Sie sind auf Seite 1von 13

1. What information can DHCP provide to clients?

(Choose the 3 best


answers.)
A. Clock information
B. IP information
C. DNS information
D. Gateway information
1. B, C, D. DHCP works dynamically to provide IP address, DNS, and
default gateway information.
Answer A is incorrect because the Network Time Protocol (NTP)
provides clock information.
2. Which of the protocols are used by email? (Choose the 2 best
answers.)
A. POP3
B. SMTP
C. SNMP
D. DHCP
2. A, B. POP3 receives email on an Internet server and SMTP sends
email across a network. Answer
C is incorrect because SNMP is a network management protocol and
answer D is incorrect
because DHCP is the dynamic host configuration protocol.
3. What takes place when a collision occurs on an ethernet network?
(Choose the 3 best answers.)
A. Every device stops transmitting for a short time.
B. A jam signal is sent to notify devices of a collision.
C. A collision signal is sent to notify devices of a collision.
D. A random back-off algorithm starts
3. A, B, D. When a collision occurs on an ethernet network a jam
signal is sent to notify devices of a
collision and a random back-off algorithm starts while every device
stops transmitting for a short
time. Answer C is incorrect because a jam signal is sent rather than
a collision signal.
4. What is the OUI of the MAC address 01:AB:4D:F2:89:10?
A. 01
B. F2:89:10
C. 01:AB
D. 01:AB:4D
4. D. The OUI of a MAC address is the organizationally unique
identifier that is assigned by the manufacturer

of the network interface card (NIC). The OUI consists of the first 6
hexadecimal digits.
Answer A is incorrect because it only consists of 2 hexadecimal
digits. Answer B is incorrect
because it is not the first 6 hexadecimal digits of the MAC address
01:AB:4D:F2:89:10. Answer C is
incorrect because it only consists of 4 hexadecimal digits.
5. A MAC address is (Choose the 2 best answers.)
A. A unique hardware address in a broadcast domain
B. A unique IP address in a broadcast domain
C. Provided by the manufacturer of the NIC
D. Configured manually by the network administrator
5. A, C. The MAC address is a unique hardware address in the
broadcast domain and the manufacturer
of the NIC provides MAC addresses. Answer B is incorrect because IP
addresses are logical
addresses used by the Network layer. Answer D is incorrect because
a MAC address is not configured
manually by a network administrator.
6. At what layer of the OSI model do you find MAC addresses?
A. Transport
B. Network
C. Data Link
D. Physical
6. C. MAC addresses are found at the Data Link layer of the OSI
model. Answers A, B, and D are
incorrect because MAC addresses are not found at the Transport,
Network, or Physical layer of the
OSI model.
7. At what layer of the OSI model do you find sequence numbers?
A. Application
B. Presentation
C. Session
D. Transport
7. D. The Transport layer uses sequence numbers. Data segments
are sequenced into their original
order when they arrive at the destination. Answers A, B, and C are
incorrect because sequence

numbers are not found at the Application, Presentation, or Session


layer of the OSI model.
8. At what layer of the OSI model do you find IP addresses?
A. Transport
B. Network
C. Data Link
D. Physical
9. What kind of PDU is used at the Data Link layer of the OSI model?
A. Bit
B. Segment
C. Packet/Datagram
D. Frame
9. D. The Data Link layer uses frame PDUs to encapsulate data.
Answers A, B, and C are incorrect
because segments are used at the Transport layer, whereas
packet/datagrams are used at the
Network layer and bits are used by the Physical layer of the OSI
model.
10. What kind of PDU is used at the Network layer of the OSI model?
A. Segment
B. Packet/Datagram
C. Bit
D. Frame
10. B. The Network layer of the OSI model uses packets/datagrams.
Answers A, C, and D are incorrect
because the Application, Presentation, and Session layers of the OSI
model transmit data.
11. What kind of PDU is used at the Transport layer of the OSI
model?
A. Segment
B. Data
C. Frame
D. Bit
11. A. Segments are used at the Transport layer of the OSI model.
Answer B is incorrect because the
three upper layers of the OSI model transmit data. Answer C is
incorrect because the Data Link

layer transmits frames, and answer D is incorrect because the


Physical layer transmits bits
12. What is the correct order for data encapsulation?
A. Segment, packet, frame, data, bit
B. Data, segment, packet, frame, bit
C. Bit, frame, packet, segment, data
D. Data, packet, segment, frame, bit
12. B. Encapsulation occurs from the Application layer and then is
passed down through the lower layers
of the OSI model. The PDUs are sent by the Application layer as data
and then they are encapsulated
with a segment at the Transport layer. At the Network layer the
segment is encapsulated into a packet/
datagram that is passed down to the Data Link layer, which
encapsulates a frame and hands it off
to the Physical layer, which uses bits.
13. Routers look at the ________________ when making a routing
decision.
A. Destination IP address
B. Source IP address
C. Destination MAC address
D. Source MAC address
13. A. Routers look at the destination IP address to determine
where to forward the packet. Answers B,
C, and D are incorrect because a router does not examine the source
IP address, destination MAC
address, or source MAC address to make forwarding decisions.
14. What protocol is assigned to port numbers 20 and 21?
A. DNS
B. Telnet
C. FTP
D. SMTP
14. C. FTP is assigned to port numbers 20 and 21. Answers A, B,
and D are incorrect because Telnet is
assigned port number 23, DNS is assigned port number 53, and
SMTP is assigned port number 25.
15. What protocol is assigned to port number 80?
A. SNMP
B. HTTP
C. POP3

D. DHCP

15. B. HTTP is assigned port number 80. Answers A, C, and D are


incorrect because SNMP is assigned
port number 161, POP3 is port number 110, and DHCP is assigned
ports 67 and 68.
16. Which of the following are TCP? (Choose the 2 best answers.)
A. Telnet
B. HTTP
C. TFTP
D. NTP
16. A, B. Telnet and HTTP are both protocols that use TCP. Answers
C and D are incorrect because TFTP
and NTP use UDP.
17. Which of the following are UDP? (Choose the 2 best answers.)
A. DHCP
B. SMTP
C. SNMP
D. POP3
17. A, C. DHCP and SNMP use UDP, whereas answers B and D are
incorrect because SMTP and POP3
use TCP.
18. What commands use ICMP? (Choose the 2 best answers.)
A. Show cdp neighbor
B. traceroute
C. Telnet
D. ping
18. B, D. Traceroute and ping are both commands that use ICMP.
Traceroute traces the route or path
taken from a client to a remote host. Ping enables you to validate
that an IP address exists and can
accept requests. Answers A and C are incorrect because neither
show cdp neighbor nor Telnet
use ICMP.
19. What protocol maps a known MAC address to an IP address?
A. RARP
B. ARP
C. ICMP
D. Proxy ARP

19. A. RARP maps MAC addresses to an IP address, whereas answer


B is incorrect because ARP maps
an IP address to a MAC address. Answer C is incorrect because ICMP
sends messages across the
network via ping, and traceroute enables a router to respond to an
ARP request that has been sent to
a remote host. Answer D is also incorrect because some Unix
machines (especially Solaris) rely on
20. What TCP/IP protocol provides terminal emulation to a remote
host?
A. HTTP
B. VPN
C. Telnet
D. SNMP
20. C. Telnet provides for terminal emulation to a remote host.
Answers A, B, and D are incorrect
because HTTP is a web-browsing application, VPN is a private
network that can access public networks
remotely, and SNMP is a network management application.

1. Which of the following is the IEEE standard for token ring?


A. 802.2
B. 802.3a
C. 802.3u
D. 802.5
1. D. IEEE 802.5 defines token ring. Answers A, B, and C are
incorrect because IEEE 802.2 defines
LLC, 802.3a defines ethernet, and 802.3u defines Fast
Ethernet.
2. ANSI X3T9.5 is the specification for which LAN technology?
A. Token ring
B. Fast Ethernet
C. FDDI
D. LLC
2. C. ANSI X3T9.5 defines FDDI. Answers A, B, and D are
incorrect because they are all IEEE standards.
IEEE 802.5 defines token ring, 802.3u defines Fast Ethernet,
and 802.2 defines LLC
3. What Data Link layer technology inserts a three-byte token
(or special bit pattern) into a frame and passes it in a single
direction from one node to another until it forms a complete
loop?
A. Token-passing
B. Unicast
C. Multicast
D. Broadcast
3. A. Token-passing inserts a three-byte token (or special bit
pattern) into a frame and passes it in a
single direction from one node to another until it forms a
complete loop. Answers B, C, and D are

all incorrect because unicast, multicast, and broadcast are all


types of ethernet addresses.

