 16M.
C. 224 - 239, Class D 64K B 64K
D. 224 - 239, Class E 16M C 254

Ans A & D 54 Which IP Address Class can have 64,000 subnets


Address classes are: 1 to 126, Class A; 128 to with 64,000
191, Class B, 192 to 223, Class C; 224 to 239, Class hosts per subnet?
D; and
240 to 255, Class E. A. Class B
B. Class A
52 Which IP Address Class is INCORRECTLY paired C. Class C
with its range D. Class D
of network numbers?
Ans A
A. Class A addresses include 192.0.0.0 through IP Address Class
223.255.255.0 Possible Subnets Possible Hosts
B. Class A addresses include 1.0.0.0 through 254 A 16M
126.0.0.0 64K B 64K

14
16M C 254 Quench, Redirect, Echo, Echo Reply, Timestamp,
Information
55 There are two processes to pair MAC address Request, Information Reply, Address Request, and
with IP Address
addresses. Which process finds an IP address from Reply?
a MAC
address? A. ICMP
B. UDP
A. RARP C. TCP
B. ARP D. TFTP
C. RIP E. FTP
D. IGRP
Ans A
Ans A ICMP (Internet Control Message Protocol) is a
ARP (Address Resolution Protocol) maps an IP network layer internet protocol described in RFC #
address to the MAC address, RARP (Reverse Address 792.
Resolution ICMP reports IP packet information such as
Protocol) maps the MAC address to the IP address. destination
ARP and Unreachable, Time Exceeded, Parameter Problem,
RARP work at the internet layer of the Internet Source
Model or the Quench, Redirect, Echo, Echo Reply, Timestamp,
network layer of the OSI model. Information
Request, Information Reply, Address Request, and
56 When the router runs out of buffer space, this Address
is called Reply.
________.
58 Two of the protocols that can be carried in the
A. Source Quench Protocol
B. Redirect field of an IP packet are?
C. Information Request
D. Low Memory A. TCP
B. UDP
Ans A C. FTP
Source quench is the process where the D. TFTP
destination router, or end internetworking device
will Ans A & B
“quench” the date from the “source”, or the source The following are the fields in an IP segment,
router. their length, and their definitions:
This usually happens when the destination router VERS (Version number - 16 bits)
runs out of HLEN (Number of 32-bit words in the header - 4
buffer space to process packets. bits)
Type of Server (How the datagram should be
57 Which protocol carries messages such as handled - 32 bits)
destination Total Length (Total length of header and data - 32
Unreachable, Time Exceeded, Parameter Problem, bits)
Source Identification (Provide fragmentation of datagrams

15
to allow different MTUs in the internet - 6 bits)
different MTUs in the internet - 4 bits) TTL (Time-To-Live - 6 bits)
Flags (Provide fragmentation of datagrams to allow Protocol (Upperlayer protocol sending the datagram
different - 16 bits)
MTUs in the internet - 4 bits) Header Checksum )Integrity check on the header -
Frag Offset (Provide fragmentation of datagrams 16 bits)
to allow Source IP Address (32 bits)
different MTUs in the internet - 6 bits) Destination IP Address (32 bits)
TTL (Time-To-Live - 6 bits) IP Options (network testing, debugging, security
Protocol (Upperlayer protocol sending the datagram and others
- 16 bits) - 4 bits)
Header Checksum )Integrity check on the header - Data (4 bits).
16 bits)
Source IP Address (32 bits) 60 What field tells the Internet layer how to handle
Destination IP Address (32 bits) an IP packet?
IP Options (network testing, debugging, security
and others A. Type of Service
- 4 bits) B. Identification
Data (4 bits). C. Flags
D. Frag Offset
59 Where would network testing be included in an
IP packet? Ans A
The following are the fields in an IP segment,
A. IP Options field their length, and their definitions:
B. Identification field VERS (Version number - 16 bits)
C. Type of Service field HLEN (Number of 32-bit words in the header - 4
D. Reservation field bits)
Type of Server (How the datagram should be
Ans A handled - 32 bits)
The following are the fields in an IP segment, Total Length (Total length of header and data - 32
their length, and their definitions: bits)
VERS (Version number - 16 bits) Identification (Provide fragmentation of datagrams
HLEN (Number of 32-bit words in the header - 4 to allow
bits) different MTUs in the internet - 4 bits)
Type of Server (How the datagram should be Flags (Provide fragmentation of datagrams to allow
handled - 32 bits) different
Total Length (Total length of header and data - 32 MTUs in the internet - 4 bits)
bits) Frag Offset (Provide fragmentation of datagrams
Identification (Provide fragmentation of datagrams to allow
to allow different MTUs in the internet - 6 bits)
different MTUs in the internet - 4 bits) TTL (Time-To-Live - 6 bits)
Flags (Provide fragmentation of datagrams to allow Protocol (Upperlayer protocol sending the datagram
different - 16 bits)
MTUs in the internet - 4 bits) Header Checksum )Integrity check on the header -
Frag Offset (Provide fragmentation of datagrams 16 bits)
to allow Source IP Address (32 bits)

16
Destination IP Address (32 bits)
IP Options (network testing, debugging, security 62 Which processes does TCP, but not UDP, use?
and others
- 4 bits) A. Windowing
Data (4 bits). B. Acknowledgements
C. Source Port
61 Which fields of an IP packet provide for D. Destination Port
fragmentation of
datagrams to allow differing MTUs in the internet? Ans A & B
UDP (User Datagram Protocol) does not use
A. Identification sequence or acknowledgement fields in
B. Flags transmission.
C. Frag Offset
D. Type of Service UDP is a connectionless and unreliable protocol,
E. Total Length since there
is no delivery checking mechanism in the UDP data
Ans A, B & C format.
The following are the fields in an IP segment,
their length, and their definitions: 63 What is the UDP datagram format?
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 A. Source Port - 16 bits, Destination Port - 16 bits,
bits) Length
Type of Server (How the datagram should be - 16 Bits, Checksum - 16 bits, Data
handled - 32 bits) B. Destination Port - 16 bits, Source Port - 16 bits,
Total Length (Total length of header and data - 32 Length
bits) - 16 Bits, Checksum - 16 bits, Data
Identification (Provide fragmentation of datagrams C. Source Port - 16 bits, Destination Port - 16 bits,
to allow Checksum - 16 Bits, Length - 16 bits, Data
different MTUs in the internet - 4 bits) D. Source Port - 8 bits, Destination Port - 8 bits,
Flags (Provide fragmentation of datagrams to allow Length -8
different Bits, Checksum - 8 bits, Data
MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams Ans A
to allow The UDP format for a segment is as follows:
different MTUs in the internet - 6 bits) Source Port 16 bits
TTL (Time-To-Live - 6 bits) Destination Port 16 bits
Protocol (Upperlayer protocol sending the datagram Length 16 bits
- 16 bits) Checksum 16 bits
Header Checksum )Integrity check on the header - Data xx bits
16 bits)
Source IP Address (32 bits) 64 What is the function of DDR on Cisco routers?
Destination IP Address (32 bits)
IP Options (network testing, debugging, security A. DDR is dial--on-demand routing. It provides a
and others continuous LAN only connection.
- 4 bits) B. DDR is dial-on-demand routing. It provides
Data (4 bits). routing for high volume traffic.

17

You might also like