Jumat, 02 Januari 2009

G-CCNA 640-801

1. What was one of the most important reasons the International Organization for Standardization released the OSI model?

A. Users could access network server faster.
B. Different vendor?s networks could work with each other.
C. The industry could create a standard for how computers work.
D. The network administrator could increase the overall speed of their network.

Ans:B

2. You have just entered the command copy running-config startup-config command to save your configuration so that if the router is rebooted it will keep your configuration. Which type of router memory normally stores the startup configuration?
A. RAM
B. ROM
C. FLASH
D. NVRAM

Ans:D

3. Assuming a default subnet mask which two pieces of information can be derived from the IP address 131.107.2.200? (Choose Two)
A. It is a Class C address
B. It is a Class B address
C. The network address is 131.0.0.0
D. The network address is 131.107.2.0
E. The host portion of the address is 2.200

Ans:B,E

4. Comparing half-duplex Ethernet to full-duplex Ethernet which of the following are true? (Choose two.)
A. Shared collision domain.
B. Private collision domain.
C. Higher effective throughput.
D. Lower effective throughput.
E. Private broadcast domain.

Ans:A,D

5. You are configuring an old router that is running an old IOS that does not support inverse arp. If a router does not support inverse arp how can you setup this frame relay connection?
A. Configure static maps.
B. Define an IP address.
C. Disable DHCP on the Frame Relay router.
D. Configure a static route to the remote network.

Ans:A

6. Given the following criteria for granting access from a remote site to your LAN: Restrict access on interface E1 E1=207.87.81.173 Deny access to telnet, FTP, SNMP Allow all other types of operations.

Which line should come last in configuring your access list?

A. Access-List 101
B. Access-List 101 deny E0 telnet FTP
C. Access list 101 allow all except FTP telnet
D. Access list 101 permit IP 0.0.0.0 255.255.255.255 any
E. Access List 101 deny IP 207.87.81.173 TCP EQ 20 21 23

Ans:D

7. Most networks are often described as using either 10BaseT or 100BaseTX media. What does the 'Base' in these media types mean?
A. It describes the signaling method for communication on the network.
B. It refers to the type of media used in the network.
C. It relates to the speed of transmission of network signals.
D. It defines the allowable length of media that can be used.
E. It defines half-duplex or full-duplex operation.

Ans:A

8. To configure a Frame Relay Router with subinterfaces on interface Serial 3. Which subinterface number could you use for this configuration?
A. 1 and 2.
B. 3.2 and 3.3
C. 1 and 1.1
D. 3.1a and 3.1b.

Ans:B

9. Using a protocol analyzer we noticed sustained, heavy collisions in our CSMA/CD LANs. What are some possible affects could this have our LAN? (Choose three.)

A. Increased broadcast traffic.
B. Delay.
C. Low throughput.
D. High throughput.
E. Congestion.
F. Higher bandwidth.

Ans:B,C,E

10. Which of the following are layer 7 protocols? (Choose two.)
A. Ping
B. Telnet
C. FTP
D. TCP
E. IP

Ans:B,C

192. What is the total bandwidth of an ISDN BRI circuit?
A. 54 kps
B. 64 kps
C. 112 kps
D. 128 kps
E. 144 kps

Ans:E

197. Which one of the layers of the seven layer OSI model uses positive acknowledgement and retransmission to ensure reliable delivery?
A. Application
B. Presentation
C. Session
D. Transport
E. Data link
F. Physical

Ans:D

198. To distinguish between each PVC what does the Frame Relay switch use?
A. Data link connection identifier (DLCIs)
B. CNs
C. FECNs
D. Local management interface LMI

Ans:A

200. RouterA has two redundant paths serial links to RouterB. RouterA and RouterB are only using the IPX protocol. You have noticed that RouterA is not using both paths to get to RouterB. Which command can you enter to enable load balancing across those serial links?
A. ipx load-balance.
B. ip maximum-paths 2.
C. ipx maximum-paths 2.
D. ipx load-share.

Ans:C

201. Julia telnets to a pc on a remote subnet, which MAC address will be present in the ARP table when you issue the show arp command?
A. MAC address of the destination host Ethernet port.
B. MAC address of the local router Ethernet port.
C. MAC address of the destination router Serial port.
D. MAC address of the local router Serial Port.

Ans:B


203. You have just entered the command: Superhero(config-line)#logging sync Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command.

Which keystroke(s) did you use to complete the above command above to the completed following command: Superhero(config-line)#logging synchronous ?

A. Ctrl+shift+6 then x.
B. Ctrl+Z
C. TAB
D. /? E. Shift

Ans:C

204. How do you change the Console password on the Sonic router to "cisco"?
A. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)#password cisco
B. Sonic(config)#line con 0 Sonic(config-line)#login Sonic(config-line)# password Cisco

Ans:A

205. Christopher issues a show cdp neighbor command from Router
A. RouterA has connections to RouterB and RouterC through the serial s0 and s1. Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three)

A. The neighboring router?s host name.
B. The neighboring router?s hardware platform.
C. Up to one address for each protocol supported.
D. Up to two addresses for each protocol supported.
E. As many addresses as are configured for each protocol supported.

Ans:A,B,C

206. Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams?
A. ICMP echo request.
B. Information request.
C. Timestamp reply.
D. Redirect.
E. Source quench.

Ans:A

207. All TCP/IP hosts implement the ICMP protocol?
A. TRUE
B. FALSE

Ans:A

208. Your company has decided to use IGRP instead of RIP as the routing protocol. They want to use autonomous system number 130. Which is the correct command for this installation?
A. Router(config)# igrp 130
B. Router(config)# network 130
C. Router(config)# router igrp 130
D. Router(config)# enable igrp 130

Ans:C

209. To govern the flow of data between two devices, TCP uses a flow control mechanism. Which one of the following is true about this mechanism?
A. TCP makes no effort to check for lost or duplicate data packets.
B. The application layer must sequence data packets when using TCP.
C. TCP controls the flow of UDP data through negative acknowledgements NAK.
D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable.

Ans:D

210. What are the benefits of replacing a hub with a bridge and segmenting the network?
A. It increases the number of collision domains.
B. It decreases the number of collision domains.
C. It increases the number of broadcast domains.
D. It decreases the number of broadcast domains.

Ans:A

211. Your company is considering purchasing a new accounting software application from ABC accounting company. The ABC accounting company has decided to come in and let you install a demo copy of their software so that you can test it in your network with a few hosts. The server and the hosts that will connect to this server will need a 10Mbps connection. Your company is currently using a hub. Your company has decided to use this new accounting software application. However when you ran your packet analyzer you noticed the rest of the hosts on your network that are not using this application have a bandwidth problem with the new accounting system installed. Since your company has decided to use this new application they would like you to resolve the bandwidth problem. What is the most economical decision would you implement for resolving this problem?

A. Install new 100 Mbps switches, and change all hosts? NIC to 100 Mbps.
B. Segment network with router, and place all testing hosts and the new server into a separate subnet (network).
C. Add a Bridge and separate the two networks.

Ans:B

212. What must you do to test connectivity on a dial on demand routing (DDR) link?
A. Increate the idle import parameter.
B. Send interesting traffic across the link.
C. Switch
D. Repeater

Ans:B

213. Cisco supports IPX traffic using different encapsulation types can go over the same interface.
A. TRUE
B. FALSE

Ans:A


216. What is the protocol and what is the second part of the following network address: 10.0.0.254 mask 255.0.0.0 ? (Choose all that apply.)
A. IPX MAX address.
B. IP Class C director broadcast.
C. Private IP address node number.
D. Public IP address directed broadcast.
E. Private IP address directed broadcast.

Ans:c

217. Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248

Ans:B

218. Which layer of the OSI model handles data translation, code formatting, and encryption occur?

A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation

Ans:F

219. RouterA is directly connected to RouterB. On RouterA you shutdown the interface that is going to RouterB (you put it administratively down). If you issue the command show interface on RouterB what output status would you see on the interface that is connected to RouterA?
A. Interface is down, line protocol is down.
B. Interface is down, line protocol is up.
C. Interface is up, line protocol is down.
D. Interface is up, line protocol is up.

Ans:A

220. Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.)
A. Too many hosts in a broadcast domain.
B. Full Duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Segmentation.
F. Low bandwidth.

Ans:A,C,D,F

221. Looking at this address 255.255.255.255 which one of the following is true?
A. IP, a flooded broadcast.
B. IP, a directed broadcast.
C. IPX, a flooded broadcast.
D. IPX, a remote directed broadcast.

Ans:A

222. IP addresses use hierarchical numbering. What portion of the address that will identify the network number?
A. Subnet Mask.
B. Dots between octets.
C. Class of first octet.
D. Assignments of DHCP.
E. Address Resolution Protocol.

Ans:C

223. Which wide are network technology was designed to use high-performance digital lines and is packet switched?
A. FDDI
B. ISDN
C. ATM
D. Frame Relay

Ans:D

224. Which of the following are functions that occur at the transport layer of the OSI model? (Choose three)
A. Route selection-IP
B. Sliding window-UDP
C. Well known ports-IP
D. Route validation-ICMP
E. Connection oriented-TCP/IP
F. Three way handshake TCP/IP
G. No acknowledgement-UDP

Ans:E,F,G



226. Which wide area network technology was designed to work with traditional POTS lines and provide SOHO?s and users with a higher speed digital dial-up service?
A. Frame relay
B. X.25
C. ATM
D. ISDN

Ans:D

227. Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and the total number of host per network?

A. 1 network with 254 hosts.
B. 2 networks with 128 hosts.
C. 4 networks with 64 hosts.
D. 6 networks with 30 hosts.

Ans:A

228. Exhibit: You are configuring R2 so that it can communicate with R1 on serial port s0. What encapsulation should you use on s0 to setup this IPX network?

A. SAP
B. HDLC
C. ARPA
D. Novel Ether

Ans:B

230. Exhibit You want to create a sub interface on serial 0 on Router R2. Which of the following is the correct syntax to create this sub interface 2?

A. Interface s0.2 point-to-point.
B. Interface 2s0 point-to-point.
C. Subinterface 2s 0 point-to-point.
D. Interface s0 sub2 point-to-point.
E. Interface s0.1 point-to-point sub2.

Ans:A

231. Exhibit: You are configuring the IPX encapsulation between RouterA and RouterB. This connection will be using the S0/0 port on RouterA to S0/0 on RouterB. Which encapsulation type should be used for the S0/0 port of RouterB?

A. SAP
B. HDLC
C. ARP
D. NOVELLETHER

Ans:B

232. Exhibit:

You are configuring R3 so that it can communicate with R2 on Ethernet port e1. What encapsulation should you use on s0 to setup this IPX network?

A. SAP
B. HDLC
C. ARPA
D. Novell-Ether

Ans:D

233. Which one of the following characteristics about Ethernet Switches is true?

A. Symmetric switching allows connection between ports of unlike bandwidth and does not require memory buffering.
B. Memory buffering is used to prevent a bottleneck when ports of different bandwidth are connected on a symmetric switch.
C. The latency can be reduced if the switch utilizes the store and forward method of switching. Store and forward is better for error detection.
D. The cut-trough method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address.

Ans:D

248. Exhibit:

Frame Relay switch maps the DLCIs between Router A to Router B to create a PVC. Which statement below correctly identifies the reference point between the local router and the Frame Relay switch to which it is connected?

A. Locally significant DLCI
B. Globally significant DLCI
C. Locally significant LMI
D. Globally significant LMI

Ans:A

249. You have a leased line configured at a small office that connects to the corporate office. You company would also like to have a backup incase the lease line goes down. Which WAN service would you most likely choose to backup the leased line?
A. Frame relay with SVC
B. Dedicated serial line
C. ISDN with DDR
D. ATM

Ans:C

250. What are the advantages of using the OSI layered network model? (Choose three.)
A. Allows multiple-vendor development through standardization of network components.
B. Creates a list of communication rules that all companies must implement to get onto the Internet.
C. Allows various types of network hardware and software to communicate.
D. Prevents changes in one layer from affecting other layers, so it does not hamper development.
E. Allows companies to develop proprietary interfaces.

Ans:A,c,D

122. You just purchased a brand new Cisco 2621 Router and now would like to configure password protection on this router. Which of the following are true regarding passwords on this router?
A. All passwords can be encrypted.
B. All passwords can be entered using the set-up dialogue.
C. A password can be set before a user can enter the privileged mode.
D. A password can be set for individual lines.
E. TACACS or Radius password authentication can be used.

Ans:A,C,D,E

124. There are three major groups of routing protocols: distance-vector protocols, link-state protocols, and hybrid protocols. Select two valid statements regarding routing protocols? (Choose two)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Link state protocols send the entire routing table to all routers in the network.
C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the routing table.
D. Link state protocols send updates containing the state of their own links to all other routers on the network.

Ans:A,D

125. Which of the following ranges are used for IPX standard access lists?
A. 100 - 199
B. 600 - 699
C. 800 - 899
D. 1000 - 1099

Ans:C

126. ExhibitRouter1#show access-list

Extended IP access list 135 deny tcp any 131.107.0.0 0.0.255.255 eq 53 deny tcp any any eq telnet Router1#show ip interface e0 Ethernet0 is up, line protocol is up Internet address is 172.17.9.60/24 Broad address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is enabled Outgoing access list is 135 Inbound access list is not set

Proxy ARP is enabled Security level is default Split horizon is enabled Rest of configuration omitted.

You have created an Extended IP access list. Now you apply the access list to Ethernet 0.

What is the result of this action?

A. Only e-mail and telnet access will be permitted out of Ethernet 0.
B. All hosts on the 172.30.24.64 network will be permitted e-mail and telnet access.
C. All TCP protocols will be permitted out of Ethernet 0 except e-mail and telnet.
D. All IP traffic out of Ethernet 0 will be denied.
E. The access-list is numbered incorrectly and will fail.

Ans:D

50. To configure Router1 for operation in a Frame Relay environment, one of the recommended items to configure is the IGRP metric for the speed of the link. What command should you use?
A. Router1(config)# IGRP metric 36k
B. Router1(config)# bandwidth 36
C. Router1(config-if)# metric 36k
D. Router1(config-if)# bandwidth 36

Ans:D

128. You have just created an IP extended access list and now wish to apply this to an interface. Which command will allow you to apply the list to an interface?
A. Permit access-list 101 out
B. Ip access-group 101 out
C. Apply access-list 101 out
D. Access-class 101 out
E. Ip access-list e0 out

Ans:B

129. Which of the following devices operate at Data Link layer of the OSI model? (Choose two)
A. Router
B. SMTP server
C. Transceiver
D. Switch
E. Bridge
F. Hub

Ans:D,E

130. You have been called in to fix a router that is having security issues. The router has an access list configured on it but the list does not seem to be working. What command can you use to see if the access list has been applied to an interface?
A. Show access-list.
B. Show ip route.
C. Show ip interface.
D. Show interface.
E. Show interface list.

Ans:C

131. User Datagram Protocol is a Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is defined in RFC 768. Which of the following are generally considered to be characteristics of UDP? (Choose two.)
A. Non-reliable.
B. Reliable.
C. Less bandwidth-intensive.
D. Handshaking.

Ans:A,C

132. How many bits are used for a MAC address and how is number expressed?
A. 24 bits expression as a decimal number.
B. 24 bits expression as a hexadecimal number.
C. 36 bits expression as a binary number.
D. 48 bits expression as a decimal number.
E. 48 bits expression as a hexadecimal number.

Ans:E

133. Which command will provide you with information regarding the Layer 3 IP address of a directly connected neighbor?

A. Show ip interface
B. Show cdb neighbors
C. Show cdp neighbors detail
D. Show ip route
E. Show ip link status
F. Telnet

Ans:C

134. What is the bit pattern for the first octet of a class B network address 129.107.0.0?
A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx

Ans:B

135. Gail was working on your Cisco router while you were at lunch. Which command will display the last commands Gail entered?
A. Control header.
B. Show buffer.
C. Show history.
D. Show history buffer.

Ans:C

136. You are the network administrator of the ABC Tire Company. You receive a call from a user who is unable to reach a server at a remote server 10.0.5.250/240. Using VNC (Virtual Network Computing) you connect to the user?s computer and discover the following information:Local PC ? 10.0.3.35/24 Default gateway ? 10.0.3.1 Remote server ? 10.0.5.250/240 You then conduct the following tests from the user?s PC: ping 127.0.0.1 ? successful ping 10.0.3.35 ? successful ping 10.0.3.1 ? successful ping 10.0.5.250 ? unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed.
B. Local physical layer problem.
C. Local NIC not functioning.
D. Remote physical layer problem.

Ans:D

137. Which are the following are considered ISDN benefits? (Choose four)
A. Full time connectivity across the ISDN supported by Cisco IOS routing using dial on demand routing DDR.
B. Small office and home office sites can be economically supported with ISDN basic rate interface BRI services.
C. ISDN replaces signaling system ss7 in the public switch telephone network PSTN backbone.
D. ISDN can be used as a backup service for a lease line connection between the remote and central offices.
E. Modem racking and cabling can be eliminated by integration with digital modem cards on Cisco IOS network access servers NAS.

Ans:A,B,D,E

61. You are the network administrator of the Sonic Water Company. One of your users is unable to reach the company?s web site that is hosted at a remote site. Looking at the personal computer you discover the following information:Local PC ? 10.0.3.35/24 Default gateway ? 10.0.3.1 Remote server ? 10.0.5.250/240

You then conduct the following tests from the offending local PC: ping 127.0.0.1 ? successful ping 10.0.3.35 ? successful ping 10.0.3.1 ? unsuccessful ping 10.0.5.250 ? unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed.
B. Local physical layer problem.
C. Local NIC not functioning.
D. Remote physical layer problem.

Ans:B

Tidak ada komentar:

Posting Komentar