Jumat, 02 Januari 2009

F-CCNA 640-801

1. You have a leased line configured at a small office that connects to the corporate office. You company would also like to have a backup incase the lease line goes down. Which WAN service would you most likely choose to backup the leased line?
A. Frame relay with SVC
B. Dedicated serial line
C. ISDN with DDR D. ATM

Ans:C

2. What are the advantages of using the OSI layered network model? (Choose three.)

A. Allows multiple-vendor development through standardization of network components.
B. Creates a list of communication rules that all companies must implement to get onto the Internet.
C. Allows various types of network hardware and software to communicate.
D. Prevents changes in one layer from affecting other layers, so it does not hamper development.
E. Allows companies to develop proprietary interfaces.

Ans:A,c,D

3. What is the correct order of PDUs in data encapsulation?
A. Data, Frame, Packet, Segment, Bit
B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Packet, Segment, Frame, Bit
E. Data, Segment, Frame, Packet, Bit
F. Data, Segment, Packet, Frame, Bit

Ans:F

4. Which three are examples of the functions of connection oriented services? (Choose three)
A. Connection parameters are synchronized.
B. Any loss or duplication of packets can be corrected.
C. The data packet is independently routed and the service does not guarantee the packet will be processed in order.
D. A data communication path is established between the requesting entity and the peer device on the remote end system.

Ans:A,B,D

5. Which of the following devices support Full Duplex Ethernet ? (Choose two.)
A. Switch to host.
B. Switch to switch.
C. Hub to hub.
D. Switch to hub.
E. Hub to host.

Ans:A,B

6. Full-duplex gives you the ability to send and receive data at the same time. Which of the followingEthernet standards can operate in full-duplex mode? (Choose two.)

A. 10Base2
B. 10Base5
C. 10BaseT
D. 100BaseT

Ans:A,D

7. What are good reasons for using layer two switches? (Choose two)
A. To reduce collisions.
B. To increase collisions.
C. To increase the number of collision domains.
D. To decrease the number of collision domains.
E. To decrease the number of broadcast domains.

Ans:A,C

8. What can you use to connect a user?s pc directly to a router?
A. Connect the PC's COM port to the router's console port using a straight-through cable.
B. Connect the PC's COM port to the router's console port using a crossover cable.
C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable.
D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable.
E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable.
F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.

Ans:D

9. You issue the command show ip route which of the following correctly describes the codes displayed in your route table after you issue this command? (Choose two.)
A. I-Indicates a route was learned through an internal protocol.
B. S-Indicates a route was learned through static command.
C. R-Indicates a route was learned through RIP.
D. S-Indicates a route was learned through a serial port.
E. R-Indicates a route was learned through a reliable port.

Ans:B,C

10. What one of the following is an example of a layer 2 MAC address?
A. 192.201.63.251
B. 19-22-01-63-25
C. 0000.1234.FEG
D. 00-00-12-34-FE-AA

Ans:D

11. You company uses a switch in the training department. You need to be able to make changes to this switch remotely so that you can allow different classrooms to have access to the Internet as needed. What do you have to configure on this switch so that you can remotely make these changes? (Choose two.)
A. The switch name must match the workgroup name of the local network.
B. The switch must be configured with an IP address and default gateway.
C. The remote workstations must have access to the VSM of the switch.
D. CDP must be enabled on the switch so that other devices on the network can locate it.

Ans:B,C

12. Which layer of the OSI model ensures reliable end-to-end delivery of data?
A. Application
B. Presentation
C. Session
D. Transport
E. Network

Ans:D

13. Switches have three primary modes to handle frame switching. Which two statements about the storeand forward switching method are true? (Choose two)

A. Latency remains constant regardless of frame size.
B. Latency through the switch varies with frame length.
C. The switch receives the complete frame before beginning to forward it.
D. The switch checks the destination address as soon as it receives the header and begins forwarding the frame immediately.

