You are on page 1of 23
7ra2014 Internetworking nteniew Questers| Page 1 Routers operate at layer _LAN switches operate at layer . Ethernet hi ri layer Word pri in layer A3.3,1,7 B.3,2, 1. none C3217 D. 3, 3, 2, none View Answer |Answer B.3, 2, 1, none Routers operate at layer 3. LAN switches operate at layer 2 Ethernet hubs operate at layer 1. Word processing applications |communicate to the Application layer interface, but do not operate| lat layer 7, so the answer would be none. What are the three layers of the Cisco Hierarchical Model? View Answer |Answer [The three layers of the Cisco Hierarchical Model are he access layer [The distribution layer [The core layer Which layer 1 devi n nlarge the are vere asingle LAN segment? ‘Switch NIC ub Repeater RJ45 transceiver A.lonly B.land3 C.3and4 D.5 only View Answer [x |Answer Ic. 3 and 4 INot that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this for you. What functions does the Media Access Control (MAC) sublayer provide? View Answer htpslerackeinterdew comirternetwering-inteniev-questionsicat-147.Him 7ra2014 Internetworking nteniew Questers| Page 1 |Answer [The MAC sublayer specifies how data is placed and transported lover the physical wire. The LLC layer communicates with the Inetwork layer, but the MAC layer communicates downward directly to the physical layer. Physical addressing (MAC laddresses), network topologies, error notification, and delivery of Irrames are defined at this sublayer. * What is the function of the OSI model's physical layer (Layer 1)? Give some examples of physical layer implementations, View Answer lAnswer [The physical layer defines the physical medium. It defines the Imedia type, the connector type, and the signaling type (baseband ersus broadband). This includes voltage levels, physical data ates, and maximum cable lengths. The physical layer is responsible for converting frames into electronic bits of data, hich are then sent or received across the physical medium [Twisted pair, coaxial cable, and fiber-optic cable operate at this level. Other implementations at this layer are repeaters/hubs, RJ- (45. * Are network layer addresses physical or logical? View Answer |Answer Network layer addresses are logical addresses specific to the lhetwork layer protocol being run on the network. Each network layer protocol has a different addressing scheme. They are usually hierarchical and define networks first and then host or devices on hat network. An example of a network address is an IP address, hich is a 32-bit address often expressed in decimal format. 1192.168.0.1 is an example of an IP address in decimal format. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A.Layer 2 B. Layer 3 C.Layer 4 D. Layer 7 View Answer [Answer IC. Layer 4 [A reliable Transport layer connection uses acknowledgments to Imake sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses htpslerackeinterdew comirternetwering-inteniev-questionsicat-147.Him 7ra2014 irretrlng hteniew Qustors| Page lacknowledgments, sequencing, and flow control, which are |characteristics of the Transport layer (layer 4) What devices are used to break up collision and broadcast domains? View Answer |Answer [Switches and bridges are used to break up collision domains. They Icreate more collision domains and fewer collisions. Routers are lused to break up broadcast domains. They create more broadcast ldomains and smaller broadcast areas. What is the transport layer (Layer 4) responsible for? Give some examples of transport layer implementations. View Answer |Answer [The transport layer segments and reassembles data from upper- layer applications into data streams. It provides reliable data ransmission to upper layers. End-to-end communications, flow control, multiplexing, error detection and correction, and virtual {circuit management are typical transport layer functions. Some lexamples include TCP, UDP*, and SPX. Which command will copy the IOS to a backup host on your network? A. transfer JOS to 172.16.10.1 B. copy run start C. copy start tftp D. copy flash tftp View Answer |Answer D. copy flash tftp [To copy the IOS to a backup host, which is stored in flash memory by default, use the copy flash tftp command. In the OSI model, what are the responsibilities of the presentation layer (Layer 6)? Give some examples of this layer. View Answer [Answer [The application layer is the layer that is closest to the user. This Imeans that this layer interacts directly with the software lapplication. The application layer’s main function is to identify and lestablish communication partners, determine resource availability, land synchronize communication. |Some examples include the following: htpslerackeinterdew comirternetwering-inteniev-questionsicat-147.Him 