CCNA Exercise Lab 11

Questions to the Practice Exam

1. What protocol does PPP use to identify the Network layer protocol?

  1. NCP
  2. ISDN
  3. HDLC
  4. LCP
  5. Ans- D

2. You work in a large application-development company providing MIS services. This company has four 10Mbps shared hubs providing network services to an NT server. To meet the business requirements, you must provide many different types of hosts to allow the applica- tion developers to test the different applications they create. These hosts must be able to share data between each host and also send data to and from an enterprise server. The hosts run at 10Mbps and the server at 100Mbps. Some applications only need 3Mbps of bandwidth to run at any given time. What network recommendation would you give this company if money were an issue?

  1. Replace the 10Mbps hubs with 100Mbps
  2. Install a router and connect all the hubs into separate collision domains and one large broadcast
  3. Install a layer-2 switch and run a 10Mbps connection to the hosts and a 100Mbps connection to the
  4. Uses bridges to break up the collision domains and create one large broadcast
  5. Ans- C

3. Write the command to configure IPX routing on a Cisco router with two interfaces. The first interface is an Ethernet LAN and must support 802.3 and 802.2. The second interface is a WAN interface and uses HDLC encapsulation. Use any IPX network numbers that you wish.

Ans- #conf t
#ipx routing
#int eth0/0
#ipx network 133 encapsulation sap
#int fa0/0
#ipx network 134 encapsulation hdlc
#exit

4. What does the command routerA(config)#line cons 0 allow you to perform next?

  1. Set the Telnet
  2. Shut down the
  3. Set your console
  4. Disable console
  5. Ans- C

5. What ISDN command will bring up the second BRI at 50 per- cent load?

  1. load balance 50
  2. load share 50
  3. dialer load-threshold 125
  4. dialer idle-timeout 125
  5. Ans- A

6. What PPP protocol provides dynamic addressing, authentication, and multilink?

  1. NCP
  2. HDLC
  3. LCP
  4. X.25
  5. Ans- C

7. What command will display the line, protocol, DLCI, and LMI infor- mation of an interface?

  1. sh pvc
  2. show interface
  3. show frame-rely pvc
  4. sho runn
  5. Ans- B

8. What type of access list uses the numbers 1–99?

  1. IP standard
  2. IPX standard
  3. IP extended
  4. IPX extended
  5. IPX SAP filter
  6. Ans- A

9. What does the passive command provide to dynamic routing protocols?

  1. Stops an interface from sending or receiving periodic dynamic updates
  2. Stops an interface from sending periodic dynamic updates but still receives updates
  3. Stops the router from receiving any dynamic updates
  4. Stops the router from sending any dynamic updates
  5. Ans- B

10. Which protocol does Ping use?

  1. TCP
  2. ARP
  3. ICMP
  4. BootP
  5. Ans- C

11. Write the command that will show the IPX RIP and SAP information sent and received on a router.

Ans- #show ipx traffice

12. Which of the following commands will set your Telnet password on a Cisco router?

  1. Line telnet 0 4
  2. Line aux 0 4
  3. Line vty 0 4
  4. Line con 0
  5. Ans- C

13. Which of the following commands will create VLAN 5 with an ID of Marketing on a 1900 switch?

  1. 1900A#vlan 5 name Marketing
  2. 1900A(config)#vlan name Marketing 5
  3. 1900A(config)#vlan 5 name Marketing
  4. 1900A(config)# Marketing vlan 5
  5. Ans- C

14. Which port on a bridge is the root port?

  1. The port with the lowest cost to the root bridge
  2. The port with the highest cost to the root bridge
  3. Any active port
  4. Any 100Mbps port
  5. Ans- A

15. If you wanted to delete the configuration stored in NVRAM, what would you type?

  1. Erase startup
  2. Erase nvram
  3. Delete nvram
  4. Erase running
  5. Ans- D

16. Write the command to create a second IPX network running the SNAP frame type on Ethernet 0.

Ans- #conf t
#ipx network
#int eth0/0
#ipx network 2 encapsulation snap

17. Which class of IP address has the most host addresses available by default?

  1. A
  2. B
  3. C
  4. A and B
  5. Ans- A

18. How often are BPDU sent from a layer-2 device?

  1. Never
  2. Every two seconds
  3. Every 10 minutes
  4. Every 30 seconds
  5. Ans- D

19. Which of the following is true regarding VLANs? (Choose all that apply.)

  1. Two VLANs are configured by default on all Cisco
  2. VLANs only work if you have a complete Cisco switched internet- work. No off-brand switches are
  3. You should not have more than 10 switches in the same VTP domain.
  4. VTP is used to send VLAN information to switches in a configured VTP
  5. Ans- D

