Sunteți pe pagina 1din 11

If you study these questions, you are guaranteed to pass the exam with ease.

Questions and Answers (Answers are in bold)

3) The maximum distance of a 10BaseT network is which of the following?

A. 100 meters

B. 500 meters

C. 1000 meters

D. 1500 meters

9) Which three of the following are true statements about connection-oriented sessions?

A. Any segments not acknowledged are dropped

B. The segments delivered are acknowledged back to the sender upon their reception

C. A manageable data flow is maintained in order to avoid congestion, overloading and


loss of any data

D. Segments are sequenced back into their proper order upon arrival at their
destination

14) Which layer is responsible for putting 1s and 0s into a logical group?

A. Data Link
B. Physical

C. Network

D. Transport

E. Application

F. Session

16) Which layer defines bit synchronization?

A. Application

B. Session

C. Transport

D. Session

E. Physical

F. Network

18) Which layer is responsible for routing through an internetwork?

A. Physical

B. Session
C. Transport

D. Application

E. Network

F. Data Link

20) Which layer is responsible for coordinating communication between systems?

A. Application

B. Session

C. Physical

D. Data Link

E. Network

F. Presentation

29) Which of the following is a characteristic of a switch, but not of a repeater?(1)

A. Switches forward packets based on the IPX or IP address in the frame

B. Switches forward packets based only on the IP address in the packet

C. Switches forward packets based on the MAC address in the frame

D. Switches forward packets based on the IP address in the frame

33) What is required to support full-duplex Ethernet? (choose 2)


A. Full-duplex NIC cards

B. Multiple paths between multiple stations on a link

C. Loopback and collision detection disabled

D. Automatic sensing operation by all connected stations

35) Choose the following that are benefits to segmenting with router.(choose all that apply)

A. Manageability

B. Flow Control

C. Multiple Active Paths

D. Explicit packet lifetime control

36) The benefits to segmenting with Bridges are which of the following?(choose all that apply)

A. Manageability

B. Reliability

C. Scalability

D. Datagram filtering

40) What is the default switching method for the Cisco 5000 series?(1)

A. Latency
B. Cut-through

C. Store-and-forward

D. Store-and-splice

51) Which port numbers are used by TCP and UDP to set up sessions with other hosts?(1)

A. 1-25

B. 6-17

C. 1023 and above

D. 6 and 17 respectively

52) Which protocol will send a message to routers if a network outage or congestion occurs?

A. ARP

B. IP

C. ICMP

D. TCP

, but UDP is connectionless

60) Which protocol gets a hardware address from a known IP address?(1)

A. ARP

B. RARP
C. ICMP

D. BootP

E. IP

F. TCP

66) What which of the following is an invalid host address using a netmask of 255.255.255.192

A. 10.1.1.1

B. 10.1.1.66

C. 10.1.1.127

D. 10.1.1.130

75) You have an IP address of 172.16.3.57 with an 11-bit subnet mask. What are the valid
hosts?(1)

A. 172.16.3.32 to 172.16.3.62

B. 172.16.3.33 to 172.16.3.62

C. 172.16.3.34 to 172.16.3.62

D. 172.16.3.57 to 172.16.3.62

96) Which is true regarding half duplex Ethernet operation?


A. Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast
Ethernet

B. With Half Duplex transmission logically circuits feed into a single cable creating a
situation similar to a one way bridge

C. Half duplex transmission between stations is achieved by using point to multipoint Ethernet
and Fast Ethernet

D. Half Duplex ethernet technology provides a transmit circuit connection wired directly to the
receiver circuit at the other end

204) What is Cisco's default encapsulation method on serial interfaces? (1)

A. ANSI

B. Q933a

53.privilledged mode 에서의 symbol 은? #

56.console terminal line 에서 password 를 cisco 로 하려면?

line console 0

login

password cisco

21) Which layer is responsible for providing mechanisms for multiplexing upper-layer
application, session establishment, and tear down of virtual circuits?
A. Network
B. Physical
C. Application
D. Session
E. Transport
F. Presentation
28) The two sublayers of the IEEE Data Link Layer are which of the following?(1)
A. Data Link and MAC
B. Data Link and LLC
C. Logical Link Control and Media Access Control
D. Link and Logical Control
31) How does the cut-through switching technique work?(1)
A. The LAN switch copies the entire frame into its onboard buffers and then looks up the
destination address in its forwarding, or switching, table and determines the outgoing
interface
B. The switch waits only for the header to be received before it checks the destination
address and starts forwarding the packets
C. By using broadcast address as source addresses
D. By using a Class I repeater in a collision domain

