Sie sind auf Seite 1von 64

CISCO - CCNA Interview SAN – Storage Area Network

MAN – Metropolitan Area Network (takes support of PSTN)


Routers:
WAN – Wide Area Network (takes support of X.25, Frame-relay,
ATM, Internet, ISDN)
In 1992 main products of Cisco were Gateway Servers i.e.
SoAN – Solaris Area Network (network using satellite)
AGS – Advanced Gateway Server
WIRELESS
MGS – Mid-Range Gateway Server
INTERNET
IGS – Integrated Gateway Server
EXTRANET – Connection between different branches
CGS – Compact Gateway Server
INTRANET – Connection within the branches
AGS+ - Advanced Gateway Server Plus
LAN Requirements for Networking:
Routers are of two types, Modular and Non-Modular
Server, Client, NIC, Cable (Media), Switch, Topology, Protocol,
1.Modular
Services.
Routers will not have fix interfaces, can be added or removed
whenever required.
Media:
2.Non-Modular
There are 2 types of media
Routers will have fix interfaces, cannot be added or removed, they
1.Guided media (wired media) 2.UnGuided media
are fixed.
(wireless media)
SERIES MODELS
Each series will have different models Each models will have different 1.Guided media (wired media)
features or functions e.g. Co-axial cable, twisted pair cable, fibre optics cable
700 701,702,703,704,710 (supports ISDN
Technology) Co-axial cable
800 801,803,805,810 (supports ISDN+Leased line 1.Maximum Distance 500mts
connection)
1000 1001,1003,1010,1011,1015
2.Low response
1100 1101,1102,1102,1115 3.Less attenuation
1400 1401 - 1411 4.Speed 10Mbps
1600 5.Communication done is half duplex
1700 6.Connection done using BNC – Bayonet Neil Concellmen
2500 Connector
2600 7.Registered Guage Standard (RG)
3600
RG 9,11,12 Thinnet Coaxial Cable
4000
5000 RG 58 Thicknet Coaxial Cable
7000 RG 58/U, RG 58A/U Military Network
12000GSR RG 59 Dish Network
Gigabit Switched Routers RG 62 Arc Net

Products of Cisco: Thicknet also called as 10base5 where 10 – Bandwidth base –


Router Baseband and 5 – 500mts
Switches Thinnet also called as 10base2 where 10 – Bandwidth base –
Bridges Baseband and 2 – 200mts
Brouters
Repeaters Twisted pair cable
PIX – Packet Information Exchange 1.Maximum Distance 100mts
VPN Concentrator 2.Speed 10/100/1000Mbps
AAA Server – Authentication, Authorizing, Accounting Server 3.Communication done is half / full duplex
IDS – Intrusion Detection System 4.Connection done using RJ45 Connector
Policy Manager
Fibre Optics 10baseT Supports 10Mbps
CRS – Carrier Routing System (provides 9.6TeraBytes per second) 10baseTx Supports 10 or 100 Mbps
CMTS or UBR – Cable Modem Terminating System 100baseT Supports 100Mbps
Network 1000baseTx Supports 1Gbps
Connection of two or more nodes over the physical media is called
as Network. 4 pairs of wires, orange – tip orange/white – tap.

Networking All orange/white, green/white, blue/white, brown/white provides


Connection of two or more nodes over the physical media and grounding to the orange, green, blue, brown wires.
sharing the resources is called as Networking.
Types of Twisted pair cable
Types of Network: 1.Unshielded Twisted Pair Cable (UTP) 2.Shielded
Twisted Pair Cable (STP)
1.Peer-to-Peer Network
Peer meaning client, Operating system used as client are win95, Categories of Twisted pair cables
98,NT4.0 Workstation, Win2000 prof, ME, XP prof. CAT1 Telephone Networks (4Mbps)
Workgroup is a small group of computers where no centralized CAT2 Small Computer Networks,
administration and no security is provided. Telephone Networks (4Mbps)
CAT3 LAN – Ethernet (16Mbps)
2.Server based Networks CAT4 Token Ring Network (40Mbps)
Server is the one that serves the resources to clients. CAT5 LAN – Fast Ethernet (100Mbps)
Client is the one that requests for the resources from server. CAT5e & CAT6 LAN – Fast Ethernet (1Gbps /
Non-dedicated Server is the system that works both as client and 1000Mbps)
server. Registered Jack (RJ Connectors)
RJ11 Telephones
Operating system used as server is WinNT 3.51, 4.0, RJ12 Telephone Network, Modems,
Win2000server, Win2003server. Small Networks
Domain RJ45 Local Area Network
Logical group of computers where centralized administration and Optical Fibre Cable
security is concerned. 1.Maximum Distance 3 to 10 Kms
2.No EMI – Electro Magnetic Interference
Further types of network: 3.Speed 100Mbps or Higher
4.Connectors used are ST – Straight Trip and SC – Subscriber
PAN – Personalized Area Network Connectors
LAN – Local Area Network 5.Two modes of communication Single mode (single beam) and
CAN – Campus Area Network or BAN – Branch Area Network (within Multiple mode (multiple beam)
2km diameter using FDDI)
-1-
2.UnGuided media (wireless media) Multicasting
e.g. infrared, microwaves, radio waves Any communication between a single sender and multiple
Infrared receivers.
1.Introduced in 1985
2.Point-to-Point communication (distance between 2 computers ARP
should not be more than 15mts) Address Resolution Protocol, the protocol that traces IP addresses
3.Multipoint communication (distance between 2 computers should to MAC addresses.
not be more than 30 mts)
4.Maximum Bandwidth 11Mbps IPX
Internetwork Packet Exchange, layer 3 protocol used in Novell
Microwaves Netware networks for transferring information from servers to
1.Electromagnetic Waves > 1Mhz workstations.

Radio Waves Router


1.Introduced in 1998 for computers It’s a layer 3 device that connects 2 different networks and routes
2.Electromagnetic Waves < 1Mhz packets of data from one network to another. It breaks up
3.Maximum frequency available now is 2Ghz Broadcast domain as well as Collision Domain.

Advantages of Router
Protocols 1.Router don’t forward Broadcasts by default.
A set of rules for a particular type of communication. 2.Perform access control on the traffic that flows through the
router i.e. Packet Filtering.
3.Network Address Translation.
Two types of Protocols 4.Quality of Service for particular network traffic.
1.Connection Oriented 2.Connectionless Oriented 5.Can be used as a DHCP relay agent.
7.Connects different VLAN’s.
Connection Oriented
1.Follows the same path for data transfer DCE-Data Communications Equipment
2.Acknowledgement The DCE supplies the physical connection to the network, forwards
3.Reliable traffic, and provides a clocking signal to synchronize data
4.e.g. TCP, SPX, AppleTalk datagram protocol transmission between DTE and DCE devices.

Connectionless Oriented DTE-Data Terminal Equipment


1.Follows the path where less traffic is found Any device located at the end user i.e. network interface serving
2.No Acknowledgement as a destination or source or both. DTE includes devices such as
3.Non-Reliable Multiplexers, routers, protocol translators and computers.
4.e.g. IP, IPX, UDP, AppleTalk protocol
Different Modes for configuring a router
Standards 1.User Mode- some basic commands like ping, telnet can be done.
Two types of Standards Prompt will be Router >
1.Defacto Standard 2.Dejuire Standard 2.Execution or Privilege or Enable Mode- can view all configuration
details, minimal commands like ping, telnet, and clock setting.
Prompt will be Router #
Defacto Standard 3.Global Configuration Mode- where all configurations are done.
Standard widely used by all is called as Defacto Standard. Prompt will be Router(config)#

Dejuire Standard Sub Configuration Modes


Standard defined by an organization is called as Dejuire Standard. 1.Interface configuration mode, prompt will be Router(config-if)#
2.Router configuration mode, prompt will be Router(config-
Standard Organizations / Committees router)#
3.Line configuration mode, prompt will be Router(config-line)#
IEEE – Institute of Electrical and Electronics Engineers ------------------------------------------------------
IANA – International Assigned Number Authority
ISO – International Standards Organization What is difference between Switch & Hub?
ITU-T – International Telecommunication Union – Switch:
Telecommunication Standardization Sector Switches operate at Layer 2 Data Link Layer
EIA / TIA – Electronics Industry Association / Telecommunication Address Learning
Industry Association Forward / Filter decision using MAC address
ANSI – American National Standards Institute Loop Avoidance
Breakup collision domains
Network Segmentation Switches create separate collision domains but a single broadcast
Breaking up a larger network into a number of smaller ones is domain
called as Network Segmentation and is accomplished using
Routers, Switches and Bridges. Hub:
Hub operates at Layer 1 Physical Layer
Causes of LAN Traffic congestion No Filtering
1.Too many hosts in a broadcast domain No Addressing
2.Broadcast storms Hub creates single collision domain and single broadcast domain
3.Multicasting Make forwarding to all the ports when signal is arrived
4.Low Bandwidth
5.Adding Hubs for connectivity to the network What is PING utility?
6.A large amount of ARP and IPX Traffic. PING – Packet Internet Gopher
A utility that verifies connections to one or more remote hosts. The
Broadcast Domain ping command uses the ICMP echo request and echo reply packets
A group of devices receiving broadcast frames initiating from any to determine whether a particular IP system on a network is
device within the group. functional. Ping is useful for diagnosing IP network or router
failures.
Collision Domain
The network area in Ethernet over, which frames that have What is a VLAN? What does VLAN provide?
collided and damaged. VLAN – Virtual Local Area Network
Vlan is a logical grouping or segmenting a network connected to
Broadcast Storms administratively defined ports on a switch, they provide Broadcast
An undesired event on the network caused by the simultaneous control, Security and Flexibility.
transmission of any number of broadcasts across the network.
What is Subnetting? Why is it used?
-2-
Used in IP Networks to break up larger networks into smaller
subnetworks. It is used to reduce network traffic, Optimized Router
network performance, and simplify management i.e. to identify It’s a layer 3 device that connects 2 different networks and routes
and isolate network problems. packets of data from one network to another. It breaks up
Broadcast domain as well as Collision Domain.
Difference between the Communication and Transmission?
Communication is the process of sending and receiving data by What is Brouter?
means of a data cable that is connected externally. It’s a Hybrid device that combines the features of both bridges and
Transmission means the transfer of data from the source to the routers.
destination.
What is Subnet?
What is RAID? A subdivision of an IP network.
A method used to standardize and categorize fault-tolerant disk
systems. RAID levels provide various mixes of performance, What is Frame relay, in which layer it comes?
reliability, and cost. Some servers provide three of the RAID levels: Frame relay is an industry standard, shared access, switched Data
Level 0 (striping), Level 1 (mirroring), and Level 5 (striping & Link Layer encapsulation that services multiple virtual circuits and
parity). protocols between connected mechanism.
Frame relay is a packet-switched technology.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs? What is Terminal Emulation, in which layer it comes?
10Base2 an Ethernet term meaning a maximum transfer rate of 10 The use of software, installed on PC or LAN server, that allows the
Megabits per second that uses baseband signaling, with a PC to function as if it were dumb terminal directly attached to a
contiguous cable segment length of 200 meters (185mts). Known particular type of mainframe.
as Thinnet. Telnet is also called as terminal emulation. It belongs to application
layer.
10Base5 an Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses baseband signaling, with a What is Beaconing?
contiguous cable segment length of 500 meters. Known as An FDDI frame or Token Ring frame that points to serious problem
Thicknet. with the ring, such as a broken cable. The beacon frame carries
the address of the station thought to be down.
10BaseT an Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses two pairs of twisted-pair baseband
signaling, with a contiguous cable segment length of 100 meters. What are NetBIOS and NetBEUI?
NetBIOS – Network Basic Input / Output System
What are the two types of Transmission Technology An application-programming interface (API) that can be used by
available? programs on a local area network (LAN). NetBIOS provides
Point – to – Point and Broadcast programs with a uniform set of commands for requesting the
lower-level services required to manage names, conduct sessions,
What is point-to-point protocol? and send datagrams between nodes on a network.
An industry standard suite of protocols for the use of point-to-point
links to transport multiprotocol datagrams. NetBEUI – NetBIOS Extended User Interface
An improved version of the NetBIOS protocol, a network protocol
What are the possible ways of data exchange? native to Microsoft Networking. It is usually used in small,
Simplex department-size local area networks (LANs) of 1 to 200 clients. It
Half-duplex can use Token Ring source routing as its only method of routing.
Full-duplex
What is Cladding?
What is difference between Baseband and Broadband A layer of a glass surrounding the center fiber of glass inside a
Transmission? fiber-optic cable.
In a baseband transmission, the entire bandwidth of the cable is
consumed by a single signal. What is Attenuation?
In communication weakening or loss of signal energy, typically
In broadband transmission, signals are sent on multiple caused by distance.
frequencies, allowing multiple signals to be sent simultaneously.
What is MAC address?
What is Protocol Data Unit? The address for a device as it is identified at the Media Access
The processes at each layer of the OSI model. Control (MAC) layer in the network architecture. MAC address is
Layers PDU usually stored in ROM on the network adapter card and is unique.
Transport Segments
Network Packets/Datagrams
Data Link Frames What is ICMP?
Physical Bits ICMP – Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and
What are major types of Networks and explain? status information. We can use the ping command to send ICMP
Peer-to-Peer Network echo request messages and record the receipt of ICMP echo reply
Computers can act as both servers sharing resources and as messages. With these messages, we can detect network or host
clients using the resources. communication failures and troubleshoot common TCP/IP
connectivity problems.
Server-based Network
Provide centralized control of network resources and rely on server What is difference between ARP and RARP?
computers to provide security and network administration ARP – Address Resolution Protocol
The protocol that traces IP addresses to MAC addresses.
What is Passive Topology?
When the computers on the network simply listen and receive the RARP – Reverse Address Resolution Protocol
signal, they are referred to as passive because they don’t amplify The protocol within the TCP/IP stack that maps MAC addresses to IP
the signal in any way. addresses.

What is Mesh Network? What is the difference between TFTP and FTP application
A network in which there are multiple network links between layer protocols?
computers to provide multiple paths for data to travel. TFTP – Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no
How Gateway is different from Routers? Directory browsing, no Authentication and insecure it can only
Gateway send and receive files.
A device connected to multiple physical TCP/IP networks capable of
routing or delivering IP packets between them.
-3-
FTP – File Transfer Protocol Sends only Incremental and Triggered updates. Route updates sent
The TCP/IP protocol used for transmitting files between network within the routers will be secured with the help of MD5 encrypted
nodes. FTP allows access to both Directories and files, password.
manipulating directories, typing file contents and copying files Routing updates are sent as Multicast addresses i.e.
between hosts. 224.0.0.5 – SPF (all OSPF routers)
224.0.0.6 – Designated router and Backup Designated
Explain 5-4-3 rule? router
In a Ethernet network, between any two points on the network, OSPF maintains 3 types of Routing table i.e. Routing Table
there can be no more than five network segments or four (Dijisktra), Topology Table (SPF) and Neighborship Table.
repeaters, and of those five segments only three of segments can In OSPF Routers can be connected in two methods i.e.
be populated. Point-to-Point Link
Point to Multipoint Link
What MAU? In OSPF a single large Autonomous system is break into small
MAU – Multistation Access Unit areas. There should be atleast one area by name Area 0. It’s called
as Backbone Area.
What is the difference between routable and non- routable The Router that connects more than one Area is called as Area
protocols? Border Routers.
Routable protocols can work with a router and can be used to build The Router that connects to other Autonomous system is called as
large networks. Non-Routable protocols are designed to work on Autonomous System Boundary Router.
small, local networks and cannot be used with a router.
Router ID
What is logical link control? If the priority is set 1 to all the routers then there is a tie in priority,
One of two sublayers of the data link layer of OSI reference model, in this case it will check if there is any loopback address is given to
as defined by the IEEE 802 standard. This sublayer is responsible any router if not the router with highest value of IP address will be
for error detection but not correction, flow control and framing. elected as Router ID.
This router will be then called as Designated Router and the router
What is Virtual Channel? with less value of IP address after Designated Router will be called
A logical circuit that is created by Virtual channel links. It carries as Backup Designated Router.
data between two endpoints in a network. If a Router has all interfaces existing in single area than that router
is called as Internal Router.
The other name for Virtual Channel is Virtual Circuit. Whenever a router send routing updates to DR and BDR it uses
Destination address as 224.0.0.6 and when DR send updates to all
What is Virtual Path? the routers it uses Destination address as 224.0.0.5.
Along any transmission path from a given source to a given In OSPF routing updates are called as Link State Advertisements.
destination, a group of virtual circuits can be grouped together into If an OSPF router wants to send updates to other OSPF router then
what is called path. it should carry 3 requirements i.e.
Hello Packets Received
What is Packet Filter? It contains Area Id, Uptime, Password, Hello Interval, Dead Interval,
Neighborship Table and Router Id.
Point-to-Point Link Point to
Multipoint Link
What is multicast routing? Halo Interval – 10 Halo Interval – 30
Sending a message to a group multicast address is called Dead Interval – 40 Dead Interval – 120
multicasting, and its routing algorithm is called multicast routing.
Adjacency Built
What is IGP (Interior Gateway Protocol)? If both router interfaces belongs to same Area, same Password
Any protocol used by an internetwork to exchange routing data then Hallo and Dead Intervals should be set same.
within an autonomous system. E.g. RIP, IGRP and OSPF.
Neighborship Built
If both routers are adjacent to each other then Neighborship is
What is EGP (Exterior Gateway Protocol)? built in Routers.
It is the protocol the routers in neighboring autonomous systems When one routerRA sends updates i.e. Link State Advertisements
use to identify the set of networks that can be reached within or to other routerRB it will send that update to Topology Database of
via each autonomous system. routerRB and will run an algorithm SPF on routerRB to create a
new Topology Table. After that Dijisktra Algorithm is run to find the
What is Autonomous System? best path and that entry will be put in Routing Table.
A group of Networks under mutual administration that share the The router when sends Hallo packets to other router a
same routing methodology. Autonomous Systems are subdivided Neighborship Table is set on that Router.
by Areas and must be assigned an individual 16-bit number by the
IANA.
What is SLIP (Serial Line Internet Protocol)?
What is BGP (Border Gateway Protocol)? An industry standard serial encapsulation for point-to-point
It is a protocol used to advertise the set of networks that can be connections that supports only a single routed protocol, TCP/IP.
reached within an autonomous system. BGP enables this
information to be shared with the autonomous system. This is What is RIP (Routing Information Protocol)?
newer than EGP (Exterior Gateway Protocol). Rip run on any Routers hence called as Open Standard Distance
Vector Routing Protocol.
What is Gateway-to-Gateway protocol? It’s a classful routing protocol meaning when updates are sent
It is a protocol formerly used to exchange routing information they send only IP address but not subnet mask.
between Internet core routers. Administrative Distance is 120.
Metric used is Hop counts (number of routers to cross to reach the
What is Kerberos? destination).
An authentication mechanism used to verify user or host identity. Rip uses algorithm name Bellman Ford Algorithm to determine the
Kerberos uses encryption to prevent intruders from discovering best path selection.
passwords and gaining unauthorized access to files. Supports maximum 15 Hops.
What is OSPF (Open Shortest Path First)? Supports 6 paths if there is a tie in metric i.e. same metric.
OSPF is the first Open Standard Link State Routing Protocol.
It’s a Classless Routing Protocol meaning when updates are sent RIP Timers
they send both IP address and Subnet mask. Route update timer – 30seconds
Administrative Distance is 110. Route invalid timer – 180 seconds
Metric used is Cost i.e. Cost= 108 Holddown timer – 180 seconds
--------------- Route flush timer – 240 seconds
Bandwidth
OSPF uses algorithm to build Routing Table called Dijisktra. What are the advantages and disadvantages of the three
types of routing tables?
-4-
Bridges and switches can determine whether a frame is destined
for the local network segment or needs to be forwarded to another
network segment based on the destination MAC address.

What is the HELLO protocol used for?


What are some of the advantages to using bridging and
The HELLO protocol uses time instead of distance to determine
optimal routing. It is an alternative to the Routing Information switching instead of routing?
Protocol. Increased overhead and latency
Reduced overhead and latency
What is the difference between interior and exterior
neighbor gateways? Broadcast propagation
Interior gateways connect LANs of one organization, whereas Lower equipment costs
exterior gateways connect the organization to the outside world. Answer A is incorrect because it is a negative aspect of routing as
compared to switching. Answer B is correct because bridges
and switches look only at Data Link layer information,
What protocol do DNS name servers use? whereas routers must process all the logical address
DNS uses UDP for communication between servers. It offers a information in the route tables. Answer C is incorrect because
connectionless datagram service that guarantees neither delivery
nor correct sequencing of delivered packets (much like IP). switches do not have this effect. Answer D is incorrect because
switches are now very sophisticated and can cost as much as
What is a DNS resource record? routers.
A resource record is an entry in a name server's database. There
are several types of resource records used, including name-to-
address resolution information. Resource records are maintained What would be the best network segmentation device if
as ASCII files. you wanted to connect two dissimilar networks, such as
Ethernet and Token-Ring?
BOOTP helps a diskless workstation boot. How does it get a
message to the network looking for its ip address? A bridge or a switch
A protocol used primarily on TCP/IP networks to configure diskless A concentrator or a hub
workstations. BOOTP sends a UDP message with a subnetwork A router
broadcast address and waits for a reply from a server that gives it
A gateway
the IP address.
Answer A is incorrect because bridges and switches can’t perform
What is anonymous FTP and why would you use it? protocol translation. Answer B is incorrect because neither a
Anonymous FTP enables users to connect to a host without using a concentrator nor a hub can segment a network. Answer C is
valid login and password. Usually, anonymous FTP uses a login
called anonymous or guest, with the password usually requesting correct because routers can provide translation between
the user's ID for tracking purposes only. Anonymous FTP is used to dissimilar protocols, among other things. Answer D is
enable a large number of users to access files. incorrect because a gateway functions as a translator, not a
segmentation device.
How do Data Link layer addresses and Network addresses
differ? Give a description of each. Why is overhead or latency associated with routers?
Besides the names suggesting that addresses reside at different (Choose all that apply.)
layers, other differences do exist. Data Link layer addresses are Routers must work at layer 3, which is inherently slower.
assigned by the manufacturer and identify the actual hardware Routers must examine the frame header before passing it.
device. A Network layer address is a logical address assigned by Routers must hold a frame for a given period of time for security
the network administrator to identify a device running a Network purposes.
layer protocol, such as IP. Routers must translate the signal, but then the signal can cut
through directly.
What are the differences or similarities, if any, between Answer A is correct because resolving those addresses is
repeaters, hubs, and concentrators? more time consuming. Answer B is correct because the
First, they are all Physical layer devices. Repeaters regenerate and router must examine and consider the frame header detail
amplify the signal traveling on the wire to extend the normal before passing it, which slows processing. Answers C and D
distance limitation of the signal. A repeater can connect two are incorrect because they are simply not accurate.
network segments. A hub and a concentrator are the same thing,
with hub being the more common term used today. Hubs are Which of the following represents Physical layer devices?
repeaters with 8–24 ports. When one machine attached to the hub Repeaters, bridges, and concentrators
sends anything over the network, all the devices attached to the Repeaters, hubs, and concentrators
hub receive that signal. Repeaters, routers, and bridges
Repeaters, routers, and switches
Describe, in general terms, the reasons for implementing Answer B is correct because repeaters, hubs, and
LAN segmentation. concentrators comprise the only combination that resides
It confines user traffic to a segment and addresses and solves at the Physical layer. Answers A, C, and D are combinations of
distance limitation problems. Segmentation also cuts down on the devices that reside at different layers.
traffic generated by broadcasts and multicasts, and thereby
increases performance. Because of the reduction of the size of the How do routers make routing decisions?
segment, collisions and overall traffic also are reduced. They build tables and make their decisions based on those tables.
They perform lookups and make their decisions dynamically with
Which of the three switching methods is fastest, and why? discovery.
Cut-Through switching is the fastest method because the switches They use hello packets to discover routes on the fly.
read only the first six bytes of the frame before forwarding it. They query NetBIOS cache for the appropriate paths.

What services do bridges and switches provide?


-5-
Answer A is correct because routing decisions are made VTP switches operate in one of three modes: server, client, or
based on the contents of routing tables. Answer B is incorrect transparent.
because routers are incapable of making decisions without tables
already in place. Answer C is incorrect because hello packets are Name the Cisco proprietary protocol used on Fast Ethernet
used to calculate routes when new routers are added to a network. VLAN trunk links.
Answer D is incorrect because it is simply inaccurate. ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic
over Fast Ethernet trunk links.
Choose the devices that are used for Data Link layer
segmentation. At what layer of the OSI model do VLANs operate?
Concentrators and switches VLANs operate at layer 2 of the OSI model.
Routers and bridges
Bridges and switches To allow Inter-VLAN communication, what does your router
Bridges and hubs require?
Answer A is incorrect because concentrators reside at the Physical You need a router that has some kind of viable trunking
layer and switches at the Data Link layer. Answer B is incorrect connection, such as Fast Ethernet (ISL), and must be configured
because routers are level 3 devices and bridges are level 2 with subinterfaces.
devices. Answer C is correct because bridges and switches
reside at the Data Link layer. Answer D is incorrect because Choose one method of decreasing broadcasts across a
bridges reside at the Data Link layer and hubs at the Physical switched network.
layer. Set up an Intra-LAN.
Set up a workgroup banded by a server cluster.
What is an advantage of having a VLAN (Virtual LAN)? Set up a VLAN to isolate traffic.
Traffic control between VLANs is processor intensive. Set up a firewall to isolate traffic.
Broadcasts of multicast traffic are contained within one VLAN. Answers A and B are incorrect because they are simply false.
They’re more flexible because they enable device assignment only Answer C is correct because each VLAN becomes its own
on a port-by-port basis. broadcast domain. Answer D is incorrect because a firewall is
With VLANs, users are not inherently isolated by group. meant to shelter internal networks from intrusion from the outside.
Answer A is incorrect because there is nothing more or less
processor intensive about VLANs. Answer B is incorrect because Choose two benefits of VLAN implementation.
there is no such thing as a broadcast of multicast traffic; the words VLANs incorporate only one router per routed subnet.
broadcast and multicast are mutually exclusive. Answer C is VLANs control broadcasts.
correct because VLANs extend the flexibility of LANs by VLANs amplify broadcasts.
enabling the port-by-port isolation of users and VLANs ease security restrictions.
assignment to distinct VLANs if desired. Answer D is incorrect VLANs provide increased network security.
because VLANs by their definition segment workgroups. Answer A is incorrect because routers are not at all necessary for a
VLAN to operate. Answers B and E are correct because VLAN
Which two characteristics describe Store and Forward implementation controls broadcasts and provides isolation,
switching? therefore security. Answers C and D are simply incorrect.
The entire frame is copied into the buffer.
The frame is forwarded based on the first six bytes. What is the purpose of a trunking protocol?
It provides higher throughput. To connect the backbone of a primary VLAN to the backbone of a
It provides error checking. secondary VLAN
Answers A and D are correct because Store and Forward For one switch fabric to be integrated with another switch fabric
switching copies the entire frame into the buffer before For a VLAN on one switch to be linked to a VLAN on another switch
forwarding, which also provides for error checking. Answers To enable multiple trunking protocols to communicate
B and C are incorrect because they describe Cut-Through. Answers A is incorrect because it uses wrong terminology. Answer
B is incorrect because switch fabric is a hardware-related
component of a switch and belongs to one switch only. Answer C
Which two characteristics describe Cut-Through switching? is correct because trunking protocols allow management of
The entire frame is copied into the buffer. VLANs with similar or dissimilar trunking protocols. Answer
The frame is forwarded based on the first six bytes. D is incorrect because a trunking protocol does not enable multiple
It provides higher throughput. trunking protocols to communicate.
It provides error checking.
Answers B and C are correct because Cut-Through Choose the encapsulation protocol used on Fast Ethernet
switching provides forwarding based on what is contained links.
in the first six bytes of the frame, which provides higher Cisco Switch Link
throughput. Answers A and D are incorrect because they Dedicated Switch Link
describe Store and Forward switching. Inter-Switch Link
VLAN Switch Link
Name the Cisco proprietary protocol that allows VLANs to Answer C is correct because Inter-Switch Link protocol is
be managed within domains. the encapsulation protocol used on Fast Ethernet links.
VTP (VLAN Trunking Protocol) allows multiple VLANs to be Answers A, B, and D is incorrect because no such links exist.
managed within a single VTP domain.
At which layer of the OSI model does ISL function?
Name the three VTP modes in which a switch can operate. Data Link layer

-6-
Network layer Layer 2, to maintain domain synchronization
Physical layer Layer 3, to maintain access lists
LLC Data Link sublayer Answer A is correct because VTP operates at layer 2 and
Answer A is correct because ISL functions at the Data Link maintains VLAN configuration consistency. Although the OSI
layer of the OSI model. Answers B and C are incorrect because layer is correct, answers B and C are incorrect because the second
ISL does not function at those layers of the OSI model. Answer D is portion of the answers is incorrect. Answer D is incorrect because
incorrect because the specific sublayer does not have any VTP and switching do not operate at layer 3 and access lists are
distinction in this context. maintained on routers.

Which method is used by VTP to convey VLAN What two basic steps are necessary to create access list
configuration information within its management domain? filters?
Through directed broadcasts The first step is to build the list at global configuration mode using
Through LSA’s local service advertisements the access-list command followed by an access list number
Through multicast advertisements signifying the type. The second step is to apply the list to an
Through port flooding interface by using the [protocol type] access-group command
Answer C is correct because multicast advertisement followed by the access list number and parameters.
convey configuration information to all connected switches Identify the appropriate access list range values used to
in the same management domain. Answers A, B, and D is create access lists.
incorrect because they do not convey information within IP standard access list = 1–99
management domains. IP extended access list = 100–199
IPX standard access list = 800–899
In ATM LANE, what factor determines the type of trunking IPX extended access list = 900–999
protocol used? IPX SAP filter = 1000–1099
The link type
The encapsulation mode What is the purpose of a wildcard mask?
The density of VLANs To enable an administrator to apply an access list rule to a group of
The ATM LANE Module type hosts or subnets by masking off bits within an IP address, making
Answer A is correct because the link type determines the the bit positions within the mask variable.
type of trunking protocol used. Answers B and C are incorrect
because they are simply false. Answer D is incorrect because the Name the access list keywords.
ATM LANE Module is a hardware card and does not affect trunking any = 0.0.0.0 255.255.255.255
protocols. host = specific IP address of an end host (192.16.10.2 0.0.0.0)

What is VTP designed to do? How does the direction in which an access list is applied
It enables an administrator to manage VLANs across multiple trunk affect datagram processing?
links. Access lists applied to an interface in an inbound direction
It enables an administrator to manage VLANs across dissimilar determine whether a datagram received on an interface will be
trunking protocols. forwarded or blocked. Access lists applied to an interface in an
It enables an administrator to merge the management duties of outbound direction determine whether a datagram already
more than two trunk links together. received will be forwarded out that interface.
It is used to synchronize VTP advertisements across multiple trunk
links. What is the access list number range used to identify an IP
Answer A is incorrect because trunk links do not address the standard access list?
aspect of communication. Answer B is correct because VTP is 0–100
designed to enable an administrator to manage VLANs 1–100
running dissimilar trunking protocols. Answer C is incorrect 1–99
because a trunk link does not necessary entail management duties 1–10
on its own. Answer D is incorrect because it is simply false. 101–199
Answer C is correct because the correct value range to
What is a limitation of Intra-VLAN traffic? identify an IP standard access list is 1–99. Answers A, B, D,
Communication is limited to VLANs directly connected to a router. and E are incorrect because they are not ranges used to identify
Communication is limited to VLANs off the same switch backplane. an IP standard access list.
Communication is limited to devices within the same VLAN.
Communication is limited to devices between VLANs. Which of the following represents the default wildcard
Answer A is incorrect because VLANs are connected for Inter-VLAN mask value?
communication. Answer B is incorrect because the backplane is 0.0.0.0
where traffic is actually switched, and it is a hardware component. 255.255.255.255
Answer C is correct because that is the very definition of 0.0.255.255
Intra-VLAN traffic. Answer D is incorrect because VLANs cannot 255.255.255.0
talk to each other without a router. Answer A is correct because, if unspecified, the default
mask used is 0.0.0.0. Answers B and C are incorrect because
VTP (Virtual Trunking Protocol) exists at which layer and neither are the default mask. Answer D is incorrect because it is a
for what purpose? regular mask, which is not used for wildcard masking.
Layer 2, to maintain VLAN configuration consistency
Layer 2, to maintain trunking protocol synchronization

