Below is a very easy to use shortcut that requires no binary math: Figure out the mask: /28 =
255.255.255.240 Figure out the subnet multiple: 256-240=16 Subnets are 16,32,48,64,80, etc
This is subnet 48, next subnet is 64, so the broadcast address is 63! Everything between the
subnet (48) and broadcast (63) are the valid hosts. In this example, based on the given mask, the
valid host ranges are 49-62.
30. What is a characteristic of Store and Forward switches? A.) They decrease latency. B.) They
forward the frame before it is completely read. C.) They are the same a Cut-Through switching.
D.) They read the entire frame and check CRC before forwarding. E.) They work at wire speed.
D
31. Given the following address: 157.89.8.64 255.255.0.0 which part represents the host portion
of the address? A.) 0.89.8.64 B.) 0.0.8.64 C.) 157.89.0.0 D.) 157.0.0.0 E.) 0.0.0.64
B Using the subnet mask 255.255.0.0, the first 16 bits represent the network, the last 16 bits
represent the host.
32. Which ISDN specification series deals with Concepts and Terminology? A.) F-Series B.) ISeries
C.) World Series D.) 911-Series E.) Q-Series F.) J-Series
B The 2 most important ISDN specifications are Q & I: Q - Call setup and teardown. I - Concepts
and terminology.
33. Which command would change the Cisco Discovery Protocol (CDP) update to 90 second
intervals? A.) cdp router 90 B.) router cdp 90 C.) cdp timer 1.5 D.) set timer cdp=1.5 E.) cdp timer
90 F.) timer cdp 1.5
E
34. Which command will copy the routers configuration script from RAM to NVRAM? A.) copy
running-config startup-config B.) NVRAM is read-only, so this is not possible. C.) save ram nvram
D.) save ram E.) copy all
A
35. Which command listed below sets the banner message when someone connects to the
router? A.) description # B.) login banner # C.) banner # D.) login description # E.) message # F.)
banner motd #
F
36 What should be the first command to create an access-list that prevents all users on
subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet B.) access-list 101 deny tcp
10.10.128.0 0.0.192.255 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any
eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet E.) access-list 101
deny tcp 10.10.128.0 255.255.192.0 any eq telnet F.) access-list 101 deny tcp 10.10.128.0
0.0.127.255 any eq telnet
D Wildcard masks for an entire subnet are easy to figure out (shortcut): Local Broadcast - Subnet
Mask = Inverted Wildcard Masks 255.255.255.255 -255.255.192. 0 ----------------- 0. 0. 63.255
37. What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) IETF B.) ARPA
C.) SAP D.) Cisco E.) Gandalf5 F.) Q933A
D Local Management Interface (LMI) types are Cisco, ANSI, and Q933A.
38. Which OSI Reference Layer is concerned with path determination? A.) Network B.) Physical
C.) Transport D.) Session E.) Datalink
A The Network layer is where routing occurs. (If you don't get this question right, there's always a
job at McDonalds!!)
39. Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a
second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 2.2.2.2
255.255.255.0 B.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 C.) ip address 2.2.2.2 255.255.255.0
secondary D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip
address 2.2.2.2 /24
C
40.
Transport C.) Presentation D.) Network E.) Application F.) Datalink
C The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF,
can also occur at this layer.
41. Which global configuration command will tell the router to load the IOS from ROM at next
boot? A.) This can not be done, only the first file in flash can be used. B.) boot system flash
IOS_filename C.) config-register 0x2102 D.) boot system rom E.) boot system tftp IOS_filename
tftp_address
D
42. What is the default subnet mask for a TCP/IP Class B address? (2 answers) A.) 255.255.0.0
B.) /8 C.) 255.255.255.0 D.) /24 E.) /16 F.) 255.0.0.0
A E
43. Most routing protocols recognize that it is never useful to send information about a route back
out the direction from which the original packet came. This is an example of which routing
technology? A.)
Updates
A The golden rule of Split Horizon: Do not send any update packet back out the same interface
that it was received or learned from. Poison Reverse is typically used on larger networks, where a
more aggressive routing loop solution is required.
