Jumat, 02 Januari 2009

D-CCNA 640-801

1. You need to segment your network which of the following hardware devices can you use to segment yournetwork? (Choose three.)

A. Hub
B. Repeater
C. Switch
D. Bridge
E. Router
F. Media converter

Ans:C,D,E

2. Which of the following are reasons to use VLANs? (Choose three.)
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They enhance network security.
D. They increase the size of broadcast domains while decreasing the number of broadcast domains.
E. They increase the number of broadcasts domain while decreasing their size.
F. The simplify switch administration.

Ans:B,C,E

3. How does a layer two device such as a bridge or switch function?

A. It maintains a table of the IP address of the host connected to its internet segment
B. It passes packets outside of its network segment if its IP address cannot be found on its table.
C. It looks up the frames destination in its address table and sends the frame towards the destination.
D. It maintains the table of the data link layer and network layer addresses for the host connected to its network segment.

Ans:C

4. What is the network address for a host with the IP address 123.200.8.68/28?
A. 123.200.8.0
B. 1231.200.8.32
C. 123.200.8.64
D. 123.200.8.65
E. 123.200.8.31
F. 123.200.8.1

Ans:C

5. Which two statements are valid? (Choose two.)
A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a private broadcast domain.
B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions.
C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth.
D. Full-duplex Ethernet provides lower throughput than half-duplex Ethernet of the same bandwidth.
E. Full-duplex Ethernet consists of a shared cable segment while half-duplex Ethernet provides a point-topoint link.

Ans:A,C

6. Which of the following statements about a reliable connection oriented data transfer are true? (Choose two)
A. Recipients acknowledge receipt of data.
B. When buffers are filled to capacity, datagrams are discarded and not re transmitted.
C. Windows are used to control the amount in outstanding acknowledged data segments.
D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection.
E. The receiving device waits for acknowledgements from the sending device before accepting more data segments.

Ans:A,C

7. If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary. Which of the following is the correct bit pattern for the first octet?
A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx

Ans:B

8. Using a protocol analyzer we noticed sustained, heavy collisions in our CSMA/CD LANs. What are some possible affects could this have our LAN? (Choose three.)

A. Increased broadcast traffic.
B. Delay.
C. Low throughput.
D. High throughput.
E. Congestion.
F. Higher bandwidth.

Ans:B,C,E

9. Which of the following are layer 7 protocols? (Choose two.)
A. Ping
B. Telnet
C. FTP
D. TCP
E. IP

Ans:B,C

10. What is the total bandwidth of an ISDN BRI circuit?
A. 54 kps
B. 64 kps
C. 112 kps
D. 128 kps
E. 144 kps

Ans:E

11. As all devices connected to the same bridge are in the same broadcast domain, all broadcasts are forward to all collisions domains. Therefore broadcasts are not reduced.
A. Bridges do not affect the number of broadcast domains.
B. Bridges neither increase nor decrease the broadcasts within a collision domain.
C. Bridges do not necessarily increase the efficiency of routing. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 22 ? 24 and 30 ? 31. 118. To successfully troubleshoot LAN/WAN connectivity problems on a router which of the following commands could you use? (Choose three.)
D. Ping
E. Tracert
F. Ipconfig
G. Show ip route
H. Winipcfg
I. Show interfaces

Ans:A,D,F

12. FTP is an application layer protocol. This protocol deals with transferring of files.
A. TFTP is a simpler version of FTP and resides at the application layer.
B. SMTP is an application layer protocol. This protocol deals with the sending of emails. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 11. 117. What are benefits of bridging (Choose two.)
C. To reduce broadcasts within collisions domains. D. To reduce collisions within broadcasts domain.
E. To increase the number of broadcasts domains. F. To increase the broadcasts within collisions domains.
F. To increase the number of collision domains. H. To increase the efficiency of routing.

