Sie sind auf Seite 1von 10

Networking Assessment

1. Advantages of Ring Topology

Duration 60 Min

A. Token ring technology reduces the need of server or central hub to manage the workstation B. All nodes have equal opportunity to transmit the data C. If one node is disrupted then the whole network goes down D. It becomes difficult to add/remove nodes 2. 2) Disadvantages of Star Topology A. B. C. D. 3. If the hub fails, the whole system is dead. If the hub, switch, or concentrator fails, nodes attached are disabled. Easy to install and reconfigure. No disruptions to the network when connecting or removing devices.

Advantages of Bus Topology A. B. C. D. Easy to connect a computer or peripheral to a linear bus. If the network cable breaks, the entire network will be down. Terminators are required at both ends of the backbone cable. Requires less cable length than mesh or star topologies.

4.

When a station sends a transmission to the MAC address ff:ff:ff:ff:ff:ff, what type of transmission is it? A. B. C. D. Unicast Multicast Manycast Broadcast

5.

Which layer 1 device can be used to enlarge the area covered by a single LAN segment? A. B. C. D. Switch NIC Hub RJ45 transceiver

6.

Segmentation of a data stream happens at which layer of the OSI model? A. B. C. D. Physical Data Link Network Transport

7.

Which of the following describe the main router functions? (Choose two.) A. B. C. D. E. Packet switching Collision prevention Broadcast domain enlargement Internetwork communication Broadcast forwarding

8.

LAN switches operate at layer ___. Routers operate at layer ___. Ethernet hubs operate at layer ___. Word processing operates at layer ___. A. B. C. D. 3, 3, 1, 7 3, 2, 1, 4 3, 2, 1, 7 2, 3, 1, none

9.

Which of the following is not a cause of LAN congestion? A. B. C. D. Too many hosts in a broadcast domain Adding switches for connectivity to the network Broadcast storms Low bandwidth

10.

If a switch has 10 computers connected to it, with no VLANs present, how many broadcast and collision domains is the switch creating? A. B. C. D. No broadcast and one collision Ten broadcast and one collision One broadcast and ten collision One broadcast and no collision

11.

Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A. B. C. D. Layer 2 Layer 3 Layer 4 Layer 7

12.

Which of the following are types of flow control? (Choose all that apply.) A. B. C. D. E. Buffering Cut-through Windowing Congestion avoidance VLANs

13.

If a hub has seven computers connected to it, how many broadcast and collision domains is the hub creating? A. B. C. D. Seven broadcast and one collision Seven broadcast and Seven collision One broadcast and three collision One broadcast and one collision

14.

Which two statements are true about the operation of a full-duplex Ethernet network? A. There are no collisions in full-duplex mode. B. A dedicated switch port is required for each full-duplex node. C. Ethernet hub ports are preconfigured for full-duplex mode.

D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting. 15. When an HTTP document must be retrieved from a location other than the local machine, what layer of the OSI model must be accessed first? A. B. C. D. 16. Presentations Transport Application Network

Which layer of the OSI model offers three different modes of communication: simplex, half duplex, and full duplex? A. B. C. D. Presentation Transport Application Session

17.

Which of the following allows a router to respond to an ARP request that is intended for a remote host? A. B. C. D. E. Gateway DP Reverse ARP (RARP) Proxy ARP Inverse ARP (IARP) Address Resolution Protocol (ARP)

18.

You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS Information. Which protocol will you use to accomplish this? A. B. C. D. SMTP SNMP DHCP ARP

19.

What protocol is used to find the hardware address of a local device? A. B. C. D. E. RARP ARP IP ICMP BootP

20.

Which class of IP address provides a maximum of only 65534 host addresses per network ID? A. B. C. D. E. Class A Class B Class C Class D Class E

21.

Which of the following describe the DHCP Discover message? A. B. C. D. It uses FF:FF:FF:FF:FF:FF as a layer-2 broadcast. It uses Dns as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer-2 destination address.

