频道栏目
首页 > 资讯 > CCNA > 正文

CISCO模拟试题:CCNA考试自测题1

16-06-01        来源:[db:作者]  
收藏   我要投稿
  hope this helps. it helped me study for the ccna.

  1. what are the valid host id’s for 222.37.2.50 /24 ? a.) 222.37.2.48 - 222.37.2.66 b.) 222.37.2.49 - 222.37.2.62 c.) 222.37.2.0 - 222.37.2.255 d.) 222.37.0.0 - 222.37.255.254 e.) 222.37.2.1 - 222.37.2.254

  d1) match the following application layer services to their corresponding transport layer protocol port. (匹配下列的应用层服务和它们对应的传输层协议端口):

  a. smtp 1. tcp/23

  b. ftp 2. tcp/25

  c. tftp 3. tcp/80

  d. te l n e t 4. tcp/21

  e. http 5. udp/69

  f. dns 6. tcp/53

  2) which osi reference model layer does telnet function at (te l n e t在哪一个o s i参考模型层运作)?

  a. transport  下载 b. network c. session d. application

  3) how many layers does the tcp/ip protocol suite have, compared to the osi reference model (和o s i参考模型相比,t c p / i p协议具有几层)?

  a. tcp model has 4, osi model has 6

  b. tcp model has 7, osi model has 8

  c. tcp model has 4, osi model has 7

  d. tcp model has 7, osi model has 4

  4) the tcp/ip protocol suite has a formal session layer that includes netbios、rpcs and tli functions (tcp/ip协议套件具有包含n e t b i o s、r p c和t l i功能的一个正式的会话层)。

  a. true b. false

  5) what is the function of rpcs (rpc的功能是什么)?

  a. to move files from remote pcs to a local pc

  b. to make remote function calls transparent, so they appear to be local

  c. to initialize a program on a remote pc

  d. to send a procedure that is local to a remote node for processing

  elsewhere

  6) what does rpc stand for (rpc代表什么)?

  a. remote personal computer

  b. reserved-programming call

  c. routed-procedure call

  d. remote-procedure call

  7) what osi reference model layer do sockets function at (套接字在o s i参考模型的哪层运 作)?

  a. application b. presentation c. session

  d. transport e. network f. data link g. physical

  8) what function do sockets perform (套接字的功能是什么)?

  a. they make remote functions appear local, transparent to the user

  b. they transfer files to and from remote nodes

  c. they make the transport layer independent

  d. they allow multiple applications to share the same connection to the network

  9) what is winsock (什么是wi n s o c k )?

  a. a version of sockets for the microsoft windows platform

  b. sockets on bsd unix

  c. a session layer api commonly considered to be its own protocol

  d. a network layer service for microsoft wi n d o w s

  10) what does tli do (tli的作用是什么)?

  a. it makes remote functions appear local, transparent to the user

  b. it transfers files to and from remote nodes

  c. it makes the transport layer independent

  d. it allows multiple applications to share the same connection to the network

  11) what osi layer does netbios function at (netbios在o s i哪一层运作)?

  a. application b. presentation c. session

  d. transport    e. network f. data link g. physical

  12) which protocols can netbios bind to? (select all that are applicable.) (netbios可以绑定在哪个协议上,选择所有可能的协议)?

  a. appletalk b. ipx c. ip d. netbeui

  13) what layers do not exist in the tcp/ip model that are in the osi model (哪层不在t c p / i p模型中,但它在o s i模型中)?

  a. application, presentation, and network

  b. presentation, session, and data link

  c. session, network, and physical

  d. presentation, data link, and physical

  14) what is a socket in the transport layer (传输层中的套接字是什么)?

  a. the socket is an ip address plus a port

  b. an api that makes the transport layer independent

  c. an api that allows multiple applications to share a network connection

  d. a function that makes remote procedures appear to be local

  15) what is a port (什么是端口)?

  a. an api that makes the transport layer independent

  b. an api that allows multiple applications to share a network connection

  c. a function that makes remote procedures appear to be local

  d. the point where upper-layer processes access transport layer services

  16) which of the following services uses a process called windowing (下面的哪一个服务使用了所谓的窗口机制)?

  a. reliable data transfer

  b. connection-oriented virtual circuit

  c. buffered transfer

  d. resequencing

  e. multiplexing

  f. efficient, full-duplex transmission

  g. flow control

  17) what is udp (什么是u d p )?

  a. an api that makes the transport layer independent

  b. a connectionless, unreliable transport protocol

  c. an api that allows multiple applications to share a network connection

  d. a function that makes remote procedures appear to be local

  18) what is ip (什么是i p )?

  a. it is the transport mechanism for upper layer services

  b. it is the session layer api for making the transport layer independent

  c. it is the network layer protocol that moves data from one node to another

  d. it is the physical layer protocol for internet connections

  19) what is icmp (什么是i c m p )?

  a. it is a network layer protocol that handles control messages

  b. it is a network layer protocol that resolves addresses

  c. it is a session layer api that makes remote procedures transparent to a user

  d. it is a transport layer function for unreliable transport

  20) ping sends an icmp echo command to an ip address in order to determine whether anetwork connection exists to that node (ping向一个i p地址发送了一个i c m p回送命令,目的是确定是否存在到那个节点的网络连接)?

  a. true b. false

  21) which of the following best describes tcp/ip (下面的哪句话最准确地说明了t c p / i p )?

  a. a static protocol

  b. a proprietary protocol

  c. a collection of internetworking protocols

  22) udp and tcp represent mechanisms used by which layer of the tcp/ip (udp和t c p表示了t c p / i p的哪层使用的机制)?

  a. data link layer b. physical layer

  c. presentation layer d. transport layer

  23) rpcs provide which of the following (rpc提供了下面的哪个功能)?

  a. connection-oriented session

  b. transparency to make remote calls look local

  c. portability of applications between heterogeneous systems

  d. a and c only

  e. b and c only

  f. a, b, and c

  24) distributed computing environment (dce) is an example of (分布式计算环境( d e c )是下面的哪一项的一个例子)?

  a. osi model b. rpc implementation

  c. extreme data representation d. a and b

  1) match the following application layer services to their corresponding transport layer protocol port. (匹配下列的应用层服务和它们对应的传输层协议端口):

  a. smtp 1. tcp/23

  b. ftp 2. tcp/25

  c. tftp 3. tcp/80

  d. te l n e t 4. tcp/21

  e. http 5. udp/69

  f. dns 6. tcp/53

  2) which osi reference model layer does telnet function at (te l n e t在哪一个o s i参考模型层运作)?

  a. transport  下载 b. network c. session d. application

  3) how many layers does the tcp/ip protocol suite have, compared to the osi reference model (和o s i参考模型相比,t c p / i p协议具有几层)?

  a. tcp model has 4, osi model has 6

  b. tcp model has 7, osi model has 8

  c. tcp model has 4, osi model has 7

  d. tcp model has 7, osi model has 4

  4) the tcp/ip protocol suite has a formal session layer that includes netbios、rpcs and tli functions (tcp/ip协议套件具有包含n e t b i o s、r p c和t l i功能的一个正式的会话层)。

  a. true b. false

  5) what is the function of rpcs (rpc的功能是什么)?

  a. to move files from remote pcs to a local pc

  b. to make remote function calls transparent, so they appear to be local

  c. to initialize a program on a remote pc

  d. to send a procedure that is local to a remote node for processing

  elsewhere

  6) what does rpc stand for (rpc代表什么)?

  a. remote personal computer

  b. reserved-programming call

  c. routed-procedure call

  d. remote-procedure call

  7) what osi reference model layer do sockets function at (套接字在o s i参考模型的哪层运 作)?

  a. application b. presentation c. session

  d. transport e. network f. data link g. physical

  8) what function do sockets perform (套接字的功能是什么)?

  2. which commands listed below will move you from interface configuration mode back to global configuration mode? a.) ctl z b.) ctl f c.) exit d.) global e.) config t

  c ctrl-z and ctrl-c will abort you back to the root. exit goes back one level.

  3. you have a unix server running the tftp daemon. what is the command to load a configuration file from the tftp server into the routers ram? a.) copy tftp ram b.) copy tftp running-config c.) read tftp d.) copy tftp startup-config e.) copy tftp nvram

  b remember ram = running-config. all changes to ram are immediate!

