.CO.NR Free Domain KAMAL KUMAR: NETWORK ESSENTIAL

Search This Blog

Saturday, July 25, 2009

NETWORK ESSENTIAL

1.One of your trainees wants to know which of the following is types of flow control one can expect while working in a Cisco network environment. What can you tell him? (Select three options.)

A. Congestion Avoidance.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Throat.

Answer: A, C, D

2.One of your trainees wants to know which fields are common to the TCP and the UDP segments. What can you tell her? (Select two options.)

A. source address
B. options
C. sequence number
D. sources
E. destination port
F. checksum

Answer: E, F

3.Congestion on an Ethernet network can be caused by one of the following. Which one?

A. Increasing the number of collision domains.
B. Microsegmenting the network.
C. Adding hubs for connectivity to the network.
D. Putting additional switches in the network.
E. Implementing VLANs in the network.

Answer: C

4.Which of the following fields are contained within an IEEE Ethernet frame header?

A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address

Answer: A

5.Which of the following devices can you use to segment a network? (Select three options.)

A. hub
B. repeater
C. bridge
D. switch
E. router

Answer: C,D,E

6.One of your trainees wants to know which of the following mentioned below are represented in the router IOS file naming conventions. What can you tell her? (Select three options.)

A. Distribution channel failures
B. Feature capabilities
C. Memory capacity needs
D. Hardware product platform
E. Programming language requirements
F. Run location and compression status

Answer: B,D,F

7.Why is it beneficial for individuals in the data communication industry to use the layered OSI reference model? (Select two options.)

A. It encourages industry standardization by defining what functions occur at each layer of the model.
B. It necessitates changes in functionality in one layer to other layers.
C. It enables equipment efficiency from different vendors to use the same electronic components.
D. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
E. It supports the evolution of multiple competing standards, and thus enhances business equipment manufacturing opportunities.

Answer: A, D

8.Which of the following types of packets will be allowed entry when a serial interface’s inbound access list has been configured to prohibit entry for TCP and UDP ports 21, 23 and 25? (Select all that apply.)

A. SMTP
B. DNS
C. FTP
D. Telnet
E. HTTP
F. POP3

Answer: B, E, F

9.One of the trainees assigned to you want to know which services use TCP. What can you tell him? (Select three options.)

A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP

Answer: B, D, E

10.You are a technician at RJP. Your newly appointed RJP trainee wants to know which services use UDP.

What would your reply be? (Choose all that apply.)

A. TACACS
B. Telnet
C. SMTP
D. SNMP
E. HTTP
F. TFTP

Answer: D, F

11.With regard to ISDN, which of the following are true? (Choose all that apply.)

A. Each ISDN B channel has transmission speeds of up to 64 kbps.
B. The ISDN B channel can carry video, voice or data.
C. The ISDN B channel transmission rate varies depending on the service used.
D. The ISDN D channel transmits control information.
E. The ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured.

Answer: A, B, D

12.You are a technician at RJP. You have encapsulated an ISDN link on the RJP network with PPP. Your newly appointed RJP trainee wants to know why you did not use HDLC to encapsulate the ISDN link.

What will your reply be? (Choose all that apply.)

A. PPP is easier to configure and maintain than HDLC.
B. Different equipment vendors consistently implement PPP.
C. PPP can be routed across public facilities, while HDLC is not.
D. PPP uses authentication to prevent unauthorized access to the ISDN circuit.
E. On circuit-switched ISDN links PPP is faster and more efficient than HDLC.

Answer: B, D

13.You are the network administrator at RJP. The RJP network has expanded considerably over the last year. It is now one large, cumbersome network. You want to segment the network.

What devices can you use? (Choose all that apply.)

A. Hubs
B. Repeaters
C. Switches
D. Bridges
E. Routers

Answer: C, D, E

14.You are a technician at RJP. You tell your newly appointed RJP trainee that Ethernet networks are broadcast domains and collision domains. Your trainee wants to know what happens when a collision occurs on the network.

What would your reply be? (Choose all that apply.)

A. Each device stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm.

Answer: B, D, E

15.You are a technician at RJP. RJP plans to implement a public network. The company’s ISP suggested that RJP register a Class IP address. The RJP CEO wants to know how many usable IP addresses are provided in a Class C address. What would your reply be?

A. 128
B. 192
C. 254
D. 256
E. 510

Answer: C

16.With regard to the DHCP Discover message, which of the following are true? (Choose two.)

