Vous êtes sur la page 1sur 20

Which statements describe the functions of a router in a network?

(1,4)
(2 of 4 answers are correct)
Routers use the routing table to identify where to forward packets.
Routers create large broadcast domains.
Routers use ICMP to communicate network information from their own routing t
able with other routers.
Routers maintain their routing tables and ensure that other routers know of
changes in the network.

Which of the following parameters are Ethernet service attributes according to


MEF (Metro Ethernet Forum)?
(3 of 4 answers are correct)
Bandwidth profile.

Security filters.
Performance parameters.
Tunneling Flag.

What MUST be configured manually when an IP phone uses DHCP? (1)


(1 of 4 answers is correct)
The call number of the phone.
The default gateway.
The IP address.
The subnet mask.

What would you use to allow DHCP clients to receive their IP address from a DH
CP server on a different LAN segment? (4)
(1 of 4 answers is correct)
Enable BootP.
DHCP Proxy Agent.
Enable QoS.
DHCP Relay Agent.
Which of the following mechanisms are used by RTP?
(2 of 4 answers are correct)
Timestamps
Sequence numbers
QoS labels
Header compression
When does a Cisco router needs the parameter "administrative distance" ? (3)
(1 of 4 answers is correct)
If static routes are defined.
If dynamic routing is used.
If the same route is learned via multiple routing sources.

If multiple paths to the same network available, learned via the same routin
g protocol.

Which of the following statements about DMZ is correct? (1)


(1 of 4 answers is correct)
It is a network area that can be reached from the intranet and from the Inte
rnet and is protected by firewalls.
DMZ is a network area that is separated from the Internet by a firewall and
cannot be accessed from the intranet.
DMZ is a network area that cannot be accessed from the Internet.
It is a network area that can be reached from the intranet and from the Inte
rnet with no security restrictions.

Which of the following statements about virtual LANs (VLAN) are correct? (2,3)
(2 of 4 answers are correct)
They are based on shared LANs.
They are implemented with switches.
Packet switching is used for all VLAN traffic.
Broadcast messages for a VLAN are forwarded to other VLANs.
Which codec encodes voice at 64Kbps plus overhead? (2)
(1 of 4 answers is correct)
G.723
G.711
G.729
G.743

What are physical security issues?


(2 of 4 answers are correct)
Flooding of TCP/SYN packets.
Turning off the power of switch to block network access.
Turning off the air conditioning system in the network closet.
Infect a web server with a computer virus.

Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)
192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128

For what can UDP (User Datagram Protocol) be used? (2)


(1 of 4 answers is correct)
UDP is used for secured transport of data.

UDP is used for unreliable transport of data.


UDP is used for the transport of voice messages in TDM networks.
UDP supports congestion control.

Which of the following protocols are used for e-mail communication? (2,3,4)
(3 of 4 answers are correct)
SNTP
SMTP
POP3
IMAP4

An official IP address is required for connecting the home PC to the Internet vi


a ISDN. This address ... (3,4)
(2 of 4 answers are correct)
... is preset on the network card of the PC and is allocated by the PC suppl
ier.
... uniquely identifies the PC to the ISP (Internet Service Provider).
... is required for setting up an ISDN dial connection.
... is automatically received by the PC during connection setup by the ISP (
Internet Service Provider).

How is it possible that JAVA programs can be executed from practically every W
eb client?
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the clie
nt.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web
server.

Which of the following statements about packet loss for VoIP on a WAN connecti
on is correct?
(1 of 4 answers is correct)
Signaling data is retransmitted and voice data is lost.
All data is retransmitted.
Signaling data is lost and voice data is retransmitted.
All data is lost.

Which of the following protocols are used for transmitting voice bearer traffi
c? (2,3)
(2 of 4 answers are correct)
UDP
RTP
RTCP
TCP

What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? (1)
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)

What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"? (3)
(1 of 4 answers is correct)
0
8
2
4
There is a "hosts" file on every Windows Server in the folder: %WINDIR%\system
32\drivers\etc. What is this file for? (2)
(1 of 4 answers is correct)

This file contains the assignments of IP addresses to MAC addresses.


This file contains the assignments of IP addresses to host names.
This file contains the assignments of service names to TCP ports.
This file contains the assignments of service names to IP protocols.

Which of the following codecs works without compression? (1)


(1 of 4 answers is correct)
G.711
G.723
G.728
G.729

What is meant by PHB in DiffServ?


(1 of 4 answers is correct)
Each router handles prioritized packets based on FIFO.
Each router reserves exactly the same bandwidth for prioritized packets.
Each router behaves the same way for the forwarding of prioritized packets.
Each router is configured with exactly the same settings for QoS.

What is the minimum number of wires needed to create a 100BaseT link in a LAN?

(1 of 4 answers is correct)
2 wires
4 wires
6 wires
8 wires

Which statements about the Internet Control Message Protocol (ICMP) are correct?

(3 of 4 answers are correct)


ICMP messages are sent with TCP or UDP datagrams.

It transports control messages e.g. between a host server and a gateway to t


he Internet.
It is used for error reporting e.g. between a host server and a gateway to t
he Internet.
PING is often blocked at a WEB site's firewall because of DoS attacks.

Which of the following functions belongs to the GGSN?


(2 of 4 answers are correct)
Correlation of charging tickets from external data network and GPRS backbone
.
Cancellation of relocation due to area restrictions for a subscriber.
Classification of incoming packets from external data networks using TFTs to
route data into PDP contexts.
Release of PDP context due to release of IP addresses bound to a PDP context
.

What is the significance of jitter in a VoIP network?


(2 of 4 answers are correct)
Too much jitter will negatively affect the voice quality.
Not enough jitter will negatively affect the voice quality.
Jitter is required to support VoIP.
A buffer is required in the recieving device to accommodate network jitter.

Which statement is correct regarding Quality of Service (QoS) to ensure the be


st possible Voice over IP quality?
(1 of 4 answers is correct)
Only the endpoints in a VoIP connection must support a QoS mechanism; the in
termediate network infrastructure is irrelevant.
All elements of the IP infrastructure must support QoS.
Access-Router at the edge of the proprietary network should support the QoS
mechanism. The public part of the intermediate network infrastructure is irrelev
ant.
A single QoS protocol such as DiffServ is used for end to end QoS, therefore
multiple protocols are not necessary.

Which Cisco IOS command is used to set the clock speed to 64 kbit/s on a serial
interface on a Cisco router?
(1 of 4 answers is correct)
clock tempo 64000
clock rate 64000
clock speed 64
clock tempo 64
Which of the following mechanism does NOT increase system security?
(1 of 4 answers is correct)
Increasing the length of the encryption keys.
Increasing the level of the key algorithm.
Increasing the length of time a key is valid.
Increasing how often the key is changed.

Which of the following is a feature of the Resource Reservation Protocol (RSVP


)?
(1 of 4 answers is correct)
The option to use encryption for the internet access.
Signalling of "Per Hop Behavior" in the TCP header.

Transfer of small packets before the large packets.


Signaling bandwidth requirements.

Which part of the IP address evaluates the router with the help of the subnet ma
sk?
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.
Mask and host bits.
Host and subnet bits.

Which of the following protocols is NOT used in the IMS (IP Multimedia Subsyst
em)?
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)

Which of the following statements about delays in VoIP networks is correct?


(1 of 4 answers is correct)
The higher the delay, the better is the voice quality.
High delays have a negative impact on the voice quality.
Delay describes the number of dropped IP packets.
Voice compression does not cause delays

What is the decimal equivalent of the binary number 11001111?


(1 of 4 answers is correct)
199
207
219

231

Which of the following statements describe MPLS?


(2 of 4 answers are correct)
Destination addressing is done by the user.
It uses short headers with fixed length.
The TCP header contains label related settings.
The label is replaced with a new one at each hop.

How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redun
dancy?
(1 of 4 answers is correct)

By the Spanning Tree algorithm.


By ERPS (Ethernet Rings Protection Switching).
By dynamic source-rerouting.
By preconfigured protection paths.

What statement about the transport of real time communication is correct?


(1 of 4 answers is correct)
TCP is the best choice.
UDP is the best choice.
Both TCP and UDP are of equal quality.
Both TCP and UDP are are not useful.

Which of the following signaling protocols can be used to connect an IP-PBX to a


SIP-Proxy / SIP Application Server?
(2 of 4 answers are correct)
SIP-Connect
SIP-NNI
MGCP
RTP

Which of the following fields are in an IEEE 802.3 frame?


(3 of 4 answers are correct)
Checksum
Data
Length
Application

Which of the following services can use the G.723 codec?


(1 of 4 answers is correct)
Voice only.

Fax only.
Voice and video.
Fax and video.
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.

What is the network ID for the IP Address 115.150.177.44/255.192.0.0?


(1 of 4 answers is correct)
115.0.0.0
115.64.0.0
115.128.0.0
115.192.0.0

You wish to permanently prevent access to Internet IP address 2.2.2.2 from all
systems in your network. Which technology should you configure to achieve this
objective?

(2 of 4 answers are correct)


Personal firewall.
The packet filter of the proxy server.
The packet filter of the internet router.
Virus scanner.

Which of the following is true about the parameter "metric 3" in context of a ro
ute entry in a Windows system?
(1 of 4 answers is correct)
It shows the maximum distance in meters from the wireless LAN.
It shows the maximum distance in miles from the network.
It shows the amount of L2 switches between the network connections.

It shows the amount of L3 routers between the network connections

What does the term "QoS" stand for in connection with the concept and the capa
bility of IP or VoIP solutions?
(2 of 4 answers are correct)
Guarantee of voice quality in VoIP connections.
Increase in the reliability of telephones.
Predictable transmission performance.
Optimization of system maintenance.

What is the typical bitrate for the transmission of a good quality SDTV (Stand
ard-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s

Which of the following is true regarding SNMP communities?


(2 of 4 answers are correct)
All community names must be longer than 8 characters.
All community names are case sensitive.
Communities may have read or read-write access.
The trap community must be the same as the public community.
Which of the following specifications is not defining a call set up control prot
ocol?
(1 of 4 answers is correct)
SIP
MGCP-NCS
DOCSIS
H.323

What does the Cisco IOS command "cdp enable" do?


(1 of 4 answers is correct)
Enables Cisco Discovery Protocol on a particular interface.
Enables Cisco Discovery Protocol on a specific type of interface.
Enables Cisco Discovery Protocol on the whole device.
Enables Cisco Discovery Protocol for a specific protocol.
What is the difference between an ethernet hub and an ethernet switch?
(2 of 4 answers are correct)
A hub has fewer interface ports for network computers than a switch.
A switch offers better performance as it operates collision-free.
For performance reasons Hubs should be used in VoIP networks.
VLAN groups can be formed with a switch

What are elements of a Dial-Up Remote Access Connection?


(2 of 4 answers are correct)
RADIUS Server
RAS Server

Proxy Server
Web Server

Which framing procedure is always used within NG-SDH to encapsulate Ethernet ser
vice frames?
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure)

How large is the bandwidth for the IP overhead, irrespective the mode of encodin
g?
(1 of 4 answers is correct)
Exactly 64 Kbps
Exactly 5.3 Kbps
Approx. 166 Kbps
Approx. 19 Kbps

What is the broadcast address for a host with the IP address 132.17.100.23/255.2
55.192.0?
(1 of 4 answers is correct)
132.17.100.255
132.17.128.0
132.17.127.255
132.17.255.255

What are characteristics of a bridge?


(2 of 4 answers are correct)
Bridges maintain MAC address tables.
Bridges have similar functions like hubs.

Bridges can filter data frames between LAN segments.


Bridges operate at Layer 3 of the OSI model.

What can be configured on a Cisco router with the user EXEC mode commands?
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.

What is the purpose of a DNS suffix?


