Sunteți pe pagina 1din 7

1. What is an advantage to LAN segmentation?

A. Provides multiprotocol support B. Decreases security


C. Decreases broadcasts
D. Increases broadcasts
Answer: C
LAN segmentation decreases broadcast propagation to all segments.

2. What are the valid ways to segment a LAN? (Choose all that apply)
A. Repeater B. Bridge
C. Switch
D. Router
Answer: B, C, D
Repeaters do not segment the network, but rather extend the distance a LAN can
run.

3. What does a bridge use to segment a network?


A. IP Addresses
B. Broadcasts C. Application data
D. Media Access Control addresses
Answer: D
Bridges can only read frames and filters by MAC (hardware) address.

4. What is a disadvantage to using bridges in your network?


A. Filters by MAC address

B. Stops broadcast storms


C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
Answer: C
Even though the 5-4-3 rule specifies you can only have 4 bridges in a network,
that is not really a disadvantage. The disadvantage to bridging is that it filters by
MAC address and cannot create separate
networks like a router can. This means that if a broadcast storm was to take
place a bridge will forward the
frames.

5. What is an advantage of using routers in your network? (Choose all that apply)

A. Stops broadcast storms


B. Reduces downtime on your network C. Creates internetworks
D. Can filter by logical address
Answer: A, C, D
Routers can stop broadcast storms, create smaller networks and filter by logical
(IP) addresses.

6. Which device can create smaller networks and stop broadcast storms by
default?
A. Repeater
B. Bridge
C. Router D. Gateway

Answer: C
Routers can create internetworks and filter by logical address (IP) address, which
can stop broadcast storms.

7. What is an advantage to using switches in your network?


A. Addressing of hosts by DHCP
B. Ease of administration
C. Stops broadcast storms D. Works like a repeater

Answer: B
Switches filter by MAC address and, by default, are typically easy to
administrate. B is the "best" answer.

8. When is Frame Tagging used?


A. When you install repeaters in your network
B. When you install bridges in your network C. When you install routers in your
network
D. When you use Switches configured with multiple VLANS
Answer: D
Frame tagging is used to uniquely identify a frame as it traverses the switch
fabric on a VLAN.

9. Which STP state prevents the use of looped paths?


A. Blocking
B. Listening
C. Learning D. Forwarding
Answer: A

The purpose of the blocking state is to prevent the use of looped paths. A port in
listening state prepares to
forward data frames without populating the MAC address table. A port in learning
state populates the MAC address table but doesn't forward data frames. The
forwarding port sends and receives all data frames on
the bridged port. Lastly, A port in the disabled state is virtually nonoperational.

10. Which STP state populates the MAC address table but doesn't forward data
frames?
A. Blocking
B. Listening C. Learning
D. Forwarding
Answer: C
The purpose of the blocking state is to prevent the use of looped paths. A port in
listening state prepares to forward data frames without populating the MAC
address table. A port in learning state populates the MAC
address table but doesn't forward data frames. The forwarding port sends and
receives all data frames on
the bridged port. Lastly, A port in the disabled state is virtually nonoperational.

11. If a frame is received at a switch and only the destination hardware address
is read before the frame is forwarded, what type of switching method are you
using?
A. fast-switch
B. VLSM C. Store and forward
D. cut-through
E. in-out
Answer: D
The cut-through switching method, only the destination hardware address is read
before forwarding the frame.

12. Which is true regarding Store-and-forward switching method?


A. Only reads the destination hardware address before forwarding the frame B.
Latency varies depending on frame length
C. Default for all Cisco switches D. Latency is constant
Answer: B
The store and forward LAN switch will receive the entire frame, run a CRC, before
forwarding the frame out the destination port. Latency through store-and-forward
switches varies depending on frame length.

13. Which of the following describes a full-duplex transmission?


A. Uses a single cable
B. Uses a point-to-point connection when only two hosts are present
C. Data transmission in only both directions, but only one way at a time D. Data
transmission in only one direction
Answer: B
Full-duplex transmission uses a point-to-point connection from the transmitter of
the transmitting station to the receiver of the receiving station. Host to host
means dedicated transmit to receiving pair as well as receiving to transmit pair

14. Choose three reasons why the networking industry uses a layered model. (Choose 3)
A. Allow changes in one layer to occur without changing other layers B. To get Gigabit
speeds on LANs
C. Clarify what general functions is to be done rather than how to do it
D. To create filter tables on LANs E. Order network troubleshooting steps
Answer: A, C, E
The reasons to use a layer model is:
- 1 Clarify what general functions is to be done rather than how to do it - 2 Reduce the
complexity of networking into more manageable sublayers
- 3 Enable interoperability using standard interfaces
- 4 Allow changes in one layer to occur without changing other layers - 5 Speed up
network industry progress by allowing specialization
- 6 Allow for shortcut explanations to facilitate protocol comparisons - 7 Order network
troubleshooting steps
- 8 Facilitate systematic troubleshooting
15. Why should you use a reference model when creating a network application?
A. To specify gigabit LAN speeds B. Enable interoperability using standard interfaces
C. Allow for shortcut explanations to facilitate protocol comparisons
D. To specify applications at any layer of the OSI model as needed
Answer: B, C
The reasons to use a layer model is:
- 1 Clarify what general functions is to be done rather than how to do it
- 2 Reduce the complexity of networking into more manageable sublayers - 3 Enable
interoperability using standard interfaces
- 4 Allow changes in one layer to occur without changing other layers - 5 Speed up
network industry progress by allowing specialization
- 6 Allow for shortcut explanations to facilitate protocol comparisons
- 7 Order network troubleshooting steps - 8 Facilitate systematic troubleshooting

16. Which of the following describe the steps of data encapsulation?


A. User information is converted to data, data to segments, segments to packets or
datagrams, packets to
frames, and frames converted to bits.

B. Data is converted to frames, segments to packets or datagrams, packets


to segments, and frames to bits,
then bits to data C. Frames are converted to bits, bits to segments, segments
to packets or datagrams, packets or datagrams
to data
D. Data is converted to packets, packets to segments, segments to
datagrams, datagrams to frames. Frames are then converted to bits.
Answer: A
Encapsulation describes the conversion of data for use at each layer. The
order of conversion is: User
information is converted to data, data to segments, segments to packets or
datagrams, packets to frames, and frames to bits.

17. Describe data encapsulation.


A. Headers applied to a frame B. Frame types use in Cisco interfaces
C. The method of changing user data into a usable format to transmit on a
network
D. Changing bits into packets
Answer: C
The five encapsulation methods are:
1 User information is converted to data.
2 Data is converted to segments. 3 Segments are converted to packets or
datagrams.
4 Packets or datagrams are converted to frames. 5 Frames are converted to
bits.
18. What uses a connection-less protocol at the Transport layer?
A. IP
B. ARP C. TCP
D. TCP/IP
E. Darpa F. UDP
G. ICMP
Answer: F
User Datagram Protocol (UDP) is a connection-less protocol that resides at
the Transport layer

19. What protocols from the DOD stack reside at the Host-to-Host layer?
(Choose all that apply)
A. IP
B. Darpa C. TCP
D. UDP
E. 802.3 F. 802.2
Answer: C, D
TCP and UDP are the only protocols specified at the Host-to-host layer of the
DOD stack

20. Which STP state prepares to forward data frames without populating the
MAC address table?
A. Blocking B. Listening
C. Learning
D. Forwarding
Answer: B
The purpose of the blocking state is to prevent the use of looped paths. A
port in listening state prepares to forward data frames without populating
the MAC address table. A port in learning state populates the MAC address
table but doesn't forward data frames. The forwarding port sends and
receives all data frames on the bridged port. Lastly, A port in the disabled
state is virtually nonoperational.

21. What protocol is used to resolve a hardware address given the IP


address?
A. RARP B. IP
C. Darpa
D. ICMP E. ARP
F. TCP
G. UDP
Answer: E
Address Resolution Protocol is used to find a hardware address from an IP
address

22. What is a connection-less protocol at the Internet layer?


A. ARP B. RARP
C. TCP D. UDP
E. IP
F. ICMP G. BootP
Answer: E
Internet Protocol is a connection-less protocol that resides at the Internet
layer of the DOD stack and addresses hosts.
23. What protocol sends redirects back to an originating router?
A. IP
B. ARP
C. BootP D. ICMP
E. TCP
Answer: D
ICMP redirects occur when a router determines the next hop is on the same
network the packet originated from. ICMP unreachable messages are
returned when a service or host is not available.

24. When would a router receive an ICMP unreachable message?


A. When IP is not loaded on the transmitting device B. When a service or host
is not available
C. When ARP broadcasts are not available
D. When BootP can't find a hardware address
Answer: B
ICMP redirects occur when a router determines the next hop is on the same
network the packet originated from. ICMP unreachable messages are
returned when a service or host is not available.

25. What is the IP extended access-list range?


A. 1-99
B. 100-199
C. 200-299 D. 300-399
Answer: B
Extended access-list must fall in the range between 100 and 199.

26. Which of the following is a valid extended IP access-list?


A. access-list 101 permit icmp 172.16.30.0 any eq 21 log B. access-list 101
permit ip 172.16.30.0 any tcp eq 21 log
C. access-list 101 permit ip 172.16.30.0 any eq 21 log D. access-list 10
permit ip 172.16.30.0 any eq ftp
Answer: C
A is wrong because you cannot filter by port number when specifying icmp. B
is wrong because it has the parameters in the wrong place. D is wrong
because it specifies a standard access list.

27. Which STP state sends and receives all data frames on the bridged port?
A. Blocking
B. Listening
C. Learning D. Forwarding
Answer: D
The purpose of the blocking state is to prevent the use of looped paths. A
port in listening state prepares to forward data frames without populating
the MAC address table. A port in learning state populates the MAC address
table but doesn't forward data frames. The forwarding port sends and
receives all data frames on the bridged port. Lastly, A port in the disabled
state is virtually nonoperational.

28. What authentication methods can be used by PPP?


(choose 2)
A. STP B. CHAP
C. PAP

D. SLIP
Answer: B, C
PPP can be configured to use either PAP or CHAP or both.

29. What are three ways to monitor IP access lists?


A. sh int
B. sh ip interface
C. sh ip access-lists D. sh run
E. sh access-lists all
Answer: B, C, D The way to monitor IP access lists is either show ip interface
or show access-lists.

30. You have multiple devices connected to a switch at 10Mbps half-duplex.


A server is also connected to this switch. How much bandwidth does each
device have to the server?
A. 1Mbps B. 2Mbps
C. 10Mbps D. Amount of devices divided by 10Mbps
Answer: C
Each device has a dedicated connection running 10Mbps. If the devices were
connected to a hub, then they
would all have to share the bandwidth.

31. Which of the following is true regarding layer-2 switches?


A. A switch is a hub with more ports
B. A switch is a multi-port bridge
C. Switches learn IP address from each frame and filter the network using
these addresses D. Switches learn MAC addresses by examining the source
address of each frame
Answer: B, D
A switch is really just a multi-port bridge with more intelligence. Switches
(and bridges) build their filter table by examining the source MAC address of
each frame.

S-ar putea să vă placă și