7ra2014 Internetworking nteniew Questers| Page 1 Iso known as the translator, the presentation layer provides Icoding and conversion functions to application layer data. This guarantees that the application layer on another system can read \data transferred from the application layer of a different system. |Some examples of the presentation layer are: Compression, decompression, and encryption PEG, TIFF, GIFF, PICT, QuickTime, MPEG, and ASCII Youn her the IP re fa rem witch that i: located in Hawaii. What can you do to find the address? A. Issue the show ip arp command on the router connected to the switch, B. Issue the show ip route command on the router connected to t View Answer lanswer . Issue the show cdp neighbors detail command on the router |connected to the switch. [Although option A is certainly the "best" answer, unfortunately loption D will work just fine and your boss would probably prefer ou to use the show cdp neighbors detail command Which of the following describe router functions? A Packet switching B. Packet filtering C Internetwork communication D. Path selection E. All of the above View Answer |Answer E.All of the above Routers provide packet switching, packet filtering, internetwork communication, and path selection. You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What JOS user mmand shoul issue? A.Router> ping B. Router View Answer |Answer IB. Router> trace htpslerackeinterdew comirternetwering-inteniev-questionsicat-147.Him 46 7ra2014 Internetuerting rteniew Questers| Page 1 |The command traceroute (trace for short), which can be issued from user mode or privileged mode, is used to find the path a lpacket takes through an internetwork and will also show you here the packet stops because of an error on a router. What does the application layer (Layer 7) of the OSI model do, and what are some examples of this layer? View Answer lanswer [The application layer is the layer that is closest to the user. This means that this layer interacts directly with the software lapplication. The application layer's main function is to identify and lestablish communication partners, determine resource availability, land synchronize communication. Some examples include the following TCP/IP applications such as Telnet, File Transfer Protocol (FTP), [Simple Mail Transfer Protocol (SMTP), WWW, and HTTP. lOst applications such as Virtual Terminal Protocol, File [Transfer, Access, and Management (FTAM), and Common Management Information Protocol (CMIP). Which command loads a new version of the Cisco JOS into a router? A flash B. copy ftp flash C. copy flash tftp. D. copy tftp flash View Answer lanswer D. copy tftp flash iThe command copy tftp flash will allow you to copy a new IOS linto flash memory on your router. You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? A.You copied the wrong configuration into RAM. B. You copied the configuration into flash memory View Answer \Answer IC. The copy did not override the shutdown command in running- config htpslerackeinterdew comirternetwering-inteniev-questionsicat-147.Him 7ra2014 Internetworking nteniew Questers| Page 1 ISince the configuration looks correct, you probably didn't screw lup the copy job. However, when you perform a copy from a Inetwork host to a router, the interfaces are automatically shut down and need to be manually enabled with the no shutdown command. When data is encapsulated, which is the correct order? A. Data, frame, packet, segment, bit, B. ment ‘ket, fram C. Data, segment, packet, frame, bit D. Data, segment, frame, packet, bit View Answer |Answer IC. Data, segment, packet, frame, bit [The encapsulation method is data, segment, packet, frame, bit. * What is data encapsulation? View Answer |Answer A PDU can include different information as it goes up or down the |OSI model. Itis given a different name according to the linformation it is carrying (the layer itis at). When the transport layer receives upper layer data, it adds a TCP header to the data; his is called a segment. The segment is then passed to the Inetwork layer, and an IP header is added; thus, the data becomes al lpacket. The packet is passed to the data link layer, thus becoming la frame. This frame is then converted into bits and is passed lacross the network medium. This is data encapsulationApplication layer -- Data [Transport layer -- Segment Network layer — Packet [Data link layer -- Frame [There is also the Physical Layer -- Bits htpslerackrinter ew comirternetwering-inteniev-questionsicat-147.Him 7ra2014 Internetworking intendew Questers| Page 2 For what is the LLC sublayer responsible? View Answer |Answer [The Logical Link Control (802.2) sublayer is responsible for identifying different network layer