Ans:B,E

13. The Presentation layer of the OSI model has a variety of coding and conversation functions that are applied to the application layer data. Which of the following are examples of this coding? (Choose three) A. Rich Text Format (RTF) B. Quick Time movie C. FTP D. TFTP E. SMTP F. MIDI

Ans:A,B,F

14. A. The application layer is how users and applications access protocols and does not deal with the receipting and resending of data.
A. The presentation layer deal with several things, such as how things are presented and encrypted, but not with the transmission of data.
B. The session layer ensures that data from different applications are kept separate and with the controlling the communication process.
C. The data link layer detects errors but not the transmission of data.
D. The physical layer moves the bits between the devices and is not concerned with the process. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 ? 11. 115. Ron is an employee that is able to work from home to provide technical support for the company during the evening hours. Part of Ron?s responsibility is to make sure the company?s SQL database is working at all times for the companies customers. Ron runs big client-server applications and also transfers large files. These changes must happen quickly. The company is concerned about cost for these connections and also would like a practical solution. What connection would you suggest for this organization? E. An ISDN basic rate interface (BRI) connection to the user?s home. F. A dedicated T1 connection to the user?s home. G. A dedicated Frame Relay connection to the user?s home. H. A standard 28.8 analogue dial up connection to the users home

Ans:A

15. Which one of the layers of the seven layer OSI model uses positive acknowledgement and retransmission to ensure reliable delivery?
A. Application
B. Presentation
C. Session
D. Transport
E. Data link
F. Physical

Ans:D

16. To distinguish between each PVC what does the Frame Relay switch use?
A. Data link connection identifier (DLCIs)
B. CNs
C. FECNs
D. Local management interface LMI

Ans:A

17. A. The ipx load-balance is not a valid command.
A. The ip maximum-paths 2 is not a valid load balancing command for ip.
B. The ipx load-share is not a valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 340 ? 341. 111. The ABC Company has hired you as a consultant to add a new VLAN named SALES to there existing switched network. Which of the following are true regarding configuration of this VLAN? (Choose three.) C. The VLAN must be created. D. The VLAN must be named. E. An IP address must be configured for the SALES VLAN. F. The desired ports must be added to the new VLAN: G. The VLAN must be added to the STP domain.

Ans:A,B,D

18. RouterA has two redundant paths serial links to RouterB. RouterA and RouterB are only using the IPX protocol. You have noticed that RouterA is not using both paths to get to RouterB. Which command can you enter to enable load balancing across those serial links?
A. ipx load-balance.
B. ip maximum-paths 2.
C. ipx maximum-paths 2.
D. ipx load-share.

Ans:C

19. Julia telnets to a pc on a remote subnet, which MAC address will be present in the ARP table when you issue the show arp command?
A. MAC address of the destination host Ethernet port.
B. MAC address of the local router Ethernet port.
C. MAC address of the destination router Serial port.
D. MAC address of the local router Serial Port.

Ans:B

20. A. This is not a CLI editing key sequence.A. This will exit you out of the mode you are currently in. D and E. These are not a CLI editing key sequence. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 96 ? 97. 108. Which of the following statements about layer 2 bridges and switches are true? (Choose three.) B. Switches are primarily software based while bridges are hardware based. C. Both bridges and switches forward Layer 2 broadcasts. D. Bridges are frequently faster than switches. E. Switches have a higher number of ports than most bridges. F. Bridges define broadcast domains while switches define collision domains. G. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

Ans:B,D,F

21. You have just entered the command: Superhero(config-line)#logging sync Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command.

Which keystroke(s) did you use to complete the above command above to the completed following command: Superhero(config-line)#logging synchronous ?

A. Ctrl+shift+6 then x.
B. Ctrl+Z
C. TAB
D. /? E. Shift

Ans:C

22. How do you change the Console password on the Sonic router to "cisco"?
A. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)#password cisco
B. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)# password Cisco

Ans:A

23. Christopher issues a show cdp neighbor command from RouterA. RouterA has connections to RouterB and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three)

A. The neighboring router?s host name.
B. The neighboring router?s hardware platform.
C. Up to one address for each protocol supported.
D. Up to two addresses for each protocol supported.
E. As many addresses as are configured for each protocol supported.

