1.
Which of the following are true about a router? (Choose three.)
Correct Answer(s)
A. Routers enable different IP networks or IP subnets to communicate with each other.
C. Path selection is one of the main functions of a router.
E. Routers have a central processing unit and memory.
Explanation
Routers enable different IP networks or IP subnets to communicate with each other. This is true because routers are designed to connect different networks and route data packets between them.Path selection is one of the main functions of a router. This is true because routers use routing protocols to determine the best path for forwarding data packets from the source network to the destination network.Routers have a central processing unit and memory. This is true because routers are network devices that require processing power and memory to perform their routing functions and store routing tables.
2.
Which of the following are the main components of a router? (Choose three.)
Correct Answer(s)
A. ROM
B. Flash Memory
E. RAM
Explanation
Routers have three main components: ROM, Flash Memory, and RAM. ROM (Read-Only Memory) stores the router's firmware, which contains the basic operating system. Flash Memory is used to store the router's configuration file and any software updates. RAM (Random Access Memory) is used for temporary storage of data and instructions while the router is operating. CTG interfaces and NV-ROM are not main components of a router.
3.
Which of the following statements describe the function of RAM in a router? (Choose two.)
Correct Answer(s)
C. RAM stores the current configuration information.
E. RAM stores routing tables for the router.
Explanation
RAM in a router serves multiple functions. It stores the current configuration information, which includes the settings and parameters that determine how the router operates. Additionally, RAM stores the routing tables for the router, which are crucial for determining the best path for data packets to reach their destination. It is important to note that RAM is volatile memory, meaning it does not retain data when the router is turned off. Therefore, it is necessary for the router to reload the configuration information and routing tables from other sources upon reboot.
4.
Which of the following physical ports and/or cables on a router require
clocking to be configured in a back-to-back connection? (Choose one.)
Correct Answer
E. Serial port with DCE cable
Explanation
In a back-to-back connection, where two routers are directly connected to each other without any intermediate devices, the serial port with DCE (Data Communications Equipment) cable requires clocking to be configured. The DCE cable connects to the DTE (Data Terminal Equipment) port of the other router. Clocking is necessary in this scenario to synchronize the transmission and reception of data between the two routers. The other options, such as the console port, aux port, and Ethernet, do not require clocking in a back-to-back connection.
5.
What are the possible functions of a console port? (Choose two.)
Correct Answer(s)
B. Accessing the router to change configurations
D. Password recovery
Explanation
The console port on a router is used for accessing the router's command-line interface (CLI) to change configurations. It provides a direct connection to the router, allowing administrators to make changes to the device. Additionally, the console port can be used for password recovery in case the administrator forgets the login credentials. Both of these functions are essential for managing and troubleshooting the router.
6.
Which of the following describe the function of flash memory in a router? ( Choose three.)
Correct Answer(s)
A. Holds the Cisco IOS software image
C. Keeps its contents when a router is rebooted
D. Can store multiple versions of Cisco IOS software
Explanation
Flash memory in a router serves three functions. Firstly, it holds the Cisco IOS software image, which is the operating system of the router. Secondly, it retains its contents even when the router is rebooted, ensuring that the software image remains intact. Lastly, flash memory can store multiple versions of the Cisco IOS software, allowing for easy upgrades and the ability to switch between different software versions if needed.
7.
Which of the following statements are true about DTE? (Choose two)
Correct Answer(s)
C. DTE usually resides on the customer premise
D. DTE is an acronym for data terminal equipment
Explanation
The first statement, "DTE is an acronym for digital transfer enhancement," is false. DTE stands for data terminal equipment, which refers to the devices or equipment used by end-users to access a network. The second statement, "DTE provides clocking information to the provider," is also false. It is the data communication equipment (DCE) that provides clocking information to the DTE. The correct statements are that DTE usually resides on the customer premise and DTE is an acronym for data terminal equipment.
8.
Which of the following statements are true about DCE? (Choose two)
Correct Answer(s)
B. DCE provides clocking to the DTE
C. DCE is an acronym for data circuit-terminating equipment
Explanation
DCE stands for Data Circuit-Terminating Equipment. It provides clocking to the DTE (Data Terminal Equipment). This means that DCE is responsible for synchronizing the data transfer between the DTE and the network. Additionally, DCE can be connected to the aux port on a router, allowing it to interface with the network.
9.
The Term WAN refers to which layers of the OSI Model? (Choose two).
Correct Answer(s)
B. Datalink
D. pHysical
Explanation
The term WAN refers to the Datalink and Physical layers of the OSI Model. The Datalink layer is responsible for framing data into frames and transmitting them over the physical medium, while the Physical layer deals with the actual transmission of bits over the network. In a WAN, data is typically transmitted over long distances using various physical media such as fiber optic cables, satellite links, or wireless connections. Therefore, the Datalink and Physical layers are the most relevant layers in the OSI Model when it comes to WANs.
10.
Which Layer of the OSI Model is a Router at?
