Jumat, 02 Januari 2009

E-CCNA 640-801

1. ISDN is sometimes used in locations that do not offer support for DSL or Cable Modems connections. Your choices may be Analog modems or an ISDN connection in those remote locations. ISDN has benefits over regular dial up modem connections. Which of the following are examples of these benefits? (Choose three)
A. PVCs are faster and more reliable.
B. No specialized equipment is required.
C. Data transfer is faster than typical modems.
D. Call setup is faster than with standard telephone service.
E. It carries many types of data traffic such as voice, video, and data.

Ans:C,D,E

2. When troubleshooting Frame Relay peer problems between two routers which two commands should you use to show the routers that are reachable? (Choose two)
A. Show IP map.
B. Show IP route.
C. Show frame-relay map.
D. Debug frame-relay map.

Ans:B,C

3. Which of the following are modes used for frame switching on Cisco switches? (Choose two)
A. Full duplex
B. Half duplex
C. CSMA/CD
D. Cut through
E. Fragmentation
F. Store and forward

Ans:D,F

4. Which of the following can be used as methods that can be used to simplified network management by implementing (VLANs)? (Choose four)
A. VLANs allow you to implement multiple layers switching easily.
B. VLAN can group several broadcasts domains into multiple logical subnets.
C. It is no longer necessary to install cables to move a user from a new network to another.
D. Network adds, moves and changes are achieved by configuring a port into a VLAN.
E. A group of users needing high security can be put into a VLAN so that no users outside the VLANs can communicate with them.
F. As a logical grouping of users, VLANs can be considered independent from their physical or geographic locations.

Ans:C,D,E,F

5. Computer A is trying to ping Computer B on the same Ethernet LAN using the IP address. A request is sent out of Computer A as a broadcast looking for the MAC address of Computer B. What is the protocol that sent out this broadcast to find Computer B?s MAC address?
A. It uses a Proxy ARP.
B. It uses ARP requests.
C. It uses RARP requests.
D. It uses router look up table.

Ans:B

6. Which command is used to set the bandwidth metric of a Frame Relay connection?
A. Router(Config)# clock rate 56
B. Router(Config-if)# bandwidth 56
C. Router(Config)# bandwidth 56000
D. Router(Config-if)# clock rate 56000

Ans:B

7. The TCP/IP model was created to provide standards used in internetworking. Which of the following statements are true about this model? (Choose three)
A. IP provides connection less service and routing capabilities.
B. ARP enables devices to locate the IP address of local devices.
C. UDP provides simple connection less service without windowing or acknowledgements.
D. ICMP provides connection oriented management data to routers and layer three switches.
E. TCP enables devices to send large quantities of data using switching in a connection-oriented manner.

Ans:A,C,E

8. You need to install RIP as the routing protocol of your network. Which of the following shows the correct prompt and command to install RIP as the routing protocol? (Choose one)
A. Router# rip.
B. Router rip.
C. Router (Config)# rip.
D. Router (Config)# router rip.

Ans:D

9. Which two are facts about integrated services digital network (ISDN)? (Choose two)
A. ISDN provides only data only capability.
B. ISDN provides an integrated voice/data capability.
C. The ISDN standards define the hardware and call setup schemes for end-to-end digital connectivity.
D. Users receive more bandwidth on WANs with a leased line of 56kbps than with multiple b channels.

Ans:B,C

10. Which of the following correctly compares Fast Ethernet to Ethernet? (Choose four.)
A. Fast Ethernet uses the Same Maximum Transmission Unit (MTU).
B. Fast Ethernet is based on an extension to the IEEE 802.3 specification.
C. Fast Ethernet uses the same Media Access control (MAC mechanisms).
D. Fast Ethernet preserves the frame format that is used by Ethernet.
E. Fast Ethernet offers a speed increase one hundred times that of the Ethernet.

Ans:A,B,C,D

11. An IPX address consists of which of the following?
A. Network number; IP address.
B. MAC address; node number.
C. Network number; MAC address.
D. Network number; subnet number.

Ans:C

12. John was having problems connecting to the company?s game server by the FQDN. John then used the ping command and was successful in pinging the game server. If a packet analyzer were used while John was using the ping command what would the two most common request/reply pair with ICMP messages be? (Choose two)
A. Echo reply
B. Echo request
C. Source quench
D. Fragment offset
E. Information redirect
F. Destination reachable
G. Echo control message

Ans:A,B

13. If I have VLAN 3, and VLAN 4 configured on a Cisco Switch, and I would like to have pc?s on VLAN 3 communicate with pc?s on VLAN 4. Which of the following will allow this inter-VLAN communication to take place?
A. It takes place through any Cisco router.
B. It takes place through a Cisco router than can run ISL.
C. It takes place through a router, but this disables all the router's Security and filtering functionality for the VLANs.
D. For nonroutable protocols, (e.g., NetBEUI) the router provides communications between VLAN domains.
E. Inter-VLAN communications is not possible because each VLAN is a separate broadcast domain.

Ans:B

14. Which one of the following is a layer two broadcast?
A. The IP subnet used is 255.255.255.0
B. The IP address used is 255.255.255.255
C. The MAC address used is 00-00-00-00-00-00
D. The MAC address used is FF-FF-FF-FF-FF-FF.

Ans:D

15. Which of the following troubleshooting tools use the protocol ICMP? (Choose two)
A. Ping
B. Telnet
C. Configure
D. Trace route
E. Show commands
F. Standard access list

Ans:A,D

16. You are suggesting that your company uses IP RIP as its routing protocol. Your boss would like you to list some facts about IP RIP before he approves your request. Which of the following statements about IP RIP are true? (Choose two.)
A. It limits hop counts to 31.
B. It is a link-state routing protocol.
C. It uses autonomous system numbers.
D. It is capable of load sharing over multiple paths.
E. It uses bandwidth as the metric for path selection.
F. It broadcasts updates every 30 seconds by defaults

Ans:D,F

17. In comparing TCP with UDP what is an advantage of using a connectionless protocol such as UDP?
A. Packet acknowledgement may reduce overhead traffic.
B. Loss or duplication of data packets is less likely to occur.
C. Packets are not acknowledged which reduces overhead traffic.
D. The application relies on the transport layer for sequencing of the data packets.

Ans:C


18. You are troubleshooting a problem between RouterA and RouterB from RouterA. Which command will successfully ping the ip address of RouterB?

A. RouterA>ping 131.5.5.0
B. RouterA# ping 131.5.5.30
C. RouterA> ping 131.5.5.256
D. RouterA# ping 131.5.5.255

Ans:B

19. Which of the following can reset a hold-down timer? (Choose three.)
A. When the hold-down timer expires.
B. When infinity is finally defined as some maximum number.
C. When the router exchanges update summaries at area borders.
D. When the router detect faulty LSPs propagating through the internetwork.
E. When another update is received indicating a new route with a better metric.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

Ans:A,E,F

20. What are two benefits of segmenting a network with a later 2 bridge? (Choose two)
A. To reduce collisions.
B. To increase collisions.
C. To add collision domains.
D. To reduce collision domains.
E. To have more broadcast domains.

Ans:A,C

21. Company ABC was supplied the following Class C IP address 195.20.10.0. You have been hired as the network administrator of Company ABC. Your first task is two split of the address for the different buildings that Company ABC owns and operates. Which of the following are the most important factors when subnetting the addresses? (Choose two)
A. Determine the number of separate networks required.
B. Determine how many devices will require DHCP addressing.
C. Determine the maximum number of host that will be on each subnet.
D. Determine the minimum number of host that will be on each subnet.
E. Determine which router will be the IP default gateway for each subnet.

Ans:A,C

22. You as the administrator issue the shutdown command on Serial 1. You later view this interface using the show interface Serial 1 command. How will this interface be displayed?
A. Serial 1 is up, line protocol is up.
B. Serial 1 is up, line protocol is down.
C. Serial 1 is down, line protocol is down.
D. Serial 1 is administratively down, the line protocol is down.

