.CO.NR Free Domain KAMAL KUMAR: July 2009

Search This Blog

Wednesday, July 29, 2009

VMware

VMware Workstation 6 Advantage
No other desktop virtualization software offers the performance and capabilities of VMware Workstation. With millions of users and dozens of industry awards, only VMware Workstation offers:
• Broadest operating system support
• Best-in-class virtual machine architecture
• Most advanced feature set
• Powerful set of APIs
With VMware Workstation 6, users can create and run multiple virtual machines simultaneously on a single PC. VMware Workstation 6 supports 19 versions of Windows and 26 versions of Linux, making it an indispensable tool for IT professionals, software developers and testers, technical sales and support professionals—or anyone who needs to run multiple physical systems as virtual machines on a single desktop. Examples include:
IT Professionals
• Configure and test desktops and servers in virtual machines before deploying them to production
• Test new multi-tier applications, service packs, application updates, and OS patches on a single PC
• Host legacy applications within virtual machines, facilitating OS migrations and eliminating the need to port legacy applications
• Create a library of end-user configurations on a shared drive
Software Developers and Testers
• Develop and test applications on multiple operating systems on a single PC
• Connect virtual machines to simulate and test multi-tier systems
• Use multiple snapshots and debugging support to facilitate testing
• Archive test environments on file servers for easy sharing
Sales, Marketing and Training
• Demo or multi-tier configurations on a single laptop in a repeatable,
reliable manner
• Package and deploy classroom materials in virtual machines
• Allow students to experiment with multiple operating systems, applications and tools in secure, isolated virtual machines
• Configure virtual machines to “undo” all changes at shutdown




Sunday, July 26, 2009

VIRTUALIZATION


VIRTUALIZATION

--Virtualization is the process of implementing multiple operating systems on the same set of physical hardware to better utilize the hardware. Companies with strong plans to implement virtualized computing environments look to gain many benefits, including easier systems management, increased server utilization, and reduced datacenter overhead. Traditional IT management has incorporated a one-to-one relationship between the physical servers implemented and the roles they play on the network. When a new database is to be implemented, we call our hardware vendor of choice and order a new server with specifications to meet the needs of the database. Days later we may order yet another server to play the role of a file server. This process of ordering servers to fill the needs of new network services is oftentimes consuming and unnecessary given the existing hardware in the datacenter. To ensure stronger security, we separate services across hosts to facilitate the process of hardening the operating system. We have learned over time that the fewer the functions performed by a server, the fewer the services that are required to be installed, and, in turn, the easier it is to lock down the host to mitigate vulnerabilities. The byproduct of this separation of services has been the exponential growth of our datacenters into large numbers of racks filled with servers, which in most cases are barely using the hardware within them.

Virtualization involves the installation of software commonly called a hypervisor. The hypervisor is the virtualization layer that allows multiple operating systems to run on top of the same set of physical hardware. Virtual machines that run on top of the hypervisor can run almost any operating system, including the most common Windows and Linux operating systems found today as well as legacy operating systems from the past.

By virtualizing servers into virtual machines running on a hypervisor, we can better use our processors while reducing rack space needs and power consumption in the datacenter. Depending on the product used to virtualize a server environment, there are many more benefits to virtualization. Think of the struggles IT professionals have had throughout the years and you’ll gain a terrific insight into why virtualization has become such a popular solution. The simple process of moving a server from a datacenter in Tampa, Florida, to a datacenter in Atlanta, Georgia, is a good example of a common pain point for IT pros. The overhead of removing an 80-pound server from a rack, boxing it, shipping it, unboxing it, and placing it back into another rack is enough to make you want to virtualize. With virtual machines this same relocation process can be reduced to simply copying a directory to an external media device, shipping the external media device, and copying the directory back to another ESX implementation. Other methods, such as virtual machine replication and full and delta images of virtual machines, can be taken with third-party tools.

Virtualization is an abstraction layer that breaks the standard paradigm of computer architecture, decoupling the operating system from the physical hardware platform and the applications that run on it. As a result, IT organizations can achieve greater IT resource utilization and flexibility. Virtualization allows multiple virtual machines, often with heterogeneous operating systems, to run in isolation, side-by-side, on the same physical machine. Each virtual machine has its own set of virtual hardware (CPU, memory, network interfaces, and disk storage) upon which an operating system and applications are loaded. The operating system sees the set of hardware and is unaware of the sharing nature with other guest operating systems running on the same physical hardware platform.

Virtualization technology and its core components, such as the Virtual Machine Monitor, manage the interaction with the operating system calls to the virtual hardware and the actual execution that takes place on the underlying physical hardware.

Virtualization was first introduced in the 1960s to allow partitioning of large, mainframe hardware, a scarce and expensive resource. Over time, minicomputers and PCs provided a more efficient, affordable way to distribute processing power. By the 1980s, virtualization was no longer widely employed.

However, in the 1990s, researchers began to see how virtualization could solve some of the problems associated with the proliferation of less expensive hardware, including underutilization, escalating management costs, and vulnerability.

Today, virtualization is growing as a core technology in the forefront of data center management. The technology is helping businesses, both large and small, solve their problems with scalability, security, and management of their global IT infrastructure while effectively containing, if not reducing, costs.

Virtualization history ?

Virtualization technologies have been around since the 1960s. Beginning with the Atlas and M44/44X projects, the concept of time-sharing and virtual memory was introduced to the computing world.

Funded by large research centers and system manufacturers, early virtualization technology was only available to those with sufficient resources and clout to fund the purchase of the big-iron equipment.

As time-sharing evolved, IBM developed the roots and early architecture of the virtual machine monitor, or VMM. Many of the features and design elements of the System370 and its succeeding iterations are still found in modern-day virtualization technologies.

After a short quiet period when the computing world took its eyes off of virtualization, a resurgent emphasis began again in the mid-1990s, putting virtualization back into the limelight as an effective means to gain high returns on a company’s investment.

Why Virtualize?

Virtualization offers many significant benefits, including server consolidation, rapid server provisioning, new options in disaster recovery, and better opportunities to maintain service-level

agreements (SLAs), to name a few. Perhaps the most common reason is server consolidation.

Most servers in a datacenter are performing at less than 10 percent CPU utilization. This leaves an overwhelming amount of processing power available but not accessible because of the separation of services. As virtualization technology transitioned from the mainframe world to midrange and entry-level hardware platforms and the operating systems that they ran, there was a shift from having either a decentralized or a centralized computing model to having a hybrid of the two. Large computers could now be partitioned into smaller units, giving all of the benefits of logical decentralization while taking advantage of a physical centralization. While there are many benefits that companies will realize as they adopt and implement virtualization solutions, the most prominent ones are consolidation of their proliferating sprawl of servers, increased reliability of computing platforms upon which their important business applications run, and greater security through isolation and fault containment.

How Does Virtualization Work?

The operating system and the CPU architecture historically have been bound and mated one to the other. This inherent relationship is exemplified by secure and stable computing platforms that segregate various levels of privilege and priority through rings of isolation and access, the most critical being Ring-0. The most common CPU architecture, the IA-32 or x86 architecture, follows a similar privileged model containing four rings, 0 to 4. Operating systems that run on x86 platforms are installed in Ring-0, called Supervisor Mode, while applications execute in Ring-3, called User Mode.

The Virtual Machine Monitor (VMM) presents the virtual or perceived Ring-0 for guest operating systems, enabling isolation from each platform. Each VMM meets a set of conditions referred to as the Popek and Goldberg Requirements, written in 1974. Though composed for third-generation computers of that time, the requirements are general enough to apply to modern VMM implementations. While striving to hold true to the Popek and Goldberg requirements, developers of VMMs for the x86 architecture face several challenges due in part to the non-virtualizable instructions in the IA-32 ISA. Because of those challenges, the x86 architecture cannot be virtualized in the purest form; however, x86 VMMs are close enough that they can be considered to be true to the requirements.

Types of Virtualization

Server Virtualization is the most common form of virtualization, and the original. Managed by the VMM, physical server resources are used to provision multiple virtual machines, each presented with its own isolated and independent hardware set. Of the top three forms of virtualization are full virtualization, paravirtualization, and operating system virtualization.

An additional form, called native virtualization, is gaining in popularity and blends the best of full virtualization and paravirtualization along with hardware acceleration logic. Other areas have and continue to experience benefits of virtualization, including storage, network, and application technologies.

Common Use Cases for Virtualization

A technology refresh of older, aging equipment is an opportune time to consider implementing a virtual infrastructure, consolidating workloads and easing migrations through virtualization technologies. Business can reduce recovery facility costs by incorporating the benefits of virtualization into the BCP and DR architectures. Virtualization also gives greater levels of flexibility and allows IT organizations to achieve on-demand service levels. This is evident with easily deployed proof-of-concept, pilot, or mock environments with virtually no overhead to facilitate or manage it. The benefits of virtualization can be driven beyond the walls of the data center to the desktop. Desktop virtualization can help organizations reduce costs while maintaining control of their client environment and providing additional layers of security at no additional cost.

Virtualization is, and has been, at home in the software development life cycle. Such technologies help streamline development, testing, and release management and processes while increasing productivity and shortening the window of time from design to market.


Saturday, July 25, 2009

ipaddressing

1. Which address represents a unicast address?

A. 224.1.5.2
B. FFFF. FFFF. FFFF.
C. 192.168.24.59/30
D. 255.255.255.255
E. 172.31.128.255/18

Answer: E

2. If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which
this host belongs?

A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18

3. You have the binary number 10011101. Convert it to its decimal and hexadecimal equivalents. (Select
two answer choices)

A. 158
B. 0x9D
C. 156
D. 157
E. 0x19
F. 0x9F

Answer: B, D



4. Which one of the binary number ranges shown below corresponds to the value of the first octet in Class B
address range?

A. 10000000-11101111
B. 11000000-11101111
C. 10000000-10111111
D. 10000000-11111111
E. 11000000-10111111

Answer: C




5. The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of
this NIC card, expressed as a binary number?

A. 11001100-00111111-00011000
B. 11000110-11000000-00011111
C. 11001110-00011111-01100000
D. 11001001-00111111-00110010
E. 11001100-01111000-00011000
F. 11111000-01100111-00011001

Answer: D

6. How do you express the binary number 10110011 in decimal form?

A. 91
B. 155
C. 179
D. 180
E. 201
F. 227

Answer: C

7. Which two of the addresses below are available for host addresses on the subnet 192.168.15.19/28? (Select
two answer choices)

A. 192.168.15.17
B. 192.168.15.14
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31
F. None of the above

Answer: A, C





8. The TestKing network was assigned the Class C network 199.166.131.0 from the ISP. If the
administrator at TestKing were to subnet this class C network using the 255.255.255.224 subnet mask,
how may hosts will they be able to support on each subnet?

A. 14
B. 16
C. 30
D. 32
E. 62
F. 64

Answer: C

9. What is the subnet for the host IP address 172.16.210.0/22?

A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0
F. None of the above

Answer: C

10. What is the subnet for the host IP address 201.100.5.68/28?

A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1

Answer: C

11. 3 addresses are shown in binary form below:

A. 01100100.00001010.11101011.00100111
B. 10101100.00010010.10011110.00001111
C. 11000000.10100111.10110010.01000101
Regarding these three binary addresses,which statement below are correct.(choose any three).

A. Address C is a public Class C address.
B. Address C is a private Class C address.
C. Address B is a public Class B address.
D. Address A is a public Class A address.
E. Address B is a private Class B address.
F. Address A is a private Class A address.

Answer: A, D, E




12. Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while
accommodating the maximum number of subnets. Which mask would you use?

A. 255.255.0.0.
B. 255.255.128.0.
C. 255.255.224.0.
D. 255.255.254.0.

Answer:D

13. Using a subnet mask of 255.255.255.224, which of the IP addresses below can you assign to the hosts on
this subnet? (Select all that apply)

A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192

Answer: C, D, E


14. The IP network 210.106.14.0 is subnetted using a /24 mask. How many usable networks and host
addresses can be obtained from this?