  4. given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which portion represents the next hop tcp/ip address? a.) 125 b.) 3.3.3.0 c.) 255.255.255.0 d.) route e.) 4.4.4.4

  e router(config)#ip route 3.3.3.0 255.255.255.0 ? a.b.c.d forwarding router’s address

  5. in regards to the isdn bri standard, which channel is used for control? a.) e b.) q c.) d d.) i e.) b

  c b is bearer for data (2 channels at 64kb each). d is for control (16kb).

  6. which distance vector characteristic can help to speed up convergence? a.) inverse arp. b.) poison reverse. c.) triggered updates. d.) split horizon. e.) hold down timers.

  c instead of waiting on a pre-set periodic interval (before sending the routing table), dv routing protocols can send triggered updates to immediately notify the neighbor routers. hold down timers, poison reverse, and split horizon are features that are used to avoid routing loops.

  7. what command would show the current configuration register settings? a.) show running-config b.) show startup-config c.) show nvram d.) show ram e.) show version f.) show ios

  e for most routers the configuration register settings are: 0x2102 normal operation (parse nvram at startup), or 0x2142 password recovery (ignore nvram during startup).

  8. what would the following command do?: ’show frame-relay pvc’ a.) display lmi info. b.) the command is incomplete, and would be ignored. c.) display all configured dlci’s. d.) debug a frame-relay problem. e.) show virtual links.

  c the permament virtual circuit (pvc) info is displayed along with the data link connection identifiers (dlci)’s.

  9. which of the following are examples of the session layer? (3 answers) a.) sql b.) nfs c.) ip d.) tcp e.) netbios names f.) token ring

  a b e controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain, and synchronize communications between applications. examples: sql, rfc, rpc, x-windows, netbios names layer 5 of the osi reference model.

  10. when editing a line in the cli mode, what does ’ctrl-p’ do? a.) moves you to the next word. b.) moves you to the next command. c.) moves you to the end of the line. d.) moves you to the beginning of the line. e.) moves you to the previous command.

  e

  11. the internet control message protocol occurs at what layer of the seven layer model? a.) physical b.) session c.) datalink d.) network e.) presentation f.) transport

  d icmp is used for error handling and testing at layer 3. ping and traceroute are examples of icmp. network layerprovides path determination using a hierarchal logical address defined with a network portion and node portion, net.node.examples: ip, ipx.

  12. which command listed below enables load balancing over two multiple paths for ipx on a cisco router? a.) ipx routing 2 b.) ipx round-robin 2 c.) ipx maximum-paths 2 d.) ipx rip 2 e.) ipx sap 2 f.) ipx gns 2

  c the default ipx routing protocol is ipx-rip. by default, rip selects the best path, and keeps only one route in its routing table. the ’ipx maximum-paths’ command allows rip to load balance over up to 6 paths.

  13. which of the following is an example of the physical layer? a.) ip b.) llc c.) sql d.) ddp e.) ethernet

  e

  14. what class address is 193.1.3.4 ? a.) c b.) b c.) multi-cast d.) broadcast e.) a f.) d

  a

  15. novell netware has an ethernet frame type called ethernet_802.3. what is the matching cisco command line keyword for this encapsulation method? a.) arpa b.) snap c.) novell-ether d.) sap e.) dix f.) gns

  c novell 802.2 = sap (contains 802.2 llc headers) novell 802.3 = novell-ether (netware proprietary) ethernet_ii = arpa (the internet standard) snap = snap (field type set to ’aa’)

  16. what would be the first command from global configuration mode to perform the following: 1. enable igrp on the router for interface e0 2. tell igrp to use an address of 157.89.4.4 255.255.255.0 3. tell igrp to provide routing updates for as number 200? a.) router igrp 157.89.4.4 b.) network 157.89.4.0 255.255.255.1 c.) router igrp int e1 d.) router igrp 157.89.0.0 e.) network 157.89.4.0 f.) router igrp 200

  f. you have to specify which routing protocol first. for igrp you must also specify the autonomous system number. router(config)#router igrp ? <1-65535> autonomous system number

  17. from global configuration mode, which command will create subinterface #1 for serial 0? a.) int sub serial 0 b.) int serial 0 subinterface 1 c.) int ss 0 d.) int s0.1 point-to-point e.) int serial 0 subinterface 0 f.) int s0

  d. command syntax for creating sub-interfaces:

  18. the command ’ip host dallas 157.89.8.64’ maps the host name dallas with its ip address. what command would display all such mappings? a.) show dns b.) show dns entry dallas c.) show neighbors d.) show hosts e.) show ip table f.) show dns cache

  d router#show hosts host flags age type address(es) www.eku.edu (temp, ok) 0 ip 157.89.8.2 dallas (perm, ok) 0 ip 157.89.8.64 perm - permament static entries temp - temporary usually resolved via dns

  19. the command ’show running-config’ displays the configuration script in ram, but what other command could you use to show information about objects stored in ram? a.) show startup-config b.) show all c.) show config d.) debug ram e.) show buffers f.) show start

  e packets are stored in memory locations called buffers during periods when the router becomes over-loaded with other requests.

  20. which of the following are examples of the datalink layer? (2 answers) a.) sql b.) ip c.) mac d.) tcp e.) llc

  c e mac and llc are the sublayers of the datalink layer.

  21. which type of switching reads in the entire frame before forwarding it? a.) fast forward b.) tabling c.) cut-through d.) store-and-forward e.) inverse arp f.) routing

  d store-and-forward is slower, but it checks the frame for errors before forwarding. this can actually help to improve overall network performance on noisy lines.

  22. what is the standard isdn term for a non-native analog telephone? a.) et b.) le c.) te2 d.) te1 e.) ta c terminal equipment 2 (te2) does not support native digital isdn. the analog device will require an external analog to digital converter.

  23. which layer of the 7 layer model is responsible for representing the application information between 2 different os’s? for example, converting ascii to ebcidic. a.) transport b.) physical c.) application d.) network e.) session f.) presentation

  f. presentation layer accepts data from application layer and negotiates data representation, syntax, compression and encryption. examples: ascii, ebcdic, jpeg, gif, pict, midi, mpeg

  24. how do you view all debugging that is currently enabled? a.) show running-config b.) show startup-config c.) show debug d.) debug update e.) show flash f.) show version

  c.

  25. which of the following is an example of the network layer? a.) sql b.) llc c.) tcp d.) ip e.) token ring

  d most protocol suites have differnet osi layer protocols within them. at layer 3, ip is for tcp/ip. tcp is layer 4. ipx is for ipx/spx. spx is layer 4.ddp is for appletalk

  26. which type of switching is considered to be ’wire speed?’ a.) inverted b.) layer 4 c.) cut-through d.) multiplexed e.) layer 3 f.) store and forward

  c

  27. on an isdn bri interface, the control channel is the ’d’ channel. what is the rate of this channel? a.) 1.544 mbps b.) 2.048 mbps c.) 128 kbps d.) 16 kbps e.) 64 kbps

  d

  28 which commands are valid to turn off all debugging? ( 2 answers) a.) clear logging b.) no debug c.) no logging d.) clear debug e.) undebug all f.) no debug all

  e f

  29. which of the following are valid host id’s for 157.89.9.50 /28 (12 bits of subnetting)? a.) 157.89.9.49 - 157.89.9.64 b.) 157.89.0.0 - 157.89.255.255 c.) 157.89.9.0 - 157.89.9.255 d.) 157.89.9.32 - 157.89.9.63 e.) 157.89.9.49 - 157.89.9.62

  e below is a very easy to use shortcut that requires no binary math: figure out the mask: /28 = 255.255.255.240 figure out the subnet multiple: 256-240=16 subnets are 16,32,48,64,80, etc this is subnet 48, next subnet is 64, so the broadcast address is 63! everything between the subnet (48) and broadcast (63) are the valid hosts. in this example, based on the given mask, the valid host ranges are 49-62.

  30. what is a characteristic of store and forward switches? a.) they decrease latency. b.) they forward the frame before it is completely read. c.) they are the same a cut-through switching. d.) they read the entire frame and check crc before forwarding. e.) they work at wire speed.

  d

  31. given the following address: 157.89.8.64 255.255.0.0 which part represents the host portion of the address? a.) 0.89.8.64 b.) 0.0.8.64 c.) 157.89.0.0 d.) 157.0.0.0 e.) 0.0.0.64

  b using the subnet mask 255.255.0.0, the first 16 bits represent the network, the last 16 bits represent the host.

