Need help: CCNA Quiz

Discussion in 'Windows Networking' started by Pablo, May 24, 2005.

  1. Pablo

    Pablo Guest

    Hi,

    I am studying for the CCNA certificate and would appreciate any help you can
    provide for this practice CCNA Quiz.

    Thanks


    Multiple Choice

    Identify the letter of the choice that best completes the statement or
    answers the question.

    1.
    A dual-ring topology is used by ____, which is a LAN standard for a
    100-Mbps token-passing network that is not using CAT 5 UTP cable.
    a. Ethernet c. Fiber Distributed Data Interface
    b. Fast Ethernet d. ATM



    2.
    In which type of topology is every node linked directly to every other
    node?
    a. Star c. Ring
    b. Bus d. Mesh


    3.
    Which type of topology uses overlapping rings of wireless communications?
    a. Cellular c. Bus
    b. Token-Ring d. Hybrid


    4.
    There are five key requirements of a scalable network. They are
    "reliability and availability", "responsiveness", "____", "adaptability",
    and "accessibility and security."
    a. unique c. speed
    b. efficiency d. data storage



    5.
    Access methods are those combined standards and ____ that define how data
    signaling will be placed on and moved through the physical layer of the
    network.
    a. rules c. FCC guidelines
    b. protocols d. services

    6.
    TCP/IP is a ____ protocol.
    a. lower level c. Layer 1
    b. upper level d. Layer 2

    7.
    ____ is a LAN transport protocol that was developed by Xerox Corporation in
    the early 1970s.
    a. FDDI c. Ethernet
    b. Token-Bus d. ATM

    8.
    The 10-Mbps Ethernet protocol is a ____ shared media protocol.
    a. half duplex c. phased duplex
    b. full duplex d. frequency duplex

    9.
    The IEEE ____ standard is the original Ethernet Frame type.
    a. 802.5 c. 802.7
    b. 802_II d. 802.3

    10.
    ____ is an access method, or protocol, that was originally developed by IBM
    in the 1970s to connect its mainframes and minicomputers.
    a. Ethernet c. ATM
    b. Token Ring d. DIX



    11.
    Layer 4's primary functions are to ____ the flow of information from source
    to destination, reliably and accurately.
    a. encrypt c. regulate
    b. compress d. none of the choices are correct



    12.
    When sending digital data out on a network, reliability is an issue.
    Reliability is basically a matter of numbering (sequencing) the data items,
    sending them out in order, and acknowledging them as they arrive. TCP
    numbers bytes and SPX numbers ____.
    a. bits c. frames
    b. megabytes d. packets



    13.
    Forward Acknowledgement involves sending an acknowledgement number ____ the
    last sequence number received to indicate that the sender and receiver are
    ready for that item.
    a. one larger than c. twice the value of
    b. one smaller than d. three times the value of



    14.
    A major repercussion of network congestion is that data is ____.
    a. compressed c. redirected
    b. discarded d. archived



    15.
    The networks ability to grow as the organization's requirements change with
    a minimum of disruption and loss of resources is known as ____.
    a. expandability c. upgradability
    b. scalability d. dynamic ability



    16.
    There are five key requirements to meet in designing networks. They are
    reliability, responsiveness, efficiency, accessibility, and ____.
    a. upgradability c. user-friendly interface
    b. scalability d. adaptability



    17.
    Designing a network to efficiently allocate resources often involves
    restricting unnecessary traffic to preserve ____ for the necessary traffic.
    a. processing power c. bandwidth
    b. memory d. disk space



    18.
    A properly designed network must have capabilities to support the
    industry-standard WAN technologies efficiently and with a reliable level of
    ____.
    a. security c. bandwidth
    b. availability d. memory



    19.
    Cisco recommends a ____-layer hierarchical model to define the data
    distribution process.
    a. two c. seven
    b. three d. four



    20.
    The hierarchical model includes the core layer, the ____ layer, and the
    access layer.
    a. processing c. distribution
    b. cached d. transport



    21.
    The ____ layer connects network segments, possibly representing departments
    or buildings, with core layer services.
    a. transport c. distribution
    b. access d. network



    22.
    In the past few years, LANs have evolved from ____-based networks to the
    higher-bandwidth switch-based environments.
    a. router c. MUX
    b. bridge d. hub