A. 1 network with 254 hosts
B. 4 networks with 128 hosts
C. 2 networks with 24 hosts
D. 6 networks with 64 hosts
E. 8 networks with 36 hosts

Answer: A

15. Given that you have a class B IP address network range, which of the subnet masks below will allow for
100 subnets with 500 usable host addresses per subnet?

A. 255.255.0.0
B. 255.255.224.0
C. 255.255.254.0
D. 255.255.255.0
E. 255.255.255.224

Answer: C





16. The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network
exists using this subnet mask?

A. 4 networks with 64 hosts
B. 64 networks and 4 hosts
C. 2 networks and 62 hosts
D. 62 networks and 2 hosts
E. 6 network and 30 hosts

Answer: C

17. You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this
network? (Select all valid answers)

A. There are 254 usable subnets.
B. There are 256 usable hosts per subnet.
C. There are 50 usable subnets.
D. There are 254 usable hosts per subnet.
E. There are 24 usable hosts per subnet.
F. There is one usable network.

Answer: A, D



18. Your ISP assigned you a full class B address space. From this, you need at least 300 sub-networks that
can support at least 50 hosts each. Which of the subnet masks below are capable of satisfying your needs?
(Select two).

A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0

Answer: B, E


19. You've been assigned the CIDR (classless inter domain routing) block of 115.64.4.0/22 from your ISP.
Which of the IP addresses below can you use for a host? (Select all valid answers)

A. 115.64.8.32
B. 115.64.7.64
C. 115.64.6.255
D. 115.64.3.255
E. 115.64.5.128
F. 115.64.12.128

Answer: B, C, E

20. You have a single Class C IP address and a point-to-point serial link that you want to implement VLSM
on. Which subnet mask is the most efficient?

A. 255.255.255.0
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

Answer: D

21. You have a network that supports VLSM and you need to reduce IP address waste in your point to point
WAN links. Which of the masks below would you use?

A. /38
B. /30
C. /27
D. /23
E. /18
F. /32

Answer:B

22. Which of the following IP addresses is a private IP address? Select all that apply.

A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.42.34

Answer: C, E

23. What is the subnetwork address for a host with the IP address 201.100.5.68/28?

A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1

Answer: C

24. Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? Select three

A. 115.54.8.32
B. 115.54.7.64
C. 115.54.6.255
D. 115.54.3.32
E. 115.54.5.128
F. 115.54.12.128

Answer: B, C, E




25. In network that support VLSM, which network mask should be used for point-to-point WAN links in
orderto reduce waste of IP addresses?

A. /24
B. /30
C. /27
D. /26
E. /32

Answer: B

26. The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses
can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?
(Choose three)

A. 172.25.78.243
B. 172.25.98.16
C. 172.25.72.0
D. 172.25.94.255
E. 172.25.96.17
F. 172.25.100.16

Answer: A, C, D

TCPIP

1.You are a network technician at RJP. RJP has a larger 172.12.0.0 network that you want to divide into subnets. You want each subnet to support 459 hosts. You also want to provide the maximum number of subnets. Which network mask should you use?

A. 255.255.0.0
B. 255.255.128.0
C. 255.255.224.0
D. 255.255.254.0

Answer: D

Explanation:

To obtain 459 hosts the number of host bits will be 9. This can support a maximum of 510 hosts. To keep 9 bits for hosts means the last bit in the 3rd octet will be 0. This gives 255.255.254.0 as the subnet mask.

2.Your new junior RJP trainee, Rutger, has a problem with basic binary math. He must convert the binary number 10011101 into its decimal and hexadecimal equivalent. Which two numbers must Rutger provide? (Select two options)

A. 158
B. 0x9D
C. 156
D. 157
E. 0x19
F. 0x9F

Answer: B, D

Explanation:

10011101 = 157

0x9D is ASCII Hexadecimal = 157

3.You are a network administrator at RJP. You must configure a new subnetwork at the RJP branch office in Berlin. You have been provided with the subnet mask of 255.255.255.224. You want to assign IP addresses to hosts on the subnet. Which of the following IP addresses would you use? (Choose all that apply.)

A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192

Answer: C,D,E

Explanation:

C: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)
D: Valid Host in subnetwork 1 (134.178.18.32 to 134.178.18.63)
E: Valid Host in subnetwork 2 (192.168.16.64 to 192.168.16.95)

4.You are a network technician at RJP. You have subnetted the 210.106.14.0 network with a /24 mask. Your supervisor asks you how many usable subnetworks and usable host addresses per subnet this would make provision for.What would your response be?

A. 1 network with 254 hosts
B. 4 networks with 128 hosts
C. 2 networks with 24 hosts
D. 6 networks with 64 hosts
E. 8 networks with 36 hosts

Answer: A

Explanation:

A subnet with 24 bits on would be 255.255.255.0. This subnet has only 1 network and 254 hosts.

5.You are a network technician at RJP. You use a Cisco router to divide the RJP network into two separate segments, RJP1 and RJP2. The RJP CEO is concerned about the cost, and wants to know what the purpose of your action is. What should you tell him?

A. It decreases the number of broadcast domains.
B. It makes broadcasting domains more efficient between segments.
C. It increases the number of collisions.
D. It prevents segment 1’s broadcasts from getting to segment 2.
E. It connects segment 1’s broadcasts to segment 2.

Answer: D

Explanation
A router does not forward broadcast traffic. It therefore breaks up a . network portion, leaving 8 for hosts. The 2n - 2 formula (28 - 2 in this case) gives us 254 networks and 254 hosts per network.

6.You are a network technician at RJP, Inc. Your trainee wants to know which of the following is the range of binary values for the first octet in Class B addresses. What would your response be?

A. 10000000-11101111
B. 11000000-11101111
C. 10000000-10111111
D. 10000000-11111111
E. 11000000-10111111

Answer: C

Explanation

Class B addresses are in the range 128.0.0.0 through 191.255.255.255. In binary, the first octet (128 through 191) equates to 10000000-10111111

7.Which of the following is the binary equivalent of the decimal number 231?

A. 11011011
B. 11110011
C. 11100111
D. 11111001
E. 11010011

Answer: C

Explanation

Decimal number 231 equates to 11100111 in binary (128+64+32+0+0+4+2+1)

8.Which of the following addresses is representative of a unicast address?

A. 172.31.128.255./18
B. 255.255.255.255
C. 192.168.24.59/30
D. FFFF.FFFF.FFFF
E. 224.1.5.2

Answer: A

9.When dealing with point-to-point networks, which address are OSPF hello packets addressed to?

A. 127.0.0.1
B. 192.168.0.5
C. 223.0.0.1
D. 172.16.0.1
E. 224.0.0.5
F. 254.255.255.255.255

Answer: E

10.Consider the address 192.168.15.19/28, which of the following addresses are valid host addresses on this subnet? (Select two options.)

A. 192.168.15.17
B. 192.168.15.0
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31

Answer: A, C

11.Study the Exhibit below carefully:


A. 01100100.00001010.11101011.00100111


B. 10101100.00010010.10011110.00001111


C. 11000000.10100111.10110010.01000101


Which of the following statements regarding the IP addresses as illustrated in the exhibit above, are true? (Select three options.)

A. Address C is a public Class C address.
B. Address C is an exclusive Class C address.
C. Address B is a public Class B address.
D. Address A is a public Class A address.
E. Address B is a private Class B address.
F. Address A is an exclusive Class A address.

Answer: A, C, D

12.Your company has been assigned the following IP address for its network: 199.141.27.0 Of subnet mask of 255.255.255.240 was selected to make provision for the LAN design. Which of the following addresses can be assigned to hosts on the resulting subnets? (Select three options.)

A. 199.141.27.126
B. 199.141.27.175
C. 199.141.27.33
D. 199.141.27.119
E. 199.141.27.208
F. 199.141.27.112

Answer: A, C, D

13.You work as a network administrator for RJP.com. You must design an IP addressing scheme to support the company’s network that will provide for a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Which of the following subnet masks will enable you to support an appropriate addressing scheme given the fact that you work with only one Class B address. (Select two options.)

A. 255.255.255.0
B. 255.255.255.192
C. 255.255.248.0
D. 255.255.252.0
E. 255.255.255.128
F. 255.255.255.224

Answer: B, E

14.Which of the following network masks would you use to reduce any wastage of IP addresses in point-topoint WAN links on a network that supports VLSM?

A. /38
B. /30
C. /27
D. /23
E. /18

Answer: B

15.You are a trainee technician at RJP. Your instructor wants you to convert the first octet in Class B address range to binary.

What would your reply be?

A. 00000111-10001111
B. 00000011-10011111
C. 10000000-10111111
D. 11000000-11011111
E. 11100000-11101111

Answer: C

16.You are the network administrator at RJP. Your newly appointed RJP trainee wants to know which protocol uses both tcp and udp ports. What will your reply be?

A. FTP
B. TFTP
C. SMTP
D. Telnet
E. DNS

Answer: E

17.You are the network administrator at RJP. Your need to design an IP addressing scheme to support a nationwide network. RJP needs a minimum of 300 sub-networks, each of which must support a maximum of 50 host addresses. RJP has been assigned a Class B address by its ISP. Which of the following subnet masks will support the appropriate addressing scheme? (Choose two.)

A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0

Answer: B, E

18.You are the newly appointed RJP trainee. Your supervisor tells you that the IP address for your workstation is 172.16.209.10/22. He wants to know what the subnetwork number of your workstation is.

What will your reply be?

A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0

Answer: C

19.RJP has been assigned the CIDR block of 115.64.4.0/22 for its public network. Which of the following IP addresses can RJP use on its public network?

A. 115.64.8.32
B. 115.64.7.64
C. 115.64.6.255
D. 115.64.3.255
E. 115.64.5.128
F. 115.64.12.128

Answer: B, C, E

20.which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248

Answer: C

21.Which of the following bit patterns is for a Class B address?

A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx

Answer: B

OSI MODEL 7 LAYER

1. Put the following in the correct order, from high to low: session (a), presentation (b),physical (c), data link (d), network (e), application (f), transport (g).

A. c, d, e, g, a, b, f

B. f, a, b, g, d, e, c

C. f, b, g, a, e, d, c

D. f, b, a, g, e, d, c

Answer: D

2. Which of the following standards or protocols are used by the session layer?

A. JPEG

B. NFS

C. TCP

D. Ethernet

Answer: B

3. The _________ layer provides for hardware addressing.

A. Transport

B. Network

C. Data link

D. Physical

Answer: C

4. MAC addresses are _________ bits in length and are represented in a ___________ format.

A. 16, Binary

b. 32, divided into 4 octet binary

c. 48, Hexadecimal

d. 24, binary

Answer: c

5. CSMA/CD stands for ________.

A. Collision Sense Multiple Access/Carrier Detection

B. Carrier Sense Multiple Access/Collision Detection

C. Collision Sense Media Access/Carrier Detection

D. Carrier Sense Media Access/Collision Detection

Answer: B

6. Ethernet ________ uses a type field.

A. II

B. 802.3

C. 802.2

Answer: A

7. Which component of the data link layer for IEEE specifies network protocols?

A. LLC

B. MAC

C. 802.5

D. 802.3

Answer: A

8. The network layer solves all of the following problems except ___________.

A. Broadcast problems

B. Conversion between media types

C. Hierarchy through the use of physical addresses

D. Collision problems

Answer: C

9. If a router has a packet it needs to route, and it can’t find the destination network number in the routing table, the router ________ the packet.

A. Drops

B. Floods

Answer: A

10. ________ are used to provide a reliable connection.

A. Ready/not ready signals

B. Sequence numbers and acknowledgments

C. Windows

D. Ready/not ready signals and windowing

Answer: B

11. Connection multiplexing is done through the use of a ________ number.

A. Socket

B. Hardware

C. Network

D. Session

Answer: A

12. Reliable connections go through a three-way handshake. Place the following in the correct

order: ACK (1), SYN, (2), SYN/ACK (3).

