1、How is the number 225 represented in binary? 11001111 11011011 11110011 11100001**** 2、What transmission channels are provided by an ISDN BRI service? 23 64 kbps B channels and one 64 kbps D channel 30 64 kbps B channels and one 16 kbps D channel two 56 kbps B channels and one 16 kbps D channel two 64 kbps B channels and one 16 kbps D channel**** two 64 kbps D channels and one 16 kbps B channel 23 64 kbps D channels and one 64 kbps B channel 3、Which of the following is true regarding latency? CSMA/CD requires no latency. It is also called asymmetry. It is based entirely on distance. Networking devices add to latency.**** 4、What is the length, in bits, of an Ethernet address? 12 24 32 48**** 80 128 5、The switches in the graphic are configured for VTP as shown. Select the statements that correctly describe the operation of these switches. (Choose two.) A new VLAN can be added to Switch1 and that information will be added only to Switch2. An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4. A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3. A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.**** A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4. An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.**** 6、Which layer is responsible for organizing bits using framing? Layer 1 Layer 2**** Layer 3 Layer 4 7、What is the purpose of DLCIs in Frame Relay? They determine the Frame Relay encapsulation type. They identify the logical circuit between a local router and a Frame Relay WAN switch.**** They represent the keepalives used to maintain the PVC in an active state. They represent the physical address of the router attached to a Frame Relay network. 8、For which condition will the ARP protocol be used? The destination IP address is unknown. The destination MAC address is unknown.**** The source IP address is unknown. The source MAC address is unknown. 9、If the above network has been configured with RIPv2, how many usable host addresses are in the 192.168.10.192 subnet? 0 2**** 4 6 8 10、Which three of the following are uses of access control lists (ACLs)? (Choose three.) protect hosts from viruses classify network traffic**** provide high network availability identify interesting traffic for DDR IP route filtering monitor the number of bytes and packets 11、Which device allows data communication to occur between VLANs? bridge hub switch router**** 12、Which of the following EIGRP functions is the responsibility of the IP protocoldependent module (PDM)? (Choose three.) the calculation of successor and feasible successor routes for IP and IPX traffic the notification of DUAL when IP routing information is received**** the communication of information about IP routes with neighbor routers the maintenance of the IP routing table the exchange of hello packets with other IP-enabled routers**** the insertion of lowest cost paths into the routing table**** 13、Which protocol is paired with its routing classification? BGP-Interior EIGRP-Exterior OSPF-Exterior RIP-Interior**** 14、Refer to the graphic. Which of the following are true regarding the route summary EIGRP would utilize for the networks on RouterA? (Choose two.) The networks can be summarized with auto-summary. The network summary must be manually configured.**** The default subnet mask can be used to summarize the networks. The networks can be summarized with 172.16.64.0/26. The networks can be summarized with 172.16.64.0/27. The networks can be summarized with 172.16.64.0/28.**** 15、Company XYZ has a Class B address of 135.166.0.0 and currently has 4 individual segments to subnet. The company will be adding 7 additional segments over this year and 9 additional segments the following year. What subnet mask should be used on the network in order to support the largest number of hosts per subnet? 255.255.224.0 255.255.240.0 255.255.248.0**** 255.255.250.0 255.255.252.0 16、Which of the following represents a group of routers under a common administration and is required when configuring routing protocols such as EIGRP? control group autonomous system**** corporate system Domain Name System local-area network wide-area network 17、What are the effects of LAN segmentation using a switch? (Choose three.) dedicated bandwidth between source and destinations**** enlarged collision domains decreased broadcast domains increased number of collision domains**** increased latency in the network**** 18、Which utility can be used to verify connectivity through all seven layers of the OSI model? netstat ping Telnet**** traceroute 19、Which of the following messages are sent from a DHCP server to a client during a successful configuration process? (Choose two.) DHCPDISCOVER DHCPOFFER**** DHCPREQUEST DHCPACK**** 20、The Cake router shown in the graphic has multiple RIP version 2 paths to the network attached to E0 of the Pie router. Which interface on the Cake router will be used to forward a packet from the 192.168.5.0 network to the 192.168.13.0 network? E0 E1**** S0 S1 It will load balance across S0 and S1. It will load balance across S0, S1 and E1. 21、What is true about windowing? It always requires separate acknowledgements for each segment sent. It controls the amount of data that can be sent before acknowledgement is required.**** It requires the sender to re-establish a connection if no acknowledgement is received. It allows TCP/IP to measure transmitted data in segments. 22、Which functions are carried out by switches and bridges when building the CAM tables? (Choose three.) builds the table using unknown source MAC addresses from received frames builds the table using unknown destination MAC addresses from received frames time stamps the entries for each address**** time stamps the BPDU of each frame received**** maps switch port numbers with the associated MAC address**** maps switch port numbers with the associated network address 23、Which of the following is the ISDN Layer 2 signaling protocol? BRI PRI LAPA LAPD**** 24、Which of the following IP addresses are broadcast addresses if the subnet mask is 255.255.255.240? (Choose three.) 75.32.75.15**** 205.16.35.11 199.254.129.111**** 129.130.17.143**** 135.22.55.93 105.33.62.213 25、What is the function of the first phase of PPP negotiation? link termination authentication of communicating peers link establishment and configuration**** network layer protocol configuration 26、Which method does a router use to build a Frame Relay map? ARP requests RARP requests Inverse RARP requests Inverse ARP requests**** 27、Which methods do frame relay switches use to inform DTEs of congestion within the frame relay network? CCP and LMI CIR and LATE DLCI and SPID FECN and BECN**** 28、Given a router that has already been configured, what is the correct loading sequence when powering on? bootstrap, RAM, operating system bootstrap, configuration file, operating system bootstrap, operating system, configuration file**** operating system, configuration file, RAM 29、What is the purpose of the show cdp neighbors command? to display a summary of the configurations of all directly attached Cisco devices to display information about all Cisco devices that are directly connected to a local device**** to display information about all Cisco networks in the WAN to display addressing information about all remote routers to display the names of all OSPF neighbors in the local area 30、Which component designates a device that is not compatible with ISDN and requires a terminal adapter? NT1 NT2 TE1 TE2**** 31、Which networking device performs path determination? a hub a switch a router**** a bridge 32、Which list contains only routed protocols? AppleTalk, IP, EIGRP IP, AppleTalk, IPX**** IP, RIP, IPX IPX, OSPF, EIGRP 33、Which statement is true regarding routing metrics? All routing protocols use the same metrics. EIGRP uses bandwidth as its only metric. Routers compare metrics to determine the best route.**** The larger metric generally represents the better path. 34、Which statement describes the store and forward transmission mode of an Ethernet switch? It is also referred to as a hybrid mode or as error sensing mode. It requires the switch to read the first 64 bytes of an Ethernet frame and then begins to forward the data. It decreases the latency of the transmission but has very little error detection. It increases latency with large frames, but error detection is high.**** 35、Which statements about VLANs are true? (Choose three.) VLANs are restricted to a physical segment. They are logical groupings of devices.**** User hosts can be grouped by function.**** VLANs are configured by software.**** VLANs are standardized. 36、Which statement is correct concerning routing and routed protocols? A routed protocol allows the routers to communicate with other routers and maintain tables for a routing protocol.**** A routing protocol allows routers to communicate with other routers and maintain tables for a routed protocol. Routers only need to use routing protocols to work properly. There is no difference between routed and routing protocols. 37、Which command will display statistics for all interfaces configured on a router? list interfaces show interfaces**** show processes show statistics 38、Which type of handshaking occurs when using CHAP? one-way two-way three-way**** four-way 39、Which statements describe the use of Link State Advertisements (LSA)? (Choose two.) LSAs are generated when changes in the network occur.**** Link state advertisements are refreshed every 60 minutes. The router copies the information received from each LSA packet into the routing table. Routers exchange LSAs to build and maintain topology databases.**** Forwarding LSAs can increase the occurrence of routing loops. 40、Which of the following are benefits of creating a subnetwork structure in an IP network? (Choose three.) permits network address duplication allows for address flexibility**** prevents address replication**** provides broadcast containment adds low-level security**** allows for more network hosts available 41、What determines how much data a sending station running TCP/IP can transmit before it must receive an acknowledgment? segment size transmission rate bandwidth window size**** sequence number 42、An administrator has an older 1900 switch located on the edge of the network. What can the network administrator do to ensure that it does not become the root bridge of the spanning-tree network? decrease the BPDU hello timer update on the 1900 assign the highest IP address to the switch that should be the root assign the lowest IP address to new root bridge assign the lowest priority to the switch that should be the root**** assign the highest priority to the new root bridge decrease the BID on the 1900 switch 43、What is the purpose of typing o/r 0x2142 during a password recovery procedure on a 2500 series router? to restart the router to bypass the configuration in NVRAM**** to view the lost password to save the changes to the configuration to enter ROM Monitor mode 44、Which of the following are true concerning distance vector and link state routing protocols? (Choose 2.) Distance vector protocols send the entire routing table to directly connected neighbors.**** Link state protocols send the entire routing table to all routers in the network. Distance vector protocols send updates about directly connected neighbors to all networks listed in the routing table. Link state protocols send updates containing the state of their own links to all other routers on the network.**** 45、What does the ISDN BRI provide? 23 B channels and one 64 kbps D channel total bit rate up to 1.536 Mbps two 56 kbps B channels and one 64 kbps D channel two 64 kbps B channels and one 16 kbps D channel**** 46、In an effort to minimize traffic, an administrator decided to keep web traffic from causing the ISDN link to come up by denying WWW traffic to the 192.168.20.5 remote server. Two minutes after making changes to the configuration as shown in the graphic, the administrator notices that web traffic is still passing over the link. What is the most likely cause of the problem? The dialer-group has not been applied to outbound traffic. The access-list is incorrectly configured. Broadcasts are creating "interesting" traffic and keeping the link active. The command ip access-group 128 out is missing from the bri0/0 interface.**** 47、Which address does a bridge use to build its bridging table? destination IP address destination MAC address source IP address source MAC address**** 48、What is the default ISDN encapsulation used on Cisco ISDN routers? SLIP PPP HDLC**** VPP 49、What is the purpose of the IOS enable secret command? to set password protection on incoming Telnet sessions to set password protection on the console terminal to allow a user access to User mode to allow a user to enter a password that will be encrypted**** 50、Which of the following improves security in PPP authentication? LCP NCP CHAP**** PAP 51、How many bits are in IPv6 addresses? 16 32 64 96 128**** 258 52、What is the term for the cabling that connects the customer premises equipment to the CO switch? demarc local loop final mile DTE**** trunk line 53、What enables routers to learn of destination networks? proxy ARP CAM table exchanges host name tables routing protocols**** DNS lookups 54、Which reason is correct for having at least one true condition in an ACL? If there is not a true statement, all packets are returned to the sender. The implicit "deny any" statement will deny all traffic.**** True conditions only test the status of the router. You are not required to have a true statement in ACL. 55、What is the name of that point in a LAN where the responsibility of the network administrator ends and the responsibility of the telco begins? point of presence local loop DTE demarcation**** 56、Which of the following are functions of a WAN? (Choose three.) permit real-time communication between users**** allow users access to high bandwidth provide full-time local service provide e-mail and e-commerce services**** connect physically adjacent devices provide access to computers in other locations**** 57、All the routers in the network shown in the graphic are part of the same OSPF area. All the routers were powered up simultaneously, except Router E, which was brought online the following day. Which router will be the BDR after the network has converged? Router A Router B Router C Router D Router E**** 58、Which type of ACL only checks the source address? Extended ACL General ACL Source ACL Standard ACL**** 59、When using distance-vector routing protocols in a frame relay environment with multiple DLCIs on a single physical router interface, split-horizon issues must be resolved. According to Cisco best practices, what should be configured to manage these issues? a single network address multiple LMIs subinterfaces**** multiple IP addresses on the same subnet 60、Which fields are common to the TCP and the UDP segments? (Choose two.) source address**** sequence number acknowledgement number options checksum destination port**** 61、Which of the following do switches send at regular intervals to eliminate switching loops? bi-directional protocol data units binary protocol data units bridge protocol data units**** buffered protocol data units 62、What reduces the problems of routing loops due to incorrect updates? count to infinity distance vector timers event-triggered updates split horizon**** 63、Routers and switches both perform important tasks in an internetwork. Which of the following are distinguishing differences between them? (Choose two.) Routers are used more often in LAN topologies than switches. Routers do not require an initial configuration to operate but switches do. Routers and switches operate at different layers of the OSI model.**** Routers and switches route different sets of protocols. Routers block broadcasts but switches forward broadcasts.**** 64、When must data be sent by way of the default route? The destination network is on a different network than the source. The destination network is not directly connected to the router. The destination network is a stub network. There is no entry in the routing table for the destination network.**** 65、What is an advantage of the use of layers in the OSI reference model? It breaks network communications into larger parts. It increases complexity. It prevents changes in one layer from affecting other layers.**** It requires the use of single-vendor equipment for hardware and software communications.