22.

Which layer-4 protocol is used for a Telnet connection? A. B. C. D. E. IP TCP TCP/IP UDP ICMP

23.

Which of the following services use UDP? (Choose three.) A. B. C. D. E. F. DHCP SMTP SNMP FTP HTTP TFTP

24.

If you use either Telnet or FTP, what layer are you using to generate the data? A. B. C. D. Application Presentation Session Transport

25.

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? A. B. C. D. Application Host-to-Host Internet Network Access

26.

Which two of the following are private IP addresses? A. B. C. D. E. 12.0.0.1 168.172.19.39 172.31.14.36 192.33.194.30 192.168.24.43

27.

What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? A. B. C. D. Application Host-to-Host Internet Network Access

28.

What is the address range of a Class c network address in binary? A. B. C. D. 01xxxxxx 0xxxxxxx 10xxxxxx 110xxxxx

29.

Which of the following protocols uses both TCP and UDP? A. B. C. D. FTP SMTP Telnet DNS

30.

You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? A. B. C. D. E. F. 2 3 4 5 6 7

31.

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.240.0 subnet mask? A. B. C. D. E. F. 4094 4096 32766 254 14 62

32.

What is the sub-network address for a host with the IP address 200.89.103.68/20? A. B. C. D. 200.89.96.0 200.89.30.0 200.89.80.0 200.89.112.0

33.

The network address of 172.16.0.0/19 provides how many subnets and hosts? A. B. C. D. E. F. 7 subnets, 30 hosts each 7 subnets, 2,046 hosts each 7 subnets, 8,190 hosts each 8 subnets, 30 hosts each 8 subnets, 2,046 hosts each 8 subnets, 8,190 hosts each

34.

Which two statements describe the IP address 10.16.5.65/23? (Choose two.) A. B. C. D. E. The subnet address is 10.16.4.0 255.255.254.0. The lowest host address in the subnet is 10.16.4.1 255.255.254.0. The last valid host address in the subnet is 10.16.10.254 255.255.254.0. The broadcast address of the subnet is 10.16.5.255 255.255.254.0. The network is not subnetted.

35.

If a host on a network has the address 172.16.45.221/30, what is the subnetwork this host belongs to? A. B. C. D. E. 172.16.45.120 172.16.45.218 172.16.45.220 172.16.45.200 172.16.45.219

36. Which of the following is a layer 2 protocol used to maintain a loop-free network? E. F. G. H. VTP STP RIP CDP

37. What command will display the forward/filter table? A. B. C. D. show mac filter show run show mac address-table show mac filter-table

38. Which statement describes a spanning-tree network that has converged? A. B. C. D. All switch and bridge ports are in the forwarding state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are either blocking or looping.

39. What are the three distinct functions of layer 2 switching that increase available bandwidth on the network? (Choose three.) A. B. C. D. E. F. Address learning Routing Forwarding and filtering Creating network loops Loop avoidance IP addressing

40. Which of the following statements is true? A. A switch creates a single collision domain and a single broadcast domain. A router creates a single collision domain. B. A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain. C. A switch creates a single collision domain and separate broadcast domains. A router provides a separate broadcast domain as well. D. A switch creates separate collision domains and separate broadcast domains. A router provides E. Separate collision domains. 41. You need to configure a Catalyst switch so it can be managed remotely. Which of the following would you use to accomplish this task? A. Switch(configs)#int fa0/1 Switch(configs-if)#ip address 192.168.10.252 255.255.255.0 Switch(configs-if)#no shut B. Switch(configs)#int vlan 1 Switch(configs-if)#ip address 192.168.10.252 255.255.255.0 Switch(configs-if)#ip default-gateway 192.168.10.254 255.255.255.0 C. Switch(configs)#ip default-gateway 192.168.10.254 Switch(configs)#int vlan 1 Switch(configs-if)#ip address 192.168.10.252 255.255.255.0 Switch(configs-if)#no shut D. Switch(configs)#ip default-network 192.168.10.254 Switch(configs)#int vlan 1 Switch(configs-if)#ip address 192.168.10.252 255.255.255.0 Switch(configs-if)#no shut 42. Which of the following is true regarding VLANs? A. You must have at least two VLANs defined in every Cisco switched network. B. D.VTP is used to send VLAN information to switches in a configured VTP domain. C. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. D. You should not have more than 10 switches in the same VTP domain. 43. Which of the following protocols are used to configure trunking on a switch? (Choose two.) A. B. C. D. VLAN Trunk Protocol VLAN 802.1Q ISL