Ans:B,C

14. Spanning-Tree was originally developed by DEC. What is the reason Spanning-Tree is used in a switched LAN?
A. To provide a mechanism for network monitoring in switched environments.
B. To prevent routing loops in networks with redundant paths.
C. To prevent routing switching loops in networks with redundant switched paths.
D. To manage, the addition, deletion, and naming of VLANs across multiple switches.
E. To segment a network into multiple collision domains.

Ans:C

15. Your company has decided to use IP RIP version 1 as the routing protocol. Which of the following are the commands you can use to configure IP RIP version 1 on your router?
A. Router RIP network 172.16.1.0 network 10.1.0.1
B. Router RIP network 172.16.0.0 network 10.0.0.0
C. Router RIP network 172.16.1.0 172.16.1.1 network 10.1.0.0 10.1.1.1
D. Router RIP network 172.16.1.0 265.255.255.0 Network 10.1.0.0 255.255.0.0

Ans:B

16. Which of the following are Application layer protocols that use TCP/IP? (Choose three.)
A. ARP
B. HTTP
C. SMTP
D. FTP
E. ICMP

Ans:B,C,D

17. Switches have three primary modes to handle frame switching. Which one of these modes looks at the destination address and then immediately forwards the frame to the destination?
A. CSMA/CD
B. FULL DUPLEX
C. CUT THROUGH
D. HALF DUPLEX
E. FRAGMENTATION
F. STORE AND FORWARD

Ans:C

18. TCP is a connection-oriented protocol. An advantage of operating in a connection-oriented environment is that a connection is established between both ends before the transfer of information can begin. What is a disadvantage of using a connection-oriented protocol such as TCP?
A. Packet acknowledgement may add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss or duplication of data packets is more likely to occur.
D. The application layer must assume responsibility for correct sequencing of the data packets.

Ans:A

19. The IP address 131.107.0.0 is a class B address. What is the range of binary values for the first octet in this address class?
A. 10000000-11111111
B. 00000000-10111111
C. 10000000-10111111
D. 10000000-11011111
E. 11000000-11101111

Ans:C

20. Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What is the default encapsulation type for Frame Relay on a Cisco router?
A. HDLC
B. PPP
C. IETF
D. Cisco
E. ANSI

Ans:D

21. Frame Tagging is used to interconnect multiple switches and to maintain VLAN information as traffic goes between switches. Which of the following statements about the Frame Tagging are true? (Choose two)
A. A Filtering table is developed for each switch.
B. Frame Tagging defines a unique user defined ID to each frame.
C. A unique identifier is placed in the header of each frame as it is forwarding between switches.
D. Frame Tagging is technique that examines particular information about each frame based on userdefined offsets.

Ans:B,C

22. You can configure PPP on which of the following types of physical interfaces? (Choose two)

A. Ethernet
B. Token Ring
C. Synchronous Serial
D. Asynchronous Serial

Ans:C,D

23. The advanced editing features are turn on by default on Cisco routers. To turn off these features you enter the command terminal no editing. With the advanced editing features turned on what is the effect of Ctrl-Z?
A. Exits back to privileged exec mode.
B. Disconnects from the router.
C. Aborts the ping operation.
D. Exits privileged exec mode.

Ans:A

24. The ICMP ping used for troubleshooting a network can be used on a Cisco router in which modes? (Choose two)
A. User.
B. Privileged.
C. Global Configuration.
D. Interface Configuration.

Ans:A,B

25. Encapsulation is the method of passing data down the stack of the OSI model and adding headers and trailers. Which one of the following shows the correct order of Data Encapsulation?
A. Data, Packet, Segment, Frame.
B. Segment, Data, Packet, Frame.
C. Data, Segment, Packet, Frame.
D. Packet, Data, Segment, frame.

Ans:C

26. Consider Frame Relay multipoint subinterfaces. Which is a valid statement?
A. An IP address is required on the physical interface of the central router.
B. All routers are required to be fully meshed.
C. All routers must be in the same subnet to forward routing updates and broadcasts.
D. Multipoint is the default configuration for Frame Relay subinterfaces.

