Copyright Keen Interactive 2001

Embed Size (px)

Citation preview

  • 8/14/2019 Copyright Keen Interactive 2001

    1/33

    CCNA CHEET SHEETS (640-507)COPYRIGHT KEEN INTERACTIVE 2001

    LAST UPDATE: 5/28/01

    **This document contains two sections (multiple and single choice)

    with 235 total questions from actual exams. Situational details (ie,names, dates, and places) have been changed for legal reasons. Wesuggest you memorize as many of these questions as possible; manywill appear on your actual exam. If you cannot memorize all of them,be sure to memorize the multiple choice section-these 163 questionsare the most recent of the 235 total questions here. Good luck, and

    study hard. -Keen Interactive

    BEGIN MULTIPLE CHOICE SECTION1. Which two statements about the store and forward switching method are true? (CHOOSE TWO)

    A. Latency remains constant regardless of frame size.B. Latency through the switch varies with frame length.C. The switch receives the complete frame before beginning to forward it.D. The switch checks the destination address as soon as it receives the header and begins

    forwarding the frame immediately.

    2. Enter the command to start IP, RIP version1 routing on a Cisco router.

    3. Which line from a show spantree command output indicates that Virtual LAN1(VLAN1) isfunctioning properly?

    A. Root mode is fast ethernet 0/26.B. Port ethernet 0/1 of VLAN is forwarding.C. Designated port in ethernet 0/1 path cos10.

    D. Designated root has priority 0, address 0000.588fb600E. VLAN1 is executing the ISL compatible spanning tree protocol.

    4. Which two physical interfaces port PPP? (CHOOSE TWO)

    A. EthernetB. TokenRingC. Synchronous SerialD. Asynchronous Serial

    5. Which two statements about the Frame Tagging are true? (CHOOSE TWO)

    A. Filtering table is developed for each switch.B. Frame Tagging defines a unique user defined ID to each frame.

    C. A unique identifier is placed in the header of each frame as it is forwarding between switches.D. Frame Tagging is technique that examines particular information about each frame based on

    user defined offsets.

    6. Consider a method for transporting frames through a switch that checks the destination addressin the frame header and immediately begins forwarding the frame. What is this frametransmission method called?

    A. CSMA/CDB. FULL DUPLEX

  • 8/14/2019 Copyright Keen Interactive 2001

    2/33

    C. CUT THROUGHD. HALF DUPLEXE. FRAGMENTATIONF. STORE AND FORWARD

    7. Which command would you use to enable IP/RIP version1 on a router?

    A. Router RIP network 172.16.1.0 network 10.1.0.1B. Router RIP network 172.16.0.0 network 10.0.0.0C. Router RIP network 172.16.1.0 172.16.1.1 network 10.1.0.0 10.1.1.1D. Router RIP network 172.16.1.0 265.255.255.0E. Network 10.1.0.0 255.255.0.0

    8. During encapsulation, in which order is information packaged?

    A. Data, Packet, Segment, FrameB. Segment, Data, Packet, FrameC. Data, Segment, Packet, FrameD. Packet, Data, Segment, frame

    9. Which of the following is an example of a valid MAC address?

    A. 192.201.63.251B. 19-22-01-63-25C. 0000.1234.FEGD. 00-00-12-34-FE-AA

    10. What are two purposes for using switches? (CHOOSE TWO)

    A. To reduce collisionsB. To increase collisionsC. To increase the number of collision domainsD. To decrease the number of collision domainsE. To decrease the number of broadcast domains

    11. Within a hierarchical number of IP addresses what determines the portion of the address thatwill identify the network number?

    A. Subnet Mask B. Dots between octetsC. Class of first octetD. Assignments of DHCPE. Address-resolution process

    12. Which three functions are supported by connection oriented services?

    A. Connection parameters are synchronizedB. Any loss or duplication of packets can be corrected

    C. The data packet is independently routed and the service does not guarantee the packet will beprocessed in orderD. A data communication path is established between the requesting entity and the peer device on

    the remote end system

    13. Which two statements about reliable connection oriented data transfer are true?

    A. Recipients acknowledge receipt of dataB. When buffers are filled to capacity, datagrams are discarded and not retransmittedC. Windows are used to control the amount of outstanding acknowledged data segments

  • 8/14/2019 Copyright Keen Interactive 2001

    3/33

    D. If the segments timer expires between receipt of an acknowledgement the sender drops theconnection

    E. The receiving device waits for acknowledgements from the sending device before acceptingmore data segments

    14. What is the result of segmenting a network with a bridge?

    A. It increases the number of collision domainsB. It decreases the number of collision domainsC. It increases the number of broadcast domainsD. It decreases the number of broadcast domains

    15. How does a bridge function?

    A. It maintains a table of the IP addresses of the hosts connected to its Internet segmentB. It passes packets outside of its network segment that cannot be found on its tableC. It looks up the frames destination in its address table and sends the frame towards the

    destinationD. It maintains the table of the data link layer and network layer addresses for the host connected to

    its network segment

    16. Each department has its own file server and the company has an enterprise server that is sharedby all departments. What does a network administrator use to provide a secure separationbetween the management and sales department?

    A. Bridge between management and sitesB. Routers to provide the most secure segmentationC. A hub to provide the ease of management and a satisfactory alternative for the network securityD. An Ethernet switch to secure separation by programming the access list of each port of the

    switch

    17. What was the key reason for creating the International Organization for Standardization thatreleased the OSI model?

    A. Users could access network servers fasterB. Different vendors network could work with each otherC. The industry could create a standard for how computers workD. Network administrators could increase the overall speed of their network

    18. Given the IP address 192.168.21.12 from the class C address range your network needsaddresses for 28 small offices. Each office uses its own subnet. The network designs specify thatyou configure for 5 bits of subnetting when you configure the Cisco IOS software. Which subnetmask should you use?

    A. 255.255.0.28B. 255.255.255.0C. 255.255.255.28D. 255.255.255.248

    E. 255.255.255.252

    19. Which statement about switched and routed data flow is correct?

    A. Switches create a single collision domain and a single broadcast domain. Routers provideseparate broadcast domains.

    B. Switches create separate collision domains but a single broadcast domain. Routers provide aseparate broadcast domain.

    C. Switches create a single collision domain and a separate broadcast domain. Routers provide aseparate broadcast domain as well.

  • 8/14/2019 Copyright Keen Interactive 2001

    4/33

    D. Switches create separate collision domains and separate broadcast domains. Routers provideseparate collision domains.

    20. Click the task button. Place the name of OSI layer next to its description.

    OSI LAYER NAME DESCRIPTION

    PLACE HERE This layer segments and reassembles data into a data string.