Correct Answer
C. Network
Explanation
A router operates at the Network layer of the OSI model. This layer is responsible for routing packets across different networks and determining the best path for data transmission. Routers use network addresses to make decisions about where to send data packets. They examine the destination IP address of a packet and use routing tables to determine the appropriate next hop for forwarding the packet. Therefore, a router operates at the Network layer to facilitate communication between different networks.
11.
Which is the command to change the router name?
Correct Answer
C. Hostname
Explanation
The correct command to change the router name is "hostname". This command is used in the router's configuration mode to set the name of the router. By using this command, the administrator can easily change the name of the router to a desired value.
12.
If you borrow 4 bits from the host field of a Class C. What is the subnet mask?
Correct Answer
D. 255.255.255.240
Explanation
When borrowing 4 bits from the host field of a Class C, it means that these 4 bits will be used to create subnets. The remaining bits in the host field will be used for host addresses. Since 4 bits can create a maximum of 16 subnets (2^4), the subnet mask will have 4 bits set to 1 and the rest set to 0. In binary, this is represented as 11110000, which is equivalent to 240 in decimal. Therefore, the subnet mask will be 255.255.255.240.
13.
If you have a network with 5 subnets, how many bits do you borrow from a Class C to have enough sub-networks?
Correct Answer
B. 3
Explanation
To determine the number of bits to borrow from a Class C network to have enough sub-networks, we need to find the smallest power of 2 that is greater than or equal to the number of subnets required. In this case, we have 5 subnets, so we need to find the smallest power of 2 that is greater than or equal to 5. The smallest power of 2 that satisfies this condition is 2^3, which is 8. Therefore, we need to borrow 3 bits from the Class C network to have enough sub-networks.
14.
What is likely the reason for the following output from a router?CEntral_office# config trem ^
Correct Answer
C. The ^ indicates that the letter r is not valid.
Explanation
The ^ symbol in the output indicates that the letter "r" is not valid. This suggests that there is a typographical error or a syntax error in the command "config trem". The router is expecting a valid command or keyword after the "config" keyword, and since "trem" is not recognized, the router displays the ^ symbol to indicate the invalid character.
15.
Choose two statements that are true about setup mode?
Correct Answer(s)
A. It can be accessed using the setup command.
C. It loads by default when a router is new and booted for the first time
Explanation
Setup mode can be accessed using the setup command, which allows users to configure basic settings on a router. Additionally, setup mode is loaded by default when a router is new and booted for the first time, providing a guided configuration process for initial setup. Once setup mode is entered and the configuration is applied, it will remain in effect unless the router is rebooted.
16.
Which command puts a router into routing protocol configuration mode?
Correct Answer
A. Router rip
Explanation
The correct answer is "router rip" because this command is used to enter the routing protocol configuration mode specifically for the Routing Information Protocol (RIP). In this mode, the router can be configured to use RIP as the routing protocol and various RIP-related parameters can be set. The other options, Ctrl-Z, interface so/o/o, and network 201.203.20.0, do not put the router into the routing protocol configuration mode.
17.
Which of the following are operating environments for a router? Choose 2
Correct Answer(s)
A. Boot ROM (RX Boot)
C. ROM Monitor
Explanation
Boot ROM (RX Boot) and ROM Monitor are both operating environments for a router. The Boot ROM (RX Boot) is a firmware program that is stored in read-only memory (ROM) and is responsible for initializing the router hardware and loading the initial software. The ROM Monitor, also known as ROMmon, is a special mode that allows the router to be managed and troubleshooted. It provides a basic command-line interface and can be used to recover the router in case of software or hardware failures. RIP, OSPF, and IGRP are routing protocols and not operating environments for a router.
18.
Where can a router find an IOS image to load during startup (Choose 2)
Correct Answer(s)
A. Flash Memory
D. An External TFTP Server
Explanation
During startup, a router can find an IOS image to load from two sources. The first source is the Flash Memory, which is a non-volatile memory located on the router itself. The IOS image is typically stored in the Flash Memory and can be accessed and loaded during startup. The second source is an External TFTP Server, which stands for Trivial File Transfer Protocol. The router can connect to a TFTP server on the network and retrieve the IOS image from there. This allows for remote management and centralized storage of IOS images.
19.
What are the three methods to access the router's CLI?
Correct Answer(s)
A. Terminal connection through the console port using a rollover cable
D. Telnet via an ethernet connection
E. Modem connection via an aux port
Explanation
The three methods to access the router's CLI are through a terminal connection using a rollover cable connected to the console port, via Telnet using an ethernet connection, and through a modem connection using an aux port. These methods allow for different ways to connect to the router's command-line interface, providing flexibility and options for remote management and configuration.
20.
Which of the following is a possible location to back up a configuration file? Choose
Correct Answer
B. A TFTP Server
Explanation
A TFTP server is a possible location to back up a configuration file because TFTP (Trivial File Transfer Protocol) is commonly used for transferring files between devices on a network. By storing the configuration file on a TFTP server, it can be easily accessed and restored in case of a failure or when needed to deploy the configuration on multiple devices. Additionally, using a TFTP server allows for centralized management and maintenance of configuration files.