    23.
    Network ____ provide the vast majority of network services and resources,
    which include user authentication and network security, to name two.
    a. clients c. servers
    b. databases d. applications



    24.
    Servers can be divided into two categories: ____ servers and workgroup
    servers.
    a. enterprise c. tier
    b. local d. network centric



    25.
    The router configuration is stored in ____ and loaded into RAM as part of
    the router startup process.
    a. Non-Volatile Random Access Memory c. L1 cache
    b. Volatile RAM d. ROM



    26.
    If there is no configuration to load from NVRAM, the program will take the
    user to the ____ mode to start the configuration process.
    a. configuration c. self configuration
    b. manual install d. autoinstall



    27.
    The ____ command is short for enable.
    a. E c. EB
    b. EN d. ER



    28.
    The ____ refers to the network number where the subnet binary values are
    all zeros.
    a. ip net-zero c. ip net 255.255.255.255
    b. ip subnet-zero d. ip net-zero



    29.
    Which console command will not forward directed broadcasts?
    a. ip directed-broadcast c. no ip directed-broadcast
    b. null ip directed broadcast d. @no ip directed-broadcast



    30.
    If you make an error when attempting to reconfigure the router, you can
    restore from the last saved copy by running a ____ command.
    a. load c. reset
    b. reboot d. reload



    31.
    To configure an interface, we first go to ____ configuration mode and then
    we define the interface that we want to configure with a command such as
    "interface ethernet0" for the first Ethernet interface.
    a. local c. global
    b. remote d. advanced



    32.
    It is possible to assign additional ____ addresses to an interface by
    adding the secondary parameter to the entry.
    a. MAC c. IPX
    b. IP d. physical



    33.
    Examining the syntax below, which type of cable would you likely be using?

    interface Ethernet0

    ip address 192.168.1.100 255.255.255.0

    no ip directed-broadcast

    media-type 10BaseT
    a. Twisted Pair c. Coaxial
    b. Fiber d. STP



    34.
    Configuring a Token Ring interface is very similar to configuring an
    Ethernet interface, except that you must also set the ring speed, which
    amounts to choosing between 4 and ____ Mbps.
    a. 10 c. 100
    b. 8 d. 16



    35.
    ACLs are network ____ specific.
    a. protocol c. centric
    b. service d. none of the choices are correct



    36.
    ACLs are numbered or ____.
    a. mapped c. lettered
    b. linked d. named



    37.
    If an ACL is numbered, the number indicates the ____ used.
    a. service c. IP address
    b. frame type d. protocol



    38.
    There are two types of access lists: standard and ____.
    a. custom c. enhanced
    b. extended d. complex



    39.
    ____ is the special command used to apply an access list to an interface.
    a. Work group c. Domain group
    b. Access group d. Logical group



    40.
    Every access list is made up of one or more access list lines or
    statements. Each statement contains the permit or ____ command.
    a. pass c. deny
    b. restrict d. inhibit



    41.
    By default, ____ are wide open to any packets traveling in either
    direction.
    a. protocols c. services
    b. interfaces d. routers



    42.
    The word ____ is an ACL keyword that means all hosts in all networks.
    a. all c. global
    b. many d. any



    43.
    ACLs are processed in a ____ manner, meaning that the first statement is
    processed fully; if there is no match, then the next statement is processed
    until all statements are completed.
    a. top-down c. random
    b. bottom-up d. priority



    44.
    One of the more common LAN architectures currently in use is ____.
    a. Token Ring c. Banyan Vine
    b. Ethernet d. Windows for Workgroups



    45.
    To prevent two devices from transmitting at the same time on a shared
    medium, Ethernet 802.3 has defined the ____ access method.
    a. ATM c. CSMD/CA
    b. FDDI d. CSMA/CD



    46.
    The extent to which collisions are propagated is known as the collision
    ____.
    a. group c. frequency
    b. domain d. metric



    47.
    LAN ____ are highly flexible devices that play a crucial role in the
    success of today's modern network infrastructures.
    a. hubs c. switches
    b. concentrators d. gateways



    48.
    LAN switches are essentially multiport bridges that forward frames based on
    ____ addresses.
    a. MAC c. IPX
    b. IP d. SPX



