* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download cisco systems
Asynchronous Transfer Mode wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Virtual LAN wikipedia , lookup
Internet protocol suite wikipedia , lookup
UniPro protocol stack wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
8 Pages Contestant Number_____________ Time_____________ Rank_____________ CISCO SYSTEMS ADMINISTRATION (46) Regional—2005 Objective Portion (50 @ 10 points each) TOTAL POINTS ____________(500 pts.) _________(500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. Maximum test time is 60 minutes Do NOT open test booklet until instructed to do so. Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program regional competition. CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 2 of 8 Multiple Choice: Please choose the best answer for the following questions and mark it on the Scantron form provided. 1. You can configure PPP on which of the following types of physical interfaces? A. Ethernet B. Token Ring C. Synchronous Serial D. Console 2. You are the network administrator for a medium size company. Your trainee is configuring a router with both physical and logical interfaces. Your trainee asks you what factor determines the OSPF router ID. What would you tell the trainee? A. The highest network number of any interface. B. The highest ip address of any logical interface. C. The lowest ip address of any logical interface. D. The lowest network number of any interface. 3. Through the use of VLSM what is the most efficient mask on a serial point to point link on a WAN link? A. /26 B. /28 C /29 D. /30 4. What statement is true of switches and bridges? A. They decrease the number of collision domains. B. They increase the number of broadcast domains. C. They make forwarding decisions based on Layer 3 information. D. They make forwarding decisions based on Layer 2 information. 5. Which protocol is to encapsulate ISDN call setup and control information? A. HDLC B. SLIP C. PPP D. LAPD 6. Which command is to add a port to VLAN 20 on a catalyst 2950 switch? A. switchport access vlan 20 B. switchport add vlan 20 C. switchport vlan 20 access D. switchport vlan 20 add 7. Which protocol uses Network Control Protocols to encapsulate multiple protocols? A. PPP B. SLIP C. HDLC D. LAPD CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 3 of 8 8. To create 475 hosts on each network using the network address 137.205.0.0, which subnet mask should be used? A. /30 B. /28 C. /25 D. /23 9. What step is required to add a VLAN? A. Assign a subnet to the VLAN. B. Define the encapsulation type. C. Add the desired switchports to the VLAN. D. Add the VLAN to the STP domain. 10. Which technique can be used with distance vector routing protocols to prevent regular update messages from reinstating a failed route? A. Poison Reverse B. Holddown timers C. Split horizon D. Triggered updates 11. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? A. physical layer B. data link layer C. network layer D. transport layer 12. Which layer of the OSI model describes the various types of networking media? A. network layer B. data link layer C. physical layer D. transport layer 13. What is the order of the layers in the TCP/IP model? A. network, internet, transport, application B. network, data link, transport, a100pplication C. physical, data link, transport, application D. internet, data link, transport, application 14. In the TCP/IP model, which layer would deal with reliability, flow control, and error correction? A. transport B. internet C. network D. application CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 4 of 8 15. At which layer of the OSI model is the NIC located? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 16. What does a switch use to make data forwarding decisions? A. IP address B. MAC address C. network address D. subnetwork address 17. Routers operate primarily at what layer of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 18. What data units are associated with OSI Layer 1? A. bits B. frames C. packets D. segments 19. What is the opposition to the movement of electrons as they move through materials? A. current B. resistance C. ohms D. voltage 20. If 4 hosts are connected to a hub, how many IP addresses are required for these 5 devices? A. one B. two C. four D. five 21. What is propagation of a network signal? A. travel B. delay C. attenuation D. latency 22. What is attenuation? A. travel B. delay C. a signal losing strength to its surroundings D. a signal gaining strength from its surroundings CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 5 of 8 23. Which term best describes the delay of a network signal? A. dispersion B. jitter C. latency D. attenuation 24. What is the maximum cable length of unshielded twisted pair (UTP), in meters? A. 100 B. 185 C. 200 D. 500 25. What is one advantage of using fiber optic cabling in networks? A. cheap B. easy to install C. not susceptible to electromagnetic interference D. it is available either with or without an outer shield 26. What is the standard 10Base-T termination for the telecommunications outlet? A. UTP 55 B. RJ-45 C. EIA 45 D. TIA 74 27. How many collision domains exist in a network containing two hubs? A. one B. two C. three D. five 28. What is the term used for separating collision domains with bridges, switches, and routers? A. switching domains B. extending domains C. segmentation D. fragmentation 29. What section of the frame contains the information you want to send? A. data field B. FCS C. address field D. stop frame field 30. Hexadecimal is used to represent what kind of addresses? A. IP B. MAC C. Octal D. Digital CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 6 of 8 31. What is the Organizational Unique Identifier (OUI)? A. all hex digits of a MAC address B. the 1st 6 hex digits of a MAC address C. the last 6 hex digits of a MAC address D. the prefix to all network device model numbers 32. What is the term used to describe the result of the layer 2 encapsulation process? A. frame B. segment C. packet D. data 33. What is the most widely used local area network (LAN) technology? A. Token Ring B. Ethernet C. ArcNet D. FDDI 34. Which LAN technology uses CSMA/CD? A. Ethernet B. Token Ring C. FDDI D. All of the above 35. Which device can significantly reduce collisions? A. hub B. NIC C. switch D. transceiver 36. Which best describes a network segment? A. section of a network containing a predetermined number of addressable services B. section of a network that is a logical grouping based on MAC addresses C. section of a network that contains Token Ring topology D. section of a network bounded by routers, switches, or bridges 37. What network device is used in an extended star topology when the catchment area of one wiring closet is not enough? A. repeater B. backoff C. terminator D. suppressor 38. What is the purpose of the safety ground in a computer? A. connects the hot wire to the chassis B. prevents metal parts from discharging hazardous voltage through the chassis C. connects the neutral wire to the chassis D. prevents metal parts from becoming energized with a hazardous voltage CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 7 of 8 39. What is the "one-hand rule?" A. Only touch electrical devices with one hand at a time to prevent electricity from flowing through the body. B. When setting up the network only use one bare hand--always wear a glove on at least one hand. C. When using tools that are not insulated only use one hand, hold onto a ground with the other hand. D. There is no such rule 40. What is a rough diagram that shows where the cable runs are located called? A. cut sheet B. sketch C. cable plan D. cabling route 41. What kind of a cable must you use when laying cable through spaces where air is circulated? A. shielded B. double coated C. fire rated D. unshielded 42. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? A. IDFs B. MDFs C. Extended Stars D. POPs 43. What is the first thing you should do if near-end crosstalk is detected? A. Redo all connections at the patch panel. B. Isolate which connection is the cause by running a TDR test. C. Redo all connections at the cross connects. D. Visually check the horizontal cabling. 44. Which OSI layer adds an IP header? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 45. What characteristic must hosts on a network possess in order to communicate directly? A. same vendor code B. same network ID C. same MAC address D. separate subnets CISCO SYSTEMS ADMINISTRATION REGIONAL 2005 PAGE 8 of 8 46. Which of the following is the approximate number of hosts supported in a Class B unsubnetted network? A. 254 B. 2024 C. 65 thousand D. 16 million 47. Which of the following represents the use of binary ones in a subnet mask? A. host bits B. subnet bits C. network bits D. subnet and network bits 48. Which of the following contains a unique network number that is used in routing? A. MAC address B. physical address C. IP address D. NIC card 49. When configuring a host computer, which of the following describes the router interface that connects to the same network segment? A. default interface B. default gateway C. default port D. default subnet 50. What do routers use to exchange routing tables and share route information? A. routed protocols B. transport protocols C. routing protocols D. UDP protocols