protocols and then lencapsulating them to be transferred across the network. An LLC header tells the data link layer what to do with a packet after it is received What does the command o/r 0x2142 provide? A.Itis used to restart the router. B. It is used to bypass the configuration in NVRAM. C It is used to enter ROM Monitor mode. D. It is used to view the lost password, View Answer [Answer B. Its used to bypass the configuration in NVRAM. [The default configuration setting is 0x2102, which tells the router (0 load the IOS from flash and the configuration from NVRAM. (0x2142 tells the router to bypass the configuration in NVRAM so hat you can perform password recovery * Ifyou want to have more than one Telnet session open at the time, what keystroke combination woul 2 A. Tab+Spacebar B. Ctrl+X, then 6 C. Ctrl+Shift+X, then 6 D. Ctrl+Shift+6, then X View Answer |Answer D. Ctrl+Shift+6, then X [To keep open one or more Telnet sessions, use the Ctrl+Shift+6 land then X keystroke combination. © Inthe Cisco Hierarchical Model, what is the function of the access layer View Answer [Answer ISometimes referred to as the desktop layer, the access layer is the point at which users connect to the network through low-end |switches. Some functions of the access layer include: |Connectivity into the distribution layer [Shared Bandwidth htploraclrinterew-comirteretworing-intenievequestionsicat-147-Page-2him 7ra2014 Iernetvring heniow Questors| Page? IMAC Address filtering (switching) Segmentation You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful? FTP server software must be running on the router. TETP server software must be View Answer |Answer B.2,4 and5 Before you back up an IOS image to a laptop directly connected to ja router's Ethernet port, make sure the TFTP server software is Iunning on your laptop, that the Ethernet cable is a “crossover,” land that the laptop is in the same subnet as the router's Ethernet port, and then you can use the copy flash tftp command from your laptop. Why does the data communication industry use the layered OSI reference model? Itdivides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. Itenabl lipment from diff View Answer [Answer IB. 1 and4 [The main advantage of a layered model is that it can allow lapplication developers to change aspects of a program in just one layer of the layer model's specifications. Advantages of using the OSI layered model include, but are not limited to, the following: It divides the network communication process into smaller and lsimpler components, thus aiding compo- nent development, ldesign, and troubleshooting; it allows multiple-vendor development through standardization of network components; lit encourages industry standardization by defining what functions joccur at each layer of the model; it allows various types of network hardware and software to communicate; land it prevents changes in one layer from affecting other layers, Iso it does not hamper development. htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him a7 7ra2014 Internetworking intendew Questers| Page 2 * Which of the following are types of flow control? Buffering Cut-through Windowing Congestion avoidance. Aland 2 B13 and4 C.2 only D.3 only View Answer [Answer B.1,3 and4 jThe common types of flow control are buffering, windowing, and Icongestion avoidance. What is the purpose of flow control? A.To ensure that data is retransmitted if an acknowledgment is not received. B.Tor mbl ments in the corre der at th in: device. C.To provide a means for the receiver to govern the amount of View Answer [Answer IC. To provide a means for the receiver to govern the amount of ldata sent by the sender. Flow control allows the receiving device to control the transmitter so the receiving device's buffer does not overflow. You save the configuration on a router with the copy running- config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be? A.You didn't boot the router with the correct command. View Answer [Answer IC. The configuration register setting is incorrect. ff you save a configuration and reload the router and it comes up leither in setup mode or as a blank configuration, chances are you have the configuration register setting incorrect. * What are the functions of the session layer (Layer 5)? Give some examples. htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him 7ra2014 Internetworking intendew Questers| Page 2 View Answer |Answer [The session layer is responsible for creating, managing, and lending communication sessions between presentation layer lentities. These sessions consist of service requests and responses hat develop between applications located on different network \devices. Some examples include SQL, RPC, NFS, X