  32. which isdn specification series deals with concepts and terminology? a.) f-series b.) i- series c.) world series d.) 911-series e.) q-series f.) j-series

  b the 2 most important isdn specifications are q & i: q - call setup and teardown. i - concepts and terminology.

  33. which command would change the cisco discovery protocol (cdp) update to 90 second intervals? a.) cdp router 90 b.) router cdp 90 c.) cdp timer 1.5 d.) set timer cdp=1.5 e.) cdp timer 90 f.) timer cdp 1.5

  e

  34. which command will copy the routers configuration script from ram to nvram? a.) copy running-config startup-config b.) nvram is read-only, so this is not possible. c.) save ram nvram d.) save ram e.) copy all

  a

  35. which command listed below sets the banner message when someone connects to the router? a.) description # b.) login banner # c.) banner # d.) login description # e.) message # f.) banner motd #

  f

  36 what should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? a.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet b.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet c.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet d.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet e.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet f.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

  d wildcard masks for an entire subnet are easy to figure out (shortcut): local broadcast - subnet mask = inverted wildcard masks 255.255.255.255 -255.255.192. 0 ----------------- 0. 0. 63.255

  37. what is the default lmi type for cisco routers that are using frame-relay? a.) ietf b.) arpa c.) sap d.) cisco e.) gandalf5 f.) q933a

  d local management interface (lmi) types are cisco, ansi, and q933a.

  38. which osi reference layer is concerned with path determination? a.) network b.) physical c.) transport d.) session e.) datalink

  a the network layer is where routing occurs. (if you don’t get this question right, there’s always a job at mcdonalds!!)

  39. your ethernet interface currently has the ip address of 1.1.1.1/24. you would like it to have a second ip address of 2.2.2.2/24. which command will do that? a.) ip address 2.2.2.2 255.255.255.0 b.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 c.) ip address 2.2.2.2 255.255.255.0 secondary d.) this cannot be done, you can only have 1 ip address per physical interface. e.) ip address 2.2.2.2 /24

  c

  40. midi and mpeg are examples of what layer of the osi seven layer model? a.) session b.) transport c.) presentation d.) network e.) application f.) datalink

  c the osi presentation layer includes ebcidic, ascii, pict, gif, midi, and mpeg. encryption can also occur at this layer.

  41. which global configuration command will tell the router to load the ios from rom at next boot? a.) this can not be done, only the first file in flash can be used. b.) boot system flash ios_filename c.) config-register 0x2102 d.) boot system rom e.) boot system tftp ios_filename tftp_address

  d

  42. what is the default subnet mask for a tcp/ip class b address? (2 answers) a.) 255.255.0.0 b.) /8 c.) 255.255.255.0 d.) /24 e.) /16 f.) 255.0.0.0

  a e

  43. most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. this is an example of which routing technology? a.) split horizon b.) lmi c.) syn, ack d.) dlci e.) poison reverse f.) triggered updates

  a the golden rule of split horizon: do not send any update packet back out the same interface that it was received or learned from. poison reverse is typically used on larger networks,where a more aggressive routing loop solution is required.

  44. you want to set the telnet password to boston. what would be the first command you need to execute from global configuration mode? a.) enable password boston b.) login boston c.) login password boston d.) set password=boston e.) password boston f.) line vty 0 4

  f

  45. which command will start the process for creating a cisco ios file image backup to a network file server? a.) copy ios tftp b.) copy ios network c.) copy tftp flash d.) copy flash tftp e.) copy ios flash

  d the ios is stored in flash. the command format is: copy 学生大 [destination]

  46. how do you determine which standard ip access lists are applied to interface e0 ? a.) show ip access-list b.) show access-lists c.) show ip interface e0 d.) show interface e0 e.) show access-list e0

  c to see which specific protocol access-lists are bound to the interface, show ip int e0 or show ipx int e0 the command ’show access-lists’ will display all access lists that exist, not just the ones bound to a certian interface.

  47. the cisco discovery protocol (cdp) uses advertisements and discoveries. how does it send this information? a.) over a snap-capable link. b.) layer 3 broadcast. c.) cdp does not use advertisements. d.) layer 2 multicast. e.) layer 4 tcp. f.) sap.

  a d the cisco proprietary protocol uses multicast, so that only other cisco devices will listen to these packets. cdp requires a snap-capable link to transmit.

  48. in the tcp/ip protocol stack, there are five classes of addresses. which class is used for testing? a.) b b.) a c.) d d.) c e.) e

  e a,b,c are valid for use on the internet d is multicast e is for research

  49. which subnet is the host 200.1.1.67 /26 on? a.) 200.1.1.32 b.) 200.1.1.128 c.) 200.1.1.0 d.) 200.1.1.16 e.) 200.1.1.64 e shorthand notation /26 = 2 bits in the last octet = decimal 255.255.255.192 shortcut: 256 - 192 = 64. valid subnets are multiples of 64. (64, 128, 192, 256). the closest value to 67 is between 64 (the network) and 127 (the broadcast).

  50. the datalink layer works with which of the following: a.) bits b.) packets c.) frames d.) globules e.) segments

  c physical - bits datalink - frames network - packets

  51. station a is transmitting data to station b, and expects an acknowledgment after every 400 bytes. after trasmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. this is an example of (pick the best answer only): a.) count to infinity b.) becn c.) countdown timers d.) sliding windows e.) split horizon f.) poison reverse

  d a tcp/ip ’window’ is the amount of data (number of bytes) that the sending station will trasmit before expecting an acknowledgement back. if the stations can change that window size on the fly, that is called a sliding window. this is done to optimize performance.

  52. which command can determine the path a routed packet takes through an internetwork? a.) telnet b.) traceroute c.) arp d.) plp e.) ping

  b traceroute uses a series of icmp ’pings’ with decreasing time-to-live values for each hop to determine the path through a network.

  53. what is one way to make more flash memory available? a.) the command: copy flash to rom b.) erase unused images from flash. c.) the command: erase start d.) this isn’t possible. once you write to flash, you must purchase new flash simms. e.) the command: erase flash *.* f.) the command: convert ram to flash

  b you can think of flash as a virtual hard drive, that lets you add or delete files. if you entered the command, ’erase flash’, it would be like formatting that hard drive and wipe out all files and all data. the command ’erase flash *.*’ is not a valid cisco command. by its very definition, flash is electronically erasable.

  54 cisco routers can load a particular image of the cisco ios from flash. which command listed below will cause the router to load ’c2500-11-3.bin’ from flash at next boot? a.) boot system c2500-11-3.bin b.) boot system flash c2500-11-3.bin c.) you can not have more the one ios image in flash. d.) boot system file c2500-11-3.bin e.) boot system rom

  b router(config)#boot system flash ? word configuration filename

  55 what is the regional telco office called, where the customers local loop terminates? a.) cpe b.) dce c.) demarc d.) co e.) dte

  d the central office (co) is the telephone company (telco) location nearest you.

  56 which protocol resolves an ip address to a mac address? a.) dns b.) dhcp c.) arp d.) rarp e.) nbp

  c the address resolution protocol (arp) sends out a broadcast to determine the mac address from the ip address.

  rfb2

  640-407

  round 2 enjoy.

  1. which isdn specification deals with call setup and teardown? a.) j-series b.) f-series c.) q-series d.) i- series e.) world series

  c the 2 most important isdn specifications are q & i: q = call setup and teardown. i = concepts and terminology.

  2. which command will set a routers network name to ’myrouter’? a.) network name myrouter b.) display myrouter c.) hostname myrouter d.) name myrouter e.) network myrouter

  c

  3. when a distance vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. this is an example of which routing technology? a.) only link state routing protocols have this intelligence. b.) poison reverse. c.) triggered updates. d.) garrison-4. e.) icmp. f.) split horizon.

  b instead of just removing the route from the routing update, poison reverse sets the distance to ’infinity’ (for ip rip this is a hop count of 16). this immediately makes the route invalid for all neighboring routers.