4. Which of the following LAN protocols use token-passing for


frame transmission? (Choose the 2 best answers.)
A. Fast Ethernet
B. Token ring
C. Gigabit Ethernet
D. FDDI
4. B, D. Token ring and FDDI use token-passing to send frames.
Answers A and C are incorrect
because Fast Ethernet and Gigabit Ethernet both use 802.3
MAC and 802.2 LLC headers and trailers
for framing
5. This MAC sublayer address type identifies the MAC address
of an individual LAN or NIC card.
A. Unicast
B. Multicast
C. Broadcast
D. Token
5. A. Unicast addresses identify the MAC address of an
individual LAN or NIC card. Answer B is
incorrect because multicast addresses send a frame to a group
of devices in the same LAN.
Answer C is incorrect because broadcast addresses send a
frame to all the devices in the same
LAN. Answer D is incorrect because a token is a special bit
pattern used with token-passing
networks.
6. Which of the following addresses is an example of a unicast
address? (Choose all that apply.)
A. 0000.0C12.3456
B. 0100.5E12.3456
C. FFFF.FFFF.FFFF
D. 0200.1111.1111
6. A, D. Both 0000.0C12.3456 and 0200.1111.1111 are unicast
addresses. 0000.0C is Ciscos OUI.

Answers B and C are incorrect because 0100.5E12.3456 is a


multicast address and FFFF.FFFF.FFFF
is a broadcast address
7. This MAC sublayer address type sends a frame to a subset of
devices on the LAN.
A. Unicast
B. Multicast
C. Broadcast
D. Token
7. B. Multicast addresses send a frame to a subset of devices
in the same LAN. Answer A is incorrect
because unicast addresses identify the MAC address of an
individual LAN or NIC card. Answer C is
incorrect because broadcast addresses send a frame to all the
devices in the same LAN. Answer D
is incorrect because a token is a special bit pattern used with
token-passing networks.
8. Which of the following addresses is an example of a
multicast address?
A. 0000.0C12.3456
B. 0100.5E12.3456
C. FFFF.FFFF.FFFF
D. 0200.1111.1111
8. B. 0100.5E12.3456 is a multicast address. Multicast
addresses always start with 0100.5E.
Answers A and D are incorrect because both 0000.0C12.3456
and 0200.1111.1111 are unicast
addresses. Answer C is incorrect because FFFF.FFFF.FFFF is a
broadcast address
9. This MAC sublayer address type sends a frame to all the
devices on the LAN.
A. Unicast
B. Multicast
C. Broadcast
D. Token
9. C. Broadcast addresses send a frame to all the devices in
the same LAN. Answer A is incorrect

because unicast addresses identify the MAC address of an


individual LAN or NIC card. Answer B is
incorrect because multicast addresses send a frame to a subset
of devices in the same LAN.
Answer D is incorrect because a token is a special bit pattern
used with token-passing networks
10. Which of the following addresses is an example of a
broadcast address?
A. 0000.0C12.3456
B. 0100.5E12.3456
C. FFFF.FFFF.FFFF
D. 0200.1111.1111
10. C. Broadcast addresses are always represented as
FFFF.FFFF.FFFF. Answers A and D are incorrect
because both 0000.0C12.3456 and 0200.1111.1111 are unicast
addresses. Answer B is incorrect
because 0100.5E12.3456 is a multicast address.
11. The OSI model Data Link layer uses __________ to transport
data between layers.
A. Bits
B. Frames
C. Packets
D. Segments
11. B. Frames are used by the Data Link layer to transport data
between the Network and Physical
layer. Framing is the process of interpreting data that is either
received or sent out across the network.
Answers A, C, and D are incorrect because bits are used at the
Physical layer, packets are
used at the Network layer, and segments are used at the
Transport layer of the OSI model.
12. Which field of a frame is used for error detection?
A. SAP
B. DSAP
C. SSAP
D. FCS

