Sie sind auf Seite 1von 7

1. MAC is to Ethernet what ________ is to Frame Relay. 2. What is an example of a MAC address? A. Az32:6362:2434 B. BA:281x:8288 C. 101:354:665:8734:ffd6:8023 D.

A625:cbdf:6525

3. What would be the proper command to set a DCE clock rate of 56k for a serial interface? A.Router (config) # clockrate 56000 B. Router# clockrate 56000. C. Router (config-if) #clock rate 56000 D. Router (config-if) # clockrate 56k 4. Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identical 5. Given the the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are interconnected over a trunked link. Which of the following conditions would verify VLAN and trunk operation? (choose 3)

A. Host 1-1 can ping Host 1-2 B. Host 1-1 can ping Host 4-2 C. Host 1-1 can not ping Host 1-2 D. Host 4-1 can not ping Host 1-2

E. Host 4-1 can ping Host 4-2 6. The following exhibit shows the HINT.org WAN. Study it carefully:

What are the broadcast addresses of the subnets in the HINT network? (Select three options). A. 172.16.82.255 B. 172.16.95.255 C. 172.16.64.255 D. 172.16.32.255 E. 172.16.47.255 F. 172.16.79.255 7. Which of the following are benefits of segmenting a network with a router? (Select all that apply) A. Broadcasts are not forwarded across the router. B. All broadcasts are completely eliminated. C. Adding a router to the network decreases latency. D. Filtering can occur based on Layer 3 information. E. Routers are more efficient than switches and will process the data more quickly. F. None of the above. 8. The startup-config is found in the ... A. FLASH B. DRAM C. NVRAM 9. What is the host range of the first subnet given the following? 172.16.0.0 255.255.192.0 (Assume ip subnet-zero is enabled)

A. 172.16.0.0 -> 172.16.0.254 B. 172.16.0.1 -> 172.16.0.254 C. 172.16.0.0 -> 172.16.63.254 D. 172.16.0.1 -> 172.16.127.254 E. 172.16.0.1 -> 172.16.63.254 10. On which OSI layer does a hub operate? A. 1 B. 2 C. 3 D. 4 11. Which one of these IP addresses is a network address? 10.5.103.45/8 192.168.90.87/29 10.255.0.32/24 172.18.13.164/30

12 Which 3 are choices for the "duplex" interface configuration mode command? auto on off half full semi

13. How many broadcast domains exist on a 48 port switch with 7 VLANs?

14. What command is used to see the root bridge for VLAN 22 only? show ip interface brief show spanning-tree show spanning-tree vlan 22 summary show spanning-tree vlan 22

15. Which trunking protocol encapsulates the whole frame? VTP ISL DTP 802.1q

16. Two routers are having issues bringing up an EIGRP neighbor relationship. Examine the exhibit to determine the cause. Code: R1 interface s0/1 description To R2 encapsulation ppp ip address 192.168.25.66 255.255.255.252 no shutdown ! router eigrp 10 network 192.168.25.64 0.0.0.3 Code: R2 interface s0/1 description To R1 encapsulation ppp ip address 192.168.25.65 255.255.255.252 no shutdown ! router eigrp 20 network 192.168.25.64 0.0.0.3

auto-summary is enabled The AS numbers do not match The routers' serial interfaces are in different subnets EIGRP does not support PPP encapsulation

17. Which layer of the OSI model uses port numbers to differentiate between sessions? Transport Network Data Link Physical

18. Which protocol is the prefered secure choice for remotely accessing the command line of a Cisco network device? Telnet HTTP TFTP SSH FTP

19. What is the name of the mode that is accessed with the "enable" command? Privileged Exec Global Configuration User Exec Line Configuration

20. What global configuration command is used to weakly encrypt plain-text passwords in some IOS commands?

service encrypt-password service password-encryption service password-recovery encrypt-password service

21. What type of network it this?

Non-broadcast multiaccess Broadcast Multiaccess Point-to-Point LAN Point-to_Multipoint

22. What is port 80 used for?

A) FTP data B) DNS

C) Telnet D) HTTP E) TFTP

23. Your network features a combination of Cisco, 3COM and Netgear switches. You have been tasked to set up VLANS on your switched network. 24. What trunking method should you use?

A) Inter-Switch Link B) IEEE 802.1Q C) You can't create VLANs by combining switches from different vendors

25. Which protocol is used to determine the IP address if the MAC address is already known?

A) ARP B) RARP C) IP D) IPX E) TCP

Das könnte Ihnen auch gefallen