test me

Site Search:

Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4












































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































 

Exam Source





















Legend
answer Correct answer
 Your answer, Correct.
 Your answer, Incorrect.

 
 1. Which three of the following components are common to routers, switches, and computers? (Choose 3)
RAM      
CPU      
motherboard      
 keyboard      
 2. Which two types of ports do routers have? (Choose 2.)
 printer      
console      
network      
 CD-ROM      
 USB      
 3. Which two statements best describe the functions of a router in a network? (Choose 2.)
Routers maintain their routing tables and ensure that other routers know of changes in the network.       
Routers use the routing table to determine where to forward packets.       
 Routers strengthen the signal over large distances in a network.      
 Routers create larger collision domains.      
 Routers use ICMP to communicate network information from the router’s own routing table with other routers.      
 4. Which three of the following statements about the path determination process are accurate? (Choose 3.)
Routers evaluate the available paths to a destination      
The routing process uses metrics and administrative distances when evaluating network paths.      
 Dynamic routing occurs when the network administrator configures information on each router.      
Dynamic routing occurs when information is learned using routing information that is obtained from routing protocols.      
 A default route holds an explicit route to every network.      
 The routing table holds multiple entries per network      
 5a. The router de-encapsulates the frame and uses the protocol information of the frame to determine that the network layer packet will pass to the IP process.
 Step 1      
Step 2      
 Step 3      
 Step 4      
 Step 5      
 5b. If the destination network is on a directly attached network, the router will use the ARP process to obtain the MAC address of the host and forward it to the network segment. If the network is reachable through another router, the router will use the MAC address of the next-hop router and forward the packet out the interface indicated in the routing table.
 Step 1      
 Step 2      
 Step 3      
Step 4      
 Step 5      
 5c. The router checks the destination address in the IP header. Either the packet is destined for the router itself or it needs to be forwarded. If the packet needs to be forwarded, the router searches its routing table to determine where to send the packet.
 Step 1      
 Step 2      
Step 3      
 Step 4      
 Step 5      
 5d. The outgoing interface process encapsulates the packet appropriately to the media and sends the packet onto the network segment.
 Step 1      
 Step 2      
 Step 3      
 Step 4      
Step 5      
 5e. The router receives a packet on one of its interfaces.
Step 1      
 Step 2      
 Step 3      
 Step 4      
 Step 5      
 6. Which of the following contains routing information that helps a router in determining the routing path?
 IP Address      
 MAC Address      
routing table      
 routing protocol      
 7. Which three of the following statements describe the function of routing tables? (Choose 3.)
Routing tables provide an ordered list of known network addresses.      
 Routing tables are maintained through the transmission of MAC addresses.       
Routing tables contain metrics that are used to determine the desirability of the route.      
Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next-hop router) on the way to the final destination.      
 When a router receives an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source.      
 Although routing protocols vary, routing metrics do not.      
 8a. This entry comes from having interfaces attached to network segments. This entry is obviously the most certain; if the interface fails or is administratively shut down, the entry for that network will be removed from the routing table.
 Static routing      
 Dynamic routing      
 Default route      
Directly connected network      
 8b. This is an optional entry that is used when no explicit path to a destination is found in the routing table. This entry can be manually inserted or be populated from a dynamic routing protocol.
 Static routing      
 Dynamic routing      
Default route      
 Directly connected network      
 8c. These routes are entered manually by a system administrator directly into the configuration of a router.
Static routing      
 Dynamic routing      
 Default route      
 Directly connected network      
 8d. These routes are learned by the router, and the information is responsive to changes in the network so that it is constantly being updated.
 Static routing      
Dynamic routing      
 Default route      
 Directly connected network      
 9. Which three metrics are most commonly used by routing protocols to determine a network path? (Choose 3.)
hop count      
bandwidth      
delay      
 packet length      
 distance      
 quantity      
 10. Which three statements accurately describe a distance vector protocol? (Choose 3.)
 IGRP was developed by Cisco to address the issues associated with routing in medium-size LANs.      
Examples of this protocol include RIP and IGRP.      
This protocol determines the direction and distance to any network in the internetwork.       
 Using this protocol, a router needs to know the entire path to every network segment.      
This process is also known as “routing by rumor.”      
 11. Which three statements accurately describe a link-state routing protocol? (Choose 3.)
 The link-state database is used to calculate the paths with the highest bandwidths on the network.      
Link-state routing protocols respond quickly to network changes.      
 In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active.      
Link-state routing protocols send periodic updates (link-state refreshes) at long time intervals, approximately once every 30 minutes.       
In link-state routing protocols, every router tries to build its own internal map of the network topology.       
 Link-state routing protocols send periodic updates even if no network changes have occurred.      
 12. All computers function using the _____.
 base-10 system      
 decimal system      
 numeric system      
binary system      
 13. The decimal number 10 converts to the binary number _____.
 10      
1010      
 110      
 1000      
 14. Which of the following binary octets has an LSB of 0? (tip: LSB stands for least significant bit, a fancy name of the right-most bit)
 01100011      
 10100101      
10011010      
 10011001      
 15. IP addresses are represented using _____.
32-bit binary numbers      
 16-bit decimal numbers      
 8-bit binary numbers      
 8 sets of 4-bit decimal numbers      
 16. 2 to the fifth power is _____.
 2 X 5      
 128      
2 multiplied by itself 5 times      
 none of the above      
 17. The decimal number 205 converted into a binary number is _____.
 11011101      
 11001001      
 11000101      
11001101      
 18. The binary equivalent of decimal number 452 is _____.
111000100      
 110000100      
 111001100      
 101000100      
 19. What is the decimal equivalent of the binary number 11000111?
 218      
199      
 179      
 208      
 20. The binary number 11101000111 converted into a decimal number is _____.
 1183      
 1873      
 1638      
1863      
 21. How many octets does a Class A network have in the host field?
     