  4 what is the standard isdn term for a native isdn modem? a.) te3 b.) et c.) le d.) te2 e.) ta

  e the marketing term ’isdn modem’ was created to help sell the isdn idea to america. there is no such thing as an analog modulator demodulator for digital isdn. the terminal adapter (ta) allows you to connect a pc to a digital isdn line directly. in the real world, isdn is digital, modems are analog.

  5 which of the following are transport layer protocols? (3 answers) a.) nfs b.) spx c.) udp d.) tcp e.) ip

  b c d

  6. which command would configure interface e0 with an ip address of 12.23.4.5 using a subnet mask of 255.255.255.0 ? a.) that is an invalid mask for a class ’a’ address b.) ip address 12.23.4.5 /24 c.) ip address 12.23.4.5 255.255.255.0 d.) ip address 12.23.4.5 mask 255.255.255.0 e.) ip address 12.23.4.5 mask ff:ff:ff:0

  c you can change the way the mask is displayed (bitcount, decimal, hex) but you must enter the subnet mask in dotted decimal. router(config-if)#ip address 12.23.4.5 ? a.b.c.d ip subnet mask

  7. given the ip address 148.90.109.120 with a mask 255.255.255.240. which subnet is this address on? a.) 148.90.109.96 b.) 148.90.109.128 c.) 148.90.109.0 d.) 148.90.109.112 e.) 148.90.109.64 f.) 148.90.109.116

  d with a mask of 255.255.255.240, it should be recognizable that the subnet is 148.90.109.?, the last octet is the hard part. magic number = 256 - subnet mask magic number = 256 - 240 = 16 subnets are multiples of the magic number: 16,32,48,64,80,96,112,128,144…. as close to 113 without going over is .. 112 so the answer is 148.90.109.112.

  8. the host address: ’’5c.0000.0ca1.4567’ is valid for which protocol stack? a.) sna b.) decnet c.) chaos d.) ip e.) appletalk f.) ipx

  f

  9. given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which portion represents the tcp/ip destination network? a.) 4.4.4.4 b.) route c.) 255.255.255.0 d.) 3.3.3.0 e.) 125

  d

  10. the physical layer works with which of the following: a.) segments b.) globules c.) frames d.) packets e.) bits

  e

  11. which commands will restart the router? a.) system restart b.) restart c.) shutdown system d.) reload e.) down f.) system exit

  d

  12. which of the following are examples of the session layer? (2 answers) a.) sql b.) tcp c.) nfs d.) token ring e.) llc

  a c controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain, and synchronize communications between applications. examples: sql, rfc, rpc, x-windows, netbios names 13. which command will display the data link connection identifiers (dlci’s)? (2 answers) a.) show version b.) show connection c.) show frame-relay pvc d.) show dlci e.) show running-config

  c e for ’show frame-relay pvc’ the permanent virtual circuit (pvc) descriptions also include the dlci numbers. note: ’show unning-config’ will only display dlcis if the frame-relay map statement is used for multi-point interfaces or if you use sub-interfaces. if you are using inverse-arp it will not show up in the running config.

  14 the datalink layer is broken down into 2 layers, llc and mac. the llc establishes media independence and what else?(2 ans) a.) rip updates. b.) the datalink layer does not have sublayers. c.) provides sap’s (service advertising protocol). d.) provides windowing. e.) provides flow control. f.) provides sap’s (service access points).

  e f osi layer-2 sap allows the upper layers to encapsulate multiple layer 3 protocols. ipx sap is a protocol used to advertise netware services every 60 seconds.

  15. which of the following is an example of the network layer? a.) ipx b.) llc c.) spx d.) token ring e.) sql

  a

  16. when calculating valid host address for tcp/ip, the host bits can not be all 1’s or all 0’s. which of the following is an invalid host address, using the subnet mask 255.255.255.192 ? a.) 200.1.1.161 b.) 200.1.1.127 c.) 200.1.1.65 d.) 200.1.1.66 e.) 200.1.1.129

  b in binary, mask .192 = 11000000 and host .127 = 01111111. for 200.1.1.127, all of the host bits are 1’s using that mask. router(config-if)#ip address 200.1.1.127 255.255.255.192 bad mask /26 for address 200.1.1.127

  17. novell netware has an ethernet frame type called ethernet_ii. what is the matching cisco command line keyword for this encapsulation method? a.) gns b.) snap c.) arpa d.) novell-ether e.) sap f.) dix

  c

  18 when setting up a frame-relay network between a cisco router and a non-cisco router, what encapsulation type should you use? a.) sap b.) cisco c.) q933a d.) iana e.) ietf f.) apollo

  e

  19 in regards to tcp/ip, which class of address allows for the fewest valid internet hosts? a.) a b.) classes are not used in tcp/ip. c.) e d.) d e.) c f.) b

  e

  20. which of the following are characteristics of udp? (5 answers) a.) udp is at the transport layer. b.) udp is connectionless. c.) udp is unreliable. d.) udp is used with tftp. e.) udp uses no acknowledgements. f.) udp is connection oriented.

  a b c d e

  21 when determining whether or not to route a lan segment, which rule of thumb do you use? a.) 70/30 b.) 80/20 c.) 60/40 d.) 50/50 e.) 90/10

  a the industry standard rule is 80/20, which means 80% local, 20% over the router. however, according to cisco’s online documentation, the answer is 70/30. this makes sense, considering more and more traffic is starting to go from the desktop to an ulimate destination outside the local are network, such as the internet.

  22. for ipx, what is the default cisco encapsulation on an ethernet interface? a.) dix b.) sap c.) gns d.) arpa e.) novell-ether f.) snap

  e

  23 which command will display the ipx routing table? a.) show routes protocol=ipx b.) show ipx c.) show ipx route d.) show routes ipx e.) show routes

  c

  24 which of the following are examples of the transport layer? (2 answers) a.) tcp b.) token ring c.) ip d.) udp e.) llc f.) sql

  a d

  25 which command allows a user to see previous commands? (3 answers) a.) show command b.) ctrl-u c.) shift-ctrl-6 d.) ctrl-p e.) show history f.) up arrow

  d e f

  26. you would like to back up an image of the ios file that is currently on your router. you have a window 95 machine running a tftp-server program. assuming that you have network connectivity between the router and the tftp-server, what is the command to backup the ios to the windows 95 machine running tftp? a.) write flash b.) copy tftp flash c.) tftp flash: d.) write enable e.) ftp flash: f.) copy flash tftp

  f

  27 the internet protocol (ip) occurs at what layer of the seven layer model? a.) transport b.) presentation c.) physical d.) datalink e.) network f.) session

  e ip is a routed protocol that occurs at layer 3. other layer 3 protocols include ipx, appletalk, and decnet.

  28. a user device that connects to a dce must be which of the following? a.) demarc b.) cpe c.) dte d.) co e.) dce

  c dte’s are the router side, and receive clocking. dce’s are the dsu/csu side, and provide clocking.

  29 which of the following will allow for 14 hosts per subnet on network 200.1.1.0 ? (3 answers) a.) 200.1.1.0 255.255.255.240 b.) 200.1.1.0 with 4 bits of subnetting c.) 200.1.1.0 255.255.255.248 d.) 200.1.1.0 with 5 bits of subnetting e.) 200.1.1.0 /27 f.) 200.1.1.0 /28

  a b f there are multiple ways to represent that you need 28 bits of subnetting. shorthand /28 = 4 bits = 255.255.255.240 decimal. shortcut: you need 4 bits for the host because 2^4 - 2 = 14 magic number alternate method ------------------- magic numbers are powers of 2. for example: 2,4,8,16,32,64,128 the number of hosts on a subnet is two less than the magic number. to get 14 hosts, the magic number would need to be 16.

  256-magic number = interesting octect of subnet mask 256- 16 =240 so mask is 255.255.255.240

  30. what is a characteristic of store and forward switches? a.) they work at wire speed. b.) they forward the frame before it is completely read. c.) they are the same as cut-through switching in ’prune’ mode. d.) they increase latency. e.) they forward based on transport layer info. d 31. the network portion of an address typically represents a: a.) router b.) computer c.) ethernet mac address. d.) segment e.) host

  d every network segment is represented by a network or subnetwork address.