A. 2, 1, 3

B. 3, 2, 1

C. 2, 3, 1

D. 1, 2, 3

Answer: C

13. The network layer transmits _________ PDUs.

A. Datagram

B. Segment

C. Bits

D. Frame

Answer: A

14. The ________ layer uses high-speed switches to provide high-speed connections.

A. Core

B. Access

C. Distribution

Answer: A

15. The ________ layer contains broadcasts.

A. Core

B. Access

C. Distribution

Answer: C

16. Which of the following best defines standards?

a. A set of rules or procedures that are either widely used or officially specified
b. A connection of computers, printers, and other devices for purposes of communication
c. A set of rules that govern how computer workstations exchange information
d. A device connected to a computer to provide auxiliary functions

Answer: a

17. What is the OSI model?

a. A conceptual framework that specifies how information travels through networks
b. A model that describes how data makes its way from one application program to another through a network
c. A conceptual framework that specifies which network functions occur at each layer
d. All of the above

Answer: d

18. As described by the OSI model, how does data move across a network?

a. Directly from each layer at one computer to the corresponding layers at another computer
b. Through wires connecting each layer from computer to computer
c. Down through the layers at one computer and up through the layers at another
d. Through layers in wires between computers

Answer: c

19. Which best defines the function of the lower layers (called the media layers) of the OSI model?

a. Provide for the accurate delivery of data between computers
b. Convert data into the 1s and 0s that a computer understands
c. Receive data from peripheral devices
d. Control the physical delivery of messages over the network

Answer: d

20. Which of the following describes the host layers of the OSI model?

a. Control the physical delivery of messages over the network
b. Make up the lower layers in the OSI model
c. Contain data that is more like 1s and 0s than like human language
d. Provide for accurate delivery of data between computers

Answer: d

21. Which of the following best describes the purpose of the physical layer?

a. Defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the link between end systems
b. Provides reliable transit of data across a physical link
c. Provides connectivity and path selection between two end systems
d. Establishes, manages, and terminates sessions between applications and manages data exchange between presentation layer entities

Answer: a

22. Which layer of the OSI model is concerned with physical addressing,network topology, line discipline, error notification, ordered delivery of frames, and flow control?

a. Physical layer
b. Data link layer
c. Transport layer
d. Network layer

Answer: b

23. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?

a. Physical layer
b. Data link layer
c. Network layer
d. Transport layer

Answer: c

24. Which layer of the OSI model is responsible for reliable network communication between end nodes and provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recovery, and information flow control?

a. Physical layer
b. Data link layer
c. Network layer
d. Transport layer

Answer:d

25. Which layer of the OSI model establishes, manages, and terminates sessions between applications and manages data exchange between presentation layer entities?

a. Transport layer
b. Session layer
c. Presentation layer
d. Application layer

Answer: b

26. Which layer of the OSI model ensures that information sent by the application layer of one system will be readable by the application layer of another system, is concerned with the data structures used by programs, and negotiates data transfer syntax for the application layer?

a. Transport layer
b. Session layer
c. Presentation layer
d. Application layer

Answer: c

27. Which layer of the OSI model identifies and establishes the availability of intended communication partners, synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity?

a. Transport layer
b. Session layer
c. Presentation layer
d. Application layer

Answer: d

28. Which of the following best defines encapsulation?

a. Segmenting data so that it flows uninterrupted through the network
b. Compressing data so that it moves faster
c. Moving data in groups so that it stays together
d. Wrapping of data in a particular protocol header

Answer: d

29. What analogy might be used to describe encapsulation?

a. Encapsulation is like a blueprint for building a car.
b. Encapsulation is like sending a package through the mail.
c. Encapsulation is like building a fence around your backyard.
d. Encapsulation is like driving a car to the store to buy groceries.

Answer: b

30. What is a data packet?

a. Logically grouped units of information
b. Transmission devices
c. Auxiliary function provided by peripherals
d. Virtual circuits

Answer: a

IP ADDRESSING

1. Which address represents a unicast address?

A. 224.1.5.2
B. FFFF. FFFF. FFFF.
C. 192.168.24.59/30
D. 255.255.255.255
E. 172.31.128.255/18

Answer: E

2. If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which
this host belongs?

A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18

Answer: D

3. You have the binary number 10011101. Convert it to its decimal and hexadecimal equivalents. (Select
two answer choices)

A. 158
B. 0x9D
C. 156
D. 157
E. 0x19
F. 0x9F

Answer: B, D

4. The subnet mask on the serial interface of a router is expressed in binary as 11111000 for the last octet.
How do you express the binary number 11111000 in decimal?
A. 210
B. 224
C. 240
D. 248
E. 252

Answer: D

5. Which one of the binary number ranges shown below corresponds to the value of the first octet in Class B
address range?

A. 10000000-11101111
B. 11000000-11101111
C. 10000000-10111111
D. 10000000-11111111
E. 11000000-10111111

Answer: C

6. How would the number 231 be expressed as a binary number?

A. 11011011
B. 11110011
C. 11100111
D. 11111001
E. 11010011

Answer: C

7. How would the number 172 be expressed in binary form?

A. 10010010
B. 10011001
C. 10101100
D. 10101110

Answer: C

8. The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of
this NIC card, expressed as a binary number?

A. 11001100-00111111-00011000
B. 11000110-11000000-00011111
C. 11001110-00011111-01100000
D. 11001001-00111111-00110010
E. 11001100-01111000-00011000
F. 11111000-01100111-00011001

Answer: D

9. How do you express the binary number 10110011 in decimal form?

A. 91
B. 155
C. 179
D. 180
E. 201
F. 227

Answer: C

10. Which two of the addresses below are available for host addresses on the subnet 192.168.15.19/28? (Select
two answer choices)

A. 192.168.15.17
B. 192.168.15.14
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31
F. None of the above

Answer: A, C

11. You have a Class C network, and you need ten subnets. You wish to have as many addresses available for
hosts as possible. Which one of the following subnet masks should you use?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. None of the above

Answer: C

12. How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class
C network?

A. 30 networks and 6 hosts.
B. 6 networks and 30 hosts.
C. 8 networks and 32 hosts.
D. 32 networks and 18 hosts.
E. 14 networks and 14 hosts.
F. None of the above

Answer: E

13. The TestKing network was assigned the Class C network 199.166.131.0 from the ISP. If the
administrator at TestKing were to subnet this class C network using the 255.255.255.224 subnet mask,
how may hosts will they be able to support on each subnet?

A. 14
B. 16
C. 30
D. 32
E. 62
F. 64

Answer: C

14. What is the subnet for the host IP address 172.16.210.0/22?

A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0
F. None of the above

Answer: C

15. What is the subnet for the host IP address 201.100.5.68/28?

A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1

Answer: C

16. 3 addresses are shown in binary form below:

A. 01100100.00001010.11101011.00100111
B. 10101100.00010010.10011110.00001111
C. 11000000.10100111.10110010.01000101
Regarding these three binary addresses,which statement below are correct.(choose any three).

A. Address C is a public Class C address.
B. Address C is a private Class C address.
C. Address B is a public Class B address.
D. Address A is a public Class A address.
E. Address B is a private Class B address.
F. Address A is a private Class A address.

Answer: 1,4, 5

17. What is the IP address range for the first octet in a class B address, in binary form?

A. 00000111-10001111
B. 00000011-10011111
C. 10000000-10111111
D. 11000000-11011111
E. 11100000-11101111
F. None of the above

Answer: C

18. Which one of the binary bit patterns below denotes a Class B address?

A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E.11110xxx

Answer: B

19. Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while
accommodating the maximum number of subnets. Which mask would you use?

A. 255.255.0.0.
B. 255.255.128.0.
C. 255.255.224.0.
D. 255.255.254.0.

Answer:D

20. Using a subnet mask of 255.255.255.224, which of the IP addresses below can you assign to the hosts on
this subnet? (Select all that apply)

A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192

Answer: C, D, E

21. Your ISP has assigned you the following IP address and subnet mask:

IP address: 199.141.27.0
Subnet mask: 255.255.255.240
Which of the following addresses can be allocated to hosts on the resulting subnet? (Select all that apply)

A. 199.141.27.2
B. 199.141.27.175
C. 199.141.27.13
D. 199.141.27.11
E. 199.141.27.208
F. 199.141.27.112

Answer: A, C, D

22. The IP network 210.106.14.0 is subnetted using a /24 mask. How many usable networks and host
addresses can be obtained from this?

A. 1 network with 254 hosts
B. 4 networks with 128 hosts
C. 2 networks with 24 hosts
D. 6 networks with 64 hosts
E. 8 networks with 36 hosts

Answer: A

23. Given that you have a class B IP address network range, which of the subnet masks below will allow for
100 subnets with 500 usable host addresses per subnet?

A. 255.255.0.0
B. 255.255.224.0
C. 255.255.254.0
D. 255.255.255.0
E. 255.255.255.224

Answer: C

24. You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a
minimum of 18 hosts each. Which of the following network masks should you use?

A. 225.225.224.0.
B. 225.225.240.0.
C. 225.225.255.0.
D. 255.255.255.224
E. 225.225.255.240

Answer: D

25. The 213.115.77.0 network was subnetted using a /28 subnet mask. How many usable subnets and host
addresses per subnet were created as a result of this?

A. 2 networks with 62 hosts
B. 6 networks with 30 hosts
C. 16 networks and 16 hosts
D. 62 networks and 2 hosts
E. 14 networks and 14 hosts
F. None of the above

Answer: E

26. The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network
exists using this subnet mask?

A. 4 networks with 64 hosts
B. 64 networks and 4 hosts
C. 2 networks and 62 hosts
D. 62 networks and 2 hosts
E. 6 network and 30 hosts

Answer: C

27. You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this
network? (Select all valid answers)

A. There are 254 usable subnets.
B. There are 256 usable hosts per subnet.
C. There are 50 usable subnets.
D. There are 254 usable hosts per subnet.
E. There are 24 usable hosts per subnet.
F. There is one usable network.

Answer: A, D

28. How many usable IP addresses can you get from a conventional Class C address?

A. 128
B. 192
C. 254
D. 256
E. 510

Answer: C

29. Your ISP assigned you a full class B address space. From this, you need at least 300 sub-networks that
can support at least 50 hosts each. Which of the subnet masks below are capable of satisfying your needs?
(Select two).

A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0

Answer: B, E

30. Your work PC has the IP address 172.16.209.10 /22. What is the subnet of this address?

A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0

Answer: C

31. You've been assigned the CIDR (classless inter domain routing) block of 115.64.4.0/22 from your ISP.
Which of the IP addresses below can you use for a host? (Select all valid answers)

A. 115.64.8.32
B. 115.64.7.64
C. 115.64.6.255
D. 115.64.3.255
E. 115.64.5.128
F. 115.64.12.128

Answer: B, C, E

32. You have a single Class C IP address and a point-to-point serial link that you want to implement VLSM
on. Which subnet mask is the most efficient?

A. 255.255.255.0
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

Answer: D

33. You have a network that supports VLSM and you need to reduce IP address waste in your point to point
WAN links. Which of the masks below would you use?

A. /38
B. /30
C. /27
D. /23
E. /18
F. /32

Answer:B

34. How would you express the binary number: 10101010 in its decimal and hexadecimal forms?

A. Decimal=160, hexadecimal=00
B. Decimal=170, hexadecimal=AA
C. Decimal=180, hexadecimal=BB
D. Decimal=190, hexadecimal=CC

Answer: B

35. Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used
for all of the networks? (Choose all that apply.)

