1.
Which three of the following components are common to routers, switches, and Computers?
Correct Answer(s)
A. RAM
B. CPU
C. Motherboard
Explanation
RAM, CPU, and motherboard are common components to routers, switches, and computers. RAM (Random Access Memory) is used for temporary storage of data and instructions that are currently being processed. CPU (Central Processing Unit) is the main component responsible for executing instructions and performing calculations. The motherboard is the main circuit board that connects all the components together and allows communication between them. These components are essential for the functioning of all three devices, regardless of their specific purpose or functionality.
2.
Which two types of ports do routers have?
Correct Answer(s)
B. Console
C. Network
Explanation
Routers have two types of ports: console and network. The console port is used for connecting to the router for configuration and management purposes. It allows administrators to access the router's command-line interface (CLI) and make changes to its settings. The network ports, on the other hand, are used for connecting the router to other devices in the network. These ports enable the router to send and receive data packets, allowing it to route traffic between different networks.
3.
Which two statements best decribe the functions of a router in a network
Correct Answer(s)
A. Routers maintain their routing tables and ensure that other routers know of changes in the network
B. Routers use the routing table to determine where to forward packets
Explanation
Routers maintain their routing tables and ensure that other routers know of changes in the network. This means that routers keep track of the available paths in a network and update their routing tables accordingly. They also communicate these changes to other routers so that they are aware of the updated network topology.
Routers use the routing table to determine where to forward packets. The routing table contains information about the available paths and their associated costs. When a router receives a packet, it looks at the destination address and checks its routing table to determine the best path to forward the packet towards its destination. By using the routing table, routers can efficiently route packets through the network.
4.
Which three of the following statements about the path determination process are accurate?
Correct Answer(s)
A. Routers evaluate the available paths to a destination
B. The routing process uses metrics and administrative distances when evaluating network paths
D. Dynamic routing when the information is learned using routing information that is obtained from routing protocols
Explanation
Routers evaluate the available paths to a destination, which means that they analyze the different routes that can be taken to reach a specific destination. The routing process uses metrics and administrative distances to evaluate network paths, which helps determine the best route based on factors such as speed, reliability, and cost. Dynamic routing occurs when routers learn and update their routing information using routing protocols, allowing them to adapt to changes in the network. This is different from static routing, where the network admin manually configures the routing information on each router.
5.
Which one of the following containst routing information that helps a router determine the routing path?
Correct Answer
C. Routing table
Explanation
A routing table contains routing information that helps a router determine the routing path. It is a database that is stored in a router and contains a list of available routes to different network destinations. The routing table includes information such as the destination network address, the next hop router, and the metric or cost associated with each route. By referencing the routing table, a router can determine the most appropriate path to send data packets to their intended destination.
6.
Which three of the following statements describe the functon of routing tables
Correct Answer(s)
A. Routing provide an ordered list of known network addresses
C. Routing tables contain metrics that are used to determine the disirability of the route
D. Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next hop router) on the wat to the final destination
Explanation
Routing tables provide an ordered list of known network addresses, allowing routers to determine the best path for data transmission. These tables also contain metrics, such as hop count or bandwidth, which help determine the desirability of a route. Additionally, routing table associations inform routers whether a destination is directly connected or can be reached through another router (the next hop router) on the way to the final destination.
7.
What three are most commonly used by routing protools to determine a network path
Correct Answer(s)
A. Hop count
B. Bandwith
C. Delay
Explanation
Routing protocols use hop count, bandwidth, and delay to determine the best network path. Hop count refers to the number of routers or hops that a packet must traverse to reach its destination. Bandwidth is the capacity of a network link to transmit data, and routing protocols consider links with higher bandwidth as preferable. Delay refers to the time it takes for a packet to travel from its source to its destination, and routing protocols aim to minimize delay. These three factors help routing protocols make informed decisions about the most efficient and reliable network path.
8.
Which three statements accurately describe a distance vector protocol?
Correct Answer(s)
B. Examples of this protocol include RIP
C. This protocol determines the direction (vector) and distance (hop count) to any network in the internetwork
E. This process is also known as "routing by rumor"
Explanation
Distance vector protocols, such as RIP, determine the direction and distance to any network in an internetwork. They use a hop count to measure the distance and determine the best path for routing. This process is also known as "routing by rumor" because routers exchange periodic updates to share information about network changes. Examples of distance vector protocols include RIP.
9.
Which three statements accurately describe a link-state routing protocol?