Ans:D

23. Using a class C address 192.168.10.X what would the subnet mask be if we needed two subnets with a maximum of 35 hosts on each subnet?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248

Ans:A

24. You are trying to convince your boss to switch from a hub to a Cisco switch. You have explained to your boss that you will have fewer collisions with the Cisco switch because you will be using full-duplex. Your boss responds with how many collisions are caused by transmitting and receiving frames simultaneously in full-duplex mode. What should your response be?
A. One
B. Two
C. None
D. Several

Ans:C

25. Given the configuration example: interface ethernet0 ipx network 100 ipx access-group 800 out interface ethernet1 ipx network 200 interface ethernet2 ipx network 300 access-list 800 permit 200 100

Which two actions result from implementing this configuration? (Choose two.)

A. IPX network 400 will not receive any traffic.
B. Traffic from network 200 for network 100 will be forwarded out e0.
C. Traffic from network 200 for network 200 will be forwarded out e0.
D. Traffic from network 200, destined for network 100, will be forwarded out e2.
E. The access list is applied to an outgoing interface and filters outbound traffic.

Ans:B,E

26. Which statement should you use to deny telnet access only from Network 210.93.105.0 to Network 223.8.151.0?
A. Access-list one deny 210.93.105.0.0.0.0.0.0 any eq 23 access-list one permit any.
B. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq 23
C. Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq 23 Access-list 100 permit ip any any
D. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq telnet Access-list 100 permit ip any any

Ans:D

27. Your company is using Novell v4.1. You need to display the Novel IPX address on a router. Which one of the following commands will allow you to display this address?
A. Show IPX addresses.
B. Show IPX interface.
C. IPX network
D. Display IPX addresses
E. Show IPX routing details

Ans:B

28. Using a Packet analyzer you discover the following address 238.255.255.255. What is the protocol and what is the purpose of the address?

A. IPX; a SAP broadcast.
B. IP; a multicast address.
C. IP; a reserved address.
D. IP; a directed broadcast.
E. IPX; a flooded broadcast.

Ans:B

29. You have decided to remove RIP routing on your router and install IGRP. You have issued the command no router rip on all of your routers. You now need to install IGRP on your routers. Which commands should you use to enable IGRP routing?
A. router igrp 100 network 192.168.1.0 network 10.0.0.0
B. router igrp 100 network 192.168.1.0 network 10.2.0.0
C. router igrp 100 network 192.168.1.0 192.168.1.1 network 10.2.0.0 10.2.1.1
D. router igrp 100 network 192.168.1.0 255.255.255.0 network 10.2.0.0 255.255.0.0

Ans:A

30. Our network uses both IPX and IP addressing and we have a direct connection to the Internet using IP. We would like to allow our IPX traffic to also be able to go across this internet to a remote router on the other side. Which term below will allow us to encapsulation IPX inside of IP so that we can send it across the Internet?
A. Bridging.
B. Tunneling.
C. Data-link control.
D. Generic routing.
E. Packet switching.

Ans:B

31. Which of the following is a Layer 2 device?
A. Hub
B. Router
C. Switch
D. Repeater

Ans:C

32. You are trying to determine if the connection between your Router and the Frame-Relay switch is good. Which show command should you use to view Frame Relay local management interface (LMI) traffic statistics?

A. Show lmi.
B. Show ip route.
C. Show interface.
D. Show statistics.
E. Show frame-relay lmi.

Ans:E

33. Frame Relay uses ___________ to define the rate, in bits per second , that the Frame Relay switch agrees to transfer data?
A. Clock rate (CR).
B. Committed Information Rate (CIR)
C. Local management interface (LMI)
D. Data-link connection identifier (DLCI)
E. Committed Rate Measurement Interval (CRMI)

Ans:B

34. You issued the show spantree e0/1 command which part of the output indicates that virtual LAN1 (VLAN1) is functioning properly?
A. Root port is fast Ethernet 0/26.
B. Port Ethernet 0/1 of VLAN is forwarding.
C. Designated port is Ethernet 0/1, path cost 10.
D. Designated root has priority 0 address 00D0.588F.B600.
E. VLAN is executing the IEEE compatible spanning tree protocol.

Ans:E

35. You need to create a subinterface so that you can support different Frame-Relay encapsulations. Which command specifies a second subinterface on serial interface zero?
A. Interface s 0.2 point - to point.
B. Interface 2 s 0 point to point.
C. Sub interface 2 s 0 point to point.
D. Interface 0 sub 2 point to point.
E. Interface s 0.1 point to point sub 2.

