Cisco CCNA 3

advertisement
Cisco CCNA 3.1 Semester 4 – Skills Review Exam – Oktober 2006
1.
A network administrator needs to address a network with 2 WAN links and 5
Ethernet
links on a router. What is the most efficient way for the network administrator to
address this network while wasting the fewest number of host addresses?
VLSM
2. Which subnet mask matches the 172.18.20.100/19 IP address?
255.255.224.0
3.
Refer to the exhibit. Which two IP addresses can a network administrator
legitimately
choose from to assign to the host on the subnet connected to the FastEthernet
0/0
interface of the router? (Choose two.)
172.16.10.122
172.16.10.125
4. Which addresses are considered network addresses of 200.199.48.0/29 when
subnet zero is in effect? (Choose three.)
200.199.48.0
200.199.48.16
200.199.48.200
5. A client is communicating with a server on a different segment of the network.
How
does the server determine what service is being requested by the client?
The server will determine the appropriate service from the destination port field.
6. There are a large number of networking protocols that exist at various layers of
the
OSI model. What is a protocol?
a set of rules and conventions
7.
Refer to the exhibit. If router JAX routes between VLANs including VLAN1, how
many
broadcast domains are present in the topology?
4
8. Which statements describe nondeterministic MAC protocols? (Choose two.)
Hosts transmit using a first-come, first-served approach.
NICs listen for the absence of a signal before transmitting.
9. A network technician is teaching a trainee to configure a router. The technician
begins by explaining the different modes available during configuration. What
router
mode allows a limited set of monitoring commands that can be used to obtain but
not
alter basic configuration information?
user mode
10.
Refer to the exhibit. Which group of commands will configure the network with
static
routes?
RTR-1(config)# ip route 192.168.20.0 255.255.255.0 198.65.14.2
RTR-2(config)# ip route 192.168.10.0 255.255.255.0 198.65.14.1
11.
Refer to the exhibit. Which configuration commands must be made on the
Sydney
router to configure it for connectivity with the Melbourne site? (Choose three.)
Sydney(config-if)# ip address 192.168.15.6 255.255.255.252
Sydney(config-if)# clock rate 56000
Sydney(config-if)# no shutdown
12. A technician is recovering the password on a router. The technician has
entered
ROMMON mode, changed the configuration register to 0x2142, and reset the
router.
The technician enters configuration mode on the router, changes the password,
and
enters the copy running-config startup-config command. After changing the
configuration register to 0x2102, the technician reloads the router. When the
router
reloads, the technician finds that only the password is in the configuration. What
could be the problem?
The technician did not copy the startup configuration to the running configuration
before changing the password.
13. A technician is asked to configure a privileged EXEC password that uses a
strong
MD5 algorithm for encryption. What command or commands should the
technician
use to configure the password?
Router(config)# enable secret cisco
14. Which three statements describe the routing process? (Choose three.)
A router must use information learned from other routers to reach remote routers.
When static routing is used, the network administrator must configure the
information
about remote routers manually.
A router makes forwarding decisions based upon the destination IP address of a
packet.
15. Which statements describe the routing table? (Choose two.)
The gateway of last resort must be configured to direct unknown traffic requests.
Routers base packet forwarding decisions on information in the routing table.
16. A network administrator needs to select the appropriate routing protocol for a
network. What information should the administrator obtain to select the
appropriate
routing protocol? (Choose three.)
the size of the network
bandwidth available on the links
processing power of the routers
17. Which feature of distance vector routing protocols prevents a router from
sending
information learned about a route back to the router it received the information
from?
split-horizon
18. Which command or commands will correctly configure the bandwidth for
OSPF
cost calculation?
Router(config)# interface s0/0
Router(config-if)# bandwidth 64000
19. As a packet is being moved across a routed network from host A to host B it
must
pass across a series of routers. What is true of the Layer 2 and Layer 3
addresses in
the packet header as it moves from router to router?
The Layer 2 destination address will be the Layer 2 address of the next hop
router.
20. A technician is troubleshooting a loss of connectivity and suspects that an
incorrectly configured ACL is the cause. Which commands can the technician
use to
verify that the ACL is incorrectly configured? (Choose two.)
show running-config
show access-lists
21. An administrator has been asked to explain ACLs to a trainee. What are
some of
the suggested uses for ACLs that the trainee should learn? (Choose three.)
limit network traffic and increase performance
provide traffic flow control
provide a basic level of security for network access
22. A network administrator is writing a standard ACL that will deny any traffic
from
the 172.16.0.0/16 network, but permit all other traffic. Which of commands should
be
used? (Choose two.)
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 permit any
23. Once an ACL has been created, it must be applied in the proper location to
have
the desired effect. What rules should be observed when applying ACLs?
(Choose
two.)
Outbound filters do not affect traffic that originates within the local router.
Extended ACLs should be applied closest to the source.
24. A technician is testing connectivity between two hosts. What command can
be
used to test application layer connectivity between the two hosts?
telnet
25. In the process of training a new technician, the network administrator begins
by
teaching the trainee about Layer 1 problems that can interrupt network
connectivity.
Which three issues represent Layer 1 problems? (Choose three.)
device turned off
broken cable
incorrectly wired cable
26.
Refer to the exhibit. What command would produce this output?
debug ip icmp
27. The process of troubleshooting a network problem is accomplished by
sequentially testing the OSI layers from the bottom upward. If the network cables
and
all connections have already been checked and the error still exists, what should
be
checked next?
interface encapsulation and clockrate
28. What two pieces of information can be obtained from the show ip route
command? (Choose two.)
the IP address of the gateway of last resort
the routing protocols that are enabled
29. What is the purpose of the show cdp neighbors detail command? (Choose
two.)
It displays information about a specific neighbor.
It displays information about networks that are directly connected to the router.
30.
Refer to the exhibit. A network administrator is troubleshooting a routing issue on
RTR-2. RTR-1 is connected to RTR-2 via serial 0/0 but all routes to RTR-1 are
sent
via RTR-3. Based on the output from the show ip protocols command on RTR-1,
what could be the problem?
EIGRP has been configured with the passive-interface command on the serial
0/0
interface.
31. An administrator is teaching a new technician about Layer 2 problems that
can
interrupt network connectivity. Which three problems are Layer 2 problems?
(Choose
three.)
improper encapsulation set
NIC problems
improper clockrate settings
32. What layer of the OSI model is being used when a technician is using the
command ping to test connectivity between two hosts on different segments of a
network?
Network
33. A help desk technician is working with a customer to determine why a router
does
not use the configuration file stored in NVRAM when it boots. The technician
suspects that the configuration register has been changed. What command
should
the technician tell the customer to use to determine the router register setting?
show version
www.Cisco-Antworten.tk
Download