Jumat, 02 Januari 2009

A-CCNA 640-801

1. You work as network administrator at Quest4 Certification. Your trainee is configuring a router with both physical and logical interfaces. He asks you what factor determines the OSPF router ID.
What should you tell him?

A. The lowest network number of any interface.
B. The lowest IP address of any logical interface.
C. The lowest IP address of any physical interface.
D. The highest network number of any interface.
E. The highest IP address of any logical interface.
F. The highest IP address of any physical interface.

Ans: E

Explanation:
The OSPF topology database includes information about routers and the subnets, or links, to which they are attached. To identify the routers in the neighbor table’s topology database, OSPF uses a router ID (RID) for each router. A router’s OSPF RID is that router’s highest IP address on a physical interface when OSPF starts running.

Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. The highest IP address configured on the router is the router ID. If a loopback address is configured, then it is the router ID. In case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID is elected it doesn't change unless the IP address is removed or OSPF restarts.

2. Your Quest4 Certification trainee is configuring a router. In particular, he is examining a routing table that contains static, RIP, and IGRP routes for the same destination network with each set to its default administrative distance. He asks you which route will be used to forward data?

A. The IGRP route
B. The static route
C. The RIP route
D. All three will load balance.

Ans: B

Explanation:
To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a number that denotes how believable an entire routing protocol is on a single router. The lower the number, the better, or more believable the routing protocol.




















Router Type Administrative
Distance
Static 1
IGRP 100
RIP 120





7. David, your Quest4 Certification trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him?

A. Switches take less time to process frames than hubs take.
B. Switches do not forward broadcasts.
C. Hubs can filter frames.
D. Using hubs can increase the amount of bandwidth available to hosts.
E. Switches increase the number of collision domains in the network.

Ans: E

Explanation:
Switches use a couple of different types of internal processing variations. Almost of the more recently released switches use store-and-forward processing, but all three types of switching are supported in at least one type of currently available Cisco Switch.

  • Store-and-forward –The switch fully receives all bits in the frame (store) before forwarding the frame (forward).


  • Cut-through – The switch performs the address table lookup as soon as the destination address field in the header is received.


  • Fragment-free – This performs like cut-through switching, but the switch waits for 64 bytes to be received before forwarding the first bytes of the outgoing frame.


  • 8.Your boss at Quest4 Certification asks you about half-duplex and full-duplex Ethernet. What are unique for half-duplex Ethernet? (Choose two)

    A. Half-duplex Ethernet operates in a shared collision domain.
    B. Half-duplex Ethernet operates in a private collision domain.
    C. Half-duplex Ethernet has higher effective throughput.
    D. Half-duplex Ethernet has lower effective throughput.
    E. Half-duplex Ethernet operates in a private broadcast domain.

    Ans: A,D

    Explanation:
    A single device could not be sending a frame and receiving a frame at the same time because it would mean that a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is called half-duplex logic.



    Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full duplex means that an Ethernet card can send and receive concurrently.

    9. You work as a technician at Quest4 Certification. You are required to configure PPP on an interface on a Cisco router. A technician is configuring PPP on an interface.
    Which PPP authentication methods can you use? (Choose two)

    A. SSL
    B. VPN
    C. PAP
    D. LAPB
    E. CHAP
    F. SLIP

    Ans: C E

    Explanation:
    Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)
    authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method today because the identifying codes flowing over the link are created using a MD5 one-way hash, which is more secure than the clear-text passwords sent by PAP.


    11. A technician is configuring a router named Quest4 Certification2.
    Why does she use passive-interface command?

    A. Allows a routing protocol to forward updates out an interface that is missing its IP address.
    B. Allows a router to send routing updates on an interface but not receive updates via that interface.
    C. Allows an interface to remain up without receiving keepalives.
    D. Allows interfaces to share IP addresses.
    E. Allows a router to receive routing updates on an interface but not send updates via that interface.

    Ans: E

    Explanation:
    The passive-interface command is used to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while allowing updates to be exchanged normally over other interfaces.

