You are on page 1of 19

Name of Student: _______________________ Date: _________

Name of Examiner: ______________________ Time: 60 minutes


Marks Obtained: ______ Total Marks:
Passing mark: 80%

A. Answer the following.

1 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
2 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060
www.yoinsights.com; info@yoinsights.com
7. Which is a correct statement when hubs are replaced with switches?
A. The replacement increases collision domains.
B. The replacement decreases collision domains.
C. The replacement increases broadcast domains.
D. The replacement decreases broadcast domains.

8. Which is a function of a layer 2 switch?


A. Forwarding the data based upon logical addressing
B. Repeating the electrical signal to all ports
C. Learning the MAC address by examining the destination MAC addresses
D. Determining the forwarding interfaces based upon the destination MAC address and tables

9. Which statement describes the micro-segmentation that a switch provides?


A. All of the ports on the switch create a single collision domain.
B. Each port on the switch segments broadcasts.
C. Each port on the switch creates its own collision domain.
D. Each port on the switch creates an isolation for layer 2 broadcasts.

10. Which network topology design has a centralized switch connecting all of the devices?
A. Star topology
B. Full mesh topology
C. Partial mesh topology
D. Hybrid topology

3 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
11. Which is a direct benefit of a full mesh topology?
A. Increased bandwidth
B. Increased redundancy
C. Decreased switch count
D. Increased complexity

12. Which cable type would you use to connect a switch to a switch?
A. Straight-through cable
B. Crossover cable
C. Rolled cable
D. Shielded cable

13. Which type of cable would be used to connect a computer to a switch for management of the
switch?
A. Straight-through cable
B. Crossover cable
C. Rolled cable
D. Shielded cable

14. What is the Class C address range in decimal and in binary?


Answer:
A Class C address begins with binary 110.
The lowest number that can be represented is 11000000, decimal 192.
The highest number that can be represented is 11011111, decimal 223.

15. What layer of the DoD model is equivalent to the Transport layer of the OSI model?
Answer:
The four layers of the TCP/IP stack (also called the DoD model) are Application/Process,
Host-to-Host, Internet, and Network Access.
The Host-to-Host layer is equivalent to the Transport layer of the OSI model.

4 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
16. What is the Class A address range in decimal and in binary?
Answer:
The lowest number that can be represented is 00000000, decimal 0.
The highest number that can be represented is 01111111, decimal 127.

17. What is the 127.0.0.1 address used for?


Answer: Local host

18. How do you find the network address from a listed IP address?
Answer: Step1: Write the given IP address in binary format.
Step 2: Write the subnet mask in binary form.
Step 3: Perform the logical ANDing operation between the corresponding octets of the IP address
and the subnet mask.
Step 4: Convert the result back to the decimal format and this will be the network address

19. How do you find the broadcast address from a listed IP address?
Answer: The lowest address of the subnet your IP address falls in is the network address.
The highest address in the subnet your IP address falls in is the broadcast address.

5 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
20. What is the Class A private IP address space?
Answer: Class A: 10.0. 0.0 to 10.255. 255.255.

21. What is the Class B private IP address space?


Answer: Class B: 172.16.0.0 to 172.31.255.255

22. What is the Class C private IP address space?


Answer: Class C: 192.168. 0.0 to 192.168. 255.255.

23. What are all the available characters that you can use in hexadecimal addressing?
Answer: To address the two-digit decimal values, the alphabetic characters A, B, C, D, E, and F.

24. The four layers of the DoD model are Process/Application, Host-to-Host, Internet, and Network
Access. Identify the layer of the DoD model on which each of these protocols operates.
(Internet Protocol (IP), Telnet, FTP, SNMP, DNS, ARP, ICMP, HTTP, SMTP & Bootp)
Answer:
Application layer: SMTP, TELNET, FTP, HTTP, DNS
Internet layer: ICMP, ARP, SNMP, IP

6 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
25. Write down the steps used in the DHCP process.
Answer: DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease
acknowledgement.
These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement

26. Private IP addressing was specified in RFC __________.


1918

27. Which Class of IP addresses uses the pattern shown here?


Network Network Network Host
Answer: Class C

28. Which of the following Application layer protocols sets up a secure session that’s similar to Telnet?
A.Remote Assistance
B. DNS
C. DHCP
D.SSH

29. Which of the following mechanisms is used by the client to avoid a duplicate IP address during the
DHCP process?
A. Ping
B. Traceroute
C. Gratuitous ARP
D. Pathping

30. What protocol is used to find the hardware address of a local device?
A. ARP
B. ICMP
C. Bootp

7 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
D. IP

31. Which of the following are layers in the TCP/IP model? (Choose three.)
A. Application
B. Session
C. Transport
D. Internet
E. Data Link
F. Physical

32. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

33. Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses ff:ff:ff:ff:ff:ff as a layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer 2 destination address.

34. Which layer 4 protocol is used for a Telnet connection?


A. IP
B. TCP
C. TCP/IP
D. UDP
E. ICMP

35. Which of the following services use TCP? (Choose three.)


A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP

36. The following illustration shows a data structure header. What protocol is this header from?

A. IP
B. ICMP
C. TCP
D. UDP
E. ARP
F. RARP

37. If you use either Telnet or FTP, what layer are you using to generate the data?
A. Application
B. Presentation
C. Session

8 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
D. Transport

38. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is
equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access

39. Which two of the following are private IP addresses?


A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43

40. Which statements are true regarding ICMP packets? (Choose two.)
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.

41. What is the address range of a Class B network address in binary?


A. 110xxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 01xxxxxx

42. Refer to the exhibit. A network administrator cannot establish a Telnet session with the indicated
router. What is the cause of this failure?
Answer:
The vty password is missing.

9 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
43. OSI stand for______________
A. Open system interconnection
B. Operating system interface
C. Optical service implementations
D. Open service internet

44. ____________are rules that govern a communication exchange.


A. Media
B. Interface
C. Protocols
D. All of the above

45. Performance of a data communication network depends on


A. No of users
B. The Transmission Media
C. The hardware and software
D. All of the above

46. Which protocol uses window flow system?


A. UDP
B. TCP
C. FTP
D. None of above

47. Which company developed TCP/IP protocol for networking


A. IBM
B. DEC
C. DARPA
D. Xerox

48. Most commonly used cable types for Ethernet.


A. CAT-5e UTP
B. CAT-5e STP
C. CAT-6
D. CAT-5

49. Following layer are considered as software or upper layer.


A. Network layer
B. Data link layer
C. Session layer

10 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
D. All of the above

50. Following layer are considered as Hardware or lower layer.


A. Application layer
B. Data link layer
C. Presentation layer
D. Network Layer

51. HTTP used following port number.


A. 81
B. 75
C. 79
D. 80

52. SMTP used following port number.


A. 22
B. 25
C. 28
D. None of above

53. Following are common events in ICMP.


A. Destination unreachable
B. Buffer full
C. Time exceeded
D. All of the above

54. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce
the waste of IP addresses?

A. /27
B. /28
C. /29
D. /30
E. /31

11 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
55. In the network shown in the diagram, how many computers could be in Network B?

A. 6
B. 12
C. 14
D. 30

56. In the following diagram, in order to have IP addressing that’s as efficient as possible, which network
should use a /29 mask?

A. A
B. B
C. C
D. D

57. To use VLSM, what capability must the routing protocols in use possess?
A. Support for multicast
B. Multiprotocol support
C. Transmission of subnet mask information
D. Support for unequal load balancing

58. What summary address would cover all the networks shown and advertise a single, efficient route to
Router B that won’t advertise more networks than needed?

A. 172.16.0.0/24
B. 72.16.1.0/24
C. 172.16.0.0/24
D. 172.16.0.0/20
E. 172.16.16.0/28
F. 172.16.0.0/27

12 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
59. In the following diagram, what is the most likely reason the station cannot ping outside of its
network?

A. The IP address is incorrect on interface E0 of the router.


B. The default gateway address is incorrect on the station.
C. The IP address on the station is incorrect.
D. The router is malfunctioning

60. If a host is configured with an incorrect default gateway and all the other computers and router are
known to be configured correctly, which of the following statements is TRUE?

A. Host A cannot communicate with the router.


B. Host A can communicate with other hosts in the same subnet.
C. Host A can communicate with hosts in other subnets.
D. Host A can communicate with no other systems.

