test me

Site Search:

Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions - Module 2






































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Legend
answerCorrect answer
Your answer, Correct.
Your answer, Incorrect.

1. Which two statements about the functions of a hub are accurate? (Choose two.)
A hub extends an Ethernet LAN.
A hub reduces the size of a collision domain.
Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth.
A hub is a data link layer device.
A hub amplifies the data signal before retransmitting it.
2. Which three statements best describe collisions? (Choose three.)
Collisions occur when two or more stations on a shared media transmit at the same time.
Larger segments are less likely to have collisions.
In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.
Adding a hub to a network can improve collision issues.
Collisions are by-products of a shared LAN.
More segments on a network mean greater potential for collisions.
3. Which of these choices best describes a collision domain?
two or more devices trying to communicate at the same time
two networks that are connected
network segments that share the same bandwidth
none of the above
4. What type of hardware will help eliminate collisions?
repeater
bridge
hub
extender
5. Which three factors are typical causes of network congestion? (Choose three.)
high-bandwidth applications
many network segments
increasing volume of network traffic
more powerful computer and network technologies
few network segments
greater distances for LANs
6. What are four characteristics of a bridge? (Choose four.)
Bridges forward but do not filter data frames between LAN segments.
Bridges maintain MAC address tables.
Bridges are more “intelligent” than hubs.
Bridges can buffer and forward frames between two or more LAN segments.
Bridges create fewer collision domains.
Bridges operate at Layer 2 of the OSI model.
7. What are two major benefits of adding a bridge to a network? (Choose two.)
isolating potential network problems to specific segments
increasing the speed of a network
extending a LAN to cover greater distances by joining multiple segments
creating fewer collision domains
forwarding data frames between LAN segments
8a. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame.
Flooding
Filtering
Forwarding
8b. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment.
Flooding
Filtering
Forwarding
8c. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame.
Flooding
Filtering
Forwarding
9. Which three characteristics apply to a switch? (Choose three.)
uses a table of MAC addresses to determine the port to which the data is to be sent
connects LAN segments
reduces the number of collision domains
increases the number of collision domains
filters data before forwarding it to its destination on the network
10. Which three features differentiate switches from bridges? (Choose three.)
large frame buffers
use of a table of MAC addresses to determine the segment to which the data is to be sent
support for mixed media rates
high port densities
ability to segment LANs
11. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.)
Switches operate at much higher speeds than bridges.
Switches operate at lower speeds than bridges.
Switches support more advanced functionality than bridges.
Switches support less functionality than bridges.
Switches support dedicated communication between devices.
Switches do not support dedicated communication between devices.
12. Which three statements about microsegmentation are accurate? (Choose three.)
Implementing a bridge creates microsegmentation.
Microsegmentation increases bandwidth availability.
Each device on a network segment is connected directly to a switch port.
Microsegmentation eliminates collisions.
Microsegmentation limits the number of segments on a network.
Microsegmentation uses half-duplex operation.
13a. The network sends and receives data frames one at a time, but not simultaneously.
Full-duplex communication
Half-duplex communication
13b. This communication type effectively doubles the amount of bandwidth between the devices.
Full-duplex communication
Half-duplex communication
13c. The network sends and receives data frames simultaneously.
Full-duplex communication
Half-duplex communication
14a. At the end-user level, gives high-performance, PC workstation 100-Mbps access to a server
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
14b. Not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups; at the backbone level, provides interswitch connectivity for low- to medium-volume applications
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
14c. At the workgroup level, provides high-performance connectivity to the enterprise server
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
14d. At the backbone level, provides backbone and interswitch connectivity
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
14e. At the end-user level, provides connectivity between the end user and the user-level switch
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
14f. Provides interswitch connectivity for low- to medium-volume applications
Ethernet 10BASE-T
Fast Ethernet
Gigabit Ethernet
15. When a Cisco device starts up, which of the following does it run to check its hardware?
flash
RAM
POST
TFTP
16. When a Catalyst switch or Cisco router starts up, what is the first operation performed?
The device performs system startup routes.
The device performs hardware checking routines.
The device attempts to locate other devices on the network.
The device tries to find and apply software configuration settings.
17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____.
CD-ROM
TFTP server
console terminal
modem connection
18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration.
LAN port
uplink port
console port
auxilary port
19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
user EXEC level
setup EXEC level
enable EXEC level
privileged EXEC level
20. How do you instruct a Cisco device to parse and execute an entered command?
Press the Send key
Press the Enter key
Add a space at end of the command
Wait 5 seconds after you enter the command
21. Which CLI prompt indicates that you are working in privileged EXEC mode?
hostname#
hostname>
hostname-exec>
hostname-config
22. Which command would you enter in the privileged EXEC mode to list the command options?
?
init
help
login
23a. Attach the power cable plug to the switch power supply socket.
Step 1
Step 2
Step 3
23b. Observe the boot sequence, including the Cisco IOS software output text on the console.
Step 1
Step 2
Step 3
23c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected.
Step 1
Step 2
Step 3
24. How do you start a Catalyst 2950 series switch?
Press the on/off switch.
Power up the redundant power supply.
Connect a network cable to another switch on the network.
Attach the power cable plug to the switch power supply socket.
25. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
the > prompt
the privileged EXEC prompt
the Management Console logon screen
a list of commands available on the switch
26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch?
c?
c ?
help c
help c*
27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”?
config?
config ?
help config
help config*
28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch?
ip address
ip address 196.125.243.10
196.125.243.10 ip address
ip address 196.125.243.10 255.255.255.0
29. Which configuration mode will you use to configure a particular port on a switch?
user mode
global configuration mode
interface configuration mode
controller configuration mode
30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
MTU 1500 bytes
Hardware is … 10BaseT
Address is 0050.BD73.E2C1
802.1d STP State: Forwarding
31. Which show command requires that you have privileged EXEC mode access?
show ip
show version
show running
show interfaces
32. How should you power up a Cisco router?
Press the Reset button.
Turn the power switch to “on.”
Connect the fiber cable to another router.
Attach the power cable plug to the router power supply socket.
33. Which two of the following would be considered a physical threat? (Choose 2)
A user leaving their password in their desk.
Someone turning off the power to the switch to block network access.
Someone turning off the air conditioning system in the network closet.
Someone breaking into the cabinet that contains the network documentation.
34. Which four of the following can be protected with a password? (Choose 4)
Console access
VTY access
TTY access
User level access
Exec level access
35. Which two of the following are customized text that is displayed before the username and password login prompts?
Message Of the Day
Login Banner
Access warning
User Banner
Warning message
36. Which of the following is the most secure method of remotely accessing a network device?
http
telnet
ssh
rmon
snmp
37. Which of the following is an IOS feature that can be used to control access to the VTY ports?
shutdown
port security
access list
firewall
38. Which of the following is an IOS command that can be used to control access to a switch port based upon a MAC address?
shutdown
port security
mac-secure
firewall
39. Which of the following is an IOS command that can be used to increase the security of unused switch ports?
shutdown
port security
mac-secure
firewall
40. Which problem is caused by redundant connections in a network?
microsegmentation
loops
degradation
collisions
41. Which statement best describes how loops can affect performance in a switched LAN?
Broadcast storms may be created when loops occur, preventing data from being transmitted over the network.
Any multicast, broadcast, or unknown traffic will be flooded out to all ports.
Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames.
The loop removes the frame from the network.
42. Which statement accurately describes Spanning-Tree Protocol?
STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time.
STP automatically keeps the previously inactive path inactive.
STP eliminates the segments in which there are problems.
STP allows ports to listen to, forward, and flood data frames.
43. Which of the following is an IOS command that is the most useful when troubleshooting media issues?
show controller
show run
show interface
show counters
44. Which of the following is an IOS command that is the most useful when troubleshooting port access issues?
show controller
show run
show interface
show counters
45. Which three of the following are methods used to mitigate configuration issues? (Choose 3)
Secure unused ports
Secure the configuration
Verify changes before you save
Know what you have before you start
19233 participants so far
Number answered correctly: 39 out of 56

No comments:

Post a Comment