A. 15.234.118.63
B. 83.121.178.93
C. 134.178.18.56
D. 192.168.19.37
E. 201.45.116.159
F. 217.63.12.192

Answer: B, C, D

36. You are the network administrator at TestKing. TestKing has been provided with the network address
165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and
how many hosts can be supported on each subnet.
What would your reply be? (Choose all that apply)

A. One network with 254 hosts.
B. 254 networks with 254 hosts per network.
C. 65,534 networks with 255 hosts per network.
D. 30 networks with 64 hosts per network.
E. 254 networks with 65,534 per network.

Answer: A

37. You are the network administrator at TestKing. TestKing has been assigned the class C IP address
189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224
subnet mask, how many hosts can be supported on each network?

A. 14
B. 16
C. 30
D. 32
E. 62
F. 64

Answer:C

38. Which of the following are true regarding a network using a subnet mask of 255.255.248.0? (Choose
three)

A. It corresponds to a Class A address with 13 bits borrowed.
B. It corresponds to a Class B address with 4 bits borrowed.
C. The network address of the last subnet will have 248 in the 3rd octet.
D. The first 21 bits make the host portion of the address.
E. This subnet mask allows for 16 total subnets to be created.
F. The subnetwork numbers will be in multiples of 8.

Answer: A, C, F

39. Which of the following IP addresses is a private IP address? Select all that apply.

A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.42.34

Answer: C, E

40. What is the subnetwork address for a host with the IP address 201.100.5.68/28?

A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1

Answer: C

41. Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? Select three

A. 115.54.8.32
B. 115.54.7.64
C. 115.54.6.255
D. 115.54.3.32
E. 115.54.5.128
F. 115.54.12.128

Answer: B, C, E

42. If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum
number of hosts allowed on this subnet?

A. 1024
B. 2046
C. 4094
D. 4096
E. 8190

Answer: C

43. You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing
wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet
must support at least 24 hosts.
Which network mask should you use?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
F. 255.255.255.254

Answer: B

44. Your TestKing trainee Bob asks you what 11111001 binary is in decimal. What should you tell him?

A. 6
B. 193
C. 225
D. 241
E. 249

Answer: E

45. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that use the
255.255.255.224 subnet mask?

A. 14
B. 15
C. 16
D. 30
E. 31
F. 32

Answer: D

46. Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? Choose
three

A. 27.35.16.32
B. 27.35.16.33
C. 27.35.16.48
D. 27.35.16.47
E. 27.35.16.45
F. 27.35.16.44

Answer: B, E, F

47. In network that support VLSM, which network mask should be used for point-to-point WAN links in
orderto reduce waste of IP addresses?

A. /24
B. /30
C. /27
D. /26
E. /32

Answer: B

48. The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses
can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?
(Choose three)

A. 172.25.78.243
B. 172.25.98.16
C. 172.25.72.0
D. 172.25.94.255
E. 172.25.96.17
F. 172.25.100.16

Answer: A, C, D

NETWORK ESSENTIAL

1.One of your trainees wants to know which of the following is types of flow control one can expect while working in a Cisco network environment. What can you tell him? (Select three options.)

A. Congestion Avoidance.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Throat.

Answer: A, C, D

2.One of your trainees wants to know which fields are common to the TCP and the UDP segments. What can you tell her? (Select two options.)

A. source address
B. options
C. sequence number
D. sources
E. destination port
F. checksum

Answer: E, F

3.Congestion on an Ethernet network can be caused by one of the following. Which one?

A. Increasing the number of collision domains.
B. Microsegmenting the network.
C. Adding hubs for connectivity to the network.
D. Putting additional switches in the network.
E. Implementing VLANs in the network.

Answer: C

4.Which of the following fields are contained within an IEEE Ethernet frame header?

A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address

Answer: A

5.Which of the following devices can you use to segment a network? (Select three options.)

A. hub
B. repeater
C. bridge
D. switch
E. router

Answer: C,D,E

6.One of your trainees wants to know which of the following mentioned below are represented in the router IOS file naming conventions. What can you tell her? (Select three options.)

A. Distribution channel failures
B. Feature capabilities
C. Memory capacity needs
D. Hardware product platform
E. Programming language requirements
F. Run location and compression status

Answer: B,D,F

7.Why is it beneficial for individuals in the data communication industry to use the layered OSI reference model? (Select two options.)

A. It encourages industry standardization by defining what functions occur at each layer of the model.
B. It necessitates changes in functionality in one layer to other layers.
C. It enables equipment efficiency from different vendors to use the same electronic components.
D. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
E. It supports the evolution of multiple competing standards, and thus enhances business equipment manufacturing opportunities.

Answer: A, D

8.Which of the following types of packets will be allowed entry when a serial interface’s inbound access list has been configured to prohibit entry for TCP and UDP ports 21, 23 and 25? (Select all that apply.)

A. SMTP
B. DNS
C. FTP
D. Telnet
E. HTTP
F. POP3

Answer: B, E, F

9.One of the trainees assigned to you want to know which services use TCP. What can you tell him? (Select three options.)

A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP

Answer: B, D, E

10.You are a technician at RJP. Your newly appointed RJP trainee wants to know which services use UDP.

What would your reply be? (Choose all that apply.)

A. TACACS
B. Telnet
C. SMTP
D. SNMP
E. HTTP
F. TFTP

Answer: D, F

11.With regard to ISDN, which of the following are true? (Choose all that apply.)

A. Each ISDN B channel has transmission speeds of up to 64 kbps.
B. The ISDN B channel can carry video, voice or data.
C. The ISDN B channel transmission rate varies depending on the service used.
D. The ISDN D channel transmits control information.
E. The ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured.

Answer: A, B, D

12.You are a technician at RJP. You have encapsulated an ISDN link on the RJP network with PPP. Your newly appointed RJP trainee wants to know why you did not use HDLC to encapsulate the ISDN link.

What will your reply be? (Choose all that apply.)

A. PPP is easier to configure and maintain than HDLC.
B. Different equipment vendors consistently implement PPP.
C. PPP can be routed across public facilities, while HDLC is not.
D. PPP uses authentication to prevent unauthorized access to the ISDN circuit.
E. On circuit-switched ISDN links PPP is faster and more efficient than HDLC.

Answer: B, D

13.You are the network administrator at RJP. The RJP network has expanded considerably over the last year. It is now one large, cumbersome network. You want to segment the network.

What devices can you use? (Choose all that apply.)

A. Hubs
B. Repeaters
C. Switches
D. Bridges
E. Routers

Answer: C, D, E

14.You are a technician at RJP. You tell your newly appointed RJP trainee that Ethernet networks are broadcast domains and collision domains. Your trainee wants to know what happens when a collision occurs on the network.

What would your reply be? (Choose all that apply.)

A. Each device stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm.

Answer: B, D, E

15.You are a technician at RJP. RJP plans to implement a public network. The company’s ISP suggested that RJP register a Class IP address. The RJP CEO wants to know how many usable IP addresses are provided in a Class C address. What would your reply be?

A. 128
B. 192
C. 254
D. 256
E. 510

Answer: C

16.With regard to the DHCP Discover message, which of the following are true? (Choose two.)

A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.
B. The DHCP Discover message uses UDP as the transport layer protocol.
C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.
D. The DHCP Discover message uses TCP as the transport layer protocol.
E. The DHCP Discover message does not use a Layer 2 destination address.
F. The DHCP Discover message does not require a transport layer protocol.

Answer: A, B

17.The RJP network has a conferencing system that uses Voice over IP. The system uses UDP datagrams to send the voice data between communicating hosts. Your newly appointed RJP trainee wants to know what will happen if the datagrams out of sequence arrive at their destination when the network becomes busy.

What will your reply be?

A. UDP will send an ICMP Information Request to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
C. UDP will drop the datagrams.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
E. UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams.

Answer: C

18.You are the network administrator at RJP. You are asked to provide an ISDN WAN link for the RJP network. A modular Cisco router with 2 serial connections and a BRI/U interface is the only available router. You want to adapt this router for the ISDN connection.

What should you do?

A. Do nothing. The router is already suitable.
B. Purchase and install a BRI WAN interface in the router.
C. Purchase an external NT1 to terminate the local loop.
D. Purchase and install a TA/NT1 device on the router.

Answer: A

19.What is the most common layer 2 device?

A. Hub
B. Bridge
C. Switch
D. Router

Answer: C

20.What is used to find the hardware address of a device on a LAN?

A. Inverse-ARP
B. Reverse-ARP
C. Interior-ARP
D. ARP

Answer: D

21.What are the two most common request/reply pair with ICMP messages when using the ping command?

A. Echo request and Echo reply
B. ICMP hold and ICMP send
C. ICMP request and ICMP reply
D. Echo off and Echo on

Answer: A

22.What do you call it when a frame is placed into another type of frame?

A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing

Answer: C

23.What is the maximum distance of 10BaseT?

A. 100 meters
B. 100 yards
C. 200 meters
D. 200 yards

Answer: A

24.Which of the following commands will send and receive ICMP echo messages to verify connectivity from host to host?

A. ping
B. tracert
C. netstat
D. show cdp neighbors detail
E. show ip route
F. traceroute

Answer: A

25.Which of the following is the decimal and hexadecimal equivalent of this binary number 10101010?

A. Decimal=160, hexidecimal=00
B. Decimal=170, hexidecimal=AA
C. Decimal=180, hexidecimal=BB
D. Decimal=190, hexidecinal=CC

Answer: B

26. The network characteristic that indicates how well the network can accommodate more users and data transmission requirements. (Choose the 1 best answer)

A. Availability
B. Scalability
C. Reliability
D. Topology

Answer:B

27. Which of the following resources are shared in a computer network? (Choose the 2 best answers)

A. Data
B. Backup devices
C. Memory
D. All of the above

Answer:A,B

28. Which of the following is NOT a common network user application? (Choose the 1 best answer)

A. E-mail
B. Instant Messaging
C. Database
D. None of the above

Answer:D

29. The main circuit board of a computer is the _____. (Choose the 1 best answer)

A. Central processing unit
B. Random-access memory
C. Motherboard
D. Hard drive

Answer:C

30. The standard unit of measurement of the data transmission rate over a network connection is _____. (Choose the 1 best answer)

A. Bit
B. Byte
C. Kilobits
D. Kilobits per second

Answer:A

31. A device that reads and writes data on an internal disk drive is the _____. (Choose the 1 best answer)

A. Random-access memory
B. Read-only memory
C. Bus
D. Hard drive

Answer:D

32. Characteristics such as voltage levels, maximum transmission distances, physical connectors, and other similar attributes are defined by the _____ layer specifications. (Choose the 1 best answer)

A. Application
B. Data link
C. Physical
D. Transport

Answer:C

33. Which of the following protocols provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits. (Choose the 1 best answer)

A. HDLC
B. PPP
C. ISDN
D. TCP

Answer:D

34. The _____ layer moves the data through the internetwork by encapsulating the data and attaching a header to create a packet. (Choose the 1 best answer)

A. Network
B. Physical
C. Session
D. Transport

Answer:A

35. Which of the following components govern the way in which data is transmitted over the LAN? (Choose the 1 best answer)

A. Computers
B. Network devices
C. Protocols
D. All of the above

Answer:C

36. Which of the following is a fundamental component for the operation of a LAN? (Choose the 1 best answer)

A. Ethernet switches
B. Computers
C. Routers
D. All of the above

Answer: A

37. Which of the following statements describes a function common to LANs? (Choose the 1 best answer)

A. Data and application sharing
B. Resource sharing
C. Communication with other networks
D. All of the above

Answer:D


38. The _____ field contains bits that signal the receiving computer that the transmission of the actual frame is about to start. (Choose the 1 best answer)

A. Preamble
B. Start-of-frame delimiter
C. Destination address
D. Source address

Answer:A

39.Which of the following binary numbers represents the decimal number 35? (Choose the 1 best answer)

A. 10011
B. 100010
C. 100011
D. 100110

Answer:C

40.Communications in which a destination addresses a specific group of devices or clients are _____ communications. (Choose the 1 best answer)

A. Unicast
B. Broadcast
C. Multicast
D. None of the above

Answer:C

41.The most common type of connection media for Ethernet LAN implementation is the RJ-45 connector and jack. (Choose the 1 best answer)

A. True
B. False

Answer:A

42.UTP category _____ is used in networks running at speeds up to 1000 Mbps. (Choose the 1 best answer)

A. 3
B. 4
C. 5
D. 5e

Answer:D

43.The MAC address is burned onto each NIC by the manufacturer, providing a unique, physical network address that permits the device to participate in the network. (Choose the 1 best answer)

A. True
B. False

Answer:A

44.Which of the following correctly describes networking topology? (Choose the 1 best answer)

A. A logical topology defines the layout of the device and media.
B. The network topology defines the way in which the computers, printers, network devices, and other devices are connected.
C. Networks can have either a physical or a logical topology but not both.
D. A physical topology describes the paths that signals travel from one point on the network to another.

Answer:D

45.Which of the following statements best describes bus topology? (Choose the 1 best answer)

A. All of its nodes connect directly to a central point.
B. All of its nodes connect to exactly two other nodes.
C. All of its nodes connect directly to one physical link.
D. All of its nodes connect directly to each other.


Answer: C

46.In a complete, full-mesh topology, every node: (Choose the 1 best answer)

A. Is connected to two central nodes
B. Is linked wirelessly to a central node
C. Is linked directly to every other node
D. None of the above

Answer:C

47.Which of the following statements about thick Ethernet is true? (Choose the 1 best answer)

A. The development of thick Ethernet took place after thin Ethernet
B. Thick Ethernet transmitted data at 10 Mbps
C. Thick Ethernet requires repeaters every 250 meters for networks covering larger spaces
D. All of the above

Answer:B

48.The network segments that share the same bandwidth are called collision domains because when two or more devices communicate at the same time, collisions may occur within that segment. (Choose the 1 best answer)

A. True
B. False
Answer:A

49.A _____ is a physical layer device that takes a signal from a device on the network and acts as an amplifier. (Choose the 1 best answer)

A. Hub
B. Switch
C. Repeater
D. None of the above

Answer:C

50.One of the most common causes of network congestion is _____. (Choose the 1 best answer)

A. Too many network segments
B. The greater distances for LANs
C. Not enough network segments
D. Increasing volume of network traffic

Answer:D

51.In switched networks, how users are grouped is largely determined by their physical location. (Choose the 1 best answer)

A. True
B. False

Answer:A

52.Adding bridges to a network provide a number of benefits, including _____. (Choose the 1 best answer)

A. Minimizing unnecessary network traffic by filtering data frames within or between LAN segments
B. Isolating potential network problems to specific segments
C. Extending a LAN to cover greater distances by joining segments
D. All of the above

Answer:C

53.When multiple switches are implemented on the same network, there is a potential for _____. (Choose the 1 best answer)

A. Collisions
B. Degradation
C. Loops
D. Microsegmentation

Answer:D

54.When each device on a network segment is connected directly to a switch port and does not have to contend for bandwidth with any other device on the segment, it is called _____. (Choose the 1 best answer)

A. Microsegmentation
B. Full-duplex communication
C. Half-duplex communication
D. None of the above

Answer:B

55.The Spanning-Tree Protocol allows which of the following? (Choose the 1 best answer)

A. It creates multiple broadcast domains.
B. It detects and breaks loops by placing some connections in a standby mode.
C. It sends an alarm to a management station in the event of a link failure.
D. It switches when it can, routes when it must.

Answer:A

56.Which of the following statements about Internet Protocol (IP) is true? (Choose the 1 best answer)

A. IP operates at Layer 2 of the OSI model and the TCP/IP stack
B. IP provides special features that can recover corrupted packets
C. IP uses hierarchical addressing
D. All of the above

Answer:C

57.Like the OSI model, the TCP/IP suite is a means of organizing components in an order that reflects their functions in relation to each other. (Choose the 1 best answer)

A. True
B. False
Answer:A

58.The IP header contains information necessary to deliver the packet. _____ identifies how many routers may be traversed before being dropped. (Choose the 1 best answer)

A. Flags
B. Precedence and type of service
C. Header checksum
D. Time to Live
Answer:D

59.The host or router reads the protocol number from the header of the datagram, compares it to the entries in the transport protocol table, and then passes it to the appropriate protocol. For UDP, the protocol field should be _____. (Choose the 1 best answer)

A. 1
B. 6
C. 17
D. 88
Answer:C

60.Which of the following actions is the first step in delivering an IP packet over a routed network? (Choose the 1 best answer)

A. Router finds destination network in route table
B. Packet placed in frame
C. Router receives frame
D. Host sends packet to default gateway

Answer:D

61.Which of the following statements best describes the ARP table? (Choose the 1 best answer)

A. The entries in an ARP table do not expire
B. ARP creates and maintains its tables dynamically
C. ARP does not regenerate its table entries
D. All of the above
Answer:B


62.Which statement best describes a function of ARP? (Choose the 1 best answer)

A. It dynamically assigns addresses across the network.
B. It sends a broadcast message looking for the router address.
C. It maintains an error resource table.
D. It maps an IP address to a MAC address.
Answer:D

63.Which of the following numbering systems is considered the foundation of computer operations? (Choose the 1 best answer)

A. Decimal
B. Binary
C. Hexadecimal
D. Base-10

Answer:B

64.The decimal number 35 converts to which of the following binary numbers? (Choose the 1 best answer)

A. 100010
B. 100001
C. 100011
D. 100101
Answer: C

65.The binary number 11001011 converts to the decimal number _____. (Choose the 1 best answer)

A. 350
B. 203
C. 188
D. 97

Answer:B


66.Which of the following IP address classes was intended to support a lot of small networks? (Choose the 1 best answer)

A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

Answer:C

67.The IP address consists of two parts: _____. (Choose the 1 best answer)

A. The network portion and the host portion
B. The network portion and the subnetwork portion
C. The host portion and the MAC portion
D. The MAC portion and the network portion

Answer:A

68.Using 5 bits, how many usable subnets are created? (Choose the 1 best answer)

A. 14
B. 26
C. 30
D. 62

Answer:C

69.Which of the following is an advantage to subnetting a network? (Choose the 1 best answer)

A. Smaller networks are easier to manage and map to functional requirements
B. Overall network traffic is reduced
C. It is easier to apply network security measures at the interconnections between subnets
D. All of the above

Answer:D

70.A subnet mask tells the router to look at the _____ portions of an IP address? (Choose the 1 best answer)
A. Mask and host bits
B. Host and network bits
C. Host and subnet bits
D. Network and subnet bits

Answer:D

71.Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for? (Choose the 1 best answer)

A. 172.17
B. 172.17.128
C. 172.17.128.47
D. 10.172.47

Answer:A


72.Which of the following statements describes the TCP protocol? (Choose the 1 best answer)

A. TCP is connection-oriented
B. Lost or corrupted packets are resent
C. TCP is a protocol for managing end-to-end connections
D. All of the above

Answer:D

73.Which of the following is NOT a UDP delivered application? (Choose the 1 best answer)

A. FTP
B. RIP
C. TFTP
D. SNMP

Answer:B

74.Which of the following characteristics does NOT apply to UDP? (Choose the 1 best answer)

A. Packets are treated independently
B. Packet delivery is not guaranteed
C. Lost or corrupted packets are not resent
D. Packet delivery is guaranteed
Answer:B

75.In the TCP connection setup procedure the connection requestor sends a(n) _____ to the receiving device starting the handshake process. (Choose the 1 best answer)

A. Sequence number
B. Synchronization bit
C. Acknowledgement bit

Answer:A

76.In the TCP connection setup procedure a(n) _____ is used to track data bytes on the connection. (Choose the 1 best answer)

A. Sequence number
B. Synchronization bit
C. Acknowledgement bit

Answer:B

Advanced IP Addressing

1. VLSM allows you to summarize 192.168.2.0/24 and 192.168.3.0/24 as 192.168.2.0/25.

A. True

B. False

Answer: B

CIDR allows you to summarize class networks together; VLSM allows you to summarize subnets only back to the class network boundary.

2. VLSM allows a network segment to have more than one subnet mask.

A. True

B. False

Answer: B

Each segment has a single network number and mask. VLSM allows a class address, not a network segment, to have more than one subnet mask.

3. Which protocol supports VLSM?

A. RIP V2

B. IGRP

C. RIP and IGRP

D. None of these

Answer: A

RIPv2 supports VLSM (RIPv1 doesn’t).

B is classful and doesn’t support VLSM. C includes a classful protocol. There is a correct answer, so D is incorrect.

4. You are given a Class C network, 192.168.1.0/24. You need one network with 120 hosts and two networks with 60 hosts. How many subnet masks do you need?

A. 1

B. 2

C. 3

D. 4

Answer: B

You need two subnet masks: 255.255.255.128 (/25) and 255.255.255.192 (/26). This creates three networks, for instance, 192.168.1.0/25, 192.168.128/26, and 192.168.1.192/26.

5. You are given a class C network, 192.168.1.0/24. You need one network with 120 hosts and three networks with 60 hosts. What subnet mask values would you use?

A. 255.255.255.128 and 255.255.255.192

B. 255.255.255.128

C. 255.255.255.192

D. None of these

Answer: D

This is impossible with a single Class C network. One hundred twenty hosts require a 255.255.255.128 mask, which is half a Class C network. Sixty hosts require a 255.255.255.192 mask; however, you need three of these, which is 3/4 of a Class C network. Therefore it is impossible.

A is incorrect because it accommodates only the 120-host and two 60-host segments. B is incorrect because it accommodates only two subnets. C is incorrect because it accommodates the three 60-host segments, but not the 120-host segment.

6. You are given a class C network, 192.168.1.0/24. You need three networks with 60 hosts and two networks with 30 hosts. What are the subnet mask values you could use?

A. 255.255.255.128 and 255.255.255.192

B. 255.255.255.224 and 255.255.255.240

C. 255.255.255.192 and 255.255.255.224

D. None of these

Answer: A

A and C. A creates one 126-host segment and two 62-host segments. C creates three 62-host segments and two 30-host segments.

B’s second mask supports only 14 hosts. D is incorrect because there is a correct answer.

7. You are given this address space: 172.16.5.0/25. You need one network with 64 hosts and two with 30 hosts. What are the most specific subnet mask values to use?

A. /25 and /26

B. /26 and /27

C. /27 and /28

D. None of these

Answer: D

Sixty-four hosts require a 25-bit mask, and you are only given this to begin with—62 hosts would work with a 26-bit mask.

A, B, and C don’t support enough addresses.

8. You are given a class C network and you have four LAN segments with the following numbers of devices: 120, 60, and two with 30. What subnet mask values would you use to accommodate these segments?

A. /24, /25, and /26

B. /25, /26, and /27

C. /26, /27, and /28

D. None of these

Answer: B

A bit mask of 25 creates two networks: 0 and 128. If you take one of these subnets and apply a 26-bit mask, you have two more networks, such as 128 and 192. Taking one of these two subnets, applying a 27-bit mask creates two more subnets, such as 192 and 224.

A, C, and D don’t support enough addresses to accommodate all four LAN segments.

9. VLSM allows you to summarize __________ back to the class boundary.

A. Subnets

B. Networks

Answer: A

VLSM allows you to summarize subnets back to the class A, B, or C network boundary.

B is a non-subnetted address space and therefore is a Class A, B or C network number and can’t be summarized with VLSM, but can be with CIDR.

10. Which of the following is not an advantage of route summarization?

A. It requires less memory and processing.

B. It supports smaller routing update sizes.

C. It contains network problems.

D. It supports discontiguous subnets.

Answer: D

Discontiguous subnets are supported by classless protocols, but they are not an advantage of summarization. Actually, summarization is more difficult if you have discontiguous subnets.

A, B, and C are advantages of route summarization.

11. _________ allows you to create this summarization: 10.0.0.0/7.

