| ||||||||||||||||||
1. Which two statements about the functions of a hub are accurate? (Choose two.) | ||||||||||||||||||
A hub extends an Ethernet LAN. | ||||||||||||||||||
A hub reduces the size of a collision domain. | ||||||||||||||||||
Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth. | ||||||||||||||||||
A hub is a data link layer device. | ||||||||||||||||||
A hub amplifies the data signal before retransmitting it. | ||||||||||||||||||
2. Which three statements best describe collisions? (Choose three.) | ||||||||||||||||||
Collisions occur when two or more stations on a shared media transmit at the same time. | ||||||||||||||||||
Larger segments are less likely to have collisions. | ||||||||||||||||||
In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data. | ||||||||||||||||||
Adding a hub to a network can improve collision issues. | ||||||||||||||||||
Collisions are by-products of a shared LAN. | ||||||||||||||||||
More segments on a network mean greater potential for collisions. | ||||||||||||||||||
3. Which of these choices best describes a collision domain? | ||||||||||||||||||
two or more devices trying to communicate at the same time | ||||||||||||||||||
two networks that are connected | ||||||||||||||||||
network segments that share the same bandwidth | ||||||||||||||||||
none of the above | ||||||||||||||||||
4. What type of hardware will help eliminate collisions? | ||||||||||||||||||
repeater | ||||||||||||||||||
bridge | ||||||||||||||||||
hub | ||||||||||||||||||
extender | ||||||||||||||||||
5. Which three factors are typical causes of network congestion? (Choose three.) | ||||||||||||||||||
high-bandwidth applications | ||||||||||||||||||
many network segments | ||||||||||||||||||
increasing volume of network traffic | ||||||||||||||||||
more powerful computer and network technologies | ||||||||||||||||||
few network segments | ||||||||||||||||||
greater distances for LANs | ||||||||||||||||||
6. What are four characteristics of a bridge? (Choose four.) | ||||||||||||||||||
Bridges forward but do not filter data frames between LAN segments. | ||||||||||||||||||
Bridges maintain MAC address tables. | ||||||||||||||||||
Bridges are more “intelligent” than hubs. | ||||||||||||||||||
Bridges can buffer and forward frames between two or more LAN segments. | ||||||||||||||||||
Bridges create fewer collision domains. | ||||||||||||||||||
Bridges operate at Layer 2 of the OSI model. | ||||||||||||||||||
7. What are two major benefits of adding a bridge to a network? (Choose two.) | ||||||||||||||||||
isolating potential network problems to specific segments | ||||||||||||||||||
increasing the speed of a network | ||||||||||||||||||
extending a LAN to cover greater distances by joining multiple segments | ||||||||||||||||||
creating fewer collision domains | ||||||||||||||||||
forwarding data frames between LAN segments | ||||||||||||||||||
8a. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame. | ||||||||||||||||||
Flooding | ||||||||||||||||||
Filtering | ||||||||||||||||||
Forwarding | ||||||||||||||||||
8b. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment. | ||||||||||||||||||
Flooding | ||||||||||||||||||
Filtering | ||||||||||||||||||
Forwarding | ||||||||||||||||||
8c. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame. | ||||||||||||||||||
Flooding | ||||||||||||||||||
Filtering | ||||||||||||||||||
Forwarding | ||||||||||||||||||
9. Which three characteristics apply to a switch? (Choose three.) | ||||||||||||||||||
uses a table of MAC addresses to determine the port to which the data is to be sent | ||||||||||||||||||
connects LAN segments | ||||||||||||||||||
reduces the number of collision domains | ||||||||||||||||||
increases the number of collision domains | ||||||||||||||||||
filters data before forwarding it to its destination on the network | ||||||||||||||||||
10. Which three features differentiate switches from bridges? (Choose three.) | ||||||||||||||||||
large frame buffers | ||||||||||||||||||
use of a table of MAC addresses to determine the segment to which the data is to be sent | ||||||||||||||||||
support for mixed media rates | ||||||||||||||||||
high port densities | ||||||||||||||||||
ability to segment LANs | ||||||||||||||||||
11. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) | ||||||||||||||||||
Switches operate at much higher speeds than bridges. | ||||||||||||||||||
Switches operate at lower speeds than bridges. | ||||||||||||||||||
Switches support more advanced functionality than bridges. | ||||||||||||||||||
Switches support less functionality than bridges. | ||||||||||||||||||
Switches support dedicated communication between devices. | ||||||||||||||||||
Switches do not support dedicated communication between devices. | ||||||||||||||||||
12. Which three statements about microsegmentation are accurate? (Choose three.) | ||||||||||||||||||
Implementing a bridge creates microsegmentation. | ||||||||||||||||||
Microsegmentation increases bandwidth availability. | ||||||||||||||||||
Each device on a network segment is connected directly to a switch port. | ||||||||||||||||||
Microsegmentation eliminates collisions. | ||||||||||||||||||
Microsegmentation limits the number of segments on a network. | ||||||||||||||||||
Microsegmentation uses half-duplex operation. | ||||||||||||||||||