Ans:D

27. Novell Netware allows multiple Layer two frame structures. Cisco supports all of the frame types. Cisco and Novell have assigned different names for the same encapsulation type. Which of the following are correct matches of the Novell term to the equivalent Cisco IOS term for the same framing types? (Choose two)
A. Ethernet_II-ARPA
B. Ethernet_802.3-SAP
C. Ethernet_802.2-LLLC
D. Ethernet_SNAP-SNAP

Ans:A,D

28. Frame relay has a feature that prevents PVCs from shutting down from lack of activity. What is the name of this feature?
A. DLCI
B. BECN
C. FECN
D. LMI
E. CIR
F. De

Ans:D

286. What is one benefit of using a hierarchical addressing framework?
A. Increase availability of addresses.
B. Decrease distance between routers.
C. Increase router memory requirements.
D. No need to maintain routing information.

Ans:A

29. Exhibit:

RouterA# show interface s0 Serial 0 is up, line protocol is down Hardware is HD64570 Internet address 10.1.1.1 Encapsulation HDLC, loopback not set, keepalive set (10sec) Router A is unable to connect to Router B, which is a Nortel router, through the network cloud. Using the command output shown what must be configured on Router A's interface s0 to change the line protocol from down to up?

A. No shutdown.
B. Encapsulation ppp.
C. Interface serial point-to-point.
D. Clock rate 56000.

Ans:B

30. The default bandwidth of a high-speed serial link is 1.544 or T1. What is the correct command to change the bandwidth of the interface to 64K?
A. Bandwidth 64
B. Band width 64
C. Bandwidth 64000
D. Band width 64000
E. Bandwidth 64K

Ans:A

31. What one of the following protocols is an example of a link state routing protocol that uses the TCP/IP protocol stack?
A. IP
B. IS-IS
C. NLSP
D. OSPF
E. RIP ver 2

Ans:D

32. Exhibit:

Central Partial Configuration isdn switch-type basic-ni username Remote password king interface bri0 ip address 10.1.1.1 255.255.255.0 encapsulation ppp ppp authentication chap isnd spid1 51055512360001 isnd spid1 51055512360002 dialer map ip 10.1.1.2 name Remote 1238001 dialer-list 1 protocol ip permit

Your company is using ISDN to connect the Remote office to the Central office. The connection is not working between the two routers. You issue the show running-config command looking at the configuration above. Which additional command must be issued on the Central router before interesting traffic will be sent to the Remote router?

A. (config-if)# dialer-group 1
B. (config-if)# dialer-list 1
C. (config-if)# dialer map 1
D. (config-if)# dialer-route 1

Ans:A

33. Exhibit You are network administrator for the network shown in the exhibit above. Adding the new router, called TK2, the network has been augmented. You would like to backup the IOS image of the new router to the TFTP server. However, the backup procedure fails. What could be the cause of the problem?

A. Incorrect default gateway of the tftp server.
B. Incorrect subnet mask of the tftp server.
C. Incorrect IP address of the tftp server.
D. Incorrect IP address on E0 of the TK1 server.
E. Incorrect subnet mask on the TK2 router.

Ans:B
34. If RIP uses hop count to determine the best path what does IGRP use?
A. The highest metric value.
B. The lowest composite metric value.
C. The lowest hop-count and delay.
D. The highest bandwidth and reliability
E. The lowest administrative distance.

Ans:B

35. You have just purchased a new Cisco router. Which mode should you use to create an initial configuration on your router?
A. Copy mode.
B. User mode.
C. Setup mode.
D. Startup mode.

Ans:C

36. Once you have defined interesting traffic with the dialer-list command, you then must associate an ISDN phone number with the next hop router address. Which IOS command should you use?
A. Isdn destination number.
B. Dialer map.
C. Isdn spid1.
D. Isdn line number.

Ans:B

37. You just purchased a Cisco router from an online auction and now you have configured the router and everything is working perfectly in your test lab. You then issue the command copy run start to save your configuration to NVRAM. You turn off the power and mount the router in the production rack. After connecting the power cord you power up the router and the router boots into setup mode. You issue the show startup-config from privileged mode and your entire configuration is there. Which of the following indicates a possible source of the problem?
A. Hardware failure NVRAM prevents the router from loading the configuration.
B. Startup-config in flash is corrupt and cannot be analyzed.
C. Router configuration register set to bypass startup configuration.
D. Startup-config in NVRAM is corrupt and cannot be analyzed.

Ans:C

38. Your ISP has provided you the following class B network range 131.107.0.0/24. Which of the following statements is true regarding this network? (Choose two.)
A. There are 254 usable hosts per subnet.
B. There is one usable network.
C. There are 255 usable hosts per subnet.
D. There are 254 usable subnets.
E. There are 30 usable subnets.
F. There are 62 usable hosts per subnet.

Ans:A,D

39. What is an advantage of segmenting your LAN with a switch?
A. Smaller collision domains.
B. Elimination of broadcast.
C. Decrease cost of implementation.
D. Larger number of users within the same domain.

Ans:A

40. When setting up Frame Relay for point-to-point subinterfaces, you enter the following configuration:Router(config)#int s0/0 Router(config-if)#ip address 10.39.0.1 255.255.0.0 Router(config-if)#encapsulation frame-relay Router(config-if)#interface s0/0.39 point-to-point Router(config-if)#frame-relay interface-dlci 139 Router(config-if)#exit Router(config)#exit Router#copy run start Which of the following must not be configured?

A. The Frame Relay encapsulation on the physical interface.
B. The local DLCI on each subinterface.
C. An IP address on the physical interface.
D. The subinterface type as point-to-point.

Ans:C

41. Which show commands can you use to identify the local DLCI number? (Choose two.)
A. Show frame-relay local-dlci
B. Show frame-relay pvc
C. Show frame-relay dlci
D. Show frame-relay map E. Show ip route

Ans:B,D

42. There are some differences between routed and routing protocols. Which of the following are examples of those differences? (Choose two.)
A. A routed protocol is assigned to an interface and determines the method of packet delivery.
B. A routing protocol determines the path of a packet through a network.
C. A routed protocol determines the path of a packet through a network.
D. A routing protocol operates at the transport layer of the OSI model.
E. A routed protocol updates the routing table of a router.

Ans:A,B

43. What are the generic parts of a layer 3 address?
A. An internetnetwork number and a URL .
B. A vendor code and a serial number.
C. A network number and host number.
D. A broadcast number and unicast number.
E. A domain identifier and a device identifier.

Ans:C

44. You purchased a router from an online auction and you are unable to login to privileged mode because the router has been configured with a password. You need to perform password recovery. One of the first steps in performing password recovery is recording the current configuration register setting from user mode. What is the command to view the configuration register?
A. Show register.
B. Show flash.
C. Show boot.
D. Show version.

Ans:D

45. Your manager is concerned about security on the subnet 10.0.1.0/24 that has the accounting servers on it. He would like to make sure users can not telnet to those accounting servers and as asked you to add a statement to your existing access-list to prevent users from accessing those devices via telnet. Which one of the following statements should you enter?
A. Access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet
B. Access-list 115 deny tcp any 10.0.1.0 eq telnet
C. Access-list 115 deny udp any 10.0.1.0 eq 23
D. Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23
E. Access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23

Ans:D

46. You have been assigned a class C network address. Your manager has asked to you create 30 subnets with at least 5 hosts per subnet for the different departments in your organization. What should the subnet mask be to create 30 subnets?
A. 255.255.255.255
B. 255.255.255.248
C. 255.255.255.0

Ans:B

47. Which of the following are true about connection-oriented network servers? (Choose two.)
A. Non-reliable
B. Reliable
C. Less bandwidth-intensive
D. Handshaking

Ans:B,D

48. You would like the router to look in NVRAM upon boot up. Which one of the following would be the correct value for the configuration register?
A. 0x42
B. 0x2102
C. 0x001
D. 0x2101

Ans:B

49. You just purchased a brand new Cisco 2621 router. By default when the router boots which search sequence does it use to locate the IOS software?
A. Flash, TFTP server, ROM
B. NVRAM, TFTP server, ROM
C. ROM, Flash, TFTP server
D. ROM, NVRAM, TFTP server

Ans:A

50. To perform password recovery on a Cisco router you have to modify which of the following? (Choose two.)
A. Nvram
B. Configuration register
C. Boot flash
D. Cmos
E. Flash

Ans:A,B

51. Which hardware device enables high-speed data exchange on a LAN?
A. Hub
B. Bridge
C. Switch
D. Repeater

Ans:C

52. Cisco supports three different LMI types for Frame Relay. Which of the following are the type LMI types? (Choose three.)
A. IETF
B. Q931
C. Q933A
D. IEEE
E. CISCO
F. ANSI

Ans:C,E,F

53. You have installed a new PC to your access layer switch. You have configured the IP address, subnet mask, default gateway, and DNS settings. You have verified that the information you have entered is correct and that the proper cable was used however this PC is unable to access devices that are connected to the same switch. What is the likely cause of this problem?
A. The router lacks a routing table entry for the new host.
B. The host switch port is assigned to the incorrect VLAN.
C. The host MAC address is incorrectly configured.
D. A VTP instance for the new host has not been installed.

Ans:B



54. You just finished installing a new operating system on a computer located in the accounting department. You would like to verify the network configuration from the new computer so you establish FTP connection to a remote TFTP server. Which layer of the OSI model did you use for this operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Data link
F. Internet

Ans:A

55. Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.)
A. Link-state advertisement (LSA)
B. Spanning Tree Protocol.
C. Shortest path first tree.
D. Split horizon.
E. Hold-down timers.

Ans:D,E

56. Which of the following correctly identifies switched and routed data flow?
A. Switches create a single collision domain and a single broadcast domain. Routers provide separate broadcast domains.
B. Switches create separate collision domains but a single broadcast domain. Routers provide separate broadcast domains.
C. Switches create a single collision domain and a separate broadcast domain. Router provides a separate broadcast domain as well.
D. Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains.

Ans:B

57. Your company has purchased some Cisco routers from an online auction. You need to make a backup copy of the IOS and store it on a TFTP server. Which of the following should be done prior to copying the IOS image to a TFTP server? (Choose three.)
A. Make sure that the network server can be accessed.
B. Check that the authentication for access is set.
C. Ensure that the network server has adequate space for the code image.
D. Verify any file naming and path requirements.
E. Make sure that the server can load and run the bootstrap code.

Ans:A,C,D

58. Cisco supports three types of switching modes on switches. Which mode of switching can have a variable latency through the switch?
A. Store-and-forward.
B. Cut-through.
C. Fragment-free.

Ans:A

59. Using a class C address range 192.168.21.12 your network needs twenty-eight subnets. Which subnet mask should you use?
A. 255.255.0.28
B. 255.255.255.0
C. 255.255.255.28
D. 255.255.255.248
E. 255.255.255.252

Ans:D

60. Access-list 122 permit ip 131.107.30.0 0.0.0.255 any You apply the access-list above. Which is the effect?
A. Permit all packets matching the first three octets of the source address to all destinations.
B. Permit all packets matching the last of the destination address and accept all source address.
C. Permit all packets from the third subnet of the network address to all destinations.
D. Permit all packets matching the host bits in the source address to all destinations.
E. Permit all packets to destination matching the first three octets in the destination address.

Ans:A

61. Which channels are used by ISDN BRI?
A. 2d+b
B. 23d+b
C. 2b+d
D. 23b+d

Ans:C

Tidak ada komentar:

Posting Komentar