-7-
Write the command that would apply access list 100 to IPX output sap-filter 1010
interface E0 in an outbound direction. (Assume you are IPX-sap-filter 1010 out
already at interface configuration mode of the Ethernet Answer A is incorrect because it is the syntax used to define a
interface.) standard or extended list. Answer B is correct because it uses
IP access-group 100 out the correct syntax. Answer C is incorrect because it is missing
IP access-list 100 out the hyphen between the output and sap commands. Answer D is
IP access-group 100 in incorrect because it is a completely invalid command.
IP access-group E0 out
Answer A is correct because IP access-group 100 out is the Which command can you use to display a list of access list
command that would apply access list 100 to interface E0 filters configured on your router for IP only?
in an outbound direction. Answers B, C, and D are simply show IP access-lists
incorrect. show access-lists
show IPX interfaces
Which of the following commands creates a standard IP show IPX servers
extended access list that enables ping echo requests to be Answer A is correct because show IP access-lists enables
sent from any host on network 166.10.0.0 to network you to display a list of access list filters configured on your
155.10.0.0? router for IP only. Answers B, C, and D are incorrect because
Access-list 12 permit IP 166.10.0.0.0.0.255.255 host 155.10.0.0 these commands do not enable that specific function.
Access-list 120 permit ICMP 166.10.0.0 0.0.255.155 155.10.0.0
0.0.0.255 eq echo Write the command to bind IPX extended access list 901 to
Access-list 120 permit 166.10.0.0.0.0.255.255 host 155.10.0.0 interface serial 0 on an inbound direction.
Access-list 120 permit ICMP 166.10.0.0 0.0.255.255 155.10.0.0 IPX access-group 901 in
0.0.255.255 eq echo IPX access-group 901 S0 out
Answer A is incorrect because the access list number is not an IPX access-group 910 in
extended list number. Also, the protocol type is IP not ICMP, and IPX access-group 901 out
the destination is specifying the host keyword but using a subnet Answer A is correct because IPX access-group 901 in is the
value instead, which is invalid. Answer B is incorrect because it command that will bind the IPX extended access list 901 to
uses an incorrect inverse mask for the destination network. interface serial 0 on an inbound direction. Answers B, C, and
Answer C is incorrect because it does not specify the protocol after D are incorrect because they are simply false.
the permit statement and also is using the host keyword with the
destination network. Answer D is correct because it uses a Which two of the following commands will enable Telnet
valid access list number and syntax to forward ICMP echo traffic from all hosts on network 166.10.0.0 to be
requests. forwarded to the Telnet server 137.2.10.1?
Access-list 110 permit TCP 166.10.0.0 0.0.255.255 host 137.2.10.1
Write the command to view all access lists created on your eq Telnet
router regardless of protocol. Access-list 99 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1
show access-lists 0.0.0.0. eq 23
show ip access-lists Access-list 110 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1
show ipx interfaces 0.0.0.0 eq 23
show ipx servers Access-list 110 permit IP 166.10.0.0 0.0.255.255 137.2.10.1
Answer A is correct because show access-lists enables you 0.0.0.0. eq 23
to view all access lists created on your router regardless of Answers A and C are correct. The only difference between
protocol. Answers B, C, and D are incorrect because these the two is that Answer A uses the host keyword and the
commands do not enable you to perform that specific function. Telnet keyword instead of a port number. Answer B is
incorrect because the access list number is 99, which is used for
Which of the following best describes the function of the standard lists. Answer D is incorrect because it uses IP instead of
following access list line? TCP after the permit statement.
Access-list 87 permit 145.19.2.1 0.0.0.0 155.6.0.0 0.0.255.255 --------------------------------
Any host on subnet 155.6.0.0 can access host 145.19.2.1.
22 As a system administrator, you want to debug igrp but
It is an IPX standard access list allowing host 145.19.2.1 to access are
any host on subnet 155.6.0.0. worried that the "debug IP igrp transaction" command will
It is an extended IP access list allowing hosts on network flood the console. What is the command that you should
use?
145.19.0.0 to access hosts on network 145.19.0.0, which can
A. debug IP igrp event
access host 155.6.255.255. B. debug IP igrp-events
It is an IP standard access list enabling host 145.19.2.1 to access C. debug IP igrp summary
any host on subnet 155.6.0.0. D. debug IP igrp events
Ans D
Answers A and C are incorrect because they do not state the The "debug IP igrp events" is used to only
actions of this access list correctly. Answer B is incorrect because display a summary of IGRP routing information. You can
this is not an IPX standard list. Answer D is correct because it append an IP address onto either command to see only the
IGRP updates from a neighbor.
correctly describes the access list behavior.
23 What does the following series of commands
accomplish?
Which of the following commands applies IPX SAP filter router igrp 71
1010 to an interface in the outbound direction? network 10.0.0.0
router igrp 109
IPX access-group 1010 out network 172.68.7.0
IPX output-sap-filter 1010 A. It isolates networks 10.0.0.0 and 172.68.7.0.
B. It loads igrp for networks 109 and 71.
-8-
C. It disables RIP. Ans: A
D. It disables all routing protocols. A default route is analogous to a default
Ans A gateway. It is used to reduce the length of routing tables
It isolates network 10.0.0.0 and 172.68.7.0 and and to provide complete routing capabilities when a router
associates autonomous systems 109 and 71 with IGRP. IGRP might not know the routes to all other networks.
does not disable RIP, both can be used at the same time. 31 Routers can learn about destinations through static
24 In the command "router igrp 109" what does 109 routes,
signify? default, or dynamic routing. By default, a router will use
A. an autonomous system information derived from __________.
B. any network number which the router is attached to A. IGRP
C. the allowable length of the routing table B. RIP
D. the network socket number C. IP
Ans A D. TCP
The Cisco IOS global configuration command Ans A
"router igrp xxx" is used to configure the Interior Gateway The quality of information is rated:
Routing Protocol. In this case, the 109 is called the Connected interface 0
process-id , which can also be used for an autonomous system Static route 1
number. IGRP 100
25 IGRP supports a feature that allows traffic to be RIP 120
distributed among up to 6 (4 default) paths to provide Unknown 255
greater overall throughput and reliability. What is this The lower the value, the more reliable the source with 255
called? signifying information that the router will ignore. So, the
A. unequal-cost load balancing router will use IGRP, rated at 100, before RIP, rated at
B. equal-cost load balancing 120.
C. proportionate load balancing 32 You are logged into a router, what command would
D. low cost load balancing show you the IP addresses of routers connected to you?
Ans A A. show cdp neighbors detail
An unequal-cost load balancing is used to B. show run
provide alternate paths for data distribution on an C. show neighbors
internetwork. Cisco developed this method to use unused or D. show cdp
under utilized links to increase bandwidth and network Ans A
availability. 33 As a system administrator, you perform an extended
26 IGRP uses flash updates, poison reverse updates, ping at
holddown the privileged EXEC prompt. As part of the display, you see
times, and split horizon. How often does it broadcast its "Set DF bit in IP header? [yes] :" What would happen if you
routing table updates? answered no at the prompt.
A. 90 seconds A. This lets the router fragment the packet.
B. 10 seconds B. It tells the router not to fragment the packet.
C. 30 seconds C. This lets the router direct the packet to the destination
D. 45 seconds it finds in its routing table.
Ans A D. It tell the router to send the packet to the next hop
router.
27 The command "show IP protocol" displays which Ans A
information? "Set DF bit in IP header?" is a response to an
A. routing timers extended ping at the router. If you answer yes (the default)
B. network information the router will not fragment the packet. If you answer no,
C. contents of the IP routing table the router will fragment the packet.
D. information about all known network and subnetworks
Ans A & B 34 You have typed "ping" 172.16.101.1 and get the
"show IP protocol" displays routing timers and following
network information. "show IP route" displays the routing display:
table with information about all known networks and Type escape sequence to abort.
subnetworks. Sending 5, 100-byte ICMP Echoes to 172.16.101.1,
28 When using RIP, routing updates are broadcast every timeout is 2 seconds:
____ .!!!!
seconds. What does the "." signify?
A. 30 A. That one message timed out.
B. 10 B. That all messages were successful.
C. 60 C. That one message was successful.
D. 90 D. That one message completed in under the allotted
Ans: A timeframe.
Novell's RIP updates routing tables every 60 Ans A
seconds, Apple's RTMP is every 10 seconds, routers ARP every The possible responses from the ping command are:
60 seconds, DECnet hosts and IGRP signal every 15 seconds, ! Successful receipt of an echo reply.
and Banyan VINES signals every 90 seconds. . Timed out waiting for a reply
29 An autonomous system can only exist if all routers in U Destination unreachable
that C Congestion-experienced packet
system meet which criteria? I Ping interrupted
A. interconnected ? Packet type unknown
B. run the same routing protocol & Packet TTL exceeded
C. assigned same autonomous system number 35 Which command, that is used to test address
D. run IGRP only configuration,
E. run RIP only uses Time-To-Live (TTL) values to generate messages from
Ans A,B &C each router.
An autonomous system is a set of routers and A. trace
networks under the same administration. Each router must be B. ping
interconnected, run the same routing protocol, and assigned C. telnet
the same autonomous system number. The network Information D. bootp
Center (NIC) assigns a unique autonomous system number to Ans: A
enterprises. The Cisco IOS EXEC command "trace [protocol]
30 A default route is analogous to a _________. [destination]" is used to discover routes that packets will
A. default gateway travel to their destination hosts. Trace uses TTL (Time to
B. static route Live) values to report destination route information.
C. dynamic route 36 What does the command "IP name-server
D. one-way route 255.255.255.255"
-9-
accomplish? Determine the subnet mask, address class, subnet
A. It sets the domain name lookup to be a local broadcast. address,
B. This is an illegal command. and broadcast address.
C. It disables domain name lookup. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255
D. The command is now defunct and has been replaced by "IP B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255
server-name ip any" C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0
Ans A D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
By default DNS is enabled on a router with a Ans A
server address of 255.255.255.255, which provides for a 44 You have an IP host address of 201.222.5.121 and a
local broadcast. subnet
37 As a system administrator, you need to provide your mask of 255.255.255.248. What is the broadcast address?
routers A. 201.222.5.127
with a Domain Name System (DNS) server. How many DNS B. 201.222.5.120
servers can you specify with one command? C. 201.222.5.121
A. 6 D. 201.222.5.122
B. 1 Ans A
C. 2 The easiest way to calculate this is to subtract
D. 4 255.255.255.248 (subnet mask) from 255.255.255.255, this
Ans A equals 7. Convert the address 201.222.5.121 to
You can only specify six name servers in one binary--11001001 11011110 00000101 01111001. Convert the
command. The syntax is "IP name-server server-address1 [[ mask 255.255.255.248 to binary--11111111 11111111 11111111
server-address2 ]...server-address6]. You must also enable 11111000. AND them together to get: 11001001 11011110
DNS. 00000101 01111000 or 201.222.5.120. 201.222.5.120 is the
38 How would you configure one host name that points to subnet address, add 7 to this address for 201.222.5.127 or
two IP the broadcast address. 201.222.5.121 through 201.222.5.126
addresses? are the valid host addresses.
A. IP host jacob 1.0.0.5 2.0.0.8 45 Given the address 172.16.2.120 and the subnet mask of
B. IP jacob 1.0.0.5 2.0.0.8 255.255.255.0. How many hosts are available?
C. IP host jacob 1.0.0.5 A. 254
D. IP host duplicate "all" B. 510
Ans A C. 126
The correct syntax is IP host name [ D. 16,372
TCP-port-number ] address [ address ]..... So, "IP host Ans A
P1R1 1.0.0.5 2.0.0.8" is the correct choice. "IP host jacob 172.16.2 120 is a standard Class B address with
1.0.0.5" only points the host name jacob to one IP a subnet mask that allows 254 hosts.
address--1.0.0.5. You are a network administrator and have been assigned the
39 The following selections show the command prompt and IP address of 201.222.5.0. You need to have 20 subnets with
the 5 hosts per subnet. The subnet mask is 255.255.255.248.
configuration of the IP network mask. Which two are 46 Which addresses are valid host addresses?
correct? A. 201.222.5.17
A. Router#term IP netmask-format { bitcount | decimal | B. 201.222.5.18
hexadecimal } C. 201.222.5.16
B. Router(config-if)#IP netmask-format { bitcount | decimal | D. 201.222.5.19
hexadecimal } E. 201.222.5.31
C. Router(config-if)#netmask-format { bitcount | decimal | Ans A,B & D
hexadecimal } Subnet addresses in this situation are all in
D. Router#ip netmask-format { bitcount | decimal | hexadecimal } multiples of 8. In this example, 201.222.5.16 is the
Ans A & B subnet, 201.22.5.31 is the broadcast address. The rest are
Router#term IP netmask-format { bitcount | valid host IDs on subnet 201.222.5.16.
decimal | hexadecimal } and Router(config-if)#IP 47 You are a network administrator and have been
netmask-format { bitcount | decimal | hexadecimal } are assigned the
correct. You can configure the mask for the current session IP address of 201.222.5.0. You need to have 20 subnets
and you can configure it for a specific line. with
5 hosts per subnet. What subnet mask will you use?
A. 255.255.255.248
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.240
40 When configuring the subnet mask for an IP address, Ans A
which By borrowing 5 bits from the last octet, you can.
formats can be used?A. dotted-decimal. have 30 subnets. If you borrowed only 4 bits you could only
B. Hexadecimal have 14 subnets. The formula is (2 to the power of n)-2.
C. Bit-count By borrowing 4 bits, you have (2x2x2x2)-2=14. By borrowing
D. Octal 5 bits, you have (2x2x2x2x2)-2=30. To get 20 subnets, you
E. Binary would need to borrow 5 bits so the subnet mask would be
Ans A, B &C 255.255.255.248.
41 You are given the following address: 153.50.6.27/25. 48 You are given the IP address of 172.16.2.160 with a
Determine the subnet mask, address class, subnet subnet
address, mask of 255.255.0.0. What is the network address in
and broadcast address. binary?
A. 255.255.255.128, B,153.50.6.0, 153.50.6.127 A. 10101100 00010000
B. 255.255.255.128, C,153.50.6.0, 153.50.6.127 B. 00000010 10100000
C. 255.255.255.128, C,153.50.6.127, 153.50.6.0 C. 10101100 00000000
D. 255.255.255.224, C,153.50.6.0, 153.50.6.127 D. 11100000 11110000
Ans A Ans: A
42 You are given the following address: 128.16.32.13/30. To find the network address, convert the IP
Determine the subnet mask, address class, subnet address to binary--10101100 000100000 00000010
address, 10100000--then ANDed it with the subnet mask--11111111
and broadcast address. 11111111 00000000 00000000. The rest is 10101100 00010000
A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 00000000 00000000, which is 172.16.0.0 in decimal.
B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 The first octet rule states that the class of an address can
C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 be determined by the numerical value of the first octet.
D. 255.255.255.248, B,128.16.32.12, 128.16.32.15 49 Which addresses are INCORRECTLY paired with their
Ans A class?
43 You are given the following address: 15.16.193.6/21. A. 128 to 191, Class B
- 10 -
B. 192 to 223 Class B 56 When the router runs out of buffer space, this is called
C. 128 to 191, Class C ________.
D. 192 to 223, Class C A. Source Quench
Ans B & C B. Redirect
Address classes are: 1 to 126, Class A; 128 to C. Information Request
191, Class B, 192 to 223, Class C; 224 to 239, Class D; and D. Low Memory
240 to 255, Class E. Ans A
The first octet rule states that the class of an address can Source quench is the process where the
be determined by the numerical value of the first octet. destination router, or end internetworking device will
50 Which addresses are INCORRECTLY paired with their "quench" the date from the "source", or the source router.
class? This usually happens when the destination router runs out of
A. 1 to 126, Class A buffer space to process packets.
B. 128 to 191, Class A 57 Which protocol carries messages such as destination
C. 1 to 126, Class B Unreachable, Time Exceeded, Parameter Problem, Source
D. 128 to 191, Class B Quench, Redirect, Echo, Echo Reply, Timestamp,
Ans:B & C. Information
Address classes are: 1 to 126, Class A; 128 to Request, Information Reply, Address Request, and Address
191, Class B, 192 to 223, Class C; 224 to 239, Class D; and Reply?
240 to 255, Class E. A. ICMP
The first octet rule states that the class of an address can B. UDP
be determined by the numerical value of the first octet. C. TCP
D. TFTP
51 Which addresses are INCORRECTLY paired with their E. FTP
class? Ans A
A. 240 - 255, Class D ICMP (Internet Control Message Protocol) is a
B. 240 - 255, Class E network layer internet protocol described in RFC # 792.
C. 224 - 239, Class D ICMP reports IP packet information such as destination
D. 224 - 239, Class E Unreachable, Time Exceeded, Parameter Problem, Source
Ans A & D Quench, Redirect, Echo, Echo Reply, Timestamp, Information
Address classes are: 1 to 126, Class A; 128 to Request, Information Reply, Address Request, and Address
191, Class B, 192 to 223, Class C; 224 to 239, Class D; and Reply.
240 to 255, Class E. 58 Two of the protocols that can be carried in the Protocol
52 Which IP Address Class is INCORRECTLY paired with its field of an IP packet are?
range A. TCP
of network numbers? B. UDP
A. Class A addresses include 192.0.0.0 through 223.255.255.0 C. FTP
B. Class A addresses include 1.0.0.0 through 126.0.0.0 D. TFTP
C. Class B addresses include 128.0.0.0 through 191.255.0.0 Ans A & B
D. Class C addresses include 192.0.0.0 through 223.255.255.0 The following are the fields in an IP segment,
E. Class D addresses include 224.0.0.0 through 239.255.255.0 their length, and their definitions:
Ans A VERS (Version number - 16 bits)
Class A addresses include 1.0.0.0 through HLEN (Number of 32-bit words in the header - 4 bits)
126.0.0.0 Type of Server (How the datagram should be handled - 32 bits)
Class B addresses include 128.0.0.0 through 191.255.0.0 Total Length (Total length of header and data - 32 bits)
Class C addresses include 192.0.0.0 through 223.255.255.0 Identification (Provide fragmentation of datagrams to allow
Class D addresses include 224.0.0.0 through 239.255.255.0 different MTUs in the internet - 4 bits)
53 Which IP Address Class can have 16 million subnets but Flags (Provide fragmentation of datagrams to allow different
support 254 hosts? MTUs in the internet - 4 bits)
A. Class C Frag Offset (Provide fragmentation of datagrams to allow
B. Class A different MTUs in the internet - 6 bits)
C. Class B TTL (Time-To-Live - 6 bits)
D. Class D Protocol (Upperlayer protocol sending the datagram - 16 bits)
Ans A Header Checksum )Integrity check on the header - 16 bits)
Possible Subnets IP Address Class Possible Hosts Source IP Address (32 bits)
254 A 16M. Destination IP Address (32 bits)
64K B 64K IP Options (network testing, debugging, security and others
16M C 254 - 4 bits)
54 Which IP Address Class can have 64,000 subnets with Data (4 bits).
64,000 59 Where would network testing be included in an IP
hosts per subnet? packet?
A. Class B A. IP Options field
B. Class A B. Identification field
C. Class C C. Type of Service field
D. Class D D. Reservation field
Ans A Ans A
IP Address Class The following are the fields in an IP segment,
Possible Subnets Possible Hosts their length, and their definitions:
254 A 16M VERS (Version number - 16 bits)
64K B 64K HLEN (Number of 32-bit words in the header - 4 bits)
16M C 254 Type of Server (How the datagram should be handled - 32 bits)
55 There are two processes to pair MAC address with IP Total Length (Total length of header and data - 32 bits)
addresses. Which process finds an IP address from a MAC Identification (Provide fragmentation of datagrams to allow
address? different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different
A. RARP MTUs in the internet - 4 bits)
B. ARP Frag Offset (Provide fragmentation of datagrams to allow
C. RIP different MTUs in the internet - 6 bits)
D. IGRP TTL (Time-To-Live - 6 bits)
Ans A Protocol (Upperlayer protocol sending the datagram - 16 bits)
ARP (Address Resolution Protocol) maps an IP Header Checksum )Integrity check on the header - 16 bits)
address to the MAC address, RARP (Reverse Address Resolution Source IP Address (32 bits)
Protocol) maps the MAC address to the IP address. ARP and Destination IP Address (32 bits)
RARP work at the internet layer of the Internet Model or the IP Options (network testing, debugging, security and others
network layer of the OSI model. - 4 bits)
Data (4 bits).
- 11 -
60 What field tells the Internet layer how to handle an IP B. DDR is dial-on-demand routing. It provides routing for high
packet? volume traffic.
A. Type of Service C. DDR is dial--on-demand routing. It provides a continuous WAN
B. Identification connection.
C. Flags D. DDR is dial-on-demand routing. It provides routing for low
D. Frag Offset volume and periodic
Ans A traffic.
The following are the fields in an IP segment, Answer: D
their length, and their definitions: DDR is dial-on-demand routing. It provides routing for low volume
VERS (Version number - 16 bits) and periodic
HLEN (Number of 32-bit words in the header - 4 bits) traffic. It initiates a call to a remote site when there is traffic to
Type of Server (How the datagram should be handled - 32 bits) transmit.
Total Length (Total length of header and data - 32 bits) 65 What are the two types of access lists that can be
Identification (Provide fragmentation of datagrams to allow configured on a Cisco
different MTUs in the internet - 4 bits) router?
Flags (Provide fragmentation of datagrams to allow different A. Standard
MTUs in the internet - 4 bits) B. Extended
Frag Offset (Provide fragmentation of datagrams to allow C. Filtering
different MTUs in the internet - 6 bits) D. Packet
TTL (Time-To-Live - 6 bits) Ans: A & B
Protocol (Upperlayer protocol sending the datagram - 16 bits) The access lists are standard and extended. Standard access lists
Header Checksum )Integrity check on the header - 16 bits) for IP check the
Source IP Address (32 bits) source address of packets that could be routed. Extended access
Destination IP Address (32 bits) lists can check the
IP Options (network testing, debugging, security and others source and destination packet plus check for specific protocols,
- 4 bits) port numbers, etc.
Data (4 bits). 66 When using access lists, what does a Cisco router check
61 Which fields of an IP packet provide for fragmentation first?
of A. To see if the packet is routable or bridgeable
datagrams to allow differing MTUs in the internet? B. The destination address
A. Identification C. The source address
B. Flags D. The packet contents
C. Frag Offset Ans A
D. Type of Service The first thing checked is to see if the packet is routable or
E. Total Length bridgeable. If it is not, the
Ans A, B & C packet will be dropped.
The following are the fields in an IP segment, 67 How many access lists are allowed per interface?
their length, and their definitions: A. One per port, per protocol
VERS (Version number - 16 bits) B. Two per port, per protocol
HLEN (Number of 32-bit words in the header - 4 bits) C. Unlimited
Type of Server (How the datagram should be handled - 32 bits) D. Router interface +1 per port.
Total Length (Total length of header and data - 32 bits) Ans: A
Identification (Provide fragmentation of datagrams to allow Only one access list is allowed per interface. An access list must
different MTUs in the internet - 4 bits) have conditions that
Flags (Provide fragmentation of datagrams to allow different test true for all packets that use the access list.
MTUs in the internet - 4 bits) 68 What do the following commands accomplish?
Frag Offset (Provide fragmentation of datagrams to allow access-list 1 deny 172.16.4.0 0.0.0.255
different MTUs in the internet - 6 bits) access-list 1 permit any
TTL (Time-To-Live - 6 bits) interface ethernet 0
Protocol (Upperlayer protocol sending the datagram - 16 bits) IP access-group 1 out
Header Checksum )Integrity check on the header - 16 bits) A. This will block traffic from subnet 172.16.4.0 and allow all other
Source IP Address (32 bits) traffic.
Destination IP Address (32 bits) B. This will allow traffic from subnet 172.16.4.0 and block all other
IP Options (network testing, debugging, security and others traffic.
- 4 bits) C. All traffic is allowed.
Data (4 bits). D. All traffic is blocked.
62 Which processes does TCP, but not UDP, use? Ans: A
A. Windowing This will block traffic from subnet 172.16.4.0 and allow all other
B. Acknowledgements traffic. The first
C. Source Port statement "access-list 1 deny 172.16.4.0 0.0.0.255" will deny
D. Destination Port access to the subnet
Ans A & B 172.16.4.0.
UDP (User Datagram Protocol) does not use 69 What do the following statements in an extended access
sequence or acknowledgement fields in transmission. list accomplish?
UDP is a connectionless and unreliable protocol, since there access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
is no delivery checking mechanism in the UDP data format. 0.0.0.255 eq 21
63 What is the UDP datagram format? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
A. Source Port - 16 bits, Destination Port - 16 bits, Length 0.0.0.255 eq 20
- 16 Bits, Checksum - 16 bits, Data access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
B. Destination Port - 16 bits, Source Port - 16 bits, Length 255.255.255.255
- 16 Bits, Checksum - 16 bits, Data A. This will block ftp traffic.
C. Source Port - 16 bits, Destination Port - 16 bits, B. This will block http traffic.
Checksum - 16 Bits, Length - 16 bits, Data C. This will permit ftp traffic.
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 D. This will permit tftp traffic.
Bits, Checksum - 8 bits, Data Ans: A
Ans A This will block ftp traffic since ftp uses ports 20 and 21.
The UDP format for a segment is as follows: 70 Access lists are numbered. Which of the following
Source Port 16 bits ranges could be used for
Destination Port 16 bits an IP access list?
Length 16 bits A. 600 - 699
Checksum 16 bits B. 100 - 199
Data xx bits C. 1 - 99
64 What is the function of DDR on Cisco routers? D. 800 - 899
A. DDR is dial--on-demand routing. It provides a continuous LAN E. 1000 - 1099
only connection. Answer: B & C
- 12 -
AppleTalk access lists use numbers in the 600 - 699 range. IP uses C. It isn't import where access lists are placed since the router will
1 - 99 for standard read and cache the
access lists or 100-199 for extended access lists. IPX uses 800 - whole list.
899 or 900 - 999 for D. Put access lists as close to corporate headquarters as possible.
extended access lists. IPX SAP filters use 1000 - 1099. Ans A
71 Cisco routers use wildcard masking to identify how to Put standard access lists as near the destination as possible. Put
check or ignore extended access lists
corresponding IP address bits. What does setting a as close to the source as possible. Standard access lists don't
wildcard mask bit to 0 cause specify the destination
the router to do? address.
A. It tells the router to check the corresponding bit value. 76 As the system administrator, you enter the following
B. It tells the router to ignore the corresponding bit value. commands at the
C. It tells the router to check its alternate routing list. command prompt:
D. It tells the router to use its primary routing list. ipx routing
Ans A access-list 800 permit 2b 4d
It tells the router to check the corresponding bit value. int e0
72 You are a system administrator and you want to deny ipx network 4d
access to a group of ipx access-group 800 out
computers with addresses 172.30.16.0 to 172.30.31.0. int e1
Which wildcard mask ipx network 2b
would you use? int e2
A. 0.0.15.255 ipx network 3c
B. 0.0.255.255 What did these command accomplish?
C. 0.0.31.255 A. Traffic from network 4c destined for network 4d will be
D. 0.0.127.255 forwarded out Ethernet0.
E. 0.0.255.255 B. Traffic from network 3c destined for network 4d will be
Ans: A forwarded out Ethernet0.
0.0.15.255 will check the last 13 bits of an address so that C. Traffic from network 2b destined for network 4d will be
computers 172.30.16.0 to forwarded out Ethernet0.
172.30.31.0 will be denied access. 0.0.31.255 would check the last D. Traffic from network 4d destined for network 2d will be
6 binary digits forwarded out Ethernet0.
and deny access to addresses 172.30.32.0 to 172.30.63.0. Ans C
0.0.127.255 would check Traffic from network 2b destined for network 4d will be forwarded
the last 7 binary digits and deny access to addresses 172.30.64.0 out Ethernet0.
to 172.30.127.0. The other interfaces E1 and E2 are not subject to the access list
0.0.255.255 would deny 172.30.0.0 to 172.30.254.0. If you write since they lack the
decimal 15 in access group statement to link them to access list 800.
binary, you have 0001111, the 1's tell the router to ignore address 78 The following commands were entered at the command
with these bits set; prompt of a Cisco
0's tell the router to check the bits. The third octet for 172.30.16.0 router. What do they accomplish?
is 00010000. The access-list 1000 deny 9e.1234.5678.1212 4
third octet for 172.30.31.0 would be 00011111. So, traffic from access-list 1000 permit -1
these addresses interface ethernet 0
would be denied. ipx network 9e
73 In order to limit the quantity of numbers that a system interface ethernet 1
administrator has to ipx network 4a
interface serial 0
enter, Cisco can use which abbreviation to indicate 0.0.0.0?
ipx network 1
A. host
ipx output-sap-filter 1000
B. any A. File server advertisements from server 9e.1234.5678.1212 will not
C. all be forwarded
D. include on interface S0.
Ans: A B. All other SAP services, other than file server, from any source will be
Cisco uses host to specify 0.0.0.0. This tells the router to check all. forwarded
Cisco uses any to on S0.
specify 255.255.255.255. This tells the router to ignore all and C. All other SAP services, other than print server, from any source will
permit any address to be forwarded
use an access list test. on S0.
74 What do the following commands accomplish? D. Print server advertisements from server 9e.1234.5678.1212 will not
access-list 1 permit 172.16.0.0 0.0.255.255 be forwarded
interface ethernet 0 on interface S0.
IP access-group 1 out Ans A & B
interface ethernet 1 File server advertisements from server 9e.1234.5678.1212 will not
IP access-group 1 out be forwarded on
A. Only traffic from the source network 172.16.0.0 will be blocked. interface S0. All other SAP services, other than file server, from
B. Only traffic from the source network 172.16.0.0 will be any source will be
forwarded. Non- forwarded on S0.
172.16.0.0 network traffic is blocked. 79 You receive "input filter list is 800 and output filter list
C. Non-172.16.0.0 traffic will be forwarded. is 801" as part of the
D. All traffic will be forwarded. output from a show interfaces command. What kind of
Ans: B traffic are you filtering?
Only traffic from the source network 172.16.0.0 will be forwarded. A. IPX/SPX
Non-172.16.0.0 B. TCP/IP
network traffic is blocked. The wildcard mask 0.0.255.255 tells the C. LocalTalk
router to check D. DDR
the first 2 octets and to ignore the last 2 octets. Ans: A
75 When using access lists, it is important where those Because the access list is numbered in the 800 range, you are
access lists are placed. filtering IPX/SPX
Which statement best describes access list placement? traffic.
A. Put standard access lists as near the destination as possible. Put 80 Which service uses telephone control messages and
extended access signals between the
lists as close to the source as possible. transfer points along the way to the called destination?
B. Put extended access lists as near the destination as possible. A. Signaling System 7 (SS7)
Put standard access B. Time-division Multiplexing (TDM)
lists as close to the source as possible. C. X.25
D. Frame relay
- 13 -
Ans: A D. Synchronous serial
Signaling System 7 (SS7) uses telephone control messages and signals Ans A, B, C & D
between the transfer points along the way to the called destination. All four of them can carry PPP traffic. HSSI is High Speed Serial
Time-division Multiplexing (TDM) has information from multiple sources Interface.
and allocates bandwidth on a single media. Circuit switching uses 86 Select the correct statements about PPP and SLIP for
signaling to determine the call route, which is a dedicated path WAN communications?
between the sender and the receiver. Basic telephone service and A. PPP uses its Network Control Programs (NCPs) component to
Integrated Services Digital Network (ISDN) use TDM circuits. X.25 and
encapsulate
Frame Relay services have information contained in packets or frames
multiple protocols.
to share nondedicated bandwidth. X.25 avoids delays for call setup.
Frame Relay uses permanent virtual circuits (PVCs).
B. PPP can only transport TCP/IP
81 Which service takes information from multiple sources C. SLIP can only transport TCP/IP.
and allocates D. SLIP uses its Network Control Programs (NCPs) component to
bandwidth on a single media? encapsulate
A. Time-division Multiplexing (TDM) multiple protocols.
B. Signaling System 7 (SS7) Ans A & C
C. X.25 87b Which protocol for PPP LCP (Link Control Protocol)
D. Frame relay performs a challenge
Ans A handshake?
82 Which three devices can be used to convert the user A. CHAP
data from the DTE into a B. PAP
form acceptable to the WAN service's facility? C. UDP
A. Modem D. IPX
B. CSU/DSU Ans: A
C. TA/NT1 87bWhich form of PPP error detection on Cisco routers
D. CO monitors data dropped
E. SS7 on a link?
Ans A, B & C A. Quality
A modem, CSU/DSU (Channel Service Unit/Data Service Unit), or B. Magic Number
TA/NT1 C. Error Monitor
(Terminal Adapter/Network Termination 1) can be used to convert D. Droplink
the user data from Ans: A
the DTE into a form acceptable to the WAN service's facility. The Quality protocol monitors data dropped on a link. Magic
83 What is the juncture at which the CPE ends and the local Number avoids frame
loop portion of the looping.
service begins? 88 Which protocol for PPP provides load balancing across
A. Demarc multiple links?
B. CO A. Multilink Protocol (MP)
C. Local loop B. Quality
D. Last-mile C. Magic Number
Ans A D. Stacker
The demarcation or demarc is the juncture at which the CPE ends E. Predictor
and the local loop Ans A
portion of the service begins. The CO (Central Office) is the nearest 89 As the system administrator, you type "ppp
point of presence authentication chap pap secret".
for the provider's WAN service. The local loop or "last-mile" is the Which authentication method is used first in setting up a
cabling that session?
extends from the demarc into the WAN service provider's central A. secret
office. B. PAP
84 You can access three forms of WAN services with Cisco C. CHAP
routers. Select the D. PPP/SLIP
three forms: Ans C
A. Switched or relayed services 90 Select the compression protocols for PPP?
B. Interface front end to IBM enterprise data center computers A. Stac
C. Using protocols that connect peer-to-peer devices like HDLC or B. Predictor
PPP C. Quality
encapsulation. D. Magic Number
D. IPX/SPX Ans: A & B
E. NetBEUI 91 What are the three phases of PPP session
Ans: A, B & C establishment?
You can access three forms of WAN services with Cisco routers. A. Link establishment phase
Switched or relayed services include X.25, Frame Relay, and ISDN. B. Authentication phase
An interface front end to IBM enterprise data center computers C. Network layer protocol phase
includes SDLC. And, you can access the services of WAN providers D. Handshake phase
using protocols that connect peer devices such as HDLC and PPP E. Dial-in phase
encapsulation. IPX/SPX and NetBEUI are LAN protocols. Ans A, B & C
85 Select the fields for the Cisco HDLC protocol: 92 What is the default IPX Ethernet encapsulation?
A. Flag, Address, Control A.) SNAP
B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, B.) Arpa
Data), FCS, Flag C.) 802.2
C. Flag, Address, Control, Data, FCS, Flag D.) Novell-Ether
D. Flag, Address, Control, Proprietary, Data, FCS, Flag E.) SAP
Ans D Ans D
The Cisco HDLC frame format is Flag, Address, Control Proprietary, 93 What must be true for two Routers running IGRP to
Data, FCS, communicate their
Flag. The PPP frame format is Flag, Address, Control, Protocol, LCP routes?
(Code, A.) Same autonomous system number
Identifier, Length, Data), FCS, Flag. The SDLC and LAPB format is B.) Connected using Ethernet only
Flag, Address, C.) Use composite metric
Control, Data, FCS, Flag. D)Configured for PPP
Select the physical interfaces that PPP can be configured Ans A
on a Cisco router: 94 The following is partial output from a routing table,
A. Asynchronous serial identify the 2 numbers in
B. HSSI the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1,
C. ISDN 00:00:23, Ethernet1'
A.) 100 = metric, 1300 = administrative distance
- 14 -
B.) 100 = administrative distance, 1300 = hop count D.) 96Kpbs
C.) 100 = administrative distance, 1300 = metric Ans B
D.) 100 = hop count, 1300 = metric The default bandwidth is T1.
Ans C 104 Identify 2 functions of IPX access-lists?
95 Identify 3 methods used to prevent routing loops? A.) Control SAP traffic
A.) Split horizon B.) Limit number of Novell servers on a network
B.) Holddown timers C.) Limit number of workstations on a network
C.) Poison reverse D.) Block IPX traffic
D.) SPF algorithm Ans A D
E.) LSP's IPX access lists are used to restrict IPX traffic and SAP broadcasts.
Ans A B C 105 Identify 2 HDLC characteristics?
96 Which statement is true regarding full duplex? A.) Default serial encapsulation
A.) Allows for transmission and receiving of data simultaneously B.) Open standard
B.) Only works in a multipoint configuration C.) Supports Stacker compression
C.) Does not affect the bandwidth D.) Supports point-to-point and multipoint
D.) Allows for transmission and receiving of data but not a the Ans A D
same time HDLC is the default serial encapsulation and supports point-to-
Ans A point and multipoint.
Full duplex is just the opposite of half duplex. It handles traffic in It is not an open standard and does not support compression.
both directions 106 Identify 3 IP applications?
simultaneously. A.) AURP
97 Identify the switching method that receives the entire B.) ARP
frame then dispatches C.) Telnet
it? D.) SMTP
A.) Cut-through E.) DNS
B.) Receive and forward F.) RARP
C.) Store and forward Ans C D E
D.) Fast forward ARP and AURP are not part the application layer of the TCP/IP
Ans C stack. SMTP -
Store and forward switching receives the entire frame before Simple Mail Transfer Protocol, Telnet, DNS - Domain Name Services
dispatching it. (name to IP
98Identify the purpose of ICMP? resolution).
A.) Avoiding routing loops 107 Identify 3 LAN technologies?
B.) Send error and control messages A.) FDDI
C.) Transporting routing updates B.) HDLC
D.) Collision detection C.) HSSI
Ans B D.) X.25
ICMP is used to send error and control messages. Ping uses ICMP E.) 802.3
to carry the echorequest F.) 802.5
and echo-reply. Ans A E F
99Which statement is true regarding the user exec and The question is asking for 3 LAN technologies, HDLC, HSSI and
privileged exec mode? X.25 are all WAN
A.) The '?' only works in Privileged exec technologies.
B.) They are identical 108 Identify the 4 that are not LAN technologies?
C.) They both require the enable password A.) HDLC
D.) User exec is a subset of the privileged exec B.) FDDI
Ans D C.) 802.5
The user exec mode is a subset of the privileged exec mode. Only D.) HSSI
a certain number of E.) SDLC
commands are available at the user exec mode. F.) Frame Relay
100 Which OSI layer end to end communication, Ans A D E F
segmentation and re-assembly? 802.5 and FDDI are LAN technologies
A.) Network 109 Which OSI layer supports the communication
B.) Transport component of an application?
C.) Physical A.) Data-Link
D.) Application B.) Physical
E.) Data-Link C.) Session
F.) Presentation D.) Presentation
Ans B E.) Application
Layer 4 the Transport layer performs this function. F.) Transport
101 What IP command would you use to test the entire IP Ans E
stack? Layer 7 the Application layer performs this function.
A.) Stack-test 110 Identify the length of an IPX address and it's
B.) Arp components?
C.) Telnet A.) 80 bits, 48 bits network and 32 bits node
D.) Ping B.) 32 bits, 16 bits network and 16 bits node
E.) Trace C.) None of the above
Ans C D.) 80 bits, 32 bits network and 48 bits node
Because Telnet is an application and it resides at the top of the Ans D
stack it traverses down IPX address has 2 components; network and node. The network
the stack and up the stack at the receiving end. address is 32 bits and