44. What VTP mode allows you to change VLAN information on the switch? A. B. C. D. Client STP Server Transparent

45. Which statement is true regarding classless routing protocols? (Choose two.) A. B. C. D. E. The use of discontiguous networks is not allowed. The use of variable length subnet masks is permitted. RIPv1 is a classless routing protocol. IGRP supports classless routing within the same autonomous system. RIPv2 supports classless routing.

46. Which of the following are benefits of VLANs? (Choose three.) A. B. C. D. They increase the size of collision domains. They allow logical grouping of users by function. They can enhance network security. They increase the size of broadcast domains while decreasing the number of collision domains. E. They simplify switch administration. F. They increase the number of broadcast domains while decreasing the size of the broadcast domains. 47. What is split horizon? A. Information about a route should not be sent back in the direction from which the original update came. B. It splits the traffic when you have a large bus (horizon) physical network. C. It holds the regular updates from broadcasting to a downed link. D. It prevents regular update messages from reinstating a route that has gone down 48. If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default? A. B. C. D. E. Any available route RIP route Static route IGRP route They will all load-balance.

49. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2? (Choose two.) A. B. C. D. E. The command is used to establish a static route. The default administrative distance is used. The command is used to configure the default route. The subnet mask for the source address is 255.255.255.0. The command is used to establish a stub network.

50. Which of the following would be good reasons to run NAT? (Choose three.) A. B. C. D. You need to connect to the Internet and your hosts dont have globally unique IP addresses. You change to a new ISP that requires you to renumber your network. You dont want any hosts connecting to the Internet. You require two intranets with duplicate addresses to merge

51. Which of the following is considered to be the address after translation? A. B. C. D. Inside local Outside local Inside global Outside global

52. You have the following routing table. Which of the following networks will not be placed in the neighbor routing table? R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0 C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnets C 172.16.30.0 is directly connected, Loopback0 R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0 R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0 C 192.168.50.0/24 is directly connected, Ethernet0 A. B. C. D. 172.16.30.0 192.168.30.0 10.0.0.0 All of them will be placed in the neighbor routing table.

53. Which of the following is considered to be the destination host before translation? A. B. C. D. Inside local Outside local Inside global Outside global

54. Which are considered the three methods of NAT? A. B. C. D. E. Static IP NAT pool Dynamic NAT double-translation Overload

55. Which command would you place on interface on a private network? A. B. C. D. ip nat inside ip nat outside ip outside global ip inside local

56. PAT Address Translation is also termed what? A. B. C. D. NAT Fast NAT Static NAT Overload Overloading Static

57. Which command will copy the IOS to a backup host on your network? A. B. C. D. E. transfer IOS to 172.16.10.1 copy run start copy tftp flash copy start tftp copy flash tftp

58. You are unsuccessful in telnetting into a remote device. What could the problem be? (Choose two.) A. B. C. D. IP addresses are incorrect. Access control list is filtering Telnet. There is a defective serial cable. The VTY password is missing

59. Which three commands can be used to check LAN connectivity problems on a router? (Choose three.) A. B. C. D. E. show interfaces show ip route tracert ping dns lookups

60. Which command will show you the IOS version running on your router? A. B. C. D. sh IOS sh flash sh version sh running-config

Das könnte Ihnen auch gefallen