Window ISystem, ZIP, NetBIOS names, and AppleTalk ASP. What is Internetworking? View Answer [Answer internetworking (a combination of the words inter ("between") land networking; it is not internet-working or international- Inetwork) is the practice of connecting a computer network with lother networks through the use of gateways that provide a common method of routing information packets between the Inetworks. The resulting system of interconnected networks is |called an internetwork, or simply an internet, How do routers function at the network layer of the OSI model? View Answer |Answer Routers learn, record, and maintain awareness of different lnetworks. They decide the best path to these networks and maintain this information in a routing table. [The routing table indudes the following: Network addresses, which are protocol-specific. If you are running| Imore than one protocol, you have a network address for each protocol. [The interface the router uses to route a packet to a different network. lA metric, which is the distance to a remote network or the weight lof the bandwidth, load, delay, and reliability of the path to the remote network. Routers create broadcast domains. One interface on a router creates a single broadcast domain and collision domain. However, lan interface on a switch creates only a single collision domain. You telnet to a router and make your necessary changes; now you want nd the Telns ion. Whi mmant in? A.close B. disable C. disconnect htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him 7ra2014 Internetworking intendew Questers| Page 2 D. exit View Answer |Answer D. exit ISince the question never mentioned anything about a suspended Isession, you can assume that the Telnet session is still open, and ou would just type exit to close the session The Ethernet and IEEE 802.3 standards define what three physical wiring standards that operate at 10 Mbps? View Answer lAnswer hese physical wiring standards operate at 10 Mbps: LOBase2 LOBaseS [LOBaseT The corporate office sends you a new router to connect, but upon ing the consol Me that there i configuration on the router. What should be done before a new figuration is entered in the router? A.RAM should be erased a View Answer |Answer IC. NVRAM should be erased and the router restarted. Before you start to configure the router, you should erase the INVRAM with the erase startup-config command and then reload he router using the reload command. Which command will show you the IOS version running on your router? A.sh IOS B. sh flash C. sh version D. sh running-config View Answer [Answer IC. sh version [The best answer is show version, which shows you the 10S file running currently on your router. The show flash command shows| ou the contents of flash memory, not which file is running. Areceiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him 87 7ra2014 Internetworking intendew Questers| Page 2 reliability of this communication session? A. Send a different source port number. B. Restart the virtual circuit. C. Decrease the View Answer [Answer D. Decrease the window size. [A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, he receiving host can slow down the transmitting host so the Ieceiving host does not overflow its buffers Whi if RJ4S UTP cabl nnect a PC's COM port to a router or switch console port? A. Straight-through B. Crossover cable C. Crossover with a CSU/DSU D. Rolled View Answer [Answer D. Rolled [To connect to a router or switch console port, you would use an IRJ45 UTP rolled cable. © What are collision domains? View Answer [Answer in Ethernet segments, devices connect to the same physical Imedium. Because of this, all devices receive all signals sent across he wire. If two devices send a packet at the same time, a collision loccurs. In the event of a collision, the two devices run a backoff lalgorithm and resend the packet. The devices retransmit up to 15 imes. The first station to detect a collision issues a jam signal. hen a jam signal is sent from a workstation, it affects all of the Imachines on the segment, not just the two that collided; when the jjam signal is on the wire, no workstations can transmit data. The Imore collisions that occur in a network, the slower it will be, because the devices will have to resend the packet. A collision ldomain defines a group of devices connected to the same physical Imedium. * Which three commands can be used to check LAN connectivity, problems on a router? htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him aor Ireretworing terdew Questers| Page? show interfaces show ip route tracert ping, dns lookups Al2and4 B.2 and 5 C.3and5 D.None of the above View Answer |Answer JA.1,2 and 4 |The tracert command is a Windows