A. Subnetting

B. CDR

C. Supernetting

D. VLSM

Answer: C

Supernetting, or CIDR, supports summarization of contiguous blocks of class A, B, or C networks.

A is the opposite of summarization. B should be CIDR, not CDR. D allows you to summarize subnets, not networks.

12. Which of the following are classless protocols?

A. IGRP

B. EIGRP

C. IGRP and EIGRP

D. Neither IGRP or EIGRP

Answer: B

EIGRP, as well as IS-IS, BGP, OSPF, and RIPv2, is a classless protocol.

A is not a classless protocol. C includes a classful protocol (IGRP). D is incorrect because there is a correct answer.

13. A routing protocol that supports route summarization must perform all except which of the following?

A. Carry the subnet mask with the network entry.

B. Make routing decisions based on the entire destination IP address.

C. Summarize entries so that the same lowest-order bits match.

D. None of these.

Answer: C

Summarized entries must have the same highest-order matching bits, not lowest.

A and B are things a routing protocol supporting route summarization must perform. D is incorrect because there is a correct answer.

14. You have the following two routes: 192.168.1.64/27 and 192.168.1.96/27. Enter the most specific summarized route for these two subnets: ___________.

A. IF YOU DUNNO THEN CLICK TO VIEW THE ANSWER

Answer: A

192.168.1.64/26 THIS INCULDES ADDRESSESS FROM 192.168.1.64 THROUGH 192.168.1.127

192.168.1.64/26: this includes addresses from 192.168.1.64 through 192.168.1.127.

15. You have the following four routes: 192.168.1.32/30, 192.168.1.36/30, 192.168.1.40/30, and 192.168.1.44/30. Enter the most specific summarized route for these four subnets: __________.

A. IF YOU DUNNO THEN CLICK TO VIEW THE ANSWER

Answer: A

192.168.1.32/28 THIS INCULDES ADDRESSES FROM 192.168.1.32 THROUGH 192.168.1.47

192.168.1.32/28: this includes addresses from 192.168.1.32 through 192.168.1.47.

CCNA QUESTIONS--2

1. The _________ is your network equipment, which includes the DCE (e.g., a modem) and the DTE (e.g., a router).

A. Demarcation point

B. Carrier switch

C. Local loop

D. CPE

Answer: D

2. Which interface type is used to connect to the serial interface of a router?

A. EIA/TIA-232

B. V.35

C. DB-60

D. X.21

Answer: C

3. Which frame field is different between ISO HDLC and Cisco’s HDLC?

A. Address

B. Control

C. Flag

D. Proprietary

Answer: D

4. PPP can do all of the following except ___________.

A. Authentication

B. Compression

C. Quality of Service

D. None of these

Answer: C

5. _________ negotiates the data link and network layer protocols that will traverse a PPP connection.

A. LCP

B. NCP

C. CDP

D. PAP

Answer: B

6. 1. A network administrator wants to add a line to an access list that will block only Telnet access by the
hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to
accomplish this task?

A. access-list 101 deny tcp 192.168.1.128 0.0.015 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
B. access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23
access-list 1 permit ip any any
C. access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21
access-list 1 permit ip any any
D. access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
E. access-list 101 deny ip 192.168.1.128 0.0.0.240 192.158.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
F. access-list 101 deny ip 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any

Answer: A

7. A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from
reaching a server with the address if 192.168.13.26. Which command can the administrator issue to
verify that the access list is working properly? (Choose three)

A. Router# ping 192.168.13.26
B. Router# debug access-list 172
C. Router# show open ports 192.168.13.26
D. Router# show access-list
E. Router# show ip interface

Answer: A, D, E

8. When are packets processed in an inbound access list?

A. Before they are routed to an outbound interface.
B. After they are routed for outbound traffic.
C. After they are routed to an outbound interface while queuing.
D. Before and after they are routed to an outbound interface.
E. Depends on the configuration of the interface
F. None of the above

Answer: A

9.Which of the following access list statements would deny traffic from a specific host?

A. Router(config)# access-list 1 deny 172.31.212.74 any
B. Router(config)# access-list 1 deny 10.6.111.48 host
C. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0
D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0
E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

Answer: C

10. A standard IP access list is applied to an Ethernet interface of a router. What does this standard access
list filter on?

A. The source and destination addresses
B. The destination port number
C. The destination address
D. The source address
E. All of the above

Answer: D

11. On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a
Cisco router. The interface is connected to the 192.168.1.8/29 LAN.
access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any
access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any
How will the above access lists affect traffic?

A. All traffic will be allowed to exit E0 except FTP traffic.
B. FTP traffic from 192.168.166.19 to any host will be denied.
C. FTP traffic from 192.168.166.22 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.168.166.18/29 from any host will be denied.

Answer: D

12. Which of the following statements regarding the use of multiple access lists are valid when configuring a
single interface on a Cisco router?

A. Application of up to three access lists per protocol to a single interface.
B. No more than two access lists per interface.
C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.
D. The maximum number allowed varies due to RAM availability in the router.
E. An infinite number of access lists that can be applied to an interface, from most specific to most general.
F. Cisco IOS allows only one access list to an interface.

Answer: C

13. On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and
TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic
will be allowed through this interface? (Choose threee)

A. SMTP
B. DNS
C. FTP
D. Telnet
E. HTTP
F. POP3

Answer: B, E, F

14. On a newly installed router, the following access list is added to the serial interface for incoming traffic:
Access-list 101 permit tcp any 10.18.10.0 0.0.0.255 eq tcp
What is the effect of the "any" keyword in the above access list?

A. check any of the bits in the source address
B. permit any wildcard mask for the address
C. accept any source address
D. check any bit in the destination address
E. permit 255.255.255.255 0.0.0.0
F. accept any destination

Answer: C

15. You are the network administrator at ABC inc. ABC inc has its headquarters in New York, and regional offices in Boston, Buffalo, Cleveland, Pittsburgh and Baltimore. You want to connect the regional offices to headquarters. You are evaluating WAN technologies that could accomplish this. You want each regional office to be connected to the corporate headquarters using a packet-switched technology.

Which of the following WAN technologies should you use?

A. ISDN
B. Wireless
C. Frame Relay
D. T1 leased line
E. Point to point leased line

Answer: C

16. Which of the following commands will display the CHAP authentication process as it occurs between the two routers in the network when you know that all WAN links inside the company’s network use PPP with CHAP for authentication security?

A. show ppp authentication
B. debug PAP authentication
C. debug PPP authentication
D. show interface serial0
E. show CHAP authentication

Answer: C

17. You are a network technician at RJP, Inc. A newly appointed trainee wants to know what the purpose of DLCIs in Frame Relay is. What would your response be?

A. They determine the encapsulation type employed by the Frame Relay.
B. They identify the logical circuit between a local router and a Frame Relay WAN switch.
C. They represent the physical address of the router.
D. They represent the keepalives in the maintenance of PVC.

Answer: B

18. You are a network technician at RJP. Due to rapid expansion, RJP is leaning towards scalable WAN technology. Immediate plans for the company include an additional 7 regional offices with all sites requiring continuous connectivity, but the current head office has no free ports available. Which of the following WAN technologies will meet the requirements?

A. Frame Relay
B. Broadband cable
C. ISDN-BRI
D. ADSL
E. Dedicated PPP/HDLC links
F. ISDN

Answer: A

19. You are a network technician at RJP, Inc. You have been asked to set up Frame Relay for point-topoint subinterfaces. Which of the following should not be configured?

A. The local DLCI on each subinterface of the Frame Relay.
B. The Frame Relay encapsulation on the physical interface.
C. An IP address on the physical interface.
D. The subinterface only.

Answer: C

20.Select two of the following statements that are characteristics of a Frame Relay point-to-point subinterface.

A. Needs to use Inverse ARP.
B. Maps a single IP per DLCI.
C. Maps a single IP subnet across multiple DLCIs.
D. Addresses and resolves NBMA split horizon issues.
E. Needs the frame-relay map command.

Answer: B, D

21.How would you configure a router in a Frame Relay network to prevent issues such as split horizons hampering routing updates?

A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the subinterface.
B. Configure many sub-interfaces on the same subnet.
C. Configure each Frame Relay circuit as a point-to-point line.
D. Configure only one sub-interface to establish multiple PVC connections.
E. Configure a single sub-interface connect to multiple remote router interfaces.

Answer: A

22.In Frame Relay, what are DLCIs used for?

A. They determine the Frame Relay encapsulation type
B. They identify the logical circuit between a local router and a Frame Relay WAN switch
C. They represent the keepalives used to maintain the PVC in an active state
D. They represent the physical address of the router attached to a Frame Relay network

Answer: B

23.Which of the following statements is true in regards to Frame Relay Multipoint subinterfaces?

A. An ip address is required on the physical interface
B. All routers are required to be fully meshed
C. All routers must be in the same subnet to forward routing updates and broadcasts
D. Multipoint is the default configuration for Frame Relay subinterfaces

Answer: C

24.When you execute Router# show frame-relay, which of the following command options will be displayed? (Select three options.)

A. dlci
B. clients
C. pvc
D. neighbors
E. lmi
F. map

Answer: C, E, F

25. If you connect a router to a Frame relay network and the device on the other side
of the PVC is powered down,what would you expect the state of the PVC to be?

A. Active
B. Down
C. Unavailable
D. Inactive
E. Deleted

Answer: D

26. The ___________ is the point where the carrier’s responsibility ends and yours begins.

A. Local loop

B. Demarcation point

C. CPE

D. Toll network

Answer: B

27. The default encapsulation on a synchronous serial interface is _________.

A. HDLC

B. PPP

C. Neither HDLC nor PPP

Answer: A

28. Which of the following summarized subnets represent routes that could have been
created for CIDR’s goal to reduce the size of Internet routing tables?

A. 10.0.0.0 255.255.255.0

B. 10.1.0.0 255.255.0.0

C. 200.1.1.0 255.255.255.0

D. 200.1.0.0 255.255.0.0

Answer: D

29. With static NAT, performing translation for inside addresses only, what causes NAT
table entries to be created?

A. The first packet from the inside network to the outside network

B. The first packet from the outside network to the inside network

C. Configuration using the ip nat inside source command

D. Configuration using the ip nat outside source command

Answer: C

30. With dynamic NAT, performing translation for inside addresses only, what causes NAT
table entries to be created?

A. The first packet from the inside network to the outside network

B. The first packet from the outside network to the inside network

C. Configuration using the ip nat inside source command

D. Configuration using the ip nat outside source command

Answer: A

31.NAT has been configured to translate source addresses of packets received from the
inside part of the network, but only for some hosts. Which of the following commands
identifies the hosts?

A. ip nat inside source list 1 pool barney

B. ip nat pool barney 200.1.1.1 200.1.1.254 netmask 255.255.255.0

C. ip nat inside

D. ip nat inside 200.1.1.1 200.1.1.2

E. None of the other answers are correct.

Answer: A

32. Examine the following configuration commands:

interface Ethernet0/0
ip address 10.1.1.1 255.255.255.0
ip nat inside
interface Serial0/0
ip address 200.1.1.249 255.255.255.252
ip nat inside source list 1 interface Serial0/0
access-list 1 permit 10.1.1.0 0.0.0.255
If the configuration is intended to enable source NAT overload, which of the following
commands could be useful to complete the configuration?

A. The ip nat outside command

B. The ip nat pat command

C. The overload keyword

D. The ip nat pool command

Answer: A, C

33. Which command would you place on interface on a private network?

A. ip nat inside

B. ip nat outside

C. ip outside global

D. ip inside local

Answer: A

34. Which command would you place on interface connected to the Internet?

A. ip nat inside

B. ip nat outside

C. ip outside global

D. ip inside local

Answer: B

35. Which of the following is considered to be the address after translation?

A. Inside local

B. Outside local

C. Inside global

D. Outside global

Answer: C

36. Which of the following are not features of ACLs?

A. Restricting telnet access to a router

B. Prioritizing WAN traffic

C. Filtering traffic from the router

D. Triggering dialup phone calls

Answer: C

37. Which command activates an IP ACL on a router’s interface?

A. access-list

B. ip access-group

C. access-class

D. access-group

Answer: B

38. Choose the following that a standard IP ACL can match on.

A. Destination address

B. IP protocol

C. IP protocol information

D. None of the above

Answer: D

39. Extended IP ACLs should be placed as close to the ____________ device as possible.

A. Source

B. Destination

Answer: A

40. When you execute Router# show frame-relay, which of the following command options will be displayed? (Select three options.)

