1、How is the number 225 represented in binary

advertisement
1、How is the number 225 represented in binary?
11001111
11011011
11110011
11100001****
2、What transmission channels are provided by an ISDN BRI service?
23 64 kbps B channels and one 64 kbps D channel
30 64 kbps B channels and one 16 kbps D channel
two 56 kbps B channels and one 16 kbps D channel
two 64 kbps B channels and one 16 kbps D channel****
two 64 kbps D channels and one 16 kbps B channel
23 64 kbps D channels and one 64 kbps B channel
3、Which of the following is true regarding latency?
CSMA/CD requires no latency.
It is also called asymmetry.
It is based entirely on distance.
Networking devices add to latency.****
4、What is the length, in bits, of an Ethernet address?
12
24
32
48****
80
128
5、The switches in the graphic are configured for VTP as shown. Select the statements
that correctly describe the operation of these switches. (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to
Switch2.
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from
Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1,
Switch2, and Switch3.
A new VLAN can be added to Switch1 and that information will be added to Switch2
and Switch4.****
A new VLAN can be added to Switch3 and that information will be added to Switch1,
Switch2, and Switch4.
An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from
Switch1 and Switch2.****
6、Which layer is responsible for organizing bits using framing?
Layer 1
Layer 2****
Layer 3
Layer 4
7、What is the purpose of DLCIs in Frame Relay?
They determine the Frame Relay encapsulation type.
They identify the logical circuit between a local router and a Frame Relay WAN
switch.****
They represent the keepalives used to maintain the PVC in an active state.
They represent the physical address of the router attached to a Frame Relay network.
8、For which condition will the ARP protocol be used?
The destination IP address is unknown.
The destination MAC address is unknown.****
The source IP address is unknown.
The source MAC address is unknown.
9、If the above network has been configured with RIPv2, how many usable host
addresses are in the 192.168.10.192 subnet?
0
2****
4
6
8
10、Which three of the following are uses of access control lists (ACLs)? (Choose three.)
protect hosts from viruses
classify network traffic****
provide high network availability
identify interesting traffic for DDR
IP route filtering
monitor the number of bytes and packets
11、Which device allows data communication to occur between VLANs?
bridge
hub
switch
router****
12、Which of the following EIGRP functions is the responsibility of the IP protocoldependent module (PDM)? (Choose three.)
the calculation of successor and feasible successor routes for IP and IPX traffic
the notification of DUAL when IP routing information is received****
the communication of information about IP routes with neighbor routers
the maintenance of the IP routing table
the exchange of hello packets with other IP-enabled routers****
the insertion of lowest cost paths into the routing table****
13、Which protocol is paired with its routing classification?
BGP-Interior
EIGRP-Exterior
OSPF-Exterior
RIP-Interior****
14、Refer to the graphic. Which of the following are true regarding the route summary
EIGRP would utilize for the networks on RouterA? (Choose two.)
The networks can be summarized with auto-summary.
The network summary must be manually configured.****
The default subnet mask can be used to summarize the networks.
The networks can be summarized with 172.16.64.0/26.
The networks can be summarized with 172.16.64.0/27.
The networks can be summarized with 172.16.64.0/28.****
15、Company XYZ has a Class B address of 135.166.0.0 and currently has 4 individual
segments to subnet. The company will be adding 7 additional segments over this year and
9 additional segments the following year. What subnet mask should be used on the
network in order to support the largest number of hosts per subnet?
255.255.224.0
255.255.240.0
255.255.248.0****
255.255.250.0
255.255.252.0
16、Which of the following represents a group of routers under a common administration
and is required when configuring routing protocols such as EIGRP?
control group
autonomous system****
corporate system
Domain Name System
local-area network
wide-area network
17、What are the effects of LAN segmentation using a switch? (Choose three.)
dedicated bandwidth between source and destinations****
enlarged collision domains
decreased broadcast domains
increased number of collision domains****
increased latency in the network****
18、Which utility can be used to verify connectivity through all seven layers of the OSI
model?
netstat
ping
Telnet****
traceroute
19、Which of the following messages are sent from a DHCP server to a client during a
successful configuration process? (Choose two.)
DHCPDISCOVER
DHCPOFFER****
DHCPREQUEST
DHCPACK****
20、The Cake router shown in the graphic has multiple RIP version 2 paths to the
network attached to E0 of the Pie router. Which interface on the Cake router will be used
to forward a packet from the 192.168.5.0 network to the 192.168.13.0 network?
E0
E1****
S0
S1
It will load balance across S0 and S1.
It will load balance across S0, S1 and E1.
21、What is true about windowing?
It always requires separate acknowledgements for each segment sent.
It controls the amount of data that can be sent before acknowledgement is
required.****
It requires the sender to re-establish a connection if no acknowledgement is received.
It allows TCP/IP to measure transmitted data in segments.
22、Which functions are carried out by switches and bridges when building the CAM
tables? (Choose three.)
builds the table using unknown source MAC addresses from received frames
builds the table using unknown destination MAC addresses from received frames
time stamps the entries for each address****
time stamps the BPDU of each frame received****
maps switch port numbers with the associated MAC address****
maps switch port numbers with the associated network address
23、Which of the following is the ISDN Layer 2 signaling protocol?
BRI
PRI
LAPA
LAPD****
24、Which of the following IP addresses are broadcast addresses if the subnet mask is
255.255.255.240? (Choose three.)
75.32.75.15****
205.16.35.11
199.254.129.111****
129.130.17.143****
135.22.55.93
105.33.62.213
25、What is the function of the first phase of PPP negotiation?
link termination
authentication of communicating peers
link establishment and configuration****
network layer protocol configuration
26、Which method does a router use to build a Frame Relay map?
ARP requests
RARP requests
Inverse RARP requests
Inverse ARP requests****
27、Which methods do frame relay switches use to inform DTEs of congestion within the
frame relay network?
CCP and LMI
CIR and LATE
DLCI and SPID
FECN and BECN****
28、Given a router that has already been configured, what is the correct loading sequence
when powering on?
bootstrap, RAM, operating system
bootstrap, configuration file, operating system
bootstrap, operating system, configuration file****
operating system, configuration file, RAM
29、What is the purpose of the show cdp neighbors command?
to display a summary of the configurations of all directly attached Cisco devices
to display information about all Cisco devices that are directly connected to a local
device****
to display information about all Cisco networks in the WAN
to display addressing information about all remote routers
to display the names of all OSPF neighbors in the local area
30、Which component designates a device that is not compatible with ISDN and requires
a terminal adapter?
NT1
NT2
TE1
TE2****
31、Which networking device performs path determination?
a hub
a switch
a router****
a bridge
32、Which list contains only routed protocols?
AppleTalk, IP, EIGRP
IP, AppleTalk, IPX****
IP, RIP, IPX
IPX, OSPF, EIGRP
33、Which statement is true regarding routing metrics?
All routing protocols use the same metrics.
EIGRP uses bandwidth as its only metric.
Routers compare metrics to determine the best route.****
The larger metric generally represents the better path.
34、Which statement describes the store and forward transmission mode of an Ethernet
switch?
It is also referred to as a hybrid mode or as error sensing mode.
It requires the switch to read the first 64 bytes of an Ethernet frame and then begins to
forward the data.
It decreases the latency of the transmission but has very little error detection.
It increases latency with large frames, but error detection is high.****
35、Which statements about VLANs are true? (Choose three.)
VLANs are restricted to a physical segment.
They are logical groupings of devices.****
User hosts can be grouped by function.****
VLANs are configured by software.****
VLANs are standardized.
36、Which statement is correct concerning routing and routed protocols?
A routed protocol allows the routers to communicate with other routers and maintain
tables for a routing protocol.****
A routing protocol allows routers to communicate with other routers and maintain
tables for a routed protocol.
Routers only need to use routing protocols to work properly.
There is no difference between routed and routing protocols.
37、Which command will display statistics for all interfaces configured on a router?
list interfaces
show interfaces****
show processes
show statistics
38、Which type of handshaking occurs when using CHAP?
one-way
two-way
three-way****
four-way
39、Which statements describe the use of Link State Advertisements (LSA)? (Choose
two.)
LSAs are generated when changes in the network occur.****
Link state advertisements are refreshed every 60 minutes.
The router copies the information received from each LSA packet into the routing
table.
Routers exchange LSAs to build and maintain topology databases.****
Forwarding LSAs can increase the occurrence of routing loops.
40、Which of the following are benefits of creating a subnetwork structure in an IP
network? (Choose three.)
permits network address duplication
allows for address flexibility****
prevents address replication****
provides broadcast containment
adds low-level security****
allows for more network hosts available
41、What determines how much data a sending station running TCP/IP can transmit
before it must receive an acknowledgment?
segment size
transmission rate
bandwidth
window size****
sequence number
42、An administrator has an older 1900 switch located on the edge of the network. What
can the network administrator do to ensure that it does not become the root bridge of the
spanning-tree network?
decrease the BPDU hello timer update on the 1900
assign the highest IP address to the switch that should be the root
assign the lowest IP address to new root bridge
assign the lowest priority to the switch that should be the root****
assign the highest priority to the new root bridge
decrease the BID on the 1900 switch
43、What is the purpose of typing o/r 0x2142 during a password recovery procedure on a
2500 series router?
to restart the router
to bypass the configuration in NVRAM****
to view the lost password
to save the changes to the configuration
to enter ROM Monitor mode
44、Which of the following are true concerning distance vector and link state routing
protocols? (Choose 2.)
Distance vector protocols send the entire routing table to directly connected
neighbors.****
Link state protocols send the entire routing table to all routers in the network.
Distance vector protocols send updates about directly connected neighbors to all
networks listed in the routing table.
Link state protocols send updates containing the state of their own links to all other
routers on the network.****
45、What does the ISDN BRI provide?
23 B channels and one 64 kbps D channel
total bit rate up to 1.536 Mbps
two 56 kbps B channels and one 64 kbps D channel
two 64 kbps B channels and one 16 kbps D channel****
46、In an effort to minimize traffic, an administrator decided to keep web traffic from
causing the ISDN link to come up by denying WWW traffic to the 192.168.20.5 remote
server. Two minutes after making changes to the configuration as shown in the graphic,
the administrator notices that web traffic is still passing over the link. What is the most
likely cause of the problem?
The dialer-group has not been applied to outbound traffic.
The access-list is incorrectly configured.
Broadcasts are creating "interesting" traffic and keeping the link active.
The command ip access-group 128 out is missing from the bri0/0 interface.****
47、Which address does a bridge use to build its bridging table?
destination IP address
destination MAC address
source IP address
source MAC address****
48、What is the default ISDN encapsulation used on Cisco ISDN routers?
SLIP
PPP
HDLC****
VPP
49、What is the purpose of the IOS enable secret command?
to set password protection on incoming Telnet sessions
to set password protection on the console terminal
to allow a user access to User mode
to allow a user to enter a password that will be encrypted****
50、Which of the following improves security in PPP authentication?
LCP
NCP
CHAP****
PAP
51、How many bits are in IPv6 addresses?
16
32
64
96
128****
258
52、What is the term for the cabling that connects the customer premises equipment to
the CO switch?
demarc
local loop
final mile
DTE****
trunk line
53、What enables routers to learn of destination networks?
proxy ARP
CAM table exchanges
host name tables
routing protocols****
DNS lookups
54、Which reason is correct for having at least one true condition in an ACL?
If there is not a true statement, all packets are returned to the sender.
The implicit "deny any" statement will deny all traffic.****
True conditions only test the status of the router.
You are not required to have a true statement in ACL.
55、What is the name of that point in a LAN where the responsibility of the network
administrator ends and the responsibility of the telco begins?
point of presence
local loop
DTE
demarcation****
56、Which of the following are functions of a WAN? (Choose three.)
permit real-time communication between users****
allow users access to high bandwidth
provide full-time local service
provide e-mail and e-commerce services****
connect physically adjacent devices
provide access to computers in other locations****
57、All the routers in the network shown in the graphic are part of the same OSPF area.
All the routers were powered up simultaneously, except Router E, which was brought
online the following day. Which router will be the BDR after the network has converged?
Router A
Router B
Router C
Router D
Router E****
58、Which type of ACL only checks the source address?
Extended ACL
General ACL
Source ACL
Standard ACL****
59、When using distance-vector routing protocols in a frame relay environment with
multiple DLCIs on a single physical router interface, split-horizon issues must be
resolved. According to Cisco best practices, what should be configured to manage these
issues?
a single network address
multiple LMIs
subinterfaces****
multiple IP addresses on the same subnet
60、Which fields are common to the TCP and the UDP segments? (Choose two.)
source address****
sequence number
acknowledgement number
options
checksum
destination port****
61、Which of the following do switches send at regular intervals to eliminate switching
loops?
bi-directional protocol data units
binary protocol data units
bridge protocol data units****
buffered protocol data units
62、What reduces the problems of routing loops due to incorrect updates?
count to infinity
distance vector timers
event-triggered updates
split horizon****
63、Routers and switches both perform important tasks in an internetwork. Which of the
following are distinguishing differences between them? (Choose two.)
Routers are used more often in LAN topologies than switches.
Routers do not require an initial configuration to operate but switches do.
Routers and switches operate at different layers of the OSI model.****
Routers and switches route different sets of protocols.
Routers block broadcasts but switches forward broadcasts.****
64、When must data be sent by way of the default route?
The destination network is on a different network than the source.
The destination network is not directly connected to the router.
The destination network is a stub network.
There is no entry in the routing table for the destination network.****
65、What is an advantage of the use of layers in the OSI reference model?
It breaks network communications into larger parts.
It increases complexity.
It prevents changes in one layer from affecting other layers.****
It requires the use of single-vendor equipment for hardware and software
communications.
Download