Beruflich Dokumente
Kultur Dokumente
How is redundancy
achieved? (3)
(1 of 4 answers is correct)
By sending service frames in both directions on the ring and using the one t
hat arrives first.
ERPS works on two unidirectional rings. One ring carries the working paths,
one ring carries the protection paths. Path integrity is supervised by control p
ackets.
ERPS blocks one link on the ring to prevent loops, while forwarding is based
on MAC learning. In failure case, the blocked link will be unblocked and the MA
C addresses will be re-learnt.
ERPS is a derivative of MSTP. BPDUs identify the active portion of the ring
and the ring port to be blocked. In failure case, the blocked link will be unblo
cked and the MAC tables will be re-learnt.
2)
How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gener
ated?
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses. yes
The Link Control Protocol (LCP).
3)
What is the purpose of a DNS suffix? 4
(1 of 4 answers is correct)
The DNS suffix is the complete name of the DNS server.
The DNS suffix is a suffix for the DNS server so that it works faster.
4)
In which field of the IPv4 header is priority marking performed?
(1 of 4 answers is correct)
Protocol field.
ToS field. yes
Identification field.
Sequence field.
5)
What is used on a local computer for dynamic display of web pages?
(1 of 4 answers is correct)
CGI-Scripts
JavaScripts yes
POP3
MIME
6)
Which of the following are the minimum network settings for a PC?
(2 of 4 answers are correct)
7)
Which of the following is the Authentication Server when using EAP?
(1 of 4 answers is correct)
DNS server
RADIUS server yes
DHCP server
Exchange-Server
8)
Which of the following IP addresses is the broadcast IP address for the networ
k 10.10.1.128 with subnetwork mask 255.255.255.128?
(1 of 4 answers is correct)
10.10.1.1
10.10.1.0
10.10.1.255 yes
10.10.1.254
9)
What can be configured on a Cisco router with the user EXEC mode commands?
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router. yes
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information. yes
10)
Which of the following statements are advantages of using DHCP?
(3 of 4 answers are correct)
11)
Which of the following networks elemets are used in a Voice over Cable network?
(3 of 4 answers are correct)
Call Management Server (CMS). yes
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM). yes
Cable Modem Termination System (CMTS). yes
12)
What is used to determine speech quality?
(1 of 4 answers is correct)
Transmission Control Protocol
Signaling Standard 7
Erlang Scale
Mean Opinion Score yes
13)
Which Cisco IOS command displays the memory usage of a Cisco IOS image that is
stored on the router?
(1 of 4 answers is correct)
show image ram
show nvram yes
show flash
show startup-config
14)
Which of the following protocols are used for VoIP payload?
(2 of 4 answers are correct)
UDP yes
RTP yes
MCU
SIPS
15)
Which of the following DiffServ Code Points (DSCP) sets the highest priority on
packets?
(1 of 4 answers is correct)
First In First Out.
Best Effort.
Expedited Forwarding. yes
Assured Forwarding.
16)
Which of the following criteria are used to calculate the Spanning Tree topology
?
(3 of 4 answers are correct)
MAC-address yes
IP-address
Root path cost yes
Bridge Priority yes
17)
What is used in VoIP to calculate the jitter?
(1 of 4 answers is correct)
RTP timestamps. yes
RTP sequence numbers.
QoS labels.
Header compression.
18)
Which protocol is used for the control of video on demand sessions?
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
19)
What are advantages of proxy servers?
(2 of 4 answers are correct)
Higher performance when using caching features. yes
Higher security through the blocking of applications. yes
Application-level encryption such as HTTPS.
Inside hosts do not need any official IP address anymore
20)
Which of the following devices use ARP?
(2 of 4 answers are correct)
IP telephone yes
Router yes
Repeater
Hub
21)
Which of the following statements about IP routing is true? (3)
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS
22)
Which of the following statements about the information distribution in GPRS is
true?
(2 of 4 answers are correct)
The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context. yes
In error free operation the UL and DL GTP sequence numbers for a PDP context
on Gn interface are strictly increasing even when RABs or packet flows have bee
n deleted and re-established. yes
23)
Which of the following statements is NOT correct?
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario. yes
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.
24)
What is the network ID for the IP Address 115.150.177.44/255.192.0.0?
(1 of 4 answers is correct)
115.0.0.0
115.64.0.0
115.128.0.0
115.192.0.0 yes
25)
Which of the following statements regarding FIFO queuing mechanisms is correct?
(1 of 4 answers is correct)
Packets with the highest priority are forwarded first.
Prioritization is used to decide which packets can be rejected.
Packets are forwarded in the same sequence as they arrive. y
es
The last packet received is the first packet to be forwarded.
26)
What increases the risk of network security?
(1 of 4 answers is correct)
Professional administration of a network.
Using software from an unknown source. yes
27)
What happens to the priority of a packet marked with DSCP when it passes a route
r that only supports IP precedence?
(1 of 4 answers is correct)
The packets are rejected because they cannot be handled.
The packets are prioritized in accordance with IP Precedence. yes
The packets are forwarded without prioritization.
The packets will be re-classified and re-marked by the router.
28)
Which parts of an IP header are processed by a router?
(2 of 4 answers are correct)
Host ID. yes
Network ID. yes
Time To Live.
Data checksum.
29)
Which bits of the TOS byte are used for DSCP?
(1 of 4 answers is correct)
The most significant 3 bits.
The most significant 6 bits. yes
The least significant 3 bits.
The least significant
30)
How is a VPLS (Virtual Private LAN Service) kept loop-free?
(1 of 4 answers is correct)
By a Spanning Tree Protocol.
By the "split horizon" rule. yes
By building a loop-free tree of pseudo-wires.
By eliminating MAC learning.
31)
Which of the following is true regarding SNMP communities?
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access. yes
The trap community must be the same as the public community.
32)
What is a function of a SIP proxy?
(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the recipient and may
convert them.
It responds to signaling messages and transfers these unchanged to the recip
ient. yes
It responds to voice data, forwards this to the recipient and rewrites the R
TP header.
It responds to voice data, forwards this to the recipient and does not chang
e the RTP header.
33)
Which of the following entries can be specified in the DHCP Scope? 3,4
(2 of 4 answers are correct)
WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.
34)
How many TEIDs has an active PDP context assigned at least between SGSN and GGSN
:
(1 of 4 answers is correct)
2 yes
4
8
35)
Which Cisco IOS command displays static route information on a Cisco router?
(1 of 4 answers is correct)
show ip static route
show route ip static
show ip route yes
show route ip
36)
Which statements concerning VPN are correct?
(2 of 4 answers are correct)
37)
How many priority levels are there within IP Precedence?
(1 of 4 answers is correct)
3
8 yes
16
64
38)
Which of the following signaling protocols can be used to connect an IP-PBX to
a SIP-Proxy / SIP Application Server?
(2 of 4 answers are correct)
SIP-Connect yes
SIP-NNI
MGCP yes
RTP
39)
What can be done to increase wireless security?
(1 of 4 answers is correct)
Disabling SSID broadcasts. yes
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.
40)
What is the broadcast address for a host with the IP address 132.17.100.23/255
.255.192.0?
(1 of 4 answers is correct)
132.17.100.255
132.17.128.0
132.17.127.255
132.17.255.255 yes
41)
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities. yes
DiffServ is a protocol used to route data through a network. yes
DiffServ creates service classes yes
42)
Which of the following tasks are assigned to SNMP agents?
(3 of 4 answers are correct)
SNMP Agents have to be installed in a network to make nodes manageable. (w)
yes
An agent has local knowledge of management information from a network node.
yes
Agents have to forward the activities and traps of the network nodes. yes
Agents send SNMP messages to a management system.
43)
Which of the following protocols work with MPLS?
(3 of 4 answers are correct)
Ethernet yes
Frame Relay yes
ATM yes
Token Ring
44)
The filter criteria 2
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against D
OS attacks.
are evaluated by the S-CSCF, to find informations and conditions allocated t
o the user to handle user and event specific services e.g. by consulting an appl
ication server.
are used in the subscription location function to select the HSS in an user
specific way.
are used for real time protocol bearer traffic to control the priority of th
e
45)
Mark the correct answers!
(3 of 4 answers are correct)
DNS is used to dynamically assign an IP address to a GPRS user during PDP co
ntext activation.
DNS is used to translate the APN in the SGSN to a suitable GGSN IP address d
uring PDP context activation. yes
DNS is used to lookup the IP address of the old SGSN from the old RAI during
inter-SGSN routing area update. yes
DNS is used by the MS/UE to translate the internet domain or host name into
IP addresses. yes
46)
Which Cisco IOS command has to be used to see who has Telnet sessions to a route
r?
(1 of 4 answers is correct)
show user yes
show telnet
show session
show interface
47)
Which of the following protocols is used to resolve the IP address to a URI (U
niform Resource Identifier)?