44. You want to set the telnet password to
execute from global configuration mode? A.) enable password
password boston D.) set password=
F
45. Which command will start the process for creating a Cisco IOS file image backup to a network
file server? A.) copy ios tftp B.) copy ios network C.) copy tftp flash D.) copy flash tftp E.) copy ios
flash
D The IOS is stored in flash. The command format is: copy [source] [destination]
46. How do you determine which standard IP access lists are applied to interface E0 ? A.) show ip
access-list B.) show access-lists C.) show ip interface e0 D.) show interface e0 E.) show accesslist
e0
C To see which specific protocol access-lists are bound to the interface, Show ip int e0 or Show
ipx int e0 The command 'show access-lists' will display all access lists that exist, not just the ones
bound to a certian interface.
47. The Cisco Discovery Protocol (CDP) uses advertisements and discoveries. How does it send
this information? A.) Over a SNAP-capable link. B.) Layer 3 broadcast. C.) CDP does not use
advertisements. D.) Layer 2 multicast. E.) Layer 4 TCP. F.) SAP.
A D The Cisco proprietary protocol uses multicast, so that only other Cisco devices will listen to
these packets. CDP requires a SNAP-capable link to transmit.
48. In the TCP/IP protocol stack, there are five classes of addresses. Which class is used for
testing? A.) B B.) A C.) D D.) C E.) E
E A,B,C are valid for use on the internet D is multicast E is for research
49. Which subnet is the host 200.1.1.67 /26 on? A.) 200.1.1.32 B.) 200.1.1.128 C.) 200.1.1.0 D.)
200.1.1.16 E.) 200.1.1.64 E Shorthand notation /26 = 2 bits in the last octet = decimal
255.255.255.192 Shortcut: 256 - 192 = 64. Valid subnets are multiples of 64. (64, 128, 192, 256).
The closest value to 67 is between 64 (the network) and 127 (the broadcast).
50. The Datalink layer works with which of the following: A.) Bits B.) Packets C.) Frames D.)
Globules E.) Segments
Kevin
640-507
1. What are the valid Host ID's for 222.37.2.50 /24 ? A.) 222.37.2.48 - 222.37.2.66 B.) 222.37.2.49
- 222.37.2.62 C.) 222.37.2.0 - 222.37.2.255 D.) 222.37.0.0 - 222.37.255.254 E.) 222.37.2.1 -
222.37.2.254
D
2. Which commands listed below will move you from interface configuration mode back to global
configuration mode? A.) CTL+Z B.) CTL+F C.) exit D.) global E.) config t
C CTRL-Z and CTRL-C will abort you back to the root. Exit goes back one level.
3. You have a Unix server running the TFTP Daemon. What is the command to load a
configuration file from the TFTP server into the routers RAM? A.) copy tftp ram B.) copy tftp
running-config C.) read tftp D.) copy tftp startup-config E.) copy tftp nvram
B Remember RAM = RUNNING-CONFIG. All changes to RAM are immediate!
4. Given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which
portion represents the next hop TCP/IP address? A.) 125 B.) 3.3.3.0 C.) 255.255.255.0 D.) route
E.) 4.4.4.4
E Router(config)#ip route 3.3.3.0 255.255.255.0 ? A.B.C.D Forwarding router's address
5. In regards to the ISDN BRI standard, which channel is used for control? A.) E B.) Q C.) D D.) I
E.) B
C B is Bearer for Data (2 channels at 64kb each). D is for Control (16kb).
6. Which Distance Vector characteristic can help to speed up convergence? A.) Inverse ARP. B.)
Poison Reverse. C.) Triggered Updates. D.) Split Horizon. E.) Hold Down timers.
C Instead of waiting on a pre-set periodic interval (before sending the routing table), DV routing
protocols can send triggered updates to immediately notify the neighbor routers. Hold down
timers, Poison Reverse, and Split Horizon are features that are used to avoid routing loops.
7. What command would show the current configuration register settings? A.) show running-config
B.) show startup-config C.) show nvram D.) show ram E.) show version F.) show ios
E For most routers the configuration register settings are: 0x2102 normal operation (parse
NVRAM at startup), or 0x2142 password recovery (ignore NVRAM during startup).
8. What would the following command do?: 'Show Frame-Relay PVC' A.) Display LMI Info. B.) The
command is incomplete, and would be ignored. C.) Display all configured DLCI's. D.) Debug a
Frame-Relay Problem. E.) Show Virtual Links.
C The Permament Virtual Circuit (PVC) info is displayed along with the Data Link Connection
Identifiers (DLCI)'s.
9. Which of the following are examples of the Session Layer? (3 answers) A.) SQL B.) NFS C.) IP
D.) TCP E.) Netbios Names F.) Token Ring
A B E Controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain,
and synchronize communications between applications. Examples: SQL, RFC, RPC, X-Windows,
NetBIOS Names Layer 5 of the OSI reference model.
10. When editing a line in the CLI mode, what does 'CTRL-P' do? A.) Moves you to the next word.
B.) Moves you to the next command. C.) Moves you to the end of the line. D.) Moves you to the
beginning of the line. E.) Moves you to the previous command.
E
11. The Internet Control Message Protocol occurs at what layer of the seven layer model? A.)
Physical B.) Session C.) Datalink D.) Network E.) Presentation F.) Transport
D ICMP is used for error handling and testing at layer 3.
ICMP. Network LayerProvides path determination using a hierarchal logical address defined with a
network portion and node portion, net.node.Examples: IP, IPX.
12. Which command listed below enables load balancing over two multiple paths for IPX on a
Cisco router? A.) ipx routing 2 B.) ipx round-robin 2 C.) ipx maximum-paths 2 D.) ipx rip 2 E.) ipx
sap 2 F.) ipx gns 2
C The default IPX routing protocol is IPX-RIP. By default, RIP selects the best path, and keeps
only one route in its routing table. The 'IPX maximum-paths' command allows RIP to load balance
over up to 6 paths.
13. Which of the following is an example of the Physical Layer? A.) IP B.) LLC C.) SQL D.) DDP
E.) Ethernet
E
14. What class address is 193.1.3.4 ? A.) C B.) B C.) multi-cast D.) broadcast E.) A F.) D
A
15. Novell NetWare has an Ethernet frame type called Ethernet_802.3. What is the matching
Cisco command line keyword for this encapsulation method? A.) arpa B.) snap C.) novell-ether D.)
sap E.) dix F.) gns
C Novell 802.2 = sap (contains 802.2 LLC headers) Novell 802.3 = novell-ether (NetWare
proprietary) Ethernet_II = arpa (the Internet standard) snap = snap (field type set to 'AA')
16. What would be the first command from global configuration mode to perform the following: 1.
Enable IGRP on the router for interface E0 2. Tell IGRP to use an address of 157.89.4.4
255.255.255.0 3. Tell IGRP to provide routing updates for AS number 200? A.) router igrp
157.89.4.4 B.) network 157.89.4.0 255.255.255.1 C.) router igrp int e1 D.) router igrp 157.89.0.0
E.) network 157.89.4.0 F.) router igrp 200
F. You have to specify which routing protocol first. For IGRP you must also specify the
autonomous system number. Router(config)#router igrp ? <1-65535> Autonomous system number
17. From global configuration mode, which command will create subinterface #1 for serial 0? A.)
int sub serial 0 B.) int serial 0 subinterface 1 C.) int ss 0 D.) int s0.1 point-to-point E.) int serial 0
subinterface 0 F.) int s0
D. Command syntax for creating sub-interfaces:
18. The command 'ip host Dallas 157.89.8.64' maps the host name
What command would display all such mappings? A.) show dns B.) show dns entry
show neighbors D.) show hosts E.) show ip table F.) show dns cache
D Router#show hosts Host Flags Age Type Address(es) www.eku.edu (temp, OK) 0 IP 157.89.8.2
resolved via DNS
19. The command 'show running-config' displays the configuration script in RAM, but what other
command could you use to show information about objects stored in RAM? A.) show startupconfig
B.) show all C.) show config D.) debug ram E.) show buffers F.) show start
E Packets are stored in memory locations called buffers during periods when the router becomes
over-loaded with other requests.
20. Which of the following are examples of the Datalink Layer? (2 answers) A.) SQL B.) IP C.)
MAC D.) TCP E.) LLC
C E MAC and LLC are the sublayers of the Datalink layer.
21. Which type of switching reads in the entire frame before forwarding it? A.) Fast Forward B.)
Tabling C.) Cut-Through D.) Store-and-Forward E.) Inverse ARP F.) Routing
D Store-and-Forward is slower, but it checks the frame for errors before forwarding. This can
actually help to improve overall network performance on noisy lines.
22. What is the standard ISDN term for a non-native analog telephone? A.) ET B.) LE C.) TE2 D.)
TE1 E.) TA C Terminal Equipment 2 (TE2) does not support native digital ISDN. The analog device
will require an external analog to digital converter.
23. Which layer of the 7 layer model is responsible for representing the application information
between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Physical
C.) Application D.) Network E.) Session F.) Presentation
F. Presentation Layer Accepts data from application layer and negotiates data representation,
syntax, compression and encryption. Examples: ASCII, EBCDIC, JPEG, GIF, PICT,
24. How do you view all debugging that is currently enabled? A.) show running-config B.) show
startup-config C.) show debug D.) debug update E.) show flash F.) show version
C.
25. Which of the following is an example of the Network Layer? A.) SQL B.) LLC C.) TCP D.) IP E.)
Token Ring
D Most protocol suites have differnet OSI layer protocols within them. At layer 3, IP is for TCP/IP.
TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4.DDP is for Appletalk
26. Which type of switching is considered to be 'wire speed?' A.) Inverted B.) Layer 4 C.) Cut-
Through D.) Multiplexed E.) Layer 3 F.) Store and Forward
C
27. On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this
channel? A.) 1.544 Mbps B.) 2.048 Mbps C.) 128 Kbps D.) 16 Kbps E.) 64 Kbps
D
28 Which commands are valid to turn off all debugging? ( 2 answers) A.) clear logging B.) no
debug C.) no logging D.) clear debug E.) undebug all F.) no debug all
E F
29. Which of the following are valid Host ID's for 157.89.9.50 /28 (12 bits of subnetting)? A.)
157.89.9.49 - 157.89.9.64 B.) 157.89.0.0 - 157.89.255.255 C.) 157.89.9.0 - 157.89.9.255 D.)
157.89.9.32 - 157.89.9.63 E.) 157.89.9.49 - 157.89.9.62
E Below is a very easy to use shortcut that requires no binary math: Figure out the mask: /28 =
255.255.255.240 Figure out the subnet multiple: 256-240=16 Subnets are 16,32,48,64,80, etc This
is subnet 48, next subnet is 64, so the broadcast address is 63! Everything between the subnet
(48) and broadcast (63) are the valid hosts. In this example, based on the given mask, the valid
host ranges are 49-62.
30. What is a characteristic of Store and Forward switches? A.) They decrease latency. B.) They
forward the frame before it is completely read. C.) They are the same a Cut-Through switching. D.)
They read the entire frame and check CRC before forwarding. E.) They work at wire speed.
D
31. Given the following address: 157.89.8.64 255.255.0.0 which part represents the host portion of
the address? A.) 0.89.8.64 B.) 0.0.8.64 C.) 157.89.0.0 D.) 157.0.0.0 E.) 0.0.0.64
B Using the subnet mask 255.255.0.0, the first 16 bits represent the network, the last 16 bits
represent the host.
32. Which ISDN specification series deals with Concepts and Terminology? A.) F-Series B.) ISeries
C.) World Series D.) 911-Series E.) Q-Series F.) J-Series
B The 2 most important ISDN specifications are Q & I: Q - Call setup and teardown. I - Concepts
and terminology.
33. Which command would change the Cisco Discovery Protocol (CDP) update to 90 second
intervals? A.) cdp router 90 B.) router cdp 90 C.) cdp timer 1.5 D.) set timer cdp=1.5 E.) cdp timer
90 F.) timer cdp 1.5
E
34. Which command will copy the routers configuration script from RAM to NVRAM? A.) copy
running-config startup-config B.) NVRAM is read-only, so this is not possible. C.) save ram nvram
D.) save ram E.) copy all
A
35. Which command listed below sets the banner message when someone connects to the
router? A.) description # B.) login banner # C.) banner # D.) login description # E.) message # F.)
banner motd #
F
36 What should be the first command to create an access-list that prevents all users on
subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet B.) access-list 101 deny tcp
10.10.128.0 0.0.192.255 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any
eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet E.) access-list 101
deny tcp 10.10.128.0 255.255.192.0 any eq telnet F.) access-list 101 deny tcp 10.10.128.0
0.0.127.255 any eq telnet
D Wildcard masks for an entire subnet are easy to figure out (shortcut): Local Broadcast - Subnet
Mask = Inverted Wildcard Masks 255.255.255.255 -255.255.192. 0 ----------------- 0. 0. 63.255
37. What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) IETF B.) ARPA
C.) SAP D.) Cisco E.) Gandalf5 F.) Q933A
D Local Management Interface (LMI) types are Cisco, ANSI, and Q933A.
38. Which OSI Reference Layer is concerned with path determination? A.) Network B.) Physical
C.) Transport D.) Session E.) Datalink
A The Network layer is where routing occurs. (If you don't get this question right, there's always a
job at McDonalds!!)
39. Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a
second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 2.2.2.2
255.255.255.0 B.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 C.) ip address 2.2.2.2 255.255.255.0
secondary D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip
address 2.2.2.2 /24
C
40.
Transport C.) Presentation D.) Network E.) Application F.) Datalink
C The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF,
can also occur at this layer.
41. Which global configuration command will tell the router to load the IOS from ROM at next
boot? A.) This can not be done, only the first file in flash can be used. B.) boot system flash
IOS_filename C.) config-register 0x2102 D.) boot system rom E.) boot system tftp IOS_filename
tftp_address
D
42. What is the default subnet mask for a TCP/IP Class B address? (2 answers) A.) 255.255.0.0
B.) /8 C.) 255.255.255.0 D.) /24 E.) /16 F.) 255.0.0.0
A E
43. Most routing protocols recognize that it is never useful to send information about a route back
out the direction from which the original packet came. This is an example of which routing
technology? A.)
Updates
A The golden rule of Split Horizon: Do not send any update packet back out the same interface
that it was received or learned from. Poison Reverse is typically used on larger networks, where a
more aggressive routing loop solution is required.
44. You want to set the telnet password to
execute from global configuration mode? A.) enable password
password boston D.) set password=
F
45. Which command will start the process for creating a Cisco IOS file image backup to a network
file server? A.) copy ios tftp B.) copy ios network C.) copy tftp flash D.) copy flash tftp E.) copy ios
flash
D The IOS is stored in flash. The command format is: copy [source] [destination]
46. How do you determine which standard IP access lists are applied to interface E0 ? A.) show ip
access-list B.) show access-lists C.) show ip interface e0 D.) show interface e0 E.) show accesslist
e0
C To see which specific protocol access-lists are bound to the interface, Show ip int e0 or Show
ipx int e0 The command 'show access-lists' will display all access lists that exist, not just the ones
bound to a certian interface.
47. The Cisco Discovery Protocol (CDP) uses advertisements and discoveries. How does it send
this information? A.) Over a SNAP-capable link. B.) Layer 3 broadcast. C.) CDP does not use
advertisements. D.) Layer 2 multicast. E.) Layer 4 TCP. F.) SAP.
A D The Cisco proprietary protocol uses multicast, so that only other Cisco devices will listen to
these packets. CDP requires a SNAP-capable link to transmit.
48. In the TCP/IP protocol stack, there are five classes of addresses. Which class is used for
testing? A.) B B.) A C.) D D.) C E.) E
E A,B,C are valid for use on the internet D is multicast E is for research
49. Which subnet is the host 200.1.1.67 /26 on? A.) 200.1.1.32 B.) 200.1.1.128 C.) 200.1.1.0 D.)
200.1.1.16 E.) 200.1.1.64 E Shorthand notation /26 = 2 bits in the last octet = decimal
255.255.255.192 Shortcut: 256 - 192 = 64. Valid subnets are multiples of 64. (64, 128, 192, 256).
The closest value to 67 is between 64 (the network) and 127 (the broadcast).
50. The Datalink layer works with which of the following: A.) Bits B.) Packets C.) Frames D.)
Globules E.) Segments
Tidak ada komentar:
Posting Komentar