Professional Documents
Culture Documents
It 62231 PDF Free
It 62231 PDF Free
QUIZ 001
10/10
Question 1
Answer saved
Marked out of 1.00
Flag question
Question text
Question 2
Answer saved
Marked out of 1.00
Flag question
Question text
Flag question
Question text
A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Select one:
a. Automatic-forward switching
b. Cut-through switch method
c. Store-and-forward switching
d. Rapid Frame forwarding
Question 4
Answer saved
Marked out of 1.00
Flag question
Question text
The primary function of this layer is to provide network access to the user.
Select one:
a. Distribution layer
b. Core layer
c. Network layer
d. Access layer
Question 5
Answer saved
Marked out of 1.00
Flag question
Question text
Flag question
Question text
The _____ switches typically come with different sized chassis that allow for the installation
of different numbers of line card.
Select one:
a. Fixed configuration
b. Modular configuration
c. Server side configuration
d. Stackable configuration
Question 7
Answer saved
Marked out of 1.00
Flag question
Question text
Question 8
Answer saved
Marked out of 1.00
Flag question
Question text
Question 9
Answer saved
Marked out of 1.00
Flag question
Question text
Question 10
Answer saved
Marked out of 1.00
Flag question
Question text
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Select one:
a. Access layer
b. Core layer
c. Distribution layer
d. Network layer
Prelims
Question 1
Answer saved
Marked out of 1.00
Flag question
Question text
Which of the following is the command to specify a VLAN name? Name of VLAN is
employee.
Select one:
a. name employee
b. set VLAN name = employee
c. name= employee /set
d. None of the choices
Clear my choice
Question 2
Answer saved
Marked out of 1.00
Flag question
Question text
What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0)
for specific Fast Ethernet interface?
Select one:
a. ip address 192.168.10.2 255.255.0.0
b. ipconfig 192.168.10.2 255.255.0.0
c. ip 192.168.10.2 255.255.0.0
d. ipset 192.168.10.2 255.255.0.0
e. ipset config 192.168.10.2 255.255.0.0
Clear my choice
Question 3
Answer saved
Marked out of 1.00
Flag question
Question text
Flag question
Question text
Question 5
Answer saved
Marked out of 1.00
Flag question
Question text
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
Select one:
a. Config mycompany -ipdomain
b. Ip configure mycompany.com
c. Ipconfig mycompany.com
d. Ip domain-name mycompany.com
Clear my choice
Question 6
Answer saved
Marked out of 1.00
Flag question
Question text
This is the practice of inserting a VLAN ID into a packet header in order to identify which
VLAN (Virtual Local Area Network) the packet belongs to.
Select one:
a. VLAN linkage
b. VLAN insertion
c. VLAN tagging
d. VLAN building
Clear my choice
Question 7
Answer saved
Marked out of 1.00
Flag question
Question text
A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Select one:
a. Cut-through switch method
b. Store-and-forward switching
c. Automatic-forward switching
d. Rapid Frame forwarding
Clear my choice
Question 8
Answer saved
Marked out of 1.00
Flag question
Question text
This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.
Select one:
a. Internetwork Time Protocol
b. Network Time Protocol
c. Synchronize Time Protocol
d. Real Time Protocol
Clear my choice
Question 9
Answer saved
Marked out of 1.00
Flag question
Question text
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Select one:
a. Network layer
b. Distribution layer
c. Access layer
d. Core layer
Clear my choice
Question 10
Answer saved
Marked out of 1.00
Flag question
Question text
Question 11
Answer saved
Marked out of 1.00
Flag question
Question text
What is the command to create a VLAN with a valid VLAN ID number 30?
Select one:
a. set vlan id = 30
b. create vlan 30
c. vlan id =30 –set
d. vlan 30
Clear my choice
Question 12
Answer saved
Marked out of 1.00
Flag question
Question text
This is a security technology that determines which devices attached to switch ports can
respond to DHCP requests. This can be used to prevent unauthorized DHCP messages
that contain information such as IP address related data being provided to legitimate
network devices.
Select one:
a. None of the choices
b. DHCP BlockIP
c. DHCP Firewall
d. DHCP Snooping
Clear my choice
Question 13
Answer saved
Marked out of 1.00
Flag question
Question text
Flag question
Question text
Question 15
Answer saved
Marked out of 1.00
Flag question
Question text
Flag question
Question text
What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force
the clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.
Select one:
a. DHCP spoofing attack
b. DHCP phishing attack
c. DHCP backdoor attack
d. DHCP starvation attack
Clear my choice
Question 17
Answer saved
Marked out of 1.00
Flag question
Question text
A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward
compatibility with untagged traffic common to legacy LAN scenarios.
Select one:
a. Default VLAN
b. Data VLAN
c. Management VLAN
d. Native VLAN
Clear my choice
Question 18
Answer saved
Marked out of 1.00
Flag question
Question text
This attack tries to crack a password on another device. The first phase of this attack starts
with the attacker using a list of common passwords and a program designed to try to
establish a Telnet session using each word on the dictionary list.
Select one:
a. Telnet password attack
b. Brute force password attack
c. Telnet DoS attack
d. Crack password attack
Clear my choice
Question 19
Answer saved
Marked out of 1.00
Flag question
Question text
Question 20
Answer saved
Marked out of 1.00
Flag question
Question text
Question 21
Answer saved
Marked out of 1.00
Flag question
Question text
What is the command to create a VLAN with a valid VLAN ID number 30?
Select one:
a. set vlan id = 30
b. Create vlan 30
c. vlan id =30 –set
d. Vlan 30
Clear my choice
Question 22
Answer saved
Marked out of 1.00
Flag question
Question text
Question 23
Answer saved
Marked out of 1.00
Flag question
Question text
Question 24
Answer saved
Marked out of 1.00
Flag question
Question text
Question 25
Answer saved
Marked out of 1.00
Flag question
Question text
What is the command to assign the port to a particular VLAN when the interface is in
access mode?
Select one:
a. switchport access vlanvlan-id
b. assignport access vlanvlan-id
c. setport access vlanvlan-id
d. defineport access vlanvlan-id
Clear my choice
Question 26
Answer saved
Marked out of 1.00
Flag question
Question text
Question 27
Answer saved
Marked out of 1.00
Flag question
Question text
A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.
Select one:
a. Rapid Frame forwarding
b. Cut-through switch method
c. Store-and-forward switching
d. Automatic-forward switching
Clear my choice
Question 28
Answer saved
Marked out of 1.00
Flag question
Question text
True of False. VLAN IDs 1 to 1005 are automatically created. ID 1 cannot be removed while
VLAN IDs 1002 to 1005 can still be removed.
Select one:
True
False
Question 29
Answer saved
Marked out of 1.00
Flag question
Question text
What is the best practice relative to switch port modes?
Select one:
a. Use the dynamic auto or dynamic desirable switch port mode.
b. Do not use the dynamic auto or dynamic desirable.
c. Use only access switch port mode.
d. Do not use trunk switch port mode.
Clear my choice
Question 30
Answer saved
Marked out of 1.00
Flag question
Question text
Which two statements correctly describe the concepts of administrative distance and
metric? (Choose two.)
1. The metric varies depending which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher administrative distances.
3. The value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count.
Select one:
a. 1 & 2
b. 4 & 5
c. 1 & 5
d. 2 & 4