(1 of 4 answers is correct)
SDP
DNS yes
H.225
SMTP
48)
Which of the following statements about VoIP connections are correct?
49)
Which framing procedure is always used within NG-SDH to encapsulate Ethernet ser
vice frames?
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure) yes
50)
What codec offers ISDN voice quality?
(1 of 4 answers is correct)
G.711 yes
G.723.1
G.728
G.729A
51)
Which of the following statements about DMZ is correct? 1
(1 of 4 answers is correct)
It is a network area that can be reached from the intranet and from the Inte
rnet and is protected by firewalls.
DMZ is a network area that is separated from the Internet by a firewall and
cannot be accessed from the intranet.
DMZ is a network area that cannot be accessed from the Internet.
It is a network area that can be reached from the intranet and from the Inte
rnet
52)
Which characteristics has a UTP cable?
(2 of 4 answers are correct)
53)
Which protocols work in a connection-oriented way?
(2 of 4 answers are correct)
Frame Relay protocol. yes
Internet protocol.
Transmission Control protocol. yes
User Datagram protocol.
54)
What are transition mechanisms for IPv6?
(2 of 4 answers are correct)
IPv6-over-IPv4 tunneling
Mobile IPv6
IPSec yes
Dual stack
55)
When logging on to a server, which of the following ensures the user's identit
y?
(1 of 4 answers is correct)
Auto-configuration
Administration
Authentication yes
Authorization
56)
Which of the following is true regarding SNMP MIB?
(2 of 4 answers are correct)
57)
What is true about the root bridge of a converged topology of an Spanning Tree P
rotocol (STP) network?
(1 of 4 answers is correct)
It is always the bridge with the lowest MAC address from all of its ports.
It is the bridge with the smallest triple (bridge priority, bridge identifie
r, lowest MAC address of all ports). yes
It is the bridge with the root port assigned.
It is the bridge connected to the backbone router.
58)
Which of the following statements describes the task of the jitter buffer in an
IP telephone?
(1 of 4 answers is correct)
It converts voice data into RTP packets.
It requests all the lost voice packets from the sender.
It stores the music on hold files and plays them on demand.
It stores the incoming voice packets and sends them out in evenly spaced int
ervals. yes
59)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s yes
4 Mbit/s
8 Mbit/s
60)
Which of the following statements apply to IEEE 802.1p/Q?
61)
Which technology has been designed in WLAN to replace WEP (Wired Equivalent Priv
acy)?
(1 of 4 answers is correct)
RADIUS
PKI
WPA yes
MAC Filtering
62)
When you launch a PING command, you are using which protocol?
(1 of 4 answers is correct)
TCP
UDP
ICMP yes
RSVP
63)
Which of the following elements typically belong to a SIP architecture?
(3 of 4 answers are correct)
PROXY server yes
User agent yes
Gatekeeper
Gateway yes
64)
What happens when latency in a VoIP call is more than specified?
(1 of 4 answers is correct)
65)
Which of the following are of greatest concern when designing VoIP networks?
(3 of 4 answers are correct)
Packet delay and jitter. yes
Packet throughput and loss. yes
Type of terminals and NICs.
QoS implementation yes
66)
During session setup the terminating S-CSCF has to forward the "Invite" message
to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retrieves
the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.
67)
Which of the following differences between SIP and
are correct?
(2 of 4 answers are correct)
SIP offers easier scalability and expandability than H.323.
SIP uses intelligent terminals compared with H.323 terminals. yes
SIP uses text based message encoding, H.323 uses binary.
yes
SIP offers integrated load balancing, H.323 does not.
68)
How many AF codepoints can be mapped within DSCP?
(1 of 4 answers is correct)
8
12 yes
32
64
69)
Which of the following statements describe the logical topologies?
(1 of 4 answers is correct)
A logical topology depends solely on the type of computers to be included in
the network.
A network cannot have different logical and physical topologies.
A logical topology describes the paths that the signals travel from one poin
t on a network to another. yes
A logical topology defines the way in which the computers, printers and othe
r devices are connected.
70)
Which of the following elements represent an Intrusion Detection System (IDS)?
(2 of 4 answers are correct)
Actuators
Sensors yes
Management Stations yes
Couplers
71)
How are computer viruses commonly spread?
(3 of 4 answers are correct)
Via VoIP.
Via emails. yes
Via web site. yes
Via file downloads. yes
72)
Which of the following statements about the Spanning Tree Algorithm is correct?
(1 of 4 answers is correct)
Spanning Tree is used to find the shortest path through an IP Network.
Spanning Tree is used to find the path with the maximum bandwidth in the LAN
.
Spanning Tree is used to distribute VLAN information to all Layer 2 switches
.
Spanning Tree is used to compute unique paths across a meshed network of lay
er 2 bridges/switches. yes
73)
Which of the following specifications is not defining a call set up control prot
ocol?
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS yes
H.323
74)
What is the definition of BGP peers?
(1 of 4 answers is correct)
Routers exchanging BGP messages. yes
76)
Which of the following OSI model layers correspond to the TCP and IP protocols?
(2 of 4 answers are correct)
Physical Layer
Session Layer
Network Layer yes
Transport Layer yes
77)
Which statements describe data-link protocols in a WAN?
(2 of 4 answers are correct)
OSPF is a typical data-link protocol.
Data link layer protocols define how data is encapsulated for transmission t
o remote sites. yes
Data link layer protocols determine the cable type to be used in the WAN.
Many data link layer protocols use a framing mechanism similar to HDLC.
yes
78)
Which of the following is a feature of the Resource Reservation Protocol (RSVP)?
(1 of 4 answers is correct)
The option to use encryption for the internet access.
79)
What is the length of the host ID for an IPv4 address?
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask. yes
80)
Select the correct statements about the advantages of QoS in VoIP solutions.
(2 of 4 answers are correct)
Improved satisfaction of the end user because of better voice quality.
yes
Enhanced division of bandwidth for voice and data.
Improved productivity due to the automatic queuing and distribution of calls
to IP workpoints. yes
Cost avoidance because of the automatic selection of the least cost route fo
r IP calls.
--------------------------------------------------------------------------------
---------------------------------------------
1)
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.
2)
What can be done to increase wireless security? 1
(1 of 4 answers is correct)
Disabling SSID broadcasts.
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.
3)
Which of the following messages is sent by a system supporting IntServ when re
ceiving a path message? 2
(1 of 4 answers is correct)
Release complete
Reserve message
Alerting message
Status inquiry
4)
Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0? 2
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.
5)
Which of the following statements about a digital certificate are correct? 2
,4
(2 of 4 answers are correct)
It is a message that ensures the priority of the sent data.
It is sent on request of a peer requiring an authentication.
A new certificate is created for each message.
It is issued by a Certification Authority (CA).
6)
Which of the following fields identifies the protocol used in the data field of
an Ethernet frame? 1
(1 of 4 answers is correct)
Type
Destination address
Checksum
Source address
7)
Which connection requiers a crossover LAN cable? 2
(1 of 4 answers is correct)
PC to a switch.
PC directly to another PC.
PC to a modem.
PC to a hub.
8)
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.
9)
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? 1
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT
10)
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol
11)
Which of the following is the default CoS for voice traffic in IEEE 802.1 p/Q?
1
(1 of 4 answers is correct)
0
1
7
6
12)
Which of the following answers describes Random Early Detection (RED)?
3
(1 of 4 answers is correct)
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased
13)
What is the default port number (decimal) of Telnet? 2
(1 of 4 answers is correct)
21
23
25
53
14)
Which of the following is true regarding SNMP communities? 3,4
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access.
The trap community must be the same as the public community.
15)
What is the purpose of Multipurpose Internet Mail Extensions (MIME)? 2
(1 of 4 answers is correct)
MIME contains information on how to forward e-mails if the mailbox is not on
the local mail server.
MIME supports in emails the transfer of data in any format.
MIME defines the mailbox properties, like the size of box and messages.
MIME is used to authenicate e-mail clients and for the encoded transfer of d
ata between
16)
If both the "enable secret" and the "enable password" commands are configured
on the Cisco router, how do you get to the # prompt? 4
(1 of 4 answers is correct)
Use the "enable password" command.
Use the "enable secret" command.
Use either the "enable secret" OR the "enable password" command.
Use both the "enable secret" AND the "enable password" commands.
17)
Which of the following cable categories can be used with the IEEE 802.3af standa
rd? 1,2,3
(3 of 4 answers are correct)
Cat 3
Cat 4
Cat 5
Cat 6
18)
Which of the following protocols are connection-oriented? 1,3
19)
Which of the following is true regarding SNMP MIB? 2,3
(2 of 4 answers are correct)
Each MIB file must contain a public and private entries.
It is a database of industry defined standards for a particular SNMP version
.
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database.
20)
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server
Redirect server
21)
How does a distance vector router learn about networks that are NOT directly con
nected? 4
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.
22)
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.
23)
TCP-Ports are essential components for communication in the IP environment. Wh
ich statement is correct? 3
(1 of 4 answers is correct)
TCP-Ports are fixed and can never be changed.
Ports are used for identifying the routing protocol used.
Ports are used for identifying applications or processes.
Ports define whether you are working with TCP or UDP.
24)
Which term is last default entry at the end of every ACL on a Cisco Router?
2
(1 of 4 answers is correct)
implicit deny host
implicit deny any
deny ip
ip deny any
25)
Which statements about the QoS mechanism DiffServ are correct? 1,2,4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.
26)
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.
27)
Which of the following statements about ERPS (Ethernet Rings Protection Switchin
g) are true? 2, 3
(2 of 4 answers are correct)
ERPS guarantees recovery times of below 50ms, whilst Spanning Tree algorithm
s have recovery times of several seconds.
ERPS can only be implemented on rings, whilst Spanning Tree protocols can be
used on any topology.
ERPS converges faster than Spanning Tree algorithms and, depending on the ne
twork size, can offer recovery times of below 50ms.
With ERPS, the network operator has more influence on the active topology th
an when using a Spanning Tree algorithm.
28)
What is the maximum bandwidth of the IEEE 802.11g specification? 4
(1 of 4 answers is correct)
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s
29)
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoIP
for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.
30)
What is latency in a VoIP network? 1
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation.
31)
Which of the following statement describes the behavior of a color aware UNI (Us
er Network Interface) according to the Metro Ethernet Forum? 1
(1 of 4 answers is correct)
Color marking of incoming frames is preserved.
Incoming yellow frames are metered and marked as yellow or red, according to
their SLA compliance.
Incoming green frames are metered and marked as green, yellow or red accordi
ng to their SLA compliance.
Outgoing frames are color marked.
32)
What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? 2
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)
33)
What is the length of the host ID for an IPv4 address? 4
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask.
34)
MGCP
RTP
35)
Which of the following networks elemets are used in a Voice over Cable network?
1,2,3
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).
Cable Modem Termination System (CMTS).
36)
Which guidelines apply to IP addressing? 1,2,,3
(3 of 4 answers are correct)
The number 127 may not be used as the first octet for the network.
The host ID may not consist only of the value 0.
The host ID must be unique for the local network.
The host ID may not contain a zero.
37)
Which of the following statements about TCP/UDP is correct? 1
(1 of 4 answers is correct)
Only TCP guarantees that the sent data has reached the peer completely.
Only UDP guarantees that the sent data has reached the peer completely.
Both TCP and UDP guarantee that the sent data has reached the peer completel
y.
Both TCP and UDP do not guarantee that the sent data has reached the peer co
mpletely.
38)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
39)
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.
40)
Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1
(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.
41)
Which of the following are NOT valid parts of IPv4 subnetwork masks? 1,2
(2 of 4 answers are correct)
"1101 1111"
"1111 1100"
"1101 10"
"1000 00"
42)
What is the difference between an ethernet hub and an ethernet switch? 2,
4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
A switch offers better performance as it operates collision-free.
For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch.
43)
44)
Which of the following connections support IEEE 802.3ad Link Aggregation ? 2,4
(2 of 4 answers are correct)
Multipoint
Full duplex
Half duplex
Point to Point
45)
Which of the following protocols is NOT used in the IMS (IP Multimedia Subsystem
)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)
46)
How many TEIDs has an active PDP context assigned at least between SGSN and GG
SN: 1
(1 of 4 answers is correct)
2
4
8
0
47)
How does the analogue to digital and digital to analogue conversion affect the t
otal propagation time of a packet? 3
(1 of 4 answers is correct)
It has an impact of approx. 20 ms per conversion.
It has an impact of approx. 10 ms per conversion.
It can only be carried out twice per connection.
it has a negligible impact.
48)
Which of the following authentication protocols are supported by PPPoE? 3,4
(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN
49)
Which of the following statements about the use of Ethernet switches are correct
? 1, 2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.
50)
What does Class of Service (CoS) refer to in the context of Carrier Ethernet?
2
(1 of 4 answers is correct)
Any classification of frames inside the MEN.
The possibility to offer different service levels like premium, controlled l
oad, standard, best effort etc. to end customers.
The priority bits of the VLAN tag.
Different service types like point-to-point, multipoint-to-multipoint and po
int-to-multipoint.
51)
How many ACLs per protocol, per direction and per interface can be applied on a
Cisco router? 1
(1 of 4 answers is correct)
1
2
4
any number
52)
53)
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.
It is based on SSH and is encrypted asymmetrically.
54)
Which protocol does a router use to determine the MAC address to deliver an in
coming packet? 2
(1 of 4 answers is correct)
ICMP
ARP
SMTP
UDP
55)
Which of the following e-mail attachments can contain Trojan horses? 3,4
(2 of 4 answers are correct)
Sales.txt
Sales.doc
Sales.ini
Sales.exe
56)
Which of the following statements is correct about MAC addresses? 3
(1 of 4 answers is correct)
It indicates the maximum supported bit rate.
It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.
57)
What can be configured on a Cisco router with the user EXEC mode commands?
4
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.
58)
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728
59)
Which of the following statements describe the function of routing tables? 1
,2
(2 of 4 answers are correct)
Routing tables contain metrics that are used to determine the acceptability
of the route.
When a router receives an incoming packet, it uses the source address and se
arches the routing table to find the best path for the data from that source.
Although routing protocols vary, routing metrics do not.
Routing tables provide an ordered list of known network addresses.
60)
Which firewall types are valid? 2,4
(2 of 4 answers are correct)
Bridge Filter Firewall.
61)
Which of the following statements about MAC addresses in an Ethernet topology
are correct? 2,3
(2 of 4 answers are correct)
It is encrypted and can not be masked.
It must be unique within the network.
It is represented in hexidecimal format.
It can only be bound to one network protocol at layer 3.
62)
Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.
63)
64)
Which part of the IP address evaluates the router with the help of the subnet ma
sk? 3
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.
Mask and host bits.
Host and subnet bits.
65)
Which statements about VPN are correct? 1,3
(2 of 4 answers are correct)
VPN is a private, logical network.
VPN has no security mechanisms.
IP-based VPNs can be based on the PPP protocol with IP tunnelling.
VPN requires less configuration than conventional LAN links.
66)
What is the meaning of "Tail Dropping"? 1
(1 of 4 answers is correct)
Incoming packets are dropped if the buffer is full.
Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priori
ty queues.
Packets arrving with a high delay are dropped because they are considered us
eless for the application.
67)
68)
Which of the following statements about the ToS field are correct? 1,3
(2 of 4 answers are correct)
It is part of the IP header.
It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field.
69)
71)
72)
Which of the following protocols is used to resolve the IP address to a URI (Uni
form Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225
SMTP
73)
74)
75)
76)
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a
77)
H.323
MPEG 4
H.264
78)
79)
On which Internet standards is SIP based on? 1,2
(2 of 4 answers are correct)
Hypertext Transfer Protocol
Simple Mail Transport Protocol
Post Office Protocol
Simple File Transfer Protocol
80)
Which of the following devices is used to reduce the effects of broadcast storms
? 2
(1 of 4 answers is correct)
Ethernet hub
Router
Gatekeeper
Repeater
Which of the following protocols can be used for enhanced security in VoIP netwo
rks?
(2 of 4 answers are correct)
RTP
Secured RTP (SRTP)
Which of the following transport layer protocols are often used for SNMP communi
cations?
(2 of 4 answers are correct)
TCP
RTP
UDP
SRTP
-------------------------------------------------------------
Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)
192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128
--------------------------------
"Connectionless data transmission" means? ( 4)
(1 of 4 answers is correct)
The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without con
firmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.
------------------------------------
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically?
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT
----------------------------
What is LDAP? ( 1 )
(1 of 4 answers is correct)
-----------------------
Which statements describe DSL? ( 2, 4)
(3 of 4 answers are correct)
----------------------------------------
Which firewall types are valid? (2,4)
(2 of 4 answers are correct)
----------------------------------------
What happens when a packet with DSCP marking is forwarded by a router that only
supports IP Precedence?
(1 of 4 answers is correct)
-----------------------------------------
integrated into the IP-CAN access procedure; e.g. during the PDP context activat
ion in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
-------------------------------------
Which of the following statements about reduction of the bit rate with G.723 is
correct?
(1 of 4 answers is correct)
-------------------------------------
---------------------------------------------
The filter criteria
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against DOS a
ttacks.
are evaluated by the S-CSCF, to find informations and conditions allocated to th
e user to handle user and event specific services e.g. by consulting an applicat
ion server.
are used in the subscription location function to select the HSS in an user spec
ific way.
are used for real time protocol bearer traffic to control the priority of the me
dia connection.
-------------------------------------------------
Which of the following apply to SSL? (Secure Socket Layer) (1,2)
(2 of 4 answers are correct)
---------------------
The QoS bits are set in which part of the IPv4 frame?
(1 of 4 answers is correct)
Protocol field
ToS field
Identification field
Version field
------------------------------------------
which of the following criteria are used to calculate the Spanning Tree topology
?
(3 of 4 answers are correct)
MAC-address
IP-address
Root path cost
Bridge Priority
--------------------------------------
Which of the following messages is used to initiate the end of a TCP session?
(1 of 4 answers is correct)
SYN
SYN ACK
FIN
FIN ACK
------------------------------------
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Gatewa
y to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voice o
ver cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media Gate
way.
------------------------------
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
-----------------------------------------------
Which field in a TCP header is responsible for the correct order of TCP data?
(1 of 4 answers is correct)
SYN-Flag
ACK-Flag
sequence number
acknowledgment number
-------------------------------------------------
What is the minimum number of wires needed to create a 100BaseT link in a LAN?
(1 of 4 answers is correct)
2 wires
4 wires
6 wires
8 wires
----------------------------------------------------
Which of the following classifications are defined in DiffServ?
(3 of 4 answers are correct)
Best Effort
Assured Forwarding
Expedited Forwarding
Port Forwarding
-----------------------------------------------------
WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.
----------------------------------------------------
How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)
------------------------------------------------------
------------------------------------------------------
-------------------------------------------------------
What is in the SPF (Shortest Path First) algorithm inversely proportional to the
bandwidth?
(1 of 4 answers is correct)
Link state.
Link cost.
Root cost.
Hop count.
------------------------------------------------------
What benefits does Link Aggregation provide?
(3 of 4 answers are correct)
------------------------------------------------------
--------------------------------------------------------
Which term is last default entry at the end of every ACL on a Cisco Router?
(1 of 4 answers is correct)
---------------------------------------------------------
How should the jitter buffer be configured for optimum voice quality?
(1 of 4 answers is correct)
----------------------------------------------------------
----------------------------------------------------------
Which of the following messages is sent by a system supporting IntServ when rece
iving a path message?
(1 of 4 answers is correct)
Release complete
Reserve message
Alerting message
Status inquiry
-----------------------------------------------------------
Select the correct statements about the advantages of QoS in VoIP solutions.
(2 of 4 answers are correct)
-----------------------------------------------------------
------------------------------------------------------------
--------------------------------------------------------------
Which of the following actions does not reduce network load?
(1 of 4 answers is correct)
Voice Compression.
IP Header Compression.
A-law / µ-law transcoding.
Voice Activity Detection.
------------------------------------------------------------
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s
--------------------------------------------------------------
What happens when a PC's network card (NIC) is replaced? (1)
(1 of 4 answers is correct)
---------------------------------------------------------------
A mail client should be able to access a firewall-protected Web server using the
SMTP and IMAP4 protocols. Which ports must be opened in the firewall if you are
using the standard well-known ports for SMTP and IMAP4?
(2 of 4 answers are correct)
21
25
80
143
---------------------------------------------------------------
G.711
G.723.1
G.728
G.729A
---------------------------------------------------------------
----------------------------------------------------------------
----------------------------------------------------------------
-----------------------------------------------------------------
------------------------------------------------------------------
How is it possible that JAVA programs can be executed from practically every Web
client?
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the client.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web serv
er.
-----------------------------------------------------------------
The owner of the certificate is sent an e-mail request to delete the certificate
.
The creation date of the issued certificate is changed by the CA.
The certificate is placed on the Certificate Revocation List.
The owner of the certificate is placed on the Certificate Revocation List.
------------------------------------------------------------------
What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"?
(1 of 4 answers is correct)
0
8
2
4
-----------------------------------------------------------------
----------------------------------------------------------------
What is the maximum number of hosts that can be addressed on a subnet with prefi
x /30?
(1 of 4 answers is correct)
1
2
4
30
-----------------------------------------------------------------
-----------------------------------------------------------------
What are data transmission protocols required for?
(1 of 4 answers is correct)
Senders and receivers of data must agree on a common "language" in the network s
o that data can be transferred.
Protocols are only required in the event of failure.
Protocols describe the speed of data transmission in the LAN.
Senders and receivers of data stipulate protocols to determine who is the sender
and who is the receiver.
-----------------------------------------------------------------
Which Cisco IOS command is used to configure a serial port in slot 0 port 1, on
a modular Cisco router?
(1 of 4 answers is correct)
-----------------------------------------------------------------
------------------------------------------------------------------
Which of the following protocols are used for transmitting voice bearer traffic?
(2 of 4 answers are correct)
UDP
RTP
RTCP
TCP
-----------------------------------------------------------------
------------------------------------------------------------------
Which of the following statements regarding FIFO queuing mechanisms is correct?
(1 of 4 answers is correct)
------------------------------------------------------------------
1518 Bytes
1522 Bytes
1526 Bytes
1530 Bytes
------------------------------------------------------------------
Which information send a distance vector router to its neighbor routers as part
of a periodic routing table update?
(1 of 4 answers is correct)
-----------------------------------------------------------------
Which of the following specifications is not defining a call set up control prot
ocol?
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323
------------------------------------------------------------------
Which of the following statements about the ToS field are correct?
(2 of 4 answers are correct)
------------------------------------------------------------------
Which of the following statements describes the task of the jitter buffer in an
IP telephone?
(1 of 4 answers is correct)
How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redunda
ncy?
(1 of 4 answers is correct)
By dynamic source-rerouting.
By preconfigured protection paths.
------------------------------------------------------------------
------------------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)
-----------------------------------------------------------------
The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context.
In error free operation the UL and DL GTP sequence numbers for a PDP context on
Gn interface are strictly increasing even when RABs or packet flows have been de
leted and re-established.
------------------------------------------------------------------
------------------------------------------------------------------
What is latency in a VoIP network?
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission. (2)
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a specific
period of time.
A description of what happens when more than 5% of packets are lost in a VoIP co
nversation.
----------------------------------------------------------------
What is necessary to allow incoming TCP connections being routed to a server beh
ind a NAT or NAPT router?
(1 of 4 answers is correct)
Servers can never be behind a NAT or NAPT router, because they need always a pub
lic IP address and well known port.
NAT or NAPT must be disabled in the server.
A rule must be configured in the NAT or NAPT router that links the public addres
s and port with the internal address and port.
NAT or NAPT has no effect the routing of incoming connections to servers.
-----------------------------------------------------------------
MPEG 2
H.323
MPEG 4
H.264
-----------------------------------------------------------------
Which of the following authentication protocols are supported by PPPoE? (1,2)
(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN
------------------------------------------------------------------
-----------------------------------------------------------------
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.
----------------------------------------------------------------
SIP-Connect
SIP-NNI
MGCP
RTP
----------------------------------------------------------
Which of the following protocols can be used for enhanced security in VoIP netwo
rks? (1,2)
(2 of 4 answers are correct)
RTP
Secured RTP (SRTP)
SIP via UDP
SIP via TLS/SSL
------------------------------------------------------------------
Which of the following transport layer protocols are often used for SNMP communi
cations? (1,3)
(2 of 4 answers are correct)
TCP
RTP
UDP
SRTP
-------------------------------------------------------------
Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)
192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128
--------------------------------
"Connectionless data transmission" means? ( 4)
(1 of 4 answers is correct)
The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without con
firmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.
------------------------------------
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? (1)
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT
----------------------------
What is LDAP? ( 1 )
(1 of 4 answers is correct)
-----------------------
----------------------------------------
Which firewall types are valid? (2,4)
(2 of 4 answers are correct)
----------------------------------------
What happens when a packet with DSCP marking is forwarded by a router that only
supports IP Precedence? (2)
(1 of 4 answers is correct)
-----------------------------------------
Wireless LAN.
Power over LAN.
Gigabit Ethernet.
Fast Ethernet.
--------------------------------------
integrated into the IP-CAN access procedure; e.g. during the PDP context activat
ion in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
via a HSS-HLR interrogation during registration.
by an end to end QoS parameter retrieval from the PDF.
-------------------------------------
Which of the following statements about reduction of the bit rate with G.723 is
correct? (2)
(1 of 4 answers is correct)
-------------------------------------
---------------------------------------------
---------------------------------------------
The filter criteria (2)
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against DOS a
ttacks.
are evaluated by the S-CSCF, to find informations and conditions allocated to th
e user to handle user and event specific services e.g. by consulting an applicat
ion server.
are used in the subscription location function to select the HSS in an user spec
ific way.
are used for real time protocol bearer traffic to control the priority of the me
dia connection.
-------------------------------------------------
Which of the following apply to SSL? (Secure Socket Layer) (1,2)
(2 of 4 answers are correct)
---------------------
The QoS bits are set in which part of the IPv4 frame? (2)
(1 of 4 answers is correct)
Protocol field
ToS field
Identification field
Version field
------------------------------------------
which of the following criteria are used to calculate the Spanning Tree topology
? (1,3,4)
(3 of 4 answers are correct)
MAC-address
IP-address
Root path cost
Bridge Priority
--------------------------------------
Which of the following messages is used to initiate the end of a TCP session? (3
)
(1 of 4 answers is correct)
SYN
SYN ACK
FIN
FIN ACK
------------------------------------
Which of the following statements is NOT correct? (3)
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Gatewa
y to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voice o
ver cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media Gate
way.
------------------------------
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? (2)
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
-----------------------------------------------
Which field in a TCP header is responsible for the correct order of TCP data? (3
)
(1 of 4 answers is correct)
SYN-Flag
ACK-Flag
sequence number
acknowledgment number
-------------------------------------------------
What is the minimum number of wires needed to create a 100BaseT link in a LAN? (
1)
(1 of 4 answers is correct)
2 wires
4 wires
6 wires
8 wires
----------------------------------------------------
Which of the following classifications are defined in DiffServ?
(3 of 4 answers are correct)
Best Effort
Assured Forwarding
Expedited Forwarding
Port Forwarding
-----------------------------------------------------
Which of the following entries can be specified in the DHCP Scope? (3,4)
(2 of 4 answers are correct)
WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.
----------------------------------------------------
How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)
------------------------------------------------------
------------------------------------------------------
-------------------------------------------------------
What is in the SPF (Shortest Path First) algorithm inversely proportional to the
bandwidth?
(1 of 4 answers is correct)
Link state.
Link cost.
Root cost.
Hop count.
------------------------------------------------------
What benefits does Link Aggregation provide?
(3 of 4 answers are correct)
Provides multiple logical connections.
Increased link capacity.
Link redundancy.
Improvements using existing hardware.
------------------------------------------------------
--------------------------------------------------------
Which term is last default entry at the end of every ACL on a Cisco Router? (2)
(1 of 4 answers is correct)
---------------------------------------------------------
How should the jitter buffer be configured for optimum voice quality?
(1 of 4 answers is correct)
----------------------------------------------------------
HDLC
IP
TCP
UDP
----------------------------------------------------------
Which of the following messages is sent by a system supporting IntServ when rece
iving a path message? (2)
(1 of 4 answers is correct)
Release complete
Reserve message
Alerting message
Status inquiry
-----------------------------------------------------------
Select the correct statements about the advantages of QoS in VoIP solutions. (1,
3)
(2 of 4 answers are correct)
-----------------------------------------------------------
------------------------------------------------------------
--------------------------------------------------------------
Which of the following actions does not reduce network load? (4)
(1 of 4 answers is correct)
Voice Compression.
IP Header Compression.
A-law / µ-law transcoding.
Voice Activity Detection.
------------------------------------------------------------
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s
--------------------------------------------------------------
What happens when a PC's network card (NIC) is replaced? (1)
(1 of 4 answers is correct)
---------------------------------------------------------------
A mail client should be able to access a firewall-protected Web server using the
SMTP and IMAP4 protocols. Which ports must be opened in the firewall if you are
using the standard well-known ports for SMTP and IMAP4?
(2 of 4 answers are correct) (2,3)
21
25
80
143
---------------------------------------------------------------
G.711
G.723.1
G.728
G.729A
---------------------------------------------------------------
IEEE 802.1af
IEEE 802.3af
IEEE 802.2af
IEEE 803.2af
----------------------------------------------------------------
----------------------------------------------------------------
-----------------------------------------------------------------
------------------------------------------------------------------
How is it possible that JAVA programs can be executed from practically every Web
client?
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the client.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web serv
er.
-----------------------------------------------------------------
How can an issued digital certificate be revoked by the Certificate Authority (C
A)?
(1 of 4 answers is correct)
The owner of the certificate is sent an e-mail request to delete the certificate
.
The creation date of the issued certificate is changed by the CA.
The certificate is placed on the Certificate Revocation List.
The owner of the certificate is placed on the Certificate Revocation List.
------------------------------------------------------------------
What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"? (3)
(1 of 4 answers is correct)
0
8
2
4
-----------------------------------------------------------------
----------------------------------------------------------------
What is the maximum number of hosts that can be addressed on a subnet with prefi
x /30? (2)
(1 of 4 answers is correct)
1
2
4
30
-----------------------------------------------------------------
-----------------------------------------------------------------
What are data transmission protocols required for?
(1 of 4 answers is correct)
Senders and receivers of data must agree on a common "language" in the network s
o that data can be transferred.
Protocols are only required in the event of failure.
Protocols describe the speed of data transmission in the LAN.
Senders and receivers of data stipulate protocols to determine who is the sender
and who is the receiver.
-----------------------------------------------------------------
Which Cisco IOS command is used to configure a serial port in slot 0 port 1, on
a modular Cisco router? (3)
(1 of 4 answers is correct)
-----------------------------------------------------------------
What is the Internet Key Exchange (IKE) protocol used for? (3,4)
(2 of 4 answers are correct)
------------------------------------------------------------------
Which of the following protocols are used for transmitting voice bearer traffic?
(1,2)
(2 of 4 answers are correct)
UDP
RTP
RTCP
TCP
-----------------------------------------------------------------
------------------------------------------------------------------
Which frame size must a switch in a Carrier Ethernet Network at least support to
operate as Provider Bridge?
(1 of 4 answers is correct)
1518 Bytes
1522 Bytes
1526 Bytes
1530 Bytes
------------------------------------------------------------------
Which information send a distance vector router to its neighbor routers as part
of a periodic routing table update? (3)
(1 of 4 answers is correct)
Only routes that have changed.
Routes that no longer exist.
The entire routing table.
Only information about new routes.
-----------------------------------------------------------------
Which of the following specifications is not defining a call set up control prot
ocol? (3)
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323
------------------------------------------------------------------
Which of the following statements about the ToS field are correct? (1,3)
(2 of 4 answers are correct)
------------------------------------------------------------------
Which of the following statements describes the task of the jitter buffer in an
IP telephone? (4)
(1 of 4 answers is correct)
How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redunda
ncy?
(1 of 4 answers is correct)
------------------------------------------------------------------
------------------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct? (2,3,4)
(3 of 4 answers are correct)
-----------------------------------------------------------------
Which of the following statements about the information distribution in GPRS is
true? (3,4)
(2 of 4 answers are correct)
The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context.
In error free operation the UL and DL GTP sequence numbers for a PDP context on
Gn interface are strictly increasing even when RABs or packet flows have been de
leted and re-established.
------------------------------------------------------------------
------------------------------------------------------------------
----------------------------------------------------------------
What is necessary to allow incoming TCP connections being routed to a server beh
ind a NAT or NAPT router?
(1 of 4 answers is correct)
Servers can never be behind a NAT or NAPT router, because they need always a pub
lic IP address and well known port.
NAT or NAPT must be disabled in the server.
A rule must be configured in the NAT or NAPT router that links the public addres
s and port with the internal address and port.
NAT or NAPT has no effect the routing of incoming connections to servers.
-----------------------------------------------------------------
MPEG 2
H.323
MPEG 4
H.264
-----------------------------------------------------------------
PAP
CHAP
RADIUS
RLOGIN
------------------------------------------------------------------
-----------------------------------------------------------------
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.
----------------------------------------------------------------
What is defined by Layer 2 of the OSI Reference Model? 1&4
(2 of 4 answers are correct)
The access controls to the media.
The logical addresses for hosts.
The route options for packets.
The structuring of bits into frames.
--------------------------------------------------------------------------------
-----------------
Which of the following statements describe MPLS? 2,4
(2 of 4 answers are correct)
Destination addressing is done by the user.
It uses short headers with fixed length.
The TCP header contains label related settings.
The label is replaced with a new one at each hop
-------------------------------------------------------------------------------
------------------
What is a VPWS? 2
(1 of 4 answers is correct)
A WAN emulation accross a packet based network (Virtual Private WAN Service)
.
A point-to-point L2 VPN (Virtual Private Wire Service).
A Virtual Leased Line Ethernet service over a TDM network.
The emulation of a TDM circuit ("pseudo-wire") over a packet based network.
-------------------------------------------------------------------------------
------------------
How many ACLs per protocol, per direction and per interface can be applied on
a Cisco router? 1
(1 of 4 answers is correct)
1
2
4
any number
-------------------------------------------------------------------------------
-----------
Which security features can be realized by a secure protocol? 1,2
(2 of 4 answers are correct)
Protection against viruses.
Authentication.
Authorization.
Encryption.
-------------------------------------------------------------------------------
---------
Which of the following is true about the parameter "metric 3" in context of a ro
ute entry in a Windows system? 2
(1 of 4 answers is correct)
It shows the maximum distance in meters from the wireless LAN.
It shows the maximum distance in miles from the network.
It shows the amount of L2 switches between the network connections.
It shows the amount of L3 routers between the network connections
--------------------------------------------------------------------------------
----
When using IEEE 802.1 p/Q, which of the following statements apply?
(2 of 4 answers are correct)
It provides a bandwidth reservation option.
It should only be used with compliant network components.
It works on Layer 2 of the OSI Reference Model.
It defines and reserves a connection route.
--------------------------------------------------------------------------------
----------
The filter criteria ?2
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against D
OS attacks.
are evaluated by the S-CSCF, to find informations and conditions allocated t
o the user to handle user and event specific services e.g. by consulting an appl
ication server.
are used in the subscription location function to select the HSS in an user
specific way.
are used for real time protocol bearer traffic to control the priority of th
e media connection.
-------------------------------------------------------------------------------
What are physical security issues? 1,4
(2 of 4 answers are correct)
Flooding of TCP/SYN packets.
Turning off the power of switch to block network access.
Turning off the air conditioning system in the network closet.
Infect a web server with a computer virus.
-------------------------------------------------------------------------------
----------------
Which of the following e-mail protocols supports server-stored mailbox access
and folder management? 3
(1 of 4 answers is correct)
SNTP
POP3
IMAP4
SMTP
-------------------------------------------------------------------------------
------------------
What is the main advantage of Multiple Spanning Tree Tree (STP)? 4
(1 of 4 answers is correct)
Several VLANs can be mapped to a single MST instance.
All VLANs must be mapped to a single MST instance.
MST uses RSVP to calculate instances.
MST maps VLANs dynamically to MST instances
-------------------------------------------------------------------------------
-------------------
Which of the following statements about reduction of the bit rate with G.723 i
s correct?
(1 of 4 answers is correct)
Up to 6.3 kbit/s one way.
------------------------------------------------------------------------
Which of the following topologies uses twisted pair cables? 2
(1 of 4 answers is correct)
10BaseF
100BaseTX
1000BaseSX
10Base5
------------------------------------------------------------------------------
From which bridge is the Spanning Tree topology calculated?
(1 of 4 answers is correct)
The redundant bridge.
The bridge with the highest ID.
The root bridge.
route add
route print
route to
route stop
-------------------------------------------------------
How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gen
erated? 3
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses.
The Link Control Protocol (LCP).
----------------------------------------------
Which of the following elements can be used to divide a network into individua
l segments? 2,3
(2 of 4 answers are correct)
Firewalls
WINS Server
VLAN-capable switches
Gatekeeper
-----------------------------------------------------------------------
What is the network ID for the IP Address 115.150.177.44/255.192.0.0? 4
(1 of 4 answers is correct)
115.0.0.0
115.64.0.0
115.128.0.0
115.192.0.0
--------------------------------------------------------
What is latency in a VoIP network? 2
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation
---------------------------------------------------------------------------
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol
Real Time Streaming Protocol
------------------------------------------------------------
Which of the following signaling protocols can be used to connect an IP-PBX to
a SIP-Proxy / SIP Application Server? 1&3
---------------------------------------------------------
Which framing procedure is always used within NG-SDH to encapsulate Ethernet s
ervice frames? 4
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure)
---------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct? 2&3&4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
-----------------------------------------------------
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server
Redirect server
--------------------------------------------------------
What is BGP used for?
(2 of 4 answers are correct)
Detailed Route description inside an Autonomous System.
Translation of routes between two different routing protocols.
Application of routing policies between Autonomous Systems.
Application of routing policies inside an Autonomous System.
-------------------------------------------------------------------
Which of the following statements about the OSI Reference Model are correct? 1
,3
(2 of 4 answers are correct)
Encapsulation ARPA
--------------------------------------------------------------------
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.
------------------------------------------------------------------
Which of the following specifications is not defining a call set up control pr
otocol? 3
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323
-------------------------------------------------------------------------------
----
What happens to the priority of a packet marked with DSCP when it passes a rou
ter that only supports IP precedence? 2
(1 of 4 answers is correct)
The packets are rejected because they cannot be handled.
The packets are prioritized in accordance with IP Precedence.
The packets are forwarded without prioritization.
The packets will be re-classified and re-marked by the router.
--------------------------------------------------------------------------------
---------------
Where in a Carrier Ethernet Network will the tags be assigned to a service fra
me?
(2 of 4 answers are correct)
C-tag and S-tag can be added by the provider.
The C-tag is always added by the customer, the S-tag is always added by the
provider.
RADIUS
PKI
WPA
MAC Filtering
-------------------------------------------------------------------------------
---
What mechanism does a SIP telephone use to identify the IP address of the SIP
proxy server for a called party? 1
(1 of 4 answers is correct)
Registration request
Admission request
DNS request
ARP request
-------------------------------------------------------------
Which command can be entered in a DOS Shell on a Windows operating system to d
isplay the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route
--------------------------------------------------------------------------------
-------------------
Which of the following protocols can be used to setup an point-to-point connec
tion for IP traffic? 1,2,3
(3 of 4 answers are correct)
PPP
HDLC
L2TP
MSV1
--------------------------------------------------------------------
What are properties of OSPF? 1,4
(2 of 4 answers are correct)
OSPF is a proprietary routing protocol.
OSPF is a distance vector routing protocol.
Increased bandwidth
-------------------------------------------------------------------------------
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728
-------------------------------------------------------------------------------
-
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.
--------------------------------------------------------------------------------
-------------
How are Internet Control Message Protocol (ICMP) messages processed? 2,3
(2 of 4 answers are correct)
The messages are encapsulated in UDP datagrams.
The messages are encapsulated in IP datagrams.
The messages are processed by the application and are not visible to the use
r.
The messages have to be processed by the application user.
--------------------------------------------------------------------------------
--------
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoI
P for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.
--------------------------------------------------------------------------------
--------------
What is defined by Layer 3 of the OSI Reference Model? 2,3
(2 of 4 answers are correct)
The access controls to the media.
The logical addresses for hosts.
(1 of 4 answers is correct)
To log call charge data of VoIP calls.
The monitoring of the transmission quality.
To negotiate codecs and features.
To monitor bandwidth.
-------------------------------------------------------------------------------
-
Which of the following defines "encapsulation"? 1
(1 of 4 answers is correct)
The conversion of layer 1 information to layer 2 information.
To place data of a higher layer into a frame of the lower one.
The conversion of application data directly into electrical signals.
To place data of a lower layer into the frame of the next higher layer.
--------------------------------------------------------------------------------
--------------
Which of the following are the minimum network settings for a PC? 1,2
(2 of 4 answers are correct)
Subnet Mask.
IP Address.
DNS Entry.
WINS Entry.
-------------------------------------------------------------------------------
----------
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.
----------------------------------------------------------------------------
What is a function of a SIP proxy? 2
(1 of 4 answers is correct)
--------------------------------------------------------------------------------
------
Which of the following protocols is used to resolve the IP address to a URI (U
niform Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225
SMTP
-------------------------------------------------------------------------------
---------------------
How many bytes are used for a MAC address in an IEEE 802.3 network? 3
(1 of 4 answers is correct)
2
4
6
8
------------------------------------------------------------------------
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.
----------------------------------------------------------------------------
Which of the following is the default port associated with SNMP agent? 3
(1 of 4 answers is correct)
110
143
161
162
--------------------------------------------------------------------------------
--
What is in the SPF (Shortest Path First) algorithm inversely proportional to t
he bandwidth? 4
(1 of 4 answers is correct)
Link state.
Link cost.
Root cost.
Hop count.
--------------------------------------------------------------------------
Which of the following is true for Priority Queuing? 1
(1 of 4 answers is correct)
Low priority applications may not get sufficient bandwith if there is too mu
ch traffic in higher priority queues.
The throughput of high priority traffic depends on the volume of lower prior
ity traffic.
All applications are processed identically, leaving insufficient bandwidth f
or high priority traffic.
The algorithm causes large delays because of the high processor time require
d.
-------------------------------------------------------------------------------
--
How is it called to secure data against unwanted reading? 2
(1 of 4 answers is correct)
Privatizing
Ciphering
Scrambling
Protection
---------------------------------------------------------------------------
Which of the following elements typically belong to a SIP architecture? 1,2,4
(3 of 4 answers are correct)
PROXY server
User agent
Gatekeeper
Gateway
-------------------------------------------------------------------------------
-
What is displayed on the console, when starting a Cisco router? 3
(1 of 4 answers is correct)
Cisco IOS Software output text.
Cisco IOS diagnostic menu.
Cisco console menu.
Status of the router's LEDs.
-------------------------------------------------------------------------------
-----------
What does the term "QoS" stand for in connection with the concept and the capa
bility of IP or VoIP solutions? 1,3
(2 of 4 answers are correct)
Guarantee of voice quality in VoIP connections.
Increase in the reliability of telephones.
Predictable transmission performance.
Optimization of system maintenance.
-------------------------------------------------------------------------------
------------
Which of the following statements about FTP are correct? 1,2,4
(3 of 4 answers are correct)
FTP passwords are transmitted in a protected way.
FTP passwords are not encrypted on transmission.
The user "anonymous" is a security risk.
Access rights for files and directories must be carefully applied.
-------------------------------------------------------------------------------
--
For what can UDP (User Datagram Protocol) be used? 2
(1 of 4 answers is correct)
UDP is used for secured transport of data.
--------------------------------------------------------------------------------
-----------------------
How many AF codepoints can be mapped within DSCP? 2
(1 of 4 answers is correct)
8
12
32
64
-------------------------------------------------------------------------------
--------------
What is the difference between an ethernet hub and an ethernet switch? 2,4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
A switch offers better performance as it operates collision-free.
For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch.
-----------------------------------------------------------------------------
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased voice traffic.
--------------------------------------------------------
With what responds a remote node using CHAP after receiving a challenge message
? (CHAP = Challenge Handshake Authentication Protocol) 4
(1 of 4 answers is correct)
Return challenge
Plaintext password
Encrypted password
Hash value
(1 of 4 answers is correct)
The DNS suffix is the complete name of the DNS server.
The DNS suffix is a suffix for the DNS server so that it works faster.
The DNS suffix is a suffix which is used in a WINS environment.
The DNS suffix is added as a suffix to the computer name to identify it clea
rly in a network.
How are Internet Control Message Protocol (ICMP) messages processed? 2,3
(2 of 4 answers are correct)
The messages are encapsulated in UDP datagrams.
The messages are encapsulated in IP datagrams.
The messages are processed by the application and are not visible to the use
r.
The messages have to be processed by the application user.
You wish to permanently prevent access to Internet IP address 2.2.2.2 from all
systems in your network. Which technology should you configure to achieve this
objective? 2,3
(2 of 4 answers are correct)
Personal firewall.
The packet filter of the proxy server.
The packet filter of the internet router.
Virus scanner.
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.
How is it possible that JAVA programs can be executed from practically every Web
client? 1
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the clie
nt.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web
server.
Packet Filtering.
Application Level Gateway.
Discarding Gateway.
It responds to signaling messages and answers the sender with a new destinat
ion address.
It responds to signaling messages and answers the destination with a new sen
der address.
Which of the following have highest priority when designing VoIP networks? 1,
2
(2 of 4 answers are correct)
Packet delay and jitter.
Packet throughput and loss.
Type of terminals and NICs.
Number of gateways.
(1 of 4 answers is correct)
G.711
G.723.1
G.728
G.729A
Which of the following statements about the use of Ethernet switches are correct
? 1,2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.
The number of network collisions in switches increases slightly.
Cascading can lead to bottlenecks.
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a
Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.
During session setup the terminating S-CSCF has to forward the "Invite" message
to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retrieves
the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.
Which command can be entered in a DOS Shell on a Windows operating system to dis
play the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route
Which information send a distance vector router to its neighbor routers as par
t of a periodic routing table update? 3
(1 of 4 answers is correct)
Only routes that have changed.
Routes that no longer exist.
The entire routing table.
Only information about new routes.
172.16.8.255
64.32.16.8
127.0.0.1
192.168.100.142
Which of the following protocols can be used for enhanced security in VoIP netwo
rks? 2,4
(2 of 4 answers are correct)
RTP
Secured RTP (SRTP)
SIP via UDP
SIP via TLS/SSL
DNS is used to lookup the IP address of the old SGSN from the old RAI during
inter-SGSN routing area update.
DNS is used by the MS/UE to translate the internet domain or host name into
IP addresses.
Which command can be entered in a Windows operating system to add a static rou
tes? 1
(1 of 4 answers is correct)
route add [destination] [mask] [gateway] [metric] -p
tracert [destination] [mask] [gateway] [metric] -p
route config [destination] [mask] [gateway] -p
iproute add [destination] [mask] [gateway] -p
Which of the following are the tasks of DiffServ in Quality of Service? 1,2
(2 of 4 answers are correct)
Classification of packets into QoS classes.
Reservation of paths in a multiservice network.
Specification of drop precedence.
Registration of routing information.
Which of the following e-mail protocols supports personal folder mailboxes with
offline management? 2,3
Which of the following are the types of management units defined within SNMP? 3,
4
(2 of 4 answers are correct)
Supervisor
Manager
Agents
Nodes
IDS probes
NIC
How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gener
ated? 3
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses.
The Link Control Protocol (LCP).
How should the jitter buffer be configured for optimum voice quality? 3
(1 of 4 answers is correct)
The jitter buffer has nothing to do with the voice quality.
The jitter buffer should be set to a packet length so it does not cause any
delays.
The jitter buffer should be set as high as possible so that it does not caus
e any delay.
The jitter buffer should be configured based on the actual state of the cust
omer's network.
Which of the following statements about the Spanning Tree Algorithm is correct?
4
(1 of 4 answers is correct)
Spanning Tree is used to find the shortest path through an IP Network.
Spanning Tree is used to find the path with the maximum bandwidth in the LAN
.
Spanning Tree is used to distribute VLAN information to all Layer 2 switches
.
Spanning Tree is used to compute unique paths across a meshed network of lay
er 2 bridges/switches.
What is the typical bitrate for the transmission of a good quality SDTV (Stand
ard-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
Which Cisco IOS command displays static route information on a Cisco router? 3
(1 of 4 answers is correct)
show ip static route
show route ip static
show ip route
show route ip
integrated into the IP-CAN access procedure; e.g. during the PDP context act
ivation in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
via a HSS-HLR interrogation during registration.
by an end to end QoS parameter retrieval from the PDF.
G.729
Which of the following terms and definitions are specified in the Data Link La
yer of the OSI Reference Model? 1,3,4
(3 of 4 answers are correct)
Use of physical addresses.
Use of logical addresses.
Access method to the media.
The Bit Check Sequence of the data frames.
Which of the following Windows commands allows you to release and renew your DHC
P-provided IP address? 2
(1 of 4 answers is correct)
release /ip
ipconfig /renew
ipconfig /release
ifconfig -renew
Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1
(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.
Which of the following are of greatest concern when designing VoIP networks?
1,2,4
(3 of 4 answers are correct)
Packet delay and jitter.
Packet throughput and loss.
Type of terminals and NICs.
QoS implementation
An IP packet can be labelled with at most how many labels? 4
(1 of 4 answers is correct)
1
2
3 (1 customer label, 2 provider labels).
Unlimited
console access
user-level access
ACL access
EXEC-level access
Which of the following DiffServ Code Points (DSCP) sets the highest priority o
n packets? 3
(1 of 4 answers is correct)
First In First Out.
Best Effort.
Expedited Forwarding.
Assured Forwarding.
Which of the following protocols is NOT used in the IMS (IP Multimedia Subsyst
em)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)
Which task within PPP does the Link Control Protocol have? 1
(1 of 4 answers is correct)
Setup of a Layer 2 connection.
Configuration of Network Layer protocols.
HDLC frame generation.
Temporary IP address assignment.
If all the bits of a host ID are set to binary "1", what does this define?
3
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A Loopback.
2)
What can be done to increase wireless security? 1
(1 of 4 answers is correct)
Disabling SSID broadcasts.
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.
3)
Which of the following messages is sent by a system supporting IntServ when re
ceiving a path message? 2
(1 of 4 answers is correct)
Release complete
Reserve message
Alerting message
Status inquiry
4)
Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0? 2
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.
5)
Which of the following statements about a digital certificate are correct? 2
,4
(2 of 4 answers are correct)
It is a message that ensures the priority of the sent data.
It is sent on request of a peer requiring an authentication.
A new certificate is created for each message.
6)
Which of the following fields identifies the protocol used in the data field of
an Ethernet frame? 1
(1 of 4 answers is correct)
Type
Destination address
Checksum
Source address
7)
Which connection requiers a crossover LAN cable? 2
(1 of 4 answers is correct)
PC to a switch.
PC directly to another PC.
PC to a modem.
PC to a hub.
8)
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.
9)
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? 1
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT
10)
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol
Real Time Streaming Protocol
11)
Which of the following is the default CoS for voice traffic in IEEE 802.1 p/Q?
1
(1 of 4 answers is correct)
0
1
7
6
12)
Which of the following answers describes Random Early Detection (RED)?
3
(1 of 4 answers is correct)
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased
13)
What is the default port number (decimal) of Telnet? 2
(1 of 4 answers is correct)
21
23
25
53
14)
Which of the following is true regarding SNMP communities? 3,4
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access.
The trap community must be the same as the public community.
15)
What is the purpose of Multipurpose Internet Mail Extensions (MIME)? 2
(1 of 4 answers is correct)
MIME contains information on how to forward e-mails if the mailbox is not on
the local mail server.
MIME supports in emails the transfer of data in any format.
MIME defines the mailbox properties, like the size of box and messages.
MIME is used to authenicate e-mail clients and for the encoded transfer of d
ata between
16)
If both the "enable secret" and the "enable password" commands are configured
on the Cisco router, how do you get to the # prompt? 4
(1 of 4 answers is correct)
Use the "enable password" command.
Use the "enable secret" command.
Use either the "enable secret" OR the "enable password" command.
Use both the "enable secret" AND the "enable password" commands.
17)
Which of the following cable categories can be used with the IEEE 802.3af standa
rd? 1,2,3
(3 of 4 answers are correct)
Cat 3
Cat 4
Cat 5
Cat 6
18)
Which of the following protocols are connection-oriented? 1,3
(2 of 4 answers are correct)
HDLC
IP
TCP
UDP
19)
Which of the following is true regarding SNMP MIB? 2,3
(2 of 4 answers are correct)
Each MIB file must contain a public and private entries.
It is a database of industry defined standards for a particular SNMP version
.
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database.
20)
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server
Redirect server
21)
How does a distance vector router learn about networks that are NOT directly con
nected? 4
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.
22)
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.
23)
TCP-Ports are essential components for communication in the IP environment. Wh
ich statement is correct? 3
(1 of 4 answers is correct)
TCP-Ports are fixed and can never be changed.
Ports are used for identifying the routing protocol used.
Ports are used for identifying applications or processes.
Ports define whether you are working with TCP or UDP.
24)
Which term is last default entry at the end of every ACL on a Cisco Router?
2
(1 of 4 answers is correct)
implicit deny host
implicit deny any
deny ip
ip deny any
25)
Which statements about the QoS mechanism DiffServ are correct? 1,2,4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.
26)
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.
27)
Which of the following statements about ERPS (Ethernet Rings Protection Switchin
g) are true? 2, 3
(2 of 4 answers are correct)
ERPS guarantees recovery times of below 50ms, whilst Spanning Tree algorithm
s have recovery times of several seconds.
ERPS can only be implemented on rings, whilst Spanning Tree protocols can be
used on any topology.
ERPS converges faster than Spanning Tree algorithms and, depending on the ne
twork size, can offer recovery times of below 50ms.
With ERPS, the network operator has more influence on the active topology th
an when using a Spanning Tree algorithm.
28)
What is the maximum bandwidth of the IEEE 802.11g specification? 4
(1 of 4 answers is correct)
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s
29)
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoIP
for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.
30)
What is latency in a VoIP network? 1
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation.
31)
Which of the following statement describes the behavior of a color aware UNI (Us
er Network Interface) according to the Metro Ethernet Forum? 1
(1 of 4 answers is correct)
Color marking of incoming frames is preserved.
Incoming yellow frames are metered and marked as yellow or red, according to
their SLA compliance.
Incoming green frames are metered and marked as green, yellow or red accordi
ng to their SLA compliance.
Outgoing frames are color marked.
32)
What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? 2
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)
33)
What is the length of the host ID for an IPv4 address? 4
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask.
34)
35)
Which of the following networks elemets are used in a Voice over Cable network?
1,2,3
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).
Cable Modem Termination System (CMTS).
36)
Which guidelines apply to IP addressing? 1,2,,3
(3 of 4 answers are correct)
The number 127 may not be used as the first octet for the network.
The host ID may not consist only of the value 0.
37)
Which of the following statements about TCP/UDP is correct? 1
(1 of 4 answers is correct)
Only TCP guarantees that the sent data has reached the peer completely.
Only UDP guarantees that the sent data has reached the peer completely.
Both TCP and UDP guarantee that the sent data has reached the peer completel
y.
Both TCP and UDP do not guarantee that the sent data has reached the peer co
mpletely.
38)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
39)
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.
40)
Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1
(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.
41)
Which of the following are NOT valid parts of IPv4 subnetwork masks? 1,2
(2 of 4 answers are correct)
"1101 1111"
"1111 1100"
"1101 10"
"1000 00"
42)
What is the difference between an ethernet hub and an ethernet switch? 2,
4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
43)
44)
Which of the following connections support IEEE 802.3ad Link Aggregation ? 2,4
(2 of 4 answers are correct)
Multipoint
Full duplex
Half duplex
Point to Point
45)
Which of the following protocols is NOT used in the IMS (IP Multimedia Subsystem
)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)
46)
How many TEIDs has an active PDP context assigned at least between SGSN and GG
SN: 1
(1 of 4 answers is correct)
2
4
8
0
47)
How does the analogue to digital and digital to analogue conversion affect the t
otal propagation time of a packet? 3
(1 of 4 answers is correct)
It has an impact of approx. 20 ms per conversion.
It has an impact of approx. 10 ms per conversion.
48)
Which of the following authentication protocols are supported by PPPoE? 3,4
(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN
49)
Which of the following statements about the use of Ethernet switches are correct
? 1, 2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.
The number of network collisions in switches increases slightly.
Cascading can lead to bottlenecks.
50)
What does Class of Service (CoS) refer to in the context of Carrier Ethernet?
2
(1 of 4 answers is correct)
Any classification of frames inside the MEN.
The possibility to offer different service levels like premium, controlled l
oad, standard, best effort etc. to end customers.
The priority bits of the VLAN tag.
Different service types like point-to-point, multipoint-to-multipoint and po
int-to-multipoint.
51)
How many ACLs per protocol, per direction and per interface can be applied on a
Cisco router? 1
(1 of 4 answers is correct)
1
2
4
any number
52)
53)
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.
54)
Which protocol does a router use to determine the MAC address to deliver an in
coming packet? 2
(1 of 4 answers is correct)
ICMP
ARP
SMTP
UDP
55)
Which of the following e-mail attachments can contain Trojan horses? 3,4
(2 of 4 answers are correct)
Sales.txt
Sales.doc
Sales.ini
Sales.exe
56)
Which of the following statements is correct about MAC addresses? 3
(1 of 4 answers is correct)
It indicates the maximum supported bit rate.
It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.
57)
What can be configured on a Cisco router with the user EXEC mode commands?
4
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.
58)
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728
59)
Which of the following statements describe the function of routing tables? 1
,2
(2 of 4 answers are correct)
Routing tables contain metrics that are used to determine the acceptability
of the route.
When a router receives an incoming packet, it uses the source address and se
arches the routing table to find the best path for the data from that source.
Although routing protocols vary, routing metrics do not.
Routing tables provide an ordered list of known network addresses.
60)
Which firewall types are valid? 2,4
(2 of 4 answers are correct)
Bridge Filter Firewall.
Packet Filter Firewall.
NIC Filter Firewall.
Application Filter Firewall.
61)
Which of the following statements about MAC addresses in an Ethernet topology
are correct? 2,3
(2 of 4 answers are correct)
It is encrypted and can not be masked.
It must be unique within the network.
It is represented in hexidecimal format.
It can only be bound to one network protocol at layer 3.
62)
Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.
63)
64)
Which part of the IP address evaluates the router with the help of the subnet ma
sk? 3
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.
65)
Which statements about VPN are correct? 1,3
(2 of 4 answers are correct)
VPN is a private, logical network.
VPN has no security mechanisms.
IP-based VPNs can be based on the PPP protocol with IP tunnelling.
VPN requires less configuration than conventional LAN links.
66)
What is the meaning of "Tail Dropping"? 1
(1 of 4 answers is correct)
Incoming packets are dropped if the buffer is full.
Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priori
ty queues.
Packets arrving with a high delay are dropped because they are considered us
eless for the application.
67)
68)
Which of the following statements about the ToS field are correct? 1,3
(2 of 4 answers are correct)
It is part of the IP header.
It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field.
69)
70)
Which command can be entered in a DOS Shell on a Windows operating system to d
isplay the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route
71)
443
4060
5060
72)
Which of the following protocols is used to resolve the IP address to a URI (Uni
form Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225
SMTP
73)
74)
75)
76)
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a
77)
78)
79)
On which Internet standards is SIP based on? 1,2
(2 of 4 answers are correct)
Hypertext Transfer Protocol
Simple Mail Transport Protocol
Post Office Protocol
Simple File Transfer Protocol
80)
Which of the following devices is used to reduce the effects of broadcast storms
? 2
(1 of 4 answers is correct)
Ethernet hub
Router
Gatekeeper
Repeater