Download Examen CISCO CCNA Sem 3

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Distributed firewall wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer network wikipedia , lookup

Deep packet inspection wikipedia , lookup

Internet protocol suite wikipedia , lookup

Network tap wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Transcript
Examen CISCO CCNA Sem 3 , FINAL
56 intrebari, 100 p
You are logged in as alindeac
Question 1:
Which command will test the loopback
function on the NIC?
Question 5:
At what time interval does IGRP send
routing updates?
A. 120 seconds
B. 30 seconds
C. 60 seconds
D. 90 seconds
A. Ping 127.0.0.1
B. Telnet 127.0.0.1
C. Ping 127.0.0.0
D. Telnet 127.0.0.0
Question 6:
Which of the following is used to keep a
list of equipment repairs?
A. Security record
B. Software record
Question 2:
Which device is one of the most
common Layer 2 devices?
A. LAN switch
B. Active hub
C. Passive hub
D. Router
Question 3:
What is the term used when ports on a
switch are administratively assigned to a
VLAN?
A. Dynamic
B. Static
C. Default
D. Polled
Question 4:
What is used to alleviate congestion?
A. Install more hubs
B. Use an extended star
C. Use a bus topology
D. Increase the bandwidth
C. Maintenance record
D. Policy record
Question 7:
Which configuration command is used
to set the number of routes used for load
sharing?
A. ipx routing
B. ipx networks
C. ipx maximum-paths
D. router rip
Question 8:
What is correct regarding the node
number using Novell's IPX addressing
scheme?
A. 80 bits long
B. Written in decimal
C. Same as the MAC address
D. Number assigned by an
administrator
Question 9:
Which backup type does NOT reset the
archive bit and stores all files that have
been created and modified since the last
full backup?
A. Hierarchical
B. Differential
Question 14:
Which type of route is used when no
other routes are known to the
destination?
C. Copy
A. Static
D. Daily
B. Default
Question 10:
How often are RIP updates broadcast?
A. Every 15 seconds
C. Dynamic
D. Next available
You are logged in as alindeac
B. Every 30 seconds
C. Every 60 seconds
D. Every 90 seconds
Question 11:
What is the first step in LAN design?
A. Establish the design goals
B. Estimate the design cost
C. Determine the network users
D. Determine the physical size
Question 12:
A numbered access list in the range of
800-899 would be what type of access
list?
Question 15:
Entries made by an administrator to
manipulate a routing table are referred to
as which of the following?
A. Static routes
B. Dynamic routes
C. ARP tables
D. Routing tables
Question 16:
A peer-to-peer network is also known as
what type of network?
A. Client-server
B. Thin client
A. IPX standard
C. Workgroup
B. Appletalk
D. Home office
C. IP standard
D. IP extended
Question 13:
In an access list, what word can replace
0.0.0.0 255.255.255.255?
A. Permit
Question 17:
What is a VLAN used to create?
A. Autonomous systems
B. Broadcast domains
C. Network Sectors
D. Virtual sections
B. Accept
C. Any
D. All
Question 18:
What describes the time necessary to
move a packet from the data link layer to
the physical layer?
A. Packet delay
B. Transmission time
C. Convergence
D. Queuing
B. Static
C. Port-centric
D. Default
Question 23:
What is a benefit of using VLANs?
A. Extended collision domains
Question 19:
A wildcard mask bit of "0" means that
the corresponding bit must be
_________.
B. Increased administration
C. Multiple cable runs
D. Tighter network security
A. matched
B. ignored
C. deleted
D. passed
Question 20:
Which wildcard mask would match the
host range for the subnet 192.16.5.32
/27?
A. 0.0.0.32
B. 0.0.0.63
C. 0.0.63.255
D. 0.0.0.31
Question 24:
Which OSI layer does a router use to
make its forwarding decisions?
A. 1
B. 2
C. 3
D. 4
Question 25:
Which routing protocol maintains a
complex database of topology
information and uses link-state
advertisements (LSAs)?
A. RIP
Question 21:
What allows a router to accept a packet
on one interface and forward it to
another interface?
B. IGRP
C. OSPF
D. EIGRP
A. Broadcast forwarding
B. Switching function
C. Filter and control function
D. Path determination
Question 22:
What is the term used when switch ports
are automatically assigned to a VLAN?
A. Dynamic
Question 26:
What do routers use to maintain tables?
A. Broadcast forwarding
B. IP Tunneling
C. Routed protocols
D. Routing protocols
Question 27:
A switch segments a LAN into which of
the following?
A. Microsegments
B. Workgroups
C. Broadcast domains