  32 which device listed below provides clocking for the line? a.) dte b.) co c.) dce d.) demarc e.) cpe

  c the data circuit-terminating equipment (dce) is responsible for providing the clocking on the wire. hint: when you see the ’c’ in ’dce’, think ’clocking’

  33. how do you set the encapsulation type to ppp for an interface? a.) ppp ietf b.) encapsulation ppp c.) ppp enable d.) ppp cisco e.) enable ppp

  b

  34 what would the command ’terminal no editing’ do? a.) nothing. b.) turn exec mode off. c.) prevent terminal configuration. d.) turn off enhanced editing. e.) prevents update to ram.

  d

  35 how do you view the routers current processor utilization? a.) show cpu b.) show startup-config c.) show version d.) show utilization e.) show running-config f.) show processes cpu

  f router#sh processes cpu cpu utilization for five seconds: 2%/2%; one minute: 1%; five minutes: 0%

  36 which standard ip access list commands will deny only the source address 1.1.1.1? a.) access-list 9 permit 1.1.1.1 255.255.255.0 b.) access-list 9 permit any c.) access-list 9 deny 1.1.1.1 0.0.0.0 d.) access-list 9 permit 1.1.1.1 0.255.255.255 e.) access-list 9 deny 1.1.1.1 255.255.255.255

  c a 0.0.0.0 wildcard mask means check every bit and make sure that it matches. for our example, the ip host address 1.1.1.1 is a specific address to check on the network. an alternative would be to use the ip network address and a special access-list wildcard mask to check an entire subnetwork.

  37 what should be the first command to create an extended access-list that denies host 1.1.1.1 from telnetting anywhere? a.) access-list 10 deny tcp host 1.1.1.1 any eq 20 b.) access-list 10 deny tcp host 1.1.1.1 any eq 22 c.) access-list 10 deny tcp host 1.1.1.1 any eq 23 d.) none of the above are correct. e.) access-list 10 deny tcp host 1.1.1.1 any eq 24 f.) access-list 10 deny tcp host 1.1.1.1 any eq 21

  d this was a trick question. extended access-lists for tcp/ip must be in the range 100-199. watch those access-list numbers!

  38 there are 2 types of ppp authentication supported by the cisco ios. what are they? (2 answers) a.) stacker b.) chap c.) kermit d.) predictor e.) pap f.) md5

  b e

  39 what type of switching creates variable latency through the switch? a.) multiplexed b.) cut-through c.) layer 4 d.) store and forward e.) inverted

  d definition: latency = delay.because a store and forward switch reads the whole frame before forwarding, a larger frame takes longer than a shorter frame.

  40. given the global configuration commands: ’banner motd #’ ’hello #’ when would the message be displayed? a.) message of the day banners are not possible. b.) the message of the day banner shows up before login. c.) these commands are not the right syntax for motd. d.) message of the day banners are displayed upon entering global config mode. e.) the message of the day banner shows up during logoff. f.) the message of the day would be, ’hello #’

  b

  41 which command enables frame relay on a router’s interface? a.) map wan type=7 b.) encapsulation frame-relay c.) frame-relay enable d.) interface frame-relay e.) cisco encap f.) enable frame-relay

  b

  42 which subnet is the host 200.1.1.99 /27 on? a.) 200.1.1.0 b.) 200.1.1.96 c.) 200.1.1.128 d.) 200.1.1.64 e.) 200.1.1.16

  b the shorthand notation /27 = 3 bits in the last octet = decimal 255.255.255.224 shortcut: 256 - 224 = 32. valid subnets are multiples of 32 (32,64,96,128, etc). shortcut #2: because it’s a small slice and a big number, who wants to count up every 32 digits to find the next subnetwork address? just divide 99 / 32 = 3 times. now, take 3 x 32 slices = 96, so 99 is on the network 96.

  43 which command will start the process for a cisco ios file image upgrade? a.) network b.) copy tftp flash c.) download flash d.) copy flash tftp e.) download b 44 which of the following would be displayed by the command ’show cdp neighbor detail’? (4 answers) a.) amount of flash memory available b.) the routers hostname. c.) one address per protocol. d.) the subnet mask, if ip is configured. e.) the hardware platform. f.) the incoming/outgoing port.

  b c e f cdp shows a lot of the same info that ’show version’ does locally, but flash memory is not part of it. the ’detail’ keyword is optional, but even when used, ip subnet mask information is not displayed by cdp for ip interfaces.

  45 what is the access-list wild card mask to match the range 100.1.16.0 - 100.1.31.255 ? a.) 0.0.15.255 b.) 0.0.7.255 c.) 0.0.31.255 d.) 0.31.255.255 e.) 0.0.255.255

  a access-list wildcard masks are the inverse of subnet masks. shortcut: take the the broadcast and subtract from the network. 100.1.31.255 - 100.1.16.0 ---------------- 0.0.15.255

  46 the cisco discovery protocol (cdp) periodically sends out a multicast packet (at layer 2). which command will alter the default interval of 60 seconds? a.) cdp 111 b.) cdp hold 111 c.) cdp timer 111 d.) cdp wait 111 e.) cdp interval 111

  c

  47 what command would configure a cisco router to ’round robin load balance’ over paths of equal metric? a.) ipx round-robin b.) ipx rip c.) ipx nlsp d.) there is no such thing as ’round robin load balance’. e.) ipx gns-round-robin f.) ipx maximum-paths

  f

  48 what does the parameter -- log -- do on an ipx access list? a.) logs the creation of the access list. b.) logs ipx access control list violations whenever a packet matches a particular access list entry. c.) ensures the ipx protocol places a log in the fireplace. d.) the log keyword is not a valid option. e.) read the log to figure out what traffic to deny.

  b

  49 after the command -- router rip -- what command would enable rip on the router for interface e0, with an address of 157.89.4.4 and mask of 255.255.255.0 ? a.) network 157.89.0.0 b.) router rip 157.89.4.0 c.) router rip int e0 d.) router rip 157.89.0.0 e.) router rip * f.) network 157.89.4.0 255.255.255.0

  a ripv1 cannot use subnet mask information. ripv1 can only use the classful network portion, which in this case is a class b. so for our example, rip can only enumerate the ’157.89’ part. all interfaces in that network will be processed.

  50 which command will enable debugging for ipx rip updates? a.) debug ipx packets b.) debug ipx rip c.) debug ipx d.) debug rip e.) debug ipx routing activity

  e

  51 what is the correct command line syntax for configuring a port on a 7000 or 7500 series cisco router with a vip card? a.) port adapter/port b.) slot c.) slot/port-adapter/port d.) slot/port e.) you can’t put a vip card in a 7000 or 7500 router. f.) port

  c the vip cards have a port adapter, so you must also specify them as well. the syntax for a vip card is: ’interface serial slot/port-adapter/port’, where: slot = the big linecard slot # in the 7500 chassis, port-adapter = the pa mini-card slot # inside the larger linecard slot, port = the interface port # on the pa mini-card. imagine a larger slot (the linecard slot of the chassis) that in turn has two additional smaller slots for mini-cards (the vip pa slots).

  52 which of the following describe smtp? (2 answers) a.) used for managing ip devices. b.) uses icmp c.) uses tcp. d.) used for downloading files to the router. e.) uses udp. f.) used for sending e-mail.

  c f send / simple (depending on literature) mail transport protocol (smtp) is used for delivering mail to other mail servers. it uses port 25, and relies on tcp.

  53 what are the valid host id’s for 161.37.2.50 /28 (12 bits of subnetting)? a.) 161.37.2.49 - 161.37.2.63 b.) 161.37.0.0 - 161.37.255.254 c.) 161.37.2.48 - 161.37.2.63 d.) 161.37.2.0 - 161.37.2.254 e.) 161.37.2.49 - 161.37.2.62

  e below is a very easy to use shortcut that requires no binary math: figure out the mask: /28 = 255.255.255.240 figure out the subnet multiple: 256-240=16 subnets are: 16,32,48,64,80, etc this is subnet 48, the next subnet is 64, so the broadcast address is 63. everything between the subnet (48) and broadcast (63) are the valid hosts. in this example, based on the given mask, the valid host ranges are 49-62.

  54 which layer of the 7 layer model provides services to the application layer over the session layer connection? a.) transport b.) presentation c.) session d.) network e.) application f.) datalink

  b

  55 which osi reference layer controls application to application communication? a.) transport b.) session c.) physical d.) network e.) datalink

  b the session layer controls a conversation between applications. the transport layer controls communications between hosts.

  56 there is an emergency fall-back ’skeleton’ ios stored in read only memory on all cisco routers. what command would make the router load the ios from read only memory? a.) load ios rom b.) bootsystem skeleton c.) boot system rom d.) load ios bootflash e.) reload rom

  c

  1. which isdn specification deals with call setup and teardown? a.) j-series b.) f-series c.) q-series d.) i- series e.) world series

  c the 2 most important isdn specifications are q & i: q = call setup and teardown. i = concepts and terminology.

  2. which command will set a routers network name to ’myrouter’? a.) network name myrouter b.) display myrouter c.) hostname myrouter d.) name myrouter e.) network myrouter

  c

  3. when a distance vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. this is an example of which routing technology? a.) only link state routing protocols have this intelligence. b.) poison reverse. c.) triggered updates. d.) garrison-4. e.) icmp. f.) split horizon.

  b instead of just removing the route from the routing update, poison reverse sets the distance to ’infinity’ (for ip rip this is a hop count of 16). this immediately makes the route invalid for all neighboring routers.

  4 what is the standard isdn term for a native isdn modem? a.) te3 b.) et c.) le d.) te2 e.) ta

  e the marketing term ’isdn modem’ was created to help sell the isdn idea to america. there is no such thing as an analog modulator demodulator for digital isdn. the terminal adapter (ta) allows you to connect a pc to a digital isdn line directly. in the real world, isdn is digital, modems are analog.

  5 which of the following are transport layer protocols? (3 answers) a.) nfs b.) spx c.) udp d.) tcp e.) ip

  b c d

  6. which command would configure interface e0 with an ip address of 12.23.4.5 using a subnet mask of 255.255.255.0 ? a.) that is an invalid mask for a class ’a’ address b.) ip address 12.23.4.5 /24 c.) ip address 12.23.4.5 255.255.255.0 d.) ip address 12.23.4.5 mask 255.255.255.0 e.) ip address 12.23.4.5 mask ff:ff:ff:0

  c you can change the way the mask is displayed (bitcount, decimal, hex) but you must enter the subnet mask in dotted decimal. router(config-if)#ip address 12.23.4.5 ? a.b.c.d ip subnet mask

  7. given the ip address 148.90.109.120 with a mask 255.255.255.240. which subnet is this address on? a.) 148.90.109.96 b.) 148.90.109.128 c.) 148.90.109.0 d.) 148.90.109.112 e.) 148.90.109.64 f.) 148.90.109.116

  d with a mask of 255.255.255.240, it should be recognizable that the subnet is 148.90.109.?, the last octet is the hard part. magic number = 256 - subnet mask magic number = 256 - 240 = 16 subnets are multiples of the magic number: 16,32,48,64,80,96,112,128,144…. as close to 113 without going over is .. 112 so the answer is 148.90.109.112.

  8. the host address: ’’5c.0000.0ca1.4567’ is valid for which protocol stack? a.) sna b.) decnet c.) chaos d.) ip e.) appletalk f.) ipx

  f

  9. given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which portion represents the tcp/ip destination network? a.) 4.4.4.4 b.) route c.) 255.255.255.0 d.) 3.3.3.0 e.) 125

  d

  10. the physical layer works with which of the following: a.) segments b.) globules c.) frames d.) packets e.) bits

  e

  11. which commands will restart the router? a.) system restart b.) restart c.) shutdown system d.) reload e.) down f.) system exit

  d

  12. which of the following are examples of the session layer? (2 answers) a.) sql b.) tcp c.) nfs d.) token ring e.) llc

  a c controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain, and synchronize communications between applications. examples: sql, rfc, rpc, x-windows, netbios names 13. which command will display the data link connection identifiers (dlci’s)? (2 answers) a.) show version b.) show connection c.) show frame-relay pvc d.) show dlci e.) show running-config

  c e for ’show frame-relay pvc’ the permanent virtual circuit (pvc) descriptions also include the dlci numbers. note: ’show unning-config’ will only display dlcis if the frame-relay map statement is used for multi-point interfaces or if you use sub-interfaces. if you are using inverse-arp it will not show up in the running config.

  14 the datalink layer is broken down into 2 layers, llc and mac. the llc establishes media independence and what else?(2 ans) a.) rip updates. b.) the datalink layer does not have sublayers. c.) provides sap’s (service advertising protocol). d.) provides windowing. e.) provides flow control. f.) provides sap’s (service access points).

  e f osi layer-2 sap allows the upper layers to encapsulate multiple layer 3 protocols. ipx sap is a protocol used to advertise netware services every 60 seconds.

  15. which of the following is an example of the network layer? a.) ipx b.) llc c.) spx d.) token ring e.) sql

  a

  16. when calculating valid host address for tcp/ip, the host bits can not be all 1’s or all 0’s. which of the following is an invalid host address, using the subnet mask 255.255.255.192 ? a.) 200.1.1.161 b.) 200.1.1.127 c.) 200.1.1.65 d.) 200.1.1.66 e.) 200.1.1.129

  b in binary, mask .192 = 11000000 and host .127 = 01111111. for 200.1.1.127, all of the host bits are 1’s using that mask. router(config-if)#ip address 200.1.1.127 255.255.255.192 bad mask /26 for address 200.1.1.127

  17. novell netware has an ethernet frame type called ethernet_ii. what is the matching cisco command line keyword for this encapsulation method? a.) gns b.) snap c.) arpa d.) novell-ether e.) sap f.) dix

  c

  18 when setting up a frame-relay network between a cisco router and a non-cisco router, what encapsulation type should you use? a.) sap b.) cisco c.) q933a d.) iana e.) ietf f.) apollo

  e

  19 in regards to tcp/ip, which class of address allows for the fewest valid internet hosts? a.) a b.) classes are not used in tcp/ip. c.) e d.) d e.) c f.) b

  e

  20. which of the following are characteristics of udp? (5 answers) a.) udp is at the transport layer. b.) udp is connectionless. c.) udp is unreliable. d.) udp is used with tftp. e.) udp uses no acknowledgements. f.) udp is connection oriented.

  a b c d e

  21 when determining whether or not to route a lan segment, which rule of thumb do you use? a.) 70/30 b.) 80/20 c.) 60/40 d.) 50/50 e.) 90/10

  a the industry standard rule is 80/20, which means 80% local, 20% over the router. however, according to cisco’s online documentation, the answer is 70/30. this makes sense, considering more and more traffic is starting to go from the desktop to an ulimate destination outside the local are network, such as the internet.

  22. for ipx, what is the default cisco encapsulation on an ethernet interface? a.) dix b.) sap c.) gns d.) arpa e.) novell-ether f.) snap

  e

  23 which command will display the ipx routing table? a.) show routes protocol=ipx b.) show ipx c.) show ipx route d.) show routes ipx e.) show routes

  c

  24 which of the following are examples of the transport layer? (2 answers) a.) tcp b.) token ring c.) ip d.) udp e.) llc f.) sql

  a d

  25 which command allows a user to see previous commands? (3 answers) a.) show command b.) ctrl-u c.) shift-ctrl-6 d.) ctrl-p e.) show history f.) up arrow

  d e f

  26. you would like to back up an image of the ios file that is currently on your router. you have a window 95 machine running a tftp-server program. assuming that you have network connectivity between the router and the tftp-server, what is the command to backup the ios to the windows 95 machine running tftp? a.) write flash b.) copy tftp flash c.) tftp flash: d.) write enable e.) ftp flash: f.) copy flash tftp

  f

  27 the internet protocol (ip) occurs at what layer of the seven layer model? a.) transport b.) presentation c.) physical d.) datalink e.) network f.) session

  e ip is a routed protocol that occurs at layer 3. other layer 3 protocols include ipx, appletalk, and decnet.

  28. a user device that connects to a dce must be which of the following? a.) demarc b.) cpe c.) dte d.) co e.) dce

  c dte’s are the router side, and receive clocking.dce’s are the dsu/csu side, and provide clocking.