12. D. The frame check sequence (FCS) field of a frame uses a


mathematical formula to determine
whether any bit errors occurred during data transmission.
Answer A is incorrect because Service
Access Point (SAP) identifies the upper-layer protocol such as IP.
Answer B is incorrect because
DSAP is the destination SAP or destination upper-layer protocol.
Answer C is incorrect because
13. Which IEEE Ethernet standards define Gigabit Ethernet?
(Choose all that apply.)
A. 802.3u
B. 802.3ab
C. 802.3z
D. 802.3ae
13. B, C. IEEE 802.3ab and 802.3z define Gigabit Ethernet
standards. Answers A and D are incorrect
because 802.3u defines the Fast Ethernet standard, and
802.3ae defines the 10 Gigabit Ethernet
standard.

14. Bridges and switches segment a network and create an


additional _______________ domain for
each segment.
A. Collision
B. Broadcast
C. Unicast
D. Multicast
14. A. Collision domains are increased with the addition of
bridges or switches on a network. Answer
B is incorrect because routers create additional broadcast
domains. Answers C and D are incorrect
because unicast and multicast are both addresses used by
ethernet.
15. Bridges and switches examine the __________________ of
each inbound frame to learn MAC
addresses.

A. Multicast MAC address


B. Broadcast MAC address
C. Source MAC address
D. Destination MAC address

15. C. The source MAC address of an incoming frame is


examined by a bridge or switch to learn the
MAC address for the bridge table. Answers A and B are incorrect
because multicast and broadcast
addresses can never be the source MAC address. Answer D is
incorrect because the destination
MAC address is not used by a bridge or switch to create the
bridge table.
16. Which device uses ASIC hardware chips for frame
forwarding?
A. Hub
B. Repeater
C. Bridge
D. Switch
16. D. Switches use ASIC hardware chips for frame forwarding.
Answers A and B are incorrect
because hubs and repeaters do not forward frames because
they are Physical layer or Layer 1
devices. Answer C is incorrect because bridges use software for
frame forwarding.
17. With a 10Mbps ethernet LAN, dedicated bandwidth enables
a switch port to guarantee what data
transmission speed?
A. 10Mbps
B. 100Mbps
C. 1000Mbps
D. 10,000Mbps
17. A. 10Mbps is guaranteed with dedicated bandwidth on a
10Mbps ethernet LAN. Answers B, C, and
D are incorrect because other speeds of 100, 1000, and
10,000Mbps are all faster speeds that
require a different ethernet
18. This Data Link protocol eliminates loops that are caused by
redundant connections.

A. CRC
B. FCS
C. CSMA/CD
D. STP
18. D. Spanning Tree Protocol (STP) is a Data Link protocol that
eliminates loops caused by redundant
connections on a LAN. Answers A and B are incorrect because
cyclical redundancy check (CRC)
and frame check sequence (FCS) both provide error detection.
Answer C is incorrect because
19. This communication mode allows for only one-way data
transmissions at any time.
A. 10Mbps
B. 100Mbps
C. Half-duplex
D. Full-duplex
19. C. Half-duplex allows for only one-way data transmissions
at any time. Answers A and B are incorrect
because 10Mbps and 100Mbps are speed classifications
primarily associated with ethernet
LANs. Answer D is incorrect because full-duplex allows for twoway data transmissions.
20. This communication mode allows for simultaneous two-way
data transmissions.
A. 10Mbps
B. 100Mbps
C. Half-duplex
D. Full-duplex
20. D. Full-duplex allows for simultaneous two-way data
transmissions. Answers A and B are incorrect
because 10Mbps and 100Mbps are speed classifications
primarily associated with ethernet LANs.

Das könnte Ihnen auch gefallen