Correct Answer(s)
B. Link-State routing protocols respond quickly to network changes
D. LS routing protocols send periodic updates (LS refreshes) at long time intervals, approx once every 30 mins
E. In LS routing protocols, every router tries to build it's own internal map of the network topology
Explanation
Link-state routing protocols respond quickly to network changes because they use the information in the link-state database to calculate the shortest paths and update routing tables accordingly. LS routing protocols send periodic updates (LS refreshes) at long time intervals, approximately once every 30 minutes, to ensure that routers have the most up-to-date information about the network topology. In LS routing protocols, every router tries to build its own internal map of the network topology by exchanging link-state information with other routers. This allows each router to have a comprehensive understanding of the network and make informed routing decisions.
10.
All computers function using the?
Correct Answer
D. Binary system
Explanation
Computers function using the binary system, which is a numeric system that uses only two digits: 0 and 1. This system is used because computers are made up of electronic circuits that can be in one of two states, either on or off, represented by 1 and 0 respectively. These binary digits, also known as bits, are used to represent all types of data and instructions in a computer, allowing it to perform calculations, store and retrieve information, and execute programs. The binary system is fundamental to computer architecture and is the basis for all digital computing.
11.
IP addresses are represented using?
Correct Answer
A. 32-bit binary numbers
Explanation
IP addresses are represented using 32-bit binary numbers. This means that an IP address consists of 32 binary digits, which are typically grouped into four octets (each octet containing 8 bits). This binary representation allows for a total of 2^32 (or approximately 4.3 billion) unique IP addresses to be assigned.
12.
How many octets does a Class A network have in the host field?
Correct Answer
C. 3
Explanation
A Class A network has 3 octets in the host field. In IPv4 addressing, the host field represents the portion of the IP address that identifies a specific device on a network. In a Class A network, the first octet is reserved for the network ID, while the remaining three octets are used for the host ID. This allows for a large number of unique host addresses within a Class A network, making it suitable for large organizations or internet service providers.
13.
What's the practical minimum number of bits that can be borrowed to form a subnet?
Correct Answer
B. 2
Explanation
The practical minimum number of bits that can be borrowed to form a subnet is 2. Borrowing 2 bits allows for the creation of 4 subnets (2^2), which is the smallest number of subnets that can be formed. By borrowing fewer than 2 bits, the number of subnets would be insufficient for practical use.
14.
Using six subnet bits, how many usable subnets are created?
Correct Answer
C. 62
Explanation
By using six subnet bits, we can create a total of 64 subnets. However, the first and last subnets are typically reserved for network and broadcast addresses respectively, leaving us with 62 usable subnets. Therefore, the correct answer is 62.
15.
How many host addresses can be used in a Class C network
Correct Answer
B. 254
Explanation
A Class C network uses a 24-bit network mask, which allows for 256 possible addresses. However, two of these addresses are reserved for network identification and broadcast, leaving 254 host addresses that can be used for devices within the network.
16.
What is the max number of bits that can be borrowed to create a subnet for a Class C network?
Correct Answer
C. 6
Explanation
The maximum number of bits that can be borrowed to create a subnet for a Class C network is 6. A Class C network has a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network address and the last 8 bits are available for host addresses. By borrowing 6 bits from the host portion, we can create subnets with a subnet mask of 255.255.255.192, allowing for a maximum of 64 subnets.
17.
A subnet mask tells the router to look at which portions of an IP address?
Correct Answer
D. Network and subnet bits
Explanation
A subnet mask is used to divide an IP address into network and host portions. It helps the router determine which part of the IP address represents the network and which part represents the host. The network bits identify the network to which the IP address belongs, while the subnet bits further divide the network into smaller subnets. Therefore, the correct answer is "network and subnet bits."
18.
If a router does not match the appropriate address portions to a number on its routing table, it?
Correct Answer
D. Discards the packet
Explanation
When a router does not find a match for the appropriate address portions in its routing table, it discards the packet. This means that the router does not have any information on how to forward the packet to its intended destination. Discarding the packet ensures that it does not continue to be passed along the network, preventing unnecessary network congestion.
19.
Which of the following subnet masks falls on octet boundaries?
Correct Answer
D. 255.0.0.0
Explanation
The subnet mask 255.0.0.0 falls on octet boundaries because each octet in the mask has a value of either 255 or 0, indicating that the entire octet is either fully utilized or not utilized at all. This means that the network address is defined by the first octet, while the remaining three octets are available for host addresses.
20.
Which two of the following are binary default subnet masks?
Correct Answer(s)
A. 11111111.00000000.00000000.00000000
C. 11111111.11111111.11111111.000000000
Explanation
The two binary default subnet masks are 11111111.00000000.00000000.00000000 and 11111111.11111111.11111111.000000000. These subnet masks are binary representations of the decimal subnet masks 255.0.0.0 and 255.255.255.0 respectively. The first subnet mask has all 8 bits in the first octet set to 1, indicating that the network portion of the IP address is 8 bits long. The second subnet mask has all 8 bits in the first three octets set to 1, indicating that the network portion of the IP address is 24 bits long.