  29 which of the following will allow for 14 hosts per subnet on network 200.1.1.0 ? (3 answers) a.) 200.1.1.0 255.255.255.240 b.) 200.1.1.0 with 4 bits of subnetting c.) 200.1.1.0 255.255.255.248 d.) 200.1.1.0 with 5 bits of subnetting e.) 200.1.1.0 /27 f.) 200.1.1.0 /28

  a b f there are multiple ways to represent that you need 28 bits of subnetting. shorthand /28 = 4 bits = 255.255.255.240 decimal. shortcut: you need 4 bits for the host because 2^4 - 2 = 14 magic number alternate method ------------------- magic numbers are powers of 2. for example: 2,4,8,16,32,64,128 the number of hosts on a subnet is two less than the magic number. to get 14 hosts, the magic number would need to be 16.

  256-magic number = interesting octect of subnet mask 256- 16 =240 so mask is 255.255.255.240

  30. what is a characteristic of store and forward switches? a.) they work at wire speed. b.) they forward the frame before it is completely read. c.) they are the same as cut-through switching in ’prune’ mode. d.) they increase latency. e.) they forward based on transport layer info. d

  31. the network portion of an address typically represents a: a.) router b.) computer c.) ethernet mac address. d.) segment e.) host

  d every network segment is represented by a network or subnetwork address.

  32 which device listed below provides clocking for the line? a.) dte b.) co c.) dce d.) demarc e.) cpe

  c the data circuit-terminating equipment (dce) is responsible for providing the clocking on the wire. hint: when you see the ’c’ in ’dce’, think ’clocking’

  33. how do you set the encapsulation type to ppp for an interface? a.) ppp ietf b.) encapsulation ppp c.) ppp enable d.) ppp cisco e.) enable ppp

  b

  34 what would the command ’terminal no editing’ do? a.) nothing. b.) turn exec mode off. c.) prevent terminal configuration. d.) turn off enhanced editing. e.) prevents update to ram.

  d

  35 how do you view the routers current processor utilization? a.) show cpu b.) show startup-config c.) show version d.) show utilization e.) show running-config f.) show processes cpu

  f router#sh processes cpu cpu utilization for five seconds: 2%/2%; one minute: 1%; five minutes: 0%

  36 which standard ip access list commands will deny only the source address 1.1.1.1? a.) access-list 9 permit 1.1.1.1 255.255.255.0 b.) access-list 9 permit any c.) access-list 9 deny 1.1.1.1 0.0.0.0 d.) access-list 9 permit 1.1.1.1 0.255.255.255 e.) access-list 9 deny 1.1.1.1 255.255.255.255

  c a 0.0.0.0 wildcard mask means check every bit and make sure that it matches. for our example, the ip host address 1.1.1.1 is a specific address to check on the network. an alternative would be to use the ip network address and a special access-list wildcard mask to check an entire subnetwork.

  37 what should be the first command to create an extended access-list that denies host 1.1.1.1 from telnetting anywhere? a.) access-list 10 deny tcp host 1.1.1.1 any eq 20 b.) access-list 10 deny tcp host 1.1.1.1 any eq 22 c.) access-list 10 deny tcp host 1.1.1.1 any eq 23 d.) none of the above are correct. e.) access-list 10 deny tcp host 1.1.1.1 any eq 24 f.) access-list 10 deny tcp host 1.1.1.1 any eq 21

  d this was a trick question. extended access-lists for tcp/ip must be in the range 100-199. watch those access-list numbers!

  38 there are 2 types of ppp authentication supported by the cisco ios. what are they? (2 answers) a.) stacker b.) chap c.) kermit d.) predictor e.) pap f.) md5

  b e

  39 what type of switching creates variable latency through the switch? a.) multiplexed b.) cut-through c.) layer 4 d.) store and forward e.) inverted

  d definition: latency = delay.because a store and forward switch reads the whole frame before forwarding, a larger frame takes longer than a shorter frame.

  40. given the global configuration commands: ’banner motd #’ ’hello #’ when would the message be displayed? a.) message of the day banners are not possible. b.) the message of the day banner shows up before login. c.) these commands are not the right syntax for motd. d.) message of the day banners are displayed upon entering global config mode. e.) the message of the day banner shows up during logoff. f.) the message of the day would be, ’hello #’

  b

  41 which command enables frame relay on a router’s interface? a.) map wan type=7 b.) encapsulation frame-relay c.) frame-relay enable d.) interface frame-relay e.) cisco encap f.) enable frame-relay

  b

  42 which subnet is the host 200.1.1.99 /27 on? a.) 200.1.1.0 b.) 200.1.1.96 c.) 200.1.1.128 d.) 200.1.1.64 e.) 200.1.1.16

  b the shorthand notation /27 = 3 bits in the last octet = decimal 255.255.255.224 shortcut: 256 - 224 = 32. valid subnets are multiples of 32 (32,64,96,128, etc). shortcut #2: because it’s a small slice and a big number, who wants to count up every 32 digits to find the next subnetwork address? just divide 99 / 32 = 3 times. now, take 3 x 32 slices = 96, so 99 is on the network 96.

  43 which command will start the process for a cisco ios file image upgrade? a.) network b.) copy tftp flash c.) download flash d.) copy flash tftp e.) download b 44 which of the following would be displayed by the command ’show cdp neighbor detail’? (4 answers) a.) amount of flash memory available b.) the routers hostname. c.) one address per protocol. d.) the subnet mask, if ip is configured. e.) the hardware platform. f.) the incoming/outgoing port.

  b c e f cdp shows a lot of the same info that ’show version’ does locally, but flash memory is not part of it. the ’detail’ keyword is optional, but even when used, ip subnet mask information is not displayed by cdp for ip interfaces.

  45 what is the access-list wild card mask to match the range 100.1.16.0 - 100.1.31.255 ? a.) 0.0.15.255 b.) 0.0.7.255 c.) 0.0.31.255 d.) 0.31.255.255 e.) 0.0.255.255

  a access-list wildcard masks are the inverse of subnet masks. shortcut: take the the broadcast and subtract from the network. 100.1.31.255 - 100.1.16.0 ---------------- 0.0.15.255

  46 the cisco discovery protocol (cdp) periodically sends out a multicast packet (at layer 2). which command will alter the default interval of 60 seconds? a.) cdp 111 b.) cdp hold 111 c.) cdp timer 111 d.) cdp wait 111 e.) cdp interval 111

  c

  47 what command would configure a cisco router to ’round robin load balance’ over paths of equal metric? a.) ipx round-robin b.) ipx rip c.) ipx nlsp d.) there is no such thing as ’round robin load balance’. e.) ipx gns-round-robin f.) ipx maximum-paths

  f

  48 what does the parameter -- log -- do on an ipx access list? a.) logs the creation of the access list. b.) logs ipx access control list violations whenever a packet matches a particular access list entry. c.) ensures the ipx protocol places a log in the fireplace. d.) the log keyword is not a valid option. e.) read the log to figure out what traffic to deny.

  b

  49 after the command -- router rip -- what command would enable rip on the router for interface e0, with an address of 157.89.4.4 and mask of 255.255.255.0 ? a.) network 157.89.0.0 b.) router rip 157.89.4.0 c.) router rip int e0 d.) router rip 157.89.0.0 e.) router rip * f.) network 157.89.4.0 255.255.255.0

  a ripv1 cannot use subnet mask information. ripv1 can only use the classful network portion, which in this case is a class b. so for our example, rip can only enumerate the ’157.89’ part. all interfaces in that network will be processed.

  50 which command will enable debugging for ipx rip updates? a.) debug ipx packets b.) debug ipx rip c.) debug ipx d.) debug rip e.) debug ipx routing activity

  e

  51 what is the correct command line syntax for configuring a port on a 7000 or 7500 series cisco router with a vip card? a.) port adapter/port b.) slot c.) slot/port-adapter/port d.) slot/port e.) you can’t put a vip card in a 7000 or 7500 router. f.) port

  c the vip cards have a port adapter, so you must also specify them as well. the syntax for a vip card is: ’interface serial slot/port-adapter/port’, where: slot = the big linecard slot # in the 7500 chassis, port-adapter = the pa mini-card slot # inside the larger linecard slot, port = the interface port # on the pa mini-card. imagine a larger slot (the linecard slot of the chassis) that in turn has two additional smaller slots for mini-cards (the vip pa slots).