20. What LAN switch mode keeps CRC errors to a minimum but still has a fixed latency rate?

  1. STP
  2. Store and forward
  3. Cut-through
  4. FragmentFree
  5. Ans- B

21. How many broadcast domains are created when you segment a net- work with a 12-port switch?

  1. One
  2. Two
  3. Five
  4. 12
  5. Ans- A

22. What PDU is at the Transport layer?

  1. User data
  2. Session
  3. Segment
  4. Frame
  5. Ans- C

23. What protocols are used to configure trunking on a switch? (Choose all that apply.)

  1. Virtual Trunk Protocol
  2. VLAN
  3. Trunk
  4. ISL
  5. Ans- A

24. What is a stub network?

  1. A network with more than one exit point
  2. A network with more than one exit and entry point
  3. A network with only one entry and no exit point
  4. A network that has only one entry and exit
  5. Ans- D

25. Where is a hub specified in the OSI model?

  1. Session layer
  2. Physical layer
  3. Data Link layer
  4. Application layer
  5. Ans- B

26. If you wanted to configure ports on a Cisco switch, what are the different ways available to configure VLAN memberships? (Choose all that apply.)

  1. Via a DHCP server
  2. Statically
  3. Dynamically
  4. Via a VTP database
  5. Ans- C,D

27. What does the command show controllers s 0 provide?

  1. The type of serial port connection (e.g., Ethernet or Token Ring)
  2. The type of connection (e.g., DTE or DCE)
  3. The configuration of the interface including the IP address and clock rate
  4. The controlling processor of that interface
  5. Ans- D

28. What is a pre-10.3 IOS command that copies the contents of NVRAM to DRAM?

  1. config t
  2. config net
  3. config mem
  4. wr mem
  5. Ans- D

29. What is the main reason the OSI model was created?

  1. To create a layered model larger than the DoD model
  2. So application developers can change only one layer’s protocols at a time
  3. So different vendors’ equipment can work together
  4. So Cisco could use the model
  5. Ans- C

30. Which layer of the OSI model creates a virtual circuit between hosts before transmitting data?

  1. Application
  2. Session
  3. Transport
  4. Network
  5. Data Link
  6. Ans- B

31. Which protocol does DHCP use at the Transport layer?

  1. IP
  2. TCP
  3. UDP
  4. ARP
  5. Ans- C

32. How do you copy a router IOS to a TFTP host?

  1. copy run starting
  2. copy start running
  3. copy running tftp
  4. copy flash tftp
  5. Ans- D

33. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?

  1. RouterA(config)#bandwidth 64
  2. RouterA(config-if)#bandwidth 64000
  3. RouterA(config)#clockrate 64000
  4. RouterA(config-if)clock rate 64
  5. RouterA(config-if)clock rate 64000
  6. Ans- E

34. Which of the following is provided by the distribution layer? (Choose all that apply.)

  1. Breaking up of collision domains
  2. Routing
  3. Access lists
  4. VLANs
  5. Ans- B

35. Which of the following commands will set your Telnet password on a Cisco router?

  1. Line telnet 0 4
  2. Line aux 0 4
  3. Line vty 0 4
  4. Line con 0
  5. Ans- C

36. What command do you use to set the enable secret password on a Cisco router?

  1. RouterA(config)#enable password todd
  2. RouterA(config)#enable secret todd
  3. RouterA(config)#enable secret password todd
  4. RouterA(config-if)#enable secret todd
  5. Ans- C

37. Which protocol is used to find an Ethernet address from a known IP address?

  1. IP
  2. ARP
  3. RARP
  4. BootP
  5. Ans- B

38. Which command is used to upgrade an IOS on a Cisco router?

  1. copy tftp run
  2. copy tftp start
  3. config net
  4. copy tftp flash
  5. Ans- D

39. If you want to copy a configuration from the router’s DRAM to NVRAM, which command do you use?

  1. copy run start
  2. copy start run
  3. config net
  4. config mem
  5. copy flash nvram
  6. Ans- A

40. If an interface is administratively down, what is the problem?

  1. The interface is
  2. The interface is not connected to another
  3. There is no
  4. The interface is looped.
  5. Ans- C

41. If you are looking at an Ethernet analyzer and notice that the ISL frames are larger than a normal Ethernet frame, what size should you be seeing on the analyzer?

  1. 1518
  2. 1522
  3. 4202
  4. 8190
  5. Ans- A

42. How many collision domains are created when you segment a net- work with a 12-port switch?

  1. One
  2. Two
  3. Five
  4. 12
  5. Ans- D

43. What is the administrative distance of static routes by default?

  1. 0
  2. 1
  3. 10
  4. 100
  5. Ans- B

44. What was the first solution for counting to infinity?

  1. Holddowns
  2. Triggered updates
  3. Setting a maximum hop count
  4. Reverse poison
  5. Ans- D

45. Which protocol is used to send a Destination Network Unknown mes- sage back to originating hosts?

  1. TCP
  2. ARP
  3. ICMP
  4. BootP
  5. Ans- C

46. What is the distance of a 1000BaseSX MMF using a 62.5- and 50-micron core and a 780-nanometer laser?

  1. 100 meters
  2. 260 meters
  3. 400 meters
  4. 1000 feet

47. At which layer do packets occur?

  1. Session
  2. Transport
  3. Network
  4. Data Link
  5. Ans- C

48. Which of the following is not one of the advantages of using static routes over dynamic routing?

  1. Fast convergence
  2. No CPU usage
  3. No bandwidth usage
  4. Security
  5. Ans- D

49. How do you copy a configuration stored on a TFTP host to DRAM?

  1. copy run start
  2. copy start run
  3. copy tftp flash
  4. copy tftp running
  5. Ans- A