D. Access groups
Question 28:
Which represents the time it takes a
frame to travel from its source station to
its final destination on the network?
A. show ipx servers
B. show ipx route
C. show ipx traffic
D. show ipx interface
Question 32:
The star/extended star topology uses
what type of standard?
A. Token ring
B. Ethernet 802.3
A. Hop count
C. Ethernet 802.5
B. Bits per second
D. ARCNET
C. Latency
D. Tick time
You are logged in as alindeac
Question 29:
At which Layer of the OSI model would
flow control problems exist?
Question 33:
Which OSI layer is responsible for
finding the best path through the
internetwork?
A. 1
B. 2
A. Application
C. 3
B. Presentation
D. 4
C. Session
D. Transport
Question 30:
At which Layer of the OSI model would
you classify the loss of network
connectivity due to a loose patch cable?
A. Layer 7
B. Layer 5
C. Layer 3
D. Layer 1
Question 31:
Which IPX routing command is used to
show the number and type of packets
received and transmitted by the router?
Question 34:
Which metric is used in RIP?
A. Bandwidth
B. Delay
C. Hop count
D. Traffic load
Question 35:
Which of the following refers to the data
capacity of a link?
A. Bandwidth
B. Reliability
C. Hop Count
D. Delay
Question 36:
How are link-state routing updates
triggered?
B. Ticks and hop count
C. Distance and cost
D. Size and throughput
A. By timers
B. By topology changes
C. By protocol changes
D. By changing the NIC
Question 37:
What is the maximum size of an IPX
network number?
Question 41:
What does the split horizon rule help
prevent?
A. Static routes
B. Routing loops
C. Dynamic routes
D. Large ARP tables
A. Eight binary digits
B. Eight hexadecimal digits
C. Eight decimal digits
D. Eight octal digits
Question 42:
Which routing protocol is used to
communicate between autonomous
systems?
A. RIP
Question 38:
What effect does upgrading to a bridge
from a hub have on latency of the
network?
A. Decreases it
B. No effect
C. Eliminates it
D. Increases it
B. Ethernet
C. Token Ring
D. Exterior routing protocols
You are logged in as alindeac
Question 43:
Which of the following is another term
for shortest path first routing algorithm?
A. Source bridging
Question 39:
What happens to a packet that does not
match any of the tests in an access list?
A. It is discarded.
B. It is sent to the recipient.
C. It is stored until the access list is
updated.
D. It is returned to the sender.
Question 40:
Which metrics does Novell RIP use?
A. Bandwidth and delay
B. Store-and-forward
C. Distance-vector
D. Link state
Question 44:
Which type of access list would permit
or deny part of a protocol suite?
A. Standard
B. General
C. Specific
D. Extended
Question 45:
Internetwork design seeks to provide the
greatest availability for the least
_________.
A. design time
B. cost
C. network downtime
D. installation time
Question 46:
What is the recommended maximum
number of users in a peer-to-peer
network?
A. 5
B. 10
C. 15
D. 20
Question 47:
Where should extended access lists be
placed?
A. Close to the source
B. Close to the destination
C. On any router in the network
D. Midway between source and
destination
Question 48:
Which of the following are used with
VLANs to tighten network security?
A. Access control lists
B. Frame tagging
C. Source-bridging
D. ARP tables
Question 49:
What protocol is used to allow redundant
paths in a switched/bridged network?
A. RIP
B. Spanning Tree
C. IGRP
D. ISL
Question 50:
What is the encapsulation type on a
router for a Novell network running
version 3.12?
A. Novell-ether
B. ARPA
C. SNAP
D. SAP
Question 51:
Where should workgroup servers be
placed?
A. MDF
B. POP
C. VCC
D. IDF
Question 52:
Which of the following devices
establishes a bandwidth domain also
known as the collision domain?
A. Repeater
B. Switch
C. Active hub
D. Passive hub
Question 53:
What would the wildcard mask be to
deny traffic only on network
195.67.52.0?
A. 0.0.255.255
B. 255.255.255.0
C. 0.0.0.255
D. 255.255.0.0
Question 54:
Switches that receive the entire frame
before sending it, use what type of frame
forwarding?
A. Cut-through
B. Receive and send
C. Copy and send
D. Store-and-forward
Question 55:
What is the effect of a switch on
bandwidth?
A. Dedicates bandwidth
B. Shares bandwidth
C. Decreases bandwidth
D. Eliminates bandwidth
Question 56:
Select the correct IOS command for
configuring IGRP as the routing
protocol.
A. Router#router igrp 100
B. Router(config-router)>router
igrp 100
C. Router(config)#router igrp 100
D. Router(config-if)#set router igrp
100