  52 which of the following describe smtp? (2 answers) a.) used for managing ip devices. b.) uses icmp c.) uses tcp. d.) used for downloading files to the router. e.) uses udp. f.) used for sending e-mail.

  c f send / simple (depending on literature) mail transport protocol (smtp) is used for delivering mail to other mail servers. it uses port 25, and relies on tcp.

  53 what are the valid host id’s for 161.37.2.50 /28 (12 bits of subnetting)? a.) 161.37.2.49 - 161.37.2.63 b.) 161.37.0.0 - 161.37.255.254 c.) 161.37.2.48 - 161.37.2.63 d.) 161.37.2.0 - 161.37.2.254 e.) 161.37.2.49 - 161.37.2.62

  e below is a very easy to use shortcut that requires no binary math: figure out the mask: /28 = 255.255.255.240 figure out the subnet multiple: 256-240=16 subnets are: 16,32,48,64,80, etc this is subnet 48, the next subnet is 64, so the broadcast address is 63. everything between the subnet (48) and broadcast (63) are the valid hosts. in this example, based on the given mask, the valid host ranges are 49-62.

  54 which layer of the 7 layer model provides services to the application layer over the session layer connection? a.) transport b.) presentation c.) session d.) network e.) application f.) datalink

  b

  55 which osi reference layer controls application to application communication? a.) transport b.) session c.) physical d.) network e.) datalink

  b the session layer controls a conversation between applications. the transport layer controls communications between hosts.

  56 there is an emergency fall-back ’skeleton’ ios stored in read only memory on all cisco routers. what command would make the router load the ios from read only memory? a.) load ios rom b.) bootsystem skeleton c.) boot system rom d.) load ios bootflash e.) reload rom

  c

  hope this helps. it helped me study for the ccna.

  1. what are the valid host id’s for 222.37.2.50 /24 ? a.) 222.37.2.48 - 222.37.2.66 b.) 222.37.2.49 - 222.37.2.62 c.) 222.37.2.0 - 222.37.2.255 d.) 222.37.0.0 - 222.37.255.254 e.) 222.37.2.1 - 222.37.2.254

  d

  2. which commands listed below will move you from interface configuration mode back to global configuration mode? a.) ctl z b.) ctl f c.) exit d.) global e.) config t

  c ctrl-z and ctrl-c will abort you back to the root. exit goes back one level.

  3. you have a unix server running the tftp daemon. what is the command to load a configuration file from the tftp server into the routers ram? a.) copy tftp ram b.) copy tftp running-config c.) read tftp d.) copy tftp startup-config e.) copy tftp nvram

  b remember ram = running-config. all changes to ram are immediate!

  4. given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which portion represents the next hop tcp/ip address? a.) 125 b.) 3.3.3.0 c.) 255.255.255.0 d.) route e.) 4.4.4.4

  e router(config)#ip route 3.3.3.0 255.255.255.0 ? a.b.c.d forwarding router’s address

  5. in regards to the isdn bri standard, which channel is used for control? a.) e b.) q c.) d d.) i e.) b

  c b is bearer for data (2 channels at 64kb each). d is for control (16kb).

  6. which distance vector characteristic can help to speed up convergence? a.) inverse arp. b.) poison reverse. c.) triggered updates. d.) split horizon. e.) hold down timers.

  c instead of waiting on a pre-set periodic interval (before sending the routing table), dv routing protocols can send triggered updates to immediately notify the neighbor routers. hold down timers, poison reverse, and split horizon are features that are used to avoid routing loops.

  7. what command would show the current configuration register settings? a.) show running-config b.) show startup-config c.) show nvram d.) show ram e.) show version f.) show ios

  e for most routers the configuration register settings are: 0x2102 normal operation (parse nvram at startup), or 0x2142 password recovery (ignore nvram during startup).

  8. what would the following command do?: ’show frame-relay pvc’ a.) display lmi info. b.) the command is incomplete, and would be ignored. c.) display all configured dlci’s. d.) debug a frame-relay problem. e.) show virtual links.

  c the permament virtual circuit (pvc) info is displayed along with the data link connection identifiers (dlci)’s.

  9. which of the following are examples of the session layer? (3 answers) a.) sql b.) nfs c.) ip d.) tcp e.) netbios names f.) token ring

  a b e controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain, and synchronize communications between applications. examples: sql, rfc, rpc, x-windows, netbios names layer 5 of the osi reference model.

  10. when editing a line in the cli mode, what does ’ctrl-p’ do? a.) moves you to the next word. b.) moves you to the next command. c.) moves you to the end of the line. d.) moves you to the beginning of the line. e.) moves you to the previous command.

  e

  11. the internet control message protocol occurs at what layer of the seven layer model? a.) physical b.) session c.) datalink d.) network e.) presentation f.) transport

  d icmp is used for error handling and testing at layer 3. ping and traceroute are examples of icmp. network layerprovides path determination using a hierarchal logical address defined with a network portion and node portion, net.node.examples: ip, ipx.

  12. which command listed below enables load balancing over two multiple paths for ipx on a cisco router? a.) ipx routing 2 b.) ipx round-robin 2 c.) ipx maximum-paths 2 d.) ipx rip 2 e.) ipx sap 2 f.) ipx gns 2

  c the default ipx routing protocol is ipx-rip. by default, rip selects the best path, and keeps only one route in its routing table. the ’ipx maximum-paths’ command allows rip to load balance over up to 6 paths.

  13. which of the following is an example of the physical layer? a.) ip b.) llc c.) sql d.) ddp e.) ethernet

  e

  14. what class address is 193.1.3.4 ? a.) c b.) b c.) multi-cast d.) broadcast e.) a f.) d

  a

  15. novell netware has an ethernet frame type called ethernet_802.3. what is the matching cisco command line keyword for this encapsulation method? a.) arpa b.) snap c.) novell-ether d.) sap e.) dix f.) gns

  c novell 802.2 = sap (contains 802.2 llc headers) novell 802.3 = novell-ether (netware proprietary) ethernet_ii = arpa (the internet standard) snap = snap (field type set to ’aa’)

  16. what would be the first command from global configuration mode to perform the following: 1. enable igrp on the router for interface e0 2. tell igrp to use an address of 157.89.4.4 255.255.255.0 3. tell igrp to provide routing updates for as number 200? a.) router igrp 157.89.4.4 b.) network 157.89.4.0 255.255.255.1 c.) router igrp int e1 d.) router igrp 157.89.0.0 e.) network 157.89.4.0 f.) router igrp 200

  f. you have to specify which routing protocol first. for igrp you must also specify the autonomous system number. router(config)#router igrp ? <1-65535> autonomous system number

  17. from global configuration mode, which command will create subinterface #1 for serial 0? a.) int sub serial 0 b.) int serial 0 subinterface 1 c.) int ss 0 d.) int s0.1 point-to-point e.) int serial 0 subinterface 0 f.) int s0

  d. command syntax for creating sub-interfaces:

  18. the command ’ip host dallas 157.89.8.64’ maps the host name dallas with its ip address. what command would display all such mappings? a.) show dns b.) show dns entry dallas c.) show neighbors d.) show hosts e.) show ip table f.) show dns cache

  d router#show hosts host flags age type address(es) www.eku.edu (temp, ok) 0 ip 157.89.8.2 dallas (perm, ok) 0 ip 157.89.8.64 perm - permament static entries temp - temporary usually resolved via dns

  19. the command ’show running-config’ displays the configuration script in ram, but what other command could you use to show information about objects stored in ram? a.) show startup-config b.) show all c.) show config d.) debug ram e.) show buffers f.) show start

  e packets are stored in memory locations called buffers during periods when the router becomes over-loaded with other requests.

  20. which of the following are examples of the datalink layer? (2 answers) a.) sql b.) ip c.) mac d.) tcp e.) llc

  c e mac and llc are the sublayers of the datalink layer.

相关TAG标签
上一篇:CISCO模拟试题:CCNA考试自测题2
下一篇:CiscoCCNA考试56题
相关文章
图文推荐

关于我们 | 联系我们 | 广告服务 | 投资合作 | 版权申明 | 在线帮助 | 网站地图 | 作品发布 | Vip技术培训 | 举报中心

版权所有: 红黑联盟--致力于做实用的IT技术学习网站