21.
Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?
Correct Answer
C. 172.17
Explanation
The subnet mask 255.255.0.0 tells the router to look for the network portion of the IP address. In this case, the network portion is 172.17. So, the router will look for the network with the IP address 172.17.
22.
To see how many bits you should borrow from the host portion of the network address to give you the number of subnets that you need, you should?
Correct Answer
D. Subtract the number of subnets that you need from the network portion
Explanation
To determine how many bits to borrow from the host portion of the network address, you need to subtract the number of subnets that you need from the network portion. This is because the network portion represents the total number of subnets available, and subtracting the desired number of subnets will give you the number of additional bits required. By borrowing these bits from the host portion, you can create the necessary number of subnets.
23.
How should you power up a Cisco router?
Correct Answer
B. Turn the power switch to on
Explanation
To power up a Cisco router, you should turn the power switch to the "on" position. This action will supply the necessary electrical power to the router and allow it to start functioning. Pressing the reset button is not the correct method for powering up the router, as it is mainly used for resetting the device to its default settings. Connecting the fiber cable to another router or attaching the power cable plug to the router power supply socket are also not the appropriate steps for powering up the Cisco router.
24.
When you start a Cisco router, what shoudl you see on the console?
Correct Answer
C. Cisco IOS software output text
Explanation
When you start a Cisco router, you should see Cisco IOS software output text on the console. This text typically includes information about the router's boot process, system initialization, and any error or status messages that may be relevant. It provides important information for troubleshooting and monitoring the router's operation.
25.
What is the primary purpose of setup mode on a Cisco router?
Correct Answer
C. To bring up a minimal feature config
Explanation
The primary purpose of setup mode on a Cisco router is to bring up a minimal feature config. Setup mode allows users to quickly and easily configure basic settings on the router, such as hostname, IP addresses, and passwords, in order to establish a basic functioning configuration. It is designed to simplify the initial setup process and provide a starting point for further configuration and customization of the router.
26.
Which statement best describes what the user EXEC mode command allows you to configure on a Cisco router?
Correct Answer
A. You cannot configure anything; the user mode commands are used to display information
Explanation
The correct answer states that the user EXEC mode commands do not allow the user to configure anything on a Cisco router. Instead, these commands are used solely to display information.
27.
Which Cisco IOS software command is used to return user EXEC mode fro the privileged EXEC mode
Correct Answer
C. Disable
Explanation
The "disable" command is used in Cisco IOS software to return from privileged EXEC mode to user EXEC mode. This command terminates the current privileged EXEC session and returns the user to the previous user EXEC mode.
28.
What information does the show running-config command provide on a Cisco router?
Correct Answer
A. Current (running) configuration in RAM
Explanation
The show running-config command provides information about the current (running) configuration in RAM on a Cisco router. It displays the configuration settings that are currently active and being used by the router. This command does not provide information about the system hardware, names of configuration files, amount of NVRAM used, or the version of Cisco IOS software running on the router.
29.
Which Cisco IOS software command displays the configuration of the system hardware and the software version information?
Correct Answer
A. Show version
Explanation
The "show version" command is used to display the configuration of the system hardware and the software version information on Cisco IOS software. This command provides details such as the IOS version, hardware model, uptime, configuration register, and more. It is commonly used to gather information about the device and verify the software and hardware configurations.
30.
What happens when you enter a major command on a Cicso router?
Correct Answer
D. The router switches you from one config mode to another
Explanation
When you enter a major command on a Cisco router, the router switches you from one configuration mode to another. This means that you are moving from one level of configuration to a higher level, allowing you to make more advanced changes to the router's settings.
31.
Which Cisco IOS software command creates a message to be displayed upon logging into a router?
Correct Answer
B. Banner motd message
Explanation
The correct answer is "banner motd message". This command is used to create a message of the day (MOTD) that will be displayed to users upon logging into a router. The "banner" command is used to create various types of banners, and "motd" specifies that it is a message of the day banner. The "message" parameter is used to specify the actual message that will be displayed.
32.
If both enable secret and the enable password commans are configured on your router, how do you get the # prompt?
Correct Answer
A. Enter the enable secret command
Explanation
To get the # prompt when both the enable secret and enable password commands are configured on the router, you need to enter the enable secret command. The enable secret command is a more secure method of authentication compared to the enable password command. It uses a stronger encryption algorithm to protect the password. Therefore, when both commands are configured, the router will prioritize the enable secret command for authentication and grant access to the # prompt.
33.
Which Cisco IOS software command sets the console session timeout to 15 mins and 30 seconds?
Correct Answer
D. Exec-timeout 15 30
Explanation
The correct answer is "exec-timeout 15 30". This command is used to set the console session timeout to 15 minutes and 30 seconds. It specifies the amount of time of inactivity before the console session is terminated.
34.
Which Cisco IOS software command configures a serial port in slot 0, port 1 on a modular router?
Correct Answer
C. Interface serial 0/0/1
Explanation
The correct answer is "interface serial 0/0/1". This command configures a serial port in slot 0, port 1 on a modular router. The format "0/0/1" represents the slot number, subslot number, and port number respectively.
35.
Which Cisco IOS software command sets the clock speed to 64kb/s on a serial interface on a Cisco router?
Correct Answer
C. Clock rate 64000
Explanation
The correct answer is "clock rate 64000". In Cisco IOS software, the "clock rate" command is used to set the clock speed on a serial interface. The value specified after the command is in bits per second (bps), so "64000" represents a clock speed of 64kbps.
36.
A serial interface displays "Serial1 is up, line protocol is down" Which two situations may cause this error?
Correct Answer(s)
D. There are no keepalives
E. There is a mismatch in the encapsulation type
Explanation
The error message "Serial1 is up, line protocol is down" indicates that the physical layer of the serial interface is functioning properly (up), but the data link layer protocol is not established (down). This can be caused by two situations. Firstly, if there are no keepalives, it means that the interface is not receiving regular signals to confirm the connection, resulting in the line protocol being down. Secondly, if there is a mismatch in the encapsulation type between the devices connected to the serial interface, they won't be able to establish a proper data link layer protocol, causing the line protocol to be down.
37.
Which two of the following are functions of DHCP
Correct Answer(s)
B. DHCP dynamically assigns IP addresses to client devices
C. DHCP dynamically assigns a default gateway to client devices
Explanation
DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration settings to client devices. It allows client devices to obtain an IP address and other necessary information from a DHCP server. Therefore, the correct answers are "DHCP dynamically assigns IP addresses to client devices" and "DHCP dynamically assigns a default gateway to client devices".
38.
Which of the following describes the DHCP server that is provided by Cisco IOS software?
Correct Answer
A. It is a complete DHCP server
Explanation
The correct answer states that the DHCP server provided by Cisco IOS software is a complete DHCP server. This means that it is capable of performing all the necessary functions of a DHCP server, such as assigning IP addresses, default gateways, DNS servers, and other network configuration parameters to clients. It does not require obtaining DHCP information from a master DHCP server, as it can independently handle all DHCP requests and provide the necessary network settings to clients.
39.
Which four of the following are required DHCP parameters when configuring a DHCP server using SDM on a Cisco router.
Correct Answer(s)
A. Pool name
B. Lease time
G. DHCP network and subnet
H. Starting and ending addresses
Explanation
When configuring a DHCP server using SDM on a Cisco router, the following four parameters are required:
1. Pool name: This is the name given to the DHCP pool, which is a range of IP addresses that the DHCP server can assign to clients.
2. Lease time: This parameter determines the duration for which a client can use an IP address assigned by the DHCP server before it needs to renew the lease.
3. DHCP network and subnet: This specifies the network and subnet mask for the DHCP pool. It defines the range of IP addresses that can be assigned to clients.
4. Starting and ending addresses: These are the first and last IP addresses in the DHCP pool range, respectively. The DHCP server will assign addresses within this range to clients.
These parameters are essential for configuring a DHCP server and ensuring proper IP address assignment to clients on the network.
40.
Which command can be used to see if an address in the DHCP pool is already in use by another device?
Correct Answer
D. Sh ip dhcp conflicts
Explanation
The command "sh ip dhcp conflicts" can be used to see if an address in the DHCP pool is already in use by another device. This command displays any IP addresses that are in conflict, meaning they have been assigned to multiple devices. By using this command, network administrators can identify and resolve address conflicts, ensuring that each device on the network has a unique IP address.
41.
Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?
Correct Answer
A. SSH
Explanation
SSH (Secure Shell) is a Cisco IOS tool that can be used for secure remote access to another device. It provides encrypted communication between the client and the server, ensuring that data transmitted over the network cannot be intercepted or tampered with by unauthorized individuals. Unlike telnet, which transmits data in plain text, SSH encrypts the data, making it a more secure option for remote access. SDM (Security Device Manager) is a web-based tool used for managing Cisco devices, while ping and traceroute are network troubleshooting tools.
42.