    With most routing protocols, the passive-interface command restricts outgoing advertisements only. However, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, resulting in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while allowing incoming routing updates to be learnt normally from the neighbor.

    Reference:


    http://www.cisco.com/en/US/tech/tk365/tk207/technologies_tech_note09186a0080093f0a.shtml



    14. Your boss at Quest4 Certification asks you why you are using a router to segment the network at the main office.
    What are the benefits? What should you tell her? (Choose two)

    A. Filtering can occur based on Layer 3 information.
    B. Broadcasts are eliminated.
    C. Routers generally cost less than switches.
    D. Broadcasts are not forwarded across the router.
    E. Adding a router to the network decreases latency.

    Ans: A, D

    15. You work as a network technician at Quest4 Certification. You are required to divide the 172.12.0.0 network into subnets. Each submnet must have the capacity of 458 IP addresses.
    Furthermore, according to the requirement you must provide the maximum number of subnets.



    Which network mask should you use?

    A. Yes
    B. No

    Ans: A

    Answer - 255.255.254.0



    Explanation:
    To obtain 458 IP addresses the number of host bits will be 9. In this maximum 512 hosts can be assigned. Keep 9 bits for host means 4 th octet and last bit is 3 rd will be 0. This gives 255.255.254.0 is subnet mask.

    16. Your new Junior Quest4 Certification trainee Rutger has a problem with basic binary math.

    He must convert the binary number 10011101 into its decimal and hexadecimal equivalent.


    Which two numbers must Rutger provide? (Choose two)

    A. 159
    B. 157
    C. 185
    D. 0x9D
    E. 0xD9
    F. 0x159

    Ans: B D

    Explanation:
    10011101 = 157
    0x9D is ASCII Hexadecimal = 157

    Reference:


    http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_command_reference_chapter09186a008007fc95.html


    18. You are required to troubleshoot LAN connectivity on the Quest4 Certification main site in Toronto.
    Which router IOS commands would be useful for you? (Choose three)

    A. ping
    B. tracert
    C. ipconfig
    D. show ip route
    E. winipcfg
    F. show interfaces

    Ans: A,D,F

    20. Your Quest4 Certification trainee Tess wants to display the configuration register setting on her router.
    Which command should she use?

    A. show register
    B. show flash
    C. show boot
    D. show version

    Ans: D

    Explanation:

    To display the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images, use the show version command in EXEC mode.

    Example:

    The following is sample output from the show version command:



    Router1> show version
    Cisco Internetwork Operating System Software
    IOS (tm) 7200 Software (C7200-J-M), Experimental Version 11.3(19970915:164752) [
    hampton-nitro-baseline 249]
    Copyright (c) 1986-1997 by cisco Systems, Inc.
    Compiled Wed 08-Oct-97 06:39 by hampton
    Image text-base: 0x60008900, data-base: 0x60B98000
    ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE
    BOOTFLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fc
    1) Router1 uptime is 23 hours, 33 minutes
    System restarted by abort at PC 0x6022322C at 10:50:55 PDT Tue Oct 21 1997
    System image file is tftp://171.69.1.129/hampton/nitro/c7200-j-mz"
    cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory.
    R4700 processor, Implementation 33, Revision 1.0 (512KB Level 2 Cache)
    Last reset from power-on
    Bridging software.
    X.25 software, Version 3.0.0.
    SuperLAT software copyright 1990 by Meridian Technology Corp).
    TN3270 Emulation software.
    8 Ethernet/IEEE 802.3 interface(s)
    2 FastEthernet/IEEE 802.3 interface(s)
    4 Token Ring/IEEE 802.5 interface(s)
    4 Serial network interface(s)
    1 FDDI network interface(s)
    125K bytes of non-volatile configuration memory.
    1024K bytes of packet SRAM memory.
    20480K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).
    20480K bytes of Flash PCMCIA card at slot 1 (Sector size 128K).
    4096K bytes of Flash internal SIMM (Sector size 256K).
    Configuration register is 0x0


    Reference:

    http://www.cisco.com/en/US/products/hw/switches/ps679/products_configuration_guide_chapter09186a008007eec8.html