A. dlci
B. clients
C. pvc
D. neighbors
E. lmi
F. map

Answer: C, E, F

1. Which of the following is true concerning bridges?

A. They switch frames in hardware.

B. They support half- and full-duplexing.

C. They support one collision domain for the entire bridge.

D. They do only store-and-forward switching.

Answer: D

Bridges support only the store-and-forward switching method.

A and B are done by switches, not bridges. C is incorrect because each port on a bridge or switch is a separate collision domain.

2. With _________ switching, the switch reads the destination MAC address of the frame and immediately starts forwarding the frame.

A. Store-and-forward

B. Cut-through

C. Fragment-free

D. Runtless

Answer: B

With cut-through switching, the switch reads the destination MAC address of the frame and immediately starts forwarding the frame. With A, the entire frame is read and the CRC is checked before further processing. C and

D are the same thing—once the first 64 bytes of the frame are read, the switch begins to forward it.

3. Which of the following is true concerning full-duplexing?

A. It can either send or receive frames, but not both simultaneously.

B. It can be used with hubs.

C. It can be used with 10Base5 cabling.

D. It uses point-to-point connections.

Answer: D

Full duplex connections require point-to-point connections and cannot involve hubs.

A, B, and C are true of half-duplex connections. Functions of Bridging and Switching

4. Which is not one of the three main functions of a layer-2 device?

A. Learning

B. Forwarding

C. Listening

D. Removing loops

Answer: C

Listening is a port state, not one of the three main functions of a layer-2 device.

A, B, and D are the three main functions of a layer-2 device.

5. During the learning function, the switch places addresses and ports in a(n) _________ table.

A. IP address

B. learning

C. CAM

D. memory

Answer: C

During the learning function, the switch places addresses and ports in a CAM table—another term is port address table.

A, B and D are not terms used to describe this table.

6. Which type of traffic is sent to a group of devices?

A. Multicast

B. Unicast

C. Broadcast

D. Groupcast

Answer: A

Multicast traffic is sent to a group of devices.

B is sent to a single device, and C is sent to all devices. D is a nonexistent traffic type.

7. Which type of traffic is not flooded?

A. Multicast

B. Known unicast

C. Broadcast

D. Unknown unicast

Answer: B

Unicast traffic is not flooded if the destination MAC address is in the CAM table.

A, C, and D traffic is always flooded, to maintain the transparency of the layer-2 device.

8. BPDU stands for ____________.

A. Bridge Protocol Description Unicast

B. Bridge Protocol Data Unit

C. Bridge Protocol Description Unit

D. Bridge Protocol Data Unicast

Answer: B

BPDU stands for Bridge Protocol Data Unit.

A and C are incorrect because of the word description, and the fact that BPDUs use multicasts, which also makes D incorrect.

9. BPDUs are generated every __________ seconds.

A. CLICK HERE

Answer: A

2

BPDUs are generated every two seconds.

10. The root switch is the one elected with the __________ __________.

A. Lowest MAC address

B. Highest MAC address

C. Lowest switch ID

D. Highest switch ID

Answer: C

The switch with the lowest switch ID is elected as the root switch.

A and D are incorrect because the decision is based on the switch ID, which includes the switch’s priority and MAC address. D is incorrect because it is the lowest, not the highest.

11. The switch port that is chosen to forward traffic for a segment is called a __________.

A. Root port

B. Alternate port

C. Backup port

D. Designated port

Answer: D

The switch port that is chosen to forward traffic for a segment is called a designated port.

A is the port that the switch uses to reach the root. B is used in RSTP and is a secondary root port, and C is used in RSTP and is a secondary designated port.

12. Which is true concerning a port in a listening state? (Choose all correct answers.)

A. It remains there for 15 seconds.

B. It forwards BPDUs and builds the CAM table.

C. It remains there for 20 seconds.

D. It forwards BPDUs.

Answer: A

A and D. In a listening state, the port processes and forwards BPDUs. A port stays in the listening state for 15 seconds.

B occurs in the learning state. C is the time period for the blocking state.

13. Enter the 1900 switch command to set an interface to autosense the duplexing: _________.

A. CLICK HERE

Answer: A

DUPLEX AUTO

Use the duplex auto command on the interface to set duplexing to autosensing.

14. Enter the switch command to view the CAM table: ___________.

A. CLICK HERE

Answer: A

SHOW MAC-ADDRESS-TABLE

Use the show mac-address-table command to view the CAM table on either switch.

15. Which 1900 command enables port security?

A. port security

B. switchport security

C. port secure

D. switchport port-security

Answer: C

The port secure command enables port security on a 1900 switch.

D is used on the 2950 switch. A and B are nonexistent commands.



1. Which of the following are not features of ACLs?

A. Restricting telnet access to a router

B. Prioritizing WAN traffic

C. Filtering traffic from the router

D. Triggering dialup phone calls

Answer: C

ACLs cannot filter traffic the router originates, such as pings or traceroutes.

A, B, and C are ACL features.

2. Which of the following is true concerning ACLs?

A. Order of the statements is automatic.

B. All statements are processed.

C. If no match is found, the packet is permitted.

D. You can delete a specific statement in a named list.

Answer: D

You can delete a specific ACL statement in a named ACL, but not a numbered ACL.

A is not true because all statements are always added at the bottom of the ACL. B is not true because as soon as there is a statement match, no more statements are processed. C is not true because the implicit deny at the end of every ACL drops a non-matching packet.

3. The last statement in an ACL is called the __________ ____________ statement.

A. CLICK TO VIEW THE ANSWER

Answer: A

IMPLICIT DENY

The last statement in an ACL is called an implicit deny statement: this statement, which cannot be seen with any show commands, causes the router to drop any packet that doesn’t match any preceding ACL statements.

4. There are ___________ actions a router can take when there is a match on an ACL statement (enter a number).

A. CLICK TO VIEW THE ANSWER

Answer: A

2

There are 2 actons a router can take when there is a match on an ACL statement: permit or deny.

5. Which command activates an IP ACL on a router’s interface?

A. access-list

B. ip access-group

C. access-class

D. access-group

Answer: B

The ip access-group command activates an ACL on a router’s interface.

A is incorrect because it creates an ACL statement in a list. C is incorrect because it activates a standard ACL on a line, not an interface. D is a nonexistent command.

6. A ___________ in a bit position of a wildcard mask means that the same bit position in the condition address must match the same bit position in the wildcard mask in order to execute the ACL’s action.

A. 0

B. 1

Answer: A

A 0 in a bit position of a wildcard mask means that the same bit position in the condition address must match that bit position in the wildcard mask in order to execute the ACL’s action.

B means that the bit position doesn’t have to match.

7. Enter the wildcard mask value to match on every bit position in an address: __________.

A. CLICK TO VIEW THE ANSWER

Answer: A

0.0.0.0

The value 0.0.0.0 is a wildcard mask that says to match on every bit position in an address.

8. Enter the wildcard mask value for the subnet mask of 255.255.248.0: ____________.

A. CLICK TO VIEW THE ANSWER

Answer: A

0.0.7.255

The inverted subnet mask for 255.255.248.0 is 0.0.7.255. The trick is to subtract the subnet mask octets from 255.

9. Choose the following that a standard IP ACL can match on.

A. Destination address

B. IP protocol

C. IP protocol information

D. None of the above

Answer: D

Standard IP ACLs can match only on source IP addresses.

A, B, and C are things extended IP ACLs can match on.

10. Enter the router command to view console output on a non-console line connection: __________.

A. CLICK TO VIEW THE ANSWER

Answer: A

TERMINAL MONITOR

Use the terminal monitor command to view console output on a nonconsole line connection, such as a VTY or an auxiliary line.

11. Enter the standard IP ACL command to permit traffic from 192.168.1.0/24, using a list number of 10: ___________.

A. CLICK TO VIEW THE ANSWER

Answer: A

ACCESS-LIST 10 PERMIT 192.168.1.0. 0.0.0.255

Enter the standard IP ACL command to permit traffic from 192.168.1.0/24, using a list number of 10: access-list 10 permit 192.168.1.0 0.0.0.255.

12. Enter the extended IP ACL command to permit all ICMP traffic from 172.16.0.0/16 to 172.17.0.0/17, using a list number of 101: ___________.

A. CLICK TO VIEW THE ANSWER

Answer: A

ACCESS-LIST 101 PERMIT ICMP 172.16.0.0 0.0.255 172.17.0.0 0.0.255.255

Enter the extended IP ACL command to permit all ICMP traffic from 172.16.0.0/16 to 172.17.0.0/17, using a list number of 101: access-list 101 permit icmp 172.16.0.0 0.0.255.255 172.17.0.0 0.0.127.255. Notice the subnet mask value for 172.17.0.0, which is 17 bits!

13. Which router command creates a standard named ACL called test?

A. ip access-list test

B. access-list test

C. ip access-list standard test

D. access-list standard test

Answer: C

The ip access-list standard test command creates a standard ACL called test.

A, B, and D are invalid commands.

14. Enter the router command to activate an ACL with a name of test inbound on an interface: ____________.

A. CLICK TO VIEW THE ANSWER

Answer: A

IP ACCESS-GROUP TEST IN

Enter the router command to activate an access list with a name of test inbound on an interface: ip access-group test in.

15. Enter the router command to delete all of the statements in access-list 100: __________.

A. CLICK TO VIEW THE ANSWER

Answer: A

NO ACCESS-LIST 100

Enter the router command to delete access-list 100: no access-list 100.

16. Extended IP ACLs should be placed as close to the ____________ device as possible.

A. Source

B. Destination

Answer: A

Extended IP ACLs should be placed as close to the source device as possible.

B is true for standard ACLs.



1. When designing OSPF networks;what is the purpose of using a hierarchical design?(select all choices
that apply)

A. To reduce the complexity of router configuration

B. To speed up convergence

C. To confine network instability to single areas of the network

D. To reduce routing overhead

E. To lower costs by replacing routers

F. To decrease latency

Answer: B, C, D

2. You are a network administrator and you need to implement a routing protocol on your network that
provides:
* Scalability
* VLSM support
* Minimal overhead
* Support for connecting networks using routers of multiple vendors
Which of the following routing protocol would best serve your needs?

A. VTP

B. RIP version 1

C. EIGRP

D. OSPF

E. IGRP

F. CDP

Answer: D

3. You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which
routing protocols can satisfy this requirement? (Select two)

A. RIP v1

B. RIP v2

C. IGRP

D. EIGRP

E. OSPF
F. IS-IS


Answer: C, D

4. Which of the following routing protocols support the use of VLSM (Variable Length Subnet Masking)?
(Select three)

A. RIPv1

B. EIGRP

C. OSPF

D. IGRP

E. RIPv2

Answer: B, C, E

5. You need to implement the use of a routing protocol that meets the following requirements:
Converges quickly
Supports VLSM, CIDR, IP, and IPX.
Uses minimal bandwidth for routing updates.
Which one of the following routing protocols would be the best choice?

A. RIPv1

B. RIPv2

C. IGRP

D. OSPF

E. EIGRP

Answer: E

6. The RJP Network consists of the following 5 IP networks:
NETWORK 1: 192.168.10.0/26
NETWORK 2: 192.168.10.64/27
NETWORK 3: 192.168.10.96/27
NETWORK 4: 192.168.10.128/30
NETWORK 5: 192.168.10.132/30
Which of the following routing protocols will support this IP addressing scheme? (Choose all that apply).