Which command would you use to see who has Telnet sessions to your router?
Correct Answer
A. Show user
Explanation
The "show user" command would be used to see who has Telnet sessions to your router. This command provides information about the current users logged into the router, including their usernames, session IDs, and login times. By using this command, you can identify the active Telnet sessions and the users connected to your router.
43.
What would you use to suspend a Telnet session?
Correct Answer
C. Ctrl-Shift-6 key sequence
Explanation
To suspend a Telnet session, you would use the Ctrl-Shift-6 key sequence. This key combination allows you to temporarily suspend the Telnet session without closing it completely. This is useful when you need to switch to another task or access a different command prompt while keeping the Telnet session active in the background.
44.
Which three statements accurately describe WAN's
Correct Answer(s)
B. WAN's connect devices that are separated by a wide geograpHical area
C. WAN's use the services of carries such as telepHone companies, cable companies, satellite systems, and network providers
E. WAN's use serial connections of various types to provide access to bandwidth
Explanation
The first statement accurately describes WANs as they are usually owned by the companies in which they are implemented. The second statement is also accurate as WANs connect devices that are separated by a wide geographical area. The third statement is true as WANs utilize the services of carriers such as telephone companies, cable companies, satellite systems, and network providers. However, the last statement is incorrect as WANs do not connect devices that are in small geographic areas. Instead, they connect devices that are separated by a wide geographical area.
45.
Which two statements accurately describe the difference between LAN's and WAN's?
Correct Answer(s)
B. A LAN transmits data faster than a WAN
C. While a LAN connects computers, peripHerals, and other devices in a single building or other small geograpHic area, a WAN transmits data across broad geograpHic distances
Explanation
LANs typically transmit data faster than WANs because they cover a smaller geographic area, allowing for faster transmission speeds. LANs connect devices within a single building or small area, while WANs transmit data across larger distances. Additionally, companies or organizations usually own the hardware and software required for WANs, making them responsible for their maintenance and operation.
46.
Which three communications needs to do WAN's address?
Correct Answer(s)
C. Organizations often want to share information with other organizations over across large distances
D. A department needs to share large data files quickly
E. Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world
Explanation
The correct answer is organizations often want to share information with other organizations over across large distances because WANs are designed to connect multiple networks over a large geographical area. A department needs to share large data files quickly because WANs have high bandwidth capabilities that allow for fast data transfer. Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world because WANs provide connectivity to remote resources.
47.
At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider?
Correct Answer
A. Layer 1
Explanation
WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider at Layer 1 of the OSI model. Layer 1, also known as the Physical layer, deals with the physical transmission of data over the network. It defines the physical characteristics of the network such as cables, connectors, and signaling. Therefore, it is responsible for describing the physical connections required for WAN protocols to connect to the services of a communications service provider.
48.
At which OSI lever do WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames?
Correct Answer
B. Layer 2
Explanation
WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames at Layer 2 of the OSI model. Layer 2, also known as the Data Link Layer, is responsible for error-free transmission of data frames over the physical network. This layer handles functions such as framing, addressing, and error detection, ensuring reliable communication between devices on the same network or across different networks.
49.
Which two statements accurately describe data-link protocols in a WAN?
Correct Answer(s)
A. Many data link layer protocols use a framing mechanism similar to HDLC
D. Data link layer protocols define how data is encapsulated for transmission to remote sites, and also the mechanisms for transferring the resulting frames to establish the connection across the communication line from the sending to the receiving device
Explanation
The first statement accurately describes data-link protocols in a WAN by stating that many protocols use a framing mechanism similar to HDLC. This means that these protocols divide data into frames for transmission over the network.
The second statement also accurately describes data-link protocols by stating that they define how data is encapsulated for transmission to remote sites and the mechanisms for establishing a connection between the sending and receiving devices.
Both statements provide accurate information about the characteristics and functions of data-link protocols in a WAN.
50.
Which three statements accurately describe the functions of a packet-switching WAN communications link?
Correct Answer(s)
B. The route that the packets take to reach the destination site will vary
C. Packet-switched networks send data packets over different routes of a shared public network owned by a carrier to reach the same destination
F. The cost of a packet-switched network to the customer is generally lower than the cost of point-to-point leased lines
Explanation
Packet-switching is a method of communication where data is divided into packets and sent over different routes to reach the destination. This allows for more efficient use of network resources and increased flexibility. The fact that the route taken by the packets can vary ensures redundancy and fault tolerance. Packet-switched networks utilize a shared public network owned by a carrier, allowing for cost savings compared to point-to-point leased lines. Therefore, the three statements accurately describe the functions of a packet-switching WAN communications link.