Download cisco systems

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

AppleTalk wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Zigbee wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Distributed firewall wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

IEEE 1355 wikipedia , lookup

CAN bus wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Virtual LAN wikipedia , lookup

Internet protocol suite wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Transcript
8 Pages
Contestant Number_____________
Time_____________
Rank_____________
CISCO SYSTEMS
ADMINISTRATION (46)
Regional—2005
Objective Portion (50 @ 10 points each)
TOTAL POINTS
____________(500 pts.)
_________(500)
Failure to adhere to any of the following rules will result in disqualification:
1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification.
2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing
area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are
allowed in the testing area.
3. Electronic devices will be monitored according to ACT standards.
Maximum test time is 60 minutes
Do NOT open test booklet until instructed to do so.
Property of Business Professionals of America.
May be reproduced only for use in the Business Professionals of America
Workplace Skills Assessment Program regional competition.
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 2 of 8
Multiple Choice: Please choose the best answer for the following questions and mark it on the
Scantron form provided.
1.
You can configure PPP on which of the following types of physical interfaces?
A. Ethernet
B. Token Ring
C. Synchronous Serial
D. Console
2.
You are the network administrator for a medium size company. Your trainee is configuring a
router with both physical and logical interfaces. Your trainee asks you what factor determines the
OSPF router ID. What would you tell the trainee?
A. The highest network number of any interface.
B. The highest ip address of any logical interface.
C. The lowest ip address of any logical interface.
D. The lowest network number of any interface.
3.
Through the use of VLSM what is the most efficient mask on a serial point to point link on a
WAN link?
A. /26
B. /28
C /29
D. /30
4.
What statement is true of switches and bridges?
A. They decrease the number of collision domains.
B. They increase the number of broadcast domains.
C. They make forwarding decisions based on Layer 3 information.
D. They make forwarding decisions based on Layer 2 information.
5.
Which protocol is to encapsulate ISDN call setup and control information?
A. HDLC
B. SLIP
C. PPP
D. LAPD
6.
Which command is to add a port to VLAN 20 on a catalyst 2950 switch?
A. switchport access vlan 20
B. switchport add vlan 20
C. switchport vlan 20 access
D. switchport vlan 20 add
7.
Which protocol uses Network Control Protocols to encapsulate multiple protocols?
A. PPP
B. SLIP
C. HDLC
D. LAPD
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 3 of 8
8.
To create 475 hosts on each network using the network address 137.205.0.0, which subnet mask
should be used?
A. /30
B. /28
C. /25
D. /23
9.
What step is required to add a VLAN?
A. Assign a subnet to the VLAN.
B. Define the encapsulation type.
C. Add the desired switchports to the VLAN.
D. Add the VLAN to the STP domain.
10.
Which technique can be used with distance vector routing protocols to prevent regular update
messages from reinstating a failed route?
A. Poison Reverse
B. Holddown timers
C. Split horizon
D. Triggered updates
11.
Which layer of the OSI model provides connectivity and path selection between two end systems
where routing occurs?
A. physical layer
B. data link layer
C. network layer
D. transport layer
12.
Which layer of the OSI model describes the various types of networking media?
A. network layer
B. data link layer
C. physical layer
D. transport layer
13.
What is the order of the layers in the TCP/IP model?
A. network, internet, transport, application
B. network, data link, transport, a100pplication
C. physical, data link, transport, application
D. internet, data link, transport, application
14.
In the TCP/IP model, which layer would deal with reliability, flow control, and error correction?
A. transport
B. internet
C. network
D. application
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 4 of 8
15.
At which layer of the OSI model is the NIC located?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
16.
What does a switch use to make data forwarding decisions?
A. IP address
B. MAC address
C. network address
D. subnetwork address
17.
Routers operate primarily at what layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
18.
What data units are associated with OSI Layer 1?
A. bits
B. frames
C. packets
D. segments
19.
What is the opposition to the movement of electrons as they move through materials?
A. current
B. resistance
C. ohms
D. voltage
20.
If 4 hosts are connected to a hub, how many IP addresses are required for these 5 devices?
A. one
B. two
C. four
D. five
21.
What is propagation of a network signal?