A. RIP version 1

B. RIP version 2

C. IGRP

D. EIGRP

E. OSPF

F. BGP

Answer: B, D, E

7. Which one of the following commands would you enter to terminate a VTY line session?

A. close

B. disable

C. disconnect

D. suspend

E. exit

F. None of the above

Answer: E

8. Which command will configure a default route on a router?

A. router(config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1

B. router(config)# ip default-route 10.1.1.0

C. router(config)# ip default-gateway 10.1.1.0

D. router(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1

Answer: D

9. In which situation would the use of a static route be appropriate?

A. To configure a route to the first Layer 3 device on the network segment.

B. To configure a route from an ISP router into a corporate network.

C. To configure a route when the administrative distance of the current routing protocol is too low.

D. To reach a network is more than 15 hops away.

E. To provide access to the Internet for enterprise hosts.

Answer: B

10. Which of the following answer choices is an additional parameter which must be supplied before the
IGRP routing process can initialize?

A. Connected subnet numbers

B. Register administrative subnet masks

C. IP address mask

D. Autonomous system number

E. Metric weights

Answer: D

11. What parameters must you specify when you enable EIGRP routing?

A. The broadcast address, and AS number

B. The network number and AS number

C. EIGRP routing, network number and passive interface

D. EIGRP routing, network number, and AS

Answer: D

12. Which of the following technologies can be used in distance vector routing protocols to prevent routing
loops? (Select all valid answer choices)

A. Spanning Tree Protocol

B. Shortest path first tree

C. Link-state advertisements (LSA)

D. Hold-down timers

E. Split horizon

F. VRRP

Answer: D, E

13. Which of the following OSPF commands, when used together, will put the network 192.168.10.0/24 into
OSPF area 0? (Select all valid responses)

A. Router(config-router)# network 192.168.10.0 0.0.0.255 0

B. Router(config-router)# network 192.168.10.0 0.0.0.255 area 0

C. Router(config-router)# network 192.168.10.0 255.255.255.0 area 0

D. Router(config)# router ospf 0

E. Router(config)# router ospf 1

Answer: B, E

14. Which of the following routing protocols are less likely prone routing loops and network reachability
problems when used in discontiguous networks? (Select all valid responses)

A. IGRP

B. CDP

C. OSPF

D. RIP v1

E. RIP v2

F. EIGRP

Answer: C, E, F

15. What is the maximum number of hops OSPF allows before it deems a network unreachable?

A. 15

B. 16

C. 99

D. 255

E. Unlimited

Answer: E

16. A routing table contains static, RIP, and IGRP routes destined to the same network with each route set to
its default administrative distance. Which route will be the preferred route?

A. The RIP route

B. The static route

C. The IGRP route

D. All three will load balance.

Answer: B

17. You are trying to connect directly into an existing Cisco router. You want to telnet to the local Cisco
router using TCP/IP but cannot create a session.
What should you do to resolve the problem?

A. Use a straight-through cable to connect your computer's COM port to the router's console port.

B. Use a crossover cable to connect your computer's COM port to the router's console port.

C. Use a straight-through cable to connect your computer's COM port to the router's Ethernet port.

D. Use a crossover cable to connect your computer's Ethernet port to the router's Ethernet port.

E. Use a rollover cable to connect your computer's Ethernet port to the router's Ethernet port.

F. Use a straight-through cable to connect your computer's Ethernet port to the router's Ethernet port.

Answer: D

18. While trying to diagnose a routing problem in the network, you issue RIP debugging as displayed below:
RtrA#debug ip rip
Rip protocol debugging is on
RtrA#
1d05h: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1)
1d05h: RIP: build update entries
1d05h: network 10.0.0.0 metric 1
1d05h: network 192.168.1.0 metric 2
1d05h: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1)
1d05h: RIP: build update entries
1d05h: network 172.16.0.0 metric 1
RtrA#
1d05h: RIP: received v1 update from 10.0.15.2 on Serial0/0
1d05h: 192.168.1.0 in 1 hops
1d05h: 192.168.0 in 16 hops (inaccessible)
Based on the output of the above exhibit, which two of the following statements are true? (Select two
answer choices)

A. A ping to 10.0.15.2 will be successful.

B. RtrA has three interfaces that will take part in the RIP process.

C. There are at least two routers participating in the RIP process.

D. A ping to 192.168.168.2 will be successful.

Answer: A, C

19. When you use the ping command to send ICMP messages across a network, what's the most common
request/reply pair you'll see? (Select one answer choice)

A. Echo request and Echo reply

B. ICMP hold and ICMP send

C. ICMP request and ICMP reply

D. Echo off and Echo on

E. None of the above

Answer: A

20. Which IOS commands can a network technician use to verify all RIP, IGRP, EIGRP, and OSPF routing
protocol configurations? Select two.

A. debug ip routing

B. show running-config

C. show ip route protocols

D. show ip protocols

E. show protocols all

Answer: B, D


1. Which of the following steps are necessary inorder to add a new VLAN to a switched network? (Select
all that apply.)

A. Create the VLAN.

B. Name the VLAN.

C. Configure an IP address for the VLAN.

D. Add the desired ports to the new VLAN.

E. Add the VLAN to the VTP domain.

Answer: A B D

2. Which of the following a true statements regarding the use of VLANs to segment a network? (Select
three.)

A. They increase the size of collision domains

B. They allow logical grouping of users by function.

C. They can enhance network security.

D. They increase the size of the broadcast domain while decreasing the number of collision domains.

E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

F. They simplify switch administration.

Answer: B, C, E

3. What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?

A. They are used to find the best path through a network.

B. They allow the exchange of filtering tables.

C. They specify different implementations of the Spanning-Tree Protocol.

D. They allow the exchange of routing tables

E. They provide inter-switch VLAN communication.

Answer: E

4. Which one of the following protocols allows the information about the configuration of a new VLAN to
be distributed across entire switched network?

A. STP

B. VTP

C. EIGRP

D. SNMP

E. CDP

F. None of the above

Answer: B

5. Which encapsulation types are configurable on a Cisco switch for a trunk? (Select two answer choices)

A. VTP

B. ISL

C. CDP

D. 802.1Q

E. 802.1p

F. LLC

G. IETF

Answer: B, D

6. How could a large corporation with many specialized divisions benefit from using VLANs on their
networks? (Select three answer choices.)

A. VLANs allow access to network services based on department, not physical location.

B. VLANs utilize packet filtering to enhance network security.

C. VLANs provide a low-latency, high bandwidth internetworking alternative.

D. VLANs provide a method of communication between IP addresses in large networks.

E. VLANs establish segmented broadcast domains in switched networks.

F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

Answer: A, E, F

7. An administrator is configuring a Catalyst switch with VLAN information that must be automatically
distributed to other Catalyst switches in the network. What conditions must be met inorder for the
VLANs configured on this switch to be automatically configured on the other switches? (Choose three)

A. The switch that will share its VLAN configuration must be in VTP server mode.

B. The switches must be in the same VTP domain.

C. The switch that will share the VLAN information must be configured as the root bridge.

D. The switches must be connected over VLAN trunks.

E. The switches must be configured to use the same STP version.

F. The switches must have VTP pruning activated.

Answer: A, B, D

8. Why would a network administrator configure port security on a switch?

A. To prevent unauthorized Telnet access to a switch port.

B. To limit the number of Layer 2 broadcasts on a particular switch port.

C. To prevent unauthorized hosts from accessing the LAN.

D. To protect the IP and MAC address of the switch and associated ports.

E. To block unauthorized access to the switch management interfaces over common TCP ports.

Answer: C

9. Which interface commands would you enter on a Catalyst 2900 switch, if your goal was to bring all
VLAN traffic to another directly connected switch? (Select the two valid responses)

A. Switch(config-if)# vlan all

B. Switch(config-if)# switchport trunk encapsulation dot1q

C. Switch(config-if)# switchport access vlan all

D. Switch(config-if)# switchport mode trunk

E. Switch(config-if)# switchport access vlan 303

Answer: C, D

10. What is the purpose of the spanning-tree algorithm in a switched LAN?

A. To provide a monitoring mechanism for networks in switched environments.

B. To manage VLANs across multiple switches.

C. To prevent switching loops in networks with redundant switched paths.

D. To segment a network into multiple collision domains.

E. To prevent routing loops in networks.

Answer: C

11. Which two of the following values does STP take into consideration when it elects the root bridge? (Select
two answer choices)

A. The BPDU version number

B. The access layer bridge setting

C. The Bridge ID

D. The spanning-tree update number

E. The bridge priority

F. The VLAN number

Answer: C, E

12. The spanning tree information from 4 switches on the Testking network is displayed below. Despite their
names, all four switches are on the same LAN.

Tampa#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 32768, address 0002.fd29.c505
Configured hello time 2, max age 20. forward delay 15
------------------------------------------------------------------------
Miami#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 16384, address 0002.fd29.c504
Configured hello time 2, max age 20, forward delay 15
-------------------------------------------------------------------------
London#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 8192, address 0002.fd29.c503
Configured hello time 2, maxage 20, forward delay 15
-------------------------------------------------------------------------
Cairo#show spanning-tree
Spanning tree 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 4096, address 0002.fd29.c502
Configured hello time 2, maxage 20, forward delay 15

Based on the outputs of the above exhibit, which one of the switches is the spanning tree root bridge?

A. Miami

B. London

C. Tampa

D. Cairo

Answer: D

13. BPDU stands for.......

A.Bridge Protocol Description UniCast

B.Bride Protocol Data Unit

C.Bridge Protocol Description Unit

D.Bridge Protocol Data Unicast

Answer: B

14.You are a network technician at RJP, Inc. You are using a switch to break up a broadcast domain. Which features of the switch enables this?

A. Transparent bridging

B. Cut-through bridges

C. Fragment-free switches

D. Microsegmentation

E. Virtual LANs

F. Store-and-forward switching

Answer: E

15.Which field of frame id used by error detection schemes when checking on errors?

A. MTU

B. PDU

C. FCS

D. Flag

E. MAC

F. BRI

Answer: C

16.What advantages does full-duplex Ethernet have over single-duplex? (Select two options.)

A. Uses inexpensive hubs

B. Operates without collisions

C. Operates on switches

D. Provides faster data transfer

E. Utilizes fewer wiring pairs

Answer: B, D

17.Your newly appointed RJP trainee wants to know what requirements must be met before you can configure the VLAN trunking protocol to communicate VLAN information between two switches. What will your reply be?

A. You must set each end of the trunk line to IEEE 802.1e encapsulation.

B. You must set the same VTP management domain name on both switches.

C. You must set all ports on the two switches as access ports.

D. You must configure one of the switches as a VTP server.

E. You must use a rollover cable to connect the two switches.

F. You must use a router to forward VTP traffic between VLANs.

Answer: B, D

18.You are a technician at RJP. You have just connected a new host to a workgroup switch on the RJP network. The new host's Layer 3 configuration is correct. However, the host is unable to access the server resources in its network segment.

Which of the following is most likely causing the problem?

A. The router lacks a routing table entry for the new host

B. The host switch port is assigned to the incorrect VLAN

C. The host MAC address is incorrectly configured

D. A VIP instance for the new host has not been initialized

Answer: B

19.You are a network technician at RJP. A newly appointed trainee wants to know what the differences and similarities between bridges and switches are. What would your reply be? (Choose all that apply.)

A. Bridges are faster than switches because they have fewer ports.

B. A switch is a multiport bridge,

C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.

D. A bridge will forward a broadcast but a switch will not.

E. Bridges and switches increase the size of a collision domain.

Answer: B,C

20.You are a network technician at RJP, Inc. Your RJP trainee is studying the spanning tree algorithm and wants to know what the default mechanism for determining the spanning-tree path cost is. What would your reply be?

A. Statically determined by the administrator.

B. Sum of the costs based on bandwidth.

C. Total hop count.

D. Sum of the cost based on latency.

Answer: B