command and will not work lon a router! A router uses the traceroute command. htploraclrinterven-comirteretworiing-intenievequestionsicat-147-Page-2him W 7ra2014 Interetwecking itendew Questers| Page 3 Questions The configuration register setting of 0x2102 provides what function to a router? A Tells the router to boot into ROM monitor mode B. Provides password recovery C.Tells the router to look in NVRAM for the boot sequence D. Boots the IOS from a TFTP ser View Answer |Answer IC. Tells the router to look in NVRAM for the boot sequence [The default configuration setting of 0x2102 tells the router to look lin NVRAM for the boot sequence What is the responsibility of the data link layer (Layer 2)? View Answer |Answer [The data link layer provides functional and procedural means for Iconnectionless mode among network entities, and for connection Imode entities it provides the establishment, maintenance, and Irelease of data link connections among network entities and for he transfer of data link service data units. The data link layer translates messages from the network layer into bits for the lphysical layer, and it enables the network layer to control the interconnection of data circuits within the physical layer. Its Ispecifications define different network and protocol Icharacteristics, including physical addressing, error notification, lnetwork topology, and sequencing of frames. Data link protocols lprovide the delivery across individual links and are concerned lwith the different media types, such as 802.2 and 802.3. The data link layer is responsible for putting 1s and 0s into a logical group. [These 1s and Os are then put on the physical wire. Some examples lof data link layer implementations are IEEE 802.2/802.3, IEEE 802.5/802.2, packet trailer (for Ethernet, the FCS or CRC), FFDI, HDLC, and Frame Relay How to implement a network medium that is not susceptible to EML Which. of cabling should 2 A. Thicknet coax B. Thinnet coax Category 5 UTP cable htpslcrackrinterdew comirternetwering-intenievequestionsict-147-Page- him 7ra2014 Interetwecking itendew Questers| Page 3 D. Fib View Answer [Answer D. Fiber-optic cable Fiber-optic cable provides a more secure, long-distance cable that is not susceptible to EMI interference at high speeds. What are the decimal and hexadecimal equivalents for the binary number 10110111? A.69/0x2102 B.183/B7 C.173/A6_ D. 83/0xC5 View Answer [Answer iB. 183/B7 ‘ou must be able to take a binary number and convert it into both ldecimal and hexadecimal. To convert to decimal, just add up the lls using their values. The values that are turned on with the binary, Inumber of 10110111 are 128 + 32+ 16+4+2+1=183.To lget the hexadecimal equivalent, you need to break the eight binary] digits into nibbles (4 bits), 1011 and 0111. By add-ing up these alues, you get 11 and 7. In hexadecimal, 11 is B, so the answer is [OxB7. What 3 devices are used to segment a LAN? View Answer |Answer Router Switch Bridge How d acoll s a host on an Ethernet LAN know when to transmit after in has occurred: Ina CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. Ina CSMA/CD collision domain, stations must wait until the media is View Answer [Answer ID. 2 and S (Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all htiploraclrinterew.comirteretworing-intendevequestionsict-147-Page-3im a7 7ra2014 Iernetrlng heniow Qestors| Page’ {stations recognize the collision, After the jamming is complete, leach sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting land that they all have equal priority. What are broadcast domains? View Answer [Answer [A broadcast domain defines a group of devices that receive each jothers’ broadcast messages. As with collisions, the more broadcasts that occur on the network, the slower your network ill be. This is because every device that receives a broadcast mus’ lprocess it to see if the broadcast is intended for it. What are some reasons that the industry uses a layered model? View Answer |Answer Here are some reasons why the industry uses a layered model: it encourages industry standardization by defining what functions loccur at each level t allows vendors to modify or improve components at only one layer versus rewriting the whole protocol stack. t helps interoperability by defining standards for the operations a leach level ithelps with troubleshooting. men n of a di m hi which layer of the 1 model? A. Physical B. Data Link C. Network D. Transport View Answer lAnswer D. Transport [The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments. What is the difference between a routing protocol and a routed protoc: View Answer |Answer Routing protocols determine how to route traffic to the best location of a routed protocol. Examples