61. Which of the following troubleshooting steps, if completed successfully, also confirms that the other
steps will succeed as well?

A. Ping a remote computer.


B. Ping the loopback address.
C. Ping the NIC.
D. Ping the default gateway

62. When a ping to the local host IP address fails, what can you assume?

A. The IP address of the local host is incorrect.


B. The IP address of the remote host is incorrect.
C. The NIC is not functional.
D. The IP stack has failed to initialize

63. When a ping to the local host IP address succeeds but a ping to the default gateway IP addressfails,
what can you rule out? (Choose all that apply.)

A. The IP address of the local host is incorrect.


B. The IP address of the gateway is incorrect.
C. The NIC is not functional.
D. The IP stack has failed to initialize.

13 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
64. Which of the networks in the diagram could use a /29 mask?

A. Corporate
B. LA
C. SF
D. NY
E. None

65. What network service is the most likely problem if you can ping a computer by IP address but not
by name?

A. DNS
B. DHCP
C. ARP
D. ICMP

66. When you issue the ping command, what protocol are you using?

A. DNS
B. DHCP
C. ARP
D. ICMP

67. Which of the following commands displays the networks traversed on a path to a network
destination?

A. ping
B. traceroute
C. pingroute
D. pathroute

68. What command generated the output shown below?

Reply from 172.16.10.2: bytes=32 time


Reply from 172.16.10.2: bytes=32 time
Reply from 172.16.10.2: bytes=32 time
Reply from 172.16.10.2: bytes=32 time

A. traceroute
B. show ip route
C. ping
D. pathping

14 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
69. In the work area, match the command to its function on the right.

Traceroute PC Net configurations


Arp Cisco router ARP table
Show ip arp Display IP-to –MAC
Ipconfig Display the list if routers on a path to a network destination

70. Which of the following network addresses correctly summarizes the three networks shown below
efficiently?
10.0.0.0/16
10.1.0.0/16
10.2.0.0/16

A. 10.0.0.0/15
B. 10.1.0.0/8
C. 10.0.0.0/14
D. 10.0.0.8/16

71. What command displays the ARP table on a Cisco router?

A. show ip arp
B. traceroute
C. arp -a
D. tracert

72. What switch must be added to the ipconfig command on a PC to verify DNS configuration?

A. /dns
B. -dns
C. /all
D. showall

73. Which of the following is the best summarization of the following networks: 192.168.128.015
through 192.168.159.0?

A. 192.168.0.0/24
B. 192.168.128.0/16
C. 192.168.128.0/19
D. 192.168.128.0/20

74. Which of the following is a standards-based protocol that provides dynamic network discovery?
A. DHCP
B. LLDP
C. DDNS
D. SSTP
E. CDP

15 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
75. Which command can be used to determine a router’s CPU utilization?
A. show version
B. show controllers
C. show processes cpu
D. show memory

76. You are troubleshooting a connectivity problem in your corporate network and want to isolate the
problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user
exec command should you issue?

A. Router>ping
B. Router>trace
C. Router>show ip route
D. Router>show interface
E. Router>show cdp neighbors

77. You copy a configuration from a network host to a router’s RAM. The configuration looks correct,
yet it is not working at all. What could the problem be?

A. You copied the wrong configuration into RAM.


B. You copied the configuration into flash memory instead.
C. The copy did not override the shutdown command in running-config.
D. The IOS became corrupted after the copy command was initiated.

78. In the following command, what does the IP address 10.10.10.254 refer to?
Router#config t
Router(config)#interface fa0/0
Router(config-if)#ip helper-address 10.10.10.254

A. IP address of the ingress interface on the router


B. IP address of the egress interface on the router
C. IP address of the next hop on the path to the DHCP server
D. IP address of the DHCP server

79. The corporate office sends you a new router to connect, but upon connecting the console cable, you
see that there is already a configuration on the router. What should be done before a new
configuration is entered in the router?

A. RAM should be erased and the router restarted.


B. Flash should be erased and the router restarted.
C. NVRAM should be erased and the router restarted.
D. The new configuration should be entered and saved.

16 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
80. What command can you use to determine the IP address of a directly connected neighbor?