    21. You are configuring a subnet on the Quest4 Certification branch office in Berlin.
    You need to assign IP addresses to hosts in this subnet.
    You have been given the subnet mask of 255.255.255.224.
    Which IP address would be valid? (Choose three)

    A. 15.234.118.63
    B. 92.11.178.93
    C. 134.178.18.56
    D. 192.168.16.87
    E. 201.45.116.159
    F. 217.63.12.192

    Ans: B,C,D

    Explanation:

    B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)

    C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)

    D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95)


    22. You work as network administrator/technician at Quest4 Certification. You are configuring Frame Relay on a Cisco router.
    What is the default LMI (Local Management Interface) frame type transmitted by the Cisco router on a Frame Relay circuit?

    A. Q933a
    B. B8ZS
    C. IETF
    D. Cisco
    E. ANSI

    Ans: D

    Explanation:
























    Name

    Document

    IOS LMI-Type Parameter
    Cisco Proprietary cisco
    ANSI T1.617 Annex D ansi
    ITU Q.933. Annex A q.933a




    23. You have subnetted the 210.106.14.0 network with a /24 mask.
    Your boss at Quest4 Certification wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?

    A. 1 network with 254 hosts
    B. 2 networks with 128 hosts
    C. 4 networks with 64 hosts
    D. 6 networks with 30 hosts

    Ans: A

    24. Quest4 Certification , a fast growing company with one central headquarters site and 3 regional offices, is looking for a scalable WAN technology. Current plans include adding an additional 7 regional offices with all sites requiring continuous connectivity. The current HQ router has no free ports.

    Which of the following WAN technologies would meet Quest4 Certification's requirements?



    A. Dedicated PPP/HDLC links
    B. Frame Relay
    C. ISDN-BRI
    D. ADSL
    E. Broadband cable service

    Ans: D

    Explanation:
    ADSL work by using a modem and is always on. The question tells you that the HQ router has no free ports, so by using an ADSL modem, it will be the best choice for this question. The cable modem would also be a good choice, but without much security, the ADSL is the better answer.


    25. You work as a network technician at Quest4 Certification. You are configuring a E0 interface connected to the 192.168.1.8/29 LAN on a Cisco router.
    You apply the following access list to the interface.



  • access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any


  • access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any




  • What consequence will this access list have?

    A. All traffic will be allowed to exit E0 except FTP traffic.
    B. FTP traffic from 192.168.1.22 to any host will be denied.
    C. FTP traffic from 192.168.1.9 to any host will be denied.
    D. All traffic exiting E0 will be denied.
    E. All FTP traffic to network 192.168.1.8/29 from any host will be denied.

    Ans: D

    Explanation:
    By default access list is having implicit deny statement at the end. In this example there is no permit statement, so it will deny all traffic exiting E0 Interface.

    Incorrect answers:

    A: It will deny FTP and Telnet Traffic

    B,C,E: It will deny all traffic in addition to the condition mentioned in the answer. Because there is no permit statement at the end.

    26. Your Quest4 Certification trainee Charles is curios about characteristics of link-state routing protocols.
    What should you tell him? (Choose three)

    A. Packets are routed based upon the shortest path to the destination.
    B. Paths are chosen based upon the cost factor to the destination.
    C. The exchange of advertisement is triggered by a change in the network.
    D. In a multipoint network, all routers exchange routing tables directly with all other routers.
    E. Every router in an OSPF area is capable of representing the entire network topology.
    F. Only the designated router in an OSPF area is capable of representing the entire network topology.

    Ans: A,C,E

    Explanation:

    Open Shortest Path First

  • Each router discovers its neighbors on each interface. The list of neighbors is kept in a neighbor table.

  • Each router uses a reliable protocol to exchange topology information with its neighbors.

  • Each router places the learned topology information into its topology database.

  • Each router runs the SPF algorithm against its own topology database.

  • Each router runs the SPF algorithm against its own topology database to calculate the best routes to each subnet in the database.