102 Identify the 2 hardware components used to manage the node is 48 bits, total of 80 bits.
and/or configure a 111 Identify the administrative distance and appropriate
router? routing protocol?
A.) Auxiliary port A.) RIP = 255, IGRP = 100
B.) ROM port B.) RIP = 100, IGRP = 120
C.) Management port C.) RIP = 1, IGRP = 0
D.) Console port D.) RIP = 120, IGRP = 100
Ans A D Ans D
The 2 hardware ports used to configure the router are the console The administrative distance for RIP is 120 and IGRP is 100. The
and auxiliary ports. lower the AD the
103 What is the default bandwidth of a serial connection? better the routing information.
A.) 1200 baud 112 Which OSI layer incorporates the MAC address and the
B.) 1.544 Mbps (T1) LLC?
C.) 10 Mbps A.) Data link
- 15 -
B.) Network B.) 1 - 99
C.) Physcial C.) 1000 - 1099
D.) Transport D.) 100 - 199
Ans): A Ans D
Layer 2 the Data-Link layer incorporates the MAC and LLC IP extended access-lists use the number range of 100-199.
sublayers 121 Identify the X.25 addressing standard?
113 If configuring a Cisco router to connect to a non-Cisco A.) X.121
router across a B.) X.25a
Frame Relay network, which encapsulation type would you C.) ITU-1
select? D.) Q933a
A.) Q933a Ans A
B.) ISDN The X.25 layer 3 addressing standards is X.121.
C.) IETF 122 Identify 3 features of IGRP?
D.) CISCO A.) Composite metric
E.) ANSI B.) New horizon
Ans C C.) Flash updates
There are two types of Frame Relay encapsulations; Cisco and IETF. D.) 60 periodic updates
IETF is E.) Poison reverse
required when connecting a Cisco to a non-Cisco router. Ans A C E
114 Identify the 2 items that TCP and UDP share in IGRP uses a composite metric made up of bandwidth and delay by
common? default, it updates
A.) Both use port numbers to identify upper level applications every 60 seconds and will trigger an update if the topology
B.) Operate at the Network layer changes.
C.) Both are Transport protocols 123 Where is the backup configuration file stored?
D.) Both are reliable communications A.) RAM
Ans A C B.) ROM
TCP and UPD are both layer 4 Transport protocols and both use C.) Console
port number to D.) NVRAM
identify upper level applications. Ans D
115 Identify 3 characteristics of IP RIP? One location to store the backup configuration is NVRAM.
A.) Distance vector 124 Identify the correct pair of Novell Ethernet
B.) Administrative distance is 120 encapsulation and Cisco
C.) Periodic updates every 60 seconds terminology?
D.) Uses a composite metric A.) Ethernet II, Snap
E.) Can load balance B.) Ethernet 802.3, Novell-Ether
Ans A B E C.) Ethernet SNAP, Arpa
IP RIP is a distance vector protocol, it can load balance up to 4 D.) Ethernet 802.2, Snap
equal cost paths and Ans B
it's rating of trustworthiness is 120. The default IPX LAN encapsulation is Novell-Ether which is 802.3
116 Which of the following is a layer 2 device? 125 Identify 3 characteristics regarding IP access-lists?
A.) Switch A.) Can be configured as a standard access-list
B.) Router B.) Can be run from another router running IP
C.) Repeater C.) Can be configured as a named access-list
D.) Hub D.) Are the same as IPX access-lists
Ans A E.) Can be configured as an extended access-list
A Hub and Repeater are layer 1 devices. A Router is a layer 3 Ans A C E
device. There are 3 types of IP access-lists; standard, extended and
named. Named accesslists
can be either standard or extended depending on how they are
117 Identify the definition of demarcation? configured.
A.) Date in which the WAN service contract expires 126 Identify 3 ways in which a router can be configured?
B.) Cabling which extends from the WAN service provider to the A.) TFTP
customer B.) Nvram
C.) Division of responsibility, where the CPE ends and the local loop C.) Ping
begins D.) Console
D.) Equipment which is located at the customer premises E.) Trace
Ans C Ans A B D
Demarcation is the point in which responsibility changes hands. Changes to the configuration can be entered via the console, a
118 Identify the 3 key features of the Cisco Discovery config stored in
Protocol? NVRAM or on a TFTP server. Trace and ping are tools to verify
A.) Off by default connectivity.
B.) Will allow for the discovery of layer 3 addresses on neighbor 127 A traffic light is an example of what type of
routers mechanism?
C.) Verify connectivity A.) Collision detection
D.) Open standard B.) Flow control
E.) Does not require any layer 3 protocols to be configured C.) Sequence numbering
Ans B C E D.) Network management
CDP is used for 2 basic reasons; neighbor connectivity and layer 3 Ans B
discovery if A Traffic light is an example of flow control.
configured. It is proprietary and is on by default. 128 Windowing is a type of?
119 Identify the 3 characteristics of IPX RIP? A.) Negative acknowledgement
A.) Distance vector B.) Address resolution
B.) Does not support multiple paths C.) Layer transition mechanism
C.) 60 second updates D.) Flow control
D.) Default encapsulation is SAP Ans D
E.) Uses ticks and hop count as a metric Windowing allow the sender and receiver to dictate how much
Ans A C E information that can
IPX RIP is a distance vector routing protocol, it does support be received prior to an acknowledgement. It is a form of flow
multiple paths, the control.
default encapsulation is 'novell-ether', it uses tick count as a 129 Identify the 2 types of access-list filters that control
primary metric and hop SAP traffic?
count as a tie breaker and it sends it’s updates every 60 seconds. A.) Novell-ether
120 Identify the access-list range for an extended IP B.) Arpa
access-list? C.) Input-sap-filter
A.) 800 - 899 D.) Round-robin
- 16 -
E.) Output-sap-filter remote node initiates the authentication process.
Ans C E 138 Identify the switching method that examines the
SAP's can be blocked by 2 methods; inbound and outbound. destination MAC address as
130 Identify the 3 guidelines for routers in the same the frame is being received then begins forwarding the
autonomous system? frame prior to receiving
A.) Must be configured for IGRP or RIP the entire frame?
B.) Interconnected A.) Fragment-free
C.) Assigned the same autonomous system number B.) Store and Forward
D.) Configured for the same routing protocol C.) Cut-through
E.) Must be same model of router D.) Fast forward
Ans B C D Ans C
Autonomous system must be interconnected, assigned the same Cut through examines the destination MAC address and begins
AS # and configured forwarding the frame
with the same routing protocol. prior to receiving the entire frame.
131 Identify the hardware component used to store 139 Identify 1 characteristic of RARP?
buffers, tables, runningconfiguration A.) IP to MAC address translation
etc? B.) Connectionless delivery of packets
A.) NVRAM C.) Can be used to initiate remote O/S load sequence
B.) ROM D.) Generates error and control messages
C.) RAM Ans C
D.) Flash Reverse Address Resolution Protocol is used to obtain a layer 3
Ans C address if the MAC
RAM is the dynamic memory area. ROM contains the boot strap address is known which then facilitates the loading of the O/S.
code, NVRAM 140 Identify the protocol to test connectivity without
contains the startup-config and Flash contains the IOS. configuring any layer 3
132 Identify 3 UDP characteristics? protocols?
A.) Reliable communication protocol A.) TCP
B.) Applications that use UDP must incorporate reliability B.) Ping
C.) Connection-less oriented C.) IP
D.) Incorporates no handshaking D.) CDP
Ans B C D E.) Telnet
UPD is a layer 4 Transport protocol. It is connection-less because it Ans D
does establish a CDP can be used to verify connectivity prior to any layer 3
connection therefore the 3 step handshake is not needed, it does protocols being
NOT implement any configured.
flow control or acknowledgments. Any application that uses UDP 141 LMI operates between the Frame Switch and what
must incorporate other device?
any needed reliability. A.) CPE device
133 Identify the IPX standard access-list number range? B.) Another Frame Switch
A.) 600 - 699 C.) X.25 switch
B.) 1000 - 1099 D.) Novell File Server
C.) 1 - 99 Ans A
D.) 100 - 199 LMI stands for local management interface. It operates between
E.) 800 - 899 the Frame Relay
Ans E switch and the customer equipment.
IPX standard access-list range is 800-899. 142 Identify IPX SAP and it's purpose?
134 Which OSI layer provides best effort end to end packet A.) Sonet Access Pipe - interface to Sonet ring
delivery? B.) Service Advertising Protocol - advertise services
A.) Data-Link C.) Server Appletalk Protocol - appletalk directory services
B.) Presentation D.) Service Access Point - identify upper layer protocols
C.) Network Ans B
D.) Transport SAP is an Novell protocol to advertise services.
E.) Physical 143 Identify the default values that make up IGRP's
F.) Application composite metric?
Ans C A.) Bandwidth
Layer 3 the Network layer performs this function. B.) Load
135 Identify the 2 methods to modify the routers boot C.) Reliability
sequence? D.) MTU
A.) Setup program E.) Delay
B.) Boot system commands Ans A E
C.) RXBoot IGRP can be configured to use all 5 within it's metric. By default it
D.) Config-register uses bandwidth
Ans B D and delay.
'Boot system' command the 'config-register' are used to 144 Identify the default serial encapsulation?
manipulate the boot sequence. A.) ISDN
136 Identify the 3 pieces of hardware you would not install B.) HDLC
to prevent C.) SDLC
broadcasts? D.) Frame Relay
A.) Switch E.) PPP
B.) Repeater Ans B
C.) Bridge The default serial encapsulation is HDLC.
D.) Router 145 Identify the purpose of ARP?
Ans A B C A.) Avoiding routing loops
Router are implemented not only to break up networks into smaller B.) Determining a workstation's IP address
segments but C.) Sending a directed broadcast
they are used to block broadcasts. D.) Determining a workstation's MAC address
137 Identify 2 features of PPP PAP authentication? Ans D
A.) Username and password is sent in clear text ARP is used to find a devices MAC address given an IP address.
B.) Authentication messages are sent periodically during the 146 What is the purpose of the DLCI?
connection A.) Identifies the remote routers
C.) More secure than CHAP B.) Contained with a 802.2 frame for routing purposes
D.) Remote node is control of authentication process C.) Used with PPP during authentication
Ans A D D.) Identifies the PVC in a Frame Relay network
PPP PAP authentication sends the username and passwords in Ans D
clear text and the
- 17 -
DLCI stands for Data Link Connection Identifier. It identifies the D.) HDLC
local PVC. Ans D
147 Identify 3 characteristics of the Network layer (OSI The default IPX serial encapsulation is HDLC.
layer 3)? 155 Identify the hardware component that stores the
A.) Connection oriented backup configuration?
B.) Path determination A.) RAM
C.) Supports multiplexing B.) NVRAM
D.) Manages sessions C.) Flash
E.) Packet forwarding D.) ROM
Ans B C E Ans B
The network layer is responsible for routing which entails learning NVRAM contains the backup config. RAM is the dynamic memory
the paths, selecting area, ROM
the best path and forwarding the packet. Because it services contains the boot strap code and Flash contains the IOS.
multiple layer 4 156 Identify the extended IP access-list number range?
protocols it multiplexes. A.) 600 - 699
148 Identify 3 characteristics of switches? B.) 1 - 99
A.) Increase available bandwidth C.) 900 - 999
B.) Decrease broadcast traffic D.) 100 - 199
C.) Support full duplex in a multipoint topology Ans D
D.) Make forwarding decision using MAC address The extended IP access-list range is 100-199.
E.) Create collision domains 157 Identify 3 Fast Ethernet technologies?
Ans A D E A.) 100 Base FastEther
Switches operate at layer 2. They increase bandwidth by reducing B.) 100 Base FX
the number of C.) 100 Base T4
devices sharing the media. They isolate collisions. Like a bridge D.) 100 Base TX
they forward traffic Ans B C D
based upon layer 2 address/ MAC address. 100 BaseFastEther is false. 100 Base FX, TX and T4 are all valid.
149 Which OSI layer handles physical address, network
topology? 158 Identify the OSI layer which is responsible for end-to-
A.) Presentation end connections?
B.) Physical A.) Network
C.) Transport B.) Transport
D.) Application C.) Session
E.) Data-Link D.) Data link
F.) Network E.) TCP
Ans E Ans B
Layer 2 the Data-Link layer performs this function. Layer 4 is the Transport layer and is responsible for end-to-end
150 Identify 2 reasons for disabling CDP? connections.
A.) If the router is not configured for RIP 159 Identify the 2 characteristics regarding MAC
B.) Save bandwidth by eliminating overhead addresses?
C.) If the router is configured for Appletalk A.) Contains a network portion and host portion
D.) When connected to a non-Cisco router B.) Always assigned by System Administrator
Ans B D C.) 48 bits long
CDP can be disabled here are a couple of reasons. Connecting a D.) Contains a vendor code and serial number
Cisco router to a Ans C D
non-Cisco router. Don't want to exchange CDP information to save MAC addresses are assigned by the vendor. Each MAC address is
bandwidth. 48 bits long and
151 Identify 3 characteristics of ISDN? made up of 24 bits vendor code and 24 bits serial number.
A.) Transports voice and data 160 Identify the number range for IPX SAP filters?
B.) Transports voice only A.) 900 - 999
C.) Support both BRI and PRI B.) 1000 - 1099
D.) Runs over existing phone lines C.) 800 -899
E.) Same as X.25 D.) 100 - 199
Ans A C D Ans B
ISDN supports voice, data, and video. It runs over existing phone The IPX SAP filtering range is 1000-1099.
lines and supports 161 What is the purpose of ARP?
128K (BRI) and T1 (PRI). A.) IP to host name resolution
152 Identify the 3 characteristics of IGRP? B.) Host name to IP address resolution
A.) Uses hop count as a metric C.) Mac to IP address resolution
B.) Supports multiple unequal paths D.) IP to Mac address resolution
C.) Administrative distance is 100 Ans D
D.) Configured with an Autonomous system number Address Resolution Protocol resolves the MAC address if the IP
E.) Link state address is known. It
Ans B C D is a layer 3 protocol.
IGRP is a distance vector routing protocol, it's degree of 162 Which OSI layer establishes, maintains and terminates
trustworthiness is 100, it can sessions between
support up to 6 un-equal paths and must be configured with an hosts?
autonomous system A.) Application
number. B.) Physical
153 Identify 2 features of PPP CHAP authentication? C.) Data-Link
A.) Username and password is sent in clear text D.) Presentation
B.) Authentication messages are sent periodically during the E.) Network
connection F.) Session
C.) Less secure then PAP Ans F
D.) Local router 'challenges' the remote router Layer 5 the Session layer performs this function.
Ans B D 163 Which statement is true regarding Administrative
PPP CHAP authentication message are sent periodically during the distance?
connection by A.) It is a metric
challenging the other end of the connection. B.) Number of hops between two routers
It is more secure than PAP and passwords and username are C.) Trustworthiness of the routing information
encrypted. D.) RIP Administrative distance is 100
154 Identify the default IPX serial encapsulation? Ans C
A.) Novell-Ether Administrative distance is rating of trustworthiness of the routing
B.) SDLC information. The
C.) SNAP lower the AD the better the information.
- 18 -
164 Identify the purpose of the Ping command? Ans A C D
A.) Share routing information with a neighbor router AURP and ICMP are not routing protocols.
B.) Transmit user data when buffers are full 173 Identify the type of routing protocol that exchanges
C.) Test connectivity at layer 3 entire routing tables at
D.) Test entire protocol stack regular intervals?
Ans C A.) Link state
The ping command tests layer 3 connectivity. B.) Interior gateway protocols
165 Identify the order of the 5 step encapsulation? C.) Appletalk routing
1. Create the segment D.) Distance vector
2. Convert the frame to bits Ans D
3. Create the packet Distance Vector routing protocols exchange entire routing tables
4. Create the frame with it's neighbors.
5. User creates the data Link State routing protocols exchange LSP's to share information
A.) 1,2,4,2,5 regarding the
B.) 2,1,3,4,5 networks they know.
C.) 5,1,3,4,2 174 Identify the type of hardware required to connect a
D.) 5,3,4,1,2 Token ring network to
Ans C an Ethernet network?
Cisco 5 step encapsulation. A.) Repeater
1) User creates Data B.) TR-Enet
2) Data is converted into a segment at layer 4 C.) Router
3) The segment is converted to packet at layer 3 D.) Token Ring to Ethernet translation hub
4) The packet it converted into a frame at layer 2 Ans C
5) The frame is converted into bits at layer 1 Routers are used to connect dissimilar networks with different
166 The Cisco IOS is stored where? access-methods, like
A.) ROM connecting Token Ring to Ethernet.
B.) CD 175 Identify 3 characteristics regarding CDP?
C.) Flash A.) On by default
D.) NVRAM B.) Shows only directly connected neighbors
Ans C C.) Requires IP or IPX
By default the Cisco IOS is stored in flash. D.) 60 second update interval by default
167 Sequence and acknowledgement numbers are used E.) 30 second updates interval by default
for? Ans A B D
A.) Layer transitioning CDP stands for Cisco Discovery Protocol. It is used to discover
B.) Flow control directly connected
C.) Port number addressing neighbors, it is on by default and has a 60 second update interval
D.) Reliability by default.
Ans D 176 Identify 2 transport layer protocols?
TCP uses sequence numbers and acknowledgements to implement A.) IP
reliability. B.) TCP
168 Identify IPX GNS and it's purpose? C.) CDP
A.) Go Network Server - sends a print job to a network server D.) ARP
B.) Get Nearest Server - locate the nearest server E.) UDP
C.) Guaranteed Network Services - allocates resources to users Ans B E
D.) Get Notes Server - locates Domino Server TPC and UDP are 2 layer4 Transport protocols.
Ans B 177 Identify 2 features of X.25?
GNS stands for Get Nearest Server, initiated by a workstation. A.) Supports only IP
169 Identify the true statement regarding subnetting? B.) Utilizes switched and permanent virtual circuits
A.) Allows for more host address C.) Contains minimal flow control and error recovery
B.) Borrow bits from the network portion of the address D.) Utilizes LAPB as it's data-link protocol
C.) Allows for unlimited number of networks Ans B D
D.) Borrow bits from the host portion of the address X.25 utilizes LAPB and uses switched and permanent VC's. It
Ans D supports multiple layer
Subnetting involves borrowing bits for the host portion of the protocols and is heavy laden with error detection and correction
address to be used to mechanisms.
subnet addressing. 180 Identify the purpose of the Trace command?
170 Inverse ARP serves what purpose? A.) Explorer packet transmitting routing information
A.) Method for a local router to introduce itself to the remote end B.) Test connectivity
of the connection C.) Determine the path a packet is taking through the network
B.) Broadcast a routing table update D.) Transmits user data when buffers are full
C.) Identify MAC addresses if the IP address is known Ans C
D.) Sent every 10 seconds used to verify the Frame Switch is still The trace command is used to determine the path a packet has
active taken through the
Ans A network.
Inverse ARP operates in a Frame Relay network so the two end 190 Identify the purpose of the TCP 3 step handshake?
points can identify A.) Setup a un-reliable connection
themselves to each other. B.) Initialize routing tables
171 Identify 3 characteristics of a MAC address? C.) Synchronize sequence numbers between hosts
A.) Burned into the NIC D.) Connection tear down process
B.) 48 bits long Ans C
C.) Length is 32 bits The 3 step handshake establishes the parameters required for a
D.) Used to deliver the frame to the end device TCP connection.
E.) Contains a network portion and a host portion During the handshake process sequence numbers are
Ans A B D synchronized allowing for the
The MAC address is 48 bits long not 32. It does NOT contain a end points to properly acknowledge and re-assemble the
network and host segments.
portion with the address. It is used to deliver the frame to the 191 Identify 2 PPP characteristics?
destination device. A.) Is proprietary to Cisco
172 Identify 3 IP routing protocols? B.) Supports authentication
A.) RIP C.) Support compression
B.) AURP D.) Run on a multi-access network
C.) OSPF Ans B C
D.) IGRP PPP supports authentication; PAP and CHAP. It also supports
E.) ARP compression; Stacker
F.) ICMP and Predictor.
- 19 -
192 Which statement is true regarding half duplex? 200 Which OSI layer performs code conversion, code
A.) Only works in a point-to-point configuration formatting and
B.) Allows for transmitting and receiving but not a the same time encryption?
C.) Allow for transmitting and receiving of data simultaneously A.) Physical
D.) Doubles the bandwidth B.) Data-Link
Ans B C.) Application
Half duplex is analogous to a single a lane bridge, it can handle D.) Transport
traffic in both E.) Presentation
directions but no at the same time. F.) Network
193 Identify the purpose of the wildcard mask? Ans E
A.) Match a certain portion of the IP address while ignoring the rest Layer 6 the Presentation layers performs this function.
of the address 201 Identify the 3 methods routers learn paths to
B.) Determine the class of the IP address destinations?
C.) Determine the network portion of an IP address A.) Dynamic routing
D.) Hide the host portion of an IP address B.) None of the above, configured by default
Ans A C.) Default routes
The purpose of the wildcard mask to match a certain portion of the D.) Administrative distance
IP address while E.) Static routes
ignoring the rest. Ans A C E
194 Identify the OSI layer associated with bits? Routers can learn paths via 3 different sources; static routes,
A.) Physical dynamic routing
B.) Network protocols (i.e. RIP) and default routes.
C.) Binary 202 Identify the purpose of the following command 'ip
D.) Data link route 192.168.100.0
Ans A 255.255.255.0 10.1.0.1'
The Physical layer converts the frames to bits. A.) Enabling a dynamic routing protocol
195 Identify the type of routing protocol that maintains a B.) Creating a static route to the 10.1.0.0 network
topological database of C.) Teaches the router about the distant network 192.168.100.0
the network? and how it can be
A.) Topological state reached via 10.1.0.1
B.) Shortest Path First D.) Assigning the IP address 192.168.100.0 to an interface
C.) Link state Ans C
D.) Distance vector A static routes teaches the router about a distant network and the
Ans C next hop to reach
Link State routing protocols maintain a database that lists all the that network. Command syntax:
networks in the ip route network-address subnet-mask next-hop-address
internetwork. 203 Based upon the 1st octet rule identify the range for a
196 Identify the 3 major functions at layer 3 of the OSI Class A address?
model? A.) 1 - 126
A.) Forwarding process B.) 192 - 223
B.) Logical addressing C.) 128 - 191
C.) End-to-end connections D.) 1 - 191
D.) Path selection Ans A
E.) MAC address examination Class A address has the 1st octet between 1 - 126. Class B
F.) Network monitoring between 128 - 191 and
Ans A B D Class C between 192 - 223.
Layer 3 determines the path, forwards the packet and implements 204 What does a Standard IP Access-list use as test
software or logical criteria?
addressing. A.) IP source address
197 Identify the 2 rules used when configuring a Distance B.) IP source and destination address, protocol numbers and port
Vector routing numbers
protocol? C.) IPX source and destination address
A.) Physically connected network(s) D.) Source MAC address
B.) Configure the classful address, no subnets Ans A
C.) Enable CDP so neighbors can be detected Standard IP access list use only source address.
D.) Configure all networks in Area0 205 What is the function of the Transport layer and which
Ans A B protocols reside
When configuring a Distance Vector routing protocol only assign there?
the physically A.) MAC addressing - IP
connected networks with the classful address only. B.) Interhost communication - SQL, NFS
198 Identify 3 characteristics of an IP address? C.) Best effort Packet delivery - TCP, UDP
A.) Contains a network portion and a host portion D.) End-to-end connections - TCP, UDP
B.) 32 bits long Ans D
C.) Unique to each network Layer 4, the Transport layer, is responsible for end-to-end
D.) Part of the default Cisco configuration connections. The two
E.) Referred to as the hardware address TCP/IP protocols that reside there are TCP and UDP.
Ans A B C 206 Identify the 3 Internet layer IP protocols?
An IP address is 32 bits long, it is referred as the logical or software A.) NetBios
address. It B.) IPX
contains a network and host portion. Each IP address is unique. C.) ARP
199 Identify 3 feature of access-lists? D.) IP
A.) Implicit deny will deny any packets not matched E.) RARP
B.) Processed sequentially from bottom to top Ans C D E
C.) Processed sequentially from top to bottom NetBios and IPX are not layer 3 IP protocols. IP - Internet Protocol,
D.) If a packet is denied it would be tested against the remaining ARP - Address
statements in the Resolution Protocol and RARP - Reverse Address Resolution
access-list Protocol.
E.) Once a match is made the packet is either denied or permitted 207 IPX routing updates occur how often?
F.) Enabled on all interfaces by default A.) Every 30 seconds
Ans A C E B.) Every 60 seconds
Access-list are processed from top to bottom, once a match occurs C.) Only as needed
the packet is either D.) When the remote router asks for an update
denied or permitted and is no longer tested and if no match occurs Ans B
the packet is denied IPX RIP updates are exchanged every 60 seconds.
via the implicit deny. 208 Identify 3 methods not used to prevent routing loops?
- 20 -
A.) Holddown timers 216 Ping uses which Internet layer protocol?
B.) Sequence numbers A.) RARP
C.) Triggered updates B.) ICMP
D.) Split horizon C.) ARP
E.) Area hierarchies D.) FTP
F.) Order of router startup Ans B
Ans B E F Internet Control Message Protocol - ICMP is a management
Area hierarchies, sequence numbers and order of router startup all protocol and messaging
relate to Link State service provider for IP. Its messages are carried as IP datagrams.
routing protocols which do NOT incur routing loops. ICMP is used in the following events:
209 Identify the hardware component that stores the Destination Unreachable - If a router cannot send an IP packet any
bootstrap program? further, it uses an
A.) ROM ICMP echo to send a message back to the sender notifying it that
B.) NVRAM the remote node is
C.) Booter load unreachable.
D.) RAM Buffer Full - If a routers memory buffer is full ICMP will send out a
E.) Flash message to the
Ans A originator.
ROM contains the boot strap code. Hops - Each IP datagram is assigned a path. This consists of hops.
210 Which OSI layer provides mechanical, electrical, If it goes through
procedural for activating, the maximum number of hops, the packet is discarded and the
maintaining physical link? discarding router sends
A.) Presentation an ICMP echo to the host.
B.) Network Ping - Ping use ICMP echo message to check connectivity.
C.) Application 217 Which is true regarding store-and-forward switching
D.) Physical method?
E.) Transport A.) Latency varies depending on frame-length
F.) Data-Link B.) Latency is constant
Ans D C.) It is default for all Cisco switches
Layer 1 the Physical layer performs this function. D.) It only reads the destination hardware address before
211 Identify 2 characteristics of PPP? forwarding the frame
A.) Uses LLC to establish the link Ans A
B.) Default serial encapsulation Store-and-Forward switching copies the entire frame into its buffer
C.) Support multiple layer 3 protocols and computes the
D.) Offers two types of authentication; PAP and CHAP CRC. If a CRC error is detected, the frame is discarded, or if the
Ans C D frame is a runt (less
PPP is not the default encapsulation and uses LCP not LLC to than 64 bytes including the CRC) or a giant (more than 1518 bytes
establish the link. It including the
support multiple layer 3 protocols and supports authentication. CRC). The LAN switch then looks up the destination address in its
212 Identify 3 characteristics of a connection oriented switching table
protocol? and determines the outgoing interface. The frame is then
A.) Path determination forwarded to the outgoing
B.) Flow control interface. Cisco Catalyst 5000 switches uses the Store-and-Forward
C.) Acknowledgements method. The
D.) Uses hop count as metric problem with Store-and-Forward switching is latency is increased.
E.) 3 step handshake Latency also
Ans B C E varies with the size of the frame. The larger the frame, the more
Connection oriented protocols must first establish the connection latency associated.
(3 step handshake), This of course is due to the fact that the entire frame is copied into
employ methods to acknowledge the receipt of data its buffer before
(acknowledgements) and slow being forwarded.
down the flow of data if required (flow control). 218 Which three of the following are true statements about
213 What is the maximum hop count for IP RIP? connection-oriented
A.) Infinity sessions?
B.) 16 A.) The segments delivered are acknowledged back to the sender
C.) 15 upon their reception
D.) 1 B.) Any segments not acknowledged the are retransmitted by the
Ans C receiver
15 is the maximum hop count, underscoring the size limitation of C.) A manageable data flow is maintained in order to avoid
RIP. congestion, overloading
214 What is Cisco's default encapsulation method on serial and loss of any data
interfaces? D.) Segments are sequenced back into their proper order upon
A.) ANSI arrival at their
B.) Cisco destination
C.) Q933a Ans A C D
D.) HDLC Connection-oriented services are useful for transmitting data from
Ans D applications that
Cisco's implementation of HDLC is only compatible with Cisco are intolerant of delays and packet re-sequencing. FTP and Telnet
routers. It is the applications are
default encapsulation type for serial interfaces. based on connection-oriented services as well as some voice and
215 Which of the following is a characteristic of a switch, video programs.
but not of a repeater? Any segment that is not acknowledged by the received is
A.) Switches forward packets based on the IPX or IP address in the retransmitted by the sender.
frame 219 What does a metric of 16 hops represent when using
B.) Switches forward packets based on the IP address in the frame RIP?
C.) Switches forward packets based on the MAC address in the A.) Number of hops to the destination
frame B.) Destination unreachable
D.) Switches forward packets based only on the IP address in the C.) Number of routers
packet D.) Bandwidth
Ans C Ans B
A repeater regenerates the signal it receives, a switch makes Routing Information Protocol (RIP) is a distance vector routing
decisions based upon protocol that used hop
MAC addresses to determine whether a frame should be count as its metric. The maximum hop count is 15, 16 hops is
forwarded. Repeaters considered
forward all packets.
- 21 -
unreachable. RIP updates are broadcast every 30 seconds by Cisco's encapsulation for Frame relay is proprietary. To
default. RIP has an communicate with non-Cisco
administrative distance of 120. equipment when using frame-relay encapsulation, the IETF method
220 You need to come up with a TCP/IP addressing scheme must be used.
for your company. 228 What is required to support full-duplex Ethernet?
Which two factors must you consider when you define the A.) Multiple paths between multiple stations on a link
subnet mask for the B.) Automatic sensing operation by all connected stations
network? C.) Loopback and collision detection disabled
A.) The location of DHCP servers D.) Full-duplex NIC cards
B.) The volume of traffic on each subnet Ans C D
C.) The number of subnets on the network Full duplex ethernet requires that the NIC supports full-duplex, and
D.) The location of the default gateway loopback and
E.) The number of host IDs on each subnet collision detection are disabled.
Ans C E 229 Which layer is responsible for determining if sufficient
When determining which subnet mask to use, you must determine resources for the
how many hosts intended communication exists?
and how many subnets are required. A.) Application
221 What is the difference between TCP and UDP? B.) Network
A.) TCP is connection-oriented; UDP uses acknowledgements only C.) Session
B.) TCP is connection-oriented; UDP is connectionless D.) Presentation
C.) Both TCP and UDP are connection-oriented, but only TCP uses E.) Transport
windowing Ans A
D.) TCP and UDP both have sequencing, but UDP is connectionless The Application layer is responsible for determining if sufficient
The correct answer(s): B resources for the
TCP provides guaranteed connection oriented delivery of packets, intended communication exists.
UDP does not. 230 What are the 2 functions of the Data Link Mac layer?
222What does the 'S' mean when looking at the routing A.) Handles access to shared media
table? B.) Manages protocol access to the physical network medium
A.) Statically connected C.) Provides SAPs for higher level protocols
B.) Directly connected D.) Allows multiple devices to uniquely identify one another on the
C.) Dynamically attached data link layer
D.) Shutdown route Ans B D
Ans A Media Access Control (MAC) -The MAC sublayer manages protocol
Statically connected routes are those that an administrator has access to the
manually entered into physical network medium. The IEEE MAC specification defines MAC
the routing table. addresses,
223Why would you use static routing instead of dynamic which allow multiple devices to uniquely identify one another at
routing? the data link layer.
A.) When you want automatic updates of the routing tables 231 Describe End to End network services: (Choose all that
B.) All the time apply)
C.) When you have very few routes and want to conserve A.) Best Route selection
bandwidth B.) Accomplished Segment by Segment, each segment is
D.) When you have a gateway of last resort autonomous
Ans C C.) Flow Control & Data Integrity
Static routes are typically used when there are very few routes and D.) Best efforts packet delivery
you want to Ans A B C D
conserve bandwidth. Since routing protocols are constantly All of the above End to End network services.
sending their updates 232 Which of the following provide correct information
across the wire, it can cause a great deal of congestion. about a protocol at the
224 On Cisco catalyst 5000 how would you set the second transport layer of the OSI model?
port on the controller A.) UDP - Provides Connectionless datagrams service
in the first slot to full duplex? B.) TCP - Provides Connection Oriented Services
A.) Set port duplex 1/1 full C.) SMTP - Provides Mail Exchange
B.) Set port duplex 1/2 full D.) IP - Route determination
C.) Set port duplex 0/1 full E.) TCP - Provides Flow Control and Error Checking
D.) Set port duplex 0/2 full F.) FTP - Transfers of Files
Ans B Ans A B E
The syntax is: set type duplex slot/port <full/half> Only TCP and UDP work at the Transport layer of the above
225 What does the acronym ARP stand for? choices. IP is a Network
A.) Address Resolution Phase layer protocol. SMTP and FTP are application layer protocols.
B.) ARP Resolution Protocol 233 Which protocol works at the Internet layer and is
C.) Address Resolution Protocol responsible for making
D.) Address Recall Protocol routing decisions?
Ans C A.) UDP
The Address Resolution Protocol (ARP) resolved IP addresses to B.) IP
MAC addresses. C.) TCP
226 What is the default encapsulation of Netware 3.12? D.) ARP
A.) Ethernet_II Ans B
B.) 802.5 Internet Protocol - IP provides routing and a single interface to the
C.) 802.2 upper layers. No
D.) 802.3 upper layer protocol and now lower layer protocol have any
Ans C functions relating to
The 802.2 Frame Type is the default frame-type for Netware 3.12. routing. IP receives segments from the transport layer and
227 Regarding frame relay, which of the following fragments them into
statements are true? packets including the hosts IP address.
A.) You must use ANSI encapsulation if connecting to non-Cisco 234 Which layer is responsible for providing mechanisms
equipment for multiplexing
B.) You must use IETF encapsulation if connecting to non-Cisco upper-layer application, session establishment, and tear
equipment down of virtual circuits?
C.) You must use Q.933a encapsulation if connecting to non-Cisco A.) Session
equipment B.) Network
D.) You must use Cisco encapsulation if connecting to non-Cisco C.) Physical
equipment D.) Transport
Ans B E.) Application
F.) Presentation
- 22 -
Ans D partner, and determine if sufficient resources exist for the
The Transport layer does the following: Responsible for end-to-end communication. Popular application protocols include WWW, SMTP, EDI,
integrity of data FTP, Telnet, and SNMP
transmission. Handles multiplexing upper-layer application, session 241 A ISDN PRI circuit can be described as which of the
establishment following?
and tear down of virtual circuits. Hides details of network dependent A.) 24 B channels and 1-64Kbps D channel
info from the B.) 23 B channels and 1-64Kbps D channel
higher layers by providing transparent data transfer. The 'windows' C.) 2-D channels and 1-C channel
works at this level D.) 2-64Kbps B channels and 1-16Kbps D channel
to control how much information is transferred before an Ans B
acknowledgement is
There are two types of ISDN Channels:
required.
BRI (Basic Rate Interface) - is 2 64Kbps B channels for data and
235 Which of the following are logged when IP access list
one 16Kbps D
logging is enabled?
channel for link management.
A.) source address
PRI (Primary Rate Interface) - is 23Kbps B channels and 1 64Kbps
B.) protocol
D channel.
C.) source port
242 What are 3 ways to provide login access to router?
D.) destination address
A.) Console
E.) access list number
B.) TFTP
F.) destination port
C.) Rlogin
Ans A B C D E F
D.) Auxiliary Port
All of the above are logged when IP access list logging is enabled.
E.) X Windows
236 What's the default CDP holdtime in seconds for Cisco
F.) Telnet
routers?
Ans A D F
A.) 30 seconds
The three ways to provide login access to the router are via the
B.) 180 seconds
Console port, auxiliary
C.) 90 seconds
port, and virtual terminal (Telnet)
D.) 60 seconds
243 Which of the following statements are true?
Ans B
A.) Store and forward switching creates variable latency through
Cisco Discovery Protocol is a proprietary protocol to allow you to
the switch
access
B.) Cut through switching creates variables latency through the
configuration information on other routers and switches with a
switch
single command. It
C.) Cut through switching works at wire speed
uses SNAP at the Data-Link Layer. By default CDP sends out a
D.) Store and forward switching works at wire speed
broadcast every 60
Ans A C
seconds and it holds this information for 180 seconds. CDP is
The larger the packet, the greater the latency when using a switch
enabled by default.
with Store and
237 Which two of the following protocols are used at the
Forward methods. This is due to the fact that Store and Forward
Transport layer?
switching copies the
A.) ARP
entire Frame into its buffer before forwarding the frame. Cut
B.) UDP
Through switching only
C.) ICMP
examines the destination address before forwarding the packet
D.) RARP
and does not copy the
E.) TCP
frame into its buffer.
F.) BootP
244 Which of the following can reply to a Novell Get
Ans B E
Nearest Server (GNS)
TCP and UDP operate at the Transport layer.
request?
238 LAN stands for which of the following?
A.) Local Novell server
A.) Local Area Network
B.) Remote Novell Printer
B.) Local Arena Network
C.) Cisco router
C.) Local Area News
D.) Novell client
D.) Logical Area Network
Ans A C
Ans A
Cisco routers can act like Novell servers to an extent. They can
LAN stands for Local Area Network
answer Get Nearest
239 Choose three reasons why the networking industry
Server request by clients. Of course, both Local and Remote Novell
uses a layered model:
servers can reply
A.) It facilitates systematic troubleshooting
to the GNS request. As with Novell servers, Cisco routers can be
B.) It allows changes in one layer to occur without changing other
configured to either
layers
reply, or not reply to GNS request by clients. Since each Novell
C.) It allows changes to occur in all layers when changing one
server and Cisco
protocol
router builds a dynamic table of resources, they can reply to a
D.) It clarifies how to do it rather than what general function to be
clients request for the
done
available resources closest to them.
E.) It clarifies what general function is to be done rather than how
245 Identify the 3 kinds of routes IGRP advertises?
to do it
A.) Interior
Ans A B E
B.) Dynamic
Why do we have a Layered Model?
C.) System
1) It reduces complexity
D.) Exterior
2) Allows for a standardized interface
Ans A C D
3) Facilitates modular engineering
IGRP is a distance vector routing protocol designed by Cisco. The
4) Ensures interoperable technology
maximum hop
5) Accelerates evolution
count is 255, and it uses a combination of variables to determine a
6) Simplifies teaching and learning
composite metric.
240 Which layer is responsible for identifying and
IGRP has an administrative distance of 100. There are three types
establishing the availability of
of routes IGRP
the intended communication partner?
advertises: 1) Interior, 2) Exterior, and 3) System.
A.) Application
246 What is the routing metric used by RIP?
B.) Presentation
A.) Route poisoning
C.) Transport
B.) Split horizon
D.) Session
C.) Hop Count
E.) Network
D.) TTL
Ans A
Ans C
The Application layer performs the following: Synchronizing sending
and receiving applications. Program-to program communication.
Routing Information Protocol (RIP) is a distance vector routing
Identify and establish the availability of the intended communication protocol that used hop