A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.
B. The DHCP Discover message uses UDP as the transport layer protocol.
C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.
D. The DHCP Discover message uses TCP as the transport layer protocol.
E. The DHCP Discover message does not use a Layer 2 destination address.
F. The DHCP Discover message does not require a transport layer protocol.

Answer: A, B

17.The RJP network has a conferencing system that uses Voice over IP. The system uses UDP datagrams to send the voice data between communicating hosts. Your newly appointed RJP trainee wants to know what will happen if the datagrams out of sequence arrive at their destination when the network becomes busy.

What will your reply be?

A. UDP will send an ICMP Information Request to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
C. UDP will drop the datagrams.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
E. UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams.

Answer: C

18.You are the network administrator at RJP. You are asked to provide an ISDN WAN link for the RJP network. A modular Cisco router with 2 serial connections and a BRI/U interface is the only available router. You want to adapt this router for the ISDN connection.

What should you do?

A. Do nothing. The router is already suitable.
B. Purchase and install a BRI WAN interface in the router.
C. Purchase an external NT1 to terminate the local loop.
D. Purchase and install a TA/NT1 device on the router.

Answer: A

19.What is the most common layer 2 device?

A. Hub
B. Bridge
C. Switch
D. Router

Answer: C

20.What is used to find the hardware address of a device on a LAN?

A. Inverse-ARP
B. Reverse-ARP
C. Interior-ARP
D. ARP

Answer: D

21.What are the two most common request/reply pair with ICMP messages when using the ping command?

A. Echo request and Echo reply
B. ICMP hold and ICMP send
C. ICMP request and ICMP reply
D. Echo off and Echo on

Answer: A

22.What do you call it when a frame is placed into another type of frame?

A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing

Answer: C

23.What is the maximum distance of 10BaseT?

A. 100 meters
B. 100 yards
C. 200 meters
D. 200 yards

Answer: A

24.Which of the following commands will send and receive ICMP echo messages to verify connectivity from host to host?

A. ping
B. tracert
C. netstat
D. show cdp neighbors detail
E. show ip route
F. traceroute

Answer: A

25.Which of the following is the decimal and hexadecimal equivalent of this binary number 10101010?

A. Decimal=160, hexidecimal=00
B. Decimal=170, hexidecimal=AA
C. Decimal=180, hexidecimal=BB
D. Decimal=190, hexidecinal=CC

Answer: B

26. The network characteristic that indicates how well the network can accommodate more users and data transmission requirements. (Choose the 1 best answer)

A. Availability
B. Scalability
C. Reliability
D. Topology

Answer:B

27. Which of the following resources are shared in a computer network? (Choose the 2 best answers)

A. Data
B. Backup devices
C. Memory
D. All of the above

Answer:A,B

28. Which of the following is NOT a common network user application? (Choose the 1 best answer)

A. E-mail
B. Instant Messaging
C. Database
D. None of the above

Answer:D

29. The main circuit board of a computer is the _____. (Choose the 1 best answer)

A. Central processing unit
B. Random-access memory
C. Motherboard
D. Hard drive

Answer:C

30. The standard unit of measurement of the data transmission rate over a network connection is _____. (Choose the 1 best answer)

A. Bit
B. Byte
C. Kilobits
D. Kilobits per second

Answer:A

31. A device that reads and writes data on an internal disk drive is the _____. (Choose the 1 best answer)

A. Random-access memory
B. Read-only memory
C. Bus
D. Hard drive

Answer:D

32. Characteristics such as voltage levels, maximum transmission distances, physical connectors, and other similar attributes are defined by the _____ layer specifications. (Choose the 1 best answer)

A. Application
B. Data link
C. Physical
D. Transport

Answer:C

33. Which of the following protocols provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits. (Choose the 1 best answer)

A. HDLC
B. PPP
C. ISDN
D. TCP

Answer:D

34. The _____ layer moves the data through the internetwork by encapsulating the data and attaching a header to create a packet. (Choose the 1 best answer)

A. Network
B. Physical
C. Session
D. Transport

Answer:A

35. Which of the following components govern the way in which data is transmitted over the LAN? (Choose the 1 best answer)

