Senin, 15 Desember 2008

CISCO CCNA Braindump #5

Below is a very easy to use shortcut that requires no binary math: Figure out the mask: /28 =

255.255.255.240 Figure out the subnet multiple: 256-240=16 Subnets are 16,32,48,64,80, etc

This is subnet 48, next subnet is 64, so the broadcast address is 63! Everything between the

subnet (48) and broadcast (63) are the valid hosts. In this example, based on the given mask, the

valid host ranges are 49-62.

30. What is a characteristic of Store and Forward switches? A.) They decrease latency. B.) They

forward the frame before it is completely read. C.) They are the same a Cut-Through switching.

D.) They read the entire frame and check CRC before forwarding. E.) They work at wire speed.

D

31. Given the following address: 157.89.8.64 255.255.0.0 which part represents the host portion

of the address? A.) 0.89.8.64 B.) 0.0.8.64 C.) 157.89.0.0 D.) 157.0.0.0 E.) 0.0.0.64

B Using the subnet mask 255.255.0.0, the first 16 bits represent the network, the last 16 bits

represent the host.

32. Which ISDN specification series deals with Concepts and Terminology? A.) F-Series B.) ISeries

C.) World Series D.) 911-Series E.) Q-Series F.) J-Series

B The 2 most important ISDN specifications are Q & I: Q - Call setup and teardown. I - Concepts

and terminology.

33. Which command would change the Cisco Discovery Protocol (CDP) update to 90 second

intervals? A.) cdp router 90 B.) router cdp 90 C.) cdp timer 1.5 D.) set timer cdp=1.5 E.) cdp timer

90 F.) timer cdp 1.5

E

34. Which command will copy the routers configuration script from RAM to NVRAM? A.) copy

running-config startup-config B.) NVRAM is read-only, so this is not possible. C.) save ram nvram

D.) save ram E.) copy all

A

35. Which command listed below sets the banner message when someone connects to the

router? A.) description # B.) login banner # C.) banner # D.) login description # E.) message # F.)

banner motd #

F

36 What should be the first command to create an access-list that prevents all users on

subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere?

A.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet B.) access-list 101 deny tcp

10.10.128.0 0.0.192.255 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any

eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet E.) access-list 101

deny tcp 10.10.128.0 255.255.192.0 any eq telnet F.) access-list 101 deny tcp 10.10.128.0

0.0.127.255 any eq telnet

D Wildcard masks for an entire subnet are easy to figure out (shortcut): Local Broadcast - Subnet

Mask = Inverted Wildcard Masks 255.255.255.255 -255.255.192. 0 ----------------- 0. 0. 63.255

37. What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) IETF B.) ARPA

C.) SAP D.) Cisco E.) Gandalf5 F.) Q933A

D Local Management Interface (LMI) types are Cisco, ANSI, and Q933A.

38. Which OSI Reference Layer is concerned with path determination? A.) Network B.) Physical

C.) Transport D.) Session E.) Datalink

A The Network layer is where routing occurs. (If you don't get this question right, there's always a

job at McDonalds!!)

39. Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a

second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 2.2.2.2

255.255.255.0 B.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 C.) ip address 2.2.2.2 255.255.255.0

secondary D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip

address 2.2.2.2 /24

C

40. MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.)

Transport C.) Presentation D.) Network E.) Application F.) Datalink

C The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG. Encryption

can also occur at this layer.

41. Which global configuration command will tell the router to load the IOS from ROM at next

boot? A.) This can not be done, only the first file in flash can be used. B.) boot system flash

IOS_filename C.) config-register 0x2102 D.) boot system rom E.) boot system tftp IOS_filename

tftp_address

D

42. What is the default subnet mask for a TCP/IP Class B address? (2 answers) A.) 255.255.0.0

B.) /8 C.) 255.255.255.0 D.) /24 E.) /16 F.) 255.0.0.0

A E

43. Most routing protocols recognize that it is never useful to send information about a route back

out the direction from which the original packet came. This is an example of which routing

technology? A.) Split Horizon B.) LMI C.) SYN, ACK D.) DLCI E.) Poison Reverse F.) Triggered

Updates

A The golden rule of Split Horizon: Do not send any update packet back out the same interface

that it was received or learned from. Poison Reverse is typically used on larger networks, where a

more aggressive routing loop solution is required.

44. You want to set the telnet password to Boston. What would be the first command you need to

execute from global configuration mode? A.) enable password boston B.) login boston C.) login

password boston D.) set password=boston E.) password boston F.) line vty 0 4

F

45. Which command will start the process for creating a Cisco IOS file image backup to a network

file server? A.) copy ios tftp B.) copy ios network C.) copy tftp flash D.) copy flash tftp E.) copy ios

flash

D The IOS is stored in flash. The command format is: copy [source] [destination]

46. How do you determine which standard IP access lists are applied to interface E0 ? A.) show ip

access-list B.) show access-lists C.) show ip interface e0 D.) show interface e0 E.) show accesslist

e0

C To see which specific protocol access-lists are bound to the interface, Show ip int e0 or Show

ipx int e0 The command 'show access-lists' will display all access lists that exist, not just the ones

bound to a certian interface.

47. The Cisco Discovery Protocol (CDP) uses advertisements and discoveries. How does it send

this information? A.) Over a SNAP-capable link. B.) Layer 3 broadcast. C.) CDP does not use

advertisements. D.) Layer 2 multicast. E.) Layer 4 TCP. F.) SAP.

A D The Cisco proprietary protocol uses multicast, so that only other Cisco devices will listen to

these packets. CDP requires a SNAP-capable link to transmit.

48. In the TCP/IP protocol stack, there are five classes of addresses. Which class is used for

testing? A.) B B.) A C.) D D.) C E.) E

E A,B,C are valid for use on the internet D is multicast E is for research

49. Which subnet is the host 200.1.1.67 /26 on? A.) 200.1.1.32 B.) 200.1.1.128 C.) 200.1.1.0 D.)

200.1.1.16 E.) 200.1.1.64 E Shorthand notation /26 = 2 bits in the last octet = decimal

255.255.255.192 Shortcut: 256 - 192 = 64. Valid subnets are multiples of 64. (64, 128, 192, 256).

The closest value to 67 is between 64 (the network) and 127 (the broadcast).

50. The Datalink layer works with which of the following: A.) Bits B.) Packets C.) Frames D.)

Globules E.) Segments

Kevin

640-507

1. What are the valid Host ID's for 222.37.2.50 /24 ? A.) 222.37.2.48 - 222.37.2.66 B.) 222.37.2.49

- 222.37.2.62 C.) 222.37.2.0 - 222.37.2.255 D.) 222.37.0.0 - 222.37.255.254 E.) 222.37.2.1 -

222.37.2.254

D

2. Which commands listed below will move you from interface configuration mode back to global

configuration mode? A.) CTL+Z B.) CTL+F C.) exit D.) global E.) config t

C CTRL-Z and CTRL-C will abort you back to the root. Exit goes back one level.

3. You have a Unix server running the TFTP Daemon. What is the command to load a

configuration file from the TFTP server into the routers RAM? A.) copy tftp ram B.) copy tftp

running-config C.) read tftp D.) copy tftp startup-config E.) copy tftp nvram

B Remember RAM = RUNNING-CONFIG. All changes to RAM are immediate!

4. Given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which

portion represents the next hop TCP/IP address? A.) 125 B.) 3.3.3.0 C.) 255.255.255.0 D.) route

E.) 4.4.4.4

E Router(config)#ip route 3.3.3.0 255.255.255.0 ? A.B.C.D Forwarding router's address

5. In regards to the ISDN BRI standard, which channel is used for control? A.) E B.) Q C.) D D.) I

E.) B

C B is Bearer for Data (2 channels at 64kb each). D is for Control (16kb).

6. Which Distance Vector characteristic can help to speed up convergence? A.) Inverse ARP. B.)

Poison Reverse. C.) Triggered Updates. D.) Split Horizon. E.) Hold Down timers.

C Instead of waiting on a pre-set periodic interval (before sending the routing table), DV routing

protocols can send triggered updates to immediately notify the neighbor routers. Hold down

timers, Poison Reverse, and Split Horizon are features that are used to avoid routing loops.

7. What command would show the current configuration register settings? A.) show running-config

B.) show startup-config C.) show nvram D.) show ram E.) show version F.) show ios

E For most routers the configuration register settings are: 0x2102 normal operation (parse

NVRAM at startup), or 0x2142 password recovery (ignore NVRAM during startup).