      
      
      
 22. What is the practical minimum number of bits that can be borrowed to form a subnet?
     
      
      
      
 23. Using 6 subnet bits, how many usable subnets are created?
 58      
 60      
64      
 66      
 24. How many host addresses can be used in a Class C network?
 253      
254      
 255      
 256      
 25. What is the maximum number of bits that can be borrowed to create a subnet for a Class C network?  (hint: Number of Valid Hosts On A Subnet = (2 to the power of the number fo host bits) – 2, leave 2 bits for host field in order to get 2 hosts per subnet.)
      
      
     
      
 26. A subnet mask tells the router to look at which portions of an IP address?
 mask and host bits      
 host and network bits      
 host and subnet bits      
network and subnet bits      
 27. If a router does not match the appropriate address portions to a number on its routing table, it _____.
 sends the packet back to the sender      
 passes the packet to the next router in the hierarchy      
 adds that number to its table      
discards the packet      
 28. Which of the following subnet masks falls on octet boundaries?
 255.0.0.0      
 255.255.0.0      
 255.255.255.0      
all of the above      
 29. Which two of the following are binary default subnet masks? (Choose 2.)
 11111111.00000000.00000000.00000000      
 11111111.11111111.01000000.00000000      
11111111.11111111.11111111.00000000      
 255.255.224.0      
 30. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?
 172.17.128.47      
 172.17.128      
172.17      
 10.172.47      
 31. 255.255.224.0 translates into the binary number _____.
 11111111.00000000.11100000.00000000      
 11111111.11100000.00000000.00000000      
11111111.11111111.11100000.00000000      
 11111111.11111111.11110000.00000000      
 32. To see how many bits you should borrow from the host portion of the network address to give you the number of subnets you need, you should _____.
 subtract the number of subnets you need from the host portion      
 add the bit values from right to left until the total (decimal value) is just greater than the number of subnets you need      
 add the bit values from left to right until the total (decimal value) is just greater than the number of subnets you need      
none of the above      
 33. How should you power up a Cisco router?
 Press the Reset button.      
Turn the power switch to “on.”      
 Connect the fiber cable to another router.      
 Attach the power cable plug to the router power supply socket.      
 34. When you start a Cisco router, what should you see on the console?
 Cisco IOS debug messages      
 the Diagnostic Console menu      
Cisco IOS software output text      
 a graphical picture showing the real-time status of the LED      
 35. What is the primary purpose of setup mode on a Cisco router?
 to display the current router configuration      
 to complete hardware and interface testing      
to bring up a minimal feature configuration      
 to fully configure a Cisco router for IP routing      
 36. Which statement best describes what the user EXEC mode commands allow you to configure on a Cisco router?
You cannot configure anything; the user mode commands are used to display information.      
 The user EXEC mode allows you to perform global configuration tasks that affect the entire router.       
 The user EXEC mode commands allow you to enter a secret password so that you can configure the router.      
 The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers.       
 37. Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
 exit      
 quit      
disable      
 userexec      
 38a. Provides a list of commands and the arguments associated with a specific command
context-sensitive help      
 console error messages      
 command history buffer      
 38b. Allows recall of long or complex commands or entries for reentry, review, or correction
 context-sensitive help      
 console error messages      
command history buffer      
 38c. Identifies problems with router commands incorrectly entered so that you can alter or correct them
 context-sensitive help      
console error messages      
 command history buffer      
 39. What information does the show running-config command provide on a Cisco router?
current (running) configuration in RAM      
 system hardware and names of configuration files      
 amount of NVRAM used to store the configuration      
 version of Cisco IOS software running on the router      
 40. Which Cisco IOS command displays the configuration of the system hardware and the software information?