13a. The network sends and receives data frames one at a time, but not simultaneously. | ||||||||||||||||||
Full-duplex communication | ||||||||||||||||||
Half-duplex communication | ||||||||||||||||||
13b. This communication type effectively doubles the amount of bandwidth between the devices. | ||||||||||||||||||
Full-duplex communication | ||||||||||||||||||
Half-duplex communication | ||||||||||||||||||
13c. The network sends and receives data frames simultaneously. | ||||||||||||||||||
Full-duplex communication | ||||||||||||||||||
Half-duplex communication | ||||||||||||||||||
14a. At the end-user level, gives high-performance, PC workstation 100-Mbps access to a server | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
14b. Not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups; at the backbone level, provides interswitch connectivity for low- to medium-volume applications | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
14c. At the workgroup level, provides high-performance connectivity to the enterprise server | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
14d. At the backbone level, provides backbone and interswitch connectivity | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
14e. At the end-user level, provides connectivity between the end user and the user-level switch | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
14f. Provides interswitch connectivity for low- to medium-volume applications | ||||||||||||||||||
Ethernet 10BASE-T | ||||||||||||||||||
Fast Ethernet | ||||||||||||||||||
Gigabit Ethernet | ||||||||||||||||||
15. When a Cisco device starts up, which of the following does it run to check its hardware? | ||||||||||||||||||
flash | ||||||||||||||||||
RAM | ||||||||||||||||||
POST | ||||||||||||||||||
TFTP | ||||||||||||||||||
16. When a Catalyst switch or Cisco router starts up, what is the first operation performed? | ||||||||||||||||||
The device performs system startup routes. | ||||||||||||||||||
The device performs hardware checking routines. | ||||||||||||||||||
The device attempts to locate other devices on the network. | ||||||||||||||||||
The device tries to find and apply software configuration settings. | ||||||||||||||||||
17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____. | ||||||||||||||||||
CD-ROM | ||||||||||||||||||
TFTP server | ||||||||||||||||||
console terminal | ||||||||||||||||||
modem connection | ||||||||||||||||||
18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration. | ||||||||||||||||||
LAN port | ||||||||||||||||||
uplink port | ||||||||||||||||||
console port | ||||||||||||||||||
auxilary port | ||||||||||||||||||
19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router? | ||||||||||||||||||
user EXEC level | ||||||||||||||||||
setup EXEC level | ||||||||||||||||||
enable EXEC level | ||||||||||||||||||
privileged EXEC level | ||||||||||||||||||
20. How do you instruct a Cisco device to parse and execute an entered command? | ||||||||||||||||||
Press the Send key | ||||||||||||||||||
Press the Enter key | ||||||||||||||||||
Add a space at end of the command | ||||||||||||||||||
Wait 5 seconds after you enter the command | ||||||||||||||||||
21. Which CLI prompt indicates that you are working in privileged EXEC mode? | ||||||||||||||||||
hostname# | ||||||||||||||||||
hostname> | ||||||||||||||||||
hostname-exec> | ||||||||||||||||||
hostname-config | ||||||||||||||||||
22. Which command would you enter in the privileged EXEC mode to list the command options? | ||||||||||||||||||
? | ||||||||||||||||||
init | ||||||||||||||||||
help | ||||||||||||||||||
login | ||||||||||||||||||
23a. Attach the power cable plug to the switch power supply socket. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
23b. Observe the boot sequence, including the Cisco IOS software output text on the console. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
23c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
24. How do you start a Catalyst 2950 series switch? | ||||||||||||||||||
Press the on/off switch. | ||||||||||||||||||
Power up the redundant power supply. | ||||||||||||||||||
Connect a network cable to another switch on the network. | ||||||||||||||||||
Attach the power cable plug to the switch power supply socket. | ||||||||||||||||||
25. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? | ||||||||||||||||||
the > prompt | ||||||||||||||||||
the privileged EXEC prompt | ||||||||||||||||||
the Management Console logon screen | ||||||||||||||||||
a list of commands available on the switch | ||||||||||||||||||
26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch? | ||||||||||||||||||
c? | ||||||||||||||||||
c ? | ||||||||||||||||||
help c | ||||||||||||||||||
help c* | ||||||||||||||||||
27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”? | ||||||||||||||||||
config? | ||||||||||||||||||
config ? | ||||||||||||||||||
help config | ||||||||||||||||||
help config* | ||||||||||||||||||
28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? | ||||||||||||||||||
ip address | ||||||||||||||||||
ip address 196.125.243.10 | ||||||||||||||||||
196.125.243.10 ip address | ||||||||||||||||||
ip address 196.125.243.10 255.255.255.0 | ||||||||||||||||||
29. Which configuration mode will you use to configure a particular port on a switch? | ||||||||||||||||||
user mode | ||||||||||||||||||
global configuration mode | ||||||||||||||||||
interface configuration mode | ||||||||||||||||||
controller configuration mode | ||||||||||||||||||
30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? | ||||||||||||||||||
MTU 1500 bytes | ||||||||||||||||||
Hardware is … 10BaseT | ||||||||||||||||||
Address is 0050.BD73.E2C1 | ||||||||||||||||||
802.1d STP State: Forwarding | ||||||||||||||||||
31. Which show command requires that you have privileged EXEC mode access? | ||||||||||||||||||
show ip | ||||||||||||||||||
show version | ||||||||||||||||||
show running | ||||||||||||||||||
show interfaces | ||||||||||||||||||
32. How should you power up a Cisco router? | ||||||||||||||||||
Press the Reset button. | ||||||||||||||||||
Turn the power switch to “on.” | ||||||||||||||||||
Connect the fiber cable to another router. | ||||||||||||||||||
Attach the power cable plug to the router power supply socket. | ||||||||||||||||||
33. Which two of the following would be considered a physical threat? (Choose 2) | ||||||||||||||||||
A user leaving their password in their desk. | ||||||||||||||||||
Someone turning off the power to the switch to block network access. | ||||||||||||||||||
Someone turning off the air conditioning system in the network closet. | ||||||||||||||||||
Someone breaking into the cabinet that contains the network documentation. | ||||||||||||||||||
34. Which four of the following can be protected with a password? (Choose 4) | ||||||||||||||||||
Console access | ||||||||||||||||||
VTY access | ||||||||||||||||||
TTY access | ||||||||||||||||||
User level access | ||||||||||||||||||
Exec level access | ||||||||||||||||||
35. Which two of the following are customized text that is displayed before the username and password login prompts? | ||||||||||||||||||
Message Of the Day | ||||||||||||||||||
Login Banner | ||||||||||||||||||
Access warning | ||||||||||||||||||
User Banner | ||||||||||||||||||
Warning message | ||||||||||||||||||
36. Which of the following is the most secure method of remotely accessing a network device? | ||||||||||||||||||
http | ||||||||||||||||||
telnet | ||||||||||||||||||
ssh | ||||||||||||||||||
rmon | ||||||||||||||||||
snmp | ||||||||||||||||||
37. Which of the following is an IOS feature that can be used to control access to the VTY ports? | ||||||||||||||||||
shutdown | ||||||||||||||||||
port security | ||||||||||||||||||
access list | ||||||||||||||||||
firewall | ||||||||||||||||||
38. Which of the following is an IOS command that can be used to control access to a switch port based upon a MAC address? | ||||||||||||||||||
shutdown | ||||||||||||||||||
port security | ||||||||||||||||||
mac-secure | ||||||||||||||||||
firewall | ||||||||||||||||||
39. Which of the following is an IOS command that can be used to increase the security of unused switch ports? | ||||||||||||||||||
shutdown | ||||||||||||||||||
port security | ||||||||||||||||||
mac-secure | ||||||||||||||||||
firewall | ||||||||||||||||||
40. Which problem is caused by redundant connections in a network? | ||||||||||||||||||
microsegmentation | ||||||||||||||||||
loops | ||||||||||||||||||
degradation | ||||||||||||||||||
collisions | ||||||||||||||||||
41. Which statement best describes how loops can affect performance in a switched LAN? | ||||||||||||||||||
Broadcast storms may be created when loops occur, preventing data from being transmitted over the network. | ||||||||||||||||||
Any multicast, broadcast, or unknown traffic will be flooded out to all ports. | ||||||||||||||||||
Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames. | ||||||||||||||||||
The loop removes the frame from the network. | ||||||||||||||||||
42. Which statement accurately describes Spanning-Tree Protocol? | ||||||||||||||||||
STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. | ||||||||||||||||||
STP automatically keeps the previously inactive path inactive. | ||||||||||||||||||
STP eliminates the segments in which there are problems. | ||||||||||||||||||
STP allows ports to listen to, forward, and flood data frames. | ||||||||||||||||||
43. Which of the following is an IOS command that is the most useful when troubleshooting media issues? | ||||||||||||||||||
show controller | ||||||||||||||||||
show run | ||||||||||||||||||
show interface | ||||||||||||||||||
show counters | ||||||||||||||||||
44. Which of the following is an IOS command that is the most useful when troubleshooting port access issues? | ||||||||||||||||||
show controller | ||||||||||||||||||
show run | ||||||||||||||||||
show interface | ||||||||||||||||||
show counters | ||||||||||||||||||
45. Which three of the following are methods used to mitigate configuration issues? (Choose 3) | ||||||||||||||||||
Secure unused ports | ||||||||||||||||||
Secure the configuration | ||||||||||||||||||
Verify changes before you save | ||||||||||||||||||
Know what you have before you start | ||||||||||||||||||
19233 participants so far | ||||||||||||||||||
Number answered correctly: 39 out of 56 |
This site is about layered tcp ip networks. You will not only learn tcp utp protocol, LAN WAN architects, as well as ssh, ssl, ipsec, vlan, vpn, ip routing etc, you will also expect to hands on hub, switch, router, ethernet cable and serial WAN cable.
Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions - Module 2
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment