Sie sind auf Seite 1von 155

1) The ERPS protocol provides redundancy for Ethernet rings.

How is redundancy
achieved? (3)
(1 of 4 answers is correct)
By sending service frames in both directions on the ring and using the one t
hat arrives first.
ERPS works on two unidirectional rings. One ring carries the working paths,
one ring carries the protection paths. Path integrity is supervised by control p
ackets.
ERPS blocks one link on the ring to prevent loops, while forwarding is based
on MAC learning. In failure case, the blocked link will be unblocked and the MA
C addresses will be re-learnt.
ERPS is a derivative of MSTP. BPDUs identify the active portion of the ring
and the ring port to be blocked. In failure case, the blocked link will be unblo
cked and the MAC tables will be re-learnt.

2)
How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gener
ated?
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses. yes
The Link Control Protocol (LCP).
3)
What is the purpose of a DNS suffix? 4
(1 of 4 answers is correct)
The DNS suffix is the complete name of the DNS server.
The DNS suffix is a suffix for the DNS server so that it works faster.

The DNS suffix is a suffix which is used in a WINS environment.


The DNS suffix is added as a suffix to the computer name to identify it clea
rly in a network.

4)
In which field of the IPv4 header is priority marking performed?
(1 of 4 answers is correct)
Protocol field.
ToS field. yes
Identification field.
Sequence field.

5)
What is used on a local computer for dynamic display of web pages?
(1 of 4 answers is correct)
CGI-Scripts
JavaScripts yes
POP3
MIME

6)
Which of the following are the minimum network settings for a PC?
(2 of 4 answers are correct)

Subnet Mask. yes


IP Address. yes
DNS Entry.
WINS Entry.

7)
Which of the following is the Authentication Server when using EAP?
(1 of 4 answers is correct)
DNS server
RADIUS server yes
DHCP server
Exchange-Server

8)
Which of the following IP addresses is the broadcast IP address for the networ
k 10.10.1.128 with subnetwork mask 255.255.255.128?
(1 of 4 answers is correct)
10.10.1.1
10.10.1.0
10.10.1.255 yes
10.10.1.254
9)
What can be configured on a Cisco router with the user EXEC mode commands?
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router. yes
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information. yes

10)
Which of the following statements are advantages of using DHCP?
(3 of 4 answers are correct)

Efficient use of existing IP addresses. yes


Less administration of the network settings at the client PC.
Changes in network settings are only entered once in the DHCP server. yes
No additional network administration is necessary. yes

11)
Which of the following networks elemets are used in a Voice over Cable network?
(3 of 4 answers are correct)
Call Management Server (CMS). yes
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM). yes
Cable Modem Termination System (CMTS). yes

12)
What is used to determine speech quality?
(1 of 4 answers is correct)
Transmission Control Protocol
Signaling Standard 7
Erlang Scale
Mean Opinion Score yes
13)
Which Cisco IOS command displays the memory usage of a Cisco IOS image that is
stored on the router?
(1 of 4 answers is correct)
show image ram
show nvram yes
show flash
show startup-config

14)
Which of the following protocols are used for VoIP payload?
(2 of 4 answers are correct)
UDP yes

RTP yes
MCU
SIPS

15)
Which of the following DiffServ Code Points (DSCP) sets the highest priority on
packets?
(1 of 4 answers is correct)
First In First Out.
Best Effort.
Expedited Forwarding. yes
Assured Forwarding.

16)
Which of the following criteria are used to calculate the Spanning Tree topology
?
(3 of 4 answers are correct)
MAC-address yes
IP-address
Root path cost yes
Bridge Priority yes

17)
What is used in VoIP to calculate the jitter?
(1 of 4 answers is correct)
RTP timestamps. yes
RTP sequence numbers.
QoS labels.
Header compression.

18)
Which protocol is used for the control of video on demand sessions?
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol

Video Control Protol


Real Time Streaming Protocol yes

19)
What are advantages of proxy servers?
(2 of 4 answers are correct)
Higher performance when using caching features. yes
Higher security through the blocking of applications. yes
Application-level encryption such as HTTPS.
Inside hosts do not need any official IP address anymore
20)
Which of the following devices use ARP?
(2 of 4 answers are correct)

IP telephone yes
Router yes
Repeater
Hub

21)
Which of the following statements about IP routing is true? (3)
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS
22)
Which of the following statements about the information distribution in GPRS is
true?
(2 of 4 answers are correct)
The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context. yes

In error free operation the UL and DL GTP sequence numbers for a PDP context
on Gn interface are strictly increasing even when RABs or packet flows have bee
n deleted and re-established. yes

23)
Which of the following statements is NOT correct?
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario. yes
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.

24)
What is the network ID for the IP Address 115.150.177.44/255.192.0.0?
(1 of 4 answers is correct)
115.0.0.0
115.64.0.0
115.128.0.0
115.192.0.0 yes

25)
Which of the following statements regarding FIFO queuing mechanisms is correct?
(1 of 4 answers is correct)
Packets with the highest priority are forwarded first.
Prioritization is used to decide which packets can be rejected.
Packets are forwarded in the same sequence as they arrive. y
es
The last packet received is the first packet to be forwarded.

26)
What increases the risk of network security?
(1 of 4 answers is correct)
Professional administration of a network.
Using software from an unknown source. yes

Security training for employees.


Using secure passwords.

27)
What happens to the priority of a packet marked with DSCP when it passes a route
r that only supports IP precedence?
(1 of 4 answers is correct)
The packets are rejected because they cannot be handled.
The packets are prioritized in accordance with IP Precedence. yes
The packets are forwarded without prioritization.
The packets will be re-classified and re-marked by the router.

28)
Which parts of an IP header are processed by a router?
(2 of 4 answers are correct)
Host ID. yes
Network ID. yes
Time To Live.
Data checksum.

29)
Which bits of the TOS byte are used for DSCP?
(1 of 4 answers is correct)
The most significant 3 bits.
The most significant 6 bits. yes
The least significant 3 bits.
The least significant
30)
How is a VPLS (Virtual Private LAN Service) kept loop-free?
(1 of 4 answers is correct)
By a Spanning Tree Protocol.
By the "split horizon" rule. yes
By building a loop-free tree of pseudo-wires.
By eliminating MAC learning.

31)
Which of the following is true regarding SNMP communities?
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access. yes
The trap community must be the same as the public community.

32)
What is a function of a SIP proxy?
(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the recipient and may
convert them.
It responds to signaling messages and transfers these unchanged to the recip
ient. yes
It responds to voice data, forwards this to the recipient and rewrites the R
TP header.
It responds to voice data, forwards this to the recipient and does not chang
e the RTP header.

33)
Which of the following entries can be specified in the DHCP Scope? 3,4
(2 of 4 answers are correct)
WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.

34)
How many TEIDs has an active PDP context assigned at least between SGSN and GGSN
:
(1 of 4 answers is correct)
2 yes
4
8

35)
Which Cisco IOS command displays static route information on a Cisco router?
(1 of 4 answers is correct)
show ip static route
show route ip static
show ip route yes
show route ip

36)
Which statements concerning VPN are correct?
(2 of 4 answers are correct)

VPN connections offer higher transmission quality than leased lines.


VPN connections can be used for the combination of voice and data traffic.
yes
VPN connections create secure tunnels through public networks. yes
VPN connections never need authentication.

37)
How many priority levels are there within IP Precedence?
(1 of 4 answers is correct)
3
8 yes
16
64

38)
Which of the following signaling protocols can be used to connect an IP-PBX to
a SIP-Proxy / SIP Application Server?
(2 of 4 answers are correct)
SIP-Connect yes
SIP-NNI
MGCP yes
RTP

39)
What can be done to increase wireless security?
(1 of 4 answers is correct)
Disabling SSID broadcasts. yes
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.

40)
What is the broadcast address for a host with the IP address 132.17.100.23/255
.255.192.0?
(1 of 4 answers is correct)
132.17.100.255

132.17.128.0
132.17.127.255
132.17.255.255 yes

41)
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities. yes
DiffServ is a protocol used to route data through a network. yes
DiffServ creates service classes yes
42)
Which of the following tasks are assigned to SNMP agents?
(3 of 4 answers are correct)
SNMP Agents have to be installed in a network to make nodes manageable. (w)
yes
An agent has local knowledge of management information from a network node.
yes
Agents have to forward the activities and traps of the network nodes. yes
Agents send SNMP messages to a management system.

43)
Which of the following protocols work with MPLS?
(3 of 4 answers are correct)
Ethernet yes
Frame Relay yes
ATM yes
Token Ring

44)
The filter criteria 2
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against D
OS attacks.
are evaluated by the S-CSCF, to find informations and conditions allocated t
o the user to handle user and event specific services e.g. by consulting an appl
ication server.
are used in the subscription location function to select the HSS in an user
specific way.
are used for real time protocol bearer traffic to control the priority of th
e
45)
Mark the correct answers!
(3 of 4 answers are correct)
DNS is used to dynamically assign an IP address to a GPRS user during PDP co
ntext activation.
DNS is used to translate the APN in the SGSN to a suitable GGSN IP address d
uring PDP context activation. yes
DNS is used to lookup the IP address of the old SGSN from the old RAI during
inter-SGSN routing area update. yes
DNS is used by the MS/UE to translate the internet domain or host name into
IP addresses. yes

46)
Which Cisco IOS command has to be used to see who has Telnet sessions to a route
r?
(1 of 4 answers is correct)
show user yes
show telnet
show session

show interface

47)
Which of the following protocols is used to resolve the IP address to a URI (U
niform Resource Identifier)?
(1 of 4 answers is correct)
SDP
DNS yes
H.225
SMTP

48)
Which of the following statements about VoIP connections are correct?

(3 of 4 answers are correct)


Delay has a major impact on the voice quality. yes
Decoding and encoding cause a delay.
Routers do not cause delay. yes
The longer the delay the worse the voice quality. yes

49)
Which framing procedure is always used within NG-SDH to encapsulate Ethernet ser
vice frames?
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure) yes

50)
What codec offers ISDN voice quality?
(1 of 4 answers is correct)
G.711 yes
G.723.1
G.728
G.729A

51)
Which of the following statements about DMZ is correct? 1
(1 of 4 answers is correct)
It is a network area that can be reached from the intranet and from the Inte
rnet and is protected by firewalls.
DMZ is a network area that is separated from the Internet by a firewall and
cannot be accessed from the intranet.
DMZ is a network area that cannot be accessed from the Internet.
It is a network area that can be reached from the intranet and from the Inte
rnet
52)
Which characteristics has a UTP cable?
(2 of 4 answers are correct)

The wires in each pair are wrapped around each other.


yes
An insulating material covers each of the individual copper wires in UTP cab
le.
An UTP cable has eight wires. yes
UTP cable is an eight-pair wire.

53)
Which protocols work in a connection-oriented way?
(2 of 4 answers are correct)
Frame Relay protocol. yes
Internet protocol.
Transmission Control protocol. yes
User Datagram protocol.

54)
What are transition mechanisms for IPv6?
(2 of 4 answers are correct)
IPv6-over-IPv4 tunneling
Mobile IPv6
IPSec yes
Dual stack

55)
When logging on to a server, which of the following ensures the user's identit
y?
(1 of 4 answers is correct)
Auto-configuration
Administration
Authentication yes
Authorization

56)
Which of the following is true regarding SNMP MIB?
(2 of 4 answers are correct)

Each MIB file must contain a public and private entries.


It is a database of industry defined standards for a particular SNMP version
. yes
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database. yes

57)
What is true about the root bridge of a converged topology of an Spanning Tree P
rotocol (STP) network?
(1 of 4 answers is correct)
It is always the bridge with the lowest MAC address from all of its ports.
It is the bridge with the smallest triple (bridge priority, bridge identifie
r, lowest MAC address of all ports). yes
It is the bridge with the root port assigned.
It is the bridge connected to the backbone router.

58)
Which of the following statements describes the task of the jitter buffer in an
IP telephone?
(1 of 4 answers is correct)
It converts voice data into RTP packets.
It requests all the lost voice packets from the sender.
It stores the music on hold files and plays them on demand.

It stores the incoming voice packets and sends them out in evenly spaced int
ervals. yes

59)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s yes
4 Mbit/s
8 Mbit/s

60)
Which of the following statements apply to IEEE 802.1p/Q?

(3 of 4 answers are correct)


Tags are inserted into the MAC frame. yes
802.1p/Q operates with 8-level prioritisation. yes
Packets can be switched between high and low priority queues. yes
The tasks are also called LLC (Logical Link Control).

61)
Which technology has been designed in WLAN to replace WEP (Wired Equivalent Priv
acy)?
(1 of 4 answers is correct)
RADIUS
PKI
WPA yes
MAC Filtering

62)
When you launch a PING command, you are using which protocol?
(1 of 4 answers is correct)
TCP
UDP
ICMP yes

RSVP

63)
Which of the following elements typically belong to a SIP architecture?
(3 of 4 answers are correct)
PROXY server yes
User agent yes
Gatekeeper
Gateway yes

64)
What happens when latency in a VoIP call is more than specified?
(1 of 4 answers is correct)

The end users become dissatisfied because of voice quality. y


es
The end user gets a busy signal when placing a call.
The IP phone display doesn't work.
IP calls cannot be transferred.

65)
Which of the following are of greatest concern when designing VoIP networks?
(3 of 4 answers are correct)
Packet delay and jitter. yes
Packet throughput and loss. yes
Type of terminals and NICs.
QoS implementation yes

66)
During session setup the terminating S-CSCF has to forward the "Invite" message
to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retrieves
the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

67)
Which of the following differences between SIP and
are correct?
(2 of 4 answers are correct)
SIP offers easier scalability and expandability than H.323.
SIP uses intelligent terminals compared with H.323 terminals. yes
SIP uses text based message encoding, H.323 uses binary.
yes
SIP offers integrated load balancing, H.323 does not.

68)
How many AF codepoints can be mapped within DSCP?
(1 of 4 answers is correct)
8
12 yes
32
64

69)
Which of the following statements describe the logical topologies?
(1 of 4 answers is correct)
A logical topology depends solely on the type of computers to be included in
the network.
A network cannot have different logical and physical topologies.
A logical topology describes the paths that the signals travel from one poin
t on a network to another. yes
A logical topology defines the way in which the computers, printers and othe
r devices are connected.

70)
Which of the following elements represent an Intrusion Detection System (IDS)?
(2 of 4 answers are correct)
Actuators

Sensors yes
Management Stations yes
Couplers

71)
How are computer viruses commonly spread?
(3 of 4 answers are correct)
Via VoIP.
Via emails. yes
Via web site. yes
Via file downloads. yes

72)
Which of the following statements about the Spanning Tree Algorithm is correct?
(1 of 4 answers is correct)
Spanning Tree is used to find the shortest path through an IP Network.
Spanning Tree is used to find the path with the maximum bandwidth in the LAN
.
Spanning Tree is used to distribute VLAN information to all Layer 2 switches
.
Spanning Tree is used to compute unique paths across a meshed network of lay
er 2 bridges/switches. yes
73)
Which of the following specifications is not defining a call set up control prot
ocol?
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS yes
H.323

74)
What is the definition of BGP peers?
(1 of 4 answers is correct)
Routers exchanging BGP messages. yes

Routers connected by a common link that exchange BGP messages.


Routers who successfully exchange hello packets.
Routers who agree upon the
75)
Which attributes describes TCP?
(3 of 4 answers are correct)
The receiver returns an acknowledgment to the sender indicating that it rece
ived the packets. yes
The receiver can reorder packets and determine if a packet is missing.
yes
TCP provides no recovery service.
TCP is a connection-oriented protocol. yes

76)
Which of the following OSI model layers correspond to the TCP and IP protocols?
(2 of 4 answers are correct)
Physical Layer
Session Layer
Network Layer yes
Transport Layer yes

77)
Which statements describe data-link protocols in a WAN?
(2 of 4 answers are correct)
OSPF is a typical data-link protocol.
Data link layer protocols define how data is encapsulated for transmission t
o remote sites. yes
Data link layer protocols determine the cable type to be used in the WAN.
Many data link layer protocols use a framing mechanism similar to HDLC.
yes

78)
Which of the following is a feature of the Resource Reservation Protocol (RSVP)?

(1 of 4 answers is correct)
The option to use encryption for the internet access.

Signalling of "Per Hop Behavior" in the TCP header.


Transfer of small packets before the large packets.
Signaling bandwidth requirements. yes

79)
What is the length of the host ID for an IPv4 address?
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask. yes

80)
Select the correct statements about the advantages of QoS in VoIP solutions.
(2 of 4 answers are correct)
Improved satisfaction of the end user because of better voice quality.
yes
Enhanced division of bandwidth for voice and data.
Improved productivity due to the automatic queuing and distribution of calls
to IP workpoints. yes
Cost avoidance because of the automatic selection of the least cost route fo
r IP calls.
--------------------------------------------------------------------------------
---------------------------------------------

1)
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

2)
What can be done to increase wireless security? 1
(1 of 4 answers is correct)
Disabling SSID broadcasts.
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.

3)
Which of the following messages is sent by a system supporting IntServ when re
ceiving a path message? 2
(1 of 4 answers is correct)
Release complete
Reserve message
Alerting message
Status inquiry
4)
Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0? 2
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.

5)
Which of the following statements about a digital certificate are correct? 2
,4
(2 of 4 answers are correct)
It is a message that ensures the priority of the sent data.
It is sent on request of a peer requiring an authentication.
A new certificate is created for each message.
It is issued by a Certification Authority (CA).

6)
Which of the following fields identifies the protocol used in the data field of
an Ethernet frame? 1
(1 of 4 answers is correct)
Type
Destination address
Checksum
Source address

7)
Which connection requiers a crossover LAN cable? 2
(1 of 4 answers is correct)
PC to a switch.
PC directly to another PC.
PC to a modem.
PC to a hub.
8)
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.

9)
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? 1
(1 of 4 answers is correct)

FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT

10)
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol

Real Time Streaming Protocol

11)
Which of the following is the default CoS for voice traffic in IEEE 802.1 p/Q?
1
(1 of 4 answers is correct)
0
1
7
6
12)
Which of the following answers describes Random Early Detection (RED)?
3
(1 of 4 answers is correct)
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased
13)
What is the default port number (decimal) of Telnet? 2
(1 of 4 answers is correct)
21
23
25
53

14)
Which of the following is true regarding SNMP communities? 3,4
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access.
The trap community must be the same as the public community.

15)
What is the purpose of Multipurpose Internet Mail Extensions (MIME)? 2
(1 of 4 answers is correct)
MIME contains information on how to forward e-mails if the mailbox is not on
the local mail server.
MIME supports in emails the transfer of data in any format.
MIME defines the mailbox properties, like the size of box and messages.
MIME is used to authenicate e-mail clients and for the encoded transfer of d
ata between

16)
If both the "enable secret" and the "enable password" commands are configured
on the Cisco router, how do you get to the # prompt? 4
(1 of 4 answers is correct)
Use the "enable password" command.
Use the "enable secret" command.
Use either the "enable secret" OR the "enable password" command.
Use both the "enable secret" AND the "enable password" commands.

17)
Which of the following cable categories can be used with the IEEE 802.3af standa
rd? 1,2,3
(3 of 4 answers are correct)
Cat 3
Cat 4
Cat 5
Cat 6

18)
Which of the following protocols are connection-oriented? 1,3

(2 of 4 answers are correct)


HDLC
IP
TCP
UDP

19)
Which of the following is true regarding SNMP MIB? 2,3
(2 of 4 answers are correct)
Each MIB file must contain a public and private entries.
It is a database of industry defined standards for a particular SNMP version
.
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database.

20)
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server

Redirect server

21)
How does a distance vector router learn about networks that are NOT directly con
nected? 4
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.

22)
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.
23)
TCP-Ports are essential components for communication in the IP environment. Wh
ich statement is correct? 3
(1 of 4 answers is correct)
TCP-Ports are fixed and can never be changed.
Ports are used for identifying the routing protocol used.
Ports are used for identifying applications or processes.
Ports define whether you are working with TCP or UDP.

24)
Which term is last default entry at the end of every ACL on a Cisco Router?
2
(1 of 4 answers is correct)
implicit deny host
implicit deny any
deny ip
ip deny any

25)

Which statements about the QoS mechanism DiffServ are correct? 1,2,4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

26)
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.

27)
Which of the following statements about ERPS (Ethernet Rings Protection Switchin
g) are true? 2, 3
(2 of 4 answers are correct)
ERPS guarantees recovery times of below 50ms, whilst Spanning Tree algorithm
s have recovery times of several seconds.
ERPS can only be implemented on rings, whilst Spanning Tree protocols can be
used on any topology.
ERPS converges faster than Spanning Tree algorithms and, depending on the ne
twork size, can offer recovery times of below 50ms.

With ERPS, the network operator has more influence on the active topology th
an when using a Spanning Tree algorithm.

28)
What is the maximum bandwidth of the IEEE 802.11g specification? 4
(1 of 4 answers is correct)
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s

29)
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoIP
for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.
30)
What is latency in a VoIP network? 1
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation.

31)

Which of the following statement describes the behavior of a color aware UNI (Us
er Network Interface) according to the Metro Ethernet Forum? 1
(1 of 4 answers is correct)
Color marking of incoming frames is preserved.
Incoming yellow frames are metered and marked as yellow or red, according to
their SLA compliance.
Incoming green frames are metered and marked as green, yellow or red accordi
ng to their SLA compliance.
Outgoing frames are color marked.

32)
What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? 2
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)

33)
What is the length of the host ID for an IPv4 address? 4
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask.

34)

Which of the following signaling protocols can be used to connect an IP-PBX to


a SIP-Proxy / SIP Application Server? 1,3
(2 of 4 answers are correct)
SIP-Connect
SIP-NNI

MGCP
RTP

35)
Which of the following networks elemets are used in a Voice over Cable network?
1,2,3
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).
Cable Modem Termination System (CMTS).

36)
Which guidelines apply to IP addressing? 1,2,,3
(3 of 4 answers are correct)
The number 127 may not be used as the first octet for the network.
The host ID may not consist only of the value 0.
The host ID must be unique for the local network.
The host ID may not contain a zero.

37)
Which of the following statements about TCP/UDP is correct? 1
(1 of 4 answers is correct)
Only TCP guarantees that the sent data has reached the peer completely.
Only UDP guarantees that the sent data has reached the peer completely.
Both TCP and UDP guarantee that the sent data has reached the peer completel
y.
Both TCP and UDP do not guarantee that the sent data has reached the peer co
mpletely.

38)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)

1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

39)
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.

40)
Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1
(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.

41)
Which of the following are NOT valid parts of IPv4 subnetwork masks? 1,2
(2 of 4 answers are correct)
"1101 1111"
"1111 1100"
"1101 10"
"1000 00"

42)
What is the difference between an ethernet hub and an ethernet switch? 2,
4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
A switch offers better performance as it operates collision-free.
For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch.

43)

What are features of layer 2 switches? 2,4


(2 of 4 answers are correct)
Evaluation of the 802.1p field
Routing of InterVlan traffic
10/100 Mbit autosensing
Use of Open Shortest Path First

44)
Which of the following connections support IEEE 802.3ad Link Aggregation ? 2,4
(2 of 4 answers are correct)
Multipoint
Full duplex
Half duplex
Point to Point

45)

Which of the following protocols is NOT used in the IMS (IP Multimedia Subsystem
)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)

IP (Internet Protocol)

46)
How many TEIDs has an active PDP context assigned at least between SGSN and GG
SN: 1
(1 of 4 answers is correct)
2
4
8
0

47)
How does the analogue to digital and digital to analogue conversion affect the t
otal propagation time of a packet? 3
(1 of 4 answers is correct)
It has an impact of approx. 20 ms per conversion.
It has an impact of approx. 10 ms per conversion.
It can only be carried out twice per connection.
it has a negligible impact.

48)
Which of the following authentication protocols are supported by PPPoE? 3,4
(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN

49)
Which of the following statements about the use of Ethernet switches are correct
? 1, 2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.

The number of network collisions in switches increases slightly.


Cascading can lead to bottlenecks.

50)
What does Class of Service (CoS) refer to in the context of Carrier Ethernet?
2
(1 of 4 answers is correct)
Any classification of frames inside the MEN.
The possibility to offer different service levels like premium, controlled l
oad, standard, best effort etc. to end customers.
The priority bits of the VLAN tag.
Different service types like point-to-point, multipoint-to-multipoint and po
int-to-multipoint.

51)
How many ACLs per protocol, per direction and per interface can be applied on a
Cisco router? 1
(1 of 4 answers is correct)
1
2
4
any number
52)

Which codecs compress voice? 2,3


(2 of 4 answers are correct)
G.723
G.711
G.729
E.164

53)
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.
It is based on SSH and is encrypted asymmetrically.

54)
Which protocol does a router use to determine the MAC address to deliver an in
coming packet? 2
(1 of 4 answers is correct)
ICMP
ARP
SMTP
UDP

55)
Which of the following e-mail attachments can contain Trojan horses? 3,4
(2 of 4 answers are correct)
Sales.txt
Sales.doc
Sales.ini
Sales.exe

56)
Which of the following statements is correct about MAC addresses? 3
(1 of 4 answers is correct)
It indicates the maximum supported bit rate.
It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.

57)
What can be configured on a Cisco router with the user EXEC mode commands?
4
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.

58)
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728

59)
Which of the following statements describe the function of routing tables? 1
,2
(2 of 4 answers are correct)
Routing tables contain metrics that are used to determine the acceptability
of the route.
When a router receives an incoming packet, it uses the source address and se
arches the routing table to find the best path for the data from that source.
Although routing protocols vary, routing metrics do not.
Routing tables provide an ordered list of known network addresses.

60)
Which firewall types are valid? 2,4
(2 of 4 answers are correct)
Bridge Filter Firewall.

Packet Filter Firewall.


NIC Filter Firewall.
Application Filter Firewall.

61)
Which of the following statements about MAC addresses in an Ethernet topology
are correct? 2,3
(2 of 4 answers are correct)
It is encrypted and can not be masked.
It must be unique within the network.
It is represented in hexidecimal format.
It can only be bound to one network protocol at layer 3.

62)
Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.
63)

Which of the following is the Authentication Server when using EAP? 2


(1 of 4 answers is correct)
DNS server
RADIUS server
DHCP server
Exchange-Server

64)
Which part of the IP address evaluates the router with the help of the subnet ma
sk? 3
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.
Mask and host bits.
Host and subnet bits.

65)
Which statements about VPN are correct? 1,3
(2 of 4 answers are correct)
VPN is a private, logical network.
VPN has no security mechanisms.
IP-based VPNs can be based on the PPP protocol with IP tunnelling.
VPN requires less configuration than conventional LAN links.

66)
What is the meaning of "Tail Dropping"? 1
(1 of 4 answers is correct)
Incoming packets are dropped if the buffer is full.
Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priori
ty queues.
Packets arrving with a high delay are dropped because they are considered us
eless for the application.

67)

What is the effect of Network Address Translation (NAT) on network security?


3,4
(2 of 4 answers are correct)
It has no effect on network security.
It will reduce network security.

It hides the IP address of the local host to increase security.


It makes incoming connections more difficult which increases security.

68)
Which of the following statements about the ToS field are correct? 1,3
(2 of 4 answers are correct)
It is part of the IP header.
It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field.

69)

Which statements describe the tasks of PPP? 1,3,4


(3 of 4 answers are correct)
PPP can be used as an encapsulation protocol for transporting IP traffic ove
r point-to-point links.
Every PPP session requires a authentication phase.
PPP provides router-to-router connections over synchronous and asynchronous
circuits.
The LCP in PPP is used for establishment, configuration, and testing the dat
a-link connection.
70)
Which command can be entered in a DOS Shell on a Windows operating system to d
isplay the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route

71)

Which of the following port numbers does SIP use by default? 4


(1 of 4 answers is correct)
80
443
4060
5060

72)

Which of the following protocols is used to resolve the IP address to a URI (Uni
form Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225
SMTP

73)

What is a function of the SIP redirect server? 2


(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the destination IP add
ress and rewrites them.
It responds to signaling messages and transfers these unchanged to the desti
nation IP address.
It responds to signaling messages and answers the sender with a new destinat
ion address.
It responds to signaling messages and answers the destination with a new sen
der address.

74)

Which statements describe the functions of a router in a network? 1, 4

(2 of 4 answers are correct)


Routers use the routing table to identify where to forward packets.
Routers create large broadcast domains.
Routers use ICMP to communicate network information from their own routing t
able with other routers.
Routers maintain their routing tables and ensure that other routers know of
changes in the network.

75)

Which device uses typically a RS232 connector? 4


(1 of 4 answers is correct)

Telephone line cord


Ethernet
USB
PC serial connection

76)
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a

77)

Which of the following expressions represents a Standardized VIDEO compression


Method? 1,3,4
(3 of 4 answers are correct)
MPEG 2

H.323
MPEG 4
H.264

78)

Which of the following affects the quality of VoIP connections? 1,3,4


(3 of 4 answers are correct)
The voice codec selected.
The signaling protocol used for connection setup.
The transmission delay between endpoints.

The distance between the endpoints.

79)
On which Internet standards is SIP based on? 1,2
(2 of 4 answers are correct)
Hypertext Transfer Protocol
Simple Mail Transport Protocol
Post Office Protocol
Simple File Transfer Protocol

80)

Which of the following devices is used to reduce the effects of broadcast storms
? 2
(1 of 4 answers is correct)
Ethernet hub
Router
Gatekeeper
Repeater

Welcome to the e-learning Test Center


IP Assessment program for NSN Service employees, Competence Level 3 (The module
can be booked only individually. The enrolment package module IPASS-S-LE is not
use any more) IPASS-S-LE)
Test Details
Number of questions
80
Score (%) required to pass the test:
67%
Required score per question group
IP Consolidated group
50%
IP extended
75%
LAN
75%
Max. time (minutes) allowed for the test:
90
Help
Statistics
Start test
-------------------------------------------------

Which of the following signaling protocols can be used to connect an IP-PBX to a


SIP-Proxy / SIP Application Server?
(2 of 4 answers are correct)
SIP-Connect
SIP-NNI
MGCP
RTP
----------------------------------------------------------

Which of the following protocols can be used for enhanced security in VoIP netwo
rks?
(2 of 4 answers are correct)

RTP
Secured RTP (SRTP)

SIP via UDP


SIP via TLS/SSL
------------------------------------------------------------------

Which of the following transport layer protocols are often used for SNMP communi
cations?
(2 of 4 answers are correct)

TCP
RTP
UDP
SRTP
-------------------------------------------------------------

Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)

192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128

--------------------------------
"Connectionless data transmission" means? ( 4)
(1 of 4 answers is correct)

The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without con
firmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.
------------------------------------

Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically?
(1 of 4 answers is correct)

FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT

----------------------------

What is LDAP? ( 1 )
(1 of 4 answers is correct)

A protocol for sharing directory services.


A VoIP standard for encoding voice.
An ISDN feature for channel conservation.
A LCD display.

-----------------------
Which statements describe DSL? ( 2, 4)
(3 of 4 answers are correct)

Current DSL technologies use sophisticated coding and modulation techniques to a


chieve data rates of up to 10 Mb/s.
The DSL technology use existing twisted-pair telephone lines to transport high-b
andwidth data, such as multimedia and video, to service subscribers.
DSL technology allows use of the local-loop line for normal telephone voice conn
ection and an always-on connection for instant network connectivity.
DSL technologies allow both voice and data transmissions to occur simultaneously
on a DSL service.

----------------------------------------
Which firewall types are valid? (2,4)
(2 of 4 answers are correct)

Bridge Filter Firewall.


Packet Filter Firewall.
NIC Filter Firewall.
Application Filter Firewall.

----------------------------------------

What happens when a packet with DSCP marking is forwarded by a router that only
supports IP Precedence?
(1 of 4 answers is correct)

The DSCP marking overwrites IP Precedence.


The DSCP marking is ignored and the packet is handled with "best effort".
The packet is forwarded using IP precedence PHB.
The packet is rejected

-----------------------------------------

What is defined in the IEEE 802.3af standard? (2)


(1 of 4 answers is correct)
Wireless LAN.
Power over LAN.
Gigabit Ethernet.
Fast Ethernet.
--------------------------------------

P-CSCF Discovery takes place in the following way (1,2)


(2 of 4 answers are correct)

integrated into the IP-CAN access procedure; e.g. during the PDP context activat
ion in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.

via a HSS-HLR interrogation during registration.


by an end to end QoS parameter retrieval from the PDF.

-------------------------------------
Which of the following statements about reduction of the bit rate with G.723 is
correct?
(1 of 4 answers is correct)

Up to 6.3 kbit/s one way.


Up to 6.3 kbit/s in total for both ways.
Up to 6.3 kbit/s per voice sample.
Up to 6.3 kbit/s per transmission packet.

-------------------------------------

Which of the following statements is correct about MAC addresses? (3)


(1 of 4 answers is correct)

It indicates the maximum supported bit rate.


It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.
---------------------------------------------

What is a function of the SIP redirect server?


(1 of 4 answers is correct)

It responds to signaling messages, transfers these to the destination IP address


and rewrites them.
It responds to signaling messages and transfers these unchanged to the destinati
on IP address.
It responds to signaling messages and answers the sender with a new destination
address.
It responds to signaling messages and answers the destination with a new sender
address.

---------------------------------------------
The filter criteria
(1 of 4 answers is correct)

are used in the P-CSCF as a kind of SW firewall to protect the IMS against DOS a
ttacks.
are evaluated by the S-CSCF, to find informations and conditions allocated to th
e user to handle user and event specific services e.g. by consulting an applicat
ion server.
are used in the subscription location function to select the HSS in an user spec
ific way.
are used for real time protocol bearer traffic to control the priority of the me
dia connection.
-------------------------------------------------
Which of the following apply to SSL? (Secure Socket Layer) (1,2)
(2 of 4 answers are correct)

SSL is a protocol for secure data transmission in the Internet


SSL allows encrypted connections and authentication certificates.
SSL does NOT use the public key method.
Web browsers do NOT support SSL.
-----------------------------------------------------
What are essential differences between SIP and H.323?
(2 of 4 answers are correct)

SIP has an open Internet-oriented structure and thus is less complex.


SIP information can only be transported TCP controlled.
SIP transport uses more bandwidth than H.323 transport.
SIP allows fast and simple implementation of additional telephone services.

---------------------

The QoS bits are set in which part of the IPv4 frame?
(1 of 4 answers is correct)

Protocol field
ToS field
Identification field
Version field
------------------------------------------

What is the meaning of "Tail Dropping"?


(1 of 4 answers is correct)

Incoming packets are dropped if the buffer is full.


Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priority q
ueues.
Packets arrving with a high delay are dropped because they are considered useles
s for the application.
-------------------------------------------------

which of the following criteria are used to calculate the Spanning Tree topology
?
(3 of 4 answers are correct)
MAC-address
IP-address
Root path cost
Bridge Priority

--------------------------------------
Which of the following messages is used to initiate the end of a TCP session?
(1 of 4 answers is correct)

SYN
SYN ACK

FIN
FIN ACK

------------------------------------

Which of the following statements is NOT correct?


(1 of 4 answers is correct)

Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Gatewa
y to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voice o
ver cable scenario.

Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media Gate
way.

------------------------------
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)

1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

-----------------------------------------------

Which field in a TCP header is responsible for the correct order of TCP data?
(1 of 4 answers is correct)

SYN-Flag
ACK-Flag
sequence number
acknowledgment number

-------------------------------------------------

What is the minimum number of wires needed to create a 100BaseT link in a LAN?
(1 of 4 answers is correct)

2 wires
4 wires
6 wires
8 wires

----------------------------------------------------
Which of the following classifications are defined in DiffServ?
(3 of 4 answers are correct)

Best Effort
Assured Forwarding
Expedited Forwarding
Port Forwarding

-----------------------------------------------------

Which of the following entries can be specified in the DHCP Scope?


(2 of 4 answers are correct)

WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.

----------------------------------------------------

How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)

Triggering a routing update.

Setting the route in holddown.


Poisoning the route.
Using split horizon.

------------------------------------------------------

What is the significance of jitter in a VoIP network?


(2 of 4 answers are correct)

Too much jitter will negatively affect the voice quality.


Not enough jitter will negatively affect the voice quality.
Jitter is required to support VoIP.

A buffer is required in the recieving device to accommodate network jitter.

------------------------------------------------------

Which device uses typically a RJ11 connector?


(1 of 4 answers is correct)

Telephone line cord


Ethernet
USB
PC serial connection

-------------------------------------------------------
What is in the SPF (Shortest Path First) algorithm inversely proportional to the
bandwidth?
(1 of 4 answers is correct)

Link state.
Link cost.
Root cost.
Hop count.

------------------------------------------------------
What benefits does Link Aggregation provide?
(3 of 4 answers are correct)

Provides multiple logical connections.


Increased link capacity.
Link redundancy.
Improvements using existing hardware.

------------------------------------------------------

Which statements describe the tasks of PPP?


(3 of 4 answers are correct)

PPP can be used as an encapsulation protocol for transporting IP traffic over po


int-to-point links.
Every PPP session requires a authentication phase.
PPP provides router-to-router connections over synchronous and asynchronous circ
uits.
The LCP in PPP is used for establishment, configuration, and testing the data-li
nk connection.

--------------------------------------------------------
Which term is last default entry at the end of every ACL on a Cisco Router?
(1 of 4 answers is correct)

implicit deny host


implicit deny any
deny ip
ip deny any

---------------------------------------------------------

How should the jitter buffer be configured for optimum voice quality?
(1 of 4 answers is correct)

The jitter buffer has nothing to do with the voice quality.


The jitter buffer should be set to a packet length so it does not cause any dela
ys.
The jitter buffer should be set as high as possible so that it does not cause an
y delay.
The jitter buffer should be configured based on the actual state of the customer
's network.
----------------------------------------------------------

Which of the following is a property of Priority Queuing?


(1 of 4 answers is correct)

All packets are transmitted simultaneously.


All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.

----------------------------------------------------------

Which of the following protocols are connection-oriented?


(2 of 4 answers are correct)
HDLC
IP
TCP
UDP

----------------------------------------------------------

Which of the following messages is sent by a system supporting IntServ when rece
iving a path message?
(1 of 4 answers is correct)

Release complete
Reserve message

Alerting message
Status inquiry

-----------------------------------------------------------
Select the correct statements about the advantages of QoS in VoIP solutions.
(2 of 4 answers are correct)

Improved satisfaction of the end user because of better voice quality.


Enhanced division of bandwidth for voice and data.
Improved productivity due to the automatic queuing and distribution of calls to
IP workpoints.
Cost avoidance because of the automatic selection of the least cost route for IP
calls.

-----------------------------------------------------------

Which of the following tasks are assigned to SNMP agents?


(3 of 4 answers are correct)

SNMP Agents have to be installed in a network to make nodes manageable. (w)


An agent has local knowledge of management information from a network node.
Agents have to forward the activities and traps of the network nodes.
Agents send SNMP messages to a management system.

------------------------------------------------------------

What is the difference between a switch and a bridge?


(2 of 4 answers are correct)

Switches operate at lower speeds than bridges.


Switches do not support dedicated communication between devices.
Switches support more advanced functionality than bridges.
Switches have usually more ports than bridges.

--------------------------------------------------------------
Which of the following actions does not reduce network load?
(1 of 4 answers is correct)

Voice Compression.
IP Header Compression.
A-law / µ-law transcoding.
Voice Activity Detection.

------------------------------------------------------------

What is the maximum bandwidth of the IEEE 802.11g specification?


(1 of 4 answers is correct)

5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s

--------------------------------------------------------------
What happens when a PC's network card (NIC) is replaced? (1)
(1 of 4 answers is correct)

The PC uses a different MAC address.


The PC reuses the previous MAC address automatically.
Now the PC has 2 MAC addresses.
A new MAC address has to be entered manually

---------------------------------------------------------------

A mail client should be able to access a firewall-protected Web server using the
SMTP and IMAP4 protocols. Which ports must be opened in the firewall if you are
using the standard well-known ports for SMTP and IMAP4?
(2 of 4 answers are correct)

21
25
80
143

---------------------------------------------------------------

What codec offers ISDN voice quality?


(1 of 4 answers is correct)

G.711
G.723.1
G.728
G.729A

---------------------------------------------------------------

What is the international standard for Power over Ethernet? (2)


(1 of 4 answers is correct)
IEEE 802.1af
IEEE 802.3af
IEEE 802.2af
IEEE 803.2af

----------------------------------------------------------------

n IMS the routing of SIP messages is done using


(1 of 4 answers is correct)

the IMSI in case of a mobile subscriber.


the public user id of the user.
the private user id of the user.
the public key "K" retrieved via the MD5 hash algorithm of the user.

----------------------------------------------------------------

When does a Cisco router needs the parameter "administrative distance" ?


(1 of 4 answers is correct)

If static routes are defined.


If dynamic routing is used.
If the same route is learned via multiple routing sources.
If multiple paths to the same network available, learned via the same routing pr
otocol.

-----------------------------------------------------------------

Which of the following frameworks is used to implement an ASON (Automatically Sw


itched Optical Networks) control plane?
(1 of 4 answers is correct)

RSVP (Resource reservation protocol)


MPLS (Multiprotocol Label Switching)
GMPLS (Generalized Multiprotocol Label Switching)
VPLS (Virtual Private LAN Service)

------------------------------------------------------------------
How is it possible that JAVA programs can be executed from practically every Web
client?
(1 of 4 answers is correct)

This is possible with a Java Virtual Machine or PlugIn installed on the client.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web serv
er.

-----------------------------------------------------------------

How can an issued digital certificate be revoked by the Certificate Authority (C


A)?
(1 of 4 answers is correct)

The owner of the certificate is sent an e-mail request to delete the certificate
.
The creation date of the issued certificate is changed by the CA.
The certificate is placed on the Certificate Revocation List.
The owner of the certificate is placed on the Certificate Revocation List.

------------------------------------------------------------------

What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"?
(1 of 4 answers is correct)

0
8
2
4
-----------------------------------------------------------------

Forwarding inside an IEEE 802.1ah Provider Backbone network is done based on


(1 of 4 answers is correct)

The service frame destination MAC address.


The destination MAC address in combination with the Service VLAN ID.
The combination of Backbone VLAN ID and Backbone Destination MAC address.
The combination of Backbone VLAN ID and Serivce Instance.

----------------------------------------------------------------

What is the maximum number of hosts that can be addressed on a subnet with prefi
x /30?
(1 of 4 answers is correct)

1
2
4
30

-----------------------------------------------------------------

What does the Cisco IOS command "cdp enable" do? (1 )


(1 of 4 answers is correct)

Enables Cisco Discovery Protocol on a particular interface.


Enables Cisco Discovery Protocol on a specific type of interface.
Enables Cisco Discovery Protocol on the whole device.
Enables Cisco Discovery Protocol for a specific protocol.

-----------------------------------------------------------------
What are data transmission protocols required for?
(1 of 4 answers is correct)

Senders and receivers of data must agree on a common "language" in the network s
o that data can be transferred.
Protocols are only required in the event of failure.
Protocols describe the speed of data transmission in the LAN.
Senders and receivers of data stipulate protocols to determine who is the sender
and who is the receiver.

-----------------------------------------------------------------
Which Cisco IOS command is used to configure a serial port in slot 0 port 1, on
a modular Cisco router?
(1 of 4 answers is correct)

interface serial 0/0.1


interface serial 0-0.1
interface serial 0/0/1
interface serial 0-0-1

-----------------------------------------------------------------

What is the Internet Key Exchange (IKE) protocol used for?


(2 of 4 answers are correct)

IKE is used to verify certificates.


IKE is used to encrypt messages.
IKE handles IPsec security associations.

IKE authenticates IPsec peers.

------------------------------------------------------------------

Which of the following protocols are used for transmitting voice bearer traffic?
(2 of 4 answers are correct)

UDP
RTP
RTCP
TCP

-----------------------------------------------------------------

What are typical tasks of an IP router?


(2 of 4 answers are correct)

Connecting different IP networks.


Configuration of VLANs.
Signal refresh on transit routes.
Providing access for tunnel connections.

------------------------------------------------------------------
Which of the following statements regarding FIFO queuing mechanisms is correct?
(1 of 4 answers is correct)

Packets with the highest priority are forwarded first.


Prioritization is used to decide which packets can be rejected.
Packets are forwarded in the same sequence as they arrive.
The last packet received is the first packet to be forwarded.

------------------------------------------------------------------

Which statements concerning VPN are correct? (2,3)


(2 of 4 answers are correct)

VPN connections offer higher transmission quality than leased lines.


VPN connections can be used for the combination of voice and data traffic.
VPN connections create secure tunnels through public networks.
VPN connections never need authentication.
------------------------------------------------------------------
Which frame size must a switch in a Carrier Ethernet Network at least support to
operate as Provider Bridge?
(1 of 4 answers is correct)

1518 Bytes
1522 Bytes
1526 Bytes
1530 Bytes

------------------------------------------------------------------

Which information send a distance vector router to its neighbor routers as part
of a periodic routing table update?
(1 of 4 answers is correct)

Only routes that have changed.


Routes that no longer exist.
The entire routing table.
Only information about new routes.

-----------------------------------------------------------------

Which of the following specifications is not defining a call set up control prot
ocol?
(1 of 4 answers is correct)

SIP
MGCP-NCS
DOCSIS
H.323

------------------------------------------------------------------

Which of the following statements about the ToS field are correct?
(2 of 4 answers are correct)

It is part of the IP header.


It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field

------------------------------------------------------------------

Which of the following statements describes the task of the jitter buffer in an
IP telephone?
(1 of 4 answers is correct)

It converts voice data into RTP packets.


It requests all the lost voice packets from the sender.
It stores the music on hold files and plays them on demand.
It stores the incoming voice packets and sends them out in evenly spaced interva
ls.
------------------------------------------------------------------

How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redunda
ncy?
(1 of 4 answers is correct)

By the Spanning Tree algorithm.


By ERPS (Ethernet Rings Protection Switching).

By dynamic source-rerouting.
By preconfigured protection paths.

------------------------------------------------------------------

Why is increasing the bandwidth not a replacement for QoS mechanisms?


(3 of 4 answers are correct)

Path overload can still occur with increased bandwidth.


Runtime variants can still occur.
Network bottlenecks can still occur.
Additional network management protocols increase network load.

------------------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)

DiffServ is a mechanism for managing traffic flows in one or more networks.


DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

-----------------------------------------------------------------

Which of the following statements about the information distribution in GPRS is


true?
(2 of 4 answers are correct)

The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context.
In error free operation the UL and DL GTP sequence numbers for a PDP context on
Gn interface are strictly increasing even when RABs or packet flows have been de
leted and re-established.
------------------------------------------------------------------

What is defined by Layer 1 of the OSI Reference Model? (2,3)


(2 of 4 answers are correct)

The access controls.


The timing rules.
The line codes.
The route options.

------------------------------------------------------------------
What is latency in a VoIP network?
(1 of 4 answers is correct)

The delay introduced by equipment and circuits during data transmission. (2)
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a specific
period of time.
A description of what happens when more than 5% of packets are lost in a VoIP co
nversation.

----------------------------------------------------------------

What is necessary to allow incoming TCP connections being routed to a server beh
ind a NAT or NAPT router?
(1 of 4 answers is correct)

Servers can never be behind a NAT or NAPT router, because they need always a pub
lic IP address and well known port.
NAT or NAPT must be disabled in the server.
A rule must be configured in the NAT or NAPT router that links the public addres
s and port with the internal address and port.
NAT or NAPT has no effect the routing of incoming connections to servers.

-----------------------------------------------------------------

Which of the following expressions represents a Standardized VIDEO compression M


ethod? (1,3,4)
(3 of 4 answers are correct)

MPEG 2
H.323
MPEG 4
H.264

-----------------------------------------------------------------
Which of the following authentication protocols are supported by PPPoE? (1,2)
(2 of 4 answers are correct)

PAP
CHAP
RADIUS
RLOGIN

------------------------------------------------------------------

What MUST be configured manually when an IP phone uses DHCP? 1


(1 of 4 answers is correct)

The call number of the phone.


The default gateway.
The IP address.
The subnet mask.

-----------------------------------------------------------------

When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)

The Host.
The Network.
A Broadcast.
A loopback.

----------------------------------------------------------------

Welcome to the e-learning Test Center


IP Assessment program for NSN Service employees, Competence Level 3 (The module
can be booked only individually. The enrolment package module IPASS-S-LE is not
use any more) IPASS-S-LE)
Test Details
Number of questions
80
Score (%) required to pass the test:
67%
Required score per question group
IP Consolidated group
50%
IP extended
75%
LAN
75%
Max. time (minutes) allowed for the test:
90
Help
Statistics
Start test
-------------------------------------------------

Which of the following signaling protocols can be used to connect an IP-PBX to a


SIP-Proxy / SIP Application Server? (1,3)
(2 of 4 answers are correct)

SIP-Connect
SIP-NNI
MGCP
RTP
----------------------------------------------------------

Which of the following protocols can be used for enhanced security in VoIP netwo
rks? (1,2)
(2 of 4 answers are correct)

RTP
Secured RTP (SRTP)
SIP via UDP
SIP via TLS/SSL
------------------------------------------------------------------
Which of the following transport layer protocols are often used for SNMP communi
cations? (1,3)
(2 of 4 answers are correct)

TCP
RTP
UDP
SRTP
-------------------------------------------------------------

Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)

192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128

--------------------------------
"Connectionless data transmission" means? ( 4)
(1 of 4 answers is correct)

The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without con
firmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.
------------------------------------

Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? (1)
(1 of 4 answers is correct)

FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT

----------------------------

What is LDAP? ( 1 )
(1 of 4 answers is correct)

A protocol for sharing directory services.


A VoIP standard for encoding voice.
An ISDN feature for channel conservation.
A LCD display.

-----------------------

Which statements describe DSL? ( 2, 4)


(3 of 4 answers are correct)

Current DSL technologies use sophisticated coding and modulation techniques to a


chieve data rates of up to 10 Mb/s.
The DSL technology use existing twisted-pair telephone lines to transport high-b
andwidth data, such as multimedia and video, to service subscribers.
DSL technology allows use of the local-loop line for normal telephone voice conn
ection and an always-on connection for instant network connectivity.
DSL technologies allow both voice and data transmissions to occur simultaneously
on a DSL service.

----------------------------------------
Which firewall types are valid? (2,4)
(2 of 4 answers are correct)

Bridge Filter Firewall.


Packet Filter Firewall.
NIC Filter Firewall.
Application Filter Firewall.

----------------------------------------

What happens when a packet with DSCP marking is forwarded by a router that only
supports IP Precedence? (2)
(1 of 4 answers is correct)

The DSCP marking overwrites IP Precedence.


The DSCP marking is ignored and the packet is handled with "best effort".
The packet is forwarded using IP precedence PHB.
The packet is rejected

-----------------------------------------

What is defined in the IEEE 802.3af standard? (2)


(1 of 4 answers is correct)

Wireless LAN.
Power over LAN.
Gigabit Ethernet.
Fast Ethernet.
--------------------------------------

P-CSCF Discovery takes place in the following way (1,2)


(2 of 4 answers are correct)

integrated into the IP-CAN access procedure; e.g. during the PDP context activat
ion in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
via a HSS-HLR interrogation during registration.
by an end to end QoS parameter retrieval from the PDF.

-------------------------------------
Which of the following statements about reduction of the bit rate with G.723 is
correct? (2)
(1 of 4 answers is correct)

Up to 6.3 kbit/s one way.


Up to 6.3 kbit/s in total for both ways.
Up to 6.3 kbit/s per voice sample.
Up to 6.3 kbit/s per transmission packet.

-------------------------------------

Which of the following statements is correct about MAC addresses? (3)


(1 of 4 answers is correct)

It indicates the maximum supported bit rate.


It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.

---------------------------------------------

What is a function of the SIP redirect server? (2)


(1 of 4 answers is correct)

It responds to signaling messages, transfers these to the destination IP address


and rewrites them.
It responds to signaling messages and transfers these unchanged to the destinati
on IP address.
It responds to signaling messages and answers the sender with a new destination
address.
It responds to signaling messages and answers the destination with a new sender
address.

---------------------------------------------
The filter criteria (2)
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against DOS a
ttacks.
are evaluated by the S-CSCF, to find informations and conditions allocated to th
e user to handle user and event specific services e.g. by consulting an applicat
ion server.
are used in the subscription location function to select the HSS in an user spec
ific way.
are used for real time protocol bearer traffic to control the priority of the me
dia connection.
-------------------------------------------------
Which of the following apply to SSL? (Secure Socket Layer) (1,2)
(2 of 4 answers are correct)

SSL is a protocol for secure data transmission in the Internet


SSL allows encrypted connections and authentication certificates.
SSL does NOT use the public key method.
Web browsers do NOT support SSL.
-----------------------------------------------------

What are essential differences between SIP and H.323?


(2 of 4 answers are correct)

SIP has an open Internet-oriented structure and thus is less complex.


SIP information can only be transported TCP controlled.
SIP transport uses more bandwidth than H.323 transport.

SIP allows fast and simple implementation of additional telephone services.

---------------------

The QoS bits are set in which part of the IPv4 frame? (2)
(1 of 4 answers is correct)

Protocol field
ToS field
Identification field
Version field
------------------------------------------

What is the meaning of "Tail Dropping"? (1)


(1 of 4 answers is correct)

Incoming packets are dropped if the buffer is full.


Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priority q
ueues.
Packets arrving with a high delay are dropped because they are considered useles
s for the application.
-------------------------------------------------

which of the following criteria are used to calculate the Spanning Tree topology
? (1,3,4)
(3 of 4 answers are correct)

MAC-address
IP-address
Root path cost
Bridge Priority

--------------------------------------
Which of the following messages is used to initiate the end of a TCP session? (3
)
(1 of 4 answers is correct)

SYN
SYN ACK
FIN
FIN ACK

------------------------------------
Which of the following statements is NOT correct? (3)
(1 of 4 answers is correct)

Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Gatewa
y to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voice o
ver cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media Gate
way.

------------------------------
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? (2)
(1 of 4 answers is correct)

1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

-----------------------------------------------

Which field in a TCP header is responsible for the correct order of TCP data? (3
)
(1 of 4 answers is correct)

SYN-Flag
ACK-Flag
sequence number
acknowledgment number

-------------------------------------------------

What is the minimum number of wires needed to create a 100BaseT link in a LAN? (
1)
(1 of 4 answers is correct)

2 wires
4 wires
6 wires
8 wires

----------------------------------------------------
Which of the following classifications are defined in DiffServ?
(3 of 4 answers are correct)

Best Effort
Assured Forwarding

Expedited Forwarding
Port Forwarding

-----------------------------------------------------

Which of the following entries can be specified in the DHCP Scope? (3,4)
(2 of 4 answers are correct)

WINS Server.
Web Server.
Redundant DHCP Server.
Default Gateway.

----------------------------------------------------

How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)

Triggering a routing update.


Setting the route in holddown.
Poisoning the route.
Using split horizon.

------------------------------------------------------

What is the significance of jitter in a VoIP network? (1,2,4)


(2 of 4 answers are correct)

Too much jitter will negatively affect the voice quality.


Not enough jitter will negatively affect the voice quality.
Jitter is required to support VoIP.
A buffer is required in the recieving device to accommodate network jitter.

------------------------------------------------------

Which device uses typically a RJ11 connector? (1)


(1 of 4 answers is correct)

Telephone line cord


Ethernet
USB
PC serial connection

-------------------------------------------------------
What is in the SPF (Shortest Path First) algorithm inversely proportional to the
bandwidth?
(1 of 4 answers is correct)

Link state.
Link cost.
Root cost.
Hop count.

------------------------------------------------------
What benefits does Link Aggregation provide?
(3 of 4 answers are correct)
Provides multiple logical connections.
Increased link capacity.
Link redundancy.
Improvements using existing hardware.

------------------------------------------------------

Which statements describe the tasks of PPP? (1,3,4)


(3 of 4 answers are correct)

PPP can be used as an encapsulation protocol for transporting IP traffic over po


int-to-point links.
Every PPP session requires a authentication phase.
PPP provides router-to-router connections over synchronous and asynchronous circ
uits.
The LCP in PPP is used for establishment, configuration, and testing the data-li
nk connection.

--------------------------------------------------------

Which term is last default entry at the end of every ACL on a Cisco Router? (2)
(1 of 4 answers is correct)

implicit deny host


implicit deny any
deny ip
ip deny any

---------------------------------------------------------

How should the jitter buffer be configured for optimum voice quality?
(1 of 4 answers is correct)

The jitter buffer has nothing to do with the voice quality.


The jitter buffer should be set to a packet length so it does not cause any dela
ys.
The jitter buffer should be set as high as possible so that it does not cause an
y delay.
The jitter buffer should be configured based on the actual state of the customer
's network.
----------------------------------------------------------

Which of the following is a property of Priority Queuing? (3)


(1 of 4 answers is correct)

All packets are transmitted simultaneously.


All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.

All packets are processed according to the LIFO principle.

----------------------------------------------------------

Which of the following protocols are connection-oriented? (1,3)


(2 of 4 answers are correct)

HDLC
IP
TCP
UDP

----------------------------------------------------------

Which of the following messages is sent by a system supporting IntServ when rece
iving a path message? (2)
(1 of 4 answers is correct)

Release complete
Reserve message
Alerting message
Status inquiry
-----------------------------------------------------------
Select the correct statements about the advantages of QoS in VoIP solutions. (1,
3)
(2 of 4 answers are correct)

Improved satisfaction of the end user because of better voice quality.


Enhanced division of bandwidth for voice and data.
Improved productivity due to the automatic queuing and distribution of calls to
IP workpoints.
Cost avoidance because of the automatic selection of the least cost route for IP
calls.

-----------------------------------------------------------

Which of the following tasks are assigned to SNMP agents?


(3 of 4 answers are correct)

SNMP Agents have to be installed in a network to make nodes manageable. (w)


An agent has local knowledge of management information from a network node.
Agents have to forward the activities and traps of the network nodes.
Agents send SNMP messages to a management system.

------------------------------------------------------------

What is the difference between a switch and a bridge? (3,4)


(2 of 4 answers are correct)

Switches operate at lower speeds than bridges.


Switches do not support dedicated communication between devices.
Switches support more advanced functionality than bridges.
Switches have usually more ports than bridges.

--------------------------------------------------------------
Which of the following actions does not reduce network load? (4)
(1 of 4 answers is correct)

Voice Compression.
IP Header Compression.
A-law / µ-law transcoding.
Voice Activity Detection.

------------------------------------------------------------

What is the maximum bandwidth of the IEEE 802.11g specification? (4)


(1 of 4 answers is correct)

5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s

--------------------------------------------------------------
What happens when a PC's network card (NIC) is replaced? (1)
(1 of 4 answers is correct)

The PC uses a different MAC address.


