| ||||||||||||||||||
1. Which three of the following components are common to routers, switches, and computers? (Choose 3) | ||||||||||||||||||
RAM | ||||||||||||||||||
CPU | ||||||||||||||||||
motherboard | ||||||||||||||||||
keyboard | ||||||||||||||||||
2. Which two types of ports do routers have? (Choose 2.) | ||||||||||||||||||
printer | ||||||||||||||||||
console | ||||||||||||||||||
network | ||||||||||||||||||
CD-ROM | ||||||||||||||||||
USB | ||||||||||||||||||
3. Which two statements best describe the functions of a router in a network? (Choose 2.) | ||||||||||||||||||
Routers maintain their routing tables and ensure that other routers know of changes in the network. | ||||||||||||||||||
Routers use the routing table to determine where to forward packets. | ||||||||||||||||||
Routers strengthen the signal over large distances in a network. | ||||||||||||||||||
Routers create larger collision domains. | ||||||||||||||||||
Routers use ICMP to communicate network information from the router’s own routing table with other routers. | ||||||||||||||||||
4. Which three of the following statements about the path determination process are accurate? (Choose 3.) | ||||||||||||||||||
Routers evaluate the available paths to a destination | ||||||||||||||||||
The routing process uses metrics and administrative distances when evaluating network paths. | ||||||||||||||||||
Dynamic routing occurs when the network administrator configures information on each router. | ||||||||||||||||||
Dynamic routing occurs when information is learned using routing information that is obtained from routing protocols. | ||||||||||||||||||
A default route holds an explicit route to every network. | ||||||||||||||||||
The routing table holds multiple entries per network | ||||||||||||||||||
5a. The router de-encapsulates the frame and uses the protocol information of the frame to determine that the network layer packet will pass to the IP process. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
Step 4 | ||||||||||||||||||
Step 5 | ||||||||||||||||||
5b. If the destination network is on a directly attached network, the router will use the ARP process to obtain the MAC address of the host and forward it to the network segment. If the network is reachable through another router, the router will use the MAC address of the next-hop router and forward the packet out the interface indicated in the routing table. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
Step 4 | ||||||||||||||||||
Step 5 | ||||||||||||||||||
5c. The router checks the destination address in the IP header. Either the packet is destined for the router itself or it needs to be forwarded. If the packet needs to be forwarded, the router searches its routing table to determine where to send the packet. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
Step 4 | ||||||||||||||||||
Step 5 | ||||||||||||||||||
5d. The outgoing interface process encapsulates the packet appropriately to the media and sends the packet onto the network segment. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
Step 4 | ||||||||||||||||||
Step 5 | ||||||||||||||||||
5e. The router receives a packet on one of its interfaces. | ||||||||||||||||||
Step 1 | ||||||||||||||||||
Step 2 | ||||||||||||||||||
Step 3 | ||||||||||||||||||
Step 4 | ||||||||||||||||||
Step 5 | ||||||||||||||||||
6. Which of the following contains routing information that helps a router in determining the routing path? | ||||||||||||||||||
IP Address | ||||||||||||||||||
MAC Address | ||||||||||||||||||
routing table | ||||||||||||||||||
routing protocol | ||||||||||||||||||
7. Which three of the following statements describe the function of routing tables? (Choose 3.) | ||||||||||||||||||
Routing tables provide an ordered list of known network addresses. | ||||||||||||||||||
Routing tables are maintained through the transmission of MAC addresses. | ||||||||||||||||||
Routing tables contain metrics that are used to determine the desirability of the route. | ||||||||||||||||||
Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next-hop router) on the way to the final destination. | ||||||||||||||||||
When a router receives an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source. | ||||||||||||||||||
Although routing protocols vary, routing metrics do not. | ||||||||||||||||||
8a. This entry comes from having interfaces attached to network segments. This entry is obviously the most certain; if the interface fails or is administratively shut down, the entry for that network will be removed from the routing table. | ||||||||||||||||||
Static routing | ||||||||||||||||||
Dynamic routing | ||||||||||||||||||
Default route | ||||||||||||||||||
Directly connected network | ||||||||||||||||||
8b. This is an optional entry that is used when no explicit path to a destination is found in the routing table. This entry can be manually inserted or be populated from a dynamic routing protocol. | ||||||||||||||||||
Static routing | ||||||||||||||||||
Dynamic routing | ||||||||||||||||||
Default route | ||||||||||||||||||
Directly connected network | ||||||||||||||||||
8c. These routes are entered manually by a system administrator directly into the configuration of a router. | ||||||||||||||||||
Static routing | ||||||||||||||||||
Dynamic routing | ||||||||||||||||||
Default route | ||||||||||||||||||
Directly connected network | ||||||||||||||||||
8d. These routes are learned by the router, and the information is responsive to changes in the network so that it is constantly being updated. | ||||||||||||||||||
Static routing | ||||||||||||||||||
Dynamic routing | ||||||||||||||||||
Default route | ||||||||||||||||||
Directly connected network | ||||||||||||||||||
9. Which three metrics are most commonly used by routing protocols to determine a network path? (Choose 3.) | ||||||||||||||||||
hop count | ||||||||||||||||||
bandwidth | ||||||||||||||||||
delay | ||||||||||||||||||
packet length | ||||||||||||||||||
distance | ||||||||||||||||||
quantity | ||||||||||||||||||
10. Which three statements accurately describe a distance vector protocol? (Choose 3.) | ||||||||||||||||||
IGRP was developed by Cisco to address the issues associated with routing in medium-size LANs. | ||||||||||||||||||
Examples of this protocol include RIP and IGRP. | ||||||||||||||||||
This protocol determines the direction and distance to any network in the internetwork. | ||||||||||||||||||
Using this protocol, a router needs to know the entire path to every network segment. | ||||||||||||||||||
This process is also known as “routing by rumor.” | ||||||||||||||||||
11. Which three statements accurately describe a link-state routing protocol? (Choose 3.) | ||||||||||||||||||
The link-state database is used to calculate the paths with the highest bandwidths on the network. | ||||||||||||||||||
Link-state routing protocols respond quickly to network changes. | ||||||||||||||||||
In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active. | ||||||||||||||||||
Link-state routing protocols send periodic updates (link-state refreshes) at long time intervals, approximately once every 30 minutes. | ||||||||||||||||||
In link-state routing protocols, every router tries to build its own internal map of the network topology. | ||||||||||||||||||
Link-state routing protocols send periodic updates even if no network changes have occurred. | ||||||||||||||||||
12. All computers function using the _____. | ||||||||||||||||||
base-10 system | ||||||||||||||||||
decimal system | ||||||||||||||||||
numeric system | ||||||||||||||||||
binary system | ||||||||||||||||||
13. The decimal number 10 converts to the binary number _____. | ||||||||||||||||||
10 | ||||||||||||||||||
1010 | ||||||||||||||||||
110 | ||||||||||||||||||
1000 | ||||||||||||||||||
14. Which of the following binary octets has an LSB of 0? | ||||||||||||||||||
01100011 | ||||||||||||||||||
10100101 | ||||||||||||||||||
10011010 | ||||||||||||||||||
10011001 | ||||||||||||||||||
15. IP addresses are represented using _____. | ||||||||||||||||||
32-bit binary numbers | ||||||||||||||||||
16-bit decimal numbers | ||||||||||||||||||
8-bit binary numbers | ||||||||||||||||||
8 sets of 4-bit decimal numbers | ||||||||||||||||||
16. 2 to the fifth power is _____. | ||||||||||||||||||
2 X 5 | ||||||||||||||||||
128 | ||||||||||||||||||
2 multiplied by itself 5 times | ||||||||||||||||||
none of the above | ||||||||||||||||||
17. The decimal number 205 converted into a binary number is _____. | ||||||||||||||||||
11011101 | ||||||||||||||||||
11001001 | ||||||||||||||||||
11000101 | ||||||||||||||||||
11001101 | ||||||||||||||||||
18. The binary equivalent of decimal number 452 is _____. | ||||||||||||||||||
111000100 | ||||||||||||||||||
110000100 | ||||||||||||||||||
111001100 | ||||||||||||||||||
101000100 | ||||||||||||||||||
19. What is the decimal equivalent of the binary number 11000111? | ||||||||||||||||||
218 | ||||||||||||||||||
199 | ||||||||||||||||||
179 | ||||||||||||||||||
208 | ||||||||||||||||||
20. The binary number 11101000111 converted into a decimal number is _____. | ||||||||||||||||||
1183 | ||||||||||||||||||
1873 | ||||||||||||||||||
1638 | ||||||||||||||||||
1863 | ||||||||||||||||||