    PLACE HERE This layer manager device addressing tracks the location ofdevice on the network and determines the best way to move data

    PLACE HERE This layer transmits the data and handles errors notification,topology and flow control.

    LAYERS PHYSICAL, NETWORK, DATALINK, TRANSPORT,SESSIONS

    21. Which type of LAN segmentation device enables high speed data exchange?

    A. HUBB. BRIDGEC. SWITCHD. REPEATER

    22. What are the generic paths of a network layer address?

    A. Internal network number and a URLB. A vendor code and a serial numberC. A network number and host numberD. A broadcast number and unicast numberE. A domain identifier and a device identifier

    23. Which of the following is an advantage of local area network LAN segmentation?

    A. Smaller collision domainsB. Elimination of broadcastC. Decrease cost of implementationD. Larger number of users within the same domain

    24. Click the EXHIBIT button. The exhibit shows an IP address and its subnet mask. What is thelast available host address for this IP subnet?

    A. 172.20.7.255B. 172.20.7.190C. 172.20.7.191

    D. 172.20.7.129E. 172.20.255.255

    25. What is the link state routing protocol used in the TCP/IP protocol stack?

    A. IPB. IS-ISC. NLSPD. OSPFE. RIP ver 2

  • 8/14/2019 Copyright Keen Interactive 2001

    5/33

    26. Which two commands allow you to verify address configuration in your network?

    A. PingB. TraceC. VerifyD. Test IP

    E. Echo IPF. Config IP

    27. What is the result of using a hierarchial addressing frame work?

    A. Increased availability of addresses.B. Decreased distance between routers.C. Increased router memory requirements.D. No need to maintain routing information.

    28. Which two IPX encapsulation names are correctly paired with their Cisco IOS encapsulationnames?

    A. Ethernet_I I-ARPAB. Ethernet_802.3-SAPC. Ethernet_802.2-LLLCD. Ethernet_SNAP-SNAP

    29. In which two modes can the ICMP ping command be used?

    A. User B. PrivilegedC. Global ConfigurationD. Interface Configuration

    30. Which three protocols exactly match their transport layer functions?

    A. Route selection-IPB. Sliding window-UDPC. Well known ports-IPD. Route validation-ICMPE. Connection oriented-TCP/IPF. Three way handshake TCP/IPG. No acknowledgement-UDP

    31. When you configure an IP address on a Cisco Router, which command starts the IP processingon the interface?

    A. IP-Space enableB. Network IP-AddressC. IP address IP-address subnet mask

    D. The exit command from the enable configurationE. Copy running-configuration to startup-configuration

    32. Which network mask should you place on a class C address to accommodate a user requirementfor five networks with a maximum of 17 hosts on each network?

    A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248

  • 8/14/2019 Copyright Keen Interactive 2001

    6/33

    33. IPX traffic using different encapsulation types can go over the same datalink. True or false?

    A TRUEB. FALSE

    34. The ICMP (referred to in RFC1700) is implemented by all TCP/IP hosts. True or false?

    A. TRUEB. FALSE

    35. Which command sets IGRP as the routing protocol for autonomous system 100?

    A. Router(config)# IGRP 100B. Router(config)# NETWORK 100C. Router(config)# router IGRP 100D. Router(config)# enable IGRP 100

    36. Which statement about the flow control function of TCP is true?

    A. TCP/IP makes no effort to check for lost or duplicate data packetsB. The application layer must sequence data packets when using TCPC. TCP controls the flow of UDP data through negative acknowledgements (NAK)D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is

    considered reliable

    37. You have a frame relay link on Serial. Which command displays the local management interfaceLMI data link connection identifier DLCI and bandwidth for that link?

    A. SHOW INTERFACE SERIAL1B. SHOW FRAME-RELAY SERIAL1C. SHOW PROTOCOL FRAME-RELAY SERIAL1D. SHOW SERIAL1 ENCAPSULATION FRAME-RELAY

    38. What does the frame relay switch use to distinguish between each PVC connection?

    A. Data link connection identifier (DLCIs)B. CNsC. FECNsD. Local management interface LMI

    39. Company XYZ has an employee that works at home. The employee runs big client-serverapplications and must quickly transfer large files. The company wants the best cost benefit onthis connection. What would be the most practical solution?

    A. An ISDN basic rate interface (BRI) connection to the users homeB. A dedicated T1 connection to the users homeC. A dedicated frame relay connection to the users home

    D. A standard 28.8 analogue dial up connection to the users home

    40. What is the total bandwidth of all channels on a PRI circuit?

    A. 54 kpsB. 64 kpsC. 112 kpsD. 128 kpsE. 144 kpsF. 1.544 Mbps

  • 8/14/2019 Copyright Keen Interactive 2001

    7/33

    41. What are four benefits that can result from applying ISDN networking?

    A. Full time connectivity across the ISDN supported by Cisco IOS routing using dial on demandrouting DDR

    B. Small office and home office sites can be economically supported with ISDN basic rate interfaceBRI services

    C. ISDN replaces signaling system SS7 in the public switch telephone network PSTN backboneD. ISDN can be used as a backup service for a lease line connection between the remote and central

    officesE. Modem racking and cabling can be eliminated by integration with digital modem cards on Cisco

    IOS network access servers NAS

    42. You are configuring a frame relay router with sub interfaces on interface serial 0. Which subinterface number could you use for this configuration?

    A. 1 and 2B. 0.2 and 0.3C. 1 and 1.1D. 0.1a and 0.1b

    43. Which configuration task must you complete if a remote frame relay router does not supportinverse ARP?

    A. Configure static mapsB. Define an IP addressC. Disable DHCP on the frame relay routerD. Configure a static route to the remote network

    44. Given the following criteria for granting access from a remote site to your LAN:

    Restrict access on interface E0E0=128.12.22.55Deny access to telnet, FTP

    All other types of operations.

    Which line should come last in configuring your access list?