- 23 -
count as its metric. The maximum hop count is 15, 16 hops is MAC address?
considered A.) BootP
unreachable. RIP updates are broadcast every 30 seconds by B.) TCP
default. RIP has an C.) IP
administrative distance of 120. D.) ARP
247 What is the default encapsulation and frame type on E.) RARP
an Ethernet interface F.) ICMP
when enabling Novell? Ans A E
A.) SNAP Reverse Address Resolution Protocol - RARP is ARP's counterpart,
B.) Ethernet_II but it resolves IP
C.) 802.2 addresses to MAC addresses typically on diskless workstations.
D.) 802.3 BootP allows a host
E.) SAP to resolves it's own MAC address to an IP address.
F.) Token_SNAP 254 What does the Spanning Tree Algorithm (STA) do?
Ans D A.) Restore lost frames
By default, when an encapsulation type is not specified, the 802.3 B.) Builds routing tables for routing through an internetwork
frame type is used. C.) Forward packets through a switch
248 What is true when creating static route? D.) STA is implemented by STP to prevent loops
A.) The mask parameter is optional Ans D
B.) The administrative distance is required IEEE 8021.d Spanning Tree Protocol (STP) was developed to
C.) The gateway parameter is required prevent routing loops in
D.) The administrative distance is optional a network. If a router, switch, or hub has more then one path to
Ans C D the same destination,
When creating a static route, the gateway parameter is required, a routing problem could occur. To prevent this, the Spanning Tree
but the administrative Protocol is
distance is optional. The correct syntax is: Router(config)# ip route executed between the devices to detect and logically block
<network> redundant paths from the
<mask> <address | interface> <admin distance> network. The main function of the Spanning Tree Protocol is to
249 Of the following switching types, which one has the allow redundant
highest latency? network paths without suffering the effects of loops in the network.
A.) Cut-through The Spanning Tree Algorithm (STA) implemented by STP prevents
B.) None loops by
C.) Store-and-forward calculating a stable Spanning Tree network topology. When
D.) Fragment Free creating fault tolerant
Ans C internetworks, a loop-free path must exist between all Ethernet
Store-and-Forward switching copies the entire frame into its buffer nodes in the network.
and computes the Spanning Tree frames called Bridge Protocol Data Units (BPDUs)
CRC. If a CRC error is detected, the frame is discarded, or if the are sent and
frame is a runt (less received by all switches in the network at regular intervals.
than 64 bytes including the CRC) or a giant (more than 1518 bytes 255 IP extended access lists use which of the following as a
including the basis for permitting
CRC). The LAN switch then looks up the destination address in its or denying packets?
switching table A.) destination address
and determines the outgoing interface. The frame is then B.) all of the above
forwarded to the outgoing C.) protocol
interface. Cisco Catalyst 5000 switches uses the Store-and-Forward D.) source address
method. The E.) port
problem with Store-and-Forward switching is latency is increased. Ans B
Latency also All of the above are basis for permitting or denying IP packets for
varies with the size of the frame. The larger the frame, the more use with an
latency associated. Extended IP access list.
This of course is due to the fact that the entire frame is copied into 256 What is the extended IPX access list range?
its buffer before A.) 901-1000
being forwarded. B.) 100-199
250 What does the IPX maximum path command do? C.) 900-999
A.) Allows you to disable the TTL on an IPX packet D.) 1000-1000
B.) This parameter is only used in NLSP routing Ans C
C.) Sets the maximum metric that can appear in the routing table Cisco has setup ranges of numbers to signify access lists. 900-999
D.) Configures round robin load sharing over multiple equal metric is the range for the
paths (parallel Extended IPX access lists.
paths) 257 CPE is an acronym for which of the following?
Ans D A.) Customer Premise Equipment
The ipx maximum path command allows you to configure parallel B.) Central Processing Engineering
paths for load C.) Customer Process Equipment
sharing. D.) Central Processing Equipment
251 What does -1 mean in an extended IPX access-list? Ans A
A.) Any IP address Customer Premise Equipment (CPE) are devices physically located
B.) Deny all at the subscriber's
C.) Deny host premises. Includes both owned and leased equipment.
D.) Any host or any network 258 How often does IP RIP send out routing table updates
Ans D by default?
For IPX access lists, the -1 is a wildcard that signifies Any Host or A.) They send complete updates every 30 seconds
Any Network. B.) They send partial updates every 30 seconds
252 What parameter is used with statically assigned C.) They send complete updates every 60 seconds
routers to tell packets which D.) They send partial updates every 60 seconds
interface to use to reach a distant network? Ans A
A.) Mask Routing Information Protocol (RIP) is a distance vector routing
B.) Subnet protocol that used hop
C.) Default gateway count as it's metric. The maximum hop count is 15, 16 hops is
D.) Interface considered
Ans D unreachable. RIP updates are broadcast every 30 seconds by
The interface parameter tell a packet which interface to use to default. RIP has an
reach other networks. administrative distance of 120.
253 Which of the following protocols are used to get an IP 259 Which ISDN protocol prefix specifies switching and
address from a known signaling?
- 24 -
A.) I 275 Which of the following is a connectionless protocol at
B.) E the Transport layer?
C.) Q A.) UDP
D.) S B.) ARP
Ans C C.) ICMP
These protocols deal with ISDN issues: D.) RARP
E - Specifies ISDN on the existing telephone network. E.) IP
I - Specifies concepts, terminology, and services. F.) FTP
Q - Specifies switching and signalling. Ans A
260 CSMA/CD stand for which of the following? User Datagram Protocol - UDP is a connectionless oriented
A.) Carrier Sense, Multiple Access with Collision Detection transport protocol for use
B.) Collision Sense, Multiple Access with Collision Detection when the upper layers provide error-recovery and reliability. UDP
C.) Collision Sense, Multiple Access with Carrier Detection does not sequence
D.) Carrier Sense, MAC address with Collision Detection data or re-assemble it into any order after transmission. This
Ans A protocol uses Port 17.
The IEEE standard for Carrier Sense Multiple Access / Collision 276 What is the routing metric used by IGRP?
Detection is 802.3. A.) MTU, delay, bandwidth, reliability, and loading
Also know as Ethernet. B.) Count to infinity
270 Which of the following are Distant Vector protocols? C.) TTL
A.) IGRP D.) Hop count
B.) RIP Ans A
C.) OSFP IGRP is a distance vector routing protocol designed by Cisco. The
D.) EIGRP maximum hop
Ans A B count is 255, and it uses a combination of variables to determine a
RIP and IGRP are Distance Vectoring protocols that send their composite metric.
entire routing tables to IGRP has an administrative distance of 100.
their neighbors. 277 What does 'P' mean when running a Trace?
In some Cisco literature, EIGRP is listed as an 'advanced distance A.) Good route
vector' routing B.) Protocol unreachable
protocol. However, the official curriculum courseware considers C.) Source Quench
EIGRP a 'hybrid' D.) Destination unreachable
protocol. Ans B
271 UDP works at which layer of the DOD model? When a P is returned when a Trace is run, it means the Protocol is
A.) Internet unreachable.
B.) Host-to-Host 278 What is the Network Layer of the OSI responsible for?
C.) Transport A.) Bridging
D.) Data Link B.) Routing packets through an internetwork
Ans B C.) Regenerating the digital signal
The TCP/IP Transport Layer (OSI) and Host to Host (DOD) protocols D.) Gateway services
use TCP and Ans B
UDP. The Network Layer routes data from one node to another, sends
272 Of the following switching types, which one has the data from the source
lowest latency? network to the destination network. The router will use packet
A.) Cut-through switching to move a
B.) Fragment Free packet from one interface or port, to another through the network
C.) None cloud.
D.) Store-and-forward 279 Which layer is responsible for routing through an
Ans A internetwork?
Cut-Through switching copies only the destination address which is A.) Physical
the first 6 bytes B.) Session
after the frame preamble into its buffer. The LAN switch then looks C.) Network
up the D.) Transport
destination address in its switching table and determines the E.) Application
outgoing interface. The F.) Data Link
frame is then sent to the interface. A cut-through switch provides Ans C
reduced latency The Network layer is responsible for routing. This is the primary job
because it begins to forward the frame as soon as it read the of routers,
destination address and which operate at the Network layer.
determines the outgoing interface. 280 What three occurrences will reset the holddown timer
273 What is an administrative distance of 0 mean? after a triggered
A.) 0 means unbelievable update?
B.) 0 is for EIGRP A.) Infinity is finally defined as some max number
C.) 0 is the default distance for directly connected networks B.) HD Timer expires
D.) 0 means unreachable C.) Another update is received indicating a better metric
Ans C D.) The router receives a processing task proportional to the
Directly connected network have the lowest administrative number of links in the
distance of 0. They are internetwork
considered the most reliable. E.) The router detects fault LSP's propagating through the
274 Which of the following describe full-duplex internetwork
transmission? F.) Another update is received indicating net status changed
A.) Uses a single wire Ans B D F
B.) Data transmission in only both directions, but only one way at a The HD Timer expires, another update is received indicating net
time status change, or if
C.) Uses a point-to-point connection from the transmitter of the the router receives a processing task proportional to the number of
transmitting station links in the
to the receiver of the receiving station internetwork, this reset the holddown timer. These are all triggered
D.) Data transmission in only one direction updates.
Ans C 281 Which layer is responsible for putting 1s and 0s into a
Full Duplex - Capability for simultaneous data transmission logical group?
between a sending station A.) Session
and a receiving station. It requires a workstation be attached to a B.) Application
switch, the NIC C.) Transport
must support it, and collision detection and loopback must be D.) Data Link
disabled. E.) Physical
F.) Network
- 25 -
Ans D D.) Session
Frames are broken down into 1s and 0s and placed onto the E.) Physical
physical medium by the F.) Data Link
Data Link layer. Ans A
282 How many LMI types are available on Cisco routers? The Transport layer performs the following: Responsible for end-to-
A.) Four end integrity of
B.) Two data transmission. Handles multiplexing upper-layer application,
C.) Five session
D.) Three establishment and tear down of virtual circuits. Hides details of
Ans D network dependent
There are three types of LMI standards: info from the higher layers by providing transparent data transfer.
ANSI - Annex D defined by ANSI standard T1.617 The 'windows'
ITU-T (Q.933A) - Annex A defined by Q933A works at this level to control how much information is transferred
Cisco (default) - LMI defined by the gang of four before an
283 Which layer is responsible for framing? acknowledgement is required.
A.) Application 290 Which of the following is used to manage and monitor
B.) Data Link the network?
C.) Physical A.) SNMP
D.) Network B.) HTTP
E.) Transport C.) IP
Ans B D.) FTP
The Data link layer performs the following: Responsible for Ans A
physically passing data The Simple Network Management Protocol (SNMP) is used to
from one node to another. Translates messages from the upper manage and monitor
layers into data frames traps.
and adds customized headers containing the Hardware destination 290 What is true about Link-State protocols?
and source address. A.) They maintain a more complex table than distant vector
284 What ISDN protocol specifies concepts, terminology, protocols
and services? B.) They maintain a less complex table than distant vector
A.) Q protocols
B.) S C.) They use routing ports
C.) I D.) The maintain backup copies of the IOS
D.) E Ans A
Ans C Whereas the distance vector algorithm has non-specific
These protocols deal with ISDN issues: information about distant
E - Specifies ISDN on the existing telephone network. networks and no knowledge of distant routers, a link-state routing
I - Specifies concepts, terminology, and services. algorithm maintains
Q - Specifies switching and signalling. full knowledge of distant routers and how they interconnect.
285 What is the purpose of Split Horizon? 292 The maximum distance on a 10BaseT network from the
A.) It prevents the regular update messages from reinstating a hub to a workstation
route that has gone is which of the following?
down A.) 500 meters
B.) Information received on an interface cannot be sent back out B.) 1000 meters
the same interface C.) 100 meters
C.) Informs all neighbor routers that two routes exist D.) 1500 meters
D.) Tells the router the destination is unreachable Ans C
Ans B The standard for 10BaseT networks is 100 meters, or
Split Horizon - If you learn a protocol’s route on an interface, do approximately 330 feet.
not send information 293 Which of the following use PVCs at layer 2?
about that route back out that interface. A.) X.25
286 WAN stands for which of the following? B.) HDLC
A.) Wide Arena Network C.) Frame relay
B.) World Area Network D.) ISDN
C.) Wide Area News Ans C
D.) Wide Area Network Of the above choices, only Frame relay uses Permanent Virtual
Ans D Circuits (PVCs) at
WAN stands for Wide Area Network layer 2. PVC is the key word in this question.
287 Which of the following provide connection-oriented 294 What is the routing algorithm used by RIP and IGRP?
transport to upper layer A.) OSPF
protocols? B.) Link-state
A.) SPX C.) Dynamic
B.) RIP D.) Distance Vector
C.) NLSP Ans D
D.) NCP Distance vector-based routing algorithms (also known as Bellman-
Ans A Ford algorithms)
SPX is similar to TCP in that is provides reliable delivery of packets pass periodic copies of a routing table from router to router.
and provides Regular updates between
connection-oriented transport to the upper layer protocols. routers communicate topology changes. Each router receives a
288 Which two does 100BaseT use? routing table from it's
A.) CSMA/CD direct neighbor and increments all learned routes by one. By this
B.) IEEE 802.5 method, each router
C.) 802.3u learns the internetwork topology via second hand information.
D.) Switching with 53-byte cells 295 Which layer is responsible for negotiating data
Ans A C transfer syntax?
100BaseT - 100BaseT uses two-pair Category 5 UTP cable with an A.) Network
RJ45 connector B.) Session
and the same pin out as in 10BaseT. 100BaseT supports full duplex C.) Application
operation. D.) Transport
100BaseT is limited to 100 meters distance. E.) Presentation
289Which layer is responsible for flow control, Ans E
acknowledgement, and The Presentation layer performs the following: Manages data
windowing? representation conversions, or data
A.) Transport transfer syntax. For example, the Presentation layer would be
B.) Network responsible for converting from EDCDIC to ASCII. Data compression
C.) Application ,decompression, encryption, and decryption are presentation layer.