(1 of 4 answers is correct)
The DNS suffix is the complete name of the DNS server.
The DNS suffix is a suffix for the DNS server so that it works faster.
The DNS suffix is a suffix which is used in a WINS environment.
The DNS suffix is added as a suffix to the computer name to identify it clea
rly in a network.
P-CSCF Discovery takes place in the following way
(2 of 4 answers are correct)
integrated into the IP-CAN access procedure; e.g. during the PDP context act
ivation in GPRS.
as a standalone procedure; e.g. by interrogating a DHCP.
via a HSS-HLR interrogation during registration.
by an end to end QoS parameter retrieval from the PDF.

Which of the following is used by network components to determine the destinat


ion of a packet when using MPLS?
(1 of 4 answers is correct)
The protocol discriminator.
The packet's preamble.

The label's content.


The message type.

How does a distance vector router learn about networks that are NOT directly con
nected?
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.

Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically?
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT

Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0?
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.

Which of the following networks elemets are used in a Voice over Cable network?
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).

Cable Modem Termination System (CMTS).

Which of the following statements about the information distribution in GPRS is


true?
(2 of 4 answers are correct)
The GGSN knows the UE/MS's IP address for each PDP context.
The MS/UE knows the GGSN's IP address for each PDP Context.
The SGSN knows the GGSN's IP address for ach PDP context.
In error free operation the UL and DL GTP sequence numbers for a PDP context
on Gn interface are strictly increasing even when RABs or packet flows have bee
n deleted and re-established.

You are unable to communicate with a PC in another network segment from your a
dministration PC. How do you test the connection?
(1 of 4 answers is correct)
By pinging the Proxy.
By running a tracert to the target address.
With ipconfig /all.
With ipconfig /renew.

What happens when a PC's network card (NIC) is replaced?


(1 of 4 answers is correct)
The PC uses a different MAC address.
The PC reuses the previous MAC address automatically.
Now the PC has 2 MAC addresses.
A new MAC address has to be entered manually

What does URL stand for?


(1 of 4 answers is correct)
Universal Resource Location
Uniform Resource Locator
Unified Redirected Link
Ultimate Repeated Link

Which of the following expressions represents a Standardized VIDEO compression M


ethod?
(3 of 4 answers are correct)
MPEG 2
H.323
MPEG 4
H.264

If all the bits of a host ID are set to binary "1", what does this define?
(1 of 4 answers is correct)
The Host.

The Network.
A Broadcast.
A Loopback.

Which of the following authentication protocols are supported by PPPoE?


(2 of 4 answers are correct)
PAP
CHAP
RADIUS
RLOGIN

Connectionless data transmission" means?


(1 of 4 answers is correct)
The data are transferred via the air without using a physical medium.
The data are transferred to the destination by the transport service without
confirmation of receipt.
A fixed connection must be set up between the communication partners.
A connection does not need to be set up between the communication partners.

Which of the following items may be set using Internet Protocol Control Protoc
ol (IPCP) during PPP communications?
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.

Which of the following choices means securing your system against unauthorized
access?
(1 of 4 answers is correct)
Administration.

Algorithm.
Authorization.
Auto-Configuration.

Which of the following statements about IPsec are correct?


(3 of 4 answers are correct)
IPsec causes an additional delay
Sender and receiver must use the same encryption and decryption applications
.
Only the sender has to support IPsec.
Information is encrypted and can only be opened at the destination with the
correct key.

During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies?
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.

The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.

What is used in VoIP to calculate the jitter?


(1 of 4 answers is correct)
RTP timestamps.
RTP sequence numbers.
QoS labels.
Header compression.

How many AF codepoints can be mapped within DSCP?


(1 of 4 answers is correct)
8
12
32
64

How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)
Triggering a routing update.
Setting the route in holddown.
Poisoning the route.
Using split horizon.

Which of the following is a mandatory element of a SIP address?


(1 of 4 answers is correct)
Alias name
Telephone number
Port number
Host name

Which of the following is a mandatory element of a SIP address?


(1 of 4 answers is correct)
Alias name
Telephone number
Port number
Host name

Vous aimerez peut-être aussi