Professional Documents
Culture Documents
com:
Print Article Now
Pop Quiz
courtesy of MeasureUp
Questions:
1. Which of the following is true regarding passwords on a Cisco
router?
a. Privileged mode
b. User mode
c. Setup mode
d. Configuration mode
a. Ctrl-A
b. Ctrl-E
c. Esc-B
d. Esc-F
e. Ctrl-B
f. Ctrl-F
a. In NVRAM
b. In RAM
c. In ROM
d. In Flash memory
e. On a TFTP server
a. show ip route
b. show ip address
c. show ip interface
d. show interfaces
e. display ip addresses
d. show int
a. ARP
b. SLARP
c. RARP
d. IARP
10. Which protocols are link-state routing protocols? (Choose all that
apply.)
a. IP
b. OSPF
c. RIP
d. IPX
e. IGRP
f. Integrated IS-IS
12. Which of the following would most likely use the protocol TCP?
(Choose three.)
a. DNS
b. FTP
c. TFTP
d. Telnet
e. SNMP
f. SMTP
a. ARP
b. FTP
c. ICMP
d. RARP
e. SNMP
a. 14
c. 16
d. 32
e. 30
Answers:
1. B is true. A password is not active until the login command is
issued for the associated line. The enable password, used to enter
privileged mode, is not encrypted. The enable secret password is
encrypted. The
console, auxiliary, and Telnet passwords are all set separately. You
can enter any password for any of the lines. All configured vtys
typically have the same password, but it is not required. If you want,
you can
set a different password on each vty line.
2. B is correct. There are three major command prompts that you should
be able to recognize. They are:
3. A is correct. The Cisco IOS offers several key sequences called hot
keys that are designed to allow you to move around the command line
more quickly if you need to edit a command string. These hot keys can
come
in handy if you Telnet into the router with an old Telnet program.
Some older terminal programs do not supply the proper keystrokes needed
for command-line editing. The hot keys built into the IOS will overcome
this limitation.
Routers can boot from a TFTP server, but the active configuration file
is stored in the local RAM.
···> back to question
Frame Relay uses permanent virtual circuits (PVC), which are permanent
logical circuits that represent the paths that frames travel between
end units. BECN and FECN values are shown when you enter the "show
frame-relay pvc" command.
*
Router-A# show frame-relay ?
*
ip show frame relay IP statistics
*
lapf show frame relay lapf status/statistics
*
lmi show frame relay lmi statistics
*
map Frame-Relay map table
*
pvc show frame relay pvc statistics
*
qos-autosense show frame relay qos-autosense information
*
route show frame relay route
*
svc show frame relay SVC stuff
*
traffic Frame-Relay protocol statistics
So, judging from the list above, the correct answer would be:
Notice the BECN and FECN packet count in the above printout.
The "show frame-relay map" command lists the interface, IP address, and
Data Link Connection Identifier (DLCI) information but does not display
BECN or FECN statistics.
The "show int" command displays up-down status on all interfaces but
not the BECN or FECN statistics.
The "show frame-relay int" command uses the wrong syntax as indicated
in the "show frame-relay ?" display shown above.
···> back to question
When a host wants to send traffic to a host that isn't on the local
segment, the first thing it does is ARP for its default gateway. It
sends
out a message that says something like: "I know my gateway is
192.168.1.1, but I don't know the MAC address. I checked my ARP cache
and didn't
see an entry that mapped 192.168.1.1 to a MAC address...can someone
tell me who this is?"
8. D is correct. Each Data Link header has a field in its header with a
code that defines the type of protocol header that follows. The IEEE
called its Type field the destination service access point (DSAP). It
is
only one byte long, which is not big enough to number all the
protocols. To accommodate more protocols, the IEEE allowed the use of
an extra
header, called the Subnetwork Access Protocol (SNAP) header. When the
DSAP field is set to hex AA, this implies that a SNAP header follows
the
802.2 header. The SNAP header includes a two-byte protocol type field
so all possible protocols can be identified.
Setting both the Source Service Access Point (SSAP) and the Destination
Service Access Point (DSAP) fields to "AA" indicates that SNAP is in
use.
SNAP eliminates the limitations of the LLC. The SNAP header allows for
a varying "type" field to allow for as many protocols as necessary.
This allows LLC to identify and handle protocols that it was not
originally designed to handle.
The "AA" setting does not set the protocol to IP or specify what the
MAC address has to be to receive the frame.
If you looked at the data in both the Destination Address (DA) and the
Source Address (SA) fields, you would see MAC Addresses of the nodes
involved in the data transmission.
···> back to question
Of the choices given, only OSPF and Integrated IS-IS are link-state
routing protocols.
*
OSPF - uses route "cost" as a metric (not hop count), maintains a
network topology database, runs the SPF algorithm, and sends
incremental updates.
*
Integrated IS-IS (Intermediate System-to-Intermediate System) is
also a link-state protocol. It supports VLSM, converges quickly, and
updates incrementally every 15 minutes.
*
RIP - relies on hop count, sends entire routing table at each
update interval. It is a Distance vector protocol.
*
IGRP - uses a composite metric (not hop count), sends routing
table to neighbors at 90 second intervals. It is a Distance vector
protocol.
*
IP - Layer 3 protocol, provides connection-less transmission of
data. It is a routed protocol, not a routing protocol.
*
IPX - uses "ticks" or "hops" as a metric, broadcasts entire
routing table. It is a routed protocol, not a routing protocol.
*
... can issue a "not ready" indicator (TCP).
*
... arranges segments back into their proper order at the
destination.
*
... can provide the ability to send unacknowledged packets.
*
... can provide a non-connection oriented service (UDP).
12. B, D and F are correct. To answer this question, you need to look
at each protocol and determine whether it requires a connection-
oriented
(reliable) session (TCP) or a connectionless session (UDP). A
connection-oriented session supports error detection and correction. If
packets
are lost during transfer, the lost packets will be identified and
retransmitted. A connectionless session is not concerned about losing
packets, and no error correction is attempted. If data transfer fails,
the
originating host simply requests the data again.
Domain Name System (DNS) can use either TCP or UDP ports. A DNS request
generally uses UDP since it is a request for an IP address for a fully
qualified domain name. It would not require a reliable two-way
communication pipe. Since the question specifies "what would be the
most
likely", UDP would be the most correct answer.
Trivial File Transfer Protocol (TFTP) provides only the most basic of
file transfer capabilities. It does not require you to log in. It just
sits there and waits for files to come in. TFTP uses IP for addressing
and UDP at layer 4.
Router-A tells Router-B that its route to network 1 has failed at about
the same time that Router-B advertises a valid path to network 1. If
routing update information crosses paths, a never-ending cycle of
updates
begins with one router saying the link is up and the next router says
it's down. Then, both routers accept the update from each other and
announce the opposite information back to each other. This would go
back
and forth for an infinity of cycles if not managed. Split horizon
provides the procedure to prevent this problem.
If you converted this subnet mask to binary, you would have the
pattern:
11111111.11111111.11110000.00000000
To determine the number of subnets, you use the 2^N-2 formula on the
number of subnet bits (4). This yields:
16 - 2 = 14 networks (subnets)
To calculate the range of host addresses per network, use the 2^N-2
formula on the number of host bits (12). This yields:
Notice that this table is built by first writing the number one (001)
starting at the right margin, then doubling it successively from right
to left like this, 1, 2, 4, 8, 16, 32, 64, 128. Next, starting from the
left, add the number in the top row to the previous number in the
bottom row like this: 128, 128 + 64 = 192, 192 + 32 = 224, 224 + 16 =
240,
240 + 8 = 248, 248 + 4 = 252, 252 + 2 = 254, 254 + 1 = 255.
Using this table, find the subnet mask number you are working with in
the lower row. In this case, you are using the 240 from the third
octet.
Take the number directly above the 240, which is 16, and this is the
incremental value of the subnet numbers in the associated octet (the
third octet in this case).This means that the subnet numbers begin with
172.16.0.0 and increments by 16 in the third octet for a total of 14
subnets. The resulting subnets are:
172.16.0.0
172.16.16.0
172.16.32.0
172.16.48.0
Repeating this pattern all the way to the last subnet 172.16.240.0
Notice that you begin with the zero subnet and carry it through to the
subnet with the same number as the subnet mask. This yields 16 subnets,
but the formula says to delete two of them, the first, and the last.
http://tcpmag.com/popquiz/article.asp?EditorialsID=59