Part - 56 CCNA Interview
part - 56 CCNA Interview Questions and Answers
426 Which of the following are examples of ICMP?
A.) Traceroute
B.) Web Browsing
C.) Ping
D.) Telnet
E.) Destination Unreachable message from a router
F.) Inverse Tunnels
Ans A C E
Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are generated by a router when it does not have a route to the network.
427 Novell NetWare has an Ethernet frame type called Ethernet_SNAP. What is the matching Cisco command line keyword for this encapsulation method?
A.) arpa
B.) sap
C.) snap
D.) gns
E.) dix
F.) novell-ether
Ans C
Novell 802.2 = sap (contains 802.2 LLC headers) Novell 802.3 = novell-ether (NetWare proprietary) Ethernet_II = arpa (the Internet standard) snap = snap (field type set to 'AA')
428 Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address?
A.) 0000
B.) 1
C.) 3456
D.) 1ace
E.) 0000.0c12.3456
F.) 1aceb0b
Ans F
IPX addresses are 80 bits total: The first section of the address is the network portion, the last 3 groups of numbers are the host.
429 In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as?
A.) Psychic
B.) ESP
C.) Inverse ARP
D.) Hello
E.) Reverse ARP
F.) Autosense
Ans F
Autosense allows the router to determine which LMI type the frame relay switch is using. Options include CISCO, ANSI, and Q933A.
430 What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait.
A.) Full-Duplex
B.) Dual-Duplex
C.) Half-Duplex
D.) Latex
E.) Quarter-Duplex
F.) Suplex
Ans C
Half-Duplex is like a one-lane bridge. If one car is going over the bridge, all other cars must wait on the other side before crossing
431 Which of the following are examples of the Application Layer?
A.) LLC
B.) Token Ring
C.) Spreadsheet
D.) TCP
E.) IP
F.) Word Processor
Ans C F
Pretty much any end-user program is an example of the Application Layer.
432 Which technologies listed below help prevent network loops in a switched (bridged) environment?
A.) Store-and-Forward
B.) IEEE 802.1d
C.) Diikjstra Algorithm
D.) Cut-Through
E.) Spanning Tree Protocol
F.) Routing
Ans B E
The Spanning Tree Protocol (STP) eliminates loops by disabling the port(s) that are causing the bridging loop. This is also called putting a port into 'blocking' mode. The industry standard for STP is IEEE 802.1d
433 Which OSI Reference Layer controls end-to-end (host to host) communication?
A.) Transport
B.) Physical
C.) Datalink
D.) Network
E.) Session
Ans A
The Session layer controls a conversation between applications. The Transport layer controls communications between hosts.
434 What is the first step in data encapsulation?
A.) User information is converted into data.
B.) Frames are put into bits.
C.) Data is converted into segments.
D.) Segments are converted into datagrams and packets.
E.) Packets are put into logical frame.
Ans A
The Five steps to data encapsulation (IN ORDER): 1) User information is converted into data. 2) Data is converted into segments. 3) Segments are converted into datagrams and packets. 4) Packets are put into logical frame. 5) Frames are put into bits.
435 We know that TCP provides connection oriented services, what else does it provide?
A.) FECN & BECN
B.) Path discovery.
C.) Flow control and error checking.
D.) Name resolution.
E.) File manipulation.
Ans C
The transmission control protocol uses acknowledgements and windowing to handle flow control and error checking.
436 With distance vector routing protocols, it is never useful to send the same routing update packet back out the same interface that it was learned. This concept is called what?
A.) Holddown timers
B.) Poison Reverse
C.) Count to infinity
D.) Split Horizon
E.) Link State
Ans D
Split horizon is the concept of: 'Don't tell me what I just told you.'
437 Which of the following are ways to provide login access to a router?
A.) HTTP
B.) Console
C.) Telnet
D.) Aux Port
E.) SNMP
F.) LLC
Ans A B C D
You can connect via Aux, Console, Telnet, or HTTP to a Cisco router. SNMP can support Community (password protected) SET and PUT commands, but you can not issue a command line interface command with it.
438 What two types of PPP data compression are available using Cisco IOS?
A.) Predictor
B.) DoubleSpace
C.) Stacker
D.) PAP
E.) ZIP
F.) CHAP
Ans A C
Stacker and predictor have similar compression rates. Stacker uses more CPU, while predictor uses more RAM.