8. What would the following command do?: 'Show Frame-Relay PVC' A.) Display LMI Info. B.) The

command is incomplete, and would be ignored. C.) Display all configured DLCI's. D.) Debug a

Frame-Relay Problem. E.) Show Virtual Links.

C The Permament Virtual Circuit (PVC) info is displayed along with the Data Link Connection

Identifiers (DLCI)'s.

9. Which of the following are examples of the Session Layer? (3 answers) A.) SQL B.) NFS C.) IP

D.) TCP E.) Netbios Names F.) Token Ring

A B E Controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain,

and synchronize communications between applications. Examples: SQL, RFC, RPC, X-Windows,

NetBIOS Names Layer 5 of the OSI reference model.

10. When editing a line in the CLI mode, what does 'CTRL-P' do? A.) Moves you to the next word.

B.) Moves you to the next command. C.) Moves you to the end of the line. D.) Moves you to the

beginning of the line. E.) Moves you to the previous command.

E

11. The Internet Control Message Protocol occurs at what layer of the seven layer model? A.)

Physical B.) Session C.) Datalink D.) Network E.) Presentation F.) Transport

D ICMP is used for error handling and testing at layer 3. Ping and traceroute are examples of

ICMP. Network LayerProvides path determination using a hierarchal logical address defined with a

network portion and node portion, net.node.Examples: IP, IPX.

12. Which command listed below enables load balancing over two multiple paths for IPX on a

Cisco router? A.) ipx routing 2 B.) ipx round-robin 2 C.) ipx maximum-paths 2 D.) ipx rip 2 E.) ipx

sap 2 F.) ipx gns 2

C The default IPX routing protocol is IPX-RIP. By default, RIP selects the best path, and keeps

only one route in its routing table. The 'IPX maximum-paths' command allows RIP to load balance

over up to 6 paths.

13. Which of the following is an example of the Physical Layer? A.) IP B.) LLC C.) SQL D.) DDP

E.) Ethernet

E

14. What class address is 193.1.3.4 ? A.) C B.) B C.) multi-cast D.) broadcast E.) A F.) D

A

15. Novell NetWare has an Ethernet frame type called Ethernet_802.3. What is the matching

Cisco command line keyword for this encapsulation method? A.) arpa B.) snap C.) novell-ether D.)

sap E.) dix F.) gns

C Novell 802.2 = sap (contains 802.2 LLC headers) Novell 802.3 = novell-ether (NetWare

proprietary) Ethernet_II = arpa (the Internet standard) snap = snap (field type set to 'AA')

16. What would be the first command from global configuration mode to perform the following: 1.

Enable IGRP on the router for interface E0 2. Tell IGRP to use an address of 157.89.4.4

255.255.255.0 3. Tell IGRP to provide routing updates for AS number 200? A.) router igrp

157.89.4.4 B.) network 157.89.4.0 255.255.255.1 C.) router igrp int e1 D.) router igrp 157.89.0.0

E.) network 157.89.4.0 F.) router igrp 200

F. You have to specify which routing protocol first. For IGRP you must also specify the

autonomous system number. Router(config)#router igrp ? <1-65535> Autonomous system number

17. From global configuration mode, which command will create subinterface #1 for serial 0? A.)

int sub serial 0 B.) int serial 0 subinterface 1 C.) int ss 0 D.) int s0.1 point-to-point E.) int serial 0

subinterface 0 F.) int s0

D. Command syntax for creating sub-interfaces:

18. The command 'ip host Dallas 157.89.8.64' maps the host name Dallas with its IP address.

What command would display all such mappings? A.) show dns B.) show dns entry dallas C.)

show neighbors D.) show hosts E.) show ip table F.) show dns cache

D Router#show hosts Host Flags Age Type Address(es) www.eku.edu (temp, OK) 0 IP 157.89.8.2

dallas (perm, OK) 0 IP 157.89.8.64 Perm - permament static entries Temp - temporary usually

resolved via DNS

19. The command 'show running-config' displays the configuration script in RAM, but what other

command could you use to show information about objects stored in RAM? A.) show startupconfig

B.) show all C.) show config D.) debug ram E.) show buffers F.) show start

E Packets are stored in memory locations called buffers during periods when the router becomes

over-loaded with other requests.

20. Which of the following are examples of the Datalink Layer? (2 answers) A.) SQL B.) IP C.)

MAC D.) TCP E.) LLC

C E MAC and LLC are the sublayers of the Datalink layer.