32) How does a switch use store and forward?(1)


A. The switch waits only for the header to be received before it checks the destination
address and starts forwarding the packets
B. The LAN switch copies the entire frame into its onboard buffers and then looks up
the destination address in its forwarding, or switching, table and determines the
outgoing interface
C. By using a Class I repeater in a collision domain
D. By using broadcast addresses as source addresses
33) What is required to support full-duplex Ethernet? (choose 2)
A. Full-duplex NIC cards
B. Multiple paths between multiple stations on a link
C. Loopback and collision detection disabled
D. Automatic sensing operation by all connected

36) The benefits to segmenting with Bridges are which of the following?(choose all that apply)
A. Manageability
B. Reliability
C. Scalability
D. Datagram filtering

41) Which is true regarding store-and-forward switching method?(1)


A. It is default for all Cisco switches
B. It only reads the destination hardware address before forwarding the frame
C. Latency varies depending on frame-length
D. Latency is constant51) Which port numbers are used by TCP and UDP to set up sessions
with other hosts?(1)
A. 1-25
B. 6-17
C. 1023 and above
D. 6 and 17 respectively
60) Which protocol gets a hardware address from a known IP address?(1)
A. ARP
B. RARP
C. ICMP
D. BootP
E. IP
F. TCP
75) You have an IP address of 172.16.3.57 with an 11-bit subnet mask. What are the valid
hosts?(1)
A. 172.16.3.32 to 172.16.3.62
B. 172.16.3.33 to 172.16.3.62
C. 172.16.3.34 to 172.16.3.62
D. 172.16.3.57 to 172.16.3.62
82) What is the command to copy the configuration from NVRAM to RAM?
A. copy flash start
B. copy running-config startup-config
C. copy startup-config running-config
D. wr mem
91) What command do you type to change the enable password to Cisco?(1)
A. Config t, enable secret Cisco
B. Config t, line con 0, login, password Cisco
C. Config t, enable password Cisco
D. config t, line vty 0 4, login, password Cisco
217) What three occurrences will reset the holddown timer after a triggered update?
A. HD Timer expires
B. Infinity is finally defined as some max number
C. Another update is received indicating net status changed
D. Another update is received indicating a better metric
E. The router receives a processing task proportional to the number of links in the
internetwork
F. The router detects fault LSP's propagating through the internetwork

177) Which access list configuration allows only traffic from network 172.17.0.0 to
enter int s0?(1)
A. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-group 10 out
B. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-group 10 in
C. Access-group 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-list 10 out
D. Access-list 10 permit 172.17.0.0 0.0.255.255, int s0, ip access-list 10 in
16. 10BaseT 에서 Base 가 의미하는 것은? 5지 선다형.
a. signaling type -
b. spectrum type
c. ?
28.두 부서에서 여러 서버를 사용하고 있는데 secure 를 강화할 필요가 생겼는데
어떤 조치를 취하면 되나?
a. Repeater 로 랜을 세크먼트한다.
b. Switch 로 랜을 세크먼트한다.
c. Router 로 랜을 세크먼트한다.
d. ?
34.bridge로 network segment하는 목적 두개는?
a. reduce collision --->
b. add collision domains --->
c. increase collision 헷갈리게 하는 예문입니다.속지마세요.
d. reduce collision domains
45.회사에서 직원을 고용하는데 이직원은 집에서 작업하려하고 이때 많은량의 데이타
를 회사로 보내고자 한다. (he needs to use big clent-server aplications and
send large amount of data to company)
이때 cost/benefit 측면에서 어떻게 연결하는 것이 가장 좋은가?
a. isdn --->
b. token ring
c. dedicated lan
d?

56.console terminal line에서 password를 cisco로 하려면?


a. line console 0 --->
login
password cisco
요문제는 트릭이 있다.문제와 예문에 대소문자로 적혀있다.
b. line console 0 정답은 문제에 있는 그대로 적혀있는 것이다.예문을 찬찬히 읽
login 고 대소문자 구별하도록 하자.
password CISCO

63.sh version을 했을 때 보이는 화면이 나타나고 무슨 명령어를 사용했을 때 보이는


것인지 묻는다 (주관식 )
sh version

Layer3

Copyright © 1999 by Layer 3, Inc., All rights reserved.

Revised:

S-ar putea să vă placă și