    49.
    The process of learning and switching a packet based on its MAC address is
    referred to as Layer ____ switching.
    a. 1 c. 3
    b. 2 d. 4



    50.
    With Layer 3 switching, packets can be forwarded based not only on their
    Layer 2 addresses but also on their Layer 3 addresses. This added
    functionality is referred to as ____
    a. bridging c. routing
    b. switching d. forwarding



    51.
    Ports 20 and 21 are assigned for ____ services.
    a. Telnet c. HTTP
    b. FTP d. ICMP



    52.
    What port number is assigned to Web-type access?
    a. 80 c. 21
    b. 23 d. 99



    53.
    With Layer 4 and Layer 5 switching, the ability to make forwarding
    decisions based on port numbers can be of significant use to such
    applications as ____ and Quality of Service (QoS).
    a. accounting c. security
    b. Logs d. monitoring



    54.
    The ____ is the device that connects the customer's ISDN network with the
    CO ISDN Switch.
    a. Router c. Terminator
    b. switch d. NT1



    55.
    ____ series protocols Specify ISDN concepts and interfaces.
    a. I c. A
    b. J d. P



    56.
    Relative to DDR, only ____ traffic can reset the idle timer.
    a. not interesting c. interesting
    b. priority d. urgent



    57.
    Relative to DDR, there is an idle ____ placed on the link whenever
    interesting traffic is not sent.
    a. packet c. timer
    b. Bit d. byte



    58.
    The ISDN CO needs to have a unique identification number for each BRI B
    channel that it assigns to its customers. This identification number is
    referred to as a ____.
    a. PRID c. RIN
    b. SPID d. MAC



    59.
    The Frame Relay protocol was built without robust reliability and must
    therefore rely on ____-layer protocols and services to implement general
    reliability features such as error correction and flow control.
    a. lower c. middle
    b. upper d. physical



    60.
    The end-to-end Frame Relay link established between two CPEs is referred to
    as a ____ circuit.
    a. logical c. state ready
    b. physical d. virtual



    61.
    Frame Relay virtual circuits are identified by what's known as a ____.
    a. socket c. Service
    b. DLCI d. ISP



    62.
    All data packets transmitted on a VC contain a DLCI in the packets Frame
    Relay ____.
    a. header c. CRC field
    b. trailer d. buffer field



    63.
    LMI frames can contain one of two message types: status and status ____.
    a. notification c. inquiry
    b. polling d. queuing



    64.
    One way to accomplish this task of mapping remote routers to local DLCIs is
    to use Inverse ____.
    a. IP c. WINs
    b. MAC d. ARP


    1.
    Your trainee is configuring a router. In particular, he is examining a
    routing table that contains static, RIP, and IGRP routes for the same
    destination network with each set to its default administrative distance. He
    asks you which route will be used to forward data?
    a. The IGRP route c. The RIP route
    b. The static route d. All three will load balance.



    2.
    David, your XyzCorp trainee, asks you about basic characteristics of
    switches and hubs for network connectivity. What should you tell him?
    a. Switches take less time to process frames than hubs take.
    b. Switches do not forward broadcasts.
    c. Hubs can filter frames.
    d. Using hubs can increase the amount of bandwidth available to hosts.
    e. Switches increase the number of collision domains in the network.



    3.
    A technician are configuring a router named XyzCorp2. Why does she use
    passive-interface command?
    a. Allows a routing protocol to forward updates out an interface that is
    missing its IP address.
    b. Allows a router to send routing updates on an interface but not receive
    updates via that interface.
    c. Allows an interface to remain up without receiving keep alives.
    d. Allows a router to receive routing updates on an interface but not send
    updates via that interface.



    4.
    Your XyzCorp trainee Jack wants to display the configuration register
    setting on her router. Which command should she use?
    a. show register c. show boot
    b. show flash d. show version



    5.
    You work as network administrator/technician at XyzCorp. You are
    configuring Frame Relay on a Cisco router. What is the default LMI (Local
    Management Interface) frame type transmitted by the Cisco router on a Frame
    Relay circuit?
    a. Q933a
    b. B8ZS
    c. IETF
    d. Cisco
    e. ANSI



    6.
    You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at
    XyzCorp wants to know how many usable sub networks and usable host addresses
    per subnet this would provide. What should you tell her?
    a. 1 network with 254 hosts c. 4 networks with 64 hosts
    b. 2 networks with 128 hosts d. 6 networks with 30 hosts



    7.
    XyzCorp , a fast growing company with one central headquarters site and 3
    regional offices, is looking for a scalable WAN technology. Current plans
    include adding an additional 7 regional offices with all sites requiring
    continuous connectivity. The current HQ router has no free ports. Which of
    the following WAN technologies would meet XyzCorp's requirements?
    a. Dedicated PPP/HDLC links c. ISDN-BRI
    b. Frame Relay d. ADSL



    8.
    You work as a network technician at XyzCorp. You are configuring a E0
    interface connected to the 192.168.1.8/29 LAN on a Cisco router. You apply
    the following access list to the interface. access-list 123 deny tcp
    192.168.1.8 0.0.0.7 eq 20 any access list 123 deny tcp 192.168.1.8 0.0.0.7
    eq 21 any What consequence will this access list have?
    a. All traffic will be allowed to exit E0 except FTP traffic.
    b. FTP traffic from 192.168.1.22 to any host will be denied.
    c. FTP traffic from 192.168.1.9 to any host will be denied.
    d. All traffic exiting E0 will be denied.



    9.
    As a network technician at XyzCorp you are configuring access lists on an
    interface of a Cisco router. You use multiple access lists. Which of the
    following statements are valid? (Select one)
    a. There is no limit to the number of access lists that can be applied to an
    interface, as long as they are applied in order from most specific to most
    general.
    b. Cisco IOS allows only one access list to be applied to an interface.
    c. One access list may be configured per direction for each Layer 3 protocol
    configured on an interface.
    d. No more than two access lists can be applied to a single interface.



    10.
    Roger is setting up WAN connectivity between the XyzCorp New York and the
    XyzCorp Tokyo offices. He uses a uses two data link layer encapsulations,
    one for data and one for signaling. Which WAN Service does he use?
    a. ISDN c. ATM
    b. Frame Relay d. FDDI



    11.
    You have segmented a network into two separate segments, segment 1 and
    segment2, with a Cisco router. Your boss at XyzCorp is concerned about the
    cost, and wants to what the purpose of your action

    is. What should you tell him?
    a. It increases the number of collisions.
    b. It decreases the number of broadcast domains.
    c. It connects segment 1's broadcasts to segment 2.
    d. It prevents segment 1's broadcasts from getting to segment 2.



    12.
    Your XyzCorp trainee Bob wants some information regarding the split horizon
    rule. What should you tell him?
    a. Only routers can split boundaries (horizons) between concentric networks.
    b. All distance vector protocols require fall back routes that may cause
    momentary loops as the topology changes.
    c. Networks can only remain fully converged if all information about routes
    is sent out all active interfaces.
    d. Information about a route should not be sent back in the direction from
    which the original update came.



    13.
    You are working as a network technician at XyzCorp. You are required to
    troubleshooting the WAN link between the XyzCorp main office at Boston and
    the XyzCorp remote office at Rio De Janeiro. A Cisco router that was
    providing Frame Relay connectivity at the Rio de Janeiro site as replaced
    with a different vendor's frame relay router. Connectivity is now down
    between the Boston and Rio De Janeiro site. What is the most likely cause of
    the problem?
    a. Mismatched LMI types. c. Mismatched encapsulation types.
    b. Incorrect DLCI. d. Incorrect IP address mapping.



    14.
    You work as a network technician at XyzCorp. You have subnetted the
    213.105.72.0 network with a /28 mask. Your boss asks you how many usable sub
    networks and usable host addresses per subnet this will provide. What should
    you tell her?
    a. 62 networks and 2 hosts c. 16 networks and 16 hosts
    b. 6 networks and 30 hosts d. 14 networks and 14 hosts



    15.
    You work as a network technician at XyzCorp. You have subnetted the
    201.105.13.0 network with a /26 mask. Your boss asks you how many usable sub
    networks and usable host addresses per subnet this will provide. What should
    you tell her?
    a. 64 networks and 4 hosts c. 2 networks and 62 hosts
    b. 4 networks and 64 hosts d. 62 networks and 2 hosts



    16.
    Your XyzCorp trainee Fernando is studying the spanning three algorithm. He
    asks you how the spanning-tree path cost is determined by default. What
    should you tell him?
    a. Total hop count. c. Dynamically determined based on load.
    b. Sum of the costs based on bandwidth. d. Individual link cost based on
    latency.