- 26 -
Presentation layer standards include MPEG, MIDI, PICT, TIFF, JPEG, 303 What utility can you use to see the path a packet takes
ASCII, and EBCDIC through an
296 What are hold-downs used for? internetwork?
A.) To prevent regular update messages from reinstating a route A.) Route
that has come back B.) SNMP
up C.) Trace
B.) Information received on an interface cannot be sent back out D.) Ping
the same interface Ans C
C.) To prevent regular update messages from reinstating a route Trace - Uses Time-To-Live (TTL) values to generate messages from
that has gone down each router used
D.) To hold the routing table from being sent to another router along the path. This is very powerful in its ability to locate failures
Ans C in the path from
Hold-Down Timers - Routers ignore network update information for the source to the destination.
some period. 304 What is true about frame-relay DLCI?
297 Which of the following protocols are used for logical A.) DLCI represents a single physical circuit
network addressing? B.) DLCI is optional in all frame-relay networks
A.) IP C.) DLCI identifies a logical connection between DTE devices
B.) TCP D.) DLCI is used to tag the beginning of a frame with VLAN
C.) ARP information
D.) ICMP Ans C
E.) RARP Data Link Connection Identifier (DLCI). A frame-relay service
F.) BootP provider typically
Ans A assigns DLCI values that are used by frame-relay to distinguish
Internet Protocol - IP provides routing and a single interface to the between different
upper layers. No virtual circuits on the network. For the IP devices at each end of a
upper layer protocol and now lower layer protocol have any virtual circuit to
functions relating to communicate, their IP addresses are mapped to Dlci. Every DLCI
routing. IP receives segments from the transport layer and value can have a
fragments them into global or local meaning.
packets including the hosts IP address. IP addressing is logical, not 305 Which frame has a Type field to identify the upper-
physical. layer protocol?
298 Which can be logged by IPX extended access lists? A.) 802.3
A.) source address B.) 802.2
B.) protocol C.) 802.5
C.) source socket D.) Ethernet_II
D.) access list number Ans D
E.) destination socket Ethernet_II has a Type field to identify the upper-layer protocol.
F.) destination address This is best seen by
Ans A B C D E F capturing packets with a sniffer and examining the packet.
All of the above can be logged by IPX extended access lists. 306 Which protocol will let neighbor routers know if your
299 Put the following steps of encapsulation into the internetwork
correct order: experienced congestion on a serial port?
1) The data is broken into segments to be organized A.) BootP
2) Frames are converted to 1s and 0s to be put on the wire B.) IP
3) Packets are converted into frames C.) ICMP
4) Information that users enter is converted into data D.) ARP
5) The segments are changed to packets to be routed E.) FTP
A.) 4, 1, 3, 2, 5 F.) RARP
B.) 4, 5, 1, 3, 2 Ans C
C.) 2, 3, 1, 4, 5 Internet Control Message Protocol - ICMP is a management
D.) 4, 1, 5, 3, 2 protocol and messaging
Ans D service provider for IP. Its messages are carried as IP datagrams.
Follow the steps through the Layers of the OSI model to get the ICMP is used in the following events:
answer. Watch the Destination Unreachable - If a router cannot send an IP packet any
key words in each line to help you determine the steps. further, it uses an
300 Which port numbers are used by TCP and UDP to set ICMP echo to send a message back to the sender notifying it that
up sessions with other the remote node is
hosts? unreachable.
A.) 1024 and above Buffer Full - If a routers memory buffer is full ICMP will send out a
B.) 6 and 17 respectively message to the
C.) 1-25 originator.
D.) 6-17 Hops - Each IP datagram is assigned a path. This consists of hops.
Ans A If it goes through
TCP and UDP use random port number above 1023 for establishing the maximum number of hops, the packet is discarded and the
communications. discarding router sends
301 Repeaters work at which layer of the OSI model? an ICMP echo to the host.
A.) Network Ping - Ping use ICMP echo message to check connectivity.
B.) Session 307 What do you use the Aux port for?
C.) Transport A.) Console
D.) Physical B.) Terminal editing
Ans D C.) Modem
Repeaters work at the Physical layer of the OSI model by D.) Backup logging
regenerating the signal to Ans C
extend the distance it can travel. The auxiliary port is used to connect a modem to for dial backups.
302 What protocols can you use while testing Trace? 308 The CSMA/CD Ethernet IEEE committee is defines as
A.) DECnet which of the
B.) CLNS following?
C.) IP A.) 802.2
D.) Old Vines B.) 802.3
E.) Vines C.) 802.4
F.) Chaos D.) 802.5
Ans B C D E Ans B
Type Trace ? At the router command prompt to see a list of The IEEE standard for Carrier Sense Multiple Access / Collision
available supported Detection is 802.3.
protocols for tracing routes to IP addresses or Name addresses. Also know as Ethernet.
- 27 -
309 How many Frame-relay encapsulation types are EDCDIC to ASCII. Data compression, decompression, encryption,
available with Cisco and decryption are
routers? presentation layer. Presentation layer standards include MPEG,
A.) Four MIDI, PICT, TIFF,
B.) Two JPEG, ASCII, and EBCDIC.
C.) Five 315 What is the administrative distance for RIP?
D.) Three A.) 100
Ans B B.) 90
The two types of Frame relay encapsulation are Cisco and IETF. C.) 120
310 What is the maximum hop count for Link-State D.) 110
protocols? The correct answer(s): C
A.) 15 Routing Information Protocol (RIP) is a distance vector routing
B.) there is no hop count limit protocol that uses hop
C.) 256 count as its metric. The maximum hop count is 15, 16 hops is
D.) 16 considered
Ans B unreachable. RIP updates are broadcast every 30 seconds by
Link-state-based routing algorithms – also known as shortest path default. RIP has an
first (SPF) administrative distance of 120.
algorithms, maintain a complex database of topology information. 316 IP standard access lists use which of the following as a
Whereas the basis for permitting
distance vector algorithm has non-specific information about or denying packets?
distant networks and no A.) destination address
knowledge of distant routers, a link-state routing algorithm B.) port
maintains full knowledge C.) protocol
of distant routers and how they interconnect. D.) source address
311 What information can you get from CDP info: (choose Ans D
all that apply) For Standard access lists, only the source address is used as a
A.) Hardware platform basis for permitting or
B.) One address per protocol denying packets.
C.) Software platform 317 If a frame is received at a switch and only the
D.) Hostname destination hardware address
E.) The same info as show version is read before the frame is forwarded, what type of
F.) Incoming/outgoing port switching method is this?
Ans A B D E F A.) Store-and-drop
All of the above except the software platform can be seen with the B.) Latency
CDP information. C.) Store-and-forward
312 How does the cut-through switching technique work? D.) Cut-through
A.) By using broadcast address as source addresses Ans D
B.) The switch waits only for the header to be received before it Cut-Through switching copies only the destination address which is
checks the the first 6 bytes
destination address and starts forwarding the packets after the frame preamble into its buffer. The LAN switch then looks
C.) The LAN switch copies the entire frame into its onboard buffers up the
and then looks destination address in its switching table and determines the
up the destination address in its forwarding, or switching, table outgoing interface. The
and determines the frame is then sent to the interface. A cut-through switch provides
outgoing interface reduced latency
D.) By using a Class I repeater in a collision domain because it begins to forward the frame as soon as it read the
Ans B destination address and
Cut-Through switching copies only the destination address which is determines the outgoing interface.
the first 6 bytes 318 What is the purpose and default value of the CDP timer
after the frame preamble into its buffer. The LAN switch then looks command?
up the A.) 90 seconds; interval before an entry expires
destination address in its switching table and determines the B.) 60 seconds; interval between updates
outgoing interface. The C.) 60 seconds; interval before an entry expires
frame is then sent to the interface. A cut-through switch provides D.) 90 seconds; interval between updates
reduced latency Ans B
because it begins to forward the frame as soon as it read the The CDP timer controls when the update of CDP information should
destination address and be sent to the
determines the outgoing interface. neighbor router.
313 What is the protocol number for TCP? 319 Choose the following that are benefits to segmenting
A.) 80 with router:
B.) 21 A.) Flow Control
C.) 11 B.) Manageability
D.) 6 C.) Multiple Active Paths
Ans D D.) Explicit packet lifetime control
Transmission Control Protocol - TCP is a connection oriented Ans A B C D
transport layer protocol All of the above are benefits of segmenting with a router.
with built in reliability. It takes a large block of data and breaks it 320 When discussing static routes, what is the gateway
down into parameter used for?
segments. It numbers and sequences each segment so the A.) Determining the dynamic route
destination's TCP protocol B.) Defining the subnet
can re-assemble it back into the original order. TCP uses C.) Defining the Administrative Distance
acknowledgements via D.) Determining the next hop
sliding windows. It has a large overhead due to built in error Ans D
checking. The protocol The gateway parameter determines the path to the next router.
use protocol # 6.
314 Which of the following are Presentation Layer
standards? 321 Which layer hides details of network dependent
A.) JPEG and PICT information from the higher
B.) MPEG and MIDI layers by providing transparent data transfer?
C.) ASCII and EBCDIC A.) Transport
D.) NFS and SQL B.) Physical
Ans A B C C.) Data Link
For example, the Presentation layer would be responsible for D.) Session
converting from E.) Application
- 28 -
F.) Network internetworks, a loop-free path must exist between all Ethernet
Ans A nodes in the network.
The Transport layer does the following: Responsible for end-to-end Spanning Tree frames called Bridge Protocol Data Units (BPDUs)
integrity of data are sent and
transmission. Handles multiplexing upper-layer application, session received by all switches in the network at regular intervals.
establishment 327 CO is an acronym for which of the following?
and tear down of virtual circuits. Hides details of network A.) Central Office
dependent info from the B.) Capital Office
higher layers by providing transparent data transfer. The 'windows' C.) Central Operator
works at this level D.) Company Office
to control how much information is transferred before an Ans A
acknowledgement is Central Office (CO) - A switching facility that provides the nearest
required. point of presence
322 What information is provided by the local management for a provider's WAN service.
interface (LMI)? 328 What is convergence time?
A.) LMI encapsulation type A.) The update time
B.) The current DLCI values B.) The time it takes to reload a router
C.) The status of virtual circuits C.) The time it takes for a packet to reach its destination
D.) The global or local significance of the DLCI values D.) The time is takes for all routers update their tables after a
Ans B C D change takes place
LMI is a standard related to Frame Relay. It provides information Ans D
related to PVCs. Convergence is slower for Distant Vector routing and is faster for
323 Which layer defines the physical topology? Link State routing.
A.) Application 329 Which of the following are Session Layer standards?
B.) Transport A.) ASCII and EBCDIC
C.) Network B.) MPEG and MIDI
D.) Data Link C.) NFS and SQL
E.) Physical D.) JPEG and PICT
F.) Session Ans C
Ans E Session layer protocols include NFS, SQL, RPC, Appletalk Session
The Physical layer deals with the actual physical medium and the Protocol (ASP),
method of XWindows, and NetBEUI.
transporting 1s and 0s. 330 What is the IP extended access list range?
324 What key do you use to view the last command? A.) 1000-1099
A.) Left Arrow B.) 100-199
B.) Space Bar C.) 1-99
C.) Up Arrow D.) 101-200
D.) Right Arrow Ans B
Ans C 100-199 is the range for Extended IP access lists.
CTRL+P as well as the Up Arrow keyboard commands will show the 331 Define Poison Reverse?
last command. A.) To prevent regular update messages from reinstating a route
325 Which of the follow do not belong to the customer? that has gone down
A.) CO B.) Packets sent out that are not destined for a network go to the
B.) DCE default network
C.) Router C.) Information received on an interface cannot be sent back out
D.) CPE the same interface
E.) Demarc D.) When a network goes down, the router enters in its table the
F.) DTE number 16 to signify
Ans A E destination unreachable
Central Office (CO) - A switching facility that provides the nearest Ans D
point of presence By entering a 16 as the hop count, the other routers know that the
for a provider's WAN service. destination is
Demarcation (Demarc) - The point at which the CPE ends and the unreachable.
local loop portion 332 What is the default interval for SAP updates?
of the service begins. Usually the telecommunications closet at the A.) 60 seconds
subscriber's B.) 15 seconds
location. C.) 30 seconds
CPE, DTE, DCE, and the router are all typically owned by the D.) 120 seconds
customer. DTE Ans A
devices are usually routers, DCE devices are CSUs/DSUs, or WAN By default, the SAP (Service Access Protocol) sends out updates
interfaces that every 60 seconds.
have a built in CSU/DSU in the router. CPE stands for Customer This value can be changed to alter the update interval. To decrease
Premise Equipment. WAN traffic, the
326 What is the IEEE specification for Spanning Tree update interval could be increased to every 5 minutes.
Protocol? 333What does a router do with a packet that it does not
A.) 802.9 have a destination
B.) 803.ud network for?
C.) 803 A.) Sends it to the Serial port
D.) 802.1d B.) Drops the packet
Ans D C.) Sends it back out the same interface it received it in
IEEE 8021.d Spanning Tree Protocol (STP) was developed to D.) Forwards the packet to the next hop
prevent routing loops in Ans B
a network. If a router, switch, or hub has more then one path to When a router does not have a destination for a packet, it drops
the same destination, the packet into the bit
a routing problem could occur. To prevent this, the Spanning Tree bucket.
Protocol is 334 What type of frame does CDP use to gather
executed between the devices to detect and logically block information about it's
redundant paths from the neighbors?
network. The main function of the Spanning Tree Protocol is to A.) TCP/IP
allow redundant B.) Novell-ether
network paths without suffering the effects of loops in the network. C.) Subnetwork Access Protocol (SNAP)
The Spanning Tree Algorithm (STA) implemented by STP prevents D.) Ethernet_II
loops by Ans C
calculating a stable Spanning Tree network topology. When Cisco Discovery Protocol is a proprietary protocol to allow you to
creating fault tolerant access
- 29 -
configuration information on other routers and switches with a businesses.
single command. It 350 Which protocol will send a message to routers if a
uses SNAP at the Data-Link Layer. By default CDP sends out a network outage or
broadcast every 60 congestion occurs?
seconds and it holds this information for 180 seconds. CDP is A.) ARP
enabled by default. B.) TCP
335 Which protocol is used for booting diskless C.) IP
workstations? D.) ICMP
A.) IP Ans D
B.) ARP Internet Control Message Protocol - ICMP is a management
C.) RARP protocol and messaging
D.) TCP service provider for IP. Its messages are carried as IP datagrams.
E.) SNMP ICMP is used in the following events:
Ans C Destination Unreachable - If a router cannot send an IP packet any
Reverse Address Resolution Protocol - RARP is ARP's counterpart, further, it uses an
but it resolves IP ICMP echo to send a message back to the sender notifying it that
addresses to MAC addresses typically on diskless workstations. the remote node is
336 Which layer is responsible for synchronizing sending unreachable.
and receiving Buffer Full - If a routers memory buffer is full ICMP will send out a
applications? message to the
A.) Presentation originator.
B.) Session Hops - Each IP datagram is assigned a path. This consists of hops.
C.) Transport If it goes through
D.) Application the maximum number of hops, the packet is discarded and the
E.) Network discarding router sends
Ans D an ICMP echo to the host.
The Application layer performs the following: Synchronizing Ping - Ping use ICMP echo message to check connectivity.
sending and receiving 351 What are the 2 functions of the Data Link Mac layer?
applications. Program-to program communication. Identify and A.) Handles access to shared media
establish the B.) Manages protocol access to the physical network medium
availability of the intended communication partner, and determine C.) Provides SAPs for higher level protocols
if sufficient D.) Allows multiple devices to uniquely identify one another on the
resources exist for the communication. Popular application data link layer
protocols include WWW, Ans B D
SMTP, EDI, FTP, Telnet, and SNMP These are the two primary functions of the MAC layer.
337 Which protocol gets a hardware address from a known 352 Which layer is responsible for coordinating
IP address? communication between
A.) RARP systems?
B.) TCP A.) Application
C.) IP B.) Network
D.) BootP C.) Session
E.) ARP D.) Transport
F.) ICMP E.) Physical
Ans E F.) Data Link
Address Resolution Protocol - ARP is responsible for resolving MAC Ans C
addresses to IP The Session layer performs the following: Responsible for
address. It stores these in its arp cache for later use. It does this to establishing and
inform a lower maintaining communications channels. In practice, this layer is
layer of the destination's MAC address. often combined with
338 Which layer defines bit synchronization? the Transport Layer. Dialog control between devices or nodes.
A.) Application Organizes the
B.) Network communication through simplex, half and full duplex modes. Deals
C.) Transport with connection
D.) Physical establishment, data transfer, and connection release.
E.) Session 353 What is the default CDP broadcast update rate for
F.) Session Cisco routers?
Ans D A.) 120 seconds
The Physical layers deals with synchronizing the 1s and 0s on the B.) 60 seconds
wire. C.) 30 seconds
339 Which is true regarding half duplex Ethernet D.) 90 seconds
operation? Ans B
A.) Half Duplex ethernet technology provides a transmit circuit Cisco Discovery Protocol is a proprietary protocol to allow you to
connection wired access
directly to the receiver circuit at the other end configuration information on other routers and switches with a
B.) Half duplex transmission between stations is achieved by using single command. It
point to uses SNAP at the Data-Link Layer. By default CDP sends out a
multipoint Ethernet and Fast Ethernet broadcast every 60
C.) With Half Duplex transmission logically circuits feed into a seconds and it holds this information for 180 seconds. CDP is
single cable creating enabled by default.
a situation similar to a one way bridge 354 You need to come up with a TCP/IP addressing scheme
D.) Half Duplex transmission between stations is achieved using for your company.
Point to Point How many network IDs must you allow for when you define
Ethernet & Fast Ethernet the subnet mask for
Ans C the network?
Half-Duplex - Capability for data transmission in only one direction A.) One for each WAN link
at a time between B.) One for each router interface
sending station and a receiving station. C.) One for each NIC installed in each client
340 When would you use ISDN? D.) One for each subnet with hosts
A.) To connect LANs using POTS E.) One for each host ID
B.) To support applications requiring voice, data, and video Ans A D
C.) When you need a consistent and very high rate of data speed When determining Network Ids, you need to take into account
D.) To connect to IBM mainframes each Subnet and Each
Ans B WAN link you will have. Add these numbers up and you will find the
IDSN supports high speed voice, data and video and is a good answer to
choice for many small which Network ID you can use.
- 30 -
355 What is the protocol number for UDP? C.) A user- assigned ID defined to each frame
A.) 6 D.) The building of filter tables
B.) 17 Ans B C
C.) 25 Frame identification (frame tagging) uniquely assigns a user-
D.) 21 defined ID to each
Ans B frame. This technique was chosen by the IEEE standards group
User Datagram Protocol - UDP is a connectionless oriented because of its
transport protocol for use scalability.
when the upper layers provide error-recovery and reliability. UDP In this approach, a unique user-defined identifier is placed in the
does not sequence header of each frame
data or re-assemble it into any order after transmission. This as it's forwarded throughout the switch fabric. The identifier is
protocol uses Port 17. understood and
356 What is the default LMI type? examined by each switch prior to any broadcasts or transmissions
A.) Cisco to switch ports of
B.) ANSI other switches, router, or end-station devices. When the frame
C.) IETF exits the switch fabric,
D.) Q933a the switch removes the identifier before the frame is transmitted
Ans A to the target endstation.
Local Management Interface (LMI) was developed in 1990. LMI The following points summarize frame tagging:
messages provide Used by Catalyst 3000 and 5000 series switches
information about the current DLCI values, the global or local Specifically developed for multi-VLAN, inter-switch communication
significance of the Places a unique identifier in the header of each frame
DLCI value, and the status of virtual circuits. Functions at layer 2
There are three types of LMI standards: Requires little processing or administrative overhead
ANSI - Annex D defined by ANSI standard T1.617
ITU-T (Q.933A) - Annex A defined by Q933A 361 A ISDN BRI circuit can be described as a which of the
Cisco (default) - LMI defined by the gang of four following?
357 You have two Cisco routers setup back-to-back in a lab A.) 3B channels
using DTE/DCE B.) 2-64Kbps B channels and 1-16Kbps D channel
cables. To which router would you add the clockrate C.) none of the above
command? D.) 2-64Kbps B channels and 1-16Kbps C channel
A.) The serial port on the DCE router Ans B
B.) The Ethernet port on the DTE router There are two types of ISDN Channels :
C.) The Ethernet port on the DCE router BRI (Basic Rate Interface) - is 2 64Kbps B channels for data and
D.) The serial port on the DTE router one 16Kbps D
Ans A channel for link management.
In order to connect routers back-to-back, a clock rate must be set PRI (Primary Rate Interface) - is 23Kbps B channels and 1 64Kbps
on the router with D channel.
the DCE cable. This will provide the clocking usually performed by 362 The two sublayers of the IEEE Data Link Layer are
a DSU/CSU. It which of the following?
is recommended that a bandwidth statement be added to the A.) Link and Logical Control
interface because some B.) Data Link and LLC
routing protocols, such as IGRP, use this to make routing decisions. C.) Logical Link Control and Media Access Control
358 How does a switch use store and forward? D.) Data Link and MAC
A.) By using a Class I repeater in a collision domain Ans C
B.) The LAN switch copies the entire frame into its onboard buffers Logical Link Control Sublayer - Acts as a managing buffer between
and then looks the upper layers
up the destination address in its forwarding, or switching, table and the lower layers. Uses Source Service Access Points (SSAPs)
and determines the and Destination
outgoing interface Service Access Points (DSAPs) to help the lower layers talk to the
C.) By using broadcast addresses as source addresses Network Layer.
D.) The switch waits only for the header to be received before it Media Access Control (MAC) -The MAC sublayer manages protocol
checks the access to the
destination address and starts forwarding the packets physical network medium. The IEEE MAC specification defines MAC
Ans B addresses,
Store-and-Forward switching copies the entire frame into its buffer which allow multiple devices to uniquely identify one another at
and computes the the data link layer.
CRC. If a CRC error is detected, the frame is discarded, or if the 363 The -- terminal no editing -- command will perform
frame is a runt (less what function?
than 64 bytes including the CRC) or a giant (more than 1518 bytes A.) Edit the contents of NVRAM
including the B.) Allows access to the terminal port
CRC). The LAN switch then looks up the destination address in its C.) Stops the advanced editing feature
switching table D.) Enable password functions
and determines the outgoing interface. The frame is then Ans C
forwarded to the outgoing The command to disable advanced editing feature is:
interface. Cisco Catalyst 5000 switches uses the Store-and-Forward Router(config)# terminal no
method. The editing
problem with Store-and-Forward switching is latency is increased. 364 Which two of the following are valid ways to have
Latency also multiple encapsulation
varies with the size of the frame. The larger the frame, the more types on a single interface?
latency associated. A.) This is not possible
This of course is due to the fact that the entire frame is copied into B.) subinterfaces
its buffer before C.) additional physical interfaces
being forwarded. D.) secondary addresses
359Which of the following are valid WAN terms? Ans B D
A.) DTE Cisco routers do not allow multiple encapsulation types on a single
B.) DCE interface.
C.) Demarc Therefore, it is necessary to create either a Secondary Network, or
D.) CPE a Subinterface and
Ans A B C D assign a new encapsulation type.
All of the above are valid WAN terms. 365 Which 3 statements describe default encapsulation
360 Which two describe frame tagging? and LMI type
A.) Examines particular info about each frame configuration?
B.) A unique ID placed in the header of each frame as it traverses A.) There are only four encapsulations and 3 LMI type options
the switch fabric B.) The LMI type config term options
- 31 -
C.) In release 11.3 the LMI type is autosensed and determines the outgoing interface. The frame is then
D.) The default LMI is Cisco forwarded to the outgoing
E.) IETF encap must be configured unless the connecting routers interface. Cisco Catalyst 5000 switches uses the Store-and-Forward
are both cisco method. The
Ans C D E problem with Store-and-Forward switching is latency is increased.
The above 3 statements best describe default encapsulation and Latency also
LMI type varies with the size of the frame. The larger the frame, the more
configuration for Cisco routers. latency associated.
366 Which can be true regarding VLANs? This of course is due to the fact that the entire frame is copied into
A.) They are created by location its buffer before
B.) They are created by function being forwarded.
C.) They are created by department 372 The benefits to segmenting with Bridges are which of
D.) They are created by group the following?
Ans A B C D A.) Scalability
A Virtual LAN (VLAN) is a switched network that is logically B.) Datagram filtering
segmented by C.) Manageability
communities of interest without regard to the physical location of D.) Reliability
the users. Each port Ans A C D
on the switch can belong to a VLAN. Ports in a VLAN share Manageability, reliability and scalability are all benefits to
broadcasts. A VLAN segmenting with bridges.
looks like, and is treated like, it's own subnet. 373 What is the administrative distance for IGRP?
The benefits of VLANs are as follows: A.) 90
Simplify moves, adds, and changes B.) 120
Reduce administrative costs C.) 110
Have better control of broadcasts D.) 100
Tighten network security Ans D
Microsegment with scalability IGRP is a distance vector routing protocol designed by Cisco. The
Distribute traffic load maximum hop
Relocate server into secured locations count is 255, and it uses a combination of variables to determine a
367 What is true when using DDR? composite metric.
A.) HDLC is the preferred encapsulation IGRP has an administrative distance of 100.
B.) You must use static routing 374 On an ISDN BRI interface, the control channel is the 'D'
C.) You should use dynamic routing channel. What is
D.) You should use ISDN the rate of this channel?
Ans B A.) 64 Kbps
When using Dial Demand Routing (DDR), static routes must be B.) 1.544 Mbps
specified in order to C.) 128 Kbps
route packets. D.) 2.048 Mbps
368 If you are running Token Ring with Novell IPX routing, E.) 16 Kbps
which encapsulation Ans E
should you use? 16K for the D channel (control)
A.) SAP 64K for the two B channels (data)
B.) SNAP 375 MIDI and MPEG are examples of what layer of the OSI
C.) 802.5 seven layer model?
D.) 802.2 A.) Session
Ans B B.) Network
Token Ring with Novell IPX routing uses the SNAP protocol, not C.) Datalink
802.5. D.) Transport
369 What are the 3 ways routers learn paths to destination E.) Application
networks? F.) Presentation
A.) Dynamic Ans F
B.) Static The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI,
C.) Routing tables and MPEG.
D.) Default Encryption can also occur at this layer.
Ans A B D 376 Which ISDN specification series deals with Concepts
There are three methods in which routers can learn paths to and Terminology?
destination networks, they A.) World Series
are: B.) I- Series
1) Static - The administrator manually enters the routes. C.) Q-Series
2) Dynamic - A routing protocol is used. D.) 911-Series
3) Default - A gateway of last resort is set. E.) J-Series
370 Bridges work at what layer of the OSI model? F.) F-Series
A.) Data Link Ans B
B.) Network The 2 most important ISDN specifications are Q & I:
C.) Physical Q - Call setup and teardown.
D.) Application I - Concepts and terminology.
Ans A 377 Which of the following is an example of the Physical
Bridges work at Layer 2 (Data Link) because they examine the Layer?
MAC address of the A.) SQL
packet which they base decisions upon. B.) IP
371 What is the default switching method for the Cisco C.) LLC
5000 series? D.) DDP
A.) Cut-through E.) Ethernet
B.) Store-and-splice Ans E
C.) Latency FDDI, Token Ring and Ethernet are all physical layer framing
D.) Store-and-forward standards.
Ans D 378 In regards to the ISDN BRI standard, which channel is
Store-and-Forward switching copies the entire frame into its buffer used for control?
and computes the A.) B
CRC. If a CRC error is detected, the frame is discarded, or if the B.) D
frame is a runt (less C.) E
than 64 bytes including the CRC) or a giant (more than 1518 bytes D.) I
including the E.) Q
CRC). The LAN switch then looks up the destination address in its Ans B
switching table B is Bearer for Data (2 channels at 64kb each).
- 32 -
D is for Control (16kb). interface that it was received or learned from. Poison Reverse is
379 Which protocol resolves an IP address to a MAC typically used on
address? larger networks, where a more aggressive routing loop solution is
A.) DHCP required.
B.) RARP 386 Which layer of the 7 layer model is responsible for
C.) ARP representing the
D.) NBP application information between 2 different OS's? For
E.) DNS example, converting
Ans C ASCII to EBCIDIC.
The Address Resolution Protocol (ARP) sends out a broadcast to A.) Transport
determine the MAC B.) Application
address from the IP address. C.) Physical
380 Which of the following is an example of the Network D.) Session
Layer? E.) Presentation
A.) TCP F.) Network
B.) IP Ans E
C.) SQL The OSI Presentation layer formats the data, which includes
D.) Token Ring encryption services.
E.) LLC 387 Which type of switching reads in the entire frame
Ans B before forwarding it?
Most protocol suites have different OSI layer protocols within them. A.) Tabling
At layer 3, B.) Store-and-Forward
IP is for TCP/IP. TCP is layer 4. C.) Inverse ARP
IPX is for IPX/SPX. SPX is layer 4. D.) Fast Forward
DDP is for Appletalk E.) Cut-Through
381 The Internet Control Message Protocol occurs at what F.) Routing
layer of the seven Ans B
layer model? Store-and-Forward is slower, but it checks the frame for errors
A.) Physical before forwarding.
B.) Transport This can actually help to improve overall network performance on
C.) Session noisy lines.
D.) Datalink 388 Which OSI Reference Layer is concerned with path
E.) Presentation determination?
F.) Network A.) Datalink
Ans F B.) Physical
ICMP is used for error handling and testing at layer 3. Ping and C.) Network
traceroute are D.) Transport
examples of ICMP. E.) Session
382 Which of the following are examples of the Session Ans C
Layer? The Network layer is where routing occurs.
A.) IP 389 Which of the following are examples of the Datalink
B.) Netbios Names Layer?
C.) NFS A.) LLC
D.) Token Ring B.) SQL
E.) SQL C.) TCP
F.) TCP D.) Token Ring
Ans B C E E.) IP
Session layer examples include Netbios Names, SQL, NFS, X Ans A
Windows, and RPC. MAC and LLC are the sublayers of the Datalink layer.
383 What is the regional telco office called, where the 390 What is the standard ISDN term for a non-native
customers local loop analog telephone?
terminates? A.) TE1
A.) Demarc B.) TA
B.) DTE C.) LE
C.) DCE D.) TE2
D.) CO E.) ET
E.) CPE Ans D
Ans D Terminal Equipment 2 (TE2) does not support native digital ISDN.
The Central Office (CO) is the Telephone Company (Telco) location The analog
nearest you. device will require an external analog to digital converter.
384 What is the default LMI type for Cisco Routers that are 391 Which Distance Vector characteristic can help to speed
using Frame-Relay? up convergence?
A.) Gandalf5 A.) Triggered Updates.
B.) Q933A B.) Split Horizon.
C.) Cisco C.) Poison Reverse.
D.) IETF D.) Hold Down timers.
E.) ARPA E.) Inverse ARP.
F.) SAP Ans A
Ans C Instead of waiting on a pre-set periodic interval (before sending
Local Management Interface (LMI) types are Cisco, ANSI, and the routing table), DV
Q933A. routing protocols can send triggered updates to immediately notify
385 Most routing protocols recognize that it is never useful the neighbor
to send information routers. Hold down timers, Poison Reverse, and Split Horizon are
about a route back out the direction from which the features that are
original packet came. This used to avoid routing loops.
is an example of which routing technology? 392 Which type of switching is considered to be 'wire
A.) Split Horizon speed?'
B.) LMI A.) Cut-Through
C.) Triggered Updates B.) Multiplexed
D.) Poison Reverse C.) Inverted
E.) SYN, ACK D.) Layer 4
F.) DLCI E.) Store and Forward
Ans A F.) Layer 3
The golden rule of Split Horizon: Do not send any update packet Ans A
back out the same
- 33 -
Cut-Through is the fastest mode of switching. Store and Forward OSI layer-2 SAP allows the upper layers to encapsulate multiple
reads in the entire layer 3 protocols.
frame, confirms the frame is valid, and then forwards the frame IPX SAP is a protocol used to advertise NetWare services every 60
onto the wire. Cut- seconds.
Through only checks the destination header in the frame and 399 When a Distance Vector routing protocol detects that a
immediately forwards connected network
the frame onto the wire, without checking the frame to be valid. has gone down, it sends out a special routing update
Layer-3 switching is packet, telling all directly
actually routing. connected routers that the distance to the dead network is
393 The Datalink layer works with which of the following: infinity. This is an
A.) Packets example of which routing technology?
B.) Bits A.) ICMP.
C.) Globules B.) Only Link State routing protocols have this intelligence.
D.) Frames C.) Triggered updates.
E.) Segments D.) Garrison-4.
Ans D E.) Split Horizon.
Physical - bits F.) Poison Reverse.
Datalink - frames Ans F
Network - packets Instead of just removing the route from the routing update, Poison
394 What is a characteristic of Store and Forward Reverse sets the
switches? distance to 'infinity' (for IP RIP this is a hop count of 16). This
A.) They forward the frame before it is completely read. immediately makes
B.) They work at wire speed. the route invalid for all neighboring routers.
C.) They are the same a Cut-Through switching. 400 Which of the following would be displayed by the
D.) They read the entire frame and check CRC before forwarding. command 'SHOW CDP
E.) They decrease latency. NEIGHBOR DETAIL'?
Ans D A.) The incoming/outgoing port.
Store and Forward switch will not forward fragments. B.) The hardware platform.
The longer the frame, the longer the delay (latency) before the C.) One address per protocol.
switch can forward. D.) Amount of Flash Memory Available
E.) The routers hostname.
395 Station A is transmitting data to station B, and expects F.) The subnet mask, if IP is configured.
an acknowledgment Ans A B C E
after every 400 bytes. After transmitting data for a while, CDP shows a lot of the same info that 'show version' does locally,
the two stations but FLASH
determine the line is reliable and change to expecting and memory is not part of it. The 'detail' keyword is optional, but even
acknowledgement when used, IP
every 600 bytes. subnet mask information is not displayed by CDP for IP interfaces.
This is an example of (pick the best answer only): 401 Which of the following are characteristics of UDP?
A.) BECN A.) UDP is connection oriented.
B.) Sliding Windows B.) UDP is used with TFTP.
C.) Poison Reverse C.) UDP is unreliable.
D.) Countdown timers D.) UDP is connectionless.
E.) Split Horizon E.) UDP is at the transport layer.
F.) Count to infinity F.) UDP uses no acknowledgements.
Ans B Ans B C D E F
A TCP/IP 'window' is the amount of data (number of bytes) that the UDP sends packets 'blind' down the network, and relies on upper-
sending station layer protocols to
will transmit before expecting an acknowledgement back. form connections and detect errors. TCP is a connection-oriented
If the stations can change that window size on the fly, that is called protocol that can
a sliding window. provide reliable transport.
This is done to optimize performance. 402 What is a characteristic of Store and Forward
396 Which device listed below provides clocking for the switches?
line? A.) They work at wire speed.
A.) DCE B.) They are the same as Cut-Through switching in 'prune' mode.
B.) CPE C.) They forward based on transport layer info.
C.) CO D.) They forward the frame before it is completely read.
D.) DTE E.) They increase latency.
E.) Demarc Ans E
Ans A Store and froward will not forward fragments. The longer the
The Data Circuit-terminating Equipment (DCE) is responsible for packet, the longer the
providing the delay (latency) in the switch. There is no such thing as 'prune'
clocking on the wire. mode.
HINT: When You see the 'C' in 'DCE', think 'Clocking' t. 403 The Internet Protocol (IP) occurs at what layer of the
397 Which OSI Reference Layer controls application to seven layer model?
application A.) Physical
communication? B.) Presentation
A.) Datalink C.) Network
B.) Network D.) Datalink
C.) Transport E.) Session
D.) Session F.) Transport
E.) Physical Ans C
Ans D IP is a routed protocol that occurs at layer 3. Other layer 3
The Session layer controls a conversation between applications. protocols include IPX,
The Transport layer controls communications between hosts. APPLETALK, and DECNET.
398 The Datalink Layer is broken down into 2 layers, LLC 404 In regards to TCP/IP, which class of address allows for
and MAC. The LLC the fewest valid
establishes media independence and what else? Internet hosts?
A.) Provides Windowing. A.) D
B.) Provides flow control. B.) E
C.) Provides SAP's (Service Access Points). C.) Classes are not used in TCP/IP.
D.) The Datalink layer does not have sublayers. D.) B
E.) Provides SAP's (Service Advertising Protocol). E.) C
F.) RIP Updates. F.) A
Ans B C Ans E
- 34 -
Class A = 16.7 million hosts America. There is no such thing as an analog modulator
Class B = 65,534 hosts demodulator for digital
Class C = 254 hosts ISDN. The Terminal Adapter (TA) allows you to connect a PC to a
405 For IPX, what is the DEFAULT Cisco Encapsulation on an digital ISDN line
Ethernet directly. In the real world, ISDN is digital, modems are analog.
interface? 411Which of the following are Transport layer protocols?
A.) novell-ether A.) UDP
B.) gns B.) TCP
C.) snap C.) NBP
D.) arpa D.) IP
E.) sap E.) SPX
F.) dix Ans A B C E
Ans A TCP (Transmission Control Protocol) and UDP are used by TCP/IP.
At the time when Cisco first supported IPX, Novell-Ether (Novell SPX (Sequenced Packet Exchange) is used with IPX.
proprietary 802.3 NBP (Name Binding Protocol) is used with Appletalk.
'raw') was the default frame type for NetWare 2.x and 3.x file 412 When determining whether or not to route a LAN
servers. Now, Novell segment, which rule of
has changed their default frame type to 802.2 (which is really IEEE thumb do you use?
802.3 Ethernet, A.) 60/40
with LLC 802.2 headers). B.) 50/50
406 Novell NetWare has an Ethernet frame type called C.) 80/20
Ethernet_II. What is D.) 90/10
the matching Cisco command line keyword for this E.) 70/30
encapsulation method? Ans E
A.) dix The industry standard rule is 80/20, which means 80% local, 20%
B.) sap over the router.
C.) arpa However, according to Cisco's online documentation, the answer is
D.) gns 70/30.
E.) snap This makes sense, considering more and more traffic is starting to
F.) novell-ether go from the
Ans C desktop to an ultimate destination outside the local are network,
Novell 802.2 = sap (contains 802.2 LLC headers) such as the Internet.
Novell 802.3 = novell-ether (NetWare proprietary) 413 Which of the following are examples of the Session
Ethernet_II = arpa (the Internet standard) Layer?
snap = snap (field type set to 'AA') A.) TCP
407 There are 2 types of PPP authentication supported by B.) LLC
the Cisco IOS. What C.) SQL
are they? D.) NFS
A.) PAP E.) Token Ring
B.) PREDICTOR Ans C D
C.) MD5 Session layer examples include Netbios Names, SQL, NFS, X
D.) CHAP Windows, and RPC.
E.) STACKER 414 Which layer of the 7 layer model provides services to
