Ccna4 Final 6

download Ccna4 Final 6

of 17

Transcript of Ccna4 Final 6

  • 8/14/2019 Ccna4 Final 6

    1/17

    THIS EXAM IS (80%)

    What is accomplished by segmenting a LAN with a bridge?

    *increase large collision domains

    reduce large collision domains

    reduce small broadcast domains

    increase small broadcast domains

    2How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?4

    *5810

    3What is a disadvantage of cut-through switching?

    *no error checking

    a decrease in error checking

    decrease in number of collision domains

    decrease in bandwidth

    increased latency

    4Which of the following are data link layer encapsulation details? (Choose two.)

    *Packets are put into frames.

    Data is packaged into a packet.

    Data is segmented into segments.

    Data is converted for Internet travel.

    *An address is added to identify the directly connected device.

  • 8/14/2019 Ccna4 Final 6

    2/17

    5Select the characteristics specified by 10BaseT. (Choose three.)

    *twisted pair cable

    T style connectors

    *baseband transmission

    10 gigabits per second data rate

    *10 megabits per second data rate

    decimal encoded data transmission

    6

    A LAN is to be added to an unused router Ethernet interface. What steps must be performed to configure thisinterface to allow connectivity to the hosts on this LAN? (Choose two.)

    *Enter the command no shutdown.

    A password must be set on the interface.

    The interface DCE clock rate must be set.

    The interface must be configured for virtual terminal access.

    *The interface must be configured with an IP address and subnet mask.

    The router must be put in setup mode in order for the interface to be configured.

    7Which media types can be used in an implementation of a 10BASE-T network? (Choose three.)

    Category 5 UTP *Category 5e UTP *Category 3 UTP *coaxial cablemulti-mode fiber single mode fiber

    8If 4 bits are borrowed from the host field of a Class C address to create subnets, what will the range of usable hostaddresses be in the last subnet?

    .224 to .239

    .225 to .239

  • 8/14/2019 Ccna4 Final 6

    3/17

    .225 to .254

    .241 to .254

    .241 to .255

    *.240 to .255

    9Which of the following describe how a device on a LAN builds a table of MAC addresses? (Choose two.)

    by monitoring the traffic that occurs on the local network segment

    *via FTP from the nearest router

    *by sending a request to the nearest domain name server

    by broadcasting an ARP request

    10Which of the following best describes how the Gigabit Ethernet, Media Access Control method views the link?

    ringshared buspoint-to-point *star extended star

    11What is the purpose of Positive Acknowledgment and Retransmission (PAR)?

    PAR allows the presentation layer to request that data be resent in a format the destination host can process.

    PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment iscorrupt.

    *PAR helps ensure that a number of data segments sent by one host are received by another host before additionaldata segments are sent.

    PAR is used to renegotiate the window size during the synchronization process.

    12Which criteria identify a Class B address? (Choose two.)

    decimal number in first octet between 127-191

  • 8/14/2019 Ccna4 Final 6

    4/17

    decimal number in first octect between 128-192

    *decimal number in first octect between 128-191

    first bit of binary IP address is 0

    *first two bits of binary IP address are 10

    first three bits of IP binary address are 110

    13An administrator has made routing protocol changes to a router's configuration. To ensure that the changes areimplemented, the active configuration is saved and the router is reloaded. After the router has initialized, the outputon the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?

    There was a POST failure.

    The incorrect IOS loaded.

    There was an error in the startup configuration file.

    *The configuration register was set to ignore NVRAM.

    14What operations are performed during router initialization? (Choose three.)

    *The IOS is loaded into RAM.

    The generic bootstrap loader tests all interfaces.

    All directly connected network devices are identified.

    *A valid configuration file is loaded from NVRAM if specified by the configuration register.

    *A question driven setup menu is presented if a valid configuration file cannot be loaded.

    15For a network manager planning the installation of a new network, which of the following will be needed to implementa typical 10BASE-T network installation? (Choose three.)

    RJ-11BNC connectorsRJ-48 patch cablesRJ-45 connectors *Category 5 UTP cables *hubs or switches *

  • 8/14/2019 Ccna4 Final 6

    5/17

  • 8/14/2019 Ccna4 Final 6

    6/17

    300 meters

    500 meters

    20What is the result of executing the erase startup-config command?

    It deletes the active configuration file from RAM.

    *It deletes the backup configuration file in NVRAM.

    It deletes the saved configuration file from ROM.

    It deletes the saved configuration file from the C: drive.

    21Which of the following imposes boundaries on broadcast traffic?

    Bridge

    Repeater

    *Router

    Transceiver

    22Which utility shows the route a packet takes to reach its destination?

    netstat

    ping

    Telnet

    *traceroute

    23Which device is considered a multi-port bridge?

    hub

    router

    *switch

  • 8/14/2019 Ccna4 Final 6

    7/17

  • 8/14/2019 Ccna4 Final 6

    8/17

    *162

    164

    166

    28*What happens on an Ethernet network after a collision occurs? (Choose three.)

    A backoff algorithm is invoked and transmission is stopped.

    Devices involved in the collision have a random period of time for priority retransmission of the damaged packet.

    The devices involved in the collision release a token indicating the time each station may begin retransmitting.

    *The devices involved in the collision do not have priority to transmit data.

    *The devices with data to transmit return to a listen-before-transmit mode.

    Transmit work will restart with the reissuance of all data.

    29Which of the following types of networks pass a token sequentially to each host? (Choose two.)

    Ethernet

    *Token Ring

    *FDDI

    Frame Relay

    ISDN

    30What is the length of a MAC address?

    8 bits

    8 bytes

    24 bits

    24 bytes

    *48 bits

  • 8/14/2019 Ccna4 Final 6

    9/17

    48 bytes

    31 Which of the following are TCP services? (Choose three.)

    address resolution

    end-to-end communication

    *flow control

    reliability of data delivery

    path determination

    *data representation

    32Routers have different types of memory. Choose the answer that describes RAM.

    provides working storage

    *stores a fully functional IOS image

    stores the startup configuration file

    initializes the code used in router startup

    33Which command will display routing table information about all known networks and subnetworks?

    Router# show ip interfaces

    Router# show ip connections

    *Router# show ip route

    Router# show ip networks

    34Which of the following statements describe distance vector routing updates? (Choose three.)

    Topology changes are transmitted to all routers at once.

    Routers send their entire routing tables in distance vector updates.

    *Path cost metrics for each route are included in the updates.

  • 8/14/2019 Ccna4 Final 6

    10/17

    Periodic updates are sent directly to every router in the network.

    *Routing updates are sent periodically to adjacent routers.

    *Routers send only the state of their own links in distance vector updates.

    35Which ICMP message type notifies source hosts that a receiving host or network is not available?

    time exceeded

    redirect

    *destination unreachable

    source quench

    parameter problem

    echo reply

    36How many total subnets are created by applying the subnet mask 255.255.252.0 to a Class B network?

    4

    6

    *64

    252

    255

    1024

    37Which of the following conditions will cause a router using holddown timers to ignore an update?

    an update from a different router with a better metric

    an update from a different router with a poorer metric

    an update from the same router with a better metric

    *an update from the same router with a poorer metric

  • 8/14/2019 Ccna4 Final 6

    11/17

    38Which IP packet field will prevent endless loops?

    type-of-service

    identification

    flags

    *time-to-live

    header checksum

    39Which of the following is a network type that is widely used in dialup networking?

    shared media

    point-to-point

    extended shared media

    *point-to-multipoint

    40When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet,how many IP addresses are available to be assigned to devices?

    1022

    510

    254

    126

    30

    *6

    41Cisco Discovery Protocol (CDP) operates at which OSI Layer?

    physical layer

    network layer

  • 8/14/2019 Ccna4 Final 6

    12/17

    *data link layer

    presentation layer

    42Which protocol can be used to load or retrieve Cisco IOS images to or from a router?

    SNMP

    *TFTP

    UDP

    TCP

    43Which of the following is a transport layer protocol of the TCP/IP model?

    FTP

    *UDP

    IP

    TFTP

    44Which of the following is created with switched full-duplex transmission?

    more collision domains

    fewer collision domains

    *no collision domains

    no increase in broadcast domains

    more broadcast domains

    45Which of the following IP addresses are broadcast addresses if the subnet mask is 255.255.255.240? (Choosethree.)

    *75.32.75.15

    205.16.35.11

  • 8/14/2019 Ccna4 Final 6

    13/17

    *199.254.129.111

    *129.130.17.143

    135.22.55.93

    105.33.62.213

    46 What type of routing uses information that is manually entered into the routing table?

    dynamic

    interior

    *static

    standard

    47What is used to resolve known IP addresses to unknown MAC addresses?

    *ARP

    DNS

    DHCP

    RARP

    48Which of the following OSI layers offers reliable, connection-oriented data communication services?

    session

    *transport

    network

    data link

    49Which of the following are benefits of creating a subnetwork structure in an IP network? (Choose three.)

    permits network address duplication

    *allows for address flexibility

  • 8/14/2019 Ccna4 Final 6

    14/17

    *prevents address replication

    provides broadcast containment

    *adds low-level security

    allows for more network hosts available

    50How many IP addresses can be assigned to host devices on each subnet of a Class B network with a subnet mask of 255.255.255.248?

    3

    5

    6

    8

    30

    8190???? mayby that

    51After a Telnet session has been suspended, which actions will restart the session? (Choose two.)

    pressing Enter to restart the most recent session

    using the resume command followed by a session ID

    *typing the session ID followed by pressing Enter

    *using the resume command followed by the IP address

    52Which layer of the OSI model covers physical media?

    *Layer 1

    Layer 2

    Layer 3

    Layer 4

    Layer 5

  • 8/14/2019 Ccna4 Final 6

    15/17

    Layer 6

    53

    Which protocol is used by FTP to transfer files over the Internet?

    *TCP

    SMTP

    UDP

    SNMP

    54

    Which of the following factors should be considered when selecting a routing protocol to be implemented in anenterprise network? (Choose three.)

    *bandwidth consumption

    *router memory requirements

    router location

    spanning tree size

    *router processor capability

    flow control capability

    55

    A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What eventswill occur if this command is successful? (Choose two.)

    *The router will block the ping request message.

    The router will reply to the echo request with a proxy ping response.

    Workstation A will send a UDP ping request message to workstation B.

    Workstation B will send a UDP ping reply message to workstation A.

    *Workstation A will send an ICMP echo request message to workstation B.

    Workstation B will send an ICMP echo reply message to workstation A.

  • 8/14/2019 Ccna4 Final 6

    16/17

    56Which mode will a router enter if it is unable to locate a valid startup configuration file during the boot process?

    Boot mode

    Config mode

    Setup mode

    Startup mode

    57Which protocol of the TCP/IP model internet layer provides connectionless, best-effort-delivery of datagrams?

    ARP

    ICMP

    IP

    RARP

    *TCP

    DNS

    58Which of the following does a router use to make a forwarding decision?

    *destination IP address

    MAC address

    source IP address

    encapsulation address

    default gateway

    59Routers have different types of memory. Choose the answer that describes NVRAM.

    provides working storage

    *stores a fully functional IOS image

  • 8/14/2019 Ccna4 Final 6

    17/17