    A. Access-List 101B. Access-List 101 deny E0 telnet FTPC. Access list 101 allow all except FTP telnetD. Access-list 101 permit IP 0.0.0.0 255.255.255.255 anyE. Access List 101 deny IP 128.12.22.55 TCPEQ20 21 23

    45. Which command displays the interfaces using a given access list?

    A. Show filtersB. Show IP interface

    C. Show active listD. Show interface parametersE. Configure IP access listF. Show access-list interfaces

    46. Which command displays access list 111?

    A. Show access-list 111B. Show IP access list 111C. Display IP address list 111

  • 8/14/2019 Copyright Keen Interactive 2001

    8/33

    D. Display access-list 111 details

    47. Which are two steps are required to configure and apply a standard access list on an interface?

    A. Define an access list number and its parameterB. Enable an interface to become part of the access list groupC. Define the number of access lists to be supported on an interface

    D. Copy the access list definition to each interface that will support it

    48. What is 'back off' on an 802.3 network?

    A. It is latency stored and forward switchingB. It is the time used for token passing from machine to machineC. It is retransmission delay that is encountered when a collision occursD. It is the result of two nodes transmitting at the same time; the frames from each transmitting

    device collide and are damaged

    49. Which four statements are true regarding fast ethernet and 10baseT ethernet?

    A. Fast ethernet uses the same maximum transmission unit (MTU)B. Fast ethernet is based on an extension to the IEE 802.3 specificationsC. Fast ethernet uses the same media access control (MAC) mechanismD. Fast ethernet preserves the frame format that is used by 10BaseT ethernetE. Fast ethernet uses a speed increase 100 times to that of the 10 BaseT ethernet

    50. What is the maximum length of the fast Ethernet cable 100BaseTx standard?A. 10 mB. 50 mC. 100 mD. 1000 m

    51. Which statement about half duplex Ethernet operation is true?

    A. With half duplex, transmission frames feed into a single cable in one direction at a time.

    B. Half duplex transmission between stations is achieved by using point to point Ethernet and fastEthernet connection.C. Half duplex transmission between stations is achieved by using point to multi point Ethernet and

    fast Ethernet connection.D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the

    receiver circuit at the other end of the connection.

    52. Which symbol in the router prompt indicates that you are in privileged mode?A. >B. !C. #D. :

    53. You enter the following command:

    routers(config)line console 0.

    Which operation is most likely to follow?

    A. Configure terminal typeB. Enter protocol parameters for a serial lineC. Create a password on the console terminal lineD. Establish a terminal type 4 connection to a remote hostE. Change from configuration mode to console privilege mode

  • 8/14/2019 Copyright Keen Interactive 2001

    9/33

    54. Which command assigns the login password 'Cisco' on the console terminal line?

    A. line vty 0Log inPassword Cisco

    B. Line console

    LoginPassword Cisco

    C. Line login terminalPassword Cisco

    D. Line serial 0LoginPassword Cisco

    E. Line console 0LoginPassword Cisco

    55. How do you get help on a command after you have received the "% INCOMPLETECOMMAND" response from a switch?

    A. Type history to review the prompt before the errorB. Enter a question mark to display all console commandsC. Type help followed by the command to see the command parameterD. Re-enter the command followed by a question mark to view key words

    56. Which three commands are used to configure information in RAM on a router?

    A. configure memoryB. Configure terminalC. Configure overwriteD. Copy TFTP startup-configE. Copy running-config startup-configF. Copy startup-config running-config

    57. When you enter a router password during setup, what is the difference between enable andenable secret passwords?

    A. The enable password is encryptedB. The enable secret password uses IPSEC password authenticationC. The enable secret password can not be seen as clear text when viewing the configurationD. The enable secret password acts as a backup in case the enable password is compromised

    58. Which command loads a new version of Cisco IOS into the router?

    A. Copy flash ftpB. Copy ftp flashC. Copy flash tftp

    D. Copy tftp flash

    59. Which command should you use to configure a router so that it can become a tftp host for arouter system image that is run in flash?

    A. Copy flash tftpB. Config tftp server C. Write network D. Tftp-server system E. Setup server tftp

  • 8/14/2019 Copyright Keen Interactive 2001

    10/33

    60. Which two solutions are used to reduce the chance of distance vector routing loops?

    A. Split horizonB. Route PoisonC. Area HierarchiesD. Link State Algorithms

    61. Which router component stores routing tables, ARP cache, and packet buffers?

    A. ROMB. RAMC. MVRAMD. Flash memory

    62. Which command displays all commands in the history buffer?

    A. control header B. show buffer C. show historyD. show history buffer

    63. While you are preparing the initial configuration of your router and enable IP you find that youneed to use a Telnet session to check for a network address parameter. Your Telnet logging andyour virtual transmission session on the other device are successful. By default, what must youenter to suspend your Telnet session and return to the original router?

    A. SuspendB. The command 'exit'C. CONTROL - ESC followed by 'x'D. CTRL - ALT - DEL followed by ESCE. CTRL- Shift-6 followed by 'x'

    64. Which exec command displays system configuration information, software version and the

    names and sources of configuration files and boot images on a router?

    A. show bootB. show flashC. show configD. show version

    65. What are the two primary operating modes for frame switching?

    A. Full duplexB. Half duplexC. CSMA/CDD. Cut throughE. Fragmentation

    F. Store and forward

    66. In order to enable RIP, which two tasks need to be performed?

    A. Specify the routing protocolB. Configure static Rip routesC. Specify directly connected subnetsD. Specify directly connected networks

  • 8/14/2019 Copyright Keen Interactive 2001

    11/33

    67. A router on one side of a PPP link uses the host name RTR1 and the password CORP1-PWD.Which configuration line on RTR1 enables the connection between RTR1 and the other routernamed RTR2?

    A. Username RTR2 password CORP1-PWDB. Username RTR1 password CORP1-PWDC. Username RTR2 password CORP2-PWD

    D. Username RTR1 password CORP2-PWD

    68. Which two statements about a bridge are TRUE?

    A. A bridge floods multicastsB. A bridge floods broadcastsC. A bridge does not flood multicastsD. A bridge does not flood broadcasts

    69. What is the protocol and what is the second part of the following network address:172.16.0.254 , mask=255.255.0.0

    A. IPX:MAC addressesB. IP:classC directed broadcastC. Private IP address:node#D. Public IP addresses:directed broadcastE. Private IP addresses: directed broadcast

    70. Which of the following is a key application of a device hardware address?

    A. To obtain a vendor code/serial number from the userB. To transmit a frame from one interface to another interfaceC. To transmit a packet from one local device to another local deviceD. To transmit data from one local device to a remote device across the InternetE. To contain logical information about a device for end-to-end transmission

    71. Which statement about an IP network is true?

    A. A broadcast source MAC contains all zerosB. A MAC address is part of the physical layer of the OSI modelC. MAC addresses are used by bridges to make forwarding decisions; IP addresses are used by

    routersD. IP addresses are now a flat addressing scheme--MAC addresses use a hierarchical addressing

    scheme

    72. What is the most common layer two device?

    A. HubB. Router C. Repeater D. Switch

    73. Click the EXHIBIT button. Which statement about the specialized IP addresses shown in theEXHIBIT is true?

    EXHIBIT:10.0.0.0 to 10.255.255.255172.16.0.0 to 172.31.255.255192.168.0.0 to 192.168.255.255