F.) MSCHAP the Application layer
Ans A D over the Session layer connection?
Router(config-if)#ppp authentication ? A.) Transport
chap Challenge Handshake Authentication Protocol (CHAP) B.) Application
pap Password Authentication Protocol (PAP) C.) Session
408 Which of the following are examples of the Transport D.) Network
Layer? E.) Datalink
A.) Token Ring F.) Presentation
B.) UDP Ans F
C.) TCP The OSI Presentation layer is sandwiched between the Application
D.) IP and Session
E.) SQL layers.
F.) LLC 415 What type of switching creates variable latency
Ans B C through the switch?
TCP is connection oriented. A.) Cut-Through
UDP is connectionless. B.) Inverted
409 Which of the following describe SMTP? C.) Layer 4
A.) Used for downloading files to the router. D.) Multiplexed
B.) Used for sending e-mail. E.) Store and Forward
C.) Uses TCP. Ans E
D.) Uses UDP. DEFINITION: Latency = Delay.
E.) Uses port 25. Because a store and forward switch reads the whole frame before
F.) Used for managing IP devices. forwarding,
Ans B C E a larger frame takes longer than a shorter frame.
Send / Simple (depending on literature) Mail Transport Protocol 416 The network portion of an address typically represents
(SMTP) is used for a:
delivering mail to other mail servers. It uses port 25, and relies on A.) Router
TCP. B.) Ethernet MAC address.
POP 3 (Post Office Protocol version 3) is used for retrieving mail C.) Computer
from mail servers to D.) Host
clients. E.) Segment
410 What is the standard ISDN term for a native ISDN Ans E
modem? Every network segment is represented by a network or subnetwork
A.) ET address.
B.) LE 417 The Physical layer works with which of the following:
C.) TE2 A.) Segments
D.) TE3 B.) Datagrams
E.) TA C.) Packets
Ans E D.) Bits
The marketing term 'ISDN modem' was created to help sell the E.) Frames
ISDN idea to The correct answer(s): D
Physical - bits
- 35 -
Datalink - frames B.) CO
Network - packets C.) DCE
418 Which of the following is an example of the Network D.) Demarc
Layer? E.) DTE
A.) LLC Ans A
B.) SQL CPE - Customer Premise Equipment
C.) Token Ring 425 Which layer allows multiple Ethernet devices to
D.) IPX uniquely identify one
E.) SPX another on the Datalink layer?
Ans D A.) Transport
Most protocol suites have different OSI layer protocols within them. B.) Session
At layer 3, C.) Network
IP is for TCP/IP. TCP is layer 4. D.) Datalink - MAC Sublayer
IPX is for IPX/SPX. SPX is layer 4. E.) Datalink - LLC Sublayer
DDP is for Appletalk Ans D
419 When setting up a frame-relay network between a Ethernet MAC addresses are 48 bits long, and provide a unique
Cisco router and a non- hardware identifier.
Cisco router, what encapsulation type should you use? 426 Which of the following are examples of ICMP?
A.) SAP A.) Traceroute
B.) CISCO B.) Web Browsing
C.) IANA C.) Ping
D.) Apollo D.) Telnet
E.) IETF E.) Destination Unreachable message from a router
F.) Q933A F.) Inverse Tunnels
Ans E Ans A C E
The Internet Engineering Task Force (IETF) encapsulation method is Ping and Traceroute are used by ICMP for Testing.
the standard Destination Unreachable messages are generated by a router
encapsulation type for Frame Relay. Cisco routers default to the when it does not have a
CISCO encapsulation route to the network.
method, because it was created before there was a standard. 427 Novell NetWare has an Ethernet frame type called
420 A user device that connects to a DCE must be which of Ethernet_SNAP. What
the following? is the matching Cisco command line keyword for this
A.) DTE encapsulation method?
B.) CPE A.) arpa
C.) Demarc B.) sap
D.) DCE C.) snap
E.) CO D.) gns
Ans A E.) dix
DTE's are the router side, and receive clocking. F.) novell-ether
DCE's are the DSU/CSU side, and provide clocking. Ans C
It may or may not be Customer Premises equipment. Novell 802.2 = sap (contains 802.2 LLC headers)
421 What does the parameter -- LOG -- do on an IPX access Novell 802.3 = novell-ether (NetWare proprietary)
list? Ethernet_II = arpa (the Internet standard)
A.) The log keyword is not a valid option. snap = snap (field type set to 'AA')
B.) Read the LOG to figure out what traffic to deny. 428 Given the Novell IPX address 1aceb0b.0000.0c12.3456
C.) Logs the creation of the access list. which part is the
D.) Logs IPX access control list violations whenever a packet network portion of the address?
matches a particular A.) 0000
access list entry. B.) 1
E.) Ensures the IPX protocol places a log in the fireplace. C.) 3456
Ans D D.) 1ace
Router(config)#access-list 900 deny any ? E.) 0000.0c12.3456
log Log matches against this entry F.) 1aceb0b
422 Given the global configuration commands: Ans F
'banner motd #' IPX addresses are 80 bits total: The first section of the address is
'Hello #' the network portion,
When would the message be displayed? the last 3 groups of numbers are the host.
A.) The message of the day banner shows up before login. 429 In version 11.2 of the IOS, a Cisco router configured for
B.) The message of the day banner shows up during logoff. frame-relay can
C.) These commands are not the right syntax for MOTD. automatically detect the LMI type. What is this known as?
D.) Message of the day banners are displayed upon entering global A.) Psychic
config mode. B.) ESP
E.) Message of the day banners are not possible. C.) Inverse ARP
F.) The message of the day would be, 'Hello #' D.) Hello
Ans A E.) Reverse ARP
Message of the day banners are displayed when a user logs on to F.) Autosense
the router. In the Ans F
example above, the '#' is the unique delimiting (terminating) Autosense allows the router to determine which LMI type the frame
character. In this way, relay switch is
banners can have multiple lines, terminated not by hitting using. Options include CISCO, ANSI, and Q933A.
<ENTER>, but rather by 430 What type of Ethernet operation allows only one entity
the chosen (unique) delimiting character. to transmit at a time?
423 Which ISDN specification deals with call Setup and For example, if someone else is transmitting, they must
Teardown? wait.
A.) Q-Series A.) Full-Duplex
B.) J-Series B.) Dual-Duplex
C.) I- Series C.) Half-Duplex
D.) C- Series D.) Latex
E.) F-Series E.) Quarter-Duplex
Ans A F.) Suplex
The 2 most important ISDN specifications are Q & I: Ans C
Q = Call setup and teardown. Half-Duplex is like a one-lane bridge. If one car is going over the
I = Concepts and terminology. bridge, all other
424 All equipment located at the customers site is called: cars must wait on the other side before crossing.
A.) CPE
- 36 -
431 Which of the following are examples of the Application SNMP can support Community (password protected) SET and PUT
Layer? commands, but
A.) LLC you can not issue a command line interface command with it.
B.) Token Ring 438 What two types of PPP data compression are available
C.) Spreadsheet using Cisco IOS?
D.) TCP A.) Predictor
E.) IP B.) DoubleSpace
F.) Word Processor C.) Stacker
Ans C F D.) PAP
Pretty much any end-user program is an example of the E.) ZIP
Application Layer. F.) CHAP
432 Which technologies listed below help prevent network Ans A C
loops in a switched Stacker and predictor have similar compression rates.
(bridged) environment? Stacker uses more CPU, while predictor uses more RAM.
A.) Store-and-Forward 439 In regards to the OSI seven-layer model, at which layer
B.) IEEE 802.1d is EBCDIC and
C.) Diikjstra Algorithm ASCII?
D.) Cut-Through A.) Presentation
E.) Spanning Tree Protocol B.) Application
F.) Routing C.) Transport
Ans B E D.) Session
The Spanning Tree Protocol (STP) eliminates loops by disabling the E.) Datalink
port(s) that are F.) Network
causing the bridging loop. This is also called putting a port into Ans A
'blocking' mode. The The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI,
industry standard for STP is IEEE 802.1d and MPEG.
433 Which OSI Reference Layer controls end-to-end (host Encryption can also occur at this layer.
to host) 440 Which of the following are examples of the Transport
communication? Layer?
A.) Transport A.) SQL
B.) Physical B.) UDP
C.) Datalink C.) IP
D.) Network D.) LLC
E.) Session E.) ARP
Ans A Ans B
The Session layer controls a conversation between applications. TCP is connection oriented.
The Transport layer controls communications between hosts. UDP is connectionless.
434 What is the first step in data encapsulation? 441 Given the global configuration command 'banner motd
A.) User information is converted into data. #7 Hello #', what do
B.) Frames are put into bits. the '#' symbols represent?
C.) Data is converted into segments. A.) Escape sequence to exit the menu.
D.) Segments are converted into datagrams and packets. B.) Nothing, just part of the banner.
E.) Packets are put into logical frame. C.) Tic Tac Toe Macro.
Ans A D.) Delimiting Character
The Five steps to data encapsulation (IN ORDER): E.) Message border character.
1) User information is converted into data. F.) Number of times message to be displayed.
2) Data is converted into segments. Ans D
3) Segments are converted into datagrams and packets. Delimiting characters allow you to have a message the is more
4) Packets are put into logical frame. than one line. You
5) Frames are put into bits. simply type as many lines as you want, ending with the delimiting
435 We know that TCP provides connection oriented (terminating)
services, what else does it character.
provide?
A.) FECN & BECN
B.) Path discovery. 442 There is a process in Frame-Relay where LMI resolves
C.) Flow control and error checking. an IP address from a
D.) Name resolution. DLCI number. What is this called?
E.) File manipulation. A.) arp
Ans C B.) inverse arp
The transmission control protocol uses acknowledgements and C.) rarp
windowing to handle D.) automap
flow control and error checking. E.) reverse arp
436 With distance vector routing protocols, it is never F.) arp
useful to send the same Ans B
routing update packet back out the same interface that it Inverse Arp maps the Local DLCI number to the remote IP address.
was learned. This Inverse Arp is a function of LMI.
concept is called what? 443 When setting up a WAN network, everything outside of
A.) Holddown timers the Demarc is not
B.) Poison Reverse owned by the customer. Which of the following are not
C.) Count to infinity owned by the customer?
D.) Split Horizon A.) The T1 line.
E.) Link State B.) LAN
Ans D C.) The Router
Split horizon is the concept of: 'Don't tell me what I just told you.' D.) DTE
437 Which of the following are ways to provide login E.) PC's
access to a router? F.) CO
A.) HTTP Ans A F
B.) Console The Central Office is the where phone people work.
C.) Telnet The Telco maintains ownership of its physical wiring, and leases
D.) Aux Port their use to their
E.) SNMP customers.
F.) LLC 444 You want to segment a network. The network is
Ans A B C D running SNA and Netbios.
You can connect via Aux, Console, Telnet, or HTTP to a Cisco router. Which device should NOT be used to segment the network?
A.) A store and forward switch.
- 37 -
B.) A router. 451 Which routing protocols uses connection-oriented
C.) A Catalyst 5000. routing updates?
D.) A cut-through switch. A.) IGRP
E.) A bridge. B.) UDP
Ans B C.) RIP
SNA and Netbios are non-routable, you should bridge them. D.) IP
The most correct answer for this question is 'A Router.' E.) BGP
The purpose here is to recognize that Layer 2 protocols can not be Ans E
routed. Sybex CCNA Study Guide: Chapter 7, page 228-229
However, there are ways to turn a non-routable protocol into a BGP (Border Gateway Protocol) uses TCP to reliably deliver its
routable protocol via a routing updates.
protocol gateway, DLSW+, RSRB and other technologies. 452 At which layer of the OSI Reference Model do bridges
445 Name a major component of the Point-to-Point operate?
Protocol (PPP) to negotiate A.) Physcial
and set up control options on the WAN data link. B.) Session
A.) RFC 1661 C.) Datalink
B.) High Level Datalink Protocol (HDLC) D.) Transport
C.) Challenge Handshake Authentication Protocol (CHAP) E.) Network
D.) SS7 Ans C
E.) Link Control Protocol (LCP) Bridges and switches work at layer 2 and forward frames based on
Ans E the MAC address.
LCP negotiates many of the PPP settings during call setup. Repeaters work at the physical layer.
446 Which of the following is an example of the Physical 453 Where is the point between the customers site and the
Layer? phone carrier that
A.) SQL responsibility changes?
B.) IP A.) CO
C.) LLC B.) Demarc
D.) Token Ring C.) DCE
E.) FDDI D.) DTE
F.) TCP E.) CPE
Ans D E Ans B
FDDI, Token Ring and Ethernet are all physical layer framing The DEMARCATION POINT (Demarc) in North America is between
standards. the customers
447 Cisco's implementation of ISDN BRI has multi protocol CSU/DSU and the Local Telco Office, because Americans own the
support, SNMP DSU/CSU.
MIB support, and what other features? Elsewhere in the world, the Demarc is between the Router and the
A.) Call waiting CSU/DSU,
B.) Compression because outside the USA the Telco owns the DSU/CSU.
C.) ADSL 454 Novell NetWare has an Ethernet frame type called
D.) 1.544 Mbps Ethernet_802.2. What is
E.) Call screening the matching Cisco command line keyword for this
F.) Negative 'G' support encapsulation method?
Ans B E A.) gns
Caller ID is part of ISDN and you can screen calls based on it. B.) arpa
Cisco can compress with Stacker or Predictor. C.) snap
448 The Network layer works with which of the following: D.) sap
A.) Globules E.) novell-ether
B.) Bits F.) dix
C.) Packets Ans D
D.) Segments Novell 802.2 = sap (contains 802.2 LLC headers)
E.) Frames Novell 802.3 = novell-ether (NetWare proprietary)
Ans C Ethernet_II = arpa (the Internet standard)
Physical - bits snap = snap (field type set to 'AA')
Datalink - frames 455 Which of the following is an example of the Physical
Network - packets Layer?
449 An optional parameter on an IPX access is the 'LOG' A.) TCP
parameter. This B.) ARP
records access-list violations when a packet matches. What C.) IP
else does the 'LOG' D.) FDDI
option do? E.) LLC
A.) Records the number of times that a packet matches the list. F.) Fast Ethernet
B.) Return a message to user who is denied access the by list. Ans D F
C.) Notifies an SNMP Agent. FDDI, Token Ring and Ethernet are all physical layer framing
D.) Saves the log to NVRAM. standards.
E.) Send an SNMP Trap. 456 Which of the following is true regarding standard ISDN
Ans A BRI service?
It will record to the log. By default a Cisco router logs to RAM and A.) ISDN BRI B channels are typically 64K.
can display the B.) ISDN BRI can handle only voice.
offense to the console, which is not recommended. It is suggested C.) ISDN BRI can handle only data.
that you log to a D.) ISDN BRI has 2B and 1D channels.
syslog server, for less router CPU impact. E.) ISDN BRI D channels are 16K.
450 Which is not a common problem with Distance-Vector F.) ISDN BRI can handle voice and data.
routing? Ans A D E F
A.) Slow convergence. 2 64K B channels carry the data.
B.) Complex configuration. 1 16K D channel is used for control.
C.) Routing loops. Note: In certain parts of the world, it is possible that the 'B'
D.) Periodic updates can slow convergence. channels are only 56k
E.) Counting to infinity. each instead of 64k each.
Ans B 457 In distance-vector routing, there is a problem known
Easy Config: as the 'count to
Router(config)#router rip infinity' problem. What is the most direct solution to this?
Router(config-router)#network 10.0.0.0 A.) Defining a Maximum.
Router(config-router)# B.) You can not solve the 'count to infinity' problem with a distance
That’s it! (Remember that the network is followed by the vector protocol.
CLASSFUL address.) C.) Poison Reverse.
- 38 -
D.) Triggered Updates. E.) TA
E.) Split Horizon. Ans B
Ans A Terminal Equipment 1 (TE1) understands what native digital ISDN
The most direct solution to the count to infinity problem is to lower is, and has builtin
what infinity is. analog to digital converters.
For RIP, the default maximum number of hops is 16. It takes a lot 464 PICT & JPEG are examples of what layer in the OSI
less time to count seven layer model?
to 16 than infinity. A.) Transport
458 Which of the following are examples of the Network B.) Presentation
Layer? C.) Application
A.) Token Ring D.) Datalink
B.) LLC E.) Network
C.) SQL F.) Session
D.) IP Ans B
E.) TCP The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI,
F.) IPX and MPEG.
Ans D F Encryption can also occur at this layer.
Other Network Layer protocols also include Appletalk and DECnet. 465 Which of the following is an example of the Session
TCP is Layer?
considered to be at a higher Layer, because it provides guaranteed A.) TCP
data delivery. B.) SQL
459 Which type of switching reads just the address portion C.) IP
of the frame and then D.) X-Windows
immediately starts forwarding it? E.) Token Ring
A.) Cut-Through F.) LLC
B.) Store-and-Forward Ans B D
C.) Tabling Netbios Names, SQL, NFS, X-Windows are examples of the Session
D.) Routing layer.
E.) Inverse ARP 466 Which global configuration command will tell the
F.) Fast Forward router to load the IOS file
Ans A 'IOS_filename' from the Network File server at 1.2.3.4
Cut-Through is fast, but it does not read the entire frame and during the next boot?
perform any error A.) boot system flash IOS_filename 1.2.3.4
checking before forwarding. This can result in forwarding errors, B.) boot system tftp IOS_filename 1.2.3.4
such as fragments. C.) config-register 0x0 1.2.3.4
460 Which feature of PPP (Point to Point Protocol) allows D.) boot system rom 1.2.3.4
the router to bind E.) This can not be done, only the first file in flash can be used.
multiple channels together, to form a single logical Ans B
channel? Router(config)#boot system ?
A.) multi-link ppp WORD TFTP filename or URL
B.) multi-channel ppp flash Boot from flash memory
C.) can't be done mop Boot from a Decnet MOP server
D.) omni-ppp rcp Boot from a server via rcp
E.) plp rom Boot from rom
Ans A tftp Boot from a tftp server
Multilink PPP binds separate physical lines into one logical line. 467 At what layer of the OSI reference model does FRAME-
This feature is RELAY map to?
especially useful for ISDN BRI, where you are provided 2 different A.) Session
circuits at 64k B.) Physical
each (so you can bind them together for 128k). C.) Network
461 Which of the following are solutions to the problems D.) Presentation
encountered with E.) Transport
Distance-Vector routing? F.) Datalink
A.) Defining a Maximum Ans F
B.) Poison Reverse Remember, layer 2 deals with 'frames', and Frame-Relay is purely
C.) Triggered Updates a layer 2 protocol.
D.) Shortest path first algorithm. 468 X.25 is characterized by layer 2 identifiers, and what
E.) Split Horizon else?
Ans A B C E A.) Virtual Lan's
The Shortest Path First (SPF) algorithm is used only with Link-State B.) Session Layer
protocols such as C.) Transport Layer
OSPF. D.) Routing Updates
462 Classful routing protocols do not include subnet masks E.) PVC's
in their routing Ans E
updates. Which of the following routing protocols are Permanent Virtual Circuits and Layer 2 identifies are typical in
considered classful? X.25.
A.) EIGRP 469 Which of the following is an example of the Network
B.) OSPF Layer?
C.) TCP A.) Token Ring
D.) IGRP B.) RARP
E.) RIP C.) LLC
F.) IP D.) DDP
Ans D E E.) TCP
IGRP & RIP do NOT includes the subnet mask in their routing Ans B D
updates. The following two are layer 3 protocols:
OSPF & EIGRP are classless routing protocols and DO INCLUDE the DDP - Datagram Delivery Protocol. AppleTalk network layer
subnet mask in protocol that is
updates. responsible for delivery of datagrams.
TCP and IP are not routing protocols. RARP - Reverse Address Resolution Protocol. Protocol in the TCP/IP
463 What is the standard ISDN term for a native ISDN the allow a
telephone? client to get assigned an IP address based on it's own MAC
A.) ET address.
B.) TE1 470 What is an advantage of LAN segmentation?
C.) TE2 A.) Increases broadcasts.
D.) LE B.) Increases collisions.
- 39 -
C.) Provides more protocol support. E.) Flow Control
D.) Decreases broadcasts. F.) Split Horizon
E.) Routing protocol support. Ans E
Ans D Flow control is when a station is being overloaded with data and
Broadcast containment is a primary motive for LAN segmentation. tells the other station
471 What does the User Datagram Protocol (UDP) provide? to stop for a while, so the receiving station can process the data
A.) Connectionless datagram service. that it has in its buffer.
B.) FECN & BECN 478The Integrated Services Digital Network (ISDN) Basic
C.) Flow control and error checking. Rate Interface (BRI)
D.) Name resolution. provides which of the following?
E.) Path discovery. A.) 1.544 Mbps
Ans A B.) 23B + 1D Channel
UDP is connectionless, and does not provide error checking. But C.) 24B + 1D Channel
remember, error D.) 2B + 1D Channel
checking can occur at other layers too. E.) 23B + the Disney Channel
472 Which OSI Reference Layer is concerned with logical Ans D
addressing? Each B (Bearer) Data channel is 64K
A.) Network The D (Control) channel is 16K
B.) Transport 479 Which layer manages protocol access to the Network
C.) Datalink layer?
D.) Physical A.) Datalink - MAC Sublayer
E.) Session B.) Datalink - LLC Sublayer
Ans A C.) Transport
Datalink is physical (hardware) addressing. D.) Session
Network is logical (software) addressing. E.) Network
473 What layer can optionally support reliability? Ans B
A.) Transport Having two Datalink sublayers provides physical media
B.) IP independence.
C.) Physical The MAC sublayer encapsulates to the Physical Layer.
D.) Network The LLC sublayer encapsulates to the Network Layer.
E.) Sub-physical layer 480Identify the command to display the IP routing table?
Ans A A.) show route
The Transport Layer: B.) show ip route
Segments upper-layer applications. C.) show ip table route
Establishes an end-to-end connection. D.) show ipx route
Sends segments from one end host to another. Ans B
Optionally, ensures data reliability. 481 Identify the command to display all the valid
474 Which of the following is an example of the Datalink commands at the given mode?
Layer? A.) Help all
A.) LLC B.) Help
B.) TCP C.) All commands
C.) SQL D.) ?
D.) IPX Ans D
E.) Token Ring 482Identify the keystroke used to terminate the setup
F.) MAC mode?
Ans A F A.) Ctrl-K
MAC (media access control) and LLC (logical link control) are both B.) Crtl-C
layer 2 protocols. C.) Ctrl-Z
475 What is the last step in data encapsulation? D.) Crtl-End
A.) User information is converted into data. Ans B
B.) Segments are converted into datagrams and packets. 483 Identify the command to display the IP host table?
C.) Frames are put into bits. A.) show ip hostnames
D.) Data is converted into segments. B.) show ip names
E.) Packets are put into logical frame. C.) show hosts
Ans C D.) show ip hosts
The Five steps to data encapsulation (IN ORDER): Ans C
1) User information is converted into data. 484 Identify the command to display the configured IP
2) Data is converted into segments. routing protocols?
3) Segments are converted into datagrams and packets. A.) show protocols
4) Packets are put into logical frame. B.) show protocols all
5) Frames are put into bits C.) show routing-protocols
476 Which switching technology can reduce the size of a D.) show ip protocols
broadcast domain? ?
A.) Cut-Through 485 Identify the command to configure ALL the default VTY
B.) Store-and-Forward ports?
C.) Spanning Tree Protocol A.) Router(config)# line vty 0 4
D.) RARP B.) Router# line vty 0 4
E.) ARP C.) Router(config)# line vty
F.) VLAN D.) Router(config)# line vty 0
Ans F Ans A
VLAN's are logical ways to break up a large broadcast domain. 486 Identify the command to reload the router?
To get from VLAN to VLAN you must have a router. A.) Router(config)# reload
477 Station A is transmitting data to station B faster that B.) Router# reset
station B can handle it. C.) Router# reload
When station B's buffer fills up, it send out a message to D.) Router> reload
station A to stop Ans C
sending data. After B empties out its buffer, station B 487 Identify command that configures 'Cisco1' as a secret
sends a message to station password?
A to start sending data again. A.) Router(config)# enable secret password Cisco1
This is most directly an example of (pick the best answer B.) Router(config)# enable secret cisco1
only): C.) Router(config)# enable password Cisco1
A.) Poison Reverse D.) Router(config)# enable secret Cisco1
B.) Connectionless protocol Ans C
C.) Windowing 488 Identify the statement which connects access-list 101
D.) Connection oriented protocol inbound to interface
- 40 -
e0? A.) show enable cdp
A.) Router(config-if)# ip access-group 101 in B.) show cdp enabled
B.) Router(config-if)# ip access-group 101 C.) show cdp run
C.) Router(config)# ip access-group 101 e0 in D.) show cdp
D.) Router(config)# ip access-group 101 e0 in Ans D
Ans A 501 Which 2 commands shows the Cisco IOS filename?
489 Identify the command that displays ethernet0/1 A.) show IOS
interface status? B.) show ver
A.) show interface ethernet0/1 C.) show flash
B.) show interface ethernet e0/1 D.) show mem
C.) show interface ethernet0.1 E.) show NVRAM
D.) show ethernet0/1 Ans B C
Ans C 502 Identify the command to copy a configuration file from
490 Identify the command that saves the configuration a TFTP server to a
stored in RAM to routers active configuration?
NVRAM? A.) Router# copy running-config tftp
A.) copy running-config startup-config B.) Router# copy tftp running-config
B.) copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config
C.) copy startup running D.) Router(config)# copy tftp running-config
D.) copy active to backup Ans D
Ans A 503 Identify the command mode necessary to enter the
491 Identify the command that displays the SAP table? extended ping command?
A.) show ipx servers A.) Router#
B.) display SAP table B.) Router>
C.) display SAP's C.) Router(config)#
D.) show sap table D.) Router(ext-ping)#
Ans A Ans A
492 Identify the command to configure the IP address 504 Identify the command to configure the router for IGRP
172.16.100.5 autonomous system
255.255.255.0? 100?
A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 A.) Router(config)# router igrp 100
B.) Router(config)# ip address 172.16.100.5 B.) Router> router igrp 100
C.) Router# ip address 172.16.100.5 255.255.255.0 C.) Router# router igrp 100
D.) Router(config)# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# router igrp
Ans A Ans A
493 Identify the command to configure the router to boot 505 Identify the command that forces the router to load
from an IOS located on into ROM mode upon a
a TFTP server? reload?
A.) boot system tftp IOS.exe 172.16.5.1 A.) boot system rom
B.) boot system tftp 172.16.5.1 IOS.exe B.) rom boot
C.) boot system flash tftp 172.16.5.1 C.) boot system flash rom
D.) boot system IOS.exe 172.16.5.1 D.) boot router rom
Ans B Ans A
494 Identify the command to display the hardware 506 Identify the command that specifies Serial 0 in slot 1?
platform information? A.) Router(config)# interface serial1/1
A.) show all B.) Router(config)# interface serial1/0
B.) show platform C.) Router(config)# interface serial0.1
C.) display hardware D.) Router(config)# interface serial0/1
D.) show version Ans B
Ans D 507 Identify the command to configure the configuration-
495 Identify the command to display the Frame Relay map register?
table? A.) Router# config-register 0x2102
A.) Router# display frame-relay map B.) Router(config)# config-register 0x2102
B.) Router# show frame-relay map C.) Router(config-reg)# 0x2102
C.) Router(setup)# show frame-relay map D.) Router> config-register 0x2102
D.) Router# show map frame-relay Ans B
Ans B 508 Identify the command to disable CDP on an interface?
496 Given the command 'cl?', what will it display? A.) Router(config-if)# no cdp enable
A.) Syntax of the 'clock' command B.) Router(config-if)# no cdp run
B.) Syntax of the 'clear' command C.) Router# no cdp enable
C.) All commands that begin with 'cl' D.) Router(config-if)# no cdp
D.) All commands that begin with 'c' Ans A
Ans C 509 Identify the command that will display the RIP routes
497 Identify the 2 commands that copies the configuration entering and leaving
in NVRAM to RAM? the router?
A.) copy backup-config running-config A.) Router(config)# debug ip rip
B.) configure nvram B.) Route# debug ip rip
C.) copy startup-config running-config C.) Router>debug ip rip
D.) configure memory D.) Router# debug rip routes
Ans C D Ans B
498 Identify the 2 commands the saves the running-config 510Identify the prompt displayed if in privileged exec
to NVRAM? mode?
A.) write memory A.) Router(config)#
B.) copy running-config startup-config B.) Router#
C.) write network C.) Router>
D.) write backup D.) Router(priv)#
Ans B A Ans B
499 Identify the command that displays traffic statistics on 511 'Show cdp neighbors detail' show the following 3
serial0/1? pieces of information?
A.) display interface serial0/1 A.) Hardware platform
B.) show interface serial0/1 B.) Software version
C.) show seria0/1 stats C.) Same as 'show version' command
D.) show interface serial0/1 stats D.) Up to 1 address for each protocol
Ans B E.) Non-direct connected routers
500Identify the command to determine if CDP is enabled? Ans A B D
- 41 -
512 Identify the command mode necessary to enter the 524 Identify the command to view the configuration-
standard ping command? register value?
A.) Router(config)# A.) show register
B.) Router> B.) display config-register
C.) Router(std-ping)# C.) show config
D.) Router(config-if)# D.) show version
Ans B Ans D
513 Identify the command to run 'setup'? 525 Identify the 2 commands that save the running-config
A.) Router(config)#setup to a TFTP server?
B.) Router?setup A.) write running tftp
C.) Router#setup B.) copy running network
D.) Router>setup C.) copy running tftp
Ans C D.) write network
514 Identify the command that configures serial0 for PPP Ans C D
encapsulation? 526 Identify the mode reflected by the following prompt
A.) Router(config)# encapsulation ppp 'Router<boot>'?
B.) Router(config-if)# encapsulation serial ppp A.) Setup
C.) Router(config-if)# encapsulation ppp B.) RXBoot
D.) Router# encapsulation ppp C.) Boot mode
Ans C D.) Privileged exec mode
515 Identify the command to display the status of the Ans B
Frame Relay virtual 527 How do you disable CDP on the entire Router?
circuit? A.) Router#no cdp run
A.) Router# show frame-relay virtual-circuit B.) Router(config-if)# no cdp enable
B.) Router(config)# show frame-relay pvc C.) Router(config)# no cdp enable
C.) Router# show frame-relay pvc D.) Router(config)# no cdp run
D.) Router# show virtual Ans D
Ans C 528 What command can be used to test IPX connectivity?
516 Identify the command that disables name-to-address A.) Ping 2e.000.0045.8923
translation? B.) Ping 192.168.100.1
A.) Router(config-dns)# no ip domain-lookup C.) Ping ipx 2e.0000.0045.8923
B.) Router(config)# no address translation D.) Ipx ping 2e.0000.0045.8923
C.) Router(config)# no ip domain-lookup Ans D
D.) Router(config)# ip domain-lookup 529 Identify the 2 commands that display the clock rate
Ans C configured on the serial0
517 What command will not display the status of to1? interface?
A.) show int to1 A.) show serial0
B.) show to1 B.) show interface serial0
C.) show interface to1 C.) Show clock rate serial 0
D.) show interface D.) show controllers serial 0
Ans B E.) show running-config
518 Identify the 2 commands to copy a configuration from Ans B D
a TFTP server to 530 What is the command to copy the IOS image to a TFTP
RAM? server?
A.) configure network A.) copy flash tftp
B.) configure overwrite B.) copy running-config tftp
C.) copy backup-config running-config C.) copy ios tftp
D.) copy tftp running-config D.) copy startup-config tftp
Ans A D Ans A
519 Identify the following command to configure a secret 531 Identify the command that configures the bandwidth
password to 'cisco'? to 56K?
A.) Router(config)#enable password cisco secret A.) Router(config-if)# bandwidth 56000
B.) Router(config)#enable secret cisco B.) Router(config-if)# bandwidth 56k
C.) Router(config)#enable secret password cisco C.) Router(config)# bandwidth 56
D.) Router(config)#set secret = cisco D.) Router(config-if)# bandwidth 56
Ans B Ans D
520Identify the effect of Ctrl-Z? 532 Identify the command to configure DLCI 100 on an
A.) Exits back to privileged exec mode interface e0?
B.) Disconnect from the router A.) Router(config)# frame-relay local-dlci 100
C.) Abort the ping operation B.) Router(config)# frame-relay local-dlci 100 int e0
D.) Exits privileged exec mode C.) Router(config-if)# frame-relay local-dlci 100
Ans A D.) Router(config-if)# frame-relay local-dlci 100 int e0
521 Given an IPX network with redundant paths, what Ans C
command will configure 533 Identify the command to configure the router to boot
load balancing? from an alternate IOS
A.) ipx load-balance located in flash?
B.) ip maximum-paths 2 A.) boot system flash IOS.exe
C.) ipx maximum-paths 2 B.) boot system tftp IOS.exe 172.16.5.1
D.) ipx load-share C.) boot system alternate IOS.exe
Ans C D.) boot system rom IOS.exe
522 Identify the correct IGRP configuration? Ans A
A.) Router# router igrp 100 534 Identify the command to configure a description on an
Router# network 10.0.0.0 interface?
B.) Router(config)# router igrp 100 A.) Router> description Finance department
Router(config-router)# network 10.0.0.0 B.) Router(config)# description Finance department
C.) Router(config)# router igrp C.) Router(config-if)# description Finance department
Router(config-router)# network 10.0.0.0 D.) Router# description Finance department
Ans B Ans C
523 Identify the components in the following command 535 Identify the 2 commands that will display the status
'interface serial0/1/1' and information about
A.) Serial interface, port number 0, slot 1, port adapter 1 interface E0 only?
B.) Serial interface, slot 1, port number 1, port adapter 0 A.) show interface ethernet E0
C.) Serial interface, slot 0, port adapter 1, port number 1 B.) show interface E0
Ans C C.) show E0
D.) show int E0
- 42 -
E.) show interface 547 Identify the true statements about the following
Ans B D access list:
536 In order to configure a Frame Relay subinterface with Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23
IP identify the 2 Access-list 101 permit ip any any
commands that must be configured on the physical A.) This access list prevents the host 192.10.172.0 from telneting
interface? B.) This access list prevents any telnet traffic from subnet
A.) Router(config-if)# encapsulation frame-relay 192.10.172.0/24
B.) Router(config-if)# no ip address C.) This access list filters some telnet access
C.) Router(config-if)#encapsulation subinterface frame-relay D.) This access list denies any telnet traffic to subnet
D.) Router(config)# subinterface s0 encapsulation frame-relay 192.10.172.0/24
Ans A B E.) This access list is invalid
537 Identify the command to determine if an IP access-list F.) The netmask on the this access list is reversed
is grouped on Ans B C
interface e0? 548 Given the IPX address 4a.0002.1111.a999, what is the
A.) Router(config)# show ip interface e0 network ID and what
B.) Router> show ip interface e0 is the node ID?
C.) Router# show interface e0 A.) net 4a host 0002.1111.a999
D.) Router# show ip interface e0 B.) net a999 node 0002.1111
Ans C C.) net 0002.1111.a999 node 4a
538 Identify the keystroke to position the cursor to the D.) net 0002.1111 node a999
beginning of a command Ans A
line? 549 What command do you use to disable domain lookup?
A.) Ctrl-A A.) no domain-lookup
B.) Ctrl-Ins B.) domain no-lookup
C.) Ctrl-B C.) lookup no-domain
D.) Ctrl-Z D.) no ip domain-lookup
Ans A Ans D
539 Identify the following components of the IPX address 550 Which of the following are valid Cisco encapsulation
2e.0000.0065.ed43 type names?
A.) Not a valid IPX address A.) arpa = IPX Ethernet
B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 B.) novell-ether = IPX Ethernet_802.3
C.) Network = 2e.0000, Node = 0065.ed43 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring
D.) Network = 2e, Node = 0000.0065.ed43 D.) novell-fddi = IPX Fddi_Raw
Ans D E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring
540 What is the syntax to add a banner to the Cisco router? F.) hdlc = HDLC on serial interfaces
A.) motd banner # Ans B C E F
B.) banner 551 Which of the following is an invalid host address using
C.) banner motd # a netmask of
D.) banner # 255.255.255.192?
Ans C A.) 10.1.1.1
541 What is the command to allow you to type Tokyo B.) 10.1.1.66
instead of the IP address C.) 10.1.1.130
172.16.30.1 to access a router named Tokyo? D.) 10.1.1.127
A.) config t, ip host Tokyo 172.16.30.1 Ans D
B.) config t, ip hostname Tokyo 172.16.30.1 552 Which of the following will apply IPX sap access list
C.) config t, hostname Tokyo 172.16.30.1 1010 for incoming
D.) config t, ip hostname 172.16.30.1 Tokyo traffic, assume you are at the interface configuration?
Ans A A.) ipx input-sap-filter 1010 in
542 How do you disable advanced editing? B.) ipx input-sap-filter 1010
A.) terminal editing C.) ipx access-group 1010 in
B.) terminal no editing D.) ipx access-list 1010 in
C.) disable editing Ans C
D.) no terminal editing 553 What command can you type to view the connections
Ans B after telneting into
543 Which of the following will show an extended access multiple routers simultaneously?
list 150? A.) sh users
A.) sh access-list 150 B.) sh ports
B.) sh ip int C.) sh host
C.) sh ip access-list D.) sh sessions
D.) sh access-list 150 extended Ans D
Ans A C 554Which of the following is a valid extended IP access-
544 You have a Class B network address divided into 30 list?
subnets. You will add 25 A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any
new subnets within the next year. You need 600 host IDs eq 21 log
for each subnet. Which B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21
subnet mask should you use? log
A.) 255.254.0.0 C.) router(config)# access-list 101 permit any any 172.16.30.0
B.) 255.192.0.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any
C.) 255.255.252.0 eq 21 log
D.) 255.255.248 0 Ans A
Ans C 555 What is the command to manually enter a static route?
545What is the syntax to use to configure the port on a A.) IP route <default gateway> <subnet mask> network
Catalyst 5000 switch? B.) IP route <destination network> <default gateway>
A.) slot port/type C.) IP route < destination network> <subnet mask> <default
B.) type slot/port gateway>
C.) port slot/type D.) IP route <destination network> <subnet mask> <source
D.) port type/slot network>
546 What 3 sources can configuration commands be placed Ans C
into RAM? 556 What key do you use to view the last command?
A.) HP Openview A.) Ctrl+X
B.) Console B.) Ctrl+Z
C.) Vterminal C.) Ctrl+E
D.) TFTP server D.) Ctrl+P
E.) NVRAM Ans D
Ans B D E 557 What 2 commands verify end to end communications?
- 43 -
A.) Trace Ans C
B.) debug ip session 568. Identify command that configures 'Cisco1' as a secret
C.) Ping password?
D.) Route A.) Router(config)# enable secret password Cisco1
Ans A C B.) Router(config)# enable secret cisco1
558 Your Ethernet interface currently has the IP address of C.) Router(config)# enable password Cisco1
1.1.1.1/24. You D.) Router(config)# enable secret Cisco1
would like it to have a second IP address of 2.2.2.2/24. Ans D
Which command will do 569. Identify the statement which connects access-list 101
that? inbound to interface
A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 e0?
B.) ip address 2.2.2.2 255.255.255.0 secondary A.) Router(config-if)# ip access-group 101 in
C.) ip address 2.2.2.2 255.255.255.0 B.) Router(config-if)# ip access-group 101
D.) This cannot be done, you can only have 1 IP address per C.) Router(config)# ip access-group 101 e0 in
physical interface. D.) Router(config)# ip access-group 101 e0 in
E.) ip address 2.2.2.2 /24 Ans A
Ans B 570. Identify the command that displays ethernet0/1
559 Which command listed below sets the banner message interface status?
when someone A.) show interface ethernet0/1
connects to the router? B.) show interface ethernet e0/1
A.) message # C.) show interface ethernet0.1
B.) banner # D.) show ethernet0/1
C.) login banner # Ans A
D.) description # 571. Based upon the exhibit, create a static route to
E.) login description # 172.16.10.0 on Router A
F.) banner motd # A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2
Ans F B.) Router(config)# ip static route 172.16.10.0 255.255.255.0
560 What should be the first command to create an access- 10.1.0.2
list that prevents all C.) Router(config)# ip route 172.16.10.0 10.1.0.2
users on subnetwork 10.10.128.0, using subnet mask D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
255.255.192.0, from Ans D
being able to telnet anywhere? 572. Identify the command that saves the configuration
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet stored in RAM to
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet NVRAM?
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq A.) copy running-config startup-config
telnet B.) copy tftp running-config
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet C.) copy startup running
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet D.) copy active to backup
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet Ans A
Ans A 573. Identify the command that displays the SAP table?
561 Identify the command to display the IP routing table? A.) show ipx servers
A.) show route B.) display SAP table
B.) show ip route C.) display SAP's
C.) show ip table route D.) show sap table
D.) show ipx route Ans A
Ans B 574 Identify the command to configure the IP address
562 Identify the command to display all the valid 172.16.100.5
commands at the given mode? 255.255.255.0?
A.) Help all A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0
B.) Help B.) Router(config)# ip address 172.16.100.5
C.) All commands C.) Router# ip address 172.16.100.5 255.255.255.0
D.) ? D.) Router(config)# ip address 172.16.100.5 255.255.255.0
Ans D Ans A
563. Identify the keystroke used to terminate the setup 575. Identify the command to configure the router to boot
mode? from an IOS located
A.) Ctrl-K on a TFTP server?
B.) Crtl-C A.) boot system tftp IOS.exe 172.16.5.1
C.) Ctrl-Z B.) boot system tftp 172.16.5.1 IOS.exe
D.) Crtl-End C.) boot system flash tftp 172.16.5.1
Ans C D.) boot system IOS.exe 172.16.5.1
564 Identify the command to display the IP host table? Ans A
A.) show ip hostnames