The PC reuses the previous MAC address automatically.
Now the PC has 2 MAC addresses.
A new MAC address has to be entered manually

---------------------------------------------------------------

A mail client should be able to access a firewall-protected Web server using the
SMTP and IMAP4 protocols. Which ports must be opened in the firewall if you are
using the standard well-known ports for SMTP and IMAP4?
(2 of 4 answers are correct) (2,3)

21
25
80
143

---------------------------------------------------------------

What codec offers ISDN voice quality? (1)


(1 of 4 answers is correct)

G.711
G.723.1
G.728
G.729A

---------------------------------------------------------------

What is the international standard for Power over Ethernet? (2)


(1 of 4 answers is correct)

IEEE 802.1af
IEEE 802.3af
IEEE 802.2af
IEEE 803.2af

----------------------------------------------------------------

n IMS the routing of SIP messages is done using


(1 of 4 answers is correct)

the IMSI in case of a mobile subscriber.


the public user id of the user.
the private user id of the user.
the public key "K" retrieved via the MD5 hash algorithm of the user.

----------------------------------------------------------------

When does a Cisco router needs the parameter "administrative distance" ?


(1 of 4 answers is correct)

If static routes are defined.


If dynamic routing is used.
If the same route is learned via multiple routing sources.
If multiple paths to the same network available, learned via the same routing pr
otocol.

-----------------------------------------------------------------

Which of the following frameworks is used to implement an ASON (Automatically Sw


itched Optical Networks) control plane?
(1 of 4 answers is correct)

RSVP (Resource reservation protocol)


MPLS (Multiprotocol Label Switching)
GMPLS (Generalized Multiprotocol Label Switching)
VPLS (Virtual Private LAN Service)

------------------------------------------------------------------
How is it possible that JAVA programs can be executed from practically every Web
client?
(1 of 4 answers is correct)

This is possible with a Java Virtual Machine or PlugIn installed on the client.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web serv
er.

-----------------------------------------------------------------
How can an issued digital certificate be revoked by the Certificate Authority (C
A)?
(1 of 4 answers is correct)

The owner of the certificate is sent an e-mail request to delete the certificate
.
The creation date of the issued certificate is changed by the CA.
The certificate is placed on the Certificate Revocation List.
The owner of the certificate is placed on the Certificate Revocation List.

------------------------------------------------------------------

What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"? (3)
(1 of 4 answers is correct)

0
8
2
4
-----------------------------------------------------------------

Forwarding inside an IEEE 802.1ah Provider Backbone network is done based on


(1 of 4 answers is correct)

The service frame destination MAC address.


The destination MAC address in combination with the Service VLAN ID.
The combination of Backbone VLAN ID and Backbone Destination MAC address.
The combination of Backbone VLAN ID and Serivce Instance.

----------------------------------------------------------------

What is the maximum number of hosts that can be addressed on a subnet with prefi
x /30? (2)
(1 of 4 answers is correct)

1
2
4
30

-----------------------------------------------------------------

What does the Cisco IOS command "cdp enable" do? (1 )


(1 of 4 answers is correct)

Enables Cisco Discovery Protocol on a particular interface.

Enables Cisco Discovery Protocol on a specific type of interface.


Enables Cisco Discovery Protocol on the whole device.
Enables Cisco Discovery Protocol for a specific protocol.

-----------------------------------------------------------------
What are data transmission protocols required for?
(1 of 4 answers is correct)

Senders and receivers of data must agree on a common "language" in the network s
o that data can be transferred.
Protocols are only required in the event of failure.
Protocols describe the speed of data transmission in the LAN.

Senders and receivers of data stipulate protocols to determine who is the sender
and who is the receiver.

-----------------------------------------------------------------
Which Cisco IOS command is used to configure a serial port in slot 0 port 1, on
a modular Cisco router? (3)
(1 of 4 answers is correct)

interface serial 0/0.1


interface serial 0-0.1
interface serial 0/0/1
interface serial 0-0-1

-----------------------------------------------------------------

What is the Internet Key Exchange (IKE) protocol used for? (3,4)
(2 of 4 answers are correct)

IKE is used to verify certificates.


IKE is used to encrypt messages.
IKE handles IPsec security associations.
IKE authenticates IPsec peers.

------------------------------------------------------------------

Which of the following protocols are used for transmitting voice bearer traffic?
(1,2)
(2 of 4 answers are correct)

UDP
RTP
RTCP
TCP

-----------------------------------------------------------------

What are typical tasks of an IP router? (1,2)


(2 of 4 answers are correct)

Connecting different IP networks.


Configuration of VLANs.
Signal refresh on transit routes.
Providing access for tunnel connections.
------------------------------------------------------------------
Which of the following statements regarding FIFO queuing mechanisms is correct?
(3)
(1 of 4 answers is correct)

Packets with the highest priority are forwarded first.


Prioritization is used to decide which packets can be rejected.
Packets are forwarded in the same sequence as they arrive.
The last packet received is the first packet to be forwarded.

------------------------------------------------------------------

Which statements concerning VPN are correct? (2,3)


(2 of 4 answers are correct)

VPN connections offer higher transmission quality than leased lines.


VPN connections can be used for the combination of voice and data traffic.
VPN connections create secure tunnels through public networks.
VPN connections never need authentication.
------------------------------------------------------------------

Which frame size must a switch in a Carrier Ethernet Network at least support to
operate as Provider Bridge?
(1 of 4 answers is correct)

1518 Bytes
1522 Bytes
1526 Bytes
1530 Bytes

------------------------------------------------------------------

Which information send a distance vector router to its neighbor routers as part
of a periodic routing table update? (3)
(1 of 4 answers is correct)
Only routes that have changed.
Routes that no longer exist.
The entire routing table.
Only information about new routes.

-----------------------------------------------------------------

Which of the following specifications is not defining a call set up control prot
ocol? (3)
(1 of 4 answers is correct)

SIP
MGCP-NCS
DOCSIS
H.323

------------------------------------------------------------------

Which of the following statements about the ToS field are correct? (1,3)
(2 of 4 answers are correct)

It is part of the IP header.


It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field

------------------------------------------------------------------

Which of the following statements describes the task of the jitter buffer in an
IP telephone? (4)
(1 of 4 answers is correct)

It converts voice data into RTP packets.


It requests all the lost voice packets from the sender.
It stores the music on hold files and plays them on demand.
It stores the incoming voice packets and sends them out in evenly spaced interva
ls.
------------------------------------------------------------------

How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redunda
ncy?
(1 of 4 answers is correct)

By the Spanning Tree algorithm.


By ERPS (Ethernet Rings Protection Switching).
By dynamic source-rerouting.
By preconfigured protection paths.

------------------------------------------------------------------

Why is increasing the bandwidth not a replacement for QoS mechanisms?


(3 of 4 answers are correct)

Path overload can still occur with increased bandwidth.


Runtime variants can still occur.
Network bottlenecks can still occur.
Additional network management protocols increase network load.

------------------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct? (2,3,4)
(3 of 4 answers are correct)

DiffServ is a mechanism for managing traffic flows in one or more networks.


DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

-----------------------------------------------------------------
Which of the following statements about the information distribution in GPRS is
true? (3,4)
(2 of 4 answers are correct)

The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context.
In error free operation the UL and DL GTP sequence numbers for a PDP context on
Gn interface are strictly increasing even when RABs or packet flows have been de
leted and re-established.
------------------------------------------------------------------

What is defined by Layer 1 of the OSI Reference Model? (2,3)


(2 of 4 answers are correct)

The access controls.


The timing rules.
The line codes.
The route options.

------------------------------------------------------------------

What is latency in a VoIP network? (2)


(1 of 4 answers is correct)

The delay introduced by equipment and circuits during data transmission.


The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a specific
period of time.
A description of what happens when more than 5% of packets are lost in a VoIP co
nversation.

----------------------------------------------------------------

What is necessary to allow incoming TCP connections being routed to a server beh
ind a NAT or NAPT router?
(1 of 4 answers is correct)

Servers can never be behind a NAT or NAPT router, because they need always a pub
lic IP address and well known port.
NAT or NAPT must be disabled in the server.
A rule must be configured in the NAT or NAPT router that links the public addres
s and port with the internal address and port.
NAT or NAPT has no effect the routing of incoming connections to servers.

-----------------------------------------------------------------

Which of the following expressions represents a Standardized VIDEO compression M


ethod? (1,3,4)
(3 of 4 answers are correct)

MPEG 2
H.323
MPEG 4
H.264

-----------------------------------------------------------------

Which of the following authentication protocols are supported by PPPoE? (1,2)


(2 of 4 answers are correct)

PAP
CHAP

RADIUS
RLOGIN

------------------------------------------------------------------

What MUST be configured manually when an IP phone uses DHCP? 1


(1 of 4 answers is correct)
The call number of the phone.
The default gateway.
The IP address.
The subnet mask.

-----------------------------------------------------------------

When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)

The Host.
The Network.
A Broadcast.
A loopback.

----------------------------------------------------------------
What is defined by Layer 2 of the OSI Reference Model? 1&4
(2 of 4 answers are correct)
The access controls to the media.
The logical addresses for hosts.
The route options for packets.
The structuring of bits into frames.

--------------------------------------------------------------------------------
-----------------
Which of the following statements describe MPLS? 2,4
(2 of 4 answers are correct)
Destination addressing is done by the user.
It uses short headers with fixed length.
The TCP header contains label related settings.
The label is replaced with a new one at each hop
-------------------------------------------------------------------------------
------------------
What is a VPWS? 2
(1 of 4 answers is correct)
A WAN emulation accross a packet based network (Virtual Private WAN Service)
.
A point-to-point L2 VPN (Virtual Private Wire Service).
A Virtual Leased Line Ethernet service over a TDM network.
The emulation of a TDM circuit ("pseudo-wire") over a packet based network.
-------------------------------------------------------------------------------
------------------
How many ACLs per protocol, per direction and per interface can be applied on
a Cisco router? 1
(1 of 4 answers is correct)
1
2

4
any number
-------------------------------------------------------------------------------
-----------
Which security features can be realized by a secure protocol? 1,2
(2 of 4 answers are correct)
Protection against viruses.
Authentication.
Authorization.
Encryption.
-------------------------------------------------------------------------------
---------
Which of the following is true about the parameter "metric 3" in context of a ro
ute entry in a Windows system? 2
(1 of 4 answers is correct)
It shows the maximum distance in meters from the wireless LAN.
It shows the maximum distance in miles from the network.
It shows the amount of L2 switches between the network connections.
It shows the amount of L3 routers between the network connections
--------------------------------------------------------------------------------
----
When using IEEE 802.1 p/Q, which of the following statements apply?
(2 of 4 answers are correct)
It provides a bandwidth reservation option.
It should only be used with compliant network components.
It works on Layer 2 of the OSI Reference Model.
It defines and reserves a connection route.

--------------------------------------------------------------------------------
----------
The filter criteria ?2
(1 of 4 answers is correct)
are used in the P-CSCF as a kind of SW firewall to protect the IMS against D
OS attacks.
are evaluated by the S-CSCF, to find informations and conditions allocated t
o the user to handle user and event specific services e.g. by consulting an appl
ication server.
are used in the subscription location function to select the HSS in an user
specific way.
are used for real time protocol bearer traffic to control the priority of th
e media connection.

-------------------------------------------------------------------------------
What are physical security issues? 1,4
(2 of 4 answers are correct)
Flooding of TCP/SYN packets.
Turning off the power of switch to block network access.
Turning off the air conditioning system in the network closet.
Infect a web server with a computer virus.

-------------------------------------------------------------------------------
----------------
Which of the following e-mail protocols supports server-stored mailbox access
and folder management? 3
(1 of 4 answers is correct)
SNTP
POP3
IMAP4
SMTP
-------------------------------------------------------------------------------
------------------
What is the main advantage of Multiple Spanning Tree Tree (STP)? 4
(1 of 4 answers is correct)
Several VLANs can be mapped to a single MST instance.
All VLANs must be mapped to a single MST instance.
MST uses RSVP to calculate instances.
MST maps VLANs dynamically to MST instances
-------------------------------------------------------------------------------
-------------------
Which of the following statements about reduction of the bit rate with G.723 i
s correct?
(1 of 4 answers is correct)
Up to 6.3 kbit/s one way.

Up to 6.3 kbit/s in total for both ways.


Up to 6.3 kbit/s per voice sample.
Up to 6.3 kbit/s per transmission packet.
-------------------------------------------------------------------------------
----------------
If both the "enable secret" and the "enable password" commands are configured
on the Cisco router, how do you get to the # prompt? 4
(1 of 4 answers is correct)
Use the "enable password" command.
Use the "enable secret" command.
Use either the "enable secret" OR the "enable password" command.
Use both the "enable secret" AND the "enable password" commands.
------------------------------------------------------------------------
Which of the following parameters are used to describe the performance of Ethe
rnet services? 1,2,4
(3 of 4 answers are correct)
Frame Delay
Frame Delay variation
Availability
In-sequence delivery

------------------------------------------------------------------------
Which of the following topologies uses twisted pair cables? 2
(1 of 4 answers is correct)
10BaseF
100BaseTX
1000BaseSX
10Base5
------------------------------------------------------------------------------
From which bridge is the Spanning Tree topology calculated?
(1 of 4 answers is correct)
The redundant bridge.
The bridge with the highest ID.
The root bridge.

The bridge with the lowest MAC address.


------------------------------------------------------------------------------
What is the difference between a switch and a bridge?3,4
(2 of 4 answers are correct)
Switches operate at lower speeds than bridges.
Switches do not support dedicated communication between devices.
Switches support more advanced functionality than bridges.
Switches have usually more ports than bridges.
----------------------------------------------------
In IMS the routing of SIP messages is done using ?4
(1 of 4 answers is correct)
the IMSI in case of a mobile subscriber.

the public user id of the user.


the private user id of the user.
the public key "K" retrieved via the MD5 hash algorithm of the user.
-----------------------------------------------------------------------
What does a router do in a VoIP solution? 1,4
(2 of 4 answers are correct)
It connects one or more LAN segments to the wide area network so the voice t
raffic can go between buildings or to more distant locations.
It converts between different VoIP protocols (for example, H.323 to SIP).
It determines the appropriate codec for the VoIP call.
It provides a connection to the Internet which can be used to support VPN.
------------------------------------------------------------------------
What sends in a TCP connection setup the initiating device? 4
(1 of 4 answers is correct)
ACK
FIN
RST
SYN
--------------------------------------------------------------
Which of the following commands/expressionss can be used for administrating yo
ur routing behavior on a PC with several NICs? 2,3
(2 of 4 answers are correct)

route add
route print
route to
route stop
-------------------------------------------------------
How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gen
erated? 3
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses.
The Link Control Protocol (LCP).

----------------------------------------------
Which of the following elements can be used to divide a network into individua
l segments? 2,3
(2 of 4 answers are correct)
Firewalls
WINS Server
VLAN-capable switches
Gatekeeper
-----------------------------------------------------------------------
What is the network ID for the IP Address 115.150.177.44/255.192.0.0? 4
(1 of 4 answers is correct)
115.0.0.0
115.64.0.0
115.128.0.0
115.192.0.0
--------------------------------------------------------
What is latency in a VoIP network? 2
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation
---------------------------------------------------------------------------
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol
Real Time Streaming Protocol
------------------------------------------------------------
Which of the following signaling protocols can be used to connect an IP-PBX to
a SIP-Proxy / SIP Application Server? 1&3

(2 of 4 answers are correct)


SIP-Connect
SIP-NNI
MGCP
RTP
-----------------------------------------------------------------------------
Which of the following is true regarding SNMP MIB? 2&4
(2 of 4 answers are correct)
Each MIB file must contain a public and private entries.
It is a database of industry defined standards for a particular SNMP version
.
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database.
-----------------------------------------------------------------
Which of the following statements about RADIUS and IEEE 802.1x based security
solutions are correct? 2,4
(2 of 4 answers are correct)
Authentication is available.
Authentication is based on hardware.
Authorization is available.
Authorization is based on MAC addresses.

---------------------------------------------------------
Which framing procedure is always used within NG-SDH to encapsulate Ethernet s
ervice frames? 4
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure)
---------------------------------------------------------
Which statements about the QoS mechanism DiffServ are correct? 2&3&4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.

DiffServ uses the IP ToS byte to signal packet priorities.


DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

-----------------------------------------------------
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server
Redirect server
--------------------------------------------------------
What is BGP used for?
(2 of 4 answers are correct)
Detailed Route description inside an Autonomous System.
Translation of routes between two different routing protocols.
Application of routing policies between Autonomous Systems.
Application of routing policies inside an Autonomous System.
-------------------------------------------------------------------
Which of the following statements about the OSI Reference Model are correct? 1
,3
(2 of 4 answers are correct)

It contains application and transport related components.


Communication devices must support all seven layers so that network function
s are possible.
The Data-Link Layer defines the MAC address for a device on the network.
The Transport Layer defines the cable specifications used in the network.
-------------------------------------------------------------------------------
---------
What displays the hardware address of an interface when using the "show interf
ace" command on a Cisco router? 1
(1 of 4 answers is correct)
Address is 0050.BD12.3456
Internet address is 150.10.10.2
MTU 1492 bytes

Encapsulation ARPA
--------------------------------------------------------------------
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.
------------------------------------------------------------------
Which of the following specifications is not defining a call set up control pr
otocol? 3
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323
-------------------------------------------------------------------------------
----
What happens to the priority of a packet marked with DSCP when it passes a rou
ter that only supports IP precedence? 2

(1 of 4 answers is correct)
The packets are rejected because they cannot be handled.
The packets are prioritized in accordance with IP Precedence.
The packets are forwarded without prioritization.
The packets will be re-classified and re-marked by the router.

--------------------------------------------------------------------------------
---------------
Where in a Carrier Ethernet Network will the tags be assigned to a service fra
me?
(2 of 4 answers are correct)
C-tag and S-tag can be added by the provider.
The C-tag is always added by the customer, the S-tag is always added by the
provider.

C-tag and S-tag can be added by the customer.


C-tag and S-tag can be added by the provider, the S-tag cannot be added by t
he customer.
--------------------------------------------------------------------------
Which of the following statements describe packet switching? 2,3
(2 of 4 answers are correct)
It includes addressing information with variable delays.
All data packets have the same length.
It can use the X.25 transmission protocol.
There are no delays in transmission of packets
------------------------------------------------------------------
What is meant by PHB in DiffServ? 4
(1 of 4 answers is correct)
Each router handles prioritized packets based on FIFO.
Each router reserves exactly the same bandwidth for prioritized packets.
Each router behaves the same way for the forwarding of prioritized packets.
Each router is configured with exactly the same settings for QoS.
------------------------------------------------------------------------
Which technology has been designed in WLAN to replace WEP (Wired Equivalent Pr
ivacy)? 3
(1 of 4 answers is correct)

RADIUS
PKI
WPA
MAC Filtering
-------------------------------------------------------------------------------
---
What mechanism does a SIP telephone use to identify the IP address of the SIP
proxy server for a called party? 1
(1 of 4 answers is correct)
Registration request
Admission request
DNS request
ARP request

-------------------------------------------------------------
Which command can be entered in a DOS Shell on a Windows operating system to d
isplay the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route
--------------------------------------------------------------------------------
-------------------
Which of the following protocols can be used to setup an point-to-point connec
tion for IP traffic? 1,2,3
(3 of 4 answers are correct)
PPP
HDLC
L2TP
MSV1
--------------------------------------------------------------------
What are properties of OSPF? 1,4
(2 of 4 answers are correct)
OSPF is a proprietary routing protocol.
OSPF is a distance vector routing protocol.

OSPF operates within an autonomous system.


OSPF is a link-state routing protocol.
-------------------------------------------------------------------------------
------
Which statements describe data-link protocols in a WAN? 2,4
(2 of 4 answers are correct)
OSPF is a typical data-link protocol.
Data link layer protocols define how data is encapsulated for transmission t
o remote sites.
Data link layer protocols determine the cable type to be used in the WAN.
Many data link layer protocols use a framing mechanism similar to HDLC.
-------------------------------------------------------------------------------
------------
Which frame size must a switch in a Carrier Ethernet Network at least support
to operate as Provider Bridge?
(1 of 4 answers is correct)
1518 Bytes
1522 Bytes
1526 Bytes
1530 Bytes
-------------------------------------------------------------------------------
------
Which of the following protocols is NOT used in the IMS (IP Multimedia Subsyst
em)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)
------------------------------------------------------------------------------
Which of the following effects is caused by voice compression? 4
(1 of 4 answers is correct)
Jitter
Delay
Packet loss

Increased bandwidth
-------------------------------------------------------------------------------
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728
-------------------------------------------------------------------------------
-
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)

The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

--------------------------------------------------------------------------------
-------------
How are Internet Control Message Protocol (ICMP) messages processed? 2,3
(2 of 4 answers are correct)
The messages are encapsulated in UDP datagrams.
The messages are encapsulated in IP datagrams.
The messages are processed by the application and are not visible to the use
r.
The messages have to be processed by the application user.

--------------------------------------------------------------------------------
--------
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoI
P for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.

--------------------------------------------------------------------------------
--------------
What is defined by Layer 3 of the OSI Reference Model? 2,3
(2 of 4 answers are correct)
The access controls to the media.
The logical addresses for hosts.

The route options for packets.


The bit checksum of all data packets.
-------------------------------------------------------------------------------
--------
What is the name of the field in the IP Version 6 header that is used by DiffS
erv for priority signaling? 1
(1 of 4 answers is correct)
Type of Service
Traffic Class
Flow Label
Hop Limit
-------------------------------------------------------------------------------
----
What is NOT part of the IPsec framework? 4
(1 of 4 answers is correct)
AES (Advanced Encryption Standard)
ESP (Encapsulating Security Payload)
MD5 (Message-Digest Algorithm 5)
PPTP (Point-to-Point Tunneling Protocol)
-------------------------------------------------------------------------------
-
What is the task of the RTP Control Protocol (RTCP)? 3

(1 of 4 answers is correct)
To log call charge data of VoIP calls.
The monitoring of the transmission quality.
To negotiate codecs and features.
To monitor bandwidth.
-------------------------------------------------------------------------------
-
Which of the following defines "encapsulation"? 1
(1 of 4 answers is correct)
The conversion of layer 1 information to layer 2 information.
To place data of a higher layer into a frame of the lower one.
The conversion of application data directly into electrical signals.

To place data of a lower layer into the frame of the next higher layer.

--------------------------------------------------------------------------------
--------------
Which of the following are the minimum network settings for a PC? 1,2
(2 of 4 answers are correct)
Subnet Mask.
IP Address.
DNS Entry.
WINS Entry.
-------------------------------------------------------------------------------
----------
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.
----------------------------------------------------------------------------
What is a function of a SIP proxy? 2
(1 of 4 answers is correct)

It responds to signaling messages, transfers these to the recipient and may


convert them.
It responds to signaling messages and transfers these unchanged to the recip
ient.
It responds to voice data, forwards this to the recipient and rewrites the R
TP header.
It responds to voice data, forwards this to the recipient and does not chang
e the RTP header.

--------------------------------------------------------------------------------
------
Which of the following protocols is used to resolve the IP address to a URI (U
niform Resource Identifier)? 2
(1 of 4 answers is correct)
SDP

DNS
H.225
SMTP
-------------------------------------------------------------------------------
---------------------
How many bytes are used for a MAC address in an IEEE 802.3 network? 3
(1 of 4 answers is correct)
2
4
6
8
------------------------------------------------------------------------
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.

----------------------------------------------------------------------------
Which of the following is the default port associated with SNMP agent? 3

(1 of 4 answers is correct)
110
143
161
162
--------------------------------------------------------------------------------
--
What is in the SPF (Shortest Path First) algorithm inversely proportional to t
he bandwidth? 4
(1 of 4 answers is correct)
Link state.
Link cost.
Root cost.

Hop count.
--------------------------------------------------------------------------
Which of the following is true for Priority Queuing? 1
(1 of 4 answers is correct)
Low priority applications may not get sufficient bandwith if there is too mu
ch traffic in higher priority queues.
The throughput of high priority traffic depends on the volume of lower prior
ity traffic.
All applications are processed identically, leaving insufficient bandwidth f
or high priority traffic.
The algorithm causes large delays because of the high processor time require
d.
-------------------------------------------------------------------------------
--
How is it called to secure data against unwanted reading? 2
(1 of 4 answers is correct)
Privatizing
Ciphering
Scrambling
Protection
---------------------------------------------------------------------------
Which of the following elements typically belong to a SIP architecture? 1,2,4
(3 of 4 answers are correct)

PROXY server
User agent
Gatekeeper
Gateway
-------------------------------------------------------------------------------
-
What is displayed on the console, when starting a Cisco router? 3
(1 of 4 answers is correct)
Cisco IOS Software output text.
Cisco IOS diagnostic menu.
Cisco console menu.
Status of the router's LEDs.

-------------------------------------------------------------------------------
-----------
What does the term "QoS" stand for in connection with the concept and the capa
bility of IP or VoIP solutions? 1,3
(2 of 4 answers are correct)
Guarantee of voice quality in VoIP connections.
Increase in the reliability of telephones.
Predictable transmission performance.
Optimization of system maintenance.
-------------------------------------------------------------------------------
------------
Which of the following statements about FTP are correct? 1,2,4
(3 of 4 answers are correct)
FTP passwords are transmitted in a protected way.
FTP passwords are not encrypted on transmission.
The user "anonymous" is a security risk.
Access rights for files and directories must be carefully applied.
-------------------------------------------------------------------------------
--
For what can UDP (User Datagram Protocol) be used? 2
(1 of 4 answers is correct)
UDP is used for secured transport of data.

UDP is used for unreliable transport of data.


UDP is used for the transport of voice messages in TDM networks.
UDP supports congestion control.
-------------------------------------------------------------------------------
----------------------
Which of the following describes IP session hijacking? 1,3
(2 of 4 answers are correct)
Third parties can send their own data on such a connection. yes
The user is always aware of the hijacking.
A third party takes over the connection while the user is held. yes
A third party can not be traced back to his local IP address.

--------------------------------------------------------------------------------
-----------------------
How many AF codepoints can be mapped within DSCP? 2
(1 of 4 answers is correct)
8
12
32
64
-------------------------------------------------------------------------------
--------------
What is the difference between an ethernet hub and an ethernet switch? 2,4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
A switch offers better performance as it operates collision-free.
For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch.

-----------------------------------------------------------------------------
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.

It is based on SSH and is encrypted asymmetrically


-------------------------------------------------------------------------------
-------------------------
Which of the following devices use ARP? 1,2
(2 of 4 answers are correct)
IP telephone
Router
Repeater
Hub
-------------------------------------------------------------------------------
Which of the following answers describes Random Early Detection (RED)? 3
(1 of 4 answers is correct)

RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased voice traffic.

--------------------------------------------------------
With what responds a remote node using CHAP after receiving a challenge message
? (CHAP = Challenge Handshake Authentication Protocol) 4
(1 of 4 answers is correct)
Return challenge
Plaintext password
Encrypted password
Hash value

When does a Cisco router needs the parameter "administrative distance" ? 3


(1 of 4 answers is correct)
If static routes are defined.

If dynamic routing is used.


If the same route is learned via multiple routing sources.
If multiple paths to the same network available, learned via the same routin
g protocol.

What provides the lowest security risk when exchanging keys? 3


(1 of 4 answers is correct)
Avoid key exchange and use keys for longer periods.
Use symmetric keys.
Use asymmetric keys.
Hide the key exchange sequence as an email.

What happens when latency in a VoIP call is more than specified? 1


(1 of 4 answers is correct)
The end users become dissatisfied because of voice quality.
The end user gets a busy signal when placing a call.
The IP phone display doesn't work.
IP calls cannot be transferred.
Which statement is correct regarding Quality of Service (QoS) to ensure the be
st possible Voice over IP quality? 2
(1 of 4 answers is correct)
Only the endpoints in a VoIP connection must support a QoS mechanism; the in
termediate network infrastructure is irrelevant.
All elements of the IP infrastructure must support QoS.
Access-Router at the edge of the proprietary network should support the QoS
mechanism. The public part of the intermediate network infrastructure is irrelev
ant.
A single QoS protocol such as DiffServ is used for end to end QoS, therefore
multiple protocols are not necessary.

What is the purpose of a DNS suffix? 4

(1 of 4 answers is correct)
The DNS suffix is the complete name of the DNS server.
The DNS suffix is a suffix for the DNS server so that it works faster.
The DNS suffix is a suffix which is used in a WINS environment.
The DNS suffix is added as a suffix to the computer name to identify it clea
rly in a network.

How are Internet Control Message Protocol (ICMP) messages processed? 2,3
(2 of 4 answers are correct)
The messages are encapsulated in UDP datagrams.
The messages are encapsulated in IP datagrams.

The messages are processed by the application and are not visible to the use
r.
The messages have to be processed by the application user.

You wish to permanently prevent access to Internet IP address 2.2.2.2 from all
systems in your network. Which technology should you configure to achieve this
objective? 2,3
(2 of 4 answers are correct)
Personal firewall.
The packet filter of the proxy server.
The packet filter of the internet router.
Virus scanner.

Which of the following answers describes Random Early Detection (RED)? 3


(1 of 4 answers is correct)
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased voice traffic.

ch of the following statements are advantages of using DHCP? 1,2,3


(3 of 4 answers are correct)
Efficient use of existing IP addresses.
Less administration of the network settings at the client PC.
Changes in network settings are only entered once in the DHCP server.
No additional network administration is necessary.

When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.

Which device uses typically a RJ11 connector? 1


(1 of 4 answers is correct)
Telephone line cord
Ethernet
USB
PC serial connection

What statement about categories in structured cabling is correct? 1


(1 of 4 answers is correct)
CAT 5 cabling is required for Fast Ethernet.
CAT 5 cabling always uses double shielding.
CAT 6 cabling stands always for fiber cabling.
CAT 6 cabling MUST be used for Quality of Service.

How is it possible that JAVA programs can be executed from practically every Web
client? 1
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the clie
nt.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web
server.

What are components of a firewall? 1,2,3


(3 of 4 answers are correct)
Circuit Level Gateway.

Packet Filtering.
Application Level Gateway.
Discarding Gateway.

Which of the following fields are in an IEEE 802.3 frame? 1,2,3


(3 of 4 answers are correct)
Checksum
Data
Length
Application

What is a function of a SIP proxy? 2


(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the recipient and may
convert them.
It responds to signaling messages and transfers these unchanged to the recip
ient.
It responds to voice data, forwards this to the recipient and rewrites the R
TP header.
It responds to voice data, forwards this to the recipient and does not chang
e the RTP header.

How is a VPLS (Virtual Private LAN Service) kept loop-free? 2


(1 of 4 answers is correct)
By a Spanning Tree Protocol.
By the "split horizon" rule.
By building a loop-free tree of pseudo-wires.
By eliminating MAC learning.

What is a function of the SIP redirect server? 2


(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the destination IP add
ress and rewrites them.
It responds to signaling messages and transfers these unchanged to the desti
nation IP address.

It responds to signaling messages and answers the sender with a new destinat
ion address.
It responds to signaling messages and answers the destination with a new sen
der address.

Which of the following have highest priority when designing VoIP networks? 1,
2
(2 of 4 answers are correct)
Packet delay and jitter.
Packet throughput and loss.
Type of terminals and NICs.
Number of gateways.

Which Cisco configuration mode has to be used to configure a particular port on


a switch? 2
(1 of 4 answers is correct)
port configuration mode
interface configuration mode
global configuration mode
user mode

What codec offers ISDN voice quality? 1

(1 of 4 answers is correct)
G.711
G.723.1
G.728
G.729A

Which of the following are valid virus types? 1,2,3


(3 of 4 answers are correct)
Trojan horse
Macro virus
Boot virus
Processor virus

Which of the following statements about the use of Ethernet switches are correct
? 1,2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.
The number of network collisions in switches increases slightly.
Cascading can lead to bottlenecks.
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a

What is the difference between a switch and a bridge? 3,4


(2 of 4 answers are correct)
Switches operate at lower speeds than bridges.
Switches do not support dedicated communication between devices.
Switches support more advanced functionality than bridges.

Switches have usually more ports than bridges.

Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.

During session setup the terminating S-CSCF has to forward the "Invite" message
to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retrieves
the callee's address and guarantees the traversal of the proxies? 1

(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

How many AF codepoints can be mapped within DSCP? 2


(1 of 4 answers is correct)
8
12
32
64

Which command can be entered in a DOS Shell on a Windows operating system to dis
play the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print

show route

Which information send a distance vector router to its neighbor routers as par
t of a periodic routing table update? 3
(1 of 4 answers is correct)
Only routes that have changed.
Routes that no longer exist.
The entire routing table.
Only information about new routes.

What is a valid IPv4 address to identify a host on the public Internet? 2


(1 of 4 answers is correct)

172.16.8.255
64.32.16.8
127.0.0.1
192.168.100.142

Which of the following protocols can be used for enhanced security in VoIP netwo
rks? 2,4
(2 of 4 answers are correct)
RTP
Secured RTP (SRTP)
SIP via UDP
SIP via TLS/SSL

How can link-state protocols minimize the amount of routing updates? 1


(1 of 4 answers is correct)
Sending updates only for topology changes.
Separating the network into area hierarchies.
Supporting classless addressing.
Sending the subnet mask together with the address.

Which of the following expressions represents a Standardized VIDEO compression


Method? 1,3,4

(3 of 4 answers are correct)


MPEG 2
H.323
MPEG 4
H.264

Mark the correct answers! 1,2,4


(3 of 4 answers are correct)
DNS is used to dynamically assign an IP address to a GPRS user during PDP co
ntext activation.
DNS is used to translate the APN in the SGSN to a suitable GGSN IP address d
uring PDP context activation.

DNS is used to lookup the IP address of the old SGSN from the old RAI during
inter-SGSN routing area update.
DNS is used by the MS/UE to translate the internet domain or host name into
IP addresses.

Which command can be entered in a Windows operating system to add a static rou
tes? 1
(1 of 4 answers is correct)
route add [destination] [mask] [gateway] [metric] -p
tracert [destination] [mask] [gateway] [metric] -p
route config [destination] [mask] [gateway] -p
iproute add [destination] [mask] [gateway] -p

Which of the following are the tasks of DiffServ in Quality of Service? 1,2
(2 of 4 answers are correct)
Classification of packets into QoS classes.
Reservation of paths in a multiservice network.
Specification of drop precedence.
Registration of routing information.

Which of the following e-mail protocols supports personal folder mailboxes with
offline management? 2,3

(2 of 4 answers are correct)


MTP
POP3
IMAP4
SMTP

Which of the following are the types of management units defined within SNMP? 3,
4
(2 of 4 answers are correct)
Supervisor
Manager
Agents

Nodes

"Connectionless data transmission" means? 4


(1 of 4 answers is correct)
The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without
confirmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.
What are transition mechanisms for IPv6? 1, 4
(2 of 4 answers are correct)
IPv6-over-IPv4 tunneling
Mobile IPv6
IPSec
Dual stack

Which of the following devices are improving network security? 2,4


(2 of 4 answers are correct)
Hub
Firewalls

IDS probes
NIC

Which of the following statements regarding FIFO queuing mechanisms is correct?


3
(1 of 4 answers is correct)
Packets with the highest priority are forwarded first.
Prioritization is used to decide which packets can be rejected.
Packets are forwarded in the same sequence as they arrive.
The last packet received is the first packet to be forwarded.

What is a function of a switch? 3


(1 of 4 answers is correct)

Acting as an end point in the network, sending and receiving data.


Connecting separate networks and filtering the traffic over those networks s
o that the data is transmitted through the most efficient route.
Providing network access to end systems and intelligent switching of the dat
a within the local network.
To choose the path over which data is sent to its destination.

What MUST be configured manually when an IP phone uses DHCP? 1


(1 of 4 answers is correct)
The call number of the phone.
The default gateway.
The IP address.
The subnet mask.

How can a PBB-TE (Provider Backbone Bridge - Traffic Engineering) trunk be gener
ated? 3
(1 of 4 answers is correct)
Manual configuration.
RSVP-TE.
MAC learning based on Backbone addresses.
The Link Control Protocol (LCP).

How should the jitter buffer be configured for optimum voice quality? 3
(1 of 4 answers is correct)
The jitter buffer has nothing to do with the voice quality.
The jitter buffer should be set to a packet length so it does not cause any
delays.
The jitter buffer should be set as high as possible so that it does not caus
e any delay.
The jitter buffer should be configured based on the actual state of the cust
omer's network.

Which of the following statements about the Spanning Tree Algorithm is correct?
4

(1 of 4 answers is correct)
Spanning Tree is used to find the shortest path through an IP Network.
Spanning Tree is used to find the path with the maximum bandwidth in the LAN
.
Spanning Tree is used to distribute VLAN information to all Layer 2 switches
.
Spanning Tree is used to compute unique paths across a meshed network of lay
er 2 bridges/switches.

What is the typical bitrate for the transmission of a good quality SDTV (Stand
ard-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

Which Cisco IOS command displays static route information on a Cisco router? 3
(1 of 4 answers is correct)
show ip static route
show route ip static
show ip route

show route ip

Which of the following protocols is used to resolve the IP address to a URI (U


niform Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225
SMTP

P-CSCF Discovery takes place in the following way 1,2


(2 of 4 answers are correct)

integrated into the IP-CAN access procedure; e.g. during the PDP context act
ivation in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
via a HSS-HLR interrogation during registration.
by an end to end QoS parameter retrieval from the PDF.

Which hardware is needed to stop collisions? 3


(1 of 4 answers is correct)
Hub
Media Converter
Bridge
Repeater

Which network components are identified by a Backbone Destination Address and


a Backbone Source Address? 1
(1 of 4 answers is correct)
The Backbone Edge Bridges.
The Provider Edge Bridges.
The Customer Edge Bridges.
The Backbone Core Bridges.

Which are common methods for spreading viruses? 1,2,3

(3 of 4 answers are correct)


Using Removable Media.
Sending and receiving Emails.
Visiting Web sites.
Deleting files.

Which of the following codecs works without compression? 1


(1 of 4 answers is correct)
G.711
G.723
G.728

G.729

Which of the following terms and definitions are specified in the Data Link La
yer of the OSI Reference Model? 1,3,4
(3 of 4 answers are correct)
Use of physical addresses.
Use of logical addresses.
Access method to the media.
The Bit Check Sequence of the data frames.
Which of the following Windows commands allows you to release and renew your DHC
P-provided IP address? 2
(1 of 4 answers is correct)
release /ip
ipconfig /renew
ipconfig /release
ifconfig -renew

What is BGP used for? 1,4


(2 of 4 answers are correct)
Detailed Route description inside an Autonomous System.
Translation of routes between two different routing protocols.

Application of routing policies between Autonomous Systems.


Application of routing policies inside an Autonomous System.

Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1
(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.

Which of the following are of greatest concern when designing VoIP networks?
1,2,4
(3 of 4 answers are correct)
Packet delay and jitter.
Packet throughput and loss.
Type of terminals and NICs.
QoS implementation
An IP packet can be labelled with at most how many labels? 4
(1 of 4 answers is correct)
1
2
3 (1 customer label, 2 provider labels).
Unlimited

Which is the main advantage of using connection-oriented protocols as opposed


to connectionless protocols? 2
(1 of 4 answers is correct)
improved safety
warranted packet transfer

reduced protocol size


faster data transfer

Which of the following signaling protocols can be used to connect an IP-PBX to a


SIP-Proxy / SIP Application Server? 1,3
(2 of 4 answers are correct)
SIP-Connect
SIP-NNI
MGCP
RTP

What can be protected with a password on a Cisco Router? 1,4


(2 of 4 answers are correct)

console access
user-level access
ACL access
EXEC-level access

Which of the following statements describe MPLS? 2,4


(2 of 4 answers are correct)
Destination addressing is done by the user.
It uses short headers with fixed length.
The TCP header contains label related settings.
The label is replaced with a new one at each hop.

Which of the following DiffServ Code Points (DSCP) sets the highest priority o
n packets? 3
(1 of 4 answers is correct)
First In First Out.
Best Effort.
Expedited Forwarding.
Assured Forwarding.

Which of the following parameters are Ethernet service attributes according to


MEF (Metro Ethernet Forum)? 1,3,4
(3 of 4 answers are correct)
Bandwidth profile.
Security filters.
Performance parameters.
Tunneling Flag.

Which of the following is a property of Priority Queuing? 3


(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.

All packets are processed according to the LIFO principle.

Which of the following specifications is not defining a call set up control pr


otocol? 3
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323
How many priority levels are there within IP Precedence? 2
(1 of 4 answers is correct)
3
8
16
64

Which of the following protocols is NOT used in the IMS (IP Multimedia Subsyst
em)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)

Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)

Which of the following statements is NOT correct? 3


(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.

What is the meaning of 100 in IEEE 100BaseT? 3


(1 of 4 answers is correct)
Impedance of 100 Ohm.
Bandwidth of 100 MHz.
Bitrate of 100 Mbit/s
Distance of 100 meters.

On which Internet standards is SIP based on? 1,2


(2 of 4 answers are correct)
Hypertext Transfer Protocol
Simple Mail Transport Protocol
Post Office Protocol
Simple File Transfer Protocol

Which task within PPP does the Link Control Protocol have? 1
(1 of 4 answers is correct)
Setup of a Layer 2 connection.
Configuration of Network Layer protocols.
HDLC frame generation.
Temporary IP address assignment.

Which of the following elements typically belong to a SIP architecture? 1,2,4


(3 of 4 answers are correct)
PROXY server
User agent
Gatekeeper
Gateway

If all the bits of a host ID are set to binary "1", what does this define?
3
(1 of 4 answers is correct)
The Host.

The Network.
A Broadcast.
A Loopback.

Which statements describe the tasks of PPP? 1,3,4


(3 of 4 answers are correct)
PPP can be used as an encapsulation protocol for transporting IP traffic ove
r point-to-point links.
Every PPP session requires a authentication phase.
PPP provides router-to-router connections over synchronous and asynchronous
circuits.
The LCP in PPP is used for establishment, configuration, and testing the dat
a-link connection.
1)
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies? 1
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

2)
What can be done to increase wireless security? 1
(1 of 4 answers is correct)
Disabling SSID broadcasts.
Turning off WEP.
Placing access points indoors.
Using 802.11b instead of 802.11g.

3)
Which of the following messages is sent by a system supporting IntServ when re
ceiving a path message? 2
(1 of 4 answers is correct)

Release complete
Reserve message
Alerting message
Status inquiry

4)
Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0? 2
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.

5)
Which of the following statements about a digital certificate are correct? 2
,4
(2 of 4 answers are correct)
It is a message that ensures the priority of the sent data.
It is sent on request of a peer requiring an authentication.
A new certificate is created for each message.

It is issued by a Certification Authority (CA).

6)
Which of the following fields identifies the protocol used in the data field of
an Ethernet frame? 1
(1 of 4 answers is correct)
Type
Destination address
Checksum
Source address

7)
Which connection requiers a crossover LAN cable? 2
(1 of 4 answers is correct)

PC to a switch.
PC directly to another PC.
PC to a modem.
PC to a hub.

8)
When the host ID of an IP address is set to "0", what does this define? 2
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A loopback.

9)
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically? 1
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT

10)
Which protocol is used for the control of video on demand sessions? 4
(1 of 4 answers is correct)
Run Time Control Protocol
Internet Group Management Protocol
Video Control Protol
Real Time Streaming Protocol

11)
Which of the following is the default CoS for voice traffic in IEEE 802.1 p/Q?
1
(1 of 4 answers is correct)

0
1
7
6

12)
Which of the following answers describes Random Early Detection (RED)?
3
(1 of 4 answers is correct)
RED randomly drops UDP packets during minimal congestion to protect TCP conn
ections.
RED randomly drops UDP packets according to their priority to keep queue siz
es below a defined level.
RED randomly drops packets during minimal congestion to reduce network traff
ic.
RED randomly drops TCP packets according to their priority to preserve UDP b
ased
13)
What is the default port number (decimal) of Telnet? 2
(1 of 4 answers is correct)
21
23

25
53

14)
Which of the following is true regarding SNMP communities? 3,4
(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access.
The trap community must be the same as the public community.

15)
What is the purpose of Multipurpose Internet Mail Extensions (MIME)? 2
(1 of 4 answers is correct)
MIME contains information on how to forward e-mails if the mailbox is not on
the local mail server.
MIME supports in emails the transfer of data in any format.
MIME defines the mailbox properties, like the size of box and messages.
MIME is used to authenicate e-mail clients and for the encoded transfer of d
ata between
16)
If both the "enable secret" and the "enable password" commands are configured
on the Cisco router, how do you get to the # prompt? 4
(1 of 4 answers is correct)
Use the "enable password" command.
Use the "enable secret" command.
Use either the "enable secret" OR the "enable password" command.
Use both the "enable secret" AND the "enable password" commands.

17)
Which of the following cable categories can be used with the IEEE 802.3af standa
rd? 1,2,3
(3 of 4 answers are correct)
Cat 3
Cat 4
Cat 5
Cat 6

18)
Which of the following protocols are connection-oriented? 1,3
(2 of 4 answers are correct)
HDLC
IP
TCP
UDP

19)
Which of the following is true regarding SNMP MIB? 2,3
(2 of 4 answers are correct)
Each MIB file must contain a public and private entries.
It is a database of industry defined standards for a particular SNMP version
.
Each product vendor can create a private MIB to enhance the basic MIB featur
es.
Each MIB is designed in the format of a MS Access database.

20)
Which of the following servers access the SIP location server directly? 1,2,4
(3 of 4 answers are correct)
Registrar server
Proxy server
Name server
Redirect server

21)
How does a distance vector router learn about networks that are NOT directly con
nected? 4
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.

22)
Which of the following statements about IP routing is true? 3
(1 of 4 answers is correct)
IP routers create their routing tables by learning the source address from i
ncoming IP datagrams.
IP routers must use the 'Protocol'-type field in each IP datagram to make th
eir routing decisions.
IP routing tables can be statically configured (e.g. manually, via host file
s or via DHCP, etc.) or dyncamically via routing protocols like OSPF or RIP.
Usage of routing protocols like OSPF or RIP is not allowed in mobile backbon
e IP networks like GPRS.

23)
TCP-Ports are essential components for communication in the IP environment. Wh
ich statement is correct? 3
(1 of 4 answers is correct)
TCP-Ports are fixed and can never be changed.
Ports are used for identifying the routing protocol used.
Ports are used for identifying applications or processes.
Ports define whether you are working with TCP or UDP.

24)
Which term is last default entry at the end of every ACL on a Cisco Router?
2
(1 of 4 answers is correct)
implicit deny host
implicit deny any
deny ip
ip deny any

25)

Which statements about the QoS mechanism DiffServ are correct? 1,2,4
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

26)
Which of the following statements is NOT correct? 3
(1 of 4 answers is correct)
Real Time Protocol (RTP) is used between SIP Endpoints and a SIP-Proxy.
Real Time Protocol (RTP) is used between an IP-PBX and the Trunking Media Ga
teway to handle the payload between the IP PBX and PSTN/ISDN subscribers.
Real Time Protocol (RTP) is used between 2 eMTAs for an on net call in a Voi
ce over cable scenario.
Real Time Protocol (RTP) is used between SIP Endpoints and a Trunking Media
Gateway.

27)
Which of the following statements about ERPS (Ethernet Rings Protection Switchin
g) are true? 2, 3
(2 of 4 answers are correct)
ERPS guarantees recovery times of below 50ms, whilst Spanning Tree algorithm
s have recovery times of several seconds.
ERPS can only be implemented on rings, whilst Spanning Tree protocols can be
used on any topology.
ERPS converges faster than Spanning Tree algorithms and, depending on the ne
twork size, can offer recovery times of below 50ms.
With ERPS, the network operator has more influence on the active topology th
an when using a Spanning Tree algorithm.

28)
What is the maximum bandwidth of the IEEE 802.11g specification? 4

(1 of 4 answers is correct)
5,5 Mbit/s
11 Mbit/s
54 Mbit/s
108 Mbit/s

29)
Would an existing LAN infrastructure based on 10 Mbit/s be suitable to add VoIP
for 30 clients? 2
(1 of 4 answers is correct)
The network can be adopted as it is because 30 simultaneous VoIP connections
seize about 5Mbit/s only.
The expected network load must be recalculated to determine the need for add
itional ressources.
There will be no problem, the collision detection guarantees with the utmost
propability the delivery of the voice packets.
The voice packets can additionally be sent during the "gaps" between the Eth
ernet packets.

30)
What is latency in a VoIP network? 1
(1 of 4 answers is correct)
The delay introduced by equipment and circuits during data transmission.
The variance in delay between packets.
A term that describes the amount of data that can be transmitted over a spec
ific period of time.
A description of what happens when more than 5% of packets are lost in a VoI
P conversation.

31)

Which of the following statement describes the behavior of a color aware UNI (Us
er Network Interface) according to the Metro Ethernet Forum? 1
(1 of 4 answers is correct)
Color marking of incoming frames is preserved.
Incoming yellow frames are metered and marked as yellow or red, according to
their SLA compliance.
Incoming green frames are metered and marked as green, yellow or red accordi
ng to their SLA compliance.
Outgoing frames are color marked.

32)
What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? 2
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)

33)
What is the length of the host ID for an IPv4 address? 4
(1 of 4 answers is correct)
Always half of the address.
As defined by the ToS byte.
Always 24 bits.
It depends on the subnet mask.
34)

Which of the following signaling protocols can be used to connect an IP-PBX to


a SIP-Proxy / SIP Application Server? 1,3
(2 of 4 answers are correct)
SIP-Connect
SIP-NNI
MGCP
RTP

35)
Which of the following networks elemets are used in a Voice over Cable network?
1,2,3
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).
Cable Modem Termination System (CMTS).

36)
Which guidelines apply to IP addressing? 1,2,,3
(3 of 4 answers are correct)
The number 127 may not be used as the first octet for the network.
The host ID may not consist only of the value 0.

The host ID must be unique for the local network.


The host ID may not contain a zero.

37)
Which of the following statements about TCP/UDP is correct? 1
(1 of 4 answers is correct)
Only TCP guarantees that the sent data has reached the peer completely.
Only UDP guarantees that the sent data has reached the peer completely.
Both TCP and UDP guarantee that the sent data has reached the peer completel
y.
Both TCP and UDP do not guarantee that the sent data has reached the peer co
mpletely.

38)
What is the typical bitrate for the transmission of a good quality SDTV (Standar
d-definition television) signal with MPEG-4 compression? 2
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

39)
Which of the following is a property of Priority Queuing? 3
(1 of 4 answers is correct)
All packets are transmitted simultaneously.
All packets are transmitted with equal priority.
All packets are assigned to queues according to their priority.
All packets are processed according to the LIFO principle.

40)
Your customer is very concerned about a hacker listening to his voice conversati
ons and wants to know which is less likely to be hacked, TDM or VoIP. Which of t
hese statements are correct when addressing this concern? 1

(1 of 4 answers is correct)
TDM connections are always encrypted, so they are safer than VoIP connection
s.
VoIP connections are always encrypted, so they are safer then TDM connection
s.
Either could be intercepted if the hacker knows where to connect.
The authentication is encrypted in VoIP so the voice cannot be intercepted,
therefore it is safer than TDM.

41)
Which of the following are NOT valid parts of IPv4 subnetwork masks? 1,2
(2 of 4 answers are correct)
"1101 1111"
"1111 1100"
"1101 10"
"1000 00"

42)
What is the difference between an ethernet hub and an ethernet switch? 2,
4
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.

A switch offers better performance as it operates collision-free.


For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch.

43)

What are features of layer 2 switches? 2,4


(2 of 4 answers are correct)
Evaluation of the 802.1p field
Routing of InterVlan traffic
10/100 Mbit autosensing
Use of Open Shortest Path First

44)
Which of the following connections support IEEE 802.3ad Link Aggregation ? 2,4
(2 of 4 answers are correct)
Multipoint
Full duplex
Half duplex
Point to Point
45)

Which of the following protocols is NOT used in the IMS (IP Multimedia Subsystem
)? 1
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)

46)
How many TEIDs has an active PDP context assigned at least between SGSN and GG
SN: 1

(1 of 4 answers is correct)
2
4
8
0

47)
How does the analogue to digital and digital to analogue conversion affect the t
otal propagation time of a packet? 3
(1 of 4 answers is correct)
It has an impact of approx. 20 ms per conversion.
It has an impact of approx. 10 ms per conversion.

It can only be carried out twice per connection.


it has a negligible impact.

48)
Which of the following authentication protocols are supported by PPPoE? 3,4
(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN

49)
Which of the following statements about the use of Ethernet switches are correct
? 1, 2
(2 of 4 answers are correct)
The available bandwidth depends on the number of connected devices.
Full duplex mode to corresponding devices is possible.
The number of network collisions in switches increases slightly.
Cascading can lead to bottlenecks.

50)
What does Class of Service (CoS) refer to in the context of Carrier Ethernet?
2
(1 of 4 answers is correct)
Any classification of frames inside the MEN.
The possibility to offer different service levels like premium, controlled l
oad, standard, best effort etc. to end customers.
The priority bits of the VLAN tag.
Different service types like point-to-point, multipoint-to-multipoint and po
int-to-multipoint.

51)
How many ACLs per protocol, per direction and per interface can be applied on a
Cisco router? 1
(1 of 4 answers is correct)
1
2
4
any number

52)

Which codecs compress voice? 2,3


(2 of 4 answers are correct)
G.723
G.711
G.729
E.164

53)
Which of the following statements applies to data transfer based upon HTTPS? 3
(1 of 4 answers is correct)
It is based on SSL and is encrypted symmetrically.
It is based on SSL and is encrypted asymmetrically.
It is based on SSH and is encrypted symmetrically.

It is based on SSH and is encrypted asymmetrically.

54)
Which protocol does a router use to determine the MAC address to deliver an in
coming packet? 2
(1 of 4 answers is correct)
ICMP
ARP
SMTP
UDP

55)
Which of the following e-mail attachments can contain Trojan horses? 3,4
(2 of 4 answers are correct)
Sales.txt
Sales.doc
Sales.ini
Sales.exe

56)
Which of the following statements is correct about MAC addresses? 3
(1 of 4 answers is correct)
It indicates the maximum supported bit rate.
It can be used many times in the same network.
It is the physical address of a NIC.
It contains the country code for a PC.

57)
What can be configured on a Cisco router with the user EXEC mode commands?
4
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.

The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.

58)
Which of the following codecs needs the highest bandwidth? 2
(1 of 4 answers is correct)
G.723.1
G.711
G.729a/b
G.728

59)
Which of the following statements describe the function of routing tables? 1
,2
(2 of 4 answers are correct)
Routing tables contain metrics that are used to determine the acceptability
of the route.
When a router receives an incoming packet, it uses the source address and se
arches the routing table to find the best path for the data from that source.
Although routing protocols vary, routing metrics do not.
Routing tables provide an ordered list of known network addresses.

60)
Which firewall types are valid? 2,4
(2 of 4 answers are correct)
Bridge Filter Firewall.
Packet Filter Firewall.
NIC Filter Firewall.
Application Filter Firewall.

61)
Which of the following statements about MAC addresses in an Ethernet topology
are correct? 2,3
(2 of 4 answers are correct)
It is encrypted and can not be masked.
It must be unique within the network.
It is represented in hexidecimal format.
It can only be bound to one network protocol at layer 3.

62)
Which of the following items may be set using Internet Protocol Control Protocol
(IPCP) during PPP communications? 2,3
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.

63)

Which of the following is the Authentication Server when using EAP? 2


(1 of 4 answers is correct)
DNS server
RADIUS server
DHCP server
Exchange-Server

64)
Which part of the IP address evaluates the router with the help of the subnet ma
sk? 3
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.

Mask and host bits.


Host and subnet bits.

65)
Which statements about VPN are correct? 1,3
(2 of 4 answers are correct)
VPN is a private, logical network.
VPN has no security mechanisms.
IP-based VPNs can be based on the PPP protocol with IP tunnelling.
VPN requires less configuration than conventional LAN links.

66)
What is the meaning of "Tail Dropping"? 1
(1 of 4 answers is correct)
Incoming packets are dropped if the buffer is full.
Incoming packets are dropped at random if a preset value is reached.
Packets from low priority queues are dropped before packets from high priori
ty queues.
Packets arrving with a high delay are dropped because they are considered us
eless for the application.
67)

What is the effect of Network Address Translation (NAT) on network security?


3,4
(2 of 4 answers are correct)
It has no effect on network security.
It will reduce network security.
It hides the IP address of the local host to increase security.
It makes incoming connections more difficult which increases security.

68)
Which of the following statements about the ToS field are correct? 1,3
(2 of 4 answers are correct)
It is part of the IP header.
It is added to the IP header by QoS mechanisms.
DSCP and IP precedence use this field.
IntServ uses this field.

69)

Which statements describe the tasks of PPP? 1,3,4


(3 of 4 answers are correct)
PPP can be used as an encapsulation protocol for transporting IP traffic ove
r point-to-point links.
Every PPP session requires a authentication phase.
PPP provides router-to-router connections over synchronous and asynchronous
circuits.
The LCP in PPP is used for establishment, configuration, and testing the dat
a-link connection.

70)
Which command can be entered in a DOS Shell on a Windows operating system to d
isplay the routing tables? 3
(1 of 4 answers is correct)
arp -a
tracert -routing
route print
show route

71)

Which of the following port numbers does SIP use by default? 4


(1 of 4 answers is correct)
80

443
4060
5060

72)

Which of the following protocols is used to resolve the IP address to a URI (Uni
form Resource Identifier)? 2
(1 of 4 answers is correct)
SDP
DNS
H.225

SMTP

73)

What is a function of the SIP redirect server? 2


(1 of 4 answers is correct)
It responds to signaling messages, transfers these to the destination IP add
ress and rewrites them.
It responds to signaling messages and transfers these unchanged to the desti
nation IP address.
It responds to signaling messages and answers the sender with a new destinat
ion address.
It responds to signaling messages and answers the destination with a new sen
der address.

74)

Which statements describe the functions of a router in a network? 1, 4


(2 of 4 answers are correct)
Routers use the routing table to identify where to forward packets.
Routers create large broadcast domains.
Routers use ICMP to communicate network information from their own routing t
able with other routers.
Routers maintain their routing tables and ensure that other routers know of
changes in the network.

75)

Which device uses typically a RS232 connector? 4


(1 of 4 answers is correct)
Telephone line cord
Ethernet
USB
PC serial connection

76)
Which of the following codecs offers the best speech quality? 1
(1 of 4 answers is correct)
G.711
G.723.1
G.729
G.729a
77)

Which of the following expressions represents a Standardized VIDEO compression


Method? 1,3,4
(3 of 4 answers are correct)
MPEG 2
H.323
MPEG 4
H.264

78)

Which of the following affects the quality of VoIP connections? 1,3,4


(3 of 4 answers are correct)
The voice codec selected.
The signaling protocol used for connection setup.
The transmission delay between endpoints.
The distance between the endpoints.

79)
On which Internet standards is SIP based on? 1,2
(2 of 4 answers are correct)
Hypertext Transfer Protocol
Simple Mail Transport Protocol
Post Office Protocol
Simple File Transfer Protocol

80)
Which of the following devices is used to reduce the effects of broadcast storms
? 2
(1 of 4 answers is correct)
Ethernet hub
Router
Gatekeeper
Repeater

Das könnte Ihnen auch gefallen