    A. They are private IP addresses

  • 8/14/2019 Copyright Keen Interactive 2001

    12/33

    B. They can be leased with DHCPC. They are allocated for VOL PVOLPD. They represent IP classless addressesE. They are used by the internal NIC for administration

    74. What are four functional characteristics of the network layer of the OSI model?

    A. It uses a two part addressB. It maintains routing tablesC. It uses broadcast addressesD. It establishes network addressesE. It provides access to the LAN mediaF. It provides media independence for upper layersG. It provides path selection for internetwork communication

    75. What is the result of segmenting a network with a router into two segments?

    A. It increases the number of collisionsB. It decreases the number of broadcast domainsC. It connects segment ones broadcast to segment twoD. It prevents segment ones broadcast from getting to segment two

    76. Which three basic switch functions increase available bandwidth on the network?

    A. Loop avoidanceB. Address learningC. Hop count limitingD. Broadcast filteringE. Packet forward/filtering

    77. Which statement is true?

    A. While bridges are used to segment networks, they will not isolate broadcast or multicast packetsB. A bridge looks at every packet within its network segment and works like a hub, re-broadcasting

    the packet if the destination is with in its network segmentC. A bridge maintains a table of the IP addresses of the hosts within its network segment andforwards the packet directly to the destination based upon the IP address

    D. Bridge resets the hop count by keeping all packets within the network segment. Only packetsaddressed to its specific destination host outside the network segment are allowed to passthrough the bridge.

    78. What is not a characteristic of a network segment on a switch?

    A. The segment has its own collision domainB. The segment can translate from one media to a different mediaC. All devices in the segment are part of the same broadcast domainD. One device per segment can currently send frames to the switch

    79. Which three of the following are typical operational phrases in a basic connection orientednetwork service?

    A. Call setupB. Data transfer C. Load BalancingD. Call terminationE. Call prioritizationF. Data segmentationG. Data link identification

  • 8/14/2019 Copyright Keen Interactive 2001

    13/33

    80. Which of the following is a function of a reliable transport layer connection?

    A. Route selectionB. AcknowledgementC. Session checkpointsD. System authentication

    81. Using the TCP/IP suite, a message is sent from host A to a destination IP address on the sameLAN. How does host A determine the destinations MAC address?

    A. It uses a Proxy ARPB. It uses ARP requestsC. It uses RARP requestsD. It uses router look up table

    82. Which three statements about common elements of the TCP/IP protocol stack are true?

    A. IP provides connection less service and routing capabilities.B. ARP enables devices to locate the IP address of local devicesC. UDP provides simple connection less service without windowing or acknowledgementsD. ICMP provides connection oriented management data to routers and layer three switchesE. TCP enables devices to send large quantities of data using switching in a connection oriented

    manner

    83. What are the two most common request/reply pairs with ICMP messages when using the pingcommand?

    A. Echo replyB. Echo requestC. Source quenchD. Fragment offsetE. Information redirectF. Destination reachable

    G. Echo control message

    84. Which two protocol tools use ICMP?

    A. PingB. TelnetC. ConfigureD. TracertE. Show commandsF. Standard access list

    85. Which command successfully pings an individual IP address?

    A. Router>ping 192.5.5.0

    B. Router# ping 192.5.5.30C. Router> ping 192.5.5.256D. Router# ping 192.5.5.255

    86. Your network uses a class C address of 210.10.10.0. You must now split up the network intoseparate subnets to handle multiple buildings separated by a router. Which two steps must youtake to determine the proper subnet mask for your network?

    A. Determine the number of separate network requiresB. Determine how many devices will require DHCP addressing

  • 8/14/2019 Copyright Keen Interactive 2001

    14/33

    C. Determine the maximum number of hosts that will be on each subnetD. Determine the minimum number of hosts that will be on each subnet.E. Determine which router will be the IP default gateway for each subnet

    87. Click the EXHIBIT button. Which encapsulation type should be used for the S0 port of routerR2?

    A. SAPB. HDLCC. ARPAD. Novel Ether

    88. Which Cisco IOS command should you use to display the Novel IPX address assignments on arouter?

    A. Show IPX addressesB. Show IPX interfaceC. IPX network D. Display IPX addressesE. Show IPX routing details

    89. Which commands should be used to enable IGRP routing?

    A. Router IGRP 100Network 192.168.1.0Network 10.0.0.0

    B. Router IGRP 100Network 192.168.1.0Network 10.2.0.0

    C. Router IGRP 100Network 192.168.1.0 192.168.1.1Network 10.2.0.0 10.2.1.1

    D. Router IGRP 100Network 192.168.1.0 255.255.255.0

    Network 10.2.0.0 255.255.0.0

    90. Which show command should you use to view frame relay local management interface LMItraffic statistics?

    A. Show LMIB. Show IP routeC. Show InterfaceD. Show StatisticsE. Show Frame-Relay LMI

    91. Which command specifies a second sub interface on serial interface zero?

    A. Interface S0.2 point-to-point

    B. Interface 2 S0 point-to-pointC. Sub interface 2 S0 point-to-pointD. Interface 0 sub 2 point-to-pointE. Interface S0.1 point-to-point sub 2

    92. Which three tasks are required to configure a dial on demand routing DDR basic rate interfaceBRI connection?

    A. Define static routesB. Configure the dialer information

  • 8/14/2019 Copyright Keen Interactive 2001

    15/33

    C. Specify interesting traffic that can enable the linkD. Define DDR password to exchange when the link comes up

    93. Which statement about the data link connection identifier DLCI is true?

    A. It is a number that identifies a local virtual circuit in a frame relay networkB. It is a signaling standard between the CPE device and the frame relay switch

    C. It checks port speed of the connection local loop to the frame relay cloudD. It is maximum number of uncommitted bits that the frame relay switch will attempt to transfer

    beyond the committed information rate CIR

    94. Which three statements about frame relay configuration using sub interfaces are true?

    A. Each sub interface is configured as either multi-point or point to pointB. Any network address must be removed from the physical interfaceC. The configuration of sub interfaces is done in router config-(if)# modeD. Frame relay encapsulation must be configured on each sub interface

    95. What is the bandwidth capacity of an ISDN B channel?

    A. 64 KbpsB. 128 KbpsC. 512 KbpsD. 1.54 Mpbs

    96. Which command should you use to create an IP standard access list?

    A. Access list standard 172.16.4.13B. Access-list 1 deny 172.16.4.13 0.0.0.0C. Access-list 100 deny 172.16.4.13 0.0.0.0D. Access-list 198 deny 172.16.4.13 255.255.255.255

    97. Which router command allows you to determine if an IP access list is enabled on a particularinterface?

    A. Router# show IP interfaceB. Router> show access-listC. Router# show IP access-listD. Router> show interface IP access-list

    98. Which router command allows you to view the entire contents of all access lists?

    A. Router# show interfaceB. Router> show IP interfaceC. Router# show access-listsD. Router> show all access list

    99. Which statement about Ethernet networks is true?

    A. The advantage of full duplex is the ability to transmit data over Mbase2 cableB. Full duplex Ethernet requires a point to point connection when only two nodes are presentC. Ethernet switches can use full duplex mode to connect multiple nodes to a single port of a switchD. Half duplex is a cut through packet processing method that is very fast with little error

    correction.E. Full duplex is a store and forward method that is slower but has better error correction.

    100. On a network design project you determine that a new testing application requires multiplehosts. These hosts must be capable of sharing data between each host and an enterprise server at 10

  • 8/14/2019 Copyright Keen Interactive 2001

    16/33

    Mbps bandwidth. Other divisions in the company use applications that require less than 2 Mbpsbandwidth from the enterprise server. What is your economical recommendation?

    A. That existing 10baseT hubs be replaced with 100BaseT hubs to improve overall performanceB. That a router can separate the testing application from the rest of the network, thus allowing the

    testing application more bandwidthC. That the switch be installed so that enterprise server can be provided a 100 Mbps port and each

    of the testing application hosts can be given dedicated 10 Mbps portsD. That a bridge be placed between the enterprise server and all other users--with the exception of

    the testing application

    101. A network is very congested. Currently all the devices are connected through a hub. Whichsolution would best decrease congestion on the network?

    A. Add a second hubB. Replace the hub with a router C. Replace the hub with a switchD. Replace the hub with a repeater

    102. What is the distance limitation for 100BaseT?

    A. 607 ftB. 25 metersC. 1000 ftD. 100 metersE. 185 meters

    103. Which command sets the clock rate to 56 Kbps on serial zero?

    A. Clockrate 56B. Clock rate 56C. Clockrate 56000D. Clock rate 56000E. Set clockrate 56

    F. Serial 10 clockrate 56G. Clock rate 56000 serial 10

    104. If you are in IOS user mode, which command do u use to enter the privileged mode?

    A. SetB. EnableC. ConfigureD. Privileges

    105. In the setup dialogue what do square brackets indicate?

    A. Current or default settingsB. Hard coded values that can not be modified

    C. Values entered by the administrator but not savedD. Values that must be returned to NV RAM 4 before becoming enabled

    106. Routers that have flash memory typical have a preloaded copy of Cisco IOS software. Whichcommand should you use to make a backup copy of the software image onto a network server?

    A. Copy Flash TFTPB. Save Copy TFTPC. Write Backup TFTPD. Write Backup (server-name)

  • 8/14/2019 Copyright Keen Interactive 2001

    17/33

    E. Copy backup 2 (server-name)

    107. Which command retrieves the configuration file from NVRAM?

    A. Config NVRAMB. Copy NVRAM running-configC. Copy startup-config running-config

    D. Copy running-config startup-config

    108. Which command allows the user to see a system message when logging into a router?

    A. Banner MOTDB. Message MOTDC. Banner MessageD. Message Banner

    109. The subnet mask is used to determine which of the following?

    A. Host IDB. Network addressC. Network address and Host ID

    110. Which of the following are 3 characteristics of switches?

    A. Create collision domainsB. Increase available bandwidthC. Support full duplex in a multipoint topologyD. Make forwarding decisions using MAC address

    111. Which 2 commands save the running-config to NVRAM?

    A. write backupB. copy running-config startup-configC. write memory

    D. write network

    112. Which of these commands will configure the clock rate for 56000 on serial 0 interface?A. Router# clock rate 56000B. Router(config-if)#clock rate 56kC. Router(config)# int serial0 clock rate 56000D. Router(config-if)#clock rate 56000

    113. What two methods are used to modify a routers boot sequence?

    A. Boot system commandsB. Config-register C. RXBootD. Setup

    114. What is the purpose of the command ip host RTP2 12.15.3.100 12.15.3.101?

    A. Define a static host nameB. Enable routing to FTP2 via 12.15.3.100 or 12.15.3.101C. Configure IP on router RTP2D. Define a static route

    115. Which of the following are true of subnetting a Class C network?

  • 8/14/2019 Copyright Keen Interactive 2001

    18/33

    A. Maximum subnet bits will be 6B. Each subnet will have a maximum of 254 hostsC. Maximum number of 62 subnetsD. All of the above

    116. Which command mode is necessary to enter the extended ping command?

    A. Router>B. Router(config)#C. Router(ext-ping)#D. Router#

    117. Which network mask should you place on a class C address to accommodate a user requirementof two sub networks with a maximum of 35 hosts on each network?

    A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248

    118. What is an advantage of using a connectionless protocol such as UDP?

    A. Packet acknowledgement may reduce overhead traffic.B. Loss or duplication of data packets is less likely to occur.C. Packets are not acknowledged--this reduces overhead traffic.D. The application relies on the transport layer for sequencing of the data packets.

    119. Which statement is true when a broadcast is sent in an Ethernet/802.3 LAN?

    A. The IP subnet used is 255.255.255.0B. The IP address used is 255.255.255.255C. The MAC address used is 00-00-00-00-00-00D. The MAC address used is FF-FF-FF-FF-FF-FF

    120. What are two components of an IPX packet?

    A. Network number; IP address.B. MAC address; node number.C. Network number; MAC address.D. Network number; subnet number.

    121. Which two statements about integrated services digital network (ISDN) are true?

    A. ISDN provides only data capability.B. ISDN provides integrated voice/data capability.C. The ISDN standards define the hardware and call setup schemes for end-to-end digital

    connectivity.D. Users receive more bandwidth on WANs with a leased line of 56kbps than with multiple b

    channels.

    122. Which of these commands sets RIP as the routing protocol?

    A. Router# rip.B. Router rip.C. Router (config)# rip.D. Router (config)# router rip.

    123. What are 4 ways network management can be simplified by using virtual LANs (VLANs)?

  • 8/14/2019 Copyright Keen Interactive 2001

    19/33

    A. VLANs allow you to implement multiple layer switching easily.B. VLANs can group several broadcast domains into multiple logical subnets.C. It is no longer necessary to install cables to move a user from a new network to another.D. Network adds, moves and changes are achieved by configuring a port into a VLAN.E. A group of users needing high security can be put into a VLAN so that no users outside the

    VLANs can communicate with them.

    F. As a logical grouping of users, VLANs can be considered independent from their physical orgeographic locations.

    124. With one method of transmitting frames through a switch, the switch receives the completeframe and checks the frame CRC before forwarding the frame. What is this transmitting methodcalled?