A. travel
B. delay
C. attenuation
D. latency
22.
What is attenuation?
A. travel
B. delay
C. a signal losing strength to its surroundings
D. a signal gaining strength from its surroundings
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 5 of 8
23.
Which term best describes the delay of a network signal?
A. dispersion
B. jitter
C. latency
D. attenuation
24.
What is the maximum cable length of unshielded twisted pair (UTP), in meters?
A. 100
B. 185
C. 200
D. 500
25.
What is one advantage of using fiber optic cabling in networks?
A. cheap
B. easy to install
C. not susceptible to electromagnetic interference
D. it is available either with or without an outer shield
26.
What is the standard 10Base-T termination for the telecommunications outlet?
A. UTP 55
B. RJ-45
C. EIA 45
D. TIA 74
27.
How many collision domains exist in a network containing two hubs?
A. one
B. two
C. three
D. five
28.
What is the term used for separating collision domains with bridges, switches, and routers?
A. switching domains
B. extending domains
C. segmentation
D. fragmentation
29.
What section of the frame contains the information you want to send?
A. data field
B. FCS
C. address field
D. stop frame field
30.
Hexadecimal is used to represent what kind of addresses?
A. IP
B. MAC
C. Octal
D. Digital
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 6 of 8
31.
What is the Organizational Unique Identifier (OUI)?
A. all hex digits of a MAC address
B. the 1st 6 hex digits of a MAC address
C. the last 6 hex digits of a MAC address
D. the prefix to all network device model numbers
32.
What is the term used to describe the result of the layer 2 encapsulation process?
A. frame
B. segment
C. packet
D. data
33.
What is the most widely used local area network (LAN) technology?
A. Token Ring
B. Ethernet
C. ArcNet
D. FDDI
34.
Which LAN technology uses CSMA/CD?
A. Ethernet
B. Token Ring
C. FDDI
D. All of the above
35.
Which device can significantly reduce collisions?
A. hub
B. NIC
C. switch
D. transceiver
36.
Which best describes a network segment?
A. section of a network containing a predetermined number of addressable services
B. section of a network that is a logical grouping based on MAC addresses
C. section of a network that contains Token Ring topology
D. section of a network bounded by routers, switches, or bridges
37.
What network device is used in an extended star topology when the catchment area of one wiring
closet is not enough?
A. repeater
B. backoff
C. terminator
D. suppressor
38.
What is the purpose of the safety ground in a computer?
A. connects the hot wire to the chassis
B. prevents metal parts from discharging hazardous voltage through the chassis
C. connects the neutral wire to the chassis
D. prevents metal parts from becoming energized with a hazardous voltage
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 7 of 8
39.
What is the "one-hand rule?"
A. Only touch electrical devices with one hand at a time to prevent electricity from flowing
through the body.
B. When setting up the network only use one bare hand--always wear a glove on at least one hand.
C. When using tools that are not insulated only use one hand, hold onto a ground with the other
hand.
D. There is no such rule
40.
What is a rough diagram that shows where the cable runs are located called?
A. cut sheet
B. sketch
C. cable plan
D. cabling route
41.
What kind of a cable must you use when laying cable through spaces where air is circulated?
A. shielded
B. double coated
C. fire rated
D. unshielded
42.
If you have one wiring closet and you want to add more, what name is given to additional wiring
closets?
A. IDFs
B. MDFs
C. Extended Stars
D. POPs
43.
What is the first thing you should do if near-end crosstalk is detected?
A. Redo all connections at the patch panel.
B. Isolate which connection is the cause by running a TDR test.
C. Redo all connections at the cross connects.
D. Visually check the horizontal cabling.
44.
Which OSI layer adds an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
45.
What characteristic must hosts on a network possess in order to communicate directly?
A. same vendor code
B. same network ID
C. same MAC address
D. separate subnets
CISCO SYSTEMS ADMINISTRATION
REGIONAL 2005
PAGE 8 of 8
46.
Which of the following is the approximate number of hosts supported in a Class B unsubnetted
network?
A. 254
B. 2024
C. 65 thousand
D. 16 million
47.
Which of the following represents the use of binary ones in a subnet mask?
A. host bits
B. subnet bits
C. network bits
D. subnet and network bits
48.
Which of the following contains a unique network number that is used in routing?
A. MAC address
B. physical address
C. IP address
D. NIC card
49.
When configuring a host computer, which of the following describes the router interface that
connects to the same network segment?
A. default interface
B. default gateway
C. default port
D. default subnet
50.
What do routers use to exchange routing tables and share route information?
A. routed protocols
B. transport protocols
C. routing protocols
D. UDP protocols