21. Which type of switching reads in the entire frame before forwarding it? A.) Fast Forward B.)

Tabling C.) Cut-Through D.) Store-and-Forward E.) Inverse ARP F.) Routing

D Store-and-Forward is slower, but it checks the frame for errors before forwarding. This can

actually help to improve overall network performance on noisy lines.

22. What is the standard ISDN term for a non-native analog telephone? A.) ET B.) LE C.) TE2 D.)

TE1 E.) TA C Terminal Equipment 2 (TE2) does not support native digital ISDN. The analog device

will require an external analog to digital converter.

23. Which layer of the 7 layer model is responsible for representing the application information

between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Physical

C.) Application D.) Network E.) Session F.) Presentation

F. Presentation Layer Accepts data from application layer and negotiates data representation,

syntax, compression and encryption. Examples: ASCII, EBCDIC, JPEG, GIF, PICT, MIDI, MPEG

24. How do you view all debugging that is currently enabled? A.) show running-config B.) show

startup-config C.) show debug D.) debug update E.) show flash F.) show version

C.

25. Which of the following is an example of the Network Layer? A.) SQL B.) LLC C.) TCP D.) IP E.)

Token Ring

D Most protocol suites have differnet OSI layer protocols within them. At layer 3, IP is for TCP/IP.

TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4.DDP is for Appletalk

26. Which type of switching is considered to be 'wire speed?' A.) Inverted B.) Layer 4 C.) Cut-

Through D.) Multiplexed E.) Layer 3 F.) Store and Forward

C

27. On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this

channel? A.) 1.544 Mbps B.) 2.048 Mbps C.) 128 Kbps D.) 16 Kbps E.) 64 Kbps

D

28 Which commands are valid to turn off all debugging? ( 2 answers) A.) clear logging B.) no

debug C.) no logging D.) clear debug E.) undebug all F.) no debug all

E F

29. Which of the following are valid Host ID's for 157.89.9.50 /28 (12 bits of subnetting)? A.)

157.89.9.49 - 157.89.9.64 B.) 157.89.0.0 - 157.89.255.255 C.) 157.89.9.0 - 157.89.9.255 D.)

157.89.9.32 - 157.89.9.63 E.) 157.89.9.49 - 157.89.9.62

E Below is a very easy to use shortcut that requires no binary math: Figure out the mask: /28 =

255.255.255.240 Figure out the subnet multiple: 256-240=16 Subnets are 16,32,48,64,80, etc This

is subnet 48, next subnet is 64, so the broadcast address is 63! Everything between the subnet

(48) and broadcast (63) are the valid hosts. In this example, based on the given mask, the valid

host ranges are 49-62.

30. What is a characteristic of Store and Forward switches? A.) They decrease latency. B.) They

forward the frame before it is completely read. C.) They are the same a Cut-Through switching. D.)

They read the entire frame and check CRC before forwarding. E.) They work at wire speed.

D

31. Given the following address: 157.89.8.64 255.255.0.0 which part represents the host portion of

the address? A.) 0.89.8.64 B.) 0.0.8.64 C.) 157.89.0.0 D.) 157.0.0.0 E.) 0.0.0.64

B Using the subnet mask 255.255.0.0, the first 16 bits represent the network, the last 16 bits

represent the host.

32. Which ISDN specification series deals with Concepts and Terminology? A.) F-Series B.) ISeries

C.) World Series D.) 911-Series E.) Q-Series F.) J-Series

B The 2 most important ISDN specifications are Q & I: Q - Call setup and teardown. I - Concepts

and terminology.

33. Which command would change the Cisco Discovery Protocol (CDP) update to 90 second

intervals? A.) cdp router 90 B.) router cdp 90 C.) cdp timer 1.5 D.) set timer cdp=1.5 E.) cdp timer

90 F.) timer cdp 1.5

E

34. Which command will copy the routers configuration script from RAM to NVRAM? A.) copy

running-config startup-config B.) NVRAM is read-only, so this is not possible. C.) save ram nvram

D.) save ram E.) copy all

A

35. Which command listed below sets the banner message when someone connects to the

router? A.) description # B.) login banner # C.) banner # D.) login description # E.) message # F.)

banner motd #

F

36 What should be the first command to create an access-list that prevents all users on

subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere?

A.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet B.) access-list 101 deny tcp

10.10.128.0 0.0.192.255 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any

eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet E.) access-list 101

deny tcp 10.10.128.0 255.255.192.0 any eq telnet F.) access-list 101 deny tcp 10.10.128.0

0.0.127.255 any eq telnet

D Wildcard masks for an entire subnet are easy to figure out (shortcut): Local Broadcast - Subnet

Mask = Inverted Wildcard Masks 255.255.255.255 -255.255.192. 0 ----------------- 0. 0. 63.255

37. What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) IETF B.) ARPA

C.) SAP D.) Cisco E.) Gandalf5 F.) Q933A

D Local Management Interface (LMI) types are Cisco, ANSI, and Q933A.

38. Which OSI Reference Layer is concerned with path determination? A.) Network B.) Physical

C.) Transport D.) Session E.) Datalink

A The Network layer is where routing occurs. (If you don't get this question right, there's always a

job at McDonalds!!)

39. Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a

second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 2.2.2.2

255.255.255.0 B.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 C.) ip address 2.2.2.2 255.255.255.0

secondary D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip

address 2.2.2.2 /24

C

40. MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.)

Transport C.) Presentation D.) Network E.) Application F.) Datalink

C The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG. Encryption

can also occur at this layer.

41. Which global configuration command will tell the router to load the IOS from ROM at next

boot? A.) This can not be done, only the first file in flash can be used. B.) boot system flash

IOS_filename C.) config-register 0x2102 D.) boot system rom E.) boot system tftp IOS_filename

tftp_address

D

42. What is the default subnet mask for a TCP/IP Class B address? (2 answers) A.) 255.255.0.0

B.) /8 C.) 255.255.255.0 D.) /24 E.) /16 F.) 255.0.0.0

A E

43. Most routing protocols recognize that it is never useful to send information about a route back

out the direction from which the original packet came. This is an example of which routing

technology? A.) Split Horizon B.) LMI C.) SYN, ACK D.) DLCI E.) Poison Reverse F.) Triggered

Updates

A The golden rule of Split Horizon: Do not send any update packet back out the same interface

that it was received or learned from. Poison Reverse is typically used on larger networks, where a

more aggressive routing loop solution is required.

44. You want to set the telnet password to Boston. What would be the first command you need to

execute from global configuration mode? A.) enable password boston B.) login boston C.) login

password boston D.) set password=boston E.) password boston F.) line vty 0 4

F

45. Which command will start the process for creating a Cisco IOS file image backup to a network

file server? A.) copy ios tftp B.) copy ios network C.) copy tftp flash D.) copy flash tftp E.) copy ios

flash

D The IOS is stored in flash. The command format is: copy [source] [destination]

46. How do you determine which standard IP access lists are applied to interface E0 ? A.) show ip

access-list B.) show access-lists C.) show ip interface e0 D.) show interface e0 E.) show accesslist

e0

C To see which specific protocol access-lists are bound to the interface, Show ip int e0 or Show

ipx int e0 The command 'show access-lists' will display all access lists that exist, not just the ones

bound to a certian interface.

47. The Cisco Discovery Protocol (CDP) uses advertisements and discoveries. How does it send

this information? A.) Over a SNAP-capable link. B.) Layer 3 broadcast. C.) CDP does not use

advertisements. D.) Layer 2 multicast. E.) Layer 4 TCP. F.) SAP.

A D The Cisco proprietary protocol uses multicast, so that only other Cisco devices will listen to

these packets. CDP requires a SNAP-capable link to transmit.

48. In the TCP/IP protocol stack, there are five classes of addresses. Which class is used for

testing? A.) B B.) A C.) D D.) C E.) E

E A,B,C are valid for use on the internet D is multicast E is for research

49. Which subnet is the host 200.1.1.67 /26 on? A.) 200.1.1.32 B.) 200.1.1.128 C.) 200.1.1.0 D.)

200.1.1.16 E.) 200.1.1.64 E Shorthand notation /26 = 2 bits in the last octet = decimal

255.255.255.192 Shortcut: 256 - 192 = 64. Valid subnets are multiples of 64. (64, 128, 192, 256).

The closest value to 67 is between 64 (the network) and 127 (the broadcast).

50. The Datalink layer works with which of the following: A.) Bits B.) Packets C.) Frames D.)

Globules E.) Segments

C Physical - bits Datalink - frames Network - packe

Tidak ada komentar:

Posting Komentar