450 Which is not a common problem with Distance-Vector routing?
A.) Slow convergence.
B.) Complex configuration.
C.) Routing loops.
D.) Periodic updates can slow convergence.
E.) Counting to infinity.
Ans B
Easy Config: Router(config)#router rip Router(config-router)#network 10.0.0.0 Router(config-router)# That’s it! (Remember that the network is followed by the CLASSFUL address.)
451 Which routing protocols uses connection-oriented routing updates?
A.) IGRP
B.) UDP
C.) RIP
D.) IP
E.) BGP
Ans E
Sybex (Border Gateway Protocol) uses TCP to reliably deliver its routing updates.
452 At which layer of the OSI Reference Model do bridges operate?
A.) Physcial
B.) Session
C.) Datalink
D.) Transport
E.) Network
Ans C
Bridges and switches work at layer 2 and forward frames based on the MAC address. Repeaters work at the physical layer.
453 Where is the point between the customers site and the phone carrier that responsibility changes?
A.) CO
B.) Demarc
C.) DCE
D.) DTE
E.) CPE
Ans B
The DEMARCATION POINT (Demarc) in North America is between the customers CSU/DSU
and the Local Telco Office, because Americans own the DSU/CSU. Elsewhere in the world, the Demarc is between the Router and the CSU/DSU, because outside the USA the Telco owns the DSU/CSU.
454 Novell NetWare has an Ethernet frame type called Ethernet_802.2. What is the matching Cisco command line keyword for this encapsulation method?
A.) gns
B.) arpa
C.) snap
D.) sap
E.) novell-ether
F.) dix
Ans D
Novell 802.2 = sap (contains 802.2 LLC headers) Novell 802.3 = novell-ether (NetWare proprietary) Ethernet_II = arpa (the Internet standard) snap = snap (field type set to 'AA')
455 Which of the following is an example of the Physical Layer?
A.) TCP
B.) ARP
C.) IP
D.) FDDI
E.) LLC
F.) Fast Ethernet
Ans D F
FDDI, Token Ring and Ethernet are all physical layer framing standards.
456 Which of the following is true regarding standard ISDN BRI service?
A.) ISDN BRI B channels are typically 64K.
B.) ISDN BRI can handle only voice.
C.) ISDN BRI can handle only data.
D.) ISDN BRI has 2B and 1D channels.
E.) ISDN BRI D channels are 16K.
F.) ISDN BRI can handle voice and data.
Ans A D E F
2 64K B channels carry the data. 1 16K D channel is used for control. Note: In certain parts of the world, it is possible that the 'B' channels are only 56k each instead of 64k each.
457 In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this?
A.) Defining a Maximum.
B.) You can not solve the 'count to infinity' problem with a distance vector protocol.
C.) Poison Reverse.
D.) Triggered Updates.
E.) Split Horizon.
Ans A
The most direct solution to the count to infinity problem is to lower what infinity is. For RIP, the default maximum number of hops is 16. It takes a lot less time to count to 16 than infinity.
458 Which of the following are examples of the Network Layer?
A.) Token Ring
B.) LLC
C.) SQL
D.) IP
E.) TCP
F.) IPX
Ans D F
Other Network Layer protocols also include Appletalk and DECnet. TCP is considered to be at a higher Layer, because it provides guaranteed data delivery.
459 Which type of switching reads just the address portion of the frame and then immediately starts forwarding it?
A.) Cut-Through
B.) Store-and-Forward
C.) Tabling
D.) Routing
E.) Inverse ARP
F.) Fast Forward
Ans A
Cut-Through is fast, but it does not read the entire frame and perform any error checking before forwarding. This can result in forwarding errors, such as fragments.
460 Which feature of PPP (Point to Point Protocol) allows the router to bind multiple channels together, to form a single logical channel?
A.) multi-link ppp
B.) multi-channel ppp
C.) can't be done
D.) omni-ppp
E.) plp
Ans A
Multilink PPP binds separate physical lines into one logical line. This feature is especially useful for ISDN BRI, where you are provided 2 different circuits at 64k each (so you can bind them together for 128k).
461 Which of the following are solutions to the problems encountered with Distance-Vector routing?
A.) Defining a Maximum
B.) Poison Reverse
C.) Triggered Updates
D.) Shortest path first algorithm.
E.) Split Horizon
Ans A B C E
The Shortest Path First (SPF) algorithm is used only with Link-State protocols such as OSPF.
462 Classful routing protocols do not include subnet masks in their routing updates. Which of the following routing protocols are considered classful?
A.) EIGRP
B.) OSPF
C.) TCP
D.) IGRP
E.) RIP
F.) IP
Ans D E
IGRP & RIP do NOT includes the subnet mask in their routing updates. OSPF & EIGRP are classless routing protocols and DO INCLUDE the subnet mask in updates. TCP and IP are not routing protocols.
463 What is the standard ISDN term for a native ISDN telephone?
A.) ET
B.) TE1
C.) TE2
D.) LE
E.) TA
Ans B
Terminal Equipment 1 (TE1) understands what native digital ISDN is, and has built-in analog to digital converters.
464 PICT & JPEG are examples of what layer in the OSI seven layer model?
A.) Transport
B.) Presentation
C.) Application
D.) Datalink
E.) Network
F.) Session
Ans B
The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG. Encryption can also occur at this layer.
465 Which of the following is an example of the Session Layer?
A.) TCP
B.) SQL
C.) IP
D.) X-Windows
E.) Token Ring
F.) LLC
Ans B D
Netbios Names, SQL, NFS, X-Windows are examples of the Session layer.
466 Which global configuration command will tell the router to load the IOS file 'IOS_filename' from the Network File server at 1.2.3.4 during the next boot?
A.) boot system flash IOS_filename 1.2.3.4
B.) boot system tftp IOS_filename 1.2.3.4
C.) config-register 0x0 1.2.3.4
D.) boot system rom 1.2.3.4
E.) This can not be done, only the first file in flash can be used.
Ans B
Router(config)#boot system ? WORD TFTP filename or URL flash Boot from flash memory mop Boot from a Decnet MOP server rcp Boot from a server via rcp rom Boot from rom tftp Boot from a tftp server
467 At what layer of the OSI reference model does FRAME-RELAY map to?
A.) Session
B.) Physical
C.) Network
D.) Presentation
E.) Transport
F.) Datalink
Ans F
Remember, layer 2 deals with 'frames', and Frame-Relay is purely a layer 2 protocol.
468 X.25 is characterized by layer 2 identifiers, and what else?
A.) Virtual Lan's
B.) Session Layer
C.) Transport Layer
D.) Routing Updates
E.) PVC's
Ans E
Permanent Virtual Circuits and Layer 2 identifies are typical in X.25.
469 Which of the following is an example of the Network Layer?
A.) Token Ring
B.) RARP
C.) LLC
D.) DDP
E.) TCP
Ans B D
The following two are layer 3 protocols: DDP - Datagram Delivery Protocol. AppleTalk network layer protocol that is responsible for delivery of datagrams. RARP - Reverse Address Resolution Protocol. Protocol in the TCP/IP the allow a client to get assigned an IP address based on it's own MAC address.
470 What is an advantage of LAN segmentation?
A.) Increases broadcasts.
B.) Increases collisions.
C.) Provides more protocol support.
D.) Decreases broadcasts.
E.) Routing protocol support.
Ans D
Broadcast containment is a primary motive for LAN segmentation.
471 What does the User Datagram Protocol (UDP) provide?
A.) Connectionless datagram service.
B.) FECN & BECN
C.) Flow control and error checking.
D.) Name resolution.
E.) Path discovery.
Ans A
UDP is connectionless, and does not provide error checking. But remember, error checking can occur at other layers too.
472 Which OSI Reference Layer is concerned with logical addressing?
A.) Network
B.) Transport
C.) Datalink
D.) Physical
E.) Session
Ans A
Datalink is physical (hardware) addressing. Network is logical (software) addressing.
473 What layer can optionally support reliability?
A.) Transport
B.) IP
C.) Physical
D.) Network
E.) Sub-physical layer
Ans A
The Transport Layer: Segments upper-layer applications. Establishes an end-to-end connection. Sends segments from one end host to another. Optionally, ensures data reliability.
474 Which of the following is an example of the Datalink Layer?
A.) LLC
B.) TCP
C.) SQL
D.) IPX
E.) Token Ring
F.) MAC
Ans A F
MAC (media access control) and LLC (logical link control) are both layer 2 protocols.
475 What is the last step in data encapsulation?
A.) User information is converted into data.
B.) Segments are converted into datagrams and packets.
C.) Frames are put into bits.
D.) Data is converted into segments.
E.) Packets are put into logical frame.
Ans C
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits
476 Which switching technology can reduce the size of a broadcast domain?
A.) Cut-Through
B.) Store-and-Forward
C.) Spanning Tree Protocol
D.) RARP
E.) ARP
F.) VLAN
Ans F
VLAN's are logical ways to break up a large broadcast domain. To get from VLAN to VLAN you must have a router.
477 Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again.This is most directly an example of (pick the best answer only):
A.) Poison Reverse
B.) Connectionless protocol
C.) Windowing
D.) Connection oriented protocol
E.) Flow Control
F.) Split Horizon
Ans E
Flow control is when a station is being overloaded with data and tells the other station to stop for a while, so the receiving station can process the data that it has in its buffer.
478The Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) provides which of the following?
A.) 1.544 Mbps
B.) 23B + 1D Channel
C.) 24B + 1D Channel
D.) 2B + 1D Channel
E.) 23B + the Disney Channel
Ans D
Each B (Bearer) Data channel is 64K The D (Control) channel is 16K
479 Which layer manages protocol access to the Network layer?
A.) Datalink - MAC Sublayer
B.) Datalink - LLC Sublayer
C.) Transport
D.) Session
E.) Network
Ans B
Having two Datalink sublayers provides physical media independence. The MAC sublayer encapsulates to the Physical Layer. The LLC sublayer encapsulates to the Network Layer.
480Identify the command to display the IP routing table?
A.) show route
B.) show ip route
C.) show ip table route
D.) show ipx route
Ans B
481 Identify the command to display all the valid commands at the given mode?
A.) Help all
B.) Help
C.) All commands
D.) ?
Ans D
482Identify the keystroke used to terminate the setup mode?
A.) Ctrl-K
B.) Crtl-C
C.) Ctrl-Z
D.) Crtl-End
Ans B
483 Identify the command to display the IP host table?
A.) show ip hostnames
B.) show ip names
C.) show hosts
D.) show ip hosts
Ans C
484 Identify the command to display the configured IP routing protocols?
A.) show protocols
B.) show protocols all
C.) show routing-protocols
D.) show ip protocols ?
485 Identify the command to configure ALL the default VTY ports?
A.) Router(config)# line vty 0 4
B.) Router# line vty 0 4
C.) Router(config)# line vty
D.) Router(config)# line vty 0
Ans A
486 Identify the command to reload the router?
A.) Router(config)# reload
B.) Router# reset
C.) Router# reload
D.) Router> reload
Ans C
487 Identify command that configures 'Cisco1' as a secret password?
A.) Router(config)# enable secret password Cisco1
B.) Router(config)# enable secret cisco1
C.) Router(config)# enable password Cisco1
D.) Router(config)# enable secret Cisco1
Ans C
488 Identify the statement which connects access-list 101 inbound to interface e0?
A.) Router(config-if)# ip access-group 101 in
B.) Router(config-if)# ip access-group 101
C.) Router(config)# ip access-group 101 e0 in
D.) Router(config)# ip access-group 101 e0 in
Ans A
489 Identify the command that displays ethernet0/1 interface status?
A.) show interface ethernet0/1
B.) show interface ethernet e0/1
C.) show interface ethernet0.1
D.) show ethernet0/1
Ans C
490 Identify the command that saves the configuration stored in RAM to NVRAM?
A.) copy running-config startup-config
B.) copy tftp running-config
C.) copy startup running
D.) copy active to backup
Ans A
491 Identify the command that displays the SAP table?
A.) show ipx servers
B.) display SAP table
C.) display SAP's
D.) show sap table
Ans A
492 Identify the command to configure the IP address 172.16.100.5 255.255.255.0?
A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0
B.) Router(config)# ip address 172.16.100.5
C.) Router# ip address 172.16.100.5 255.255.255.0
D.) Router(config)# ip address 172.16.100.5 255.255.255.0
Ans A
493 Identify the command to configure the router to boot from an IOS located on a TFTP server?
A.) boot system tftp IOS.exe 172.16.5.1
B.) boot system tftp 172.16.5.1 IOS.exe
C.) boot system flash tftp 172.16.5.1
D.) boot system IOS.exe 172.16.5.1
Ans B
494 Identify the command to display the hardware platform information?
A.) show all
B.) show platform
C.) display hardware
D.) show version
Ans D
495 Identify the command to display the Frame Relay map table?
A.) Router# display frame-relay map
B.) Router# show frame-relay map
C.) Router(setup)# show frame-relay map
D.) Router# show map frame-relay
Ans B
496 Given the command 'cl?', what will it display?
A.) Syntax of the 'clock' command
B.) Syntax of the 'clear' command
C.) All commands that begin with 'cl'
D.) All commands that begin with 'c'
Ans C
497 Identify the 2 commands that copies the configuration in NVRAM to RAM?
A.) copy backup-config running-config
B.) configure nvram
C.) copy startup-config running-config
D.) configure memory
Ans C D
498 Identify the 2 commands the saves the running-config to NVRAM?
A.) write memory
B.) copy running-config startup-config
C.) write network
D.) write backup
Ans B A
499 Identify the command that displays traffic statistics on serial0/1?
A.) display interface serial0/1
B.) show interface serial0/1
C.) show seria0/1 stats
D.) show interface serial0/1 stats
Ans B
500Identify the command to determine if CDP is enabled?
A.) show enable cdp
B.) show cdp enabled
C.) show cdp run
D.) show cdp
Ans D
CCNA Interview Questions and Answers
Post a Comment