Académique Documents
Professionnel Documents
Culture Documents
(1,4)
(2 of 4 answers are correct)
Routers use the routing table to identify where to forward packets.
Routers create large broadcast domains.
Routers use ICMP to communicate network information from their own routing t
able with other routers.
Routers maintain their routing tables and ensure that other routers know of
changes in the network.
Security filters.
Performance parameters.
Tunneling Flag.
What would you use to allow DHCP clients to receive their IP address from a DH
CP server on a different LAN segment? (4)
(1 of 4 answers is correct)
Enable BootP.
DHCP Proxy Agent.
Enable QoS.
DHCP Relay Agent.
Which of the following mechanisms are used by RTP?
(2 of 4 answers are correct)
Timestamps
Sequence numbers
QoS labels
Header compression
When does a Cisco router needs the parameter "administrative distance" ? (3)
(1 of 4 answers is correct)
If static routes are defined.
If dynamic routing is used.
If the same route is learned via multiple routing sources.
If multiple paths to the same network available, learned via the same routin
g protocol.
Which of the following statements about virtual LANs (VLAN) are correct? (2,3)
(2 of 4 answers are correct)
They are based on shared LANs.
They are implemented with switches.
Packet switching is used for all VLAN traffic.
Broadcast messages for a VLAN are forwarded to other VLANs.
Which codec encodes voice at 64Kbps plus overhead? (2)
(1 of 4 answers is correct)
G.723
G.711
G.729
G.743
Which of the following hosts are NOT in the subnetwork 192.168.8.240 with subnet
work mask 255.255.255.240? (4)
(1 of 4 answers is correct)
192.168.8.254
192.168.8.251
192.168.8.241
192.168.8.128
Which of the following protocols are used for e-mail communication? (2,3,4)
(3 of 4 answers are correct)
SNTP
SMTP
POP3
IMAP4
How is it possible that JAVA programs can be executed from practically every W
eb client?
(1 of 4 answers is correct)
This is possible with a Java Virtual Machine or PlugIn installed on the clie
nt.
This is possible with a Java applet installed on the client.
This is possible with a Java servlet installed on the client.
This is possible with a Java Virtual Machine or PlugIn installed on the Web
server.
Which of the following statements about packet loss for VoIP on a WAN connecti
on is correct?
(1 of 4 answers is correct)
Signaling data is retransmitted and voice data is lost.
All data is retransmitted.
Signaling data is lost and voice data is retransmitted.
All data is lost.
Which of the following protocols are used for transmitting voice bearer traffi
c? (2,3)
(2 of 4 answers are correct)
UDP
RTP
RTCP
TCP
What is the significance of the service frame colors red, green and yellow in Ca
rrier Ethernet? (1)
(1 of 4 answers is correct)
They reflect the priority of a frame.
They reflect the SLA compliance of a frame.
They reflect the VLAN a frame belongs to.
They reflect the size of a frame (green = small packet, e.g. voice, yellow =
large packet, e.g. data, red = jumbo frame)
What is the maximum number of host with a subnet mask "11111111 11111111 1111111
1 11111100"? (3)
(1 of 4 answers is correct)
0
8
2
4
There is a "hosts" file on every Windows Server in the folder: %WINDIR%\system
32\drivers\etc. What is this file for? (2)
(1 of 4 answers is correct)
What is the minimum number of wires needed to create a 100BaseT link in a LAN?
(1 of 4 answers is correct)
2 wires
4 wires
6 wires
8 wires
Which statements about the Internet Control Message Protocol (ICMP) are correct?
Which Cisco IOS command is used to set the clock speed to 64 kbit/s on a serial
interface on a Cisco router?
(1 of 4 answers is correct)
clock tempo 64000
clock rate 64000
clock speed 64
clock tempo 64
Which of the following mechanism does NOT increase system security?
(1 of 4 answers is correct)
Increasing the length of the encryption keys.
Increasing the level of the key algorithm.
Increasing the length of time a key is valid.
Increasing how often the key is changed.
Which part of the IP address evaluates the router with the help of the subnet ma
sk?
(1 of 4 answers is correct)
Network and subnet bits.
Host and network bits.
Mask and host bits.
Host and subnet bits.
Which of the following protocols is NOT used in the IMS (IP Multimedia Subsyst
em)?
(1 of 4 answers is correct)
GTP (GPRS Tunnelling Protocol)
Diameter
SIP (Session Initiation Protocol)
IP (Internet Protocol)
231
How does PBB-TE (Provider Backbone Bridge - Traffic Engineering) provide redun
dancy?
(1 of 4 answers is correct)
Fax only.
Voice and video.
Fax and video.
Which statements about the QoS mechanism DiffServ are correct?
(3 of 4 answers are correct)
DiffServ is a mechanism for managing traffic flows in one or more networks.
DiffServ uses the IP ToS byte to signal packet priorities.
DiffServ is a protocol used to route data through a network.
DiffServ creates service classes with different priorities.
You wish to permanently prevent access to Internet IP address 2.2.2.2 from all
systems in your network. Which technology should you configure to achieve this
objective?
Which of the following is true about the parameter "metric 3" in context of a ro
ute entry in a Windows system?
(1 of 4 answers is correct)
It shows the maximum distance in meters from the wireless LAN.
It shows the maximum distance in miles from the network.
It shows the amount of L2 switches between the network connections.
What does the term "QoS" stand for in connection with the concept and the capa
bility of IP or VoIP solutions?
(2 of 4 answers are correct)
Guarantee of voice quality in VoIP connections.
Increase in the reliability of telephones.
Predictable transmission performance.
Optimization of system maintenance.
What is the typical bitrate for the transmission of a good quality SDTV (Stand
ard-definition television) signal with MPEG-4 compression?
(1 of 4 answers is correct)
1 Mbit/s
2 Mbit/s
4 Mbit/s
8 Mbit/s
Proxy Server
Web Server
Which framing procedure is always used within NG-SDH to encapsulate Ethernet ser
vice frames?
(1 of 4 answers is correct)
HDLC (High-Level Data Link Control)
RPR (Resilient Packet Ring)
PPP (Point-to-Point Protocol)
GFP (Generic Framing Procedure)
How large is the bandwidth for the IP overhead, irrespective the mode of encodin
g?
(1 of 4 answers is correct)
Exactly 64 Kbps
Exactly 5.3 Kbps
Approx. 166 Kbps
Approx. 19 Kbps
What is the broadcast address for a host with the IP address 132.17.100.23/255.2
55.192.0?
(1 of 4 answers is correct)
132.17.100.255
132.17.128.0
132.17.127.255
132.17.255.255
What can be configured on a Cisco router with the user EXEC mode commands?
(1 of 4 answers is correct)
The user EXEC mode allows global configuration tasks that affect the entire
router.
The user EXEC mode commands allow entering a secret password in order to con
figure the router.
The user EXEC mode commands allow the configuration of interfaces, subinterf
aces, lines, and routers.
Configuration is NOT possible, only displaying of information.
How does a distance vector router learn about networks that are NOT directly con
nected?
(1 of 4 answers is correct)
It is NOT possible.
From the destination router.
From the source router.
From the adjacent router.
Which of the following events can be used by a stateful firewall to close a UDP
port that has been opened dynamically?
(1 of 4 answers is correct)
FIN-Flag
SYN-Flag
RELEASE COMPLETE
TIMEOUT
Which of the following addresses may be assigned to hosts in the network with th
e address 193.210.176.0 and Subnet mask 255.255.255.0?
(1 of 4 answers is correct)
From 193.210.176.0 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.254.
From 193.210.176.1 to 193.210.176.255.
From 193.210.176.0 to 193.210.176.255.
Which of the following networks elemets are used in a Voice over Cable network?
(3 of 4 answers are correct)
Call Management Server (CMS).
Signaling Gateway (SG).
Digital Subscriber Line Access Multiplexer (DSLAM).
You are unable to communicate with a PC in another network segment from your a
dministration PC. How do you test the connection?
(1 of 4 answers is correct)
By pinging the Proxy.
By running a tracert to the target address.
With ipconfig /all.
With ipconfig /renew.
If all the bits of a host ID are set to binary "1", what does this define?
(1 of 4 answers is correct)
The Host.
The Network.
A Broadcast.
A Loopback.
Which of the following items may be set using Internet Protocol Control Protoc
ol (IPCP) during PPP communications?
(2 of 4 answers are correct)
DNS server address.
Compression protocol.
Temporary IP address assignment.
Authentication protocol.
Which of the following choices means securing your system against unauthorized
access?
(1 of 4 answers is correct)
Administration.
Algorithm.
Authorization.
Auto-Configuration.
During session setup the terminating S-CSCF has to forward the "Invite" messag
e to the callee traversing e.g. the callee's P-CSCF. How does the S-CSCF retriev
es the callee's address and guarantees the traversal of the proxies?
(1 of 4 answers is correct)
The S-CSCF takes the "Contact" header field and performs a DNS query with th
is field to get the IP address of the P-CSCF.
The S-CSCF takes the "From" header field and the "Record Route" header field
.
The S-CSCF takes the "Contact" header field and the "Path" header field lear
ned during registration as the "Route" header field information.
The S-CSCF takes the "To" header field from the "invite", forwards it to the
DNS for resolving. The response from the DNS contains the callee's IP address.
How is it described when a RIP router sets the metric for a down network to the
maximum value?
(1 of 4 answers is correct)
Triggering a routing update.
Setting the route in holddown.
Poisoning the route.
Using split horizon.