    A. CSMA/CDB. Full duplexC. Cut throughD. Half duplexE. FragmentationF. Store and forward

    125. Switching methods include cut through, store and forward, and a modified version of the firsttwo methods. Which statement about switching methods is true?

    A. The stored and forward method has low latency.B. The cut through method has high latency.C. The modified version holds the packet in memory until 50% of the packet reaches the switch.D. The modified version holds the packet in memory until the data portion of the packet reaches the

    switch.

    126. Which technology catalyst switches to resolve topology loops and ensure data use flowsproperly through a single network path?

    A. Virtual LANs

    B. Frame filteringC. Cut through switchingD. Spanning tree protocol

    127. Which two statements are true?

    A. Ethernet 802.3 utilizes a half duplex method for data transfer.B. In a 100mbps point to point connection, a full duplex connection can provide 400mbs of data

    transfer.C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single port office

    switch.D. Full duplex Ethernet takes advantage of UTP using one pair of transmission and other pair for

    reception.

    128. What is a back off on an 802.3 network?

    A. It is latency in store and forward switching.B. It is the time used for token passing for machine to machine.C. It is the retransmission delay that is reinforced when a collision occurs.D. It is the result of two nodes transmitting at a same time the frames from each transmitting device

    collide and are damaged.

    129. You have just issued an erase startup-config command and reloaded your router. In which modewill your router be when you reboot?

  • 8/14/2019 Copyright Keen Interactive 2001

    20/33

    A. SetupB. StartupC. User EXECD. User privilegedE. Global configuration

    130. Which network mask should you place on a Class C address to accommodate a user requirementof two sub networks with a maximum of 35 hosts on each network?

    A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248

    131. What are two purposes of segmenting a network with a bridge?

    A. To reduce collisions.B. To increase collisions.C. To add collision domains.D. To reduce collision domains.E. To have more broadcast domains.

    132. What is an advantage of using a connectionless protocol such as UDP?

    A. Packet acknowledgement may reduce overhead traffic.B. Loss or duplication of data packets is less likely to occur.C. Packets are not acknowledged, which reduces overhead traffic.D. The application relies on the transport layer for sequencing of the data packets.

    133. Which statement is true when a broadcast is sent in an Ethernet/802.3 LAN?A. The IP subnet used is 255.255.255.0.B. The IP address used is 255.255.255.255.

    C. The MAC address used is 00-00-00-00-00-00.D. The MAC address used is FF-FF-FF-FF-FF-FF.

    134. What are two components of an IPX packet?

    A. Network number; IP address.B. MAC address; node number.C. Network number; MAC address.D. Network number; subnet number.

    135. Which two statements about integrated services digital network (ISDN) are true?

    A. ISDN provides only data only capability.B. ISDN provides integrated voice/data capability.

    C. The ISDN standards define the hardware and call setup schemes for end-to-end digitalconnectivity.D. Users receive more bandwidth on WANs with a leased line of 56kbps than with multiple b

    channels.

    136. Which prompt and command combination sets RIP as the routing protocol?

    A. Router# ripB. Router ripC. Router (config)# rip

  • 8/14/2019 Copyright Keen Interactive 2001

    21/33

    D. Router (config)# router rip

    137. What are 4 ways network management can be simplified by using virtual LANs (VLANs)?

    A. VLANs allow you to implement multiple layer switching easily.B. VLANs can group several broadcast domains into multiple logical subnets.C. It is no longer necessary to install cables to move a user from a new network to another.

    D. Network adds, moves and changes are achieved by configuring a port into a VLAN.E. A group of users needing high security can be put into a VLAN so that no users outside the

    VLANs can communicate with them.F. As a logical grouping of users, VLANs can be considered independent from their physical or

    geographic locations.

    138. With a particular method of transmitting frames through a switch, the switch receives thecomplete frame and checks the frame CRC before forwarding the frame. What is thistransmitting method called?

    A. CSMA/CDB. Full duplexC. Cut throughD. Half duplexE. FragmentationF. Store and forward

    139. Switching methods include cut through, store and forward, and a modified version of the firsttwo methods. Which statement about switching methods is true?

    A. The store and forward method has low latency.B. The cut through method of switching has high latency.C. The modified version holds the packet in memory until 50% of the packet reaches the switch.D. The modified version holds the packet in memory until the data portion of the packet reaches the

    switch.

    140. Which technology catalyst switches to resolve topology loops and ensure data use flows

    properly through a single network path?

    A. Virtual LANsB. Frame filteringC. Cut through switchingD. Spanning tree protocol

    141. Which two statements are true?

    A. Ethernet 802.3 utilizes a half duplex method for data transfer.B. In a 100Mbps point to point connection, a full duplex connection can provide 400Mbps of data

    transfer.C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single port office

    switch.

    D. Full duplex Ethernet takes advantage of UTP using one pair of transmission and another pair forreception.

    142. What is a back-off on an 802.3 network?

    A. It is latency in store and forward switching.B. It is the time used for token passing from machine to machine.C. It is the retransmission delay that is reinforced when a collision occurs.D. It is the result of two nodes transmitting at the same time. The frames from each transmitting

    device collide and are damaged.

  • 8/14/2019 Copyright Keen Interactive 2001

    22/33

    143. You have just issued an erase start up-config command and reloaded your router. In whichmode will your router be when you reboot?

    A. SetupB. StartupC. User EXEC

    D. User privilegedE. Global configuration

    144. Which two WAN data link layer protocols support multiple upper layer protocols? (ChooseTwo)

    A. PPPB. LAPDC. ISDND. HDLC

    145. Which command enables directly-connected network 199.65.72.0 to be used by RIP?

    A. Router(config)# rip 199.55.0.0B. Router(config-router)# rip 199.55.72.0C. Router(config-router)# network 199.55.0.0D. Router(config-router)# network 199.55.72.0

    146. What does the command show access-list 101 list?

    A. All extended access lists.B. All access lists within the router.C. The contents of standard access list 101D. The contents of extended access list 101

    147. Which two commands show your access lists?

    A. Show filters.B. Show access-listsC. Show IP access-listD. Show running-config

    148. Which two steps are required to configure and apply standard access lists on an interface?

    A. Define an access list number and its parameters.B. Enable an interface to become part of the access list group.C. Define the number of access lists to be supported on an interface.D. Copy the access list definition to each interface that will support it.

    149. Which encapsulation methods are most commonly used with ISDN?

    A. IP and IPXB. IP and PPPC. PPP and SDLCD. PPP and HDLC

    150. Which two step are parts of the process of creating frame relay subinterfaces on a point-to-pointconnection?

    A. Configure the router to forward all broadcast packets.B. Remove any network address assigned to the physical interface.