Ans:A,B,C

25. Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams?
A. ICMP echo request.
B. Information request.
C. Timestamp reply.
D. Redirect.
E. Source quench.

Ans:A

26. All TCP/IP hosts implement the ICMP protocol?
A. TRUE
B. FALSE

Ans:A

27. Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use autonomous system number 130. Which is the correct command for this installation?
A. Router(config)# igrp 130
B. Router(config)# network 130
C. Router(config)# router igrp 130
D. Router(config)# enable igrp 130

Ans:C

28. To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the following is true about this mechanism?
A. TCP makes no effort to check for lost or duplicate data packets.
B. The application layer must sequence data packets when using TCP.
C. TCP controls the flow of UDP data through negative acknowledgements NAK.
D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable.

Ans:D

29. What are the benefits of replacing a hub with a bridge and segmenting the network?
A. It increases the number of collision domains.
B. It decreases the number of collision domains.
C. It increases the number of broadcast domains.
D. It decreases the number of broadcast domains.

Ans:A

30. Your company is considering purchasing a new accounting software application from ABC accounting company. The ABC accounting company has decided to come in and let you install a demo copy of their software so that you can test it in your network with a few hosts. The server and the hosts that will connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your company has decided to use this new accounting software application. However when you ran your packet analyzer you noticed the rest of the hosts on your network that are not using this application have a bandwidth problem with the new accounting system installed. Since your company has decided to use this new application they would like you to resolve the bandwidth problem. What is the most economical decision would you implement for resolving this problem?

A. Install new 100 Mbps switches, and change all hosts? NIC to 100 Mbps.
B. Segment network with router, and place all testing hosts and the new server into a separate subnet (network).
C. Add a Bridge and separate the two networks.

Ans:B

31. What must you do to test connectivity on a dial on demand routing (DDR) link?
A. Increate the idle import parameter.
B. Send interesting traffic across the link.
C. Switch
D. Repeater

Ans:B

32. Cisco supports IPX traffic using different encapsulation types can go over the same interface.
A. TRUE
B. FALSE

Ans:A

33. There are five different types of IP address classes. What IP address class is used for multicasting?

A. A
B. B
C. C
D. D
E. E

Ans:D

34. What is the protocol and what is the second part of the following network address: 10.0.0.254 mask 255.0.0.0 ? (Choose all that apply.)
A. IPX MAX address.
B. IP Class C director broadcast.
C. Private IP address node number.
D. Public IP address directed broadcast.
E. Private IP address directed broadcast.

Ans:c

35. Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248

Ans:B

36. Which layer of the OSI model handles data translation, code formatting, and encryption occur?

A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation

Ans:F

37. RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to RouterB (you put it administratively down). If you issue the command show interface on RouterB what output status would you see on the interface that is connected to RouterA?
A. Interface is down, line protocol is down.
B. Interface is down, line protocol is up.
C. Interface is up, line protocol is down.
D. Interface is up, line protocol is up.

Ans:A

38. Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.)
A. Too many hosts in a broadcast domain.
B. Full Duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Segmentation.
F. Low bandwidth.

Ans:A,C,D,F

39. Looking at this address 255.255.255.255 which one of the following is true?
A. IP, a flooded broadcast.
B. IP, a directed broadcast.
C. IPX, a flooded broadcast.
D. IPX, a remote directed broadcast.

Ans:A

40. IP addresses use hierarchical numbering. What portion of the address that will identify the network number?
A. Subnet Mask.
B. Dots between octets.
C. Class of first octet.
D. Assignments of DHCP.
E. Address Resolution Protocol.

Ans:C

41. Which wide are network technology was designed to use high-performance digital lines and is packet switched?
A. FDDI
B. ISDN
C. ATM
D. Frame Relay

Ans:D

42. Which of the following are functions that occur at the transport layer of the OSI model? (Choose three)
A. Route selection-IP
B. Sliding window-UDP
C. Well known ports-IP
D. Route validation-ICMP
E. Connection oriented-TCP/IP
F. Three way handshake TCP/IP
G. No acknowledgement-UDP

Ans:E,F,G

43.One of the best ways to understand how to build a network is to understand the method in which traffic is passed across the network. One of the reasons the OSI model was created to help you understand how a network operates. Which three devices operate at all seven layers of the OSI model? (Choose three.)
A. Frame relay is used to handle multiple virtual circuits.
A. X.25 defines how the connections between DTE and DCE are maintained.
B. ATM was designed to take advantage of the speeds offer by media such as E3 and T3. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387 ? 389 and 373. 83.
C. Network host
D. Network management station
E. Transceiver
F. Bridge
G. Web server
H. Switch

Ans:A,B,E

44. Which wide area network technology was designed to work with traditional POTS lines and provide SOHO?s and users with a higher speed digital dial-up service?
A. Frame relay
B. X.25
C. ATM
D. ISDN

Ans:D

45. Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and the total number of host per network?

A. 1 network with 254 hosts.
B. 2 networks with 128 hosts.
C. 4 networks with 64 hosts.
D. 6 networks with 30 hosts.

Ans:A

46. Exhibit: You are configuring R2 so that it can communicate with R1 on serial port s0. What encapsulation should you use on s0 to setup this IPX network?

A. SAP
B. HDLC
C. ARPA
D. Novel Ether

Ans:B

47. In which order takes the data encapsulation place.Click the task button & Place the encapsulation.


A. no answer, Diagram

Ans:A

48. Exhibit You want to create a sub interface on serial 0 on Router R2. Which of the following is the correct syntax to create this sub interface 2?

A. Interface s0.2 point-to-point.
B. Interface 2s0 point-to-point.
C. Subinterface 2s 0 point-to-point.
D. Interface s0 sub2 point-to-point.
E. Interface s0.1 point-to-point sub2.

Ans:A

49. Exhibit: You are configuring the IPX encapsulation between RouterA and RouterB. This connection will be using the S0/0 port on RouterA to S0/0 on RouterB. Which encapsulation type should be used for the S0/0 port of RouterB?

A. SAP
B. HDLC
C. ARP
D. NOVELLETHER

Ans:B

50. Exhibit:

You are configuring R3 so that it can communicate with R2 on Ethernet port e1. What encapsulation should you use on s0 to setup this IPX network?

A. SAP
B. HDLC
C. ARPA
D. Novell-Ether

Ans:D

51. Which one of the following characteristics about Ethernet Switches is true?

A. Symmetric switching allows connection between ports of unlike bandwidth and does not require memory buffering.
B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected on a symmetric switch.
C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store and forward is better for error detection.
D. The cut-trough method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address.

Ans:D

52. A publishing company has three routers in their network. Marshal, Sherman, and Patton. The Marshal and Sherman routers are fully configured. The Patton router is also fully configured, but need to have a password for the first 5 virtual lines, password for console, and an encrypted password for privileged mode.Configure the passwords on the Patton router according to the table below. Type Password Telnet apple Console pear Privileged peach ? The routers are named Marshal, Sherman, and Patton. ? The network is subnetted with a mask 255.255.255.224 ? The routing protocol is RIP ? The serial 0 interface is provided with clocking. ? The chart below includes the IP addresses. Lab 1 Name : Marshal E0 : 192.168.12.33 S0 : 192.168.12.65 Lab 2 Name : Patton E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68 Lab 3 Name : Sherman E0 : 192.168.12.97 S0 : 192.168.12.129 S1 : 192.168.12.68

Start by clicking on host that is connected to the router you want to configure.

A. Lab 2: enable config terminal hostname Berley enable secret peach line con 0 login password pear line vty 0 4 login password apple ^Z copy running-config startup-config

Ans:A

53. Exhibit: You are configuring an IP printer that is connected to your network. You would like to use the last IP address that is on your subnet for this printer. You run ipconfig on your personal computer and the exhibit shows your IP address and its subnet mask. Based on your IP address and subnet mask what would the last possible address be on your subnet?

A. 172.20.7.255
B. 172.20.7.197
C. 172.20.7.190
D. 172.20.7.129 E. 172.20.255.255

Ans:C

54. If we are using IPX as our routed protocol and our network has an existing Novell Server with an IPX network address of 4ad1 and we are connecting a Cisco routers Ethernet port to the same segment. The MAC address of the Ethernet port is 021f.2cfe.8322. What will the complete IPX address be for the Ethernet port.Enter the IPX address for the port.


A. no answer

Ans:A

55. The network 131.107.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses. What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum?Type the correct value in each box below.


A. no answer

Ans:A

56. Exhibit:

Company XYZ has purchased another switch to add to their existing network. They want you to connect this new Ethernet switch to an existing Ethernet switch. Which cable from the diagram above would you used to connect these two switches together?

A. Cable A
B. Cable B
C. Cable C
D. Cable D

Ans:B

57. Exhibit: Which one of the following cables allows a router to another router over the Ethernet? This is a direct connection and not using a hub or a switch.

A. Cable A
B. Cable B
C. Cable C
D. Cable D

Ans:B

58. Exhibit

You are the network administrator of the network shown in the exhibit. You have just added a PC to the network. However, the PC is unable to connect to the SQL Server computer. What can be the cause of this problem?

A. PCs IP address.
B. PCs subnet mask.
C. PCs default gateway.
D. Router interface E0 IP address.

Ans:C

59. Exhibit: Catalyst Switches have three primary operating modes that are used to handle frame switching Cutthrough, Store-and-forward and Fragment-free looking a the frame shown in the diagram which point is the store-and-forward switching decision made?

A. 1
B. 2
C. 3
D. 4

Ans:D

60. Exhibit: Looking at the diagram above ports 1 through 4 are assigned to VLAN1 and ports 5 through 8 are assigned to VLAN3 on each switch. The switches are interconnected over an ISL trunk link. Which of the following actions would test proper VLAN and trunk operation? (Choose three.)

A. Host 2-1 can ping Host 2-2
B. Host 2-1 can ping Host 7-2
C. Host 2-1 can not ping Host 2-2
D. Host 7-1 can not ping Host 2-2
E. Host 7-1 can ping Host 7-2

Ans:A,D,E

61. You are a network administrator for an Insurance company. The company has three routers named Tokyo, Kobe and Yokohama. You have already configured the Tokyo and the Kobe routers, but Yokohama still need some further configuration. The Yokohama router need:? a password for the for the first 5 virtual lines ? a password for the console ? a password for the privileged mode. These password must be encrypted. The following passwords should be used: Type Password Telnet Test Console myconsolepassword Privileged myprivegedpassword The network use a 255.255.255.0 subnet mask, RIP is the only routing protocol used, and clocking is provided on the serial 0 interface.

Lab 1 Name: Tokyo E0: 30.15.7.1 S0: 30.15.8.1 Lab 2 Name: Kobe E0: 30.15.9.1 S0: 30.15.10.1 S1: 30.15.8.2 Lab 3 Name: Yokohama E0: 30.15.11.1 S1: 30.15.10.2 Start by clicking on host that is connected to the router you want to configure.

A. Lab 3: enable config terminal hostname Yokohama enable secret mypassword line con 0 login password mypassword line vty 0 4 login password Test ^Z copy running-config startup-config

Ans:A

Tidak ada komentar:

Posting Komentar