CCNA Interview Objective Questions
CCNA Interview Objective Questions
1. As system administrator, you type “debug ipx sap” and receive the following lines
as part of the IOS response: type 0×4, “HELLO2″, 199.0002.0003.0006 (451), 2
hops type 0×4, “HELLO1″, 199.0002.0003.0008 (451), 2 hops What does “0×4″
signify?
* That is a Get Nearest Server response.
* That it is a General query.
* That it is a General response.
* That it is a Get Nearest Server request.
Correct answer: A
2. To monitor IP igrp traffic, you can use “debug IP igrp transaction” or “debug IP
igrp events”. How do you display information about IPX routing update packets?
* debug routing
* debug ipx transaction
* debug ipx routing activity
* debug ipx events
Correct answer: C
4. What command would you use to find out the names of Novell servers on a
network?
* show ipx servers
* show ipx hosts
* show ipx sap
* show ipx nodes.
Correct answer: A
5. The “ipx delay number” command will allow an administrator to change the
default settings. What are the default settings?
* For LAN interfaces, one tick; for WAN interfaces, six ticks
* For LAN interfaces, six ticks; for WAN interfaces, one tick
* For LAN interfaces, zero ticks; for WAN interfaces, five ticks
* For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
Correct answer: A
The default is–for LAN interfaces, one tick; for WAN interfaces, six ticks
6. As a system administrator, you need to set up one Ethernet interface on the Cisco
router to allow for both sap and Novell-ether encapsulations. Which set of
commands will accomplish this?
* interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface
ethernet 0.2 ipx network 6c
* interface ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface
ethernet 0 ipx encapsulation sap ipx network 6c
* interface ethernet 0.1 ipx encapsulation Novell-ether interface ethernet 0.2 ipx
encapsulation sap
* interface ethernet 0.1ipx encapsulation Novell-ether ipx network 9e interface
ethernet 0.2 ipx encapsulation sap ipx network 6c
Correct answer: D
The following commands setup the subinterfaces to allow for two types of
encapsulation: interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e
interface ethernet 0.2 ipx encapsulation sap ipx network 6c
8. You want to enable both arpa and snap encapsulation on one router interface. How
do you do this?
* The interface can handle multiple encapsulation types with no extra
configuration.
* Assign two network numbers, one for each encapsulation type.
* Enable Novell-ether to run multiple encapsulation types.
* Both arpa and snap are enabled by default so you don’t have to configure
anything.
Correct answer: B
To assign multiple network numbers, you usually use subinterfaces. A sample
configuration follows: ipx ethernet 0.1 ipx encapsulation novell-ether ipx network
9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
By default, Cisco routers forward GNS SAPs to remote networks.
* False
* True
Correct answer: A
GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local
network, that server will respond. If there isn’t, the Cisco router has to be
configured to forward the GNS SAP.
9. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers
do not forward them. How are services advertised to other networks?
* Each router builds its own SAP table and forwards that every 60 seconds.
* Each router assigns a service number and broadcasts that.
* SAPs aren’t necessary with Cisco routers.
* Cisco routers filter out all SAPs.
Correct answer: A
Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs
can’t be filtered even with 4.x since NDS and time synchronization uses SAPs.
10. Novell’s implementation of RIP updates routing tables every ____ seconds.
* 60
* 90
* 10
* 30
Correct answer: A
Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10
seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and
Banyan VINES signals every 90 seconds.
11. In Novell’s use of RIP, there are two metrics used to make routing decisions.
Select the two metrics.
* Ticks.
* Hops
* Loops
* Counts
Correct answer: A &B
It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are
equal, then it uses an administratively assigned tiebreaker.
12. What is the Cisco name for the encapsulation type used on a serial interface?
* HDLC
* SDLC
* SAP
* SNAP
Correct answer: A
13. “arpa” is used by the Cisco IOS for which encapsulation types?
* Ethernet_II
* Ethernet_802.3
* Ethernet_802.2
* Ethernet_SNAP
Correct answer: A
14. Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for
Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for
Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for
Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.
“snap” is used by the Cisco IOS for which encapsulation types?
* Ethernet_SNAP
* Token-Ring_SNAP
* FDDI_SNAP
* Novell-SNAP
* Novell-FDDI.
Correct answer: A,B &C
15. Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for
Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for
Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for
Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.15
“sap” is used by the Cisco IOS for which encapsulation types?
* Ethernet_802.2
* Token-Ring
* FDDI_SNAP
* Ethernet_802.3
* FDDI_802.2
Correct answer: A,B &E
16. Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for
Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for
Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for
Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.
Which type of Ethernet framing is used for TCP/IP and AppleTalk?
* Ethernet 802.3
* Ethernet 802.2
* Ethernet II
* Ethernet SNAP
Correct answer: D
Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is
used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with
TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.
17. Which type of Ethernet framing is used for TCP/IP and DECnet?
* Ethernet 802.3
* Ethernet 802.2
* Ethernet II
* Ethernet SNAP
Correct answer: C
Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is
used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with
TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.
18. You are a system administrator on a NetWare network, you are running NetWare
4.11 and you cannot communicate with your router. What is the likely problem?
* NetWare 4.11 defaults to 802.2 encapsulation.
* NetWare 4.11 defaults to 802.3 encapsulation
* Cisco routers only work with NetWare 3.11.
* NetWare 3.11 defaults to 802.2 encapsulation.
Correct answer: A
The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare
3.12 and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.
19. NetWare IPX addressing uses a network number and a node number. Which
statements are true?
* The network address is administratively assigned and can be up to 16
hexadecimal digits long.
* The node address is always administratively assigned.
* The node address is usually the MAC address.
* If the MAC address is used as the node address, then IPX eliminates the use of
ARP.
Correct answer: A, C &D
The network address can be up to 16 hexadecimal digits in length. The node
number is 12 hexadecimal digits. The node address is usually the MAC address.
An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The
node part is 0000.0c56.de33. The network number is assigned by the system
administrator of the Novell network.
20. Which NetWare protocol works on layer 3–network layerâ€â€�of the OSI
model?
* IPX
* NCP
* SPX
* NetBIOS
Correct answer: A
IPX (Internetwork Packet Exchange) is a NetWare network layer 3 protocol used
for transferring information on LANs.
22. As a system administrator, you want to debug igrp but are worried that the “debug
IP igrp transaction” command will flood the console. What is the command that
you should use?
* debug IP igrp event
* debug IP igrp-events
* debug IP igrp summary
* debug IP igrp events
Correct answer: D
The “debug IP igrp events” is used to only display a summary of IGRP routing
information. You can append an IP address onto either command to see only the
IGRP updates from a neighbor.
23. What does the following series of commands accomplish? router igrp 71 network
10.0.0.0 router igrp 109 network 172.68.7.0
* It isolates networks 10.0.0.0 and 172.68.7.0.
* It loads igrp for networks 109 and 71.
* It disables RIP.
* It disables all routing protocols.
Correct answer: A
It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109
and 71 with IGRP. IGRP does not disable RIP, both can be used at the same time.
24. In the command “router igrp 109″ what does 109 signify?
* an autonomous system
* any network number which the router is attached to
* the allowable length of the routing table
* the network socket number
Correct answer: A
The Cisco IOS global configuration command “router igrp xxx” is used to
configure the Interior Gateway Routing Protocol. In this case, the 109 is called the
process-id , which can also be used for an autonomous system number.
26. IGRP uses flash updates, poison reverse updates, holddown times, and split
horizon. How often does it broadcast its routing table updates?
* 90 seconds
* 10 seconds
* 30 seconds
* 45 seconds
Correct answer: A
28. When using RIP, routing updates are broadcast every ____ seconds.
* 30
* 10
* 60
* 90
Correct answer: A
Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10
seconds, routers ARP every 60 seconds, DECnet hosts and IGRP signal every 15
seconds, and Banyan VINES signals every 90 seconds.
29. An autonomous system can only exist if all routers in that system meet which
criteria?
* interconnected
* run the same routing protocol
* assigned same autonomous system number
* run IGRP only
* run RIP only
Correct answer: A,B &C
An autonomous system is a set of routers and networks under the same
administration. Each router must be interconnected, run the same routing protocol,
and assigned the same autonomous system number. The network Information
Center (NIC) assigns a unique autonomous system number to enterprises.
30. A default route is analogous to a _________.
* default gateway
* static route
* dynamic route
* one-way route
Correct answer: A
A default route is analogous to a default gateway. It is used to reduce the length of
routing tables and to provide complete routing capabilities when a router might not
know the routes to all other networks.
31. Routers can learn about destinations through static routes, default, or dynamic
routing. By default, a router will use information derived from __________.
* IGRP
* RIP
* IP
* TCP
Correct answer: A
The quality of information is rated:
Connected interface 0
Static route 1
IGRP 100
RIP 120
Unknown 255
The lower the value, the more reliable the source with 255 signifying information
that the router will ignore. So, the router will use IGRP, rated at 100, before RIP,
rated at 120.
32. You are logged into a router, what command would show you the IP addresses of
routers connected to you?
* show cdp neighbors detail
* show run
* show neighbors
* show cdp
Correct answer: A
33. As a system administrator, you perform an extended ping at the privileged EXEC
prompt. As part of the display, you see “Set DF bit in IP header? [yes] :” What
would happen if you answered no at the prompt.
* This lets the router fragment the packet.
* It tells the router not to fragment the packet.
* This lets the router direct the packet to the destination it finds in its routing table.
* It tell the router to send the packet to the next hop router
Correct answer: A
“Set DF bit in IP header?” is a response to an extended ping at the router. If you
answer yes (the default) the router will not fragment the packet. If you answer no,
the router will fragment the packet.
34. You have typed “ping” 172.16.101.1 and get the following display: Type escape
sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2
seconds:
.!!!!
What does the “.” signify?
* That one message timed out.
* That all messages were successful.
* That one message was successful.
* That one message completed in under the allotted timeframe.
Correct answer: A
The possible responses from the ping command are: ! Successful receipt of an echo
reply. Timed out waiting for a reply U Destination unreachable C Congestion-
experienced packet I Ping interrupted ? Packet type unknown & Packet TTL
exceeded
35. Which command, that is used to test address configuration, uses Time-To-Live
(TTL) values to generate messages from each router.
* trace
* ping
* telnet
* bootp
Correct answer: A
The Cisco IOS EXEC command “trace [protocol] [destination]” is used to discover
routes that packets will travel to their destination hosts. Trace uses TTL (Time to
Live) values to report destination route information.
37. As a system administrator, you need to provide your routers with a Domain Name
System (DNS) server. How many DNS servers can you specify with one
command?
*6
*1
*2
*4
Correct answer: A
You can only specify six name servers in one command. The syntax is “IP name-
server server-address1 [[ server-address2 ]…server-address6]. You must also
enable
DNS.
38. How would you configure one host name that points to two IP addresses?
* IP host jacob 1.0.0.5 2.0.0.8
* IP jacob 1.0.0.5 2.0.0.8
* IP host jacob 1.0.0.5
* IP host duplicate “all”
Correct answer: A
The correct syntax is IP host name [ TCP-port-number ] address [ address ]….. So,
“IP host P1R1 1.0.0.5 2.0.0.8″ is the correct choice. “IP host jacob 1.0.0.5″ only
points the host name jacob to one IP address–1.0.0.5.
39. The following selections show the command prompt and the configuration of the
IP network mask. Which two are correct?
* Router#term IP netmask-format { bitcount | decimal | hexadecimal }
* Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }
* Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
* Router#ip netmask-format { bitcount | decimal | hexadecimal }
Correct answer: A & B
Router#term IP netmask-format { bitcount | decimal | hexadecimal } and
Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } are
correct. You can configure the mask for the current session and you can configure
it for a specific line.
40. When configuring the subnet mask for an IP address, which formats can be used?
* dotted-decimal.
* Hexadecimal
* Bit-count
* Octal
* Binary
Correct answer: A, B &C
41. You are given the following address: 153.50.6.27/25. Determine the subnet mask,
address class, subnet address, and broadcast address.
* 255.255.255.128, B,153.50.6.0, 153.50.6.127
* 255.255.255.128, C,153.50.6.0, 153.50.6.127
* 255.255.255.128, C,153.50.6.127, 153.50.6.0
* 255.255.255.224, C,153.50.6.0, 153.50.6.127
Correct answer: A
42. You are given the following address: 128.16.32.13/30. Determine the subnet mask,
address class, subnet address,
and broadcast address.
* 255.255.255.252, B,128.16.32.12, 128.16.32.15
* 255.255.255.252, C,128.16.32.12, 128.16.32.15
* 255.255.255.252, B,128.16.32.15, 128.16.32.12
* 255.255.255.248, B,128.16.32.12, 128.16.32.15
Correct answer: A
43. You are given the following address: 15.16.193.6/21. Determine the subnet mask,
address class, subnet address,
and broadcast address.
* 255.255.248.0, A, 15.16.192.0, 15.16.199.255
* 255.255.248.0, B, 15.16.192.0, 15.16.199.255
* 255.255.248.0, A, 15.16.199.255, 14.15.192.0
* 255.255.242.0, A, 15.16.192.0, 15.16.199.255
Correct answer: A
46. Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many
hosts are available?
* 254
* 510
* 126
* 16,372
Correct answer: A
172.16.2 120 is a standard Class B address with a subnet mask that allows 254
hosts. You are a network administrator and have been assigned the IP address of
201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. The subnet
mask is 255.255.255.248.
47. Which addresses are valid host addresses?
* 201.222.5.17
* 201.222.5.18
* 201.222.5.16
* 201.222.5.19
* 201.222.5.31
Correct answer: A,B & D
Subnet addresses in this situation are all in multiples of 8. In this example,
201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid
host IDs on subnet 201.222.5.16.
48. You are a network administrator and have been assigned the IP address of
201.222.5.0. You need to have 20 subnets with
49. hosts per subnet. What subnet mask will you use?
* 255.255.255.248
* 255.255.255.128
* 255.255.255.192
* 255.255.255.240
Correct answer: A
By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed
only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2.
By borrowing 4 bits, you have (2×2x2×2)-2=14. By borrowing 5 bits, you have
(2×2x2×2x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the
subnet mask would be 255.255.255.248.
50. You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0.
What is the network address in binary?
* 10101100 00010000
* 00000010 10100000
* 10101100 00000000
* 11100000 11110000
Correct answer: A
To find the network address, convert the IP address to binary–10101100
000100000 00000010 10100000–then ANDed it with the subnet mask–11111111
11111111 00000000 00000000. The rest is 10101100 00010000 00000000
00000000, which is 172.16.0.0 in decimal.
The first octet rule states that the class of an address can be determined by the
numerical value of the first octet.
1. Identify the switching method that receives the entire frame then dispatches it?
* Cut-through
* Receive and forward
* Store and forward
* Fast forward
Correct answer: C
Store and forward switching receives the entire frame before dispatching it.
98Identify the purpose of ICMP?
* Avoiding routing loops
* Send error and control messages
* Transporting routing updates
* Collision detection
Correct answer: B
ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and
echo-reply.
99Which statement is true regarding the user exec and privileged exec mode?
* The ‘?’ only works in Privileged exec
* They are identical
* They both require the enable password
* User exec is a subset of the privileged exec
Correct answer: D
The user exec mode is a subset of the privileged exec mode. Only a certain number of commands
are available at the user exec mode.
2. Which OSI layer end to end communication, segmentation and re-assembly?
* Network
* Transport
* Physical
* Application
* Data-Link
* Presentation
Correct answer: B
Layer 4 the Transport layer performs this function.
3. What IP command would you use to test the entire IP stack?
* Stack-test
* Arp
* Telnet
* Ping
* Trace
Correct answer: C
Because Telnet is an application and it resides at the top of the stack it traverses down the stack
and up the stack at the receiving end.
4. Identify the 2 hardware components used to manage and/or configure a router?
* Auxiliary port
* ROM port
* Management port
* Console port
Correct answer: A D
The 2 hardware ports used to configure the router are the console and auxiliary ports.
5. What is the default bandwidth of a serial connection?
* 1200 baud
* 1.544 Mbps (T1)
* 10 Mbps
* 96Kpbs
Correct answer: B
The default bandwidth is T1.
6. Identify 2 functions of IPX access-lists?
* Control SAP traffic
* Limit number of Novell servers on a network
* Limit number of workstations on a network
* Block IPX traffic
Correct answer: A D
IPX access lists are used to restrict IPX traffic and SAP broadcasts.
7. Identify 2 HDLC characteristics?
* Default serial encapsulation
* Open standard
* Supports Stacker compression
* Supports point-to-point and multipoint
Correct answer: A D
HDLC is the default serial encapsulation and supports point-to-point and multipoint. It is not an
open standard and does not support compression.
8. Identify 3 IP applications?
* AURP
* ARP
* Telnet
* SMTP
* DNS
* RARP
Correct answer: C D E
ARP and AURP are not part the application layer of the TCP/IP stack. SMTP - Simple Mail
Transfer Protocol, Telnet, DNS - Domain Name Services (name to IP resolution).
9. Identify 3 LAN technologies?
* FDDI
* HDLC
* HSSI
* X.25
* 802.3
* 802.5
Correct answer: A E F
The question is asking for 3 LAN technologies, HDLC, HSSI and X.25 are all WAN
technologies.
10. Identify the 4 that are not LAN technologies?
* HDLC
* FDDI
* 802.5
* HSSI
* SDLC
* Frame Relay
Correct answer: A D E F
802.5 and FDDI are LAN technologies
11. Which OSI layer supports the communication component of an application?
* Data-Link
* Physical
* Session
* Presentation
* Application
* Transport
Correct answer: E
Layer 7 the Application layer performs this function.
12. Identify the length of an IPX address and it’s components?
* 80 bits, 48 bits network and 32 bits node
* 32 bits, 16 bits network and 16 bits node
* None of the above
* 80 bits, 32 bits network and 48 bits node
Correct answer: D
IPX address has 2 components; network and node. The network address is 32 bits and the node is
48 bits, total of 80 bits.
13. Identify the administrative distance and appropriate routing protocol?
* RIP = 255, IGRP = 100
* RIP = 100, IGRP = 120
* RIP = 1, IGRP = 0
* RIP = 120, IGRP = 100
Correct answer: D
The administrative distance for RIP is 120 and IGRP is 100. The lower the AD the better the
routing information.
14. Which OSI layer incorporates the MAC address and the LLC?
* Data link
* Network
* Physcial
* Transport
Correct answer: ): A
Layer 2 the Data-Link layer incorporates the MAC and LLC sublayers
15. If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network,
which encapsulation type would you select?
* Q933a
* ISDN
* IETF
* CISCO
* ANSI
Correct answer: C
There are two types of Frame Relay encapsulations; Cisco and IETF. IETF is required when
connecting a Cisco to a non-Cisco router.
16. Identify the 2 items that TCP and UDP share in common?
* Both use port numbers to identify upper level applications
* Operate at the Network layer
* Both are Transport protocols
* Both are reliable communications
Correct answer: A C
TCP and UPD are both layer 4 Transport protocols and both use port number to identify upper
level applications.
17. Identify 3 characteristics of IP RIP?
* Distance vector
* Administrative distance is 120
* Periodic updates every 60 seconds
* Uses a composite metric
* Can load balance
Correct answer: A B E
IP RIP is a distance vector protocol, it can load balance up to 4 equal cost paths and it’s rating of
trustworthiness is 120.
18. Which of the following is a layer 2 device?
* Switch
* Router
* Repeater
* Hub
Correct answer: A
A Hub and Repeater are layer 1 devices. A Router is a layer 3 device.
19. Identify the definition of demarcation?
* Date in which the WAN service contract expires
* Cabling which extends from the WAN service provider to the customer
* Division of responsibility, where the CPE ends and the local loop begins
* Equipment which is located at the customer premises
Correct answer: C
Demarcation is the point in which responsibility changes hands.
20. Identify the 3 key features of the Cisco Discovery Protocol?
* Off by default
* Will allow for the discovery of layer 3 addresses on neighbor routers
* Verify connectivity
* Open standard
* Does not require any layer 3 protocols to be configured
Correct answer: B C E
CDP is used for 2 basic reasons; neighbor connectivity and layer 3 discovery if configured. It is
proprietary and is on by default.
21. Identify the 3 characteristics of IPX RIP?
* Distance vector
* Does not support multiple paths
* 60 second updates
* Default encapsulation is SAP
* Uses ticks and hop count as a metric
Correct answer: A C E
IPX RIP is a distance vector routing protocol, it does support multiple paths, the default
encapsulation is ‘novell-ether’, it uses tick count as a primary metric and hop count as a tie
breaker and it sends it’s updates every 60 seconds.
22. Identify the access-list range for an extended IP access-list?
* 800 - 899
* 1 - 99
* 1000 - 1099
* 100 - 199
Correct answer: D
IP extended access-lists use the number range of 100-199.
23. Identify the X.25 addressing standard?
* X.121
* X.25a
* ITU-1
* Q933a
Correct answer: A
The X.25 layer 3 addressing standards is X.121.
24. Identify 3 features of IGRP?
* Composite metric
* New horizon
* Flash updates
* 60 periodic updates
* Poison reverse
Correct answer: A C E
IGRP uses a composite metric made up of bandwidth and delay by default, it updates every 60
seconds and will trigger an update if the topology changes.
25. Where is the backup configuration file stored?
* RAM
* ROM
* Console
* NVRAM
Correct answer: D
One location to store the backup configuration is NVRAM.
26. Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology?
* Ethernet II, Snap
* Ethernet 802.3, Novell-Ether
* Ethernet SNAP, Arpa
* Ethernet 802.2, Snap
Correct answer: B
The default IPX LAN encapsulation is Novell-Ether which is 802.3
27. Identify 3 characteristics regarding IP access-lists?
* Can be configured as a standard access-list
* Can be run from another router running IP
* Can be configured as a named access-list
* Are the same as IPX access-lists
* Can be configured as an extended access-list
Correct answer: A C E
There are 3 types of IP access-lists; standard, extended and named. Named access-lists can be
either standard or extended depending on how they are configured.
28. Identify 3 ways in which a router can be configured?
* TFTP
* Nvram
* Ping
* Console
* Trace
Correct answer: A B D
Changes to the configuration can be entered via the console, a config stored in NVRAM or on a
TFTP server. Trace and ping are tools to verify connectivity.
29. A traffic light is an example of what type of mechanism?
* Collision detection
* Flow control
* Sequence numbering
* Network management
Correct answer: B
A Traffic light is an example of flow control.
30. Windowing is a type of?
* Negative acknowledgement
* Address resolution
* Layer transition mechanism
* Flow control
Correct answer: D
Windowing allow the sender and receiver to dictate how much information that can be received
prior to an acknowledgement. It is a form of flow control.
31. Identify the 2 types of access-list filters that control SAP traffic?
* Novell-ether
* Arpa
* Input-sap-filter
* Round-robin
* Output-sap-filter
Correct answer: C E
SAP’s can be blocked by 2 methods; inbound and outbound.
32. Identify the 3 guidelines for routers in the same autonomous system?
* Must be configured for IGRP or RIP
* Interconnected
* Assigned the same autonomous system number
* Configured for the same routing protocol
* Must be same model of router
Correct answer: B C D
Autonomous system must be interconnected, assigned the same AS # and configured with the
same routing protocol.
33. Identify the hardware component used to store buffers, tables, running-configuration etc?
* NVRAM
* ROM
* RAM
* Flash
Correct answer: C
RAM is the dynamic memory area. ROM contains the boot strap code, NVRAM contains the
startup-config and Flash contains the IOS.
34. Identify 3 UDP characteristics?
* Reliable communication protocol
* Applications that use UDP must incorporate reliability
* Connection-less oriented
* Incorporates no handshaking
Correct answer: B C D
UPD is a layer 4 Transport protocol. It is connection-less because it does establish a connection
therefore the 3 step handshake is not needed, it does NOT implement any flow control or
acknowledgments. Any application that uses UDP must incorporate any needed reliability.
35. Identify the IPX standard access-list number range?
* 600 - 699
* 1000 - 1099
* 1 - 99
* 100 - 199
* 800 - 899
Correct answer: E
IPX standard access-list range is 800-899.
36. Which OSI layer provides best effort end to end packet delivery?
* Data-Link
* Presentation
* Network
* Transport
* Physical
* Application
Correct answer: C
Layer 3 the Network layer performs this function.
37. Identify the 2 methods to modify the routers boot sequence?
* Setup program
* Boot system commands
* RXBoot
* Config-register
Correct answer: B D
‘Boot system’ command the ‘config-register’ are used to manipulate the boot sequence.
38. Identify the 3 pieces of hardware you would not install to prevent broadcasts?
* Switch
* Repeater
* Bridge
* Router
Correct answer: A B C
Router are implemented not only to break up networks into smaller segments but they are used to
block broadcasts.
39. Identify 2 features of PPP PAP authentication?
* Username and password is sent in clear text
* Authentication messages are sent periodically during the connection
* More secure than CHAP
* Remote node is control of authentication process
Correct answer: A D
PPP PAP authentication sends the username and passwords in clear text and the remote node
initiates the authentication process.
40. Identify the switching method that examines the destination MAC address as the frame is being
received then begins forwarding the frame prior to receiving the entire frame?
* Fragment-free
* Store and Forward
* Cut-through
* Fast forward
Correct answer: C
Cut through examines the destination MAC address and begins forwarding the frame prior to
receiving the entire frame.
41. Identify 1 characteristic of RARP?
* IP to MAC address translation
* Connectionless delivery of packets
* Can be used to initiate remote O/S load sequence
* Generates error and control messages
Correct answer: C
Reverse Address Resolution Protocol is used to obtain a layer 3 address if the MAC address is
known which then facilitates the loading of the O/S.
42. Identify the protocol to test connectivity without configuring any layer 3 protocols?
* TCP
* Ping
* IP
* CDP
* Telnet
Correct answer: D
CDP can be used to verify connectivity prior to any layer 3 protocols being configured.
43. LMI operates between the Frame Switch and what other device?
* CPE device
* Another Frame Switch
* X.25 switch
* Novell File Server
Correct answer: A
LMI stands for local management interface. It operates between the Frame Relay switch and the
customer equipment.
44. Identify IPX SAP and it’s purpose?
* Sonet Access Pipe - interface to Sonet ring
* Service Advertising Protocol - advertise services
* Server Appletalk Protocol - appletalk directory services
* Service Access Point - identify upper layer protocols
Correct answer: B
SAP is an Novell protocol to advertise services.
45. Identify the default values that make up IGRP’s composite metric?
* Bandwidth
* Load
* Reliability
* MTU
* Delay
Correct answer: A E
IGRP can be configured to use all 5 within it’s metric. By default it uses bandwidth and delay.
46. Identify the default serial encapsulation?
* ISDN
* HDLC
* SDLC
* Frame Relay
* PPP
Correct answer: B
The default serial encapsulation is HDLC.
47. Identify the purpose of ARP?
* Avoiding routing loops
* Determining a workstation’s IP address
* Sending a directed broadcast
* Determining a workstation’s MAC address
Correct answer: D
ARP is used to find a devices MAC address given an IP address.
48. What is the purpose of the DLCI?
* Identifies the remote routers
* Contained with a 802.2 frame for routing purposes
* Used with PPP during authentication
* Identifies the PVC in a Frame Relay network
Correct answer: D
DLCI stands for Data Link Connection Identifier. It identifies the local PVC.
49. Identify 3 characteristics of the Network layer (OSI layer 3)?
* Connection oriented
* Path determination
* Supports multiplexing
* Manages sessions
* Packet forwarding
Correct answer: B C E
The network layer is responsible for routing which entails learning the paths, selecting the best
path and forwarding the packet. Because it services multiple layer 4 protocols it multiplexes.
50. Identify 3 characteristics of switches?
* Increase available bandwidth
* Decrease broadcast traffic
* Support full duplex in a multipoint topology
* Make forwarding decision using MAC address
* Create collision domains
Correct answer: A D E
Switches operate at layer 2. They increase bandwidth by reducing the number of devices sharing
the media. They isolate collisions. Like a bridge they forward traffic based upon layer 2 address/
MAC address.
Explanation:
IP addresses are written using decimal numbers separated by decimal points. This is called
dotted decimal notation of expressing IP addresses.
Q2. You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts and subnets
are possible?
A. 126 hosts and 510 subnets
B. 128 subnets and 512 hosts
C. 510 hosts and 126 subnets
D. 512 subnets and 128 hosts
Correct answer: C
Explanation:
Class B network has the form N.N.H.H, the default subnet mask is 16 bits long.
There is additional 7 bits to the default subnet mask. The total number of bits in subnet are 16+7
= 23.
This leaves us with 32-23 =9 bits for assigning to hosts.
7 bits of subnet mask corresponds to (2^7-2)=128-2 = 126 subnets.
9 bits belonging to host addresses correspond to (2^9-2)=512-2 = 510 hosts.
Continue Reading.....
Q3. Two sub layers of OSI Data Link layer are which of the following? [Select 2].
A. Logical Link Control
B. Data Link Control
C. Media Access Control
D. Physical Layer Control
Correct answer: A,C
Q5. Which of the following are session layer standards? [Select 2].
A. NFS
B. SQL
C. JPG
D. MIDI
Correct answer: A,B
Q7. What is the command used to add a banner to a Cisco router configuration?
A. add banner
B. banner motd #
C. motd banner #
D. add banner #
Correct answer: B
Q9. The Cisco Catalyst 1900 switches support which three LAN switch types? [Select 3].
A. Store-and-Forward
B. FragmentFree
C. InstaSwitch
D. FastForward
Correct answer: A,B,D
Q11. Your internet work consists entirely of Cisco devices. You have given a command “show
cdp neighbors”. In the response, you get “S” under the head “Capability”. What does the letter
“S” mean?
A. It means “Source Route Bridge”
B. It means “Host”
C. It means “Switch”
D. It means “Static”
Correct answer: C
Q12. You want to verify the encapsulation type being used at Data Link layer for interface s0.
Which command can you use?
A. Sh ip protocol
B. sh int s0
C. sh ip interface
D. sh processes
Correct answer: B
Q13. You want to run 802.2 frame type on your Ethernet interface. Which encapsulation type has
to be chosen?
A. Ethernet_II
B. 802.2
C. SAP
D. SNAP
Answer is C
Q15. Which command sequence will allow only traffic from network 185.64.0.0 to enter
interface s0?
A. access-list 25 permit 185.64.0.0 255.255.0.0
int s0 ; ip access-list 25 out
B. access-list 25 permit 185.64.0.0 255.255.0.0
int s0 ; ip access-group 25 out
C. access-list 25 permit 185.64.0.0 0.0.255.255
int s0 ; ip access-list 25 in
D. access-list 25 permit 185.64.0.0 0.0.255.255
int s0 ; ip access-group 25 in
Correct answer: D
Q16. Which of the following are reference points relevant to ISDN? [Select 2].
A. T
B. U
C. V
D. X
Correct answer: A,B
Q18. Which of the following is a term associated with WAN terminology / is a WAN device?
[Select all that apply].
A. Demarc
B. DSU/CSU
C. Modem
D. CPE
Correct answer: A, B, C, D
Q19. Which of the following can be used to view the previous command you entered into a
Cisco router? [Select 2].
A. CTRL+F1
B. The Down Arrow
C. The Up Arrow
D. CTRL + P
Correct answer: C, D
Q20. What is true about static VLANs? [Choose the best answer].
A. The VLAN is configured by a TFTP server.
B. It automatically notify a new network user.
C. The administrator assigns VLAN by port.
D. Static VLAN are more appropriate when the switch fabric becomes more complex.
Correct answer: C