A. show cdp
B. show cdp neighbors
C. show cdp neighbors detail
D. show neighbor detail

81. According to the output, what interface does SW-2 use to connect to SW-3?

SW-3#sh cdp neighbors


Capability Codes: R - Router, T - Trans Bridge, B - Source Route BridgeS - Switch, H - Host, I –
IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID
Local Interface Hold time Capability Platform Port ID
SW-1 Fas 0/1 170 SI WS-C3560 Fas 0/15
SW-1 Fas 0/2 170 SI WS-C3560 Fas 0/16
SW-2 Fas 0/5 162 SI WS-C3560 Fas 0/2

A. Fas 0/1
B. Fas 0/16
C. Fas 0/2
D. Fas 0/5

82. Which of the following commands enables syslog on a Cisco device with debugging as the level ?
A. syslog 172.16.10.1
B. logging 172.16.10.1
C. remote console 172.16.10.1 syslog debugging
D. transmit console messages level 7 172.16.10.1

83. You save the configuration on a router with the copy running-config startup-config command and
reboot the router. The router, however, comes up with a blank configuration. What can the problem
be?

A. You didn’t boot the router with the correct command.


B. NVRAM is corrupted.
C. The configuration register setting is incorrect.
D. The newly upgraded IOS is not compatible with the hardware of the router.
E. The configuration you saved is not compatible with the hardware.

84. If you want to have more than one Telnet session open at the same time, what keystroke combination
would you use?

A. Tab+spacebar
B. Ctrl+X, then 6
C. Ctrl+Shift+X, then 6
D. Ctrl+Shift+6, then X

17 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
85. You are unsuccessful in telnetting into a remote device from your switch, but you could telnet to the
router earlier. However, you can still ping the remote device. What could the problem be? (Choose
two.)

A. IP addresses are incorrect.


B. Access control list is filtering Telnet.
C. There is a defective serial cable.
D. The VTY password is missing.

86. What information is displayed by the show hosts command? (Choose two.)

A. Temporary DNS entries


B. The names of the routers created using the hostname command
C. The IP addresses of workstations allowed to access the router
D. Permanent name-to-address mappings created using the ip host command
E. The length of time a host has been connected to the router via Telnet

87. Which three commands can be used to check LAN connectivity problems on an enterprise switch?
(Choose three.)

A. show interfaces
B. show ip route
C. tracert
D. ping
E. dns lookups

88. You telnet into a remote device and type debug ip icmp, but no output from the debug command is
seen. What could the problem be?

A. You must type the show ip icmp command first.


B. IP addressing on the network is incorrect.
C. You must use the terminal monitor command.
D. Debug output is sent only to the console.

89. You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to
find the address?

A. Fly to Hawaii, console into the switch, then relax and have a drink with an umbrella in it.
B. Issue the show ip route command on the router connected to the switch.
C. Issue the show cdp neighbor command on the router connected to the switch.
D. Issue the show ip arp command on the router connected to the switch.
E. Issue the show cdp neighbors detail command on the router connected to the switch.

18 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com
90. What does the command confreg 0x2142 provide?

A. It is used to restart the router.


B. It is used to bypass the configuration in NVRAM.
C. It is used to enter ROM monitor mode.
D. It is used to view the lost password

91. Which command will copy the IOS to a backup host on your network?

A. transfer IOS to 172.16.10.1


B. copy run start
C. copy tftp flash
D. copy start tftp
E. copy flash tftp

92. You type the following into the router and reload. What will the router do?
Router(config)#boot system flash c2800nm-advsecurityk9-mz.151-4.M6.bin
Router(config)#config-register 0x2101
Router(config)#do sh ver [output cut] Configuration register is 0x2102 (will be 0x2101 at next reload)

A. The router will expand and run the c2800nm-advsecurityk9-mz.151-4.M6.bin IOS from flash memory.
B. The router will go into setup mode.
C. The router will load the mini-IOS from ROM.
D. The router will enter ROM monitor mode.

93. A network administrator wants to upgrade the IOS of a router without removing the image currently
installed. What command will display the amount of memory consumed by the current IOS image
and indicate whether there is enough room available to hold both the current and new images?

A. show version
B. show flash
C. show memory
D. show buffers
E. show running-config

19 Yoinsights Technologies Pvt. Ltd. Call Us: +91- 0261-6888890/8140206060


www.yoinsights.com; info@yoinsights.com

You might also like