A. Computers
B. Network devices
C. Protocols
D. All of the above

Answer:C

36. Which of the following is a fundamental component for the operation of a LAN? (Choose the 1 best answer)

A. Ethernet switches
B. Computers
C. Routers
D. All of the above

Answer: A

37. Which of the following statements describes a function common to LANs? (Choose the 1 best answer)

A. Data and application sharing
B. Resource sharing
C. Communication with other networks
D. All of the above

Answer:D


38. The _____ field contains bits that signal the receiving computer that the transmission of the actual frame is about to start. (Choose the 1 best answer)

A. Preamble
B. Start-of-frame delimiter
C. Destination address
D. Source address

Answer:A

39.Which of the following binary numbers represents the decimal number 35? (Choose the 1 best answer)

A. 10011
B. 100010
C. 100011
D. 100110

Answer:C

40.Communications in which a destination addresses a specific group of devices or clients are _____ communications. (Choose the 1 best answer)

A. Unicast
B. Broadcast
C. Multicast
D. None of the above

Answer:C

41.The most common type of connection media for Ethernet LAN implementation is the RJ-45 connector and jack. (Choose the 1 best answer)

A. True
B. False

Answer:A

42.UTP category _____ is used in networks running at speeds up to 1000 Mbps. (Choose the 1 best answer)

A. 3
B. 4
C. 5
D. 5e

Answer:D

43.The MAC address is burned onto each NIC by the manufacturer, providing a unique, physical network address that permits the device to participate in the network. (Choose the 1 best answer)

A. True
B. False

Answer:A

44.Which of the following correctly describes networking topology? (Choose the 1 best answer)

A. A logical topology defines the layout of the device and media.
B. The network topology defines the way in which the computers, printers, network devices, and other devices are connected.
C. Networks can have either a physical or a logical topology but not both.
D. A physical topology describes the paths that signals travel from one point on the network to another.

Answer:D

45.Which of the following statements best describes bus topology? (Choose the 1 best answer)

A. All of its nodes connect directly to a central point.
B. All of its nodes connect to exactly two other nodes.
C. All of its nodes connect directly to one physical link.
D. All of its nodes connect directly to each other.


Answer: C

46.In a complete, full-mesh topology, every node: (Choose the 1 best answer)

A. Is connected to two central nodes
B. Is linked wirelessly to a central node
C. Is linked directly to every other node
D. None of the above

Answer:C

47.Which of the following statements about thick Ethernet is true? (Choose the 1 best answer)

A. The development of thick Ethernet took place after thin Ethernet
B. Thick Ethernet transmitted data at 10 Mbps
C. Thick Ethernet requires repeaters every 250 meters for networks covering larger spaces
D. All of the above

Answer:B

48.The network segments that share the same bandwidth are called collision domains because when two or more devices communicate at the same time, collisions may occur within that segment. (Choose the 1 best answer)

A. True
B. False
Answer:A

49.A _____ is a physical layer device that takes a signal from a device on the network and acts as an amplifier. (Choose the 1 best answer)

A. Hub
B. Switch
C. Repeater
D. None of the above

Answer:C

50.One of the most common causes of network congestion is _____. (Choose the 1 best answer)

A. Too many network segments
B. The greater distances for LANs
C. Not enough network segments
D. Increasing volume of network traffic

Answer:D

51.In switched networks, how users are grouped is largely determined by their physical location. (Choose the 1 best answer)

A. True
B. False

Answer:A

52.Adding bridges to a network provide a number of benefits, including _____. (Choose the 1 best answer)

A. Minimizing unnecessary network traffic by filtering data frames within or between LAN segments
B. Isolating potential network problems to specific segments
C. Extending a LAN to cover greater distances by joining segments
D. All of the above

Answer:C

53.When multiple switches are implemented on the same network, there is a potential for _____. (Choose the 1 best answer)

A. Collisions
B. Degradation
C. Loops
D. Microsegmentation

Answer:D

54.When each device on a network segment is connected directly to a switch port and does not have to contend for bandwidth with any other device on the segment, it is called _____. (Choose the 1 best answer)

A. Microsegmentation
B. Full-duplex communication
C. Half-duplex communication
D. None of the above

Answer:B

55.The Spanning-Tree Protocol allows which of the following? (Choose the 1 best answer)

A. It creates multiple broadcast domains.
B. It detects and breaks loops by placing some connections in a standby mode.
C. It sends an alarm to a management station in the event of a link failure.
D. It switches when it can, routes when it must.

Answer:A

56.Which of the following statements about Internet Protocol (IP) is true? (Choose the 1 best answer)

A. IP operates at Layer 2 of the OSI model and the TCP/IP stack
B. IP provides special features that can recover corrupted packets
C. IP uses hierarchical addressing
D. All of the above

Answer:C

57.Like the OSI model, the TCP/IP suite is a means of organizing components in an order that reflects their functions in relation to each other. (Choose the 1 best answer)

A. True
B. False
Answer:A

58.The IP header contains information necessary to deliver the packet. _____ identifies how many routers may be traversed before being dropped. (Choose the 1 best answer)

A. Flags
B. Precedence and type of service
C. Header checksum
D. Time to Live
Answer:D

59.The host or router reads the protocol number from the header of the datagram, compares it to the entries in the transport protocol table, and then passes it to the appropriate protocol. For UDP, the protocol field should be _____. (Choose the 1 best answer)

A. 1
B. 6
C. 17
D. 88
Answer:C

60.Which of the following actions is the first step in delivering an IP packet over a routed network? (Choose the 1 best answer)

A. Router finds destination network in route table
B. Packet placed in frame
C. Router receives frame
D. Host sends packet to default gateway

Answer:D

61.Which of the following statements best describes the ARP table? (Choose the 1 best answer)

A. The entries in an ARP table do not expire
B. ARP creates and maintains its tables dynamically
C. ARP does not regenerate its table entries
D. All of the above
Answer:B


62.Which statement best describes a function of ARP? (Choose the 1 best answer)

A. It dynamically assigns addresses across the network.
B. It sends a broadcast message looking for the router address.
C. It maintains an error resource table.
D. It maps an IP address to a MAC address.
Answer:D

63.Which of the following numbering systems is considered the foundation of computer operations? (Choose the 1 best answer)

A. Decimal
B. Binary
C. Hexadecimal
D. Base-10

Answer:B

64.The decimal number 35 converts to which of the following binary numbers? (Choose the 1 best answer)

A. 100010
B. 100001
C. 100011
D. 100101
Answer: C

65.The binary number 11001011 converts to the decimal number _____. (Choose the 1 best answer)

A. 350
B. 203
C. 188
D. 97

Answer:B


66.Which of the following IP address classes was intended to support a lot of small networks? (Choose the 1 best answer)

A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

Answer:C

67.The IP address consists of two parts: _____. (Choose the 1 best answer)

A. The network portion and the host portion
B. The network portion and the subnetwork portion
C. The host portion and the MAC portion
D. The MAC portion and the network portion

Answer:A

68.Using 5 bits, how many usable subnets are created? (Choose the 1 best answer)

A. 14
B. 26
C. 30
D. 62

Answer:C

69.Which of the following is an advantage to subnetting a network? (Choose the 1 best answer)

A. Smaller networks are easier to manage and map to functional requirements
B. Overall network traffic is reduced
C. It is easier to apply network security measures at the interconnections between subnets
D. All of the above

Answer:D

70.A subnet mask tells the router to look at the _____ portions of an IP address? (Choose the 1 best answer)
A. Mask and host bits
B. Host and network bits
C. Host and subnet bits
D. Network and subnet bits

Answer:D

71.Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for? (Choose the 1 best answer)

A. 172.17
B. 172.17.128
C. 172.17.128.47
D. 10.172.47

Answer:A


72.Which of the following statements describes the TCP protocol? (Choose the 1 best answer)

A. TCP is connection-oriented
B. Lost or corrupted packets are resent
C. TCP is a protocol for managing end-to-end connections
D. All of the above

Answer:D

73.Which of the following is NOT a UDP delivered application? (Choose the 1 best answer)

A. FTP
B. RIP
C. TFTP
D. SNMP

Answer:B

74.Which of the following characteristics does NOT apply to UDP? (Choose the 1 best answer)

A. Packets are treated independently
B. Packet delivery is not guaranteed
C. Lost or corrupted packets are not resent
D. Packet delivery is guaranteed
Answer:B

75.In the TCP connection setup procedure the connection requestor sends a(n) _____ to the receiving device starting the handshake process. (Choose the 1 best answer)

A. Sequence number
B. Synchronization bit
C. Acknowledgement bit

Answer:A

76.In the TCP connection setup procedure a(n) _____ is used to track data bytes on the connection. (Choose the 1 best answer)

A. Sequence number
B. Synchronization bit
C. Acknowledgement bit

Answer:B

No comments:

Post a Comment