of routing protocols are htiploraclrinterew.comirteretuoring-intenievequestionsicat-147-Page-3him ar 7ra2014 Interetwecking itendew Questers| Page 3 RIP, EIGRP, OSFP, and BGP. Examples of routed protocols are IP jand IPX. What information is displayed by the show hosts command? Temporary DNS entries The names of the routers created using the hostname command The IP addresses of workstations allowed to access the router Permanent name-to-address mappings created using th View Answer |Answer B.1and4 [The show hosts command provides information on temporary DNS entries and permanent name-to-address mappings created lusing the ip host command. Which fields are contained within an IEEE Ethernet frame header? Source and destination MAC address nd destination network addre: Source and destination MAC address and source and destination network address FCS field Aland4 B.2 only C2 View Answer [answer lA. 1 and 4 [An Ethernet frame has source and destination MAC addresses, an lEther-Type field to identify the Network layer protocol, the data, land the FCS field that holds the answer to the CRC. he function of the distribution layer in th Hierarchical Model? View Answer lAnswer [The distribution layer is also known as the workgroup layer. It is he demarcation point between the access and core layers of the Inetwork. Its primary function is to provide routing, filtering, and /AN access. The distribution layer determines how packets access) he core, so it is the layer at which to implement policy-based Iconnectivity. [Some functions include the following: htiploraclrinterew.comirteretuoring-intenievequestionsicat-147-Page-3him ar 7ra2014 Internetertng nteniew Questers| Page 3 (Collection point for access layer devices Broadcast and multicast domain segmentation Security and filtering services such as firewalls and access lists Providing translation between different media types inter-VLAN routing What is flow control, and what are the three methods of implementing View Answer lAnswer Flow control is the method of controlling the rate at which a computer sends data, thus preventing network congestion. [The three methods of implementing flow control are Buffering |Congestion avoidance indowing |Almost certain to be on the exam. Which of the following are uni haracteristics of half-duplex Ethernet when compared to full-duplex Ethernet? Half-duplex Ethernet operates in a shared collision domain. Half-duplex Ethernet operates in a private collision domain. Half-duplex Ethern View Answer |Answer Ic. 1 and 4 Unlike full duplex, half-duplex Ethernet operates in a shared {collision domain, and it has a lower effective throughput than full lduplex. How do the different layers of the OSI model communicate with each other? View Answer |Answer Each layer of the OSI model can communicate only with the layer labove it, below it, and parallel to it (a peer layer). For example, the presentation layer can communicate with only the application layer, session layer, and presentation layer on the machine it is communicating with. These layers communicate with each other lusing protocol data units (PDUs). These PDUs control information hat is added to the user data at each layer of the model. This linformation resides in fields called headers (the front of the data field) and trailers (the end of the data field). What should the configuration register value be after you successfully complete the password recovery procedure and htploraclrinteren-comirteretworing-interievequestionsicat-147-Page-3him 87 7ra2014 Interetwecking itendew Questers| Page 3 return the router to normal operation? A.0x2100 B.0x2101 C.0x2102 D.0x2142 View Answer |Answer Ic. ox2102 All Cisco routers have a default configuration register setting of lox2102, which tells the router to load the IOS from flash memory land the configuration from NVRAM. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be? AYou mi the show ip rij mmand firs B. IP addressing on the network is incorrect. C.You must use the terminal m View Answer [Answer Ic. You must use the terminal monitor command. [To see console messages through your Telnet session, you must enter the terminal monitor command. Anetwork administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold bot View Answer |Answer IB. show flash |The show flash command will provide you with the current IOS Iname and size and the size of flash memory. What ar‘ Ir for segmentation with a bridge? To add more broadcast domains. To create more collision domains. To add more bandwidth for users. To allow more broadcasts for users. A.lonly B2and3 htploraclrinterven-comirteretuoring-interievequestionsicat-147-Page-3im 67 7ra2014 Interetwecking itendew Questers| Page 3 C2and4 D.4 only View Answer |Answer IB. 2 and 3 Bridges break up collision domains, which allow more bandwidth ifor users. htploraclrinterven-comirteretuoring-interievequestionsicat-147-Page-3im W 7ra2014 Interetwecting intendew Questers| Page 4 * What are some network devices that operate at the data link layer? View Answer lanswer Bridges and switches are network devices that operate at the data link layer. Both devices filter traffic by MAC addresses. * Which of the following types of connections can use full duplex? Hub to hub witch to switch Host to host ‘Switch to hub Switch to host AL2and4 B.3 and 4 C.3and5 D23and5 View Answer lanswer D. 2,3 and 5 Hubs cannot run full-duplex Ethernet. Full duplex must be used on la point-to-point connection between two devices capable of Iunning full duplex. Switches and hosts can run full duplex lbetween each other, but a hub can never run full duplex. * Which commany the confi tion ri ing? A.show ip route B. show boot version C. show version D. show flash View Answer lAnswer Ic. show version [The show version command provides you with the current konfiguration register setting. * In addition to learning the remote network and providing a path to the network, what other functions do routers carry out? View Answer lAnswer Routers perform these tasks: Routers, by default, do not forward broadcasts or multicasts. Routers can perform bridging and routing functions. if a router has multiple paths to a destination, it can determine the lbest path to the destination. htiploraclrinterew.comirteretuoring-intenievequestionsicat-147-Page-3him 19 7ra2014 Iterretring hreniow Questors| Page Routers forward traffic based on Layer 3 destination addresses Routers can connect Virtual LANs (VLANs). Routers can provide quality of service for specified types of Inetwork traffic. Describe the function of the network layer (Layer 3), and give some examples of network layer implementations. View Answer |Answer [The network layer provides internetwork routing and logical Ihetwork addresses. It defines how to transport traffic between ldevices that are not locally attached. The network layer also supports connection-oriented and connectionless service from lhigher-layer protocols. Routers operate at the network layer. IP, PX, AppleTalk, and DDP are examples of network layer implementations. ‘The IEEE defines wh. ublayers of th a link layer? View Answer [Answer [The two sublayers of the data link layer are [The Logical Link Control (LLC) sublayer iThe Media Access Control (MAC) sublayer [These two sublayers provide physical media independence. What type of RJ45 UTP cable is used between switches? A. Straight-through B. Crossover cable C. Crossover with a CSU/DSU D. Crossover with a router in between the two switches View Answer |Answer B. Crossover cable [To connect two switches together, you would use a RJ45 UTP Icrossover cable. You are unsuccessful in telnetting into a remote device. What could the problem be? IP addresses are incorrect. Access control list is filtering Telnet. There is a defective serial cable. The VTY password is missing. A.lonly B.3 only htploraclrinterven-comirteretuoring-interievequestionsicat-147-Page-3im 20 7ra2014 Interetwecting intendew Questers| Page 4 C.2 and 4 only View Answer |Answer Ic. 2 and 4 only iThe best answers, the ones you need to remember, are that either lan access control list is filtering the Telnet session or the VTY lpassword is not set on the remote device. What is the role of the core layer in the Cisco Hierarchical Model? View Answer [answer [The core layer is the backbone of the network. Its main function is (0 switch traffic as fast as possible. Therefore, it should not perform any filtering to slow down traffic. The ISO's OSI Reference} Model contains seven layers. What are they? Include the layer Ihumber and name of each layer in your answer. [The seven layers of the OSI model are as follows Layer 7 - Application layer Layer 6 - Presentation layer lLayer 5 - Session layer Layer 4 - Transport layer lLayer 3 - Network layer Layer 2 - Data link layer lLayer 1 - Physical layer Which three statements are true about the operation of a full- duplex Ethernet network? There are no collisions in full-duplex mode. Adedicated switch port is required for each full-duplex node. Ethernet hub ports are preconfigured for full-duplex mode. View Answer |Answer la. 1, 2, and 5 Full-duplex means you are using both wire pairs simultaneously 10 send and receive data. You must have a dedicated switch port for each node, which means you will not have collisions. Both the host network card and the switch port must be capable and set to ork in full-duplex mode. htploraclrinterven-comirteretuoring-interievequestionsicat-147-Page-3im a9

You might also like