test me

Site Search:

Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4

































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Legend
answerCorrect answer
Your answer, Correct.
Your answer, Incorrect.

1. Which three of the following components are common to routers, switches, and computers? (Choose 3)
RAM
CPU
motherboard
keyboard
2. Which two types of ports do routers have? (Choose 2.)
printer
console
network
CD-ROM
USB
3. Which two statements best describe the functions of a router in a network? (Choose 2.)
Routers maintain their routing tables and ensure that other routers know of changes in the network.
Routers use the routing table to determine where to forward packets.
Routers strengthen the signal over large distances in a network.
Routers create larger collision domains.
Routers use ICMP to communicate network information from the router’s own routing table with other routers.
4. Which three of the following statements about the path determination process are accurate? (Choose 3.)
Routers evaluate the available paths to a destination
The routing process uses metrics and administrative distances when evaluating network paths.
Dynamic routing occurs when the network administrator configures information on each router.
Dynamic routing occurs when information is learned using routing information that is obtained from routing protocols.
A default route holds an explicit route to every network.
The routing table holds multiple entries per network
5a. The router de-encapsulates the frame and uses the protocol information of the frame to determine that the network layer packet will pass to the IP process.
Step 1
Step 2
Step 3
Step 4
Step 5
5b. If the destination network is on a directly attached network, the router will use the ARP process to obtain the MAC address of the host and forward it to the network segment. If the network is reachable through another router, the router will use the MAC address of the next-hop router and forward the packet out the interface indicated in the routing table.
Step 1
Step 2
Step 3
Step 4
Step 5
5c. The router checks the destination address in the IP header. Either the packet is destined for the router itself or it needs to be forwarded. If the packet needs to be forwarded, the router searches its routing table to determine where to send the packet.
Step 1
Step 2
Step 3
Step 4
Step 5
5d. The outgoing interface process encapsulates the packet appropriately to the media and sends the packet onto the network segment.
Step 1
Step 2
Step 3
Step 4
Step 5
5e. The router receives a packet on one of its interfaces.
Step 1
Step 2
Step 3
Step 4
Step 5
6. Which of the following contains routing information that helps a router in determining the routing path?
IP Address
MAC Address
routing table
routing protocol
7. Which three of the following statements describe the function of routing tables? (Choose 3.)
Routing tables provide an ordered list of known network addresses.
Routing tables are maintained through the transmission of MAC addresses.
Routing tables contain metrics that are used to determine the desirability of the route.
Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next-hop router) on the way to the final destination.
When a router receives an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source.
Although routing protocols vary, routing metrics do not.
8a. This entry comes from having interfaces attached to network segments. This entry is obviously the most certain; if the interface fails or is administratively shut down, the entry for that network will be removed from the routing table.
Static routing
Dynamic routing
Default route
Directly connected network
8b. This is an optional entry that is used when no explicit path to a destination is found in the routing table. This entry can be manually inserted or be populated from a dynamic routing protocol.
Static routing
Dynamic routing
Default route
Directly connected network
8c. These routes are entered manually by a system administrator directly into the configuration of a router.
Static routing
Dynamic routing
Default route
Directly connected network
8d. These routes are learned by the router, and the information is responsive to changes in the network so that it is constantly being updated.
Static routing
Dynamic routing
Default route
Directly connected network
9. Which three metrics are most commonly used by routing protocols to determine a network path? (Choose 3.)
hop count
bandwidth
delay
packet length
distance
quantity
10. Which three statements accurately describe a distance vector protocol? (Choose 3.)
IGRP was developed by Cisco to address the issues associated with routing in medium-size LANs.
Examples of this protocol include RIP and IGRP.
This protocol determines the direction and distance to any network in the internetwork.
Using this protocol, a router needs to know the entire path to every network segment.
This process is also known as “routing by rumor.”
11. Which three statements accurately describe a link-state routing protocol? (Choose 3.)
The link-state database is used to calculate the paths with the highest bandwidths on the network.
Link-state routing protocols respond quickly to network changes.
In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active.
Link-state routing protocols send periodic updates (link-state refreshes) at long time intervals, approximately once every 30 minutes.
In link-state routing protocols, every router tries to build its own internal map of the network topology.
Link-state routing protocols send periodic updates even if no network changes have occurred.
12. All computers function using the _____.
base-10 system
decimal system
numeric system
binary system
13. The decimal number 10 converts to the binary number _____.
10
1010
110
1000
14. Which of the following binary octets has an LSB of 0?
01100011
10100101
10011010
10011001
15. IP addresses are represented using _____.
32-bit binary numbers
16-bit decimal numbers
8-bit binary numbers
8 sets of 4-bit decimal numbers
16. 2 to the fifth power is _____.
2 X 5
128
2 multiplied by itself 5 times
none of the above
17. The decimal number 205 converted into a binary number is _____.
11011101
11001001
11000101
11001101
18. The binary equivalent of decimal number 452 is _____.
111000100
110000100
111001100
101000100
19. What is the decimal equivalent of the binary number 11000111?
218
199
179
208
20. The binary number 11101000111 converted into a decimal number is _____.
1183
1873
1638
1863
21. How many octets does a Class A network have in the host field?
3
2
1
4
22. What is the practical minimum number of bits that can be borrowed to form a subnet?
1
2
3
4
23. Using 6 subnet bits, how many usable subnets are created?
58
60
64
66
24. How many host addresses can be used in a Class C network?
253
254
255
256
25. What is the maximum number of bits that can be borrowed to create a subnet for a Class C network?
2
4
6
8
26. A subnet mask tells the router to look at which portions of an IP address?
mask and host bits
host and network bits
host and subnet bits
network and subnet bits
27. If a router does not match the appropriate address portions to a number on its routing table, it _____.
sends the packet back to the sender
passes the packet to the next router in the hierarchy
adds that number to its table
discards the packet
28. Which of the following subnet masks falls on octet boundaries?
255.0.0.0
255.255.0.0
255.255.255.0
all of the above
29. Which two of the following are binary default subnet masks? (Choose 2.)
11111111.00000000.00000000.00000000
11111111.11111111.01000000.00000000
11111111.11111111.11111111.00000000
255.255.224.0
30. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?
172.17.128.47
172.17.128
172.17
10.172.47
31. 255.255.224.0 translates into the binary number _____.
11111111.00000000.11100000.00000000
11111111.11100000.00000000.00000000
11111111.11111111.11100000.00000000
11111111.11111111.11110000.00000000
32. To see how many bits you should borrow from the host portion of the network address to give you the number of subnets you need, you should _____.
subtract the number of subnets you need from the host portion
add the bit values from right to left until the total (decimal value) is just greater than the number of subnets you need
add the bit values from left to right until the total (decimal value) is just greater than the number of subnets you need
none of the above
33. How should you power up a Cisco router?
Press the Reset button.
Turn the power switch to “on.”
Connect the fiber cable to another router.
Attach the power cable plug to the router power supply socket.
34. When you start a Cisco router, what should you see on the console?
Cisco IOS debug messages
the Diagnostic Console menu
Cisco IOS software output text
a graphical picture showing the real-time status of the LED
35. What is the primary purpose of setup mode on a Cisco router?
to display the current router configuration
to complete hardware and interface testing
to bring up a minimal feature configuration
to fully configure a Cisco router for IP routing
36. Which statement best describes what the user EXEC mode commands allow you to configure on a Cisco router?
You cannot configure anything; the user mode commands are used to display information.
The user EXEC mode allows you to perform global configuration tasks that affect the entire router.
The user EXEC mode commands allow you to enter a secret password so that you can configure the router.
The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers.
37. Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
exit
quit
disable
userexec
38a. Provides a list of commands and the arguments associated with a specific command
context-sensitive help
console error messages
command history buffer
38b. Allows recall of long or complex commands or entries for reentry, review, or correction
context-sensitive help
console error messages
command history buffer
38c. Identifies problems with router commands incorrectly entered so that you can alter or correct them
context-sensitive help
console error messages
command history buffer
39. What information does the show running-config command provide on a Cisco router?
current (running) configuration in RAM
system hardware and names of configuration files
amount of NVRAM used to store the configuration
version of Cisco IOS software running on the router
40. Which Cisco IOS command displays the configuration of the system hardware and the software information?
show version 
show interfaces
show startup-config
show running-config
41a. Router(config-if)#
Line
Router
Interface
Controller
Subinterface
41b. Router(config-line)#
Line
Router
Interface
Controller
Subinterface
41c. Router(config-subif)#
Line
Router
Interface
Controller
Subinterface
14d. Router(config-router)#
Line
Router
Interface
Controller
Subinterface
41e. Router(config-controller)#
Line
Router
Interface
Controller
Subinterface
42. If you enter a major command on a Cisco router, what happens?
The router returns you to user EXEC mode.
The router returns a list of possible commands.
The router invokes a global configuration command.
The router switches you from one configuration mode to another.
43. Which Cisco IOS command creates a message to be displayed upon router login?
hostname hostname
banner motd message
hostname interface description
description interface description
44. If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt?
Enter the enable secret command.
Enter the enable password command.
Enter either the enable secret or the enable password command.
Enter both the enable secret and the enable password commands.
45. Which Cisco IOS command will you use to set the console session timeout to 15 minutes and 30 seconds?
set exec timeout 15 30
console timeout 15 30
timeout 15 30
exec-timeout 15 30
46. Which Cisco IOS command configures a serial port in slot 0, port 1 on a modular router?
interface serial 0-0-1
interface serial 0 0 1
interface serial 0/0/1
interface serial 0/0-1
47. Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
clock rate 64
clock speed 64
clock rate 64000
clock speed 64000
48. A serial interface displays “Serial1 is up, line protocol is down.” Which two situations may cause this error? (Choose 2.)
The clock rate has not been set.
The interface has been manually disabled.
No cable is attached to the serial interface.
There are no keepalives.
There is a mismatch in the encapsulation type.
49. Which two of the following would be considered a physical threat? (Choose 2)
A user leaving their password in their desk.
Someone turning off the power to the switch to block network access.
Someone turning off the air conditioning system in the network closet.
Someone breaking into the cabinet that contains the network documentation.
50. Which four of the following can be protected with a password? (Choose 4)
Console access
VTY access
TTY access
User level access
Exec level access
51. Which of the following is the most secure method of remotely accessing a network device?
http
telnet
ssh
rmon
snmp
52. Which of the following describes the Cisco Router and Security Device Manager ?
It is a PC based management system that can be used to configure features like DHCP sever.
It is a WEB based management system that can be used to configure features like DHCP sever.
It is a server based management system that can be used to configure features like DHCP sever.
It is a client based management system that can be used to configure features like DHCP sever.
53. Where do the Cisco Router and Security Device Manager files reside?
The PC
The Router
The local client
A Network server
54. What the two of the following are functions of DHCP? (Choose 2.)
DHCP dynamically assigns host names to client devices
DHCP dynamically assigns IP addresses to client devices.
DHCP dynamically assigns a default gateway to client devices.
DHCP dynamically assigns security access levels to client devices.
55. Which of the following describes the DHCP server provided by Cisco IOS?
It is a full DHCP server
Its support is limited to assigning IP addresses to clients.
It has to get is DHCP information for a master DHCP server.
It has limited DHCP support and can only assign IP addresses and default gateways to clients.
56. Which of the following are required DHCP parameters when configuring a DHCP server on a Cisco router? (Choose 2)
Pool Name
Domain Name
Default Router
DNS Server Address
WINS Server Address
DHCP Network and Subnet
57. Which command can be used to see if an address in the DHCP pool is already in use by another device?
sh ip dhcp bindings
sh ip dhcp database
sh ip dhcp mapping
sh ip dhcp conflict
58. Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?
SSH
SDM
ping
Telnet
traceroute
59. Which command would you use to see who has Telnet sessions to your router?
show user
show telnet
show sessions
show connections
60. Which of the following would you use to suspend a Telnet sessions?
end keyword
suspend keyword
CTRL-Shift-6 key sequence
CTRL-Shift-Del key sequence
12654 participants so far
Number answered correctly: 62 out of 73

No comments:

Post a Comment