    17.
    You work as a network technician at XyzCorp. You are required to establish
    a Telnet session with a Cisco router. Which commands should you use?
    a. XyzCorp1(config)# line console 0
    b. XyzCorp1(config)# line console 0

    CE. XyzCorp1(config)# line vty 0
    c. You work as a network technician at XyzCorp. You are required to
    establish a Telnet session with a Cisco router. Which commands should you
    use?
    d. XyzCorp1(config)# line vty 0



    18.
    You work as a network consultant. You are planning a network installation
    for a large organization named XyzCorp. The design requires 100 separate sub
    networks, so XyzCorp has acquired a Class B network address. What subnet
    mask will provide the 100 sub networks required, if 500 usable host
    addresses are required per subnet?
    a. 255.255.240.0 c. 255.255.252.0
    b. 255.255.246.0 d. 255.255.254.0



    19.
    What feature of a networks switch allows an administrative to create
    separate broadcast domains?
    a. Store-and-forward switching
    b. Transparent bridging

    C Fragment-free switching
    c. What feature of a networks switch allows an administrative to create
    separate broadcast domains?
    d. Virtual LANs



    20.
    New switches have been purchased for a network upgrade. The objective for
    the network design emphasizes efficient, error-free transport instead of
    fast transport. Which switching mode should be configured on the new
    switches to provide error-free transport to the network?
    a. cut-through c. frame-filtering
    b. fragment-free d. store-and-forward



    21.
    A technician at XyzCorp needs to update the network documentation. One of
    the tasks includes documenting the name of the IOS image file of each router
    in the network. Which commands could be used to find this information?
    a. Router# show protocols c. Router# show image
    b. Router# show version d. Router# show IOS



    22.
    Which statement describes the rule of split horizon?
    a. Only routers can split boundaries (horizons) between concentric networks.
    b. All distance vector protocols require fall back routers that may cause
    momentary loops as the topology changes.
    c. Networks can only remain fully converged if all information about routers
    is sent out all active interfaces.
    d. Information about a route should not be sent back in the direction from
    which the original update come.



    23.
    A user types the command ping 204.211.38.52 during a router console
    session. What does this command use to test connectivity between the two
    devices?
    a. ICMP echo request
    b. Information request
    c. Timestamp reply
    d. Redirect
    e. Source quench



    24.
    An administrator must assign static IP addresses to the servers in the
    network. For network 192.168.20.24/29 the router is assigned the first
    usable host address while the sales server is given the last usable host
    address. Which of the following should be entered into the IP properties box
    for the sales server?
    a. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway:
    192.168.20.9
    b. IP address: 192.168.20.30 Subnet Mask 255.255.255.248 Default Gateway:
    192.168.20.25
    c. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway:
    192.168.20.17
    d. IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway:
    192.168.20.25



    25.
    Which of the following options is NOT negotiated using LCP during the PPP
    link establishment?
    a. callback c. CHAP
    b. IPCP d. multilink



    26.
    Your XyzCorp trainee Bob asks you what 11111000 binary is in decimal. What
    should you tell him?
    a. 5 c. 224
    b. 192 d. 248



    27.
    You are working as network administrator/technician at XyzCorp Inc. While
    troubleshooting a network connectivity problem, you observe steady link
    lights on both the workstation NIC and the switch port to which the
    workstation is connected. However, when the ping command is issued from the
    workstation, the output message "Request timed out" is displayed. At which
    layer of the OSI model does the problem most likely exist?
    a. The session layer c. The data link layer
    b. The protocol layer d. The network layer
     
    Pablo, May 24, 2005
    #1
    1. Advertisements

  2. Statistically speaking, "B" is usually the correct answer. But if you want
    to be sure you should probably study the course materials until you are
    confident you can correctly answer the questions.

    --
    Richard G. Harper [MVP Shell/User]
    * PLEASE post all messages and replies in the newsgroups
    * for the benefit of all. Private mail is usually not replied to.
    * My website, such as it is ... http://rgharper.mvps.org/
    * HELP us help YOU ... http://www.dts-l.org/goodpost.htm
     
    Richard G. Harper, May 25, 2005
    #2
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.