B.) show ip names
C.) show hosts 576. Identify the command to display the hardware
D.) show ip hosts platform information?
Ans C A.) show all
565 Identify the command to display the configured IP B.) show platform
routing protocols? C.) display hardware
A.) show protocols D.) show version
B.) show protocols all Ans D
C.) show routing-protocols 577. Identify the command to display the Frame Relay map
D.) show ip protocols table?
Ans D A.) Router# display frame-relay map
566. Identify the command to configure ALL the default B.) Router# show frame-relay map
VTY ports? C.) Router(setup)# show frame-relay map
A.) Router(config)# line vty 0 4 D.) Router# show map frame-relay
B.) Router# line vty 0 4 Ans B
C.) Router(config)# line vty 578 Given the command 'cl?', what will it display?
D.) Router(config)# line vty 0 A.) Syntax of the 'clock' command
Ans A B.) Syntax of the 'clear' command
567. Identify the command to reload the router? C.) All commands that begin with 'cl'
A.) Router(config)# reload D.) All commands that begin with 'c'
B.) Router# reset Ans C
C.) Router# reload 579 Identify the 2 commands that copies the configuration
D.) Router> reload in NVRAM to RAM?
- 44 -
A.) copy backup-config running-config the router?
B.) configure nvram A.) Router(config)# debug ip rip
C.) copy startup-config running-config B.) Router# debug ip rip
D.) configure memory C.) Router>debug ip rip
Ans C D D.) Router# debug rip routes
580. Identify the 2 commands the saves the running-config Ans B
to NVRAM? 592 Identify the prompt displayed if in privileged exec
A.) write memory mode?
B.) copy running-config startup-config A.) Router(config)#
C.) write network B.) Router#
D.) write backup C.) Router>
Ans A B D.) Router(priv)#
581. Identify the command that displays traffic statistics Ans B
on serial0/1? 593. 'Show cdp neighbors detail' show the following 3
A.) display interface serial0/1 pieces of information?
B.) show interface serial0/1 A.) Hardware platform
C.) show seria0/1 stats B.) Software version
D.) show interface serial0/1 stats C.) Same as 'show version' command
Ans B D.) Up to 1 address for each protocol
582. Identify the command to determine if CDP is enabled? E.) Non-direct connected routers
A.) show enable cdp Ans A B C D
B.) show cdp enabled 5
C.) show cdp run 594 Identify the command mode necessary to enter the
D.) show cdp standard ping command?
Ans D A.) Router(config)#
583. Which 2 commands shows the Cisco IOS filename? B.) Router>
A.) show IOS C.) Router(std-ping)#
B.) show ver D.) Router(config-if)#
C.) show flash Ans B
D.) show mem 595 Identify the command to run 'setup'?
E.) show NVRAM A.) Router(config)#setup
Ans B C B.) Router?setup
584. Identify the command to copy a configuration file C.) Router#setup
from a TFTP server to a D.) Router>setup
routers active configuration? Ans C
A.) Router# copy running-config tftp 596. Identify the command that configures serial0 for PPP
B.) Router# copy tftp running-config encapsulation?
C.) Router# copy tftp 172.16.0.1 running-config A.) Router(config)# encapsulation ppp
D.) Router(config)# copy tftp running-config B.) Router(config-if)# encapsulation serial ppp
Ans B C.) Router(config-if)# encapsulation ppp
585. Identify the command mode necessary to enter the D.) Router# encapsulation ppp
extended ping Ans C
command? 597. Identify the command to display the status of the
A.) Router# Frame Relay virtual
B.) Router> circuit?
C.) Router(config)# A.) Router# show frame-relay virtual-circuit
D.) Router(ext-ping)# B.) Router(config)# show frame-relay pvc
Ans A C.) Router# show frame-relay pvc
586 Identify the command to configure the router for IGRP D.) Router# show virtual
autonomous system Ans C
100? 598 Identify the command that disables name-to-address
A.) Router(config)# router igrp 100 translation?
B.) Router> router igrp 100 A.) Router(config-dns)# no ip domain-lookup
C.) Router# router igrp 100 B.) Router(config)# no address translation
D.) Router(config)# router igrp C.) Router(config)# no ip domain-lookup
Ans A D.) Router(config)# ip domain-lookup
587 Identify the command that forces the router to load Ans C
into ROM mode upon a 599. What command will not display the status of to1?
reload? A.) show int to1
A.) boot system rom B.) show to1
B.) rom boot C.) show interface to1
C.) boot system flash rom D.) show interface
D.) boot router rom Ans B
Ans A 600. Identify the 2 commands to copy a configuration from
588. Identify the command that specifies Serial 0 in slot 1? a TFTP server to
A.) Router(config)# interface serial1/1 RAM?
B.) Router(config)# interface serial1/0 A.) configure network
C.) Router(config)# interface serial0.1 B.) configure overwrite
D.) Router(config)# interface serial0/1 C.) copy backup-config running-config
Ans B D.) copy tftp running-config
589. Identify the command to configure the configuration- Ans A D
register? 601. Identify the following command to configure a secret
A.) Router# config-register 0x2102 password to 'cisco'?
B.) Router(config)# config-register 0x2102 A.) Router(config)#enable password cisco secret
C.) Router(config-reg)# 0x2102 B.) Router(config)#enable secret cisco
D.) Router> config-register 0x2102 C.) Router(config)#enable secret password cisco
Ans B? D.) Router(config)#set secret = cisco
590. Identify the command to disable CDP on an interface? Ans B
A.) Router(config-if)# no cdp enable 602. Identify the effect of Ctrl-Z?
B.) Router(config-if)# no cdp run A.) Exits back to privileged exec mode
C.) Router# no cdp enable B.) Disconnect from the router
D.) Router(config-if)# no cdp C.) Abort the ping operation
Ans A D.) Exits privileged exec mode
591 Identify the command that will display the RIP routes Ans A
entering and leaving
- 45 -
603. Given an IPX network with redundant paths, what 615. Identify the command to configure the router to boot
command will configure from an alternate IOS
load balancing? located in flash?
A.) ipx load-balance A.) boot system flash IOS.exe
B.) ip maximum-paths 2 B.) boot system tftp IOS.exe 172.16.5.1
C.) ipx maximum-paths 2 C.) boot system alternate IOS.exe
D.) ipx load-share D.) boot system rom IOS.exe
Ans C Ans A
604. Identify the correct IGRP configuration? 616 Identify the command to configure a description on an
A.) Router# router igrp 100 interface?
Router# network 10.0.0.0 A.) Router> description Finance department
B.) Router(config)#router igrp 100 B.) Router(config)# description Finance department
Router(config-router)#network 10.0.0.0 C.) Router(config-if)# description Finance department
C.) Router(config)# router igrp D.) Router# description Finance department
Router(config-router)# network 10.0.0.0 Ans C
Ans B 617. Identify the 2 commands that will display the status
605. Identify the components in the following command and information about
'interface serial0/1/1' interface E0 only?
A.) Serial interface, port number 0, slot 1, port adapter 1 A.) show interface ethernet E0
B.) Serial interface, slot 1, port number 1, port adapter 0 B.) show interface E0
C.) Serial interface, slot 0, port adapter 1, port number 1 C.) show E0
Ans C D.) show int E0
606. Identify the command to view the configuration- E.) show interface
register value? Ans B D
A.) show register 618. In order to configure a Frame Relay subinterface with
B.) display config-register IP identify the 2
C.) show config commands that must be configured on the physcial
D.) show version interface?
Ans D A.) Router(config-if)# encapsulation frame-relay
607. Identify the 2 commands that save the running-config B.) Router(config-if)# no ip address
to a TFTP server? C.) Router(config-if)#encapsulation subinterface frame-relay
A.) write running tftp D.) Router(config)# subinterface s0 encapsulation frame-relay
B.) copy running network Ans A B
C.) copy running tftp 619 Identify the command to determine if an IP access-list
D.) write network is grouped on
Ans C D interface e0?
608. Identify the mode reflected by the following prompt A.) Router(config)# show ip interface e0
'Router<boot>'? B.) Router> show ip interface e0
A.) Setup C.) Router# show interface e0
B.) RXBoot D.) Router# show ip interface e0
C.) Boot mode Ans D
D.) Privileged exec mode 620 Identify the keystroke to position the cursor to the
Ans B beginning of a command
609. How do you disable CDP on the entire Router? line?
A.) Router#no cdp run A.) Ctrl-A
B.) Rotuer(config-if)# no cdp enable B.) Ctrl-Ins
C.) Router(config)# no cdp enable C.) Ctrl-B
D.) Router(config)# no cdp run D.) Ctrl-Z
Ans D Ans A
610. What command can be used to test IPX connectivity? 621. Identify the following components of the IPX address
A.) Ping 2e.000.0045.8923 2e.0000.0065.ed43
B.) Ping 192.168.100.1 A.) Not a valid IPX address
C.) Ping ipx 2e.0000.0045.8923 B.) Network = 2e, Subnet = 0000, Node = 0065.ed43
D.) Ipx ping 2e.0000.0045.8923 C.) Network = 2e.0000, Node = 0065.ed43
Ans D D.) Network = 2e, Node = 0000.0065.ed43
611. Identify the 2 commands that display the clock rate Ans D
configured on the 622. What is the syntax to add a banner to the Cisco
serial0 interface? router?
A.) show serial0 A.) motd banner #
B.) show interface serial0 B.) banner
C.) show clock rate serial 0 C.) banner motd #
D.) show controllers serial 0 D.) banner #
E.) show running-config Ans C
Ans B E 623. What is the command to allow you to type Tokyo
612. What is the command to copy the IOS image to a TFTP instead of the IP address
server? 172.16.30.1 to access a router named Tokyo?
A.) copy flash tftp A.) config t, ip host Tokyo 172.16.30.1
B.) copy running-config tftp B.) config t, ip hostname Tokyo 172.16.30.1
C.) copy ios tftp C.) config t, hostname Tokyo 172.16.30.1
D.) copy startup-config tftp D.) config t, ip hostname 172.16.30.1 Tokyo
Ans A Ans A
613 Identify the command that configures the bandwidth 624. How do you disable advanced editing?
to 56K? A.) terminal editing
A.) Router(config-if)# bandwidth 56000 B.) terminal no editing
B.) Router(config-if)# bandwidth 56k C.) disable editing
C.) Router(config)# bandwidth 56 D.) no terminal editing
D.) Router(config-if)# bandwidth 56 Ans B
Ans D 625. Which of the following will show an extended access
614 Identify the command to configure DLCI 100 on an list 150?
interface e0? A.) sh access-list
A.) Router(config)# frame-relay local-dlci 100 B.) sh ip int
B.) Router(config)# frame-relay local-dlci 100 int e0 C.) sh ip access-list 150
C.) Router(config-if)# frame-relay local-dlci 100 D.) sh access-list 150 extended
D.) Router(config-if)# frame-relay local-dlci 100 int e0 Ans A C B ( a bit)
Ans C
- 46 -
626. You have a Class B network address divided into 30 D.) sh sessions
subnets. You will add Ans D
25 new subnets within the next year. You need 600 host IDs 636. Which of the following is a valid extended IP access-
for each subnet. list?
Which subnet mask should you use? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any
A.) 255.254.0.0 eq 21 log
B.) 255.192.0.0 B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21
C.) 255.255.252.0 log
D.) 255.255.248 0 C.) router(config)# acess-list 101 permit any any 172.16.30.0
Ans C D.) router(config)# access-list 101 permit ip host 172.16.30.0 any
627. What is the syntax to use to configure the port on a eq 21 log
Catalyst 5000 switch? Ans A
A.) slot port/type 637. What is the command to manually enter a static
B.) type slot/port route?
C.) port slot/type A.) IP route <default gateway> <subnet mask> network
D.) port type/slot B.) IP route <destination network> <default gateway>
Ans A C.) IP route < destination network> <subnet mask> <default
628. What 3 sources can configuration commands be gateway>
placed into RAM? D.) IP route <destination network> <subnet mask> <source
A.) HP Openview network>
B.) Console Ans C
C.) Vterminal 638. What key do you use to view the last command?
D.) TFTP server A.) Ctrl+X
E.) NVRAM B.) Ctrl+Z
Ans B D E C.) Ctrl+E
D.) Ctrl+P
Ans D
629 Identify the true statements about the following 639. What 2 commands verify end to end communications?
access list: A.) Trace
Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 B.) debug ip session
Access-list 101 permit ip any any C.) Ping
A.) This access list prevents the host 192.10.172.0 from telneting D.) Route
B.) This access list prevents any telnet traffic from subnet Ans A C
192.10.172.0/24 640. Your Ethernet interface currently has the IP address of
C.) This access list filters some telnet access 1.1.1.1/24. You
D.) This access list denies any telnet traffic to subnet would like it to have a second IP address of 2.2.2.2/24.
192.10.172.0/24 Which command will do
E.) This access list is invalid that?
F.) The netmask on the this access list is reversed A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0
Ans B C B.) ip address 2.2.2.2 255.255.255.0 secondary
630. Given the IPX address 4a.0002.1111.a999, what is the C.) ip address 2.2.2.2 255.255.255.0
network ID and what D.) This cannot be done, you can only have 1 IP address per
is the node ID? physical
A.) net 4a host 0002.1111.a999 interface.
B.) net a999 node 0002.1111 E.) ip address 2.2.2.2 /24
C.) net 0002.1111.a999 node 4a Ans B
D.) net 0002.1111 node a999 641. Which command listed below sets the banner
Ans A message when someone
631 What command do you use to disable domain lookup? connects to the router?
A.) no domain-lookup A.) message #
B.) domain no-lookup B.) banner #
C.) lookup no-domain C.) login banner #
D.) no ip domain-lookup D.) description #
Ans D E.) login description #
632 Which of the following are valid Cisco encapsulation F.) banner motd #
type names? Ans
A.) arpa = IPX Ethernet 642. What should be the first command to create an
B.) novell-ether = IPX Ethernet_802.3 access-list that prevents all
C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring users on subnetwork 10.10.128.0, using subnet mask
D.) novell-fddi = IPX Fddi_Raw 255.255.192.0, from being
E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring able to telnet anywhere?
F.) hdlc = HDLC on serial interfaces A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet
Ans B C E F B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet
633 Which of the following is an invalid host address using C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq
a netmask of telnet
255.255.255.192? D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet
A.) 10.1.1.1 E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet
B.) 10.1.1.66 F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
C.) 10.1.1.130 Ans A
D.) 10.1.1.127 643. The Cisco Discovery Protocol (CDP) periodically sends
An D out a multicast
634. Which of the following will apply IPX sap access list packet (at layer 2). Which command will alter the default
1010 for incoming interval of 60 seconds?
traffic, assume you are at the interface configuration? A.) cdp hold 111
A.) ipx input-sap-filter 1010 in B.) cdp wait 111
B.) ipx input-sap-filter 1010 C.) cdp interval 111
C.) ipx access-group 1010 in D.) cdp 111
D.) ipx access-list 1010 in E.) cdp timer 111
Ans C Ans E
635. What command can you type to view the connections 644. Which command will start the process for a Cisco IOS
after telneting into file image upgrade?
multiple routers simultaneously? A.) download
A.) sh users B.) copy tftp flash
B.) sh ports C.) copy flash tftp
C.) sh host D.) download flash
- 47 -
E.) network 654. Which Standard IP Access list commands will deny
Ans only the source address
645. Which command allows a user to see previous 1.1.1.1?
commands? A.) access-list 9 deny host 1.1.1.1
A.) show command B.) access-list 9 deny 1.1.1.1 255.255.255.0
B.) CTRL-P C.) access-list 9 deny 1.1.1.1 0.0.0.0
C.) show history D.) access-list 9 deny 1.1.1.1 0.255.255.255
D.) CTRL-U E.) access-list 9 deny 1.1.1.1 255.255.255.255
E.) Up Arrow Ans A C
F.) SHIFT-CTRL-6 655. Assume that you are editing a line of text on a Cisco
Ans B E router. What
646. Which command will display the IPX routing table? key-stroke combination would take you to the beginning of
A.) show routes the line?
B.) show routes ipx A.) CTRL-B
C.) show routes protocol=ipx B.) CTRL-Z
D.) show ipx C.) CTRL-<space>
E.) show ipx route D.) CTRL-A
Ans E E.) CTRL-<up arrow>
647. What is the correct command line syntax for F.) CTRL-<right arrow>
configuring a port on a 7000 or Ans D
7500 series Cisco router with a VIP card? 656. Which global configuration command will tell the
A.) port router to load the IOS file
B.) port adapter/port 'IOS_filename' from FLASH memory at the next boot?
C.) You can't put a VIP card in a 7000 or 7500 router. A.) boot system flash
D.) slot/port-adapter/port B.) boot system flash IOS_filename
E.) slot/port C.) boot system IOS_filename flash
F.) slot D.) boot system tftp IOS_filename tftp_address
Ans D E.) config-register 0x0102 IOS_ filename
648. How do you view the routers current processor 657. Which command will display adjacent routers found by
utilization? the Cisco Discovery
A.) show version Protocol?
B.) show processes cpu A.) show all
C.) show running-config B.) show cdp entry
D.) show startup-config C.) show ip neighbors
E.) show cpu D.) show cdp neighbor detail
F.) show utilization E.) show cdp neighbor
Ans B F.) show neighbor
649. Which command will enable debugging for IPX RIP Ans B D E
updates? 658. Which command line option will determine what
A.) debug ipx traffic is interesting
B.) debug ipx rip enough to establish a dialup connection?
C.) debug ipx rip activity A.) dialer map
D.) debug rip B.) dialer string
E.) debug ipx packets C.) dialer in-band
Ans C D.) dialer-list
650. There is an emergency fall-back 'skeleton' IOS stored E.) dialer negotiation
in read only memory Ans D
on all Cisco routers. What command would make the router 659. Which command switches from User mode to
load the IOS from Privileged mode?
Read Only Memory? A.) login
A.) reload rom B.) privilege
B.) boot system rom C.) admin
C.) load ios bootflash D.) enable
D.) load ios rom E.) enter
E.) bootsystem skeleton F.) root
Ans B Ans D
651. Which command would configure Interface E0 with an 660. Extended IP access-lists (100-199) can be used to
IP address of control traffic. Which
12.23.4.5 using a Subnet mask of 255.255.255.0 ? command listed below will permit smtp mail to only host
3.4.5.6 ?
A.) ip address 12.23.4.5 255.255.255.0 A.) It is not possible for SMTP traffic
B.) ip address 12.23.4.5 /24 B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp
C.) ip address 12.23.4.5 mask 255.255.255.0 C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23
D.) ip address 12.23.4.5 mask ff:ff:ff:0 D.) access-list 102 permit tcp any any eq smtp
E.) that is an invalid mask for a class 'A' address E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
Ans A but B & D can be used if the router is configured through Ans B E
Router#(config)ip netmask-format (bitcount | decimal | 661. Which command-line keywords are valid for choosing
hexadecimal) Frame-Relay LMI
652. Which commands will restart the router? types?
A.) router#system exit A.) itu-t
B.) router >reload B.) dlci
C.) router#shutdown C.) ansi
D.) router#reload D.) rfc 1544
E.) router#(config)reload E.) cisco
F.) router#system restart F.) q933a
Ans B Ans C E F
653. How do you set the encapsulation type to PPP for an 662. Which command will copy the routers configuration
interface? from NVRAM to a
A.) encap ppp Network file server?
B.) ppp encapsulation A.) copy start tftp
C.) encapsulation ppp B.) copy start tftp server
D.) encapsulation ppp enable C.) copy tftp startup-config
E.) ppp enable encapsulation D.) copy running-config tftp
Ans A C E.) copy startup-config tftp
Ans A E
- 48 -
663. Which commands would assign and enable IPX on an E.) encapsulation frame-relay type=q933a
interface ? Ans A
A.) enable netware 672. Which command can verify Application Layer
B.) enable novell-ether connectivity between 2
C.) router#(config)ipx routing hosts?
D.) You must first enable IPX globally and then A.) ftp
assign the network number to the interface . B.) snmp
E.) enable ipx C.) telnet
F.) router#(config-if)ipx network 4a D.) ping
Ans C D F E.) traceroute
664. I want to configure a serial interface on a 7500 with a Ans C
VIP card. What 673. Scenario: You created 2 access-lists for controlling
global config command would give me access to a serial telnet about a year ago,
interface on a 7500? and bound one of them to Serial 0. You can't remember
A.) int 1/0/0 which access-list you
B.) int s 1/0/0 used. Which command lets you see all access-lists on Serial
C.) int s 1/1 0 for telnet?
D.) int s0.1 A.) show access-list
E.) int s1 B.) show ip int s0
Ans B C.) show access-list telnet
665. Which command will display Ethernet 0's IP address? D.) show telnet access-list
A.) display ip address e0 E.) show access-list s0
B.) show ip interface e0 F.) show int s0
C.) show address e0 Ans B
D.) sh ip address e0 674. Cisco routers can secure the enable password with a
E.) show all one-way hash
Ans B algorithm. What command would encrypt the enable
666. After the command -- router igrp 200 -- what password with the strong
command would enable IGRP encryption method?
on the router for interface E0, with an address of A.) enable encrypt john
157.89.4.4 and a mask of B.) password john
255.255.255.0 ? C.) enable secret john
A.) network 157.89.4.0 255.255.255.1 D.) enable password john
B.) network 157.89.0.0 E.) secret john
C.) router igrp * F.) enable password 5 john
D.) router igrp 157.89.0.1 Ans C
E.) router igrp int e1 675. Which command will display the encapsulation type
F.) router igrp 157.89.4.1 on interface serial 0?
Ans B A.) show interface s0
667. Which command do you use to set the Privileged B.) show all
mode password to C.) show int s0 encap
'clearwater'? D.) show encap s0
A.) set password=clearwater E.) show encap
B.) enable privilege password clearwater Ans A
C.) enable password clearwater 676. What command do you enter at the keyboard to begin
D.) enable login clearwater a user mode session?
E.) enable secret password clearwater A.) Type 'CTRL-P'
F.) ebable clearwater B.) Type 'login'
Ans C C.) Just press <ENTER>.
668. How would you set the clock rate to 64K, on interface D.) Type 'enable'
serial 0, from the E.) Press 'Shift + Ctrl + 6' at the same time.
interface configuration mode? Ans C
A.) clock rate 64000 677. You want to set the console password to ralph. What
B.) bandwidth 64 would be the first
C.) clock 64 command you need to execute from global configuration
D.) rate 64 mode?
E.) clock rate 64k A.) line console 0
F.) clock rate 64 B.) enable password ralph
Ans A C.) login password ralph
669. Given the following static route command, 'ip route D.) set password= ralph
3.3.3.0 255.255.255.0 E.) password ralph
4.4.4.4 125', which portion represents the administrative F.) login Ralph
distance? Ans A
A.) 3.3.3.0 678. Which command displays the IPX SAP table?
B.) 255.255.255.0 A.) show ipx sap
C.) 4.4.4.4 B.) show sap
D.) route C.) show ipx interface
E.) 125 D.) show ipx servers
Ans E E.) show ipx
670. What does the following line for an access list do? Ans D
'access-list 101 deny tcp 679. Which command will display the current time on a
3.4.5.0 0.0.0.255 any eq 23' Cisco router?
A.) deny all ftp traffic A.) show date
B.) deny all ftp traffic from subnet 3.4.5.0 B.) show clock
C.) deny all telnet traffic from subnet 3.4.5.0 C.) show running-configuration
D.) deny all ftp traffic to subnet 3.4.5.0 D.) show time
E.) deny all telnet traffic E.) show controllers
Ans C Ans B
671. Although Cisco IOS 11.2 and later can auto-detect the 680. The default routing protocol for IPX is IPX RIP. How do
LMI type in Frame you view the
Relay, which command will force the LMI type to q933a? routing updates sent and received by the router?
A.) frame-relay lmi-type q933a A.) debug ipx routing
B.) encapsulation frame-relay q933a B.) debug ipx routing activity
C.) don't need to, it is the default C.) debug rip
D.) encapsulation q933a D.) show ipx routing
- 49 -
E.) sh ipx more than 1 command that starts with 'C'. What message
F.) debug ipx rip would the router
Ans B return?
681. Using the access-list command, 'access-list 1 deny A.) Nothing would be returned, the command is simply ignored.
2.2.2.2', what else must be B.) unknown command
done to stop host 2.2.2.2 from sending any traffic out of C.) ambiguous command.
physical interface E0, D.) Copy to?
while still allowing other traffic? E.) Configured console from console.
A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 Ans C
255.255.255.255' 690. You want a message to be displayed every time
B.) On interface E0, Add a line - 'access-group 1 in' someone tries to log on to
C.) In global mode, Add a line - 'access-list 1 permit all' the router. Which command is required to accomplish this
D.) On interface E0, Add a line - 'access-list 1 in' task?
E.) On interface E0, Add a line - 'access-list 1 out' A.) motd#(message)#
F.) On interface E0, Add a line - 'ip access-group 1' B.) banner motd(message)
Ans F C.) banner motd#(message)#
682. Which command do you use to set the Secret D.) banner motd*(message)
password to 'roundwood'? E.) banner login#(message)#
A.) enable login roundwood 691. You create the following standard access-list
B.) enable password roundwood access-list 1 deny 1.1.1.1
C.) enable privilege roundwood access-list 1 deny 2.2.2.2
D.) enable secret= roundwood int e0
E.) enable secret login roundwood ip access-group 1 in
F.) enable secret roundwood Which of the following statements are true, with regard to
Ans F traffic flowing
683. How do you find the parameters that you can use with into E0?
the SHOW A.) This will stop IP packets with a source address of 1.1.1.1 only.
command? B.) This will stop all IP packets.
A.) ? show C.) This is an invalid configuration.
B.) show ? D.) This will stop no IP packets.
C.) debug show E.) This will stop IP packets with a source address of 2.2.2.2 only.
D.) help F.) This will stop IP packets with a source address of 1.1.1.1 and
E.) sh? 2.2.2.2.
AnsB Ans D
684. Which command would show all Ethernet interfaces 692. The command 'debug ip rip' will do which of the
with IPX configured following?
on them? A.) Show Neighbor Info.
A.) show interface ipx ethernet B.) Display RIP routing updates.
B.) show ipx interface C.) Show routing table changes.
C.) show ipx interface ethernet D.) Show all IP traffic.
D.) show ipx E.) This is not a valid router command.
E.) show version F.) Cause the router to respond with 'Ambiguous command'
F.) show run Ans B
AnsB F 693. You would like to have a notation that when a user
685. If you have configured IPX on a Serial interface, which issues the command
command would 'show interface serial 0', a line is displayed indicating that,
display the IPX network and node address on the Serial 1 'This is
interface? the connection to Company A.' What interface command
A.) show interface would accomplish this?
B.) show ipx s1 A.) banner motd #This is the connection to Company A.#
C.) show interface s1 B.) interface This is the connection to Company A.
D.) show ipx int serial 1 C.) This cannot be done for an individual interface.
E.) show ipx int brief D.) description This is the connection to Company A.
Ans D E.) banner This is the connection to Company A.
686. Which command line statement determines the F.) display This is the connection to Company A.
number of seconds a dialup Ans D
connection can wait without any traffic before the router 694. What command would show the version of the IOS
hangs up? that you are running?
A.) dialler max-time A.) show nvram
B.) dialler timeout B.) show version
C.) dialer idle-timeout C.) show startup-config
D.) dialer hang-up D.) show ios
E.) disconnect-timer E.) ver -a
687. The Cisco Catalyst 5000 switch supports full duplex. F.) show ram
How would you enable Ans B
it on the second port of the card in slot 1? 695. When editing a line in the CLI mode, what does 'CTRL-
A.) router(config-if)# duplex full A' do?
B.) router(config)# duplex full A.) Moves you to the previous command.
C.) router(config-if)# set port duplex B.) Moves you to the next word.
D.) router(config)#port duplex = full C.) Moves you to the end of the line.
E.) router(config-if)# set port 1/2 full D.) Moves you to the next command.
Ans A E.) Moves you to the beginning of the line.
688. Which command will enable CHAP authentication on a Ans E
serial interface that 696. When a router knows the IP address, but does not
is using PPP? know the MAC address
A.) encapsulation chap of
B.) ppp chap the device it wishes to contact, it uses the ARP (Address
C.) ppp enable chap resolution
D.) ppp encapsulation chap protocol) to determine the MAC address. After it learns the
E.) ppp authentication chap MAC address,
F.) ppp chap enable it stores this information in the ARP cache. What is the
Ans E command to view
689. From Enable mode, a user types the letter 'C' and the ARP cache?
presses enter. There is A.) sh mac
B.) show cache
- 50 -
C.) show arp 707. Which statement is true regarding the user exec and
D.) sh arp interfaces privileged exec mode?
E.) show ip cache A.) The '?' only works in Privileged exec
Ans C B.) Privileged exec is a subset of the user exec mode
697. Which command can verify only Network layer C.) They both require the enable password
connectivity between 2 D.) User exec is a subset of the privileged exec mode
hosts? Ans D
A.) ping 708. Which OSI layer defines end to end communication,
B.) e-mail segmentation and reassembly?
C.) plp A.) Network
D.) arp B.) Transport
E.) telnet C.) Physical
Ans A D.) Application
698. What would be the first command from global E.) Data-Link
configuration mode to enable F.) Presentation
RIP on your router for interface E0, with an address of Ans B
181.86.4.4 and 709. What IP command would you use to test the entire IP
mask of 255.255.255.0 ? stack?
A.) router rip A.) Stack-test
B.) network 181.89.4.0 255.255.255.0 B.) Arp
C.) router rip int e0 C.) Telnet
D.) router rip 181.86.0.0 D.) Ping
E.) router rip 181.86.4.0 E.) Trace
F.) network 181.86.0.0 Ans C
Ans A 710. Identify the 2 hardware components used to manage
699. Which command would you type to show SAP and RIP and/or configure a
updates you are router?
receiving on an interface? A.) Auxiliary port
A.) sh ipx servers B.) ROM port
B.) sh ipx traffic C.) Management port
C.) sh ipx interface D.) Console port
D.) sh ipx route Ans A D
Ans B 711. What is the default bandwidth of a serial connection?
700 What is the default IPX Ethernet encapsulation? A.) 1200 baud
A.) SNAP B.) 1.544 Mbps (T1)
B.) Arpa C.) 10 Mbps
C.) 802.2 D.) 96Kpbs
D.) Novell-Ether Ans B
E.) SAP 712. Identify 2 functions of IPX access-lists?
Ans D A.) Control SAP traffic
701. What must be true for two routers running IGRP to B.) Limit number of Novell servers on a network
communicate their C.) Limit number of workstations on a network
routes? D.) Block IPX traffic
A.) Same autonomous system number Ans A D
B.) Connected using Ethernet only 713. Identify 2 HDLC characteristics?
C.) Use composite metric A.) Default serial encapsulation
D.) Configured for PPP B.) Open standard
Ans A C.) Supports Stacker compression
702. The following is partial output from a routing table ; D.) Supports point-to-point and multipoint
'192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' Ans A D
Which routing protocol is being used? (assuming defaults 714. Identify 3 IP applications?
have not been A.) AURP
changed) B.) ARP
A.) OSPF C.) Telnet
B.) RIP D.) SMTP
C.) BGP E.) DNS
D.) IGRP F.) RARP
703. Identify 3 methods used to prevent routing loops? Ans C D E
A.) Split horizon 715. Identify 3 LAN technologies?
B.) Holddown timers A.) FDDI
C.) Poison reverse B.) HDLC
D.) SPF algorithm C.) HSSI
E.) LSP's D.) X.25
Ans A B C E.) 802.3
704. Which statement is true regarding full duplex? F.) 802.5
A.) Allows for transmission and receiving of data simultaneously Ans A E F
B.) Only works in a multipoint configuration 716. Identify the 4 that are WAN technologies?
C.) Does not affect the bandwidth A.) HDLC
D.) Allows for transmission and receiving of data but not at the B.) FDDI
same time C.) 802.5
Ans A D.) HSSI
705 Identify the switching method that receives the entire E.) SDLC
frame then F.) Frame Relay
dispatches it? Ans A D E F
A.) Cut-through 717. Which OSI layer supports the communication
B.) Receive and forward component of an application?
C.) Store and forward A.) Data-Link
D.) Fast forward B.) Physical
Ans C C.) Session
706. Identify the purpose of ICMP? D.) Presentation
A.) Avoiding routing loops E.) Application
B.) Send error and control messages F.) Transport
C.) Transporting routing updates Ans E
D.) Collision detection 718. Identify the length of an IPX address and it's
Ans B components?
- 51 -
A.) 80 bits, 48 bits network and 32 bits node Ans A
B.) 32 bits, 16 bits network and 16 bits node 730. Identify 3 features of IGRP?
C.) None of the above A.) Composite metric
D.) 80 bits, 32 bits network and 48 bits node B.) New horizon
Ans D C.) Flash (triggered) updates
719. Identify the administrative distance and appropriate D.) 60-second periodic updates
routing protocol? E.) Poison reverse
A.) RIP = 255, IGRP = 100 Ans A C E
B.) RIP = 100, IGRP = 120 731. Where is the backup configuration file stored?
C.) RIP = 1, IGRP = 0 A.) RAM
D.) RIP = 120, IGRP = 100 B.) ROM
Ans D C.) Console
720. Which OSI layer incorporates the MAC address and the D.) NVRAM
LLC? Ans D
A.) Data link 732. Identify the correct pair of Novell Ethernet
B.) Network encapsulation and Cisco
C.) Physcial terminology?
D.) Transport A.) Ethernet II, Snap
Ans A B.) Ethernet 802.3, Novell-Ether
721. If configuring a Cisco router to connect to a non-Cisco C.) Ethernet SNAP, Arpa
router across a D.) Ethernet 802.2, Snap
Frame Relay network, which encapsulation type would you Ans B
select? 733. Identify 3 characteristics regarding IP access-lists?
A.) Q933a A.) Can be configured as a standard access-list
B.) ISDN B.) Can be run from another router running IP
C.) IETF C.) Can be configured as a named access-list
D.) CISCO D.) Are the same as IPX access-lists
E.) ANSI E.) Can be configured as an extended access-list
Ans C Ans A C E
722. Identify the 2 characteristics that TCP and UDP share 734. Identify 3 ways in which a router can be configured?
in common? A.) TFTP
A.) Both use port numbers to identify upper level applications B.) Nvram
B.) Operate at the Network layer C.) ROM
C.) Both are Transport protocols D.) Console
D.) Both are reliable communications E.) Trace
Ans A C Ans A B D
723. Identify 3 characteristics of IP RIP? 735. A traffic light is an example of what type of
A.) Distance vector mechanism?
B.) Administrative distance is 120 A.) Collision detection
C.) Periodic updates every 60 seconds B.) Flow control
D.) Uses a composite metric C.) Sequence numbering
E.) Can load balance D.) Network management
Ans A B E Ans B
724. Which of the following is a layer 2 device? 736. Windowing is a type of :
A.) Switch A.) Negative acknowledgement
B.) Bridge B.) Address resolution
C.) Repeater C.) Layer transition mechanism
D.) Hub D.) Flow control
Ans A B Ans D
725. Identify the definition of demarcation? 737. Identify the 2 types of access-list filters that control
A.) Date in which the WAN service contract expires SAP traffic?
B.) Cabling which extends from the WAN service provider to the A.) Novell-ether
customer B.) Arpa
C.) Division of responsibility, where the CPE ends and the local loop C.) Input-sap-filter
begins D.) Round-robin
D.) Equipment which is located at the customer premises E.) Output-sap-filter
Ans C Ans C E
726. Identify the 3 key features of the Cisco Discovery 738. Identify the 3 guidelines for routers in the same
Protocol? autonomous system?
A.) Off by default A.) Must be configured for RIP
B.) Will allow for the discovery of layer 3 addresses on neighbor B.) Interconnected
routers C.) Assigned the same autonomous system number
C.) Verifies connectivity D.) Configured for the same routing protocol
D.) Open standard E.) Must be same model of router
E.) Does not require any layer 3 protocols to be configured Ans B C D
Ans B C E 739 Identify the hardware component used to store
727. Identify the 3 characteristics of IPX RIP? buffers, tables,
A.) Distance vector running-configuration etc?
B.) Does not support multiple paths A.) NVRAM
C.) 60 second updates B.) ROM
D.) Default encapsulation is SAP C.) RAM
E.) Uses ticks and hop count as a metric D.) Flash
Ans A C E Ans C
728. Identify the access-list range for an extended IP
access-list?
A.) 800 - 899 740. Identify 3 UDP characteristics?
B.) 1 - 99 A.) Reliable communication protocol
C.) 1000 - 1099 B.) Applications that use UDP must incorporate reliability
D.) 100 - 199 C.) Connnection-less oriented
Ans D D.) Incorporates no handshaking
729. Identify the X.25 addressing standard? Ans B C D
A.) X.121 741. Identify the IPX standard access-list number range?
B.) X.25a A.) 600 - 699
C.) ITU-1 B.) 1000 - 1099
D.) Q933a C.) 1 - 99
- 52 -
D.) 100 - 199 C.) SDLC
E.) 800 - 899 D.) Frame Relay
Ans E E.) PPP
742. Which OSI layer provides best effort end to end Ans B
packet delivery? 753. Identify the purpose of ARP?
A.) Data-Link A.) Avoiding routing loops
B.) Presentation B.) Determining a workstation's IP address
C.) Network C.) Sending a directed broadcast
D.) Transport D.) Determining a workstation's MAC address
E.) Physical Ans D
F.) Application 754. What is the purpose of the DLCI?
Ans C A.) Identifies the remote routers
743. Identify the 2 methods to modify the routers boot B.) Contained with a 802.2 frame for routing purposes
sequence? C.) Used with PPP during authentication
A.) Setup program D.) Identifies the PVC in a Frame Relay network
B.) Boot system commands Ans D
C.) RXBoot 755. Identify 3 characteristics of the Network layer (OSI
D.) Config-register layer 3)?
Ans B D A.) Connnection oriented
744. Identify the 3 pieces of hardware you would not install B.) Path determination
to prevent C.) Supports multiplexing
broadcasts? D.) Manages sessions
A.) Switch E.) Packet forwarding
B.) Repeater Ans B C E
C.) Bridge 756. Identify 3 characteristics of switches?
D.) Router A.) Increase available bandwidth
Ans A B C B.) Decrease broadcast traffic
745. Identify 2 features of PPP PAP authentication? C.) Support full duplex in a multipoint topology
A.) Username and password is sent in clear text D.) Make fowarding decision using MAC address
B.) Authentication messages are sent periodically during the E.) Create collision domains
connection Ans A D E
C.) More secure than CHAP 757. Which OSI layer handles physical addresses and
D.) Remote node is control of authentication process network topology?
Ans A D A.) Presentation
746. Identify the switching method that examines the B.) Physical
destination MAC address C.) Transport
as D.) Application
the frame is being received then begins forwarding the E.) Data-Link
frame prior to F.) Network
receiving the entire frame? Ans E
A.) Fragment-free 758 Identify 2 reasons for disabling CDP?
B.) Store and Forward A.) If the router is not configured for RIP
C.) Cut-through B.) Save bandwidth by eliminating overhead
D.) Fast forward C.) If the router is configured for Appletalk
Ans C D.) When connected to a non-Cisco router
747. Identify 1 characteristic of RARP? Ans B D
A.) MAC to IP address translation 759. Identify 3 characteristics of ISDN?
B.) Connectionless delivery of packets A.) Transports voice and data
C.) Can be used to initiate remote O/S load sequence B.) Transports voice only
D.) Generates error and control messages C.) Support both BRI and PRI
Ans A D.) Runs over existing phone lines
748. Identify the protocol to test connectivity without E.) Same as X.25
configuring any layer 3 Ans A C D
protocols? 760. Identify the 3 characteristics of IGRP?
A.) TCP A.) Uses hop count as a metric
B.) Ping B.) Supports multiple unequal paths
C.) IP C.) Administrative distance is 100
D.) CDP D.) Configured with an Automous system number
E.) Telnet E.) Link state
Ans D Ans B C D
749. LMI operates between the Frame Switch and what 761. Identify 2 features of PPP CHAP authentication?
other device? A.) Username and password is sent in clear text
A.) CPE device B.) Authentication messages are sent periodically during the
B.) Another Frame Switch connection
C.) X.25 switch C.) Less secure then PAP
D.) Novell File Server D.) Local router 'challenges' the remote router
Ans A Ans B D
750. Identify IPX SAP and it's purpose? 762. Identify the default IPX serial encapsulation?
A.) Sonet Access Pipe - interface to Sonet ring A.) Novell-Ether
B.) Service Advertising Protocol - advertise services B.) SDLC
C.) Server Appletalk Protocol - appletalk directory services C.) SNAP
D.) Service Access Point - identify upper layer protocols D.) HDLC
Ans B Ans A
751. Identify the default values that make up IGRP's 763. Identify the hardware component that stores the
composite metric? backup configuration?
A.) Bandwidth A.) RAM
B.) Load B.) NVRAM
C.) Reliability C.) Flash
D.) MTU D.) ROM
E.) Delay Ans B
Ans A E 764. Identify the named IP access-list number range?
752. Identify the default encapsulation on serial A.) 600 - 699
interfaces? B.) 1 - 99
A.) ISDN C.) 900 - 999
B.) HDLC D.) 200 - 299
- 53 -
E.) none of the above C.) Guaranteed Network Services - allocates resources to users
Ans E D.) Get Notes Server - locates Domino Server
765 Identify 3 Fast Ethernet technologies? Ans B
A.) 100 Base FastEther 777. Identify the true statement regarding subnetting?
B.) 100 Base FX A.) Allows for more host address
C.) 100 Base T4 B.) Borrow bits from the network portion of the address
D.) 100 Base TX C.) Allows for unlimited number of networks
Ans B C D D.) Borrow bits from the host portion of the address
766. Identify the OSI layer responsible for end-to-end Ans D
connections? 778. Inverse ARP serves what purpose?
A.) Network A.) Method for a local router to introduce itself to the remote end
B.) Transport of the
C.) Session connection
D.) Data link B.) Broadcast a routing table update
E.) TCP C.) Identify MAC addresses if the IP address is known
Ans B D.) Sent every 10 seconds used to verify the Frame Switch is still
767. Identify the 2 characteristics regarding MAC active
addresses? Ans A
A.) Contains a network portion and host portion 779 Identify 3 characteristics of a MAC address?
B.) Always assigned by System Administrator A.) Burned into the NIC
C.) 48 bits long B.) 48 bits long
D.) Contains a vendor code and serial number C.) Length is 32 bits
Ans C D D.) Used to identify a host device
768. Identify the number range for IPX SAP filters? E.) Contains a network portion and a host portion
A.) 900 - 999 Ans A B D