50. If you wanted to create dynamic VLANs, how would you do it?

  1. Use statical memberships
  2. Hire a junior administrator
  3. Via a DHCP server
  4. Via a VLAN Management Policy Server
  5. Ans- D

51. What type of access list uses the numbers 100–199?

  1. IP standard
  2. IPX standard
  3. IP extended
  4. IPX extended
  5. IPX SAP filter
  6. Ans- C

52. Write the command to add a subinterface to Ethernet 0 with the 802.3 frame type.

Ans- #conf t
#interface giabyteethernet 0/0.1
#802.3 vlan 10
#ip address . . . . . .

53. Which of the following routing protocols uses bandwidth and delay of the line when making routing decisions?

  1. RIP
  2. Static
  3. IGRP
  4. OSPF
  5. Ans- C

54. What type of access list uses the numbers 1000–1099?

  1. IP standard
  2. IPX standard
  3. IP extended
  4. IPX extended
  5. IPX SAP filter
  6. Ans- E

55. What is a pre-10.3 IOS command that lets you copy a configuration from a TFTP host to DRAM?

  1. config t
  2. config net
  3. config mem
  4. wr mem
  5. Ans- D

56. Which of the following commands is a way of turning on RIP routing?

  1. RouterA#routing rip
  2. Router(config)#routing rip
  3. RouterA#router rip
  4. Router(config)#router rip
  5. router(config-router)#router rip
  6. Ans- D

57. What type of access list uses the numbers 800–899?

  1. IP standard
  2. IPX standard
  3. IP extended
  4. IPX extended
  5. IPX SAP filter
  6. Ans- B

58. What two commands will show you all your configured PVCs?

  1. sh pvc
  2. show interface
  3. show frame-rely pvc
  4. sho runn
  5. Ans- B,D

59. If you connect a Cisco router and a 3Com router through a T-1, why won’t they work by default?

  1. Cisco and 3Com are not
  2. 3Com was purchased by Cisco and
  3. The serial encapsulations are not compatible by
  4. The Ethernet frame types are not compatible by

60. You have a large Ethernet network in your office. Which of the following is true regarding this network?

  1. You can use a FastEthernet full-duplex connection using
  2. You can use full duplex when connecting a point-to-point connection between two
  3. You can use store and forward with a full-duplex
  4. You can use cut-through with half
  5. Ans- B

61. You have large files that you need to transfer from your home to your remote corporate office. You need to do this periodically and quickly. What technology would be best suited for your situation?

  1. Frame Relay
  2. Ethernet
  3. ISDN
  4. Token Ring
  5. ATM
  6. Ans- A

62. Write the command to see the NetWare servers running on your network.

63. What protocol is used at layer 2 to help stop network loops?

  1. BPDU
  2. STP
  3. VLANs
  4. Switches
  5. Ans- B

64. Write the command to create a subinterface on Ethernet 0 that allows the Ethernet_II frame type.

Ans- #conf t
#ip routing
#vlan database
#vlan 1
Name vlan 1
#int fa0/0
#no switchport
#ip address 192.168.100.1 255.255.255.0
#switchport mode ethernet II
#no shut

65. What command would you use to verify your VLAN configuration on a 1900 switch?

  1. Show config
  2. Show vlan
  3. Show vlan info
  4. Sh startup-config
  5. Ans- B

66. BECN is used for what?

  1. PPP authentication
  2. ISDN BRI load balancing
  3. Frame Relay congestion control
  4. HDLC protocol identification of the Network layer
  5. Ans- C

67. Write the command to see the IPX routing table.

Ans- #show ipx routing

68. Which of the following is the valid host range for the IP address 192.168.168.188 255.255.255.192?

  1. 192.168.168.129–190
  2. 192.168.168.129–191
  3. 192.168.168.128–190
  4. 192.168.168.128–192
  5. Ans- A

69. What type of access list uses the numbers 900–999?

  1. IP standard
  2. IPX standard
  3. IP extended
  4. IPX extended
  5. IPX SAP filter
  6. Ans- D

70. In a network with dozens of switches, how many root bridges would you have?

  1. One
  2. Two
  3. Five
  4. 12
  5. Ans- A

Write My Essay Services