21. How many octets does a Class A network have in the host field? | ||||||||||||||||||
3 | ||||||||||||||||||
2 | ||||||||||||||||||
1 | ||||||||||||||||||
4 | ||||||||||||||||||
22. What is the practical minimum number of bits that can be borrowed to form a subnet? | ||||||||||||||||||
1 | ||||||||||||||||||
2 | ||||||||||||||||||
3 | ||||||||||||||||||
4 | ||||||||||||||||||
23. Using 6 subnet bits, how many usable subnets are created? | ||||||||||||||||||
58 | ||||||||||||||||||
60 | ||||||||||||||||||
64 | ||||||||||||||||||
66 | ||||||||||||||||||
24. How many host addresses can be used in a Class C network? | ||||||||||||||||||
253 | ||||||||||||||||||
254 | ||||||||||||||||||
255 | ||||||||||||||||||
256 | ||||||||||||||||||
25. What is the maximum number of bits that can be borrowed to create a subnet for a Class C network? | ||||||||||||||||||
2 | ||||||||||||||||||
4 | ||||||||||||||||||
6 | ||||||||||||||||||
8 | ||||||||||||||||||
26. A subnet mask tells the router to look at which portions of an IP address? | ||||||||||||||||||
mask and host bits | ||||||||||||||||||
host and network bits | ||||||||||||||||||
host and subnet bits | ||||||||||||||||||
network and subnet bits | ||||||||||||||||||
27. If a router does not match the appropriate address portions to a number on its routing table, it _____. | ||||||||||||||||||
sends the packet back to the sender | ||||||||||||||||||
passes the packet to the next router in the hierarchy | ||||||||||||||||||
adds that number to its table | ||||||||||||||||||
discards the packet | ||||||||||||||||||
28. Which of the following subnet masks falls on octet boundaries? | ||||||||||||||||||
255.0.0.0 | ||||||||||||||||||
255.255.0.0 | ||||||||||||||||||
255.255.255.0 | ||||||||||||||||||
all of the above | ||||||||||||||||||
29. Which two of the following are binary default subnet masks? (Choose 2.) | ||||||||||||||||||
11111111.00000000.00000000.00000000 | ||||||||||||||||||
11111111.11111111.01000000.00000000 | ||||||||||||||||||
11111111.11111111.11111111.00000000 | ||||||||||||||||||
255.255.224.0 | ||||||||||||||||||
30. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for? | ||||||||||||||||||
172.17.128.47 | ||||||||||||||||||
172.17.128 | ||||||||||||||||||
172.17 | ||||||||||||||||||
10.172.47 | ||||||||||||||||||
31. 255.255.224.0 translates into the binary number _____. | ||||||||||||||||||
11111111.00000000.11100000.00000000 | ||||||||||||||||||
11111111.11100000.00000000.00000000 | ||||||||||||||||||
11111111.11111111.11100000.00000000 | ||||||||||||||||||
11111111.11111111.11110000.00000000 | ||||||||||||||||||
32. To see how many bits you should borrow from the host portion of the network address to give you the number of subnets you need, you should _____. | ||||||||||||||||||
subtract the number of subnets you need from the host portion | ||||||||||||||||||
add the bit values from right to left until the total (decimal value) is just greater than the number of subnets you need | ||||||||||||||||||
add the bit values from left to right until the total (decimal value) is just greater than the number of subnets you need | ||||||||||||||||||
none of the above | ||||||||||||||||||
33. How should you power up a Cisco router? | ||||||||||||||||||
Press the Reset button. | ||||||||||||||||||
Turn the power switch to “on.” | ||||||||||||||||||
Connect the fiber cable to another router. | ||||||||||||||||||
Attach the power cable plug to the router power supply socket. | ||||||||||||||||||
34. When you start a Cisco router, what should you see on the console? | ||||||||||||||||||
Cisco IOS debug messages | ||||||||||||||||||
the Diagnostic Console menu | ||||||||||||||||||
Cisco IOS software output text | ||||||||||||||||||
a graphical picture showing the real-time status of the LED | ||||||||||||||||||
35. What is the primary purpose of setup mode on a Cisco router? | ||||||||||||||||||
to display the current router configuration | ||||||||||||||||||
to complete hardware and interface testing | ||||||||||||||||||
to bring up a minimal feature configuration | ||||||||||||||||||
to fully configure a Cisco router for IP routing | ||||||||||||||||||
36. Which statement best describes what the user EXEC mode commands allow you to configure on a Cisco router? | ||||||||||||||||||
You cannot configure anything; the user mode commands are used to display information. | ||||||||||||||||||
The user EXEC mode allows you to perform global configuration tasks that affect the entire router. | ||||||||||||||||||
The user EXEC mode commands allow you to enter a secret password so that you can configure the router. | ||||||||||||||||||
The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers. | ||||||||||||||||||
37. Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode? | ||||||||||||||||||
exit | ||||||||||||||||||
quit | ||||||||||||||||||
disable | ||||||||||||||||||
userexec | ||||||||||||||||||
38a. Provides a list of commands and the arguments associated with a specific command | ||||||||||||||||||
context-sensitive help | ||||||||||||||||||
console error messages | ||||||||||||||||||
command history buffer | ||||||||||||||||||
38b. Allows recall of long or complex commands or entries for reentry, review, or correction | ||||||||||||||||||
context-sensitive help | ||||||||||||||||||
console error messages | ||||||||||||||||||
command history buffer | ||||||||||||||||||
38c. Identifies problems with router commands incorrectly entered so that you can alter or correct them | ||||||||||||||||||
context-sensitive help | ||||||||||||||||||
console error messages | ||||||||||||||||||
command history buffer | ||||||||||||||||||
39. What information does the show running-config command provide on a Cisco router? | ||||||||||||||||||
current (running) configuration in RAM | ||||||||||||||||||
system hardware and names of configuration files | ||||||||||||||||||
amount of NVRAM used to store the configuration | ||||||||||||||||||
version of Cisco IOS software running on the router | ||||||||||||||||||
40. Which Cisco IOS command displays the configuration of the system hardware and the software information? | ||||||||||||||||||
show version | ||||||||||||||||||
show interfaces | ||||||||||||||||||
show startup-config | ||||||||||||||||||
show running-config | ||||||||||||||||||
41a. Router(config-if)# | ||||||||||||||||||
Line | ||||||||||||||||||
Router | ||||||||||||||||||
Interface | ||||||||||||||||||
Controller | ||||||||||||||||||
Subinterface | ||||||||||||||||||
41b. Router(config-line)# | ||||||||||||||||||
Line | ||||||||||||||||||
Router | ||||||||||||||||||
Interface | ||||||||||||||||||
Controller | ||||||||||||||||||
Subinterface | ||||||||||||||||||
41c. Router(config-subif)# | ||||||||||||||||||
Line | ||||||||||||||||||
Router | ||||||||||||||||||
Interface | ||||||||||||||||||
Controller | ||||||||||||||||||
Subinterface | ||||||||||||||||||
14d. Router(config-router)# | ||||||||||||||||||
Line | ||||||||||||||||||
Router | ||||||||||||||||||
Interface | ||||||||||||||||||
Controller | ||||||||||||||||||
Subinterface | ||||||||||||||||||
41e. Router(config-controller)# | ||||||||||||||||||
Line | ||||||||||||||||||
Router | ||||||||||||||||||
Interface | ||||||||||||||||||
Controller | ||||||||||||||||||
Subinterface | ||||||||||||||||||
42. If you enter a major command on a Cisco router, what happens? | ||||||||||||||||||
The router returns you to user EXEC mode. | ||||||||||||||||||
The router returns a list of possible commands. | ||||||||||||||||||
The router invokes a global configuration command. | ||||||||||||||||||
The router switches you from one configuration mode to another. | ||||||||||||||||||
43. Which Cisco IOS command creates a message to be displayed upon router login? | ||||||||||||||||||
hostname hostname | ||||||||||||||||||
banner motd message | ||||||||||||||||||
hostname interface description | ||||||||||||||||||
description interface description | ||||||||||||||||||
44. If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt? | ||||||||||||||||||
Enter the enable secret command. | ||||||||||||||||||
Enter the enable password command. | ||||||||||||||||||
Enter either the enable secret or the enable password command. | ||||||||||||||||||
Enter both the enable secret and the enable password commands. | ||||||||||||||||||
45. Which Cisco IOS command will you use to set the console session timeout to 15 minutes and 30 seconds? | ||||||||||||||||||
set exec timeout 15 30 | ||||||||||||||||||
console timeout 15 30 | ||||||||||||||||||
timeout 15 30 | ||||||||||||||||||
exec-timeout 15 30 | ||||||||||||||||||
46. Which Cisco IOS command configures a serial port in slot 0, port 1 on a modular router? | ||||||||||||||||||
interface serial 0-0-1 | ||||||||||||||||||
interface serial 0 0 1 | ||||||||||||||||||
interface serial 0/0/1 | ||||||||||||||||||
interface serial 0/0-1 | ||||||||||||||||||
47. Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router? | ||||||||||||||||||
clock rate 64 | ||||||||||||||||||
clock speed 64 | ||||||||||||||||||
clock rate 64000 | ||||||||||||||||||
clock speed 64000 | ||||||||||||||||||
48. A serial interface displays “Serial1 is up, line protocol is down.” Which two situations may cause this error? (Choose 2.) | ||||||||||||||||||
The clock rate has not been set. | ||||||||||||||||||
The interface has been manually disabled. | ||||||||||||||||||
No cable is attached to the serial interface. | ||||||||||||||||||
There are no keepalives. | ||||||||||||||||||
There is a mismatch in the encapsulation type. | ||||||||||||||||||
49. Which two of the following would be considered a physical threat? (Choose 2) | ||||||||||||||||||
A user leaving their password in their desk. | ||||||||||||||||||
Someone turning off the power to the switch to block network access. | ||||||||||||||||||
Someone turning off the air conditioning system in the network closet. | ||||||||||||||||||
Someone breaking into the cabinet that contains the network documentation. | ||||||||||||||||||
50. Which four of the following can be protected with a password? (Choose 4) | ||||||||||||||||||
Console access | ||||||||||||||||||
VTY access | ||||||||||||||||||
TTY access | ||||||||||||||||||
User level access | ||||||||||||||||||
Exec level access | ||||||||||||||||||
51. Which of the following is the most secure method of remotely accessing a network device? | ||||||||||||||||||
http | ||||||||||||||||||
telnet | ||||||||||||||||||
ssh | ||||||||||||||||||
rmon | ||||||||||||||||||
snmp | ||||||||||||||||||
52. Which of the following describes the Cisco Router and Security Device Manager ? | ||||||||||||||||||
It is a PC based management system that can be used to configure features like DHCP sever. | ||||||||||||||||||
It is a WEB based management system that can be used to configure features like DHCP sever. | ||||||||||||||||||
It is a server based management system that can be used to configure features like DHCP sever. | ||||||||||||||||||
It is a client based management system that can be used to configure features like DHCP sever. | ||||||||||||||||||
53. Where do the Cisco Router and Security Device Manager files reside? | ||||||||||||||||||
The PC | ||||||||||||||||||
The Router | ||||||||||||||||||
The local client | ||||||||||||||||||
A Network server | ||||||||||||||||||
54. What the two of the following are functions of DHCP? (Choose 2.) | ||||||||||||||||||
DHCP dynamically assigns host names to client devices | ||||||||||||||||||
DHCP dynamically assigns IP addresses to client devices. | ||||||||||||||||||
DHCP dynamically assigns a default gateway to client devices. | ||||||||||||||||||
DHCP dynamically assigns security access levels to client devices. | ||||||||||||||||||
55. Which of the following describes the DHCP server provided by Cisco IOS? | ||||||||||||||||||
It is a full DHCP server | ||||||||||||||||||
Its support is limited to assigning IP addresses to clients. | ||||||||||||||||||
It has to get is DHCP information for a master DHCP server. | ||||||||||||||||||
It has limited DHCP support and can only assign IP addresses and default gateways to clients. | ||||||||||||||||||
56. Which of the following are required DHCP parameters when configuring a DHCP server on a Cisco router? (Choose 2) | ||||||||||||||||||
Pool Name | ||||||||||||||||||
Domain Name | ||||||||||||||||||
Default Router | ||||||||||||||||||
DNS Server Address | ||||||||||||||||||
WINS Server Address | ||||||||||||||||||
DHCP Network and Subnet | ||||||||||||||||||
57. Which command can be used to see if an address in the DHCP pool is already in use by another device? | ||||||||||||||||||
sh ip dhcp bindings | ||||||||||||||||||
sh ip dhcp database | ||||||||||||||||||
sh ip dhcp mapping | ||||||||||||||||||
sh ip dhcp conflict | ||||||||||||||||||
58. Which of the following is a Cisco IOS tool that can be used for secure remote access to another device? | ||||||||||||||||||
SSH | ||||||||||||||||||
SDM | ||||||||||||||||||
ping | ||||||||||||||||||
Telnet | ||||||||||||||||||
traceroute | ||||||||||||||||||
59. Which command would you use to see who has Telnet sessions to your router? | ||||||||||||||||||
show user | ||||||||||||||||||
show telnet | ||||||||||||||||||
show sessions | ||||||||||||||||||
show connections | ||||||||||||||||||
60. Which of the following would you use to suspend a Telnet sessions? | ||||||||||||||||||
end keyword | ||||||||||||||||||
suspend keyword | ||||||||||||||||||
CTRL-Shift-6 key sequence | ||||||||||||||||||
CTRL-Shift-Del key sequence | ||||||||||||||||||
12654 participants so far | ||||||||||||||||||
Number answered correctly: 62 out of 73 |
This site is about layered tcp ip networks. You will not only learn tcp utp protocol, LAN WAN architects, as well as ssh, ssl, ipsec, vlan, vpn, ip routing etc, you will also expect to hands on hub, switch, router, ethernet cable and serial WAN cable.
Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment