Vous êtes sur la page 1sur 13

Top of Form

Question 1
You want to verify the configuration register entry of a Cisco 2500 series router. What command should
you use on the router?

a. show config-reg

b. show version

c. show register

d. show running-config

e. show bootflash

f. show flash
Bottom of Form

Question 2
Users on a network subnet experience slow connectivity when trying to access file servers located on
another LAN segment. There are more than 200 users on the subnet. A Cisco 2500 router serves as the
default gateway as well as the firewall for the subnet. You suspect the problem could be caused by
excessive CPU utilization on the router.
What command will verify that this is the case?

a. show cpu

b. show cpu utilization

c. show cpu processes

d. show hardware

e. show processes cpu


Question 3
Which four of the following must you know about configuring passwords on a Cisco router?

a. It is possible to configure all line access passwords during setup configuration mode.

b. All passwords can be encrypted.

c. Each line access port can be assigned a password.


d. Local database can be used for password authentication.

e. External Radius or TACACS servers can be used for password authentication.

f. Only privileged configuration mode can be assigned a password.


Question 4
Which three of the following information is gathered by the Cisco Discovery Protocol?

a. Hardware platform.

b. All addresses of each layer 3 protocol.

c. Only one address of each layer 3 protocol.

d. Routing table.

e. Routing protocol .

f. Device ID.
Question 5
It was a Saturday morning. You had just been waked up by a pager call about a connectivity problem
between a branch router and the head office router. Both routers are connected via a leased line. The link
needs to be up 24-hour a day because it carries important financial transactions.
You began your troubleshooting by trying to connect to the branch router using telnet but failed.
Fortunately, you managed to connect to a dial up modem attached to the branch router. You did a 'show
interface' command on the router. The result is shown below:
Branch#show interface serial 0/0
Serial0/0 is down, line protocol is down
Hardware is HD64570
Internet address is 192.168.10.2/30
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation HDLC, loopback not set, keepalive set (10 sec)
Last input never, output 00:03:11, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0 (size/max(drops): Total output drops: 0
Queuing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max active/threshold/drops)
Conversations 0/2/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
11 packets output, 476 bytes, 0 underruns
0 output errors, 0 collisions, 27 interface resets
0 output buffer failures, 0 output buffers swapped out
11 carrier transitions
DCD=down DSR=down DTR=down RTS=down CTS=down
Based on the output of the 'show interface serial 0/0' command issued on the branch router, which OSI
layer is most likely causing the problem?

a. Transport layer

b. Session layer

c. Data layer

d. Physical layer

e. Network layer
Question 6
Geoff is a network administrator of a small network consists of three Cisco 2600 routers interconnected by
a frame relay cloud. One day, he wants to add a static route to one of the remote router. He connects to
the router using telnet from his workstation. Which layer of the OSI protocol stack is Geoff using for this
task?

a. Application

b. Presentation

c. Session

d. Transport

e. Network

f. Data-link
Question 7
From the seven OSI layers, which layer is responsible for error recovery and reliability?

a. Presentation

b. Session
c. Application

d. Transport

e. Network

f. Data-link
Question 8
You are a network consultant for Super LAN Interconnect, Inc. (SLII). One of your clients has a flat
Ethernet network with 500 end-users and server farms. The network performance is poor from time to
time.
The client hires your company to do analysis and redesign the current network infrastructure to improve
performance. You recommend to segment the flat network into multiple segments. What is the benefit of
your solution to solve the problem?

a. It will increase the number of collision domains.

b. It will decrease the broadcast domains.

c. Less total cost of ownership (TCO).

d. More users can be allocated within a single broadcast domain.

e. Smaller collision domains without the need of layer 3 routing.


Question 9
To understand the operation of bridges is essential to understand the operation of switches. Which three
of the following characterize the correct operation of bridges and switches?

a. Bridges are inherently more robust and faster than switches.

b. Switches operate at data link layer while bridges operate at physical layer.

c. Both bridges and switches forward data link layer broadcasts.

d. Switches commonly have a higher port density compared to bridges.

e. Switches are mainly software based while bridges are hardware based.

f. Switches create collision domains while bridges define broadcast domains.

g. Both bridges and switches forward traffic based on layer 2 addresses.


Question 10
Acme Provisioning, Inc., a local IT integration provider, has just completed redesigning its campus LAN
with VLAN segmentation. You, as the company's network administrator, have been tasked to connect 10
Windows XP Professional workstations to the access-layer switches (Catalyst 2900XL switches).
You verify that correct IP address, subnet mask, default gateway, and DNS servers have been configured
on all PCs. You have also checked that correct Category 5 cabling are used for the connection. However,
some workstations are experiencing problems connecting to other workstations on the same switch.
Which of the following is most likely cause of the problem?

a. The access-layer switch does not propagate the host routing entries to the core layer switches.

b. The switch ports on which the workstations are connected to are configured with incorrect

VLAN.

c. The workstations have been configured with invalid MAC addresses.

d. Spanning-Tree Protocol (STP) has been disabled on those switch ports.

e. The router that performs intra-VLAN routing does not have route entries for the workstations.

Question 11
A Catalyst 2950 switch runs multiple VLANs to serve different workgroups. You want to verify that VLAN
100 is working properly and execute the 'show spantree' command.
Which of the following line confirms the correct operation of VLAN 100?

a. Port FastEthernet 0/1 of VLAN 1000 is forwarding.

b. Root port is FastEthernet 0/24.

c. VLAN 100 is executing ISL compatible spanning-tree protocol.

d. Designated port is Ethernet 0/1, path cost 10.

e. Designated root has priority 0, address 0080.35C 298 d.


Question 12
You want to extend VLAN from a Catalyst 500 switch to another switch of the same model and setup trunk
connectivity between them. Which of the following VLAN frame tagging are available as a choice?

a. Inter-Switch Link (ISL)


b. 802.1Q

c. 802.1D

d. 802.3u

e. 802.10

f. LAN Emulation (LANE)


Question 13
You have just started as a junior network administrator for a local department store in your city. One of
your first tasks is to provide LAN connectivity for end users. Which of the following Ethernet technology
can operate in full-duplex mode? (Select three.)

a. 10Base2

b. 10Base5

c. 10BaseT

d. 100BaseT

e. 1000BaseT
Question 14
The 10BaseT Ethernet standard defines full-duplex mode as well as half-duplex mode. Which of the
following are characteristic of full-duplex mode? (Choose three.)

a. Higher effective throughput

b. Private collision domain

c. Shared collision domain

d. Lower effective throughput

e. No collisions

f. Private broadcast domain


Question 15
Your LAN has undergone a redesign to accommodate new applications' bandwidth requirements. As the
head of the project team, you must direct the team to come out with a sound yet economical
recommendation.
The requirements are:
a. There are one Windows 2000 Domain Controller and one SQL Server 2000 serves the needs of 35
local users.
b. Each user needs to be able to collaborate between them and access the network servers at 10
Mbps bandwidth.
c. Other department in your company will use not higher than 2.5 Mbps bandwidth from the network
servers.
Which of the following best fulfills the above requirements?

a. Install two Catalyst 1900 switches and configure the servers to use 100 Mbps ports. Assign

dedicated 10 Mbps to the end-user ports.

b. Replace existing 10baseT hubs with 100BaseT hubs to improve overall performance

c. Separate the servers' network segment from the users through the use of a router. This segregation

will provide more bandwidth.

d. Put a bridge between the servers' network segment and the users.

e. Retain existing hubs but separate the network segments with multiple VLANs.
Question 16
When designing a switch internetwork, one important consideration is the physical cabling distance. What
is the maximum allowable distance of the 100BaseTX standard?

a. 10 m

b. 50 m

c. 95 m

d. 100 m

e. 1000 m
Question 17
You are investigating a LAN congestion issue using a network sniffer. Several entries of address
175.36.78.255 appear in the capture result. What is the function of this address?

a. IP directed broadcast
b. IP multicast group

c. Reserved IP address

d. IPX SAP broadcast

e. IPX multicast address


Question 18
TCP/IP is the most used protocol in today networking world. Which three of the following statements
about TCP/IP functionalities are correct?

a. IP is a connection-less service and responsible for path determination.

b. TCP provides dynamic throughput for large data transfer through windowing and connection-

oriented services.

c. RARP enables MAC address resolution from IP address.

d. ICMP provides control and error notification through connection-oriented messages.

e. UDP provides an efficient way of delivering information without additional overheads and

acknowledgments using connection-less services.


Question 19
What two Cisco IOS commands can be used to verify IP address existence in a network?

a. show

b. icmp

c. trace

d. arp

e. ping

f. debug
Question 20
Which of the following IOS command displays all routed protocols configured on a Cisco router as well as
the interfaces on which the protocols are enabled?
a. show interfaces

b. show protocols

c. show routed protocols

d. show interfaces protocol

e. show protocol all

f. show ip interface brief


Question 21
Fred is a network administrator of GoMart, Inc. His company network runs RIP as the routing protocol.
One day, he notices that a Token Ring subnet, 192.168.9.0/24, shuts down. Fred enables the 'debug ip
rip' command on the router. Which of the following message received on the router is related to the
problematic subnet?

a. Subnet 192.168.9.0, metric 16

b. Subnet 192.168.9.0, metric 15

c. Subnet 192.168.9.0, metric 0

d. Subnet 192.168.9.0, metric 1

e. Subnet 192.168.9.0, metric 255


Question 22
Routing protocols can be generally classified into distance-vector or link-state. Each method has its own
advantages and disadvantages. Which of the following routing protocol takes the benefits of both
methods?

a. RIP

b. IGRP

c. EIGRP

d. OSPF

e. IS-IS
Question 23
Generally, routing protocols can be classified into classfull and classless routing protocols. Which of the
following are categorized as classfull?

a. All versions of RIP

b. BGP

c. OSPF

d. RIP version 1

e. IGRP

f. EIGRP
Question 24
Which of the following statements correctly activate IGRP routing process on a Cisco router?

a. router igrp 200


network 192.168.22.0
network 10.55.0.0

b. router igrp 200


network 192.168.22.0 255.255.255.0
network 10.0.0.0 255.0.0.0

c. router igrp 200


network 192.168.22.0
network 10.0.0.0

d. router igrp
network 192.168.22.0
network 10.0.0.0

e. router igrp 200


network 192.168.22.0 10.0.0.0
Question 25
You have been tasked to provide security measure on interface FastEthernet 0/0 of a Cisco router. You
create access-list 110 to deny HTTP traffic to the router. Which of the following command should be used
to apply the in the inbound direction to the interface?

a. ip access-group 110 inbound

b. access-group 110 in

c. apply access-list 110 in


d. ip access-list 110 inbound

e. ip access-group 110 in

f. access-class 110 in
Question 26
Which of the following statement will permit traffic from subnet 172.168.30.0/24 on a specific interface?

a. access-list 1 permit 172.168.30.0 255.255.255.0

b. access-list 99 permit 172.168.30.0 0.0.0.255

c. access-list 100 permit 172.168.30.0 0.0.0.255

d. access-list 10 permit 172.168.30.0

e. access-list 100 permit host 172.168.30.0 0.0.0.255


Question 27
Which of the following is a correct access-list statement?

a. access-list 100

b. access-list 100 allow any except http

c. access-list 100 deny serial 0 ftp http smtp

d. access-list 100 permit ip any 0.0.0.0 255.255.255.255

e. access-list 100 deny ip 172.168.10.2 tcp eq 65 66


Question 28
What IOS command will enable you to display which access-list is attached on a router interface?

a. show ip access-list

b. show ip interface

c. show interface

d. show access-list
e. show access-list interface
Question 29
Miami#debug ppp authentication
BRI0:1 PPP: send CHAP challenge id=58 to remote
BRI0:1 PPP: CHAP challenge from Florida
BRI0:1 PPP: CHAP response received from Florida
BRI0:1 PPP: CHAP response id=58 received from Florida
BRI0:1 PPP: Send CHAP success id=58 to remote
BRI0:1 PPP: Remote passed CHAP authentication
BRI0:1 PPP: Passed CHAP authentication
BRI0:1 PPP: Passed CHAP authentication with remote
You are examining ISDN BRI dialup connectivity between Miami and Florida routers using PPP
encapsulation. You enabled a debug command and obtained the result as shown in the output above.
What type of handshake is involved in the PPP authentication?

a. One-way

b. Two-way

c. Three-way

d. Four-way

e. No handshake occurred, only simple challenge and response messages


Question 30
The rate in bits per seconds at which the frame relay switch agrees to transfer data is called ___.

a. Data Link Connection Identifier (DLCI)

b. Committed Information Rate (CIR)

c. Peak Information Rate (PIR)

d. Local Management Interface (LMI)

e. Committed Rate Measurement Interval (CRMI)

f. Frame Eligible Committed Network (FECN)


Question 31
A branch office is connected through frame-relay PVCs to the company data centers. What are the
required steps to use point-to-point subinterfaces?
a. Do not configure any network layer addresses on the main interface.

b. Assign frame-relay DLCIs on the subinterfaces.

c. Assign frame-relay DLCIs on the main interface.

d. Configure layer 3 address on the physical interface.

e. Configure the subinterfaces to disable split horizon.


Question 32
A branch office has a frame-relay PVC to the corporate data center. The physical cable is connected to
interface serial 0 of the branch router. What command displays the LMI, DLCI, and speed of the frame-
relay link?

a. show interface serial 0

b. show interface frame-relay 0

c. show frame-relay lmi

d. show frame-relay serial 0

e. show statistics frame-relay

Vous aimerez peut-être aussi