  • 8/14/2019 Copyright Keen Interactive 2001

    23/33

    C. Configure the local data-link connection listener for the subinterfaces.D. Partition the total committed information rate available among the subinterfaces.

    151. Your network is having IP problems connecting to one or more frame relay peer routers. Whichtwo commands should you use to show the routers that are reachable?

    A. show IP map

    B. show IP routeC. show frame-relay mapD. debug frame-relay map

    152. What are three benefits of ISDN?

    A. PVCs are faster and more reliable.B. No specialized equipment is required.C. Data transfer is faster than typical modems.D. Call setup is faster than with standard telephone service.E. It carries many types of data traffic such as voice, video, and data.

    153. What are two functions of the ICMP protocol?

    A. To map IP addresses to Ethernet addresses.B. To map common names to network addresses.C. To forward SNMP alerts to management consoles.D. To generate an echo reply in response to a ping test.E. To send a host or post unreachable message from a router to the source of an undeliverable

    packet.

    154. Novell IPX network addresses have two configurable parts. The network administrator specifiesthe IPX network number. How is the node number determined?

    A. It is the serial number of the given device.B. It is assigned as a lease by Novell DHCP.C. It is also set by the network administrator.

    D. It is usually the MAC address of one interface.E. It is downloaded by NetWare Core Protocol (NCP).

    155. Which IP address range is allowable given an IP address of 172.37.2.56 and 12-bit subnetting?

    A. 172.37.2.48 to 172.37.2.63B. 172.37.2.48 to 172.37.2.62C. 172.37.2.49 to 172.37.2.62D. 172.37.2.49 to 172.37.2.62E. 172.37.2.55 to 172.37.2.126

    156. When you use the Cisco ISO command show configuration on a router, which part of theoutput shows the specific configured IP addresses and subnet masks?

    A. The IP host tableB. The interface outputC. Each section of the outputD. The global configuration statementsE. The section under the autonomous system number

    157. What is the connection oriented protocol in the TCP/IP protocol stack?

    A. IPB. UDP

  • 8/14/2019 Copyright Keen Interactive 2001

    24/33

    C. TCPD. DNSE. OSPF

    158. What does the term Base refer to in 100BaseT?

    A. Cabling type

    B. Signaling typeC. 100 mode typeD. Spectrum usedE. Speed category

    159. How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet Technology?

    A. OneB. TwoC. NoneD. Several

    160. Which information must a router have in order to perform proper and efficient routing?

    A. Destination application of an incoming packetB. Number of other packets in a single flow of dataC. Destination network address of an incoming packetD. Number of routers that know a path to the destination

    161. Click the exhibit button (exhibit not available). The exhibit shows a Cisco routers startupmessages. Which group of messages identifies the router components that you can configureduring setup (the initial system configuration dialog)? Enter the letter of the correct group ofmessages.

    162. Click the task button. Place the following encapsulation steps in their correct order:

    A. Synchronization of Is and Os with some clocking function allows transmission on a mediumand recognition of the data bits.B. Data is segmented and packaged with information to allow the sending and securing hosts to

    reliably communicate.C. Alphanumeric user input is formatted for sending over the internetwork.D. A frame is built to allow communication over an interface to the network.E. Data is encapsulated with a network header specifying source and destination logical addresses.

    163. What is the protocol and what is the second part of the network address 255.255.255.255?

    A. IP, a flooded broadcastB. IP, a directed broadcastC. IPX, a flooded broadcastD. IPX, a remote directed broadcast

    164. Eight stations connected to a separate 10Mbps ports on a layer 2 switch will give each stationhow many Mbps of bandwidth?

    A. 1.25B. 4C. 16D. 10E. 60

  • 8/14/2019 Copyright Keen Interactive 2001

    25/33

    Answer Key:1. B,C2. Router rip3. E4. C,D5. B,C6. C7. B8. C9. D10. A,C11. C12. A,B,D13. A,C14. A15. C16. B17. B

    18. D19. B20. Transport; Network; Datalink21. C22. C23. A24. B25. D26. A,B27. A28. A,D29. A,B30. E,F,G31. C

    32. B33. A34. A35. C36. D37. A38. A39. A40. F41. A,B,D,E42. A43. A44. D45. B

    46. A47. A,B48. C49. A,B,C,D50. C51. A52. C53. C54. E55. D

  • 8/14/2019 Copyright Keen Interactive 2001

    26/33

    56. A,B,F57. C58. D59. D60. A,B61. B62. C

    63. E64. D65. D,F66. A,D67. A68. A,B69. C70. B71. C72. D73. A74. A,B,C,G75. D76. A,D,E77. A78. D79. A,B,D80. B81. B82. A,C,E83. A,B84. A,D85. B86. A,C87. B88. B89. A

    90. E91. A92. A,B,C93. A94. A,B,C95. A96. B97. A98. C99. B100.C101.C102.D103.D

    104.B105.A106.A107.C108.A109.C110.A,B,D111.B,C112.D113.A,B

  • 8/14/2019 Copyright Keen Interactive 2001

    27/33

    114.A115.A,C116.D117.A118.C119.B120.C

    121.B,C122.D123.C,D,E,F124.F125.D126.D127.A,D128.C129.A130.D131.A,B132.C133.B134.C135.B,C136.D137.C,D,E,F138.F139.D140.D141.A,D142.C143.A144.A,D145.D146.D147.B,D

    148.A,B149.D150.B,C151.B,C152.C,D,E153.D,E154.D155.C156.A157.C158.B159.C160.C161.Exhibit and answer not available. Expect to see this question, or one similar to it on your exam.

    162.Answer not available. Know the answer? Email it to [email protected]

  • 8/14/2019 Copyright Keen Interactive 2001

    28/33

    Begin Single Answer Section

    165. A switching facility that provides the nearest point of presence for aprovider's WAN service is called?

    A: (CO) Central Office

    166. What commands provide route verification?A: PingTraceTelnet

    167. You are entering a static IP route and you type the followingcommand:

    ip route 172.16.1.0 255.255.255.0 172.16.2.1 110

    What does the 110 at the end indicate?A: Administrative Distance

    168. You are entering a static IP route and you type the followingcommand:

    ip route 172.16.1.0 255.255.255.0 172.16.2.1 120

    What does the 172.16.2.1 mean?A: Default Gateway or Next Hop

    169. What is the primary characteristic of a connection-oriented (reliable)protocol?

    A: Issues Acknowledgements

    170. How do you set the frame relay interface s1 bandwidth to 56 Kbps?A: Router(config)# interface s1

    Router(config-if)# bandwidth 56

    171. What do you need to support full-duplex Ethernet?A: Full duplex NICs with Loopback and collision detection disabled

    172. What are advantages to segmenting your network with routers?(several options will be presented)

    A: ManageabilityFlow ControlExplicit packet lifetime controlMultiple active paths

    173. Which of the following describes a full-duplex transmission? (several

    options will be presented)A: Uses a point to point connection from the transmitter of the transmitting stationto the receiver of the receiving station.Simultaneous data transmission between a sending and receiving stations.