439 In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII?
A.) Presentation
B.) Application
C.) Transport
D.) Session
E.) Datalink
F.) Network
Ans A
The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG. Encryption can also occur at this layer.
440 Which of the following are examples of the Transport Layer?
A.) SQL
B.) UDP
C.) IP
D.) LLC
E.) ARP
Ans B
TCP is connection oriented. UDP is connectionless.
441 Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent?
A.) Escape sequence to exit the menu.
B.) Nothing, just part of the banner.
C.) Tic Tac Toe Macro.
D.) Delimiting Character
E.) Message border character.
F.) Number of times message to be displayed.
Ans D
Delimiting characters allow you to have a message the is more than one line. You simply type as many lines as you want, ending with the delimiting (terminating) character.
442 There is a process in Frame-Relay where LMI resolves an IP address from a DLCI number. What is this called?
A.) arp
B.) inverse arp
C.) rarp
D.) automap
E.) reverse arp
F.) arp
Ans B
Inverse Arp maps the Local DLCI number to the remote IP address. Inverse Arp is a function of LMI.
443 When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer?
A.) The T1 line.
B.) LAN
C.) The Router
D.) DTE
E.) PC's
F.) CO
Ans A F
The Central Office is the where phone people work. The Telco maintains ownership of its physical wiring, and leases their use to their customers.
444 You want to segment a network. The network is running SNA and Netbios. Which device should NOT be used to segment the network?
A.) A store and forward switch.
B.) A router.
C.) A Catalyst 5000.
D.) A cut-through switch.
E.) A bridge.
Ans B
SNA and Netbios are non-routable, you should bridge them. The most correct answer for this question is 'A Router.' The purpose here is to recognize that Layer 2 protocols can not be routed. However, there are ways to turn a non-routable protocol into a routable protocol via a protocol gateway, DLSW+, RSRB and other technologies.
445 Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link.
A.) RFC 1661
B.) High Level Datalink Protocol (HDLC)
C.) Challenge Handshake Authentication Protocol (CHAP)
D.) SS7
E.) Link Control Protocol (LCP) Ans E LCP negotiates many of the PPP settings during call setup.
446 Which of the following is an example of the Physical Layer?
A.) SQL
B.) IP
C.) LLC
D.) Token Ring
E.) FDDI
F.) TCP
Ans D E
FDDI, Token Ring and Ethernet are all physical layer framing standards.
447 Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features?
A.) Call waiting
B.) Compression
C.) ADSL
D.) 1.544 Mbps
E.) Call screening
F.) Negative 'G' support
Ans B E
Caller ID is part of ISDN and you can screen calls based on it. Cisco can compress with Stacker or Predictor.
448 The Network layer works with which of the following:
A.) Globules
B.) Bits
C.) Packets
D.) Segments
E.) Frames
Ans C
Physical - bits Datalink - frames Network - packets
449 An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do?
A.) Records the number of times that a packet matches the list.
B.) Return a message to user who is denied access the by list.
C.) Notifies an SNMP Agent.
D.) Saves the log to NVRAM.
E.) Send an SNMP Trap.
Ans A
It will record to the log. By default a Cisco router logs to RAM and can display the offense to the console, which is not recommended. It is suggested that you log to a syslog server, for less router
CPU impact.
450 Which is not a common problem with Distance-Vector routing?
A.) Slow convergence.
B.) Complex configuration.
C.) Routing loops.
D.) Periodic updates can slow convergence.
E.) Counting to infinity.
Ans B
Easy Config: Router(config)#router rip Router(config-router)#network 10.0.0.0 Router(config-router)# That’s it! (Remember that the network is followed by the CLASSFUL address.)
Complete Cisco Exams with Codes
Cheapest predictive dialer for callcenter power dial
For best quotes, pricing and other details mail me asap at powerdial.hyd@gmail.com
Vivaan Kumar
http://powerdial.blogspot.com/
Cheapest Predictive Dialer power Dial
cheap pd power dial
predictive dialer
predictive dialer for callcenter with less investment power dial
predictive dialer for callcenter with low price
predictive dialer form india
predictive dialer from hyderabad
power dial predictive dialer
Post a Comment