  • Each router places the best route to each subnet into the IP routing table.


  • The following list points out some of the key features of OSPF:

  • Converges very quickly – from the point of recognizing a failure, it often can converge in less than 10 seconds.

  • Supports VLSM.

  • Uses short Hello messages on a short regular interval, with the absence of hello messages indicating that a neighbor is no longer reachable.

  • Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding,however, does not happened all at once, so the overhead s minimal.

  • Uses cost for the metric.


  • 27. As a network technician at Quest4 Certification you are configuring access lists on an interface of a Cisco router.
    You use multiple access lists.
    Which of the following statements are valid? (Select one)

    A. There is no limit to the number of access lists that can be applied to an interface, as long as they are
    applied in order from most specific to most general.
    B. Cisco IOS allows only one access list to be applied to an interface.
    C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.
    D. Up to three access lists per protocol can be applied to a single interface.
    E. No more than two access lists can be applied to a single interface.
    F. The maximum number allowed varies depending on the amount of RAM installed in the router.

    Ans: C


    28. You work as a network technician at Quest4 Certification. You are configuring a WAN link.
    Which are typical Layer 2 encapsulations for this link? (Choose three)

    A. Ethernet
    B. Frame Relay
    C. POTS
    D. HDLC
    E. PPP
    F. Token Ring

    Ans: B,D,E

    Explanation:
    WAN data-link protocols used on point-to-point serial links provide the basic function of data delivery across that one link. The two most popular WAN data-link protocols are High-Level Data Link Control (HDLC) and PPP.

    29. Roger is setting up WAN connectivity between the Quest4 Certification New York and the Quest4 Certification Tokyo offices. He uses two data link layer encapsulations, one for data and one for signaling.
    Which WAN Service does he use?

    A. ISDN
    B. Frame Relay
    C. ATM
    D. FDDI

    Ans: A

    Explanation:
  • ISDN Q.931 messages are used for signaling.

  • ISDN B channels are used to transport data.


  • 30. You have segmented a network into two separate segments, segment 1 and segment2, with a Cisco router. Your boss at Quest4 Certification is concerned about the cost, and wants to what the purpose of your action is.
    What should you tell him?

    A. It increases the number of collisions.
    B. It decreases the number of broadcast domains.
    C. It connects segment 1’s broadcasts to segment 2.
    D. It prevents segment 1’s broadcasts from getting to segment 2.

    Ans: D

    31. Your Quest4 Certification trainee Ellen is studying the basics of distance vector and link state routing protocols.
    As her mentor, what could you tell her? (Choose two)

    A. Distance vector protocols send the entire routing table to directly connected neighbors.
    B. Link state protocols send the entire routing table to all routers in the network.
    C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the routing table.
    D. Link state protocols send updates containing the state of their own links to all other routers on the network.

    Ans: A,D

    Explanation:



    Distance Vector Protocols:
    Distance Vector Protocols advertise routing information by sending messages, called routing updates, out the interfaces on a router. These updates contain a series of entries, with each entry representing a subnet and a metric.



    Link-State Protocols:

    Sends partial updates when link status changes, and floods full updates every 30 minutes. The flooding, however, does not happen all at once, so the overhead is minimal.

    32. Your Quest4 Certification trainee Bob wants some information regarding the split horizon rule.
    What should you tell him?

    A. Only routers can split boundaries (horizons) between concentric networks.
    B. All distance vector protocols require fall back routes that may cause momentary loops as the topology changes.
    C. Networks can only remain fully converged if all information about routes is sent out all active interfaces.
    D. Information about a route should not be sent back in the direction from which the original update came.
    E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary.

    Ans: D

    Explanation:
    Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated.

    Reference:


    http://www.cisco.com/en/US/products/sw/iosswrel/ps1826/products_configuration_guide_chapter09186a00800877c6.html



    33.Your boss at Quest4 Certification want you to brief him on differences and similarities between bridges andswitches.
    What should you tell her? (Choose two)

    A. Bridges are faster than switches because they have fewer ports.
    B. A switch is a multiport bridge.
    C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame
    received.
    D. A bridge will forward a broadcast but a switch will not.
    E. Bridges and switches increase the size of a collision domain.

    Ans: B,C

    Explanation:
    Bridges build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch.


    Reference:


    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a0080186a3e.html



    34. You are working with a 2500 series Cisco router. You are performing the password recovery procedure.
    You have just typed the command o/r 0x2142
    Your Quest4 Certification trainee Mahmoud is curious on the purpose of this command.
    What should you tell him?

    A. To restart the router.
    B. To bypass the configuration in NVRAM.
    C. To view the lost password.
    D. To save the changes to the configuration.
    E. To enter ROM Monitor mode.

    Ans: B

    Explanation:

    o/r 0x2142



    !--- Changes the value of config-register to 2142, so that the Router boots,

    !---ignoring the NVRAM contents.



    Reference:


    http://www.cisco.com/en/US/products/hw/routers/ps233/products_password_recovery09186a0080094795.shtml


    35. You have told your boss at Quest4 Certification that the OSI model has 7 layers. He is curious which protocol is on the application layer. He asks you to give him two examples of items associated with the layer.
    What should you tell him? (Select two)

    A. ping
    B. Telnet
    C. FTP
    D. TCP
    E. IP

    Ans: B,C

    Explanation:
    Layer Name -
    Application (layer 7)

    Examples - Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP

    36. You are working as a network technician at Quest4 Certification.
    You are required to troubleshooting the WAN link between the Quest4 Certification main office at Boston and the Quest4 Certification remote office at Rio De Janeiro. A Cisco router that was providing Frame Relay connectivity at the Rio de Janeiro site as replaced with a different vendor’s frame relay router. Connectivity is now down between the Boston and Rio De Janeiro site.
    What is the most likely cause of the problem?

    A. Mismatched LMI types.
    B. Incorrect DLCI.
    C. Mismatched encapsulation types.
    D. Incorrect IP address mapping.

    Ans: A

    Explanation:
    Three LMI protocol options are available in Cisco IOS software: Cisco, ITU, and ANSI. Each LMI option is slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each end of an access link use the same LMI standard, LMI works fine.


    39. You work as a network technician at Quest4 Certification. You have subnetted the 213.105.72.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her?

    A. 62 networks and 2 hosts
    B. 6 networks and 30 hosts
    C. 8 networks and 32 hosts
    D. 16 networks and 16 hosts
    E. 14 networks and 14 hosts

    Ans: E

    41. You work as a network technician at Quest4 Certification. You have subnetted the 201.105.13.0 network with a /26 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her?

    A. 64 networks and 4 hosts
    B. 4 networks and 64 hosts
    C. 2 networks and 62 hosts
    D. 62 networks and 2 hosts

    Ans: C

    42. Your Quest4 Certification trainee Fernanda is studying the spanning tree algorithm. She asks you how the
    spanning-tree path cost is determined by default. What should you tell her?

    A. Total hop count.
    B. Sum of the costs based on bandwidth.
    C. Dynamically determined based on load.
    D. Individual link cost based on latency.

    Ans: B


    44. You work as a network technician at Quest4 Certification. You are required to establish a Telnet session with a cisco router. Which commands should you use?

    A. Quest4Certification1(config)# line console 0

    Quest4Certification1(config-if)# enable password Quest4Certification

    B. Quest4Certification1(config)# line console 0

    Quest4Certification1(config-line)# enable secret Quest4Certification

    Quest4Certification1(config-line)# login

    C. Quest4Certification1(config)# line console 0

    Quest4Certification1(config-line)# password Quest4Certification

    Quest4Certification1(config-line)# login

    D. Quest4Certification1(config)# line vty 0

    Quest4Certification1(config-line)# enable password Quest4Certification

    E. Quest4Certification1(config)# line vty 0

    Quest4Certification1(config-line)# enable secret Quest4Certification

    Quest4Certification1(config-line)# login

    F. Quest4Certification1(config)# line vty 0

    Quest4Certification1(config-line)# password Quest4Certification

    Quest4Certification1(config-line)# login

    Ans: F

    Explanation:














    Access
    from
    Password
    Type

    Configuration
    Telnet vty password line vty 0 4


    login


    password cisco





    45. You work as a network consultant. You are planning a network installation for a large organization named Quest4 Certification. The design requires 100 separate subnetworks, so Quest4 Certification has acquired a Class B network address. What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?

