Professional Documents
Culture Documents
10. Which network topology design has a centralized switch connecting all of the devices?
A. Star topology
B. Full mesh topology
C. Partial mesh topology
D. Hybrid topology
12. Which cable type would you use to connect a switch to a switch?
A. Straight-through cable
B. Crossover cable
C. Rolled cable
D. Shielded cable
13. Which type of cable would be used to connect a computer to a switch for management of the
switch?
A. Straight-through cable
B. Crossover cable
C. Rolled cable
D. Shielded cable
15. What layer of the DoD model is equivalent to the Transport layer of the OSI model?
Answer:
The four layers of the TCP/IP stack (also called the DoD model) are Application/Process,
Host-to-Host, Internet, and Network Access.
The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
18. How do you find the network address from a listed IP address?
Answer: Step1: Write the given IP address in binary format.
Step 2: Write the subnet mask in binary form.
Step 3: Perform the logical ANDing operation between the corresponding octets of the IP address
and the subnet mask.
Step 4: Convert the result back to the decimal format and this will be the network address
19. How do you find the broadcast address from a listed IP address?
Answer: The lowest address of the subnet your IP address falls in is the network address.
The highest address in the subnet your IP address falls in is the broadcast address.
23. What are all the available characters that you can use in hexadecimal addressing?
Answer: To address the two-digit decimal values, the alphabetic characters A, B, C, D, E, and F.
24. The four layers of the DoD model are Process/Application, Host-to-Host, Internet, and Network
Access. Identify the layer of the DoD model on which each of these protocols operates.
(Internet Protocol (IP), Telnet, FTP, SNMP, DNS, ARP, ICMP, HTTP, SMTP & Bootp)
Answer:
Application layer: SMTP, TELNET, FTP, HTTP, DNS
Internet layer: ICMP, ARP, SNMP, IP
28. Which of the following Application layer protocols sets up a secure session that’s similar to Telnet?
A.Remote Assistance
B. DNS
C. DHCP
D.SSH
29. Which of the following mechanisms is used by the client to avoid a duplicate IP address during the
DHCP process?
A. Ping
B. Traceroute
C. Gratuitous ARP
D. Pathping
30. What protocol is used to find the hardware address of a local device?
A. ARP
B. ICMP
C. Bootp
31. Which of the following are layers in the TCP/IP model? (Choose three.)
A. Application
B. Session
C. Transport
D. Internet
E. Data Link
F. Physical
32. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
33. Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses ff:ff:ff:ff:ff:ff as a layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer 2 destination address.
36. The following illustration shows a data structure header. What protocol is this header from?
A. IP
B. ICMP
C. TCP
D. UDP
E. ARP
F. RARP
37. If you use either Telnet or FTP, what layer are you using to generate the data?
A. Application
B. Presentation
C. Session
38. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is
equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
40. Which statements are true regarding ICMP packets? (Choose two.)
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.
42. Refer to the exhibit. A network administrator cannot establish a Telnet session with the indicated
router. What is the cause of this failure?
Answer:
The vty password is missing.
54. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce
the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
E. /31
A. 6
B. 12
C. 14
D. 30
56. In the following diagram, in order to have IP addressing that’s as efficient as possible, which network
should use a /29 mask?
A. A
B. B
C. C
D. D
57. To use VLSM, what capability must the routing protocols in use possess?
A. Support for multicast
B. Multiprotocol support
C. Transmission of subnet mask information
D. Support for unequal load balancing
58. What summary address would cover all the networks shown and advertise a single, efficient route to
Router B that won’t advertise more networks than needed?
A. 172.16.0.0/24
B. 72.16.1.0/24
C. 172.16.0.0/24
D. 172.16.0.0/20
E. 172.16.16.0/28
F. 172.16.0.0/27
60. If a host is configured with an incorrect default gateway and all the other computers and router are
known to be configured correctly, which of the following statements is TRUE?
61. Which of the following troubleshooting steps, if completed successfully, also confirms that the other
steps will succeed as well?
62. When a ping to the local host IP address fails, what can you assume?
63. When a ping to the local host IP address succeeds but a ping to the default gateway IP addressfails,
what can you rule out? (Choose all that apply.)
A. Corporate
B. LA
C. SF
D. NY
E. None
65. What network service is the most likely problem if you can ping a computer by IP address but not
by name?
A. DNS
B. DHCP
C. ARP
D. ICMP
66. When you issue the ping command, what protocol are you using?
A. DNS
B. DHCP
C. ARP
D. ICMP
67. Which of the following commands displays the networks traversed on a path to a network
destination?
A. ping
B. traceroute
C. pingroute
D. pathroute
A. traceroute
B. show ip route
C. ping
D. pathping
70. Which of the following network addresses correctly summarizes the three networks shown below
efficiently?
10.0.0.0/16
10.1.0.0/16
10.2.0.0/16
A. 10.0.0.0/15
B. 10.1.0.0/8
C. 10.0.0.0/14
D. 10.0.0.8/16
A. show ip arp
B. traceroute
C. arp -a
D. tracert
72. What switch must be added to the ipconfig command on a PC to verify DNS configuration?
A. /dns
B. -dns
C. /all
D. showall
73. Which of the following is the best summarization of the following networks: 192.168.128.015
through 192.168.159.0?
A. 192.168.0.0/24
B. 192.168.128.0/16
C. 192.168.128.0/19
D. 192.168.128.0/20
74. Which of the following is a standards-based protocol that provides dynamic network discovery?
A. DHCP
B. LLDP
C. DDNS
D. SSTP
E. CDP
76. You are troubleshooting a connectivity problem in your corporate network and want to isolate the
problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user
exec command should you issue?
A. Router>ping
B. Router>trace
C. Router>show ip route
D. Router>show interface
E. Router>show cdp neighbors
77. You copy a configuration from a network host to a router’s RAM. The configuration looks correct,
yet it is not working at all. What could the problem be?
78. In the following command, what does the IP address 10.10.10.254 refer to?
Router#config t
Router(config)#interface fa0/0
Router(config-if)#ip helper-address 10.10.10.254
79. The corporate office sends you a new router to connect, but upon connecting the console cable, you
see that there is already a configuration on the router. What should be done before a new
configuration is entered in the router?
A. show cdp
B. show cdp neighbors
C. show cdp neighbors detail
D. show neighbor detail
81. According to the output, what interface does SW-2 use to connect to SW-3?
A. Fas 0/1
B. Fas 0/16
C. Fas 0/2
D. Fas 0/5
82. Which of the following commands enables syslog on a Cisco device with debugging as the level ?
A. syslog 172.16.10.1
B. logging 172.16.10.1
C. remote console 172.16.10.1 syslog debugging
D. transmit console messages level 7 172.16.10.1
83. You save the configuration on a router with the copy running-config startup-config command and
reboot the router. The router, however, comes up with a blank configuration. What can the problem
be?
84. If you want to have more than one Telnet session open at the same time, what keystroke combination
would you use?
A. Tab+spacebar
B. Ctrl+X, then 6
C. Ctrl+Shift+X, then 6
D. Ctrl+Shift+6, then X
86. What information is displayed by the show hosts command? (Choose two.)
87. Which three commands can be used to check LAN connectivity problems on an enterprise switch?
(Choose three.)
A. show interfaces
B. show ip route
C. tracert
D. ping
E. dns lookups
88. You telnet into a remote device and type debug ip icmp, but no output from the debug command is
seen. What could the problem be?
89. You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to
find the address?
A. Fly to Hawaii, console into the switch, then relax and have a drink with an umbrella in it.
B. Issue the show ip route command on the router connected to the switch.
C. Issue the show cdp neighbor command on the router connected to the switch.
D. Issue the show ip arp command on the router connected to the switch.
E. Issue the show cdp neighbors detail command on the router connected to the switch.
91. Which command will copy the IOS to a backup host on your network?
92. You type the following into the router and reload. What will the router do?
Router(config)#boot system flash c2800nm-advsecurityk9-mz.151-4.M6.bin
Router(config)#config-register 0x2101
Router(config)#do sh ver [output cut] Configuration register is 0x2102 (will be 0x2101 at next reload)
A. The router will expand and run the c2800nm-advsecurityk9-mz.151-4.M6.bin IOS from flash memory.
B. The router will go into setup mode.
C. The router will load the mini-IOS from ROM.
D. The router will enter ROM monitor mode.
93. A network administrator wants to upgrade the IOS of a router without removing the image currently
installed. What command will display the amount of memory consumed by the current IOS image
and indicate whether there is enough room available to hold both the current and new images?
A. show version
B. show flash
C. show memory
D. show buffers
E. show running-config