B.) 1000 - 1099 780. Identify 3 IP routing protocols?
C.) 800 -899 A.) RIP
D.) 100 - 199 B.) AURP
Ans B C.) OSPF
769. What is the purpose of ARP? D.) IGRP
A.) IP to host name resolution E.) ARP
B.) Host name to IP address resolution F.) ICMP
C.) Mac to IP address resolution Ans A C D
D.) IP to Mac address resolution 781. Identify the type of routing protocol that exchanges
Ans D entire routing tables
770. Which OSI layer establishes, maintains and terminates at regular intervals?
sessions between A.) Link state
applications? B.) Interior gateway protocols
A.) Application C.) Appletalk routing
B.) Physical D.) Distance vector
C.) Data-Link Ans D
D.) Presentation 782. Identify the type of hardware required to connect a
E.) Network Token ring network to
F.) Session an Ethernet network?
Ans F A.) Repeater
771. Which statement is true regarding Administrative B.) TR-Enet
distance? C.) Router
A.) It is a metric D.) Token Ring to Ethernet translation hub
B.) Number of hops between two routers Ans C
C.) Trustworthiness of the routing information 783 Identify 3 characteristics regarding CDP?
D.) RIP Administrative distance is 100 A.) On by default
Ans C B.) Shows only directly connected neighbors
772. Identify the purpose of the Ping command? C.) Requires IP or IPX
A.) Share routing information with a neighbor router D.) 60 second update interval by default
B.) Transmit user data when buffers are full E.) 30 second updates interval by default
C.) Test connectivity at layer 3 Ans A B D
D.) Test entire protocol stack 784. Identify 2 transport layer protocols?
Ans C A.) IP
773. Identify the order of the 5 step encapsulation? B.) TCP
1. Create the segment C.) CDP
2. Convert the frame to bits D.) ARP
3. Create the packet E.) UDP
4. Create the frame Ans B E
5. User creates the data 785. Identify 2 features of X.25?
A.) 1,2,4,2,5 A.) Supports only IP
B.) 2,1,3,4,5 B.) Utilizes switched and permanent virtual circuits
C.) 5,1,3,4,2 C.) Contains minimal flow control and error recovery
D.) 5,3,4,1,2 D.) Utilizes LAPB as it's data-link protocol
Ans C Ans
774. The Cisco IOS is stored in: 786. Identify the purpose of the Trace command?
A.) ROM A.) Explorer packet transmitting routing information
B.) CD B.) Test connectivity
C.) Flash C.) Determine the path a packet is taking through the network
D.) NVRAM D.) Transmits user data when buffers are full
Ans C Ans C
775. Sequence and acknowledgement numbers are used 787. Identify the purpose of the TCP 3 step handshake?
for? A.) Setup a un-reliable connection
A.) Layer transitioning B.) Initialize routing tables
B.) Flow control C.) Synchronize sequence numbers between hosts
C.) Port number addressing D.) Connection tear down process
D.) Reliability Ans C
Ans D 788. Identify 2 PPP characteristics?
776. Identify IPX GNS and it's purpose? A.) Is proprietary to Cisco
A.) Go Network Server - sends a print job to a network server B.) Supports authentication
B.) Get Nearest Server - locate the nearest server C.) Support compression
- 54 -
D.) Run on a multi-access network 255.255.255.0 10.1.0.1'
Ans B C A.) Enabling a dynamic routing protocol
789 Which statements are true regarding half duplex? B.) Creating a static route to the 10.1.0.0 network
A.) Only works in a point-to-point configuration C.) Teaches the router about the distant network 192.168.100.0
B.) Allows for transmitting and receiving but not at the same time and how it
C.) Allow for transmitting and receiving of data simultaneously can be reached via 10.1.0.1
D.) Doubles the bandwidth D.) Assigining the IP address 192.168.100.0 to an interface
Ans A C D Ans C
790. Identify the purpose of the wildcard mask? 800. Based upon the 1st octet rule identify the range for a
A.) Match a certain portion of the IP address while ignoring the rest Class A address?
of A.) 1 - 126
the address B.) 192 - 223
B.) Determine the class of the IP address C.) 128 - 191
C.) Determine the network portion of an IP address D.) 1 - 191
D.) Hide the host portion of an IP address Ans A
Ans A 801. What does a Standard IP Access-list use as test
criteria?
A.) IP source address
791. Identify the OSI layer associated with bits? B.) IP source and destination address, protocol numbers and port
A.) Physical numbers
B.) Network C.) IPX source and destination address
C.) Binary D.) Source MAC address
D.) Data link Ans A
Ans A 802. What is the function of the Transport layer and which
792. Identify the type of routing protocol that maintains a protocols reside
topological there?
database of the network? A.) MAC addressing - IP
A.) Topological state B.) Interhost communication - SQL, NFS
B.) Shortest Path First C.) Best effort Packet delivery - TCP, UDP
C.) Link state D.) End-to-end connections - TCP, UDP
D.) Distance vector Ans D
Ans C 803. Identify the 3 Internet layer IP protocols?
793. Identify the 3 major functions at layer 3 of the OSI A.) NetBios
model? B.) IPX
A.) Forwarding process C.) ARP
B.) Logical addressing D.) IP
C.) End-to-end connnections E.) RARP
D.) Path selection Ans C D E
E.) MAC address examination 804. IPX routing updates occur how often?
F.) Network monitoring A.) Every 30 seconds
Ans A B D B.) Every 60 seconds
794. Identify the 2 rules used when configuring a Distance C.) Only as needed
Vector routing D.) When the remote router asks for an update
protocol? Ans B
A.) Physically connected network(s) 805. Identify 3 methods not used to prevent routing loops?
B.) Configure the classfull address, no subnets A.) Holddown timers
C.) Enable CDP so neighbors can be detected B.) Sequence numbers
D.) Same autonomous network C.) Triggered updates
Ans A D D.) Split horizon
795. Identify 3 characteristics of an IP address? E.) Area hierarchies
A.) Contains a network portion and a host portion F.) Order of router startup
B.) 32 bits long Ans B E F
C.) Unique to each network 806. Identify the hardware component that stores the
D.) Part of the default Cisco configuration bootstrap program?
E.) Referred to as the hardware address A.) ROM
Ans A B C B.) NVRAM
796. Identify 3 feature of access-lists? C.) Booter load
A.) Implicit deny will deny any packets not matched D.) RAM
B.) Processed sequentially from bottom to top E.) Flash
C.) Processed sequentially from top to bottom Ans A
D.) If a packet is denied it would be tested against the remaining 807. Which OSI layer provides mechanical, electrical &
statements in the access-list procedural
E.) Once a match is made the packet is either denied or permitted specifications for activating, maintaining physical link?
F.) Enabled on all interfaces by default A.) Presentation
Ans A C E B.) Network
797. Which OSI layer performs code conversion, code C.) Application
formatting and D.) Physical
encryption? E.) Transport
A.) Physical F.) Data-Link
B.) Data-Link Ans D
C.) Application 808 Identify 2 characteristics of PPP?
D.) Transport A.) Uses LLC to establish the link
E.) Presentation B.) Default serial encapsulation
F.) Network C.) Support multiple layer 3 protocols
Ans E D.) Offers two types of authentication; PAP and CHAP
798 Identify the 3 methods routers learn paths to Ans C D
destinations? 809. Identify 3 characteristics of a connection oriented
A.) Dynamic routing protocol?
B.) None of the above, configured by default A.) Path determination
C.) Default routes B.) Flow control
D.) Administrative distance C.) Acknowledgements
E.) Static routes D.) Uses hop count as metric
Ans A C E E.) 3 way handshake
799 Identify the purpose of the following command 'ip Ans B D E
route 192.168.100.0 810 What is the maximum hop count for IP RIP?
- 55 -
A.) Infinity A.) When you want automatic updates of the routing tables
B.) 16 B.) All the time
C.) 15 C.) When you have very few routes and want to conserve
D.) 1 bandwidth
Ans C D.) When you have a gateway of last resort
811 What is Cisco's default encapsulation method on serial Ans C
interfaces? 821. What does the acronym ARP stand for?
A.) ANSI A.) Address Resolution Phase
B.) Cisco B.) ARP Resolution Protocol
C.) Q933a C.) Address Resolution Protocol
D.) HDLC D.) Address Recall Protocol
Ans D Ans C
812. Which of the following is a characteristic of a switch, 822. What is the default encapsulation of Netware 3.12?
but not of a A.) Ethernet_II
router? B.) 802.5
A.) Switches forward packets based on the IPX or IP address in the C.) 802.2
frame D.) 802.3
B.) Switches forward packets based on the IP address in the frame Ans C
C.) Switches forward packets based on the MAC address in the 823. Regarding frame relay, which of the following
frame statements are true?
D.) Switches forward packets based only on the IP address in the A.) You must use ANSI encapsulation if connecting to non-Cisco
packet equipment
Ans C B.) You must use IETF encapsulation if connecing to non-Cisco
813. Ping uses which Internet layer protocol? equipment
A.) RARP C.) You must use Q.933a encapsulation if connecing to non-Cisco
B.) ICMP equipment
C.) ARP D.) You must use Cisco encapsulation if connecting to non-Cisco
D.) FTP equipment
Ans B Ans B
814. Which is true regarding store-and-forward switching 824 What is required to support full-duplex Ethernet?
method? A.) Multiple paths between multiple stations on a link
A.) Latency varies depending on frame-length B.) Automatic sensing operation by all connected stations
B.) Latency is constant C.) Loopback and collision detection disabled
C.) It is default for all Cisco switches D.) Full-duplex NIC cards
D.) It only reads the destination hardware address before Ans C D
forwarding the frame 825. Which layer is responsible for determining if sufficient
Ans A resources for the
815. Which three of the following are true statements intended communication exists?
about connection-oriented A.) Application
sessions? B.) Network
A.) The segments delivered are acknowledged back to the sender C.) Session
upon their reception D.) Presentation
B.) Any segments not acknowledged are retransmitted by the E.) Transport
receiver Ans A
C.) A manageable data flow is maintained in order to avoid 826. What are the 2 functions of the Data Link Mac layer?
congestion, A.) Handles access to shared media
overloading and loss of any data B.) Manages protocol access to the physical network medium
D.) Segments are sequenced back into their proper order upon C.) Provides SAPs for higher level protocols
arrival at D.) Allows multiple devices to uniquely identify one another on the
their destination data
Ans A C D link layer
816 What does a metric of 16 hops represent when using Ans A B D
RIP? 827. Describe End to End network services: (Choose all that
A.) Number of hops to the destination apply)
B.) Destination unreachable A.) Best Route selection
C.) Number of routers B.) Accomplished Segment by Segment, each segment is
D.) Bandwidth autonomous
Ans B C.) Flow Control & Data Integrity
817. You need to come up with a TCP/IP addressing scheme D.) Best efforts packet delivery
for your company. Ans B C
Which two factors must you consider when you define the 828. Which of the following provide correct information
subnet mask for about a protocol at the
the network? transport layer of the OSI model?
A.) The location of DHCP servers A.) UDP - Provides Connectionless datagrams service
B.) The volume of traffic on each subnet B.) TCP - Provides Connection Oriented Services
C.) The number of subnets on the network C.) SMTP - Provides Mail Exchange
D.) The location of the default gateway D.) IP - Route determination
E.) The number of host IDs on each subnet E.) TCP - Provides Flow Control and Error Checking
Ans C E F.) FTP - Transfers of Files
818. What is the difference between TCP and UDP? Ans A E
A.) TCP is connection-oriented; UDP uses acknowledgements only 829. Which protocol works at the Internet layer and is
B.) TCP is connection-oriented; UDP is connectionless responsible for making
C.) Both TCP and UDP are connection-oriented, but only TCP uses routing decisions?
windowing A.) UDP
D.) TCP and UDP both have sequencing, but UDP is connectionless B.) IP
Ans B D C.) TCP
819. What does the 'S' mean when looking at the routing D.) ARP
table? Ans B
A.) Statically connected 830. Which layer is responsible for providing mechanisms
B.) Directly connected for multiplexing
C.) Dynamically attached upper-layer application, session establishment, and tear
D.) Shutdown route down of virtual
Ans A circuits?
820. Why would you use static routing instead of dynamic A.) Session
routing? B.) Network
- 56 -
C.) Physical Ans A C D
D.) Transport 841. What is the routing metric used by RIP?
E.) Application A.) Route poisoning
F.) Presentation B.) Split horizon
Ans D C.) Hop Count
831. Which of the following are logged when IP access list D.) TTL
logging is enabled? Ans C
A.) source address 842. What is the default encapsulation and frame type on
B.) protocol an Ethernet interface
C.) source port when enabling Novell?
D.) destination address A.) SNAP
E.) access list number B.) Ethernet_II
F.) destination port C.) 802.2
Ans A B C D F D.) 802.3
832. What's the default CDP holdtime in seconds for Cisco E.) SAP
routers? F.) Novell-ether
A.) 30 seconds Ans D F
B.) 180 seconds 843. What is true when creating static route?
C.) 90 seconds A.) The mask parameter is optional
D.) 60 seconds B.) The administrative distance is required
Ans B C.) The gateway parameter is required
833. Which two of the following protocols are used at the D.) The administrative distance is optional
Transport layer? Ans C D
A.) ARP 844 Of the following switching types, which one has the
B.) UDP highest latency?
C.) ICMP A.) Cut-through
D.) RARP B.) None
E.) TCP C.) Store-and-forward
F.) BootP D.) Fragment Free
Ans B E Ans C
834. LAN stands for which of the following? 845. What does the IPX maximum-path command do?
A.) Local Area Network A.) Allows you to disable the TTL on an IPX packet
B.) Local Arena Network B.) This parameter is only used in NLSP routing
C.) Local Area News C.) Sets the maximum metric that can appear in the routing table
D.) Logical Area Network D.) Configures round robin load sharing over multiple equal metric
Ans A paths
835. Choose three reasons why the networking industry (parallel paths)
uses a layered model: Ans D
A.) It facilitates systematic troubleshooting 846. What does -1 mean in an extended IPX access-list?
B.) It allows changes in one layer to occur without changing other A.) Any IP address
layers B.) Deny all
C.) It allows changes to occur in all layers when changing one C.) Deny host
protocol D.) Any host or any network
D.) It clarifies how to do it rather than what general function to be Ans D
done 847 What parameter is used with statically assigned
E.) It clarifies what general function is to be done rather than how routers to tell packets
to do which interface to use to reach a distant network?
it A.) Mask
Ans A B D B.) Subnet
836 A ISDN PRI circuit can be described as which of the C.) Default gateway
following? D.) Interface
A.) 24 B channels and 1-64Kbps D channel Ans C
B.) 23 B channels and 1-64Kbps D channel 848. Which of the following protocols are used to get an IP
C.) 2-D channels and 1-C channel address from a
D.) 2-64Kbps B channels and 1-16Kbps D channel known MAC address?
Ans B A.) BootP
837. What are 3 ways to provide login access to router? B.) TCP
A.) Console C.) IP
B.) TFTP D.) ARP
C.) Rlogin E.) RARP
D.) Auxiliary Port F.) ICMP
E.) X Windows Ans A E
F.) Telnet 849. What does the Spanning Tree Algorithm (STA) do?
Ans A D F A.) Restore lost frames
838 Which of the following statements are true? B.) Builds routing tables for routing through an internetwork
A.) Store and forward switching creates variable latency through C.) Forward packets through a switch
the switch D.) STA is implemented by STP to prevent loops
B.) Cut through switching creates variables latency through the Ans D
switch 850. IP extended access lists use which of the following as
C.) Cut through switching works at wire speed a basis for
D.) Store and forward switching works at wire speed permitting or denying packets?
Ans A C A.) destination address
839 Which of the following can reply to a Novell Get B.) all of the above
Nearest Server (GNS) C.) protocol
request? D.) source address
A.) Local Novell server E.) port
B.) Remote Novell Printer Ans B
C.) Cisco router 851. What is the extended IPX access list range?
D.) Novell client A.) 901-1000
Ans A C B.) 100-199
840. Identify the 3 kinds of routes IGRP advertises? C.) 900-999
A.) Interior D.) 1000-1000
B.) Dynamic Ans C
C.) System 852. CPE is an acronym for which of the following?
D.) Exterior A.) Customer Premise Equipment
- 57 -
B.) Central Processing Engineering 873 Which layer is responsible for routing through an
C.) Customer Process Equipment internetwork?
D.) Central Processing Equipment A.) Physical
Ans A B.) Session
853. How often does IP RIP send out routing table updates C.) Network
by default? D.) Transport
A.) They send complete updates every 30 seconds E.) Application
B.) They send partial updates every 30 seconds F.) Data Link
C.) They send complete updates every 60 seconds Ans C
D.) They send partial updates every 60 seconds
Ans A 874. What three occurrences will reset the holddown timer
854 Which ISDN protocol prefix specifies switching and after a triggered
signalling? update?
A.) I A.) Infinity is finally defined as some max number
B.) E B.) HD Timer expires
C.) Q C.) Another update is received indicating a better metric
D.) S D.) The router receives a processing task proportional to the
Ans Q number of
855. CSMA/CD stand for which of the following? links in the internetwork
A.) Carrier Sense, Multiple Access with Collision Detection E.) The router detects fault LSP's propagating through the
B.) Collision Sense, Multiple Access with Collision Detection internetwork
C.) Collision Sense, Multiple Access with Carrier Detection F.) Another update is received indicating net status changed
D.) Carrier Sense, MAC address with Collision Detection Ans A B C
Ans B 875. Which layer is responsible for putting 1s and 0s into a
856. Which of the following are Distance Vector protocols? logical group?
A.) IGRP A.) Session
B.) RIP B.) Application
C.) OSFP C.) Transport
D.) EIGRP D.) Data Link
Ans A B E.) Physical
857. UDP works at which layer of the DOD model? F.) Network
A.) Internet Ans E
B.) Host-to-Host 876. How many LMI types are available on Cisco routers?
C.) Transport A.) Four
D.) Data Link B.) Two
Ans B C.) Five
858. Of the following switching types, which one has the D.) Three
lowest latency? Ans D
A.) Cut-through 877. Which layer is responsible for framing?
B.) Fragment Free A.) Application
C.) None B.) Data Link
D.) Store-and-forward C.) Physical
Ans A D.) Network
859. What is an administrative distance of 0 mean? E.) Transport
A.) 0 means unbelievable Ans B
B.) 0 is for EIGRP 878. What ISDN protocol specifies concepts, terminology,
C.) 0 is the default distance for directly connected networks and services?
D.) 0 means unreachable A.) Q
Ans C B.) S
860. Which of the following describe full-duplex C.) I
transmission? D.) E
A.) Uses a single wire Ans C
B.) Data transmission in both directions, but only one way at a 879. What is the purpose of Split Horizon?
time A.) It prevents the regular update messages from reinstating a
C.) Uses a point-to-point connection from the transmitter of the route that
transmitting station to the receiver of the receiving station has gone down
D.) Data transmission in only one direction B.) Information received on an interface cannot be sent back out
Ans C the same
860 Which of the following is a connectionless protocol at interface
the Transport layer? C.) Informs all neighbor routers that two routes exist
A.) UDP D.) Tells the router the destination is unreachable
B.) ARP Ans B
C.) ICMP 880. WAN stands for which of the following?
D.) RARP A.) Wide Arena Network
E.) IP B.) World Area Network
F.) FTP C.) Wide Area News
Ans A D.) Wide Area Network
870. What is the default routing metric used by IGRP? Ans D
A.) MTU, delay, bandwidth, reliability, and loading 881. Which of the following provide connection-oriented
B.) Count to infinity transport to upper
C.) Bandwidth and delay layer protocols?
D.) Hop count A.) SPX
Ans C (MTU, reliability, and loading are optional) B.) RIP
871 What does 'P' mean when running a Trace? C.) NLSP
A.) Good route D.) NCP
B.) Protocol unreachable Ans A
C.) Source Quench 882. Which two does 100BaseT use?
D.) Destination unreachable A.) CSMA/CD
Ans B B.) IEEE 802.5
872. What is the Network Layer of the OSI responsible for? C.) 802.3u
A.) Bridging D.) Switching with 53-byte cells
B.) Routing packets through an internetwork Ans A
C.) Regenerating the digital signal 883. Which layer is responsible for flow control,
D.) Gateway services acknowledgement, and
Ans B windowing?
- 58 -
A.) Transport 4) Information that users enter is converted into data
B.) Network 5) The segments are changed to packets to be routed
C.) Application A.) 4, 1, 3, 2, 5
D.) Session B.) 4, 5, 1, 3, 2
E.) Physical C.) 2, 3, 1, 4, 5
F.) Data Link D.) 4, 1, 5, 3, 2
Ans A Ans D
884. Which of the following is used to manage and monitor 894 Which port numbers are used by TCP and UDP to set
the network? up sessions with other
A.) SNMP hosts?
B.) HTTP A.) 1024 and above
C.) IP B.) 6 and 17 respectively
D.) FTP C.) 1-25
Ans A D.) 6-17
885 What is true about Link-State protocols? Ans A
A.) They maintain a more complex table than distant vector 895 Repeaters work at which layer of the OSI model?
protocols A.) Network
B.) They maintain a less complex table than distant vector B.) Session
protocols C.) Transport
C.) They use routing ports D.) Physical
D.) The maintain backup copies of the IOS Ans D
Ans A 896. What protocols can you use while testing Trace?
886. The maximum distance on a 10BaseT network from A.) DECnet
the hub to a B.) CLNS
workstation is C.) IP
which of the following? D.) Old Vines
A.) 500 meters E.) Vines
B.) 1000 meters F.) Chaos
C.) 100 meters Ans B C D E
D.) 1500 meters
Ans C
887 Which of the following use PVCs at layer 2?
A.) X.25 897. What utility can you use to see the path a packet
B.) HDLC takes through an
C.) Frame relay internetwork?
D.) ISDN A.) Route
Ans C B.) SNMP
888. What is the routing algorithm used by RIP and IGRP? C.) Trace
A.) OSPF D.) Ping
B.) Link-state Ans C
C.) Dynamic 898 What is true about frame-relay DLCI?
D.) Distance Vector A.) DLCI represents a single physical circuit
Ans D B.) DLCI is optional in all frame-relay networks
889. Which layer is responsible for negotiating data C.) DLCI identifies a logical connection between DTE devices
transfer syntax? D.) DLCI is used to tag the beginning of a frame with VLAN
A.) Network information
B.) Session Ans C
C.) Application 899 Which frame has a Type field to identify the upper-
D.) Transport layer protocol?
E.) Presentation A.) 802.3
Ans E B.) 802.2
890 What are hold-downs used for? C.) 802.5
A.) To prevent regular update messages from reinstating a route D.) Ethernet_II
that has Ans A
come back up 900. Which protocol will let neighbor routers know if your
B.) Information received on an interface cannot be sent back out internetwork
the same experienced congestion on a serial port?
interface A.) BootP
C.) To prevent regular update messages from reinstating a route B.) IP
that has C.) ICMP
gone down D.) ARP
D.) To hold the routing table from being sent to another router E.) FTP
Ans C F.) RARP
891 Which of the following protocols are used for logical Ans C
network addressing? 901. What do you use the Aux port for?
A.) IP A.) Console
B.) TCP B.) Terminal editing
C.) ARP C.) Modem
D.) ICMP D.) Backup logging
E.) RARP Ans C
F.) BootP 902. The CSMA/CD Ethernet IEEE committee is defined as
Ans A which of the
892 Which can be logged by IPX extended access lists? following?
A.) source address A.) 802.2
B.) protocol B.) 802.3
C.) source socket C.) 802.4
D.) access list number D.) 802.5
E.) destination socket Ans B
F.) destination address 903 How many Frame-relay encapsulation types are
Ans A B S D E F available with Cisco
893. Put the following steps of encapsulation into the routers?
correct order: A.) Four
1) The data is broken into segments to be organized B.) Two
2) Frames are converted to 1s and 0s to be put on the wire C.) Five
3) Packets are converted into frames D.) Three
- 59 -
Ans B D.) Determining the next hop
904. What is the maximum hop count for Link-State Ans D
protocols? 915. Which layer hides details of network dependent
A.) 15 information from the
B.) there is no hop count limit higher
C.) 256 layers by providing transparent data transfer?
D.) 16 A.) Transport
Ans B B.) Physical
905. What information can you get from CDP info: (choose C.) Data Link
all that apply) D.) Session
A.) Hardware platform E.) Application
B.) One address per protocol F.) Network
C.) Software platform Ans
D.) Hostname 916 What information is provided by the local management
E.) The same info as show version interface (LMI)?
F.) Incoming/outgoing port A.) LMI encapsulation type
Ans A B C D F B.) The current DLCI values
906 How does the cut-through switching technique work? C.) The status of virtual circuits
A.) By using broadcast address as source addresses D.) The global or local significance of the DLCI values
B.) The switch waits only for the header to be received before it Ans A B C
checks 917 Which layer defines the physical topology?
the destination address and starts forwarding the packets A.) Application
C.) The LAN switch copies the entire frame into its onboard buffers B.) Transport
and C.) Network
then looks up the destination address in its forwarding, or D.) Data Link
switching, E.) Physical
table and determines the outgoing interface F.) Session
D.) By using a Class I repeater in a collision domain Ans E
Ans B 918 What key do you use to view the last command?
907. What is the protocol number for TCP? A.) Left Arrow
A.) 80 B.) Ctrl-P
B.) 21 C.) Up Arrow
C.) 11 D.) Right Arrow
D.) 6 Ans B C
Ans D 919. Which of the following do not belong to the customer?
908. Which of the following are Presentation Layer A.) CO
standards? B.) DCE
A.) JPEG and PICT C.) Router
B.) MPEG and MIDI D.) CPE
C.) ASCII and EBCDIC E.) Demarc
D.) NFS and SQL F.) DTE
Ans A B C Ans A E
909. What is the administrative distance for RIP? 920 What is the IEEE specification for Spanning Tree
A.) 100 Protocol?
B.) 90 A.) 802.9
C.) 120 B.) 803.ud
D.) 110 C.) 803
Ans C D.) 802.1d
910 IP standard access lists use which of the following as a Ans D
basis for 921. CO is an acronym for which of the following?
permitting or denying packets? A.) Central Office
A.) destination address B.) Capital Office
B.) port C.) Central Operator
C.) protocol D.) Company Office
D.) source address Ans A
Ans D 922 What is convergence time?
911 If a frame is received at a switch and only the A.) The update time
destination hardware B.) The time it takes to reload a router
address is read before the frame is forwarded, what type C.) The time it takes for a packet to reach its destination
of switching D.) The time is takes for all routers update their tables after a
method is this? change
A.) Store-and-drop takes place
B.) Latency Ans D
C.) Store-and-forward 923. Which of the following are Session Layer standards?
D.) Cut-through A.) ASCII and EBCDIC
Ans D B.) MPEG and MIDI
912. What is the purpose and default value of the CDP C.) RPC and SQL
timer command? D.) JPEG and PICT
A.) 90 seconds; interval before an entry expires Ans C
B.) 60 seconds; interval between updates 924 What is the IP extended access list range?
C.) 60 seconds; interval before an entry expires A.) 1000-1099
D.) 90 seconds; interval between updates B.) 100-199
Ans B C.) 1-99
913. Choose the following that are benefits to segmenting D.) 101-200
with router: Ans B
A.) Flow Control 925 Define Poison Reverse?
B.) Manageability A.) To prevent regular update messages from reinstating a route
C.) Multiple Active Paths that has
D.) Explicit packet lifetime control gone down
Ans B C B.) Packets sent out that are not destined for a network go to the
914. When discussing static routes, what is the gateway default
parameter used for? network
A.) Determining the dynamic route C.) Information received on an interface cannot be sent back out
B.) Defining the subnet the same
C.) Defining the Administrative Distance interface
- 60 -
D.) When a network goes down, that network is advertised with an C.) IP
infinite metric D.) ICMP
Ans D Ans D
926. What is the default interval for SAP updates? 936 What are the 2 functions of the Data Link Mac layer?
A.) 60 seconds A.) Handles access to shared media
B.) 15 seconds B.) Manages protocol access to the physical network medium
C.) 30 seconds C.) Provides SAPs for higher level protocols
D.) 120 seconds D.) Allows multiple devices to uniquely identify one another on the
Ans A data
927. What does a router do with a packet that it does not link layer
have a destination Ans A B D
network for? 937. Which layer is responsible for coordinating
A.) Sends it to the Serial port communication between
B.) Drops the packet systems?
C.) Sends it back out the same interface it received it in A.) Application
D.) Forwards the packet to the next hop B.) Network
Ans B C.) Session
928 What type of frame does CDP use to gather D.) Transport
information about it's E.) Physical
neighbors? F.) Data Link
A.) TCP/IP Ans C
B.) Novell-ether 938. What is the default CDP broadcast update rate for
C.) Subnetwork Access Protocol (SNAP) Cisco routers?
D.) Ethernet_II A.) 120 seconds
Ans C B.) 60 seconds
929 Which protocol is used for booting diskless C.) 30 seconds
workstations? D.) 90 seconds
A.) IP Ans B
B.) ARP 939. You need to come up with a TCP/IP addressing scheme
C.) RARP for your company.
D.) TCP How
E.) SNMP many network IDs must you allow for when you define the
Ans C subnet mask for
930. Which layer is responsible for synchronizing sending the network?
and receiving A.) One for each WAN link
applications? B.) One for each router interface
A.) Presentation C.) One for each NIC installed in each client
B.) Session D.) One for each subnet with hosts
C.) Transport E.) One for each host ID
D.) Application Ans A D
E.) Network 940. What is the protocol number for UDP?
Ans B A.) 6
931 Which protocol gets a hardware address from a known B.) 17
IP address? C.) 25
A.) RARP D.) 21
B.) TCP Ans B
C.) IP 941 What is the default LMI type?
D.) BootP A.) Cisco
E.) ARP B.) ANSI
F.) ICMP C.) IETF
Ans E D.) Q933a
932. Which layer defines bit synchronization? Ans A
A.) Application 942. You have two Cisco routers setup back-to-back in a lab
B.) Network using DTE/DCE
C.) Transport cables. To which router would you add the clockrate
D.) Physical command?
E.) Session A.) The serial port on the DCE router
F.) Session B.) The Ethernet port on the DTE router
Ans D C.) The Ethernet port on the DCE router
933. Which is true regarding half duplex Ethernet D.) The serial port on the DTE router
operation? Ans A
A.) Half Duplex ethernet technology provides a transmit circuit 943 How does a switch use store and forward?
connection A.) By using a Class I repeater in a collision domain
wired directly to the receiver circuit at the other end B.) The LAN switch copies the entire frame into its onboard buffers
B.) Half duplex transmission between stations is achieved by using and
point then looks up the destination address in its forwarding, or
to multipoint Ethernet and Fast Ethernet switching,
C.) With Half Duplex transmission logically circuits feed into a table and determines the outgoing interface
single C.) By using broadcast addresses as source addresses
cable creating a situation similar to a one way bridge D.) The switch waits only for the header to be received before it
D.) Half Duplex transmission between stations is achieved using checks
Point to the destination address and starts forwarding the packets
Point Ethernet & Fast Ethernet Ans D
Ans C 944. Which of the following are valid WAN terms?
934 When would you use ISDN? A.) DTE
A.) To connect LANs using POTS B.) DCE
B.) To support applications requiring voice, data, and video C.) Demarc
C.) When you need a consistent and very high rate of data speed D.) CPE
D.) To connect to IBM mainframes Ans ABCD
Ans B
935. Which protocol will send a message to routers if a
network outage or
congestion occurs?
A.) ARP 945. Which two describe frame tagging?
B.) TCP A.) Examines particular info about each frame
- 61 -
B.) A unique ID placed in the header of each frame as it traverses D.) Store-and-forward
the Ans D
switch fabric 957. The benefits to segmenting with Bridges are which of
C.) A user- assigned ID defined to each frame the following?
D.) The building of filter tables A.) Scalability
Ans B C B.) Datagram filtering
946. An ISDN BRI circuit can be described as which of the C.) Manageability
following? D.) Reliability
A.) 3B channels Ans B C
B.) 2-64Kbps B channels and 1-16Kbps D channel 958. What is the administrative distance for IGRP?
C.) none of the above A.) 90
D.) 2-64Kbps B channels and 1-16Kbps C channel B.) 120
Ans B C.) 110
947 The two sublayers of the IEEE Data Link Layer are D.) 100
which of the following? Ans D
A.) Link and Logical Control 959. On an ISDN BRI interface, the control channel is the
B.) Data Link and LLC 'D' channel. What is
C.) Logical Link Control and Media Access Control the rate of this channel?
D.) Data Link and MAC A.) 64 Kbps
Ans C B.) 1.544 Mbps
948. The -- terminal no editing -- command will perform C.) 128 Kbps
what function? D.) 2.048 Mbps
A.) Edit the contents of NVRAM E.) 16 Kbps
B.) Allows access to the terminal port Ans E
C.) Stops the advanced editing feature 960 MIDI and MPEG are examples of what layer of the OSI
D.) Enable password functions seven layer model?
Ans C A.) Session
949. Which two of the following are valid ways to have B.) Network
multiple encapsulation C.) Datalink
types on a single interface? D.) Transport
A.) This is not possible E.) Application
B.) subinterfaces F.) Presentation
C.) additional physical interfaces Ans F
D.) secondary addresses 961 Which ISDN specification series deals with Concepts
Ans B D and Terminology?
950. Which 3 statements describe default encapsulation A.) C- Series
and LMI type B.) I- Series
configuration? C.) Q-Series
A.) There are only 4 encapsulations and 3 LMI type options D.) 911-Series
B.) The LMI type config term options E.) J-Series
C.) In release 11.2 the LMI type is autosensed F.) F-Series
D.) The default LMI is Cisco AnsB
E.) IETF encapsulation must be configured unless the connecting 962. Which of the following is an example of the Physical
routers are both Layer?
Cisco A.) SQL
Ans B C E B.) IP
951. Which can be true regarding VLANs? C.) LLC
A.) They are created by location D.) DDP
B.) They are created by function E.) Ethernet
C.) They are created by department Ans E
D.) They are created by group 963 In regards to the ISDN BRI standard, which channel is
Ans B C D used for control?
952. What is true when using DDR? A.) B
A.) HDLC is the preferred encapsulation B.) D
B.) You must use static routing C.) E
C.) You should use dynamic routing D.) I
D.) You should use ISDN E.) Q
Ans B Ans B
953. If you are running Token Ring with Novell IPX routing, 964. Which protocol resolves an IP address to a MAC
which address?
encapsulation A.) DHCP
should you use? B.) RARP
A.) SAP C.) ARP
B.) SNAP D.) NBP
C.) 802.5 E.) DNS
D.) 802.2 Ans C
Ans B 965. Which of the following is an example of the Network
954 What are the 3 ways routers learn paths to destination Layer?
networks? A.) TCP
A.) Dynamic B.) IP
B.) Static C.) SQL
C.) Routing tables D.) Token Ring
D.) Default E.) LLC
Ans A B D Ans B
955. Bridges work at what layer of the OSI model? 966 The Internet Control Message Protocol occurs at what
A.) Data Link layer of the seven
B.) Network layer model?
C.) Physical A.) Physical
D.) Application B.) Transport
Ans A C.) Session
956 What is the default switching method for the Cisco D.) Datalink
5000 series? E.) Presentation
A.) Cut-through F.) Network
B.) Store-and-splice Ans F
C.) Latency
- 62 -
967. Which of the following are examples of the Session B.) TA
Layer? C.) LE
A.) IP D.) TE2
B.) Netbios Names E.) ET
C.) NFS Ans D
D.) Token Ring 976. Which Distance Vector characteristic can help to
E.) SQL speed up convergence?
F.) RPC A.) Triggered Updates.
Ans B C E F B.) Split Horizon.
968 What is the regional Telco office called, where the C.) Poison Reverse.
customers local loop D.) Hold Down timers.
terminates? E.) Inverse ARP.
A.) Demarc Ans A
B.) DTE 977. Which type of switching is considered to be 'wire
C.) DCE speed?'
D.) CO A.) Cut-Through
E.) CPE B.) Multiplexed
Ans A C.) Inverted
D.) Layer 4
E.) Store and Forward
F.) Layer 3
978. The Datalink layer works with which of the following:
969. What is the default LMI type for Cisco Routers that are A.) Packets
using Frame- B.) Bits
Relay? C.) Globules
A.) Annex D D.) Frames
B.) Q933A E.) Segments
C.) Cisco Ans D
D.) IETF 979. What is a characteristic of Store and Forward
E.) ARPA switches?
F.) Anex A A.) They forward the frame before it is completely read.
Ans C B.) They work at wire speed.
970. Most routing protocols recognize that it is never C.) They are the same a Cut-Through switching.
useful to send D.) They read the entire frame and check CRC before forwarding.
information about a route back out the direction from E.) They decrease latency.
which the original Ans D
packet came. This is an example of which routing 980. Station A is transmitting data to station B, and
technology? expects an acknowledgment
A.) Split Horizon after every 400 bytes. After transmitting data for a while,
B.) LMI the two
C.) Triggered Updates stations determine the line is reliable and change to
D.) Poison Reverse expecting and
E.) SYN, ACK acknowledgement every 600 bytes.
F.) DLCI This is an example of (pick the best answer only):
Ans A A.) BECN
971. Which layer of the 7 layer model is responsible for B.) Sliding Windows
representing the C.) Poison Reverse
application information between 2 different OS's? For D.) Countdown timers
example, converting E.) Split Horizon
ASCII to EBCIDIC. F.) Count to infinity
A.) Transport Ans B
B.) Application 981. Which device listed below provides clocking for the
C.) Physical line?
D.) Session A.) DCE
E.) Presentation B.) CPE
F.) Network C.) CO
Ans E D.) DTE
972. Which type of switching reads in the entire frame E.) Demarc
before forwarding it? Ans C
A.) Pause-and -forward 982 Which OSI Reference Layer controls application to
B.) Store-and-Forward application
C.) Inverse ARP communication?
D.) Fast Forward A.) Datalink
E.) Cut-Through B.) Network
F.) Routing C.) Transport
Ans B D.) Session
973. Which OSI Reference Layer is concerned with path E.) Physical
determination? Ans D
A.) Datalink 983. The Datalink Layer is broken down into 2 layers, LLC
B.) Physical and MAC. The LLC
C.) Network establishes media independence and what else?
D.) Transport A.) Provides Windowing.
E.) Session B.) Provides flow control.
Ans C C.) Provides SAP's (Service Access Points).
974. Which of the following are examples of the Datalink D.) The Datalink layer does not have sublayers.
Layer? E.) Provides SAP's (Service Advertising Protocol).
A.) LLC F.) RIP Updates.
B.) SQL Ans B C
C.) TCP 984 When a Distance Vector routing protocol detects that a
D.) Token Ring connected network
E.) IP has gone down, it sends out a special routing update
Ans A D packet, telling all
975 What is the standard ISDN term for a non-native directly connected routers that the distance to the dead
analog telephone? network is
A.) TE1 infinity. This is an example of which routing technology?
- 63 -
A.) ICMP. C.) MD5
B.) Only Link State routing protocols have this intelligence. D.) CHAP
C.) Triggered updates. E.) STACKER
D.) Garrison-4. F.) MSCHAP
E.) Split Horizon. Ans A D
F.) Poison Reverse. 993. Which of the following are examples of the Transport
Ans F Layer?
985 Which of the following would not be displayed by the A.) Token Ring
command ‘sho cdp B.) UDP
neighbor detail’? C.) TCP
A.) The incoming/outgoing interface. D.) IP
B.) The hardware platform. E.) SQL
C.) One address per protocol. F.) LLC
D.) Amount of Flash Memory Available Ans B C
E.) The routers hostname. 994. Which of the following describe SMTP?
F.) The subnet mask, if IP is configured. A.) Used for downloading files to the router.
Ans D F B.) Used for sending e-mail.
986. Which of the following are characteristics of UDP? C.) Uses TCP.
A.) UDP is connection oriented. D.) Uses UDP.
B.) UDP is used with TFTP. E.) Uses port 25.
C.) UDP is unreliable. F.) Used for managing IP devices.
D.) UDP is connectionless. Ans B E
E.) UDP is at the transport layer. 995 What is the standard ISDN term for a native ISDN
F.) UDP uses no acknowledgements. modem?
Ans C D E F A.) ET
987 What is a characteristic of Store and Forward B.) LE
switches? C.) TE2
A.) They work at wire speed. D.) TE3
B.) They are the same as Cut-Through switching in 'prune' mode. E.) TA
C.) They forward based on transport layer info. Ans E
D.) They forward the frame before it is completely read. 996 Which of the following are Transport layer protocols?
E.) They increase latency. A.) UDP
Ans E B.) TCP
988. The Internet Protocol (IP) occurs at what layer of the C.) NBP
seven layer model? D.) IP
A.) Physical E.) SPX
B.) Presentation Ans A B E
C.) Network 997. When determining whether or not to route a LAN
D.) Datalink segment, which rule of
E.) Session thumb do you use?
F.) Transport A.) 60/40
Ans C B.) 50/50
C.) 80/20
D.) 90/10
E.) 70/30
Ans E
998 Which of the following are examples of the Session
Layer?
A.) TCP
989. In regards to TCP/IP, which class of address allows for B.) RPC
the fewest valid C.) SQL
Internet hosts? D.) NFS
A.) D E.) Token Ring
B.) E Ans B C D
C.) Classes are not used in TCP/IP. 999. Which layer of the 7 layer model provides services to
D.) B the Application
E.) C layer over the Session layer connection?
F.) A A.) Transport
Ans E B.) Application
990 For IPX, what is the DEFAULT Cisco Encapsulation on an C.) Session
Ethernet D.) Network
interface? E.) Datalink
A.) novell-ether F.) Presentation
B.) gns Ans F
C.) snap 1000 What type of switching creates variable latency
D.) arpa through the switch?
E.) sap A.) Cut-Through
F.) dix B.) Inverted
Ans A C.) Layer 4
991 Novell NetWare has an Ethernet frame type called D.) Multiplexed
Ethernet_II. What is the E.) Store and Forward
matching Cisco command line keyword for this Ans E
encapsulation method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
Ans C
992. There are 2 types of PPP authentication supported by
the Cisco IOS. What
are they?
A.) PAP
B.) PREDICTOR
- 64 -

Das könnte Ihnen auch gefallen