    A. 255.255.240.0
    B. 255.255.246.0
    C. 255.255.252.0
    D. 255.255.254.0
    E. 255.255.255.0
    F. 255.255.255.192

    Ans: D

    46. Your Quest4 Certification trainee Jose is interested in ACLs (access control lists).
    He asks you want they can be used for. What should you tell him? (Choose three)

    A. Protect hosts from viruses.
    B. Classify network traffic.
    C. Provide high network availability.
    D. Identify interesting traffic for DDR.
    E. IP route filtering.
    F. Monitor the number of bytes and packets.

    Ans: C,D,E

    Explanation:
    IP access control lists (ACLs) cause a router to discard some packets based on criteria defined by the network engineer. The goal of these filters is to prevent unwanted traffic in the network – whether to prevent hackers from penetrating the network or just to prevent employees from using systems they should not be using. IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service features.

    47. You are configuring a network at Quest4 Certification main site in Toronto. You use a distance vector routing protocol.
    What could you use to prevent routing loops in the network? (Choose two)

    A. Link-state advertisements (LSA)
    B. Spanning Tree Protocol
    C. Shortest path first tree
    D. Split horizon
    E. Hold-down timers

    Ans: D,E

    Explanation:
  • Split horizon – the routing protocol advertises routes out an interface only if they were not learned from updates entering that interface.

  • Hold-down timer – After finding out that a router to a subnet has failed, a router waits a certain period of time before believing any other routing information about that subnet.


  • 49. Your Quest4 Certification trainee Boris is configuring a serial interface on a Cisco router.
    He asks you which encapsulations he can use on the interface.
    What should you tell him? (Choose three)

    A. Ethernet
    B. Token Ring
    C. HDLC
    D. Frame Relay
    E. PPP

    Ans: C,D,E

    50. You work as network consultant. Your customer, Quest4 Certification Inc, has a class C network license. Quest4 Certification requires 5 usable subnets, each capable of accommodating at least 18 hosts.
    Which subnet mask should you use?

    A. Yes
    b. No

    Ans: A
    Answer- 255.255.255.224



    Explanation:
    Default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets , then 3 bits are required . With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts using 5 bits in host field. This matches with requirement.

    52. You work as a network technician at Quest4 Certification. You have completed the password recovery procedure on a Cisco router. The process is successful and the router returns to normal operation.



    What is configuration register value at this point of time?

    A. 0x2100
    B. 0x2101
    C. 0x2102
    D. 0x2124
    E. 0x2142

    Ans: C

    Explanation: It is default factory setting. Router should attempt to load an IOS from flash memory and load startup configuration file. Flash memory also called NVRAM

    Incorrect answers:

    A: It is ROM Monitor mode. A low level problem determination

    B: Router to boot from ROM

    E: The value 0x2142 to be set for configuration register in case of password recovery procedure

    53. What feature of a network switch allows an administrator to create separate broadcast domains?

    A. Store-and-forward switching
    B. Microsegmentation
    C. Transparent bridging
    D. Fragment-free switching
    E. Virtual LANs
    F. Cut-through switching

    Ans: E

    Explanation: Creation of VLAN in a switch provide separate Broadcast domain . If VLAN is not there all ports as members of one Broadcast domain.


    Incorrect Answers:

    A: This is one of the Switching method in a switch. It will not play any role for creating separate broadcast domains

    B: Not related to the question

    C: Transparent bridging is called Transparent because the endpoints devices do not need to know that the bridges exists. It will not play any role for creating separate broadcast domain

    D,F: Both are switching methods in a switch.

    54. New switches have been purchased for a network upgrade. The objective for the network design
    emphasizes efficient, error-free transport instead of fast transport.



    Which switching mode should be configured on the new switches to provide error-free transport to the network?

    A. cut-through
    B. fragment-free
    C. frame-filtering
    D. store-and-forward
    E. 802.1q forwarding
    F. VTP transparent mode

    Ans: D

    Explanation:
    The Switch receives and stores all bits in the frame before forwarding the frame. This allows switch to check the FCS before forwarding the frame. FCS is Ethernet Trailer.


    Incorrect answers:

    A: The Switch performs the address table lookup as soon as the destination address field in the header is received. The first bits in the frame can be sent out to out port before the final bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check.

    B: This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked.

    C,E,F : They are not related to Switch mode transport.

    55. Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts? (Select three.)

    A. 15.234.118.63
    B. 92.11.178.93
    C. 134.178.18.56
    D. 192.168.16.87
    E. 201.45.116.159
    F. 217.63.12.192

    Ans: B,C,D

    Explanation:
    B: Valid Host in subnetwork 2 ( 92.11.178.64 to 92.11.178.95)

    C: Valid Host in subnetwork 1(134.178.18.32 to 134.178.18.63)

    D: Valid host in subnetwork 2 (192.168.16.64 to 192.168.16.95



    Incorrect answers:

    A: is a broadcast

    E: is a broadcast

    F: is a network id


    56. A technician at Quest4 Certification needs to update the network documentation. One of the tasks includes
    documenting the name of the IOS image file of each router in the network.

    Which commands could be used to find this information?

    A. Router# show protocols
    B. Router# show version
    C. Router# show image
    D. Router# show IOS
    E. Router# show flash

    Ans: B

    Explanation:
    "Show flash" displays all the image files in it. There could be more than one file. However, "show version" displays the one that is currently in use by the router.



    Incorrect answers:

    A: Show Protocols will shows routed Protocol using by the router, all interface conditions and their IP address if configured.

    C,D: There are no such commands.

    57. Which statement describes the rule of split horizon?

    A. Only routers can split boundaries (horizons) between concentric networks.
    B. All distance vector protocols require fall back routers that may cause momentary loops as the topology changes.
    C. Networks can only remain fully converged if all information about routers is sent out all active interfaces.
    D. Information about a route should not be sent back in the direction from which the original update come.
    E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary.

    Ans: D

    Explanation:
    Split horizon includes two related concepts that affect what routes are included in a routing update:
    An update does not include the subnet of the interface out which the update is sent
    All routes with outgoing interface of interface x are not included in updates sent out that same interface x.

    Incorrect Answers:

    A: There is no such requirement

    B: Distance vector protocols updates routing table at regular intervals instead of Topology changes

    C: This is not a feature of split horizon

    E: This is not a related feature for split horizon

    59. Which of the following are characteristics of PPP? (Choose three)

    A. Can be used over analog circuits.
    B. Maps Layer 2 to Layer 3 address.
    C. Encapsulates several routed protocols.
    D. Supports IP only.
    E. Provides error correction.

    Ans: A,C,E

    Explanation:

  • PPP can be used on either type of line (dial or switched lines), because data-link protocols are designed for point-to-point environment.


  • PPP uses one LCP per link and one Control Protocol for each Layer 3 protocol defined on the link. If a router is configured for IPX, Apple Talk, and IP on a PPP serial link, the router configured for PPP encapsulation automatically tries to bring I the appropriate control protocols for each layer 3 protocol.


  • Error recovery can be performed by the data-link protocol or a higher-layer protocol, or it might not be performed at all. Supported but not enabled by default.


  • 60. A user types the command ping 204.211.38.52 during a router console session.
    What does this command use to test connectivity between the two devices?

    A. ICMP echo request
    B. Information request
    C. Timestamp reply
    D. Redirect
    E. Source quench

    Ans: A
    Explanation:
    The ping command sends an ICMP echo request packet to the stated destination address. The TCP/IP software at the destination then replies to the ping echo request packet with a similar packet, called ICMP echo reply.

    Tidak ada komentar:

    Posting Komentar