    174. If a frame is received at a switch and only the destination hardwareaddress is read before the frame is forwarded, what type ofswitching method are you using?

    A: Cut-Through Switching

  • 8/14/2019 Copyright Keen Interactive 2001

    29/33

    175. Which is true regarding store-and-forward switching method?(several options will be presented)

    A: Latency depends on frame length

    176. What command would you enter to display the contents of access

    list 102?A: show access-list 102

    177. How can you turn off advanced editing features?A: terminal no editing

    178. What is the syntax you would use to configure a port on a Catalyst5000 switch?

    A: type slot/port

    179. What is an administrative distance of 0?A: 0 is the default administrative distance for directly connected routes. The routertrusts a 0 distance the most.

    180. You have to recommend the cheapest device to increase bandwidthon your network (more details are given, but vary in differentversions of this question). What would you recommend?

    A: 100MB hub

    181. If you want to create an access list to permit traffic to or fromnetwork 198.55.56.0 on a particular interface, what command wouldyou use to create the access list?

    A: access-list 1 permit 198.55.56.0 0.0.0.255

    182. You want to create a static route to network 161.25.0.0. Your nexthop address will be 161.172.1.67 and you want to use an

    administrative distance of 110. The new IP address uses the defaultsubnet mask. What command would you enter in config mode?A: ip route 161.25.0.0 255.255.0.0 161.172.1.67 110

    183. How would you configure an access list to only allow traffic fromnetwork 141.75.0.0 to enter serial interface s0?

    A: access-list 1 permit 141.75.0.0 0.0.255.255interface serial 0ip access-group 1 in

    184. At what layer of the OSI model does a router operate?A: layer 3

    185. What does the command boot system ROM do?A: Forces the router to load the IOS from ROM

    186. If you wanted to subnet your class C network into 2 subnets, whatwould you use as a subnet mask?

    A: 255.255.255.192.53

    187. What do bridges use to make packet forwarding decisions?A: MAC address

  • 8/14/2019 Copyright Keen Interactive 2001

    30/33

    188. What do routers use to make packet forwarding decisions?A: IP address

    189. What Cisco command line matches the Ethernet_II encapsulationmethod?

    A: Arpa

    190. What is provided by the User Datagram Protocol (UDP)?A: Connectionless datagram service

    191. What command views IPX RIP routing updates?A: debug ipx routing activity

    192. What ISDN term refers to a native ISDN modem?A: TA

    193. What command displays the IPX SAP table?A: show ipx servers

    194. What is the standard ISDN term for a native ISDN telephone?A: TE1

    195. What user device connects to a DCE?A: DTE

    196. What layer manages access to the Network layer?A: Datalink - LLC Sublayer

    197. What command enables CHAP on a serial interface using PPP?A: ppp authentication chap

    198. How does a router contact a device when its IP address, but not its

    MAC address, is known?A: It uses ARP

    199. What command shows all Ethernet interfaces configured for IPX?A: Show ipx interface

    200. What command will view the ARP cache?A: show arp

    201. What command allows you to see all access-lists on Serial1 forTelnet?

    A: show ip int s1

    202. Of the devices available to segment a network running SNA andNetBIOS, what should never be used?A: router

    203. What PPP feature binds multiple channels to form a single logicalchannel?

    A: Multi-link PPP

    204. What switching technology reduces the size of a broadcast domain?A: Virtual LAN (VLAN)

  • 8/14/2019 Copyright Keen Interactive 2001

    31/33

    205. What command displays the IPX network and node address on Serial2 interface?

    A: show ipx int serial 2

    206. What command Displays RIP routing updates?

    A: Debug IP Rip

    207. What command determines the number of seconds a dialupconnection will wait without traffic until hanging up?

    A: dialer idle-timeout

    208. What is the most effective solution to the distance-vector count toinfinity problem?

    A: Defining a Maximum

    209. What TCP/IP address class is used for multicast?A: Class D

    210. What technologies prevent network loops in a switchedenvironment?A: Spanning Tree Protocol and IEEE 802.ld

    211. What OSI layer controls end-to-end communication?A: Transport

    212. What command would enable full duplex on the first port of the cardin slot 3 on a Cisco Catalyst 5000?

    A: set port duplex 3/1 full

    213. What process uses LMI to resolve an IP address from a DLCI number?A: Inverse ARP

    214. What command will permit SMTP mail to only host 1.2.3.4?A: access-list 102 permit tcp any host 1.2.3.4 eq smtp

    215. What command displays the IPX routing table?A: show ipx route

    216. What global configuration command grants access to a serialinterface on a 7500?

    A: int s1/0/0

    217. What features are common to ISDN BRI? (several options will bepresented)

    A: Multiprotocol supportSNMP MIB supportCall waitingCompression

    218. What Ethernet operation type allows only one device to transmit at atime?

    A: Half-duplex

  • 8/14/2019 Copyright Keen Interactive 2001

    32/33

    219. What command line option determines what traffic is interestingenough for a dialup connection?

    A: dialer-list

    220. What global command loads an IOS file from FLASH memory on thenext boot?

    A: boot system flash [iosfilename]

    221. When entering a command longer than one line, what character isused for delimiting?

    A: #

    222. What command assigns and enables IPX network 4a on an interface?A: ipx network 4a

    223. What command copies router configuration from NVRAM to a fileserver?

    A: copy startup-config tftp

    224. How does TCP provide flow control and error checking?A: With acknowledgements and windowing

    225. What command can verify Application layer connectivity?A: Telnet

    226. If your router configuration register is 0x0101, from where does therouter boot?

    A: ROM

    227. What command line keyword matches Ethernet_SNAP?A: snap

    228. What is Split Horizon?A: The router will not send the same routing update packet back out the sameinterface from which it was learned

    229. Which of the following are complications of Distance-Vector routing?(several options will be presented)

    A: Routing loopsCounting to infinitySlow convergencePeriodic updates slow convergence

    230. For less CPU strain, how should Cisco routers be configured forlogging?

    A: Syslog server routing

    231. What command views router CPU utilization?A: show processes cpu

    232. What command enables frame relay on a routers interface?A: encapsulation frame-relay

    233. In what OSI layer does IP operate?A: Network

  • 8/14/2019 Copyright Keen Interactive 2001

    33/33

    234. What command sets encapsulation type to PPP?A: encapsulation ppp

    235. Which command allows the user to see a system message whenlogging into a router?

    A: banner motd