Ans:A

36. You have just configured DDR (Dial on Demand Routing) and would like to test the link. What can you use to bring up the connection?
A. Increase the idle timeout parameter.
B. Send interesting traffic across the link.
C. Reboot one of the Integrated Services Digital Network (ISDN) routers.
D. Reset the DDR Integrated Services Digital Network (ISDN) router statistics to zero.

Ans:B

37. Your company has decided to pay for one ISDN B channel to your to house so that you can do some technical support from home. What is the bandwidth capacity of a single ISDN B channel?
A. 16 Kbps
B. 64 Kbps
C. 128 Kbps
D. 512 Kbps
E. 1.54 Mbps

Ans:B

38. For security reasons you would like a system message displayed when logging into a router. Which of the following allows you to create this message?

A. Banner MOTD
B. Message MOTD
C. Banner Message
D. Message Banner

Ans:A

39. Your company has decided to use a (BRI) connection between the Florida office and the Georgia office. You would like to configure dial on demand routing (DDR) on this connection. Which of the following commands are required to setup DDR? (Choose three)
A. Define static routes.
B. Configure the dialer information.
C. Specify interesting traffic that can enable the link.
D. Define DDR password to exchange when the link comes up.

Ans:A,B,C

40. Which of the following are facts about Reverse Address Resolution Protocol? (Choose two.)
A. It generates parameter problem messages.
B. It maps IP addresses to Ethernet addresses.
C. It maps Ethernet addresses to IP addresses.
D. It is implemented directly on top of the data link layer.

Ans:c,D

41. You are performing password recovery on a router and you have already adjusted the configuration egister and are now in the router that appears to have no configuration. You notice the old configuration is still saved in NVRAM and you now want to copy the old configuration that is in NVRAM to the current configuration that is in RAM. Which command retrieves the configuration file from NVRAM?
A. Config NVRAM.
B. Copy NVRAM running-config.
C. Copy startup-config running-config.
D. Copy running-config startup-config.

Ans:C

42. Which of the following correctly describe IP addressing? (Choose Two)
A. IP multicast addresses start with 240.
B. A host portion of all 1?s indicates a network broadcast.
C. The value of zero (0) in the host portion means ?all hosts? on the network.
D. IP addresses are four octets long and contain a network portion and a host portion.

Ans:B,D

43. You are concerned about security on your network. You have a router that is connected to the Internet and do not want your RIP updates being sent out this interface that is connected to the Internet. Which command will prevent these updates from going out the interface without using access-lists?
A. Passive route.
B. Default routes.
C. Passive interface.
D. Route update filtering.

Ans:C

44. You have just purchased a router from an online auction and this router had an existing IOS installed on it. You would like to make a backup copy of this IOS. Which one of the following commands will allow you to do this?
A. Copy Flash TFTP
B. Save Copy TFTP
C. Write Backup TFTP
D. Write Backup (server-name)
E. Copy backup 2 (server-name)

Ans:A

45. You are using setup mode to configure your router for the first time. What does the square bracket indicate in setup mode?

A. Current or default settings.
B. Hard coded values that cannot be modified.
C. Values entered by the administrator but not saved.
D. Values that must be returned to NVRAM before becoming enabled.

Ans:A

46. Gail is having trouble configuring Frame Relay subinterfaces. You decide to send Gail an email explaining some of the installation procedures. Which of the following should you include in your email? (Choose three)
A. Each subinterface is configured either multi point or point to point.
B. Any network address must be removed from the physical interface.
C. The configuration of subinterfaces is done in router Config-(if)# mode.
D. Frame relay encapsulation must be configured on each sub interface.

Ans:A,B,C

47. Which of the following are considered VLAN benefits?
A. It increases the number of broadcast domains.
B. It decreases the number of broadcast domains.
C. It increases the number of collision domains.
D. It decreases the number of collision domains.
E. Since it is a virtual interface, it never shuts down.

Ans:A

48. You have just purchase a brand new router and need to configure this router after the router boots up you exit the setup mode by pressing Ctrl-C and you are now in user mode which command do you use to enter the privileged mode so that you can configure the router?

A. Set
B. Enable
C. Configure
D. Privileges

Ans:B

49. You are using two back-to-back serial cables in your test lab between two Cisco routers. You have determined that one of these routers is the DCE by using the show controllers command. You now need to configure the clock rate to 64 Kbps on serial0 which one of the following commands will allow you to do this?
A. Clockrate 64
B. Clock rate 64
C. Clockrate 64000
D. Clock rate 64000
E. Set clockrate 64
F. Serial 10 clockrate 64
G. Clock rate 64000 serial 10

Ans:D

50. Which of the following are true about debug output?
A. The default is to send debug output to the console screen.
B. To view debug output from a telnet session, the "terminal monitor" command must be used.
C. If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed with the "show log" command.
D. If the "no logging console" command were configured, output would not be sent to the console.
E. All of the above.

Ans:E

51. What is the maximum cable distance for 100BaseT?
A. 607 ft
B. 25 meters
C. 1000 ft
D. 100 meters
E. 185 meters

Ans:D

52. Using your protocol analyzer you have determined your network is very congested. Currently all the devices are connected through a hub. Which solution would best decrease congestion on the network?
A. Add a second hub.
B. Replace the hub with a router.
C. Replace the hub with a switch.
D. Replace the hub with a repeater.

Ans:C

53. One of the security mechanisms used in securing a router is access-lists. You have decided to use Standard IP access lists in your company which of the following is an example of a Standard IP access lists?
A. Access-list standard 172.16.4.13
B. Access-list 2 deny 172.16.4.13 0.0.0.0
C. Access-list 101 deny 172.16.4.13 0.0.0.0
D. Access-list 199 deny 172.16.4.13 255.255.255.255

Ans:B

54. You would like to use Ethernet 100BaseTx in your network. What is the maximum cable length?
A. 10 m
B. 50 m
C. 100 m
D. 1000 m

Ans:C

55. You have just been hired to setup a new company network. This company will be using an accounting package that requires multiple hosts. These hosts are the accountants and they must be able to support data transfer between each other at a rate of 10 Mbps. The company will also have a file server that is used for the other employees of the company who just use word processing applications that use less than 3 Mbps to transfer files to server. What is your economical recommendation?

A. That the existing 10BaseT hub be replaced with 100BaseT hub to improve overall performance.
B. That a router can separate the testing application from the rest of the network thus allowing the testing application more bandwidth.
C. That the switch be installed so that enterprise server can be provided a 100 Mbps port and each of the testing application hosts can be given dedicated 10 Mbps ports.
D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application.

Ans:C

56. AJ has just created an IP access-list and you will like to see if he has applied this access-list to an interface. Which one of following commands will allow you to see if an access-list has been applied to an interface?
A. Router# show ip interface
B. Router> show access-list
C. Router# show ip access-list
D. Router> show interface ip access-list

Ans:A

57. Assuming that our network is using an older version of UNIX what is the maximum number of subnets that can be assigned to networks when using the address 131.107.0.0 with a subnet mask of 255.255.240.0?
A. 16
B. 32
C. 30
D. 14
E. It is an invalid subnet mask for the Network

Ans:D

58. Which one of the following statements about an Ethernet LAN is true?
A. The advantage of a full duplex is the ability to transmit data over Mbase2 cable.
B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present.
C. Ethernet switches can use full duplex mode to connect multiple nodes to a single port of a switch.
D. Half duplex is a cut through packet processing method that is very fast with little error correction, full duplex is store and forward method that is slower but has better error correction.

Ans:B

59. You want to make sure that access-list you just created does not conflict with an existing access-list. Which router command allows you to view all of the access-lists created and the contents of all access lists?
A. Router# show interface.
B. Router> show IP interface.
C. Router# show access-lists.
D. Router> show all access list.

Ans:C


60. Your company is concerned about Security on your network. Each department has its own file server and the company also has an enterprise server that is shared by all departments. The accounting department is concerned about the accounting information being accessible from the other departments. What can you as the network administrator use to control the information so that it?s not being passed between the departments?
A. Bridge between management and sites.
B. Routers to provide the most secure segmentation.
C. A hub to provide the ease of management and a satisfactory alternative for the network security.
D. An Ethernet switch to secure separation through programming the access list of each port of the switch.

Ans:B

Tidak ada komentar:

Posting Komentar