show version       
 show interfaces      
 show startup-config      
 show running-config      
 41a. Router(config-if)#
 Line      
 Router      
Interface      
 Controller      
 Subinterface      
 41b. Router(config-line)#
Line      
 Router      
 Interface      
 Controller      
 Subinterface      
 41c. Router(config-subif)#
 Line      
 Router      
 Interface      
 Controller      
Subinterface      
 14d. Router(config-router)#
 Line      
Router      
 Interface      
 Controller      
 Subinterface      
 41e. Router(config-controller)#
 Line      
 Router      
 Interface      
Controller      
 Subinterface      
 42. If you enter a major command on a Cisco router, what happens?
 The router returns you to user EXEC mode.      
 The router returns a list of possible commands.      
 The router invokes a global configuration command.      
The router switches you from one configuration mode to another.      
 43. Which Cisco IOS command creates a message to be displayed upon router login?
 hostname hostname      
banner motd message      
 hostname interface description      
 description interface description      
 44. If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt?
Enter the enable secret command.      
 Enter the enable password command.      
 Enter either the enable secret or the enable password command.      
 Enter both the enable secret and the enable password commands.      
 45. Which Cisco IOS command will you use to set the console session timeout to 15 minutes and 30 seconds?
 set exec timeout 15 30      
 console timeout 15 30      
 timeout 15 30      
exec-timeout 15 30      
 46. Which Cisco IOS command configures a serial port in slot 0, port 1 on a modular router?
 interface serial 0-0-1      
 interface serial 0 0 1      
interface serial 0/0/1      
 interface serial 0/0-1      
 47. Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
 clock rate 64      
 clock speed 64      
clock rate 64000      
 clock speed 64000      
 48. A serial interface displays “Serial1 is up, line protocol is down.” Which two situations may cause this error? (Choose 2.)
The clock rate has not been set.      
 The interface has been manually disabled.      
 No cable is attached to the serial interface.      
 There are no keepalives.      
There is a mismatch in the encapsulation type.      
 49. Which two of the following would be considered a physical threat? (Choose 2)
 A user leaving their password in their desk.      
Someone turning off the power to the switch to block network access.      
Someone turning off the air conditioning system in the network closet.      
 Someone breaking into the cabinet that contains the network documentation.      
 50. Which four of the following can be protected with a password? (Choose 4)
Console access      
VTY access      
TTY access      
 User level access      
Exec level access      
 51. Which of the following is the most secure method of remotely accessing a network device?
 http      
 telnet      
ssh      
 rmon      
 snmp      
 52. Which of the following describes the Cisco Router and Security Device Manager ?
 It is a PC based management system that can be used to configure features like DHCP sever.      
It is a WEB based management system that can be used to configure features like DHCP sever.      
 It is a server based management system that can be used to configure features like DHCP sever.      
 It is a client based management system that can be used to configure features like DHCP sever.      
 53. Where do the Cisco Router and Security Device Manager files reside?
 The PC      
The Router      
 The local client      
 A Network server      
 54. What the two of the following are functions of DHCP? (Choose 2.)
 DHCP dynamically assigns host names to client devices      
DHCP dynamically assigns IP addresses to client devices.      
DHCP dynamically assigns a default gateway to client devices.      
 DHCP dynamically assigns security access levels to client devices.      
 55. Which of the following describes the DHCP server provided by Cisco IOS?
It is a full DHCP server       
 Its support is limited to assigning IP addresses to clients.      
 It has to get is DHCP information for a master DHCP server.      
 It has limited DHCP support and can only assign IP addresses and default gateways to clients.      
 56. Which of the following are required DHCP parameters when configuring a DHCP server on a Cisco router? (Choose 2)
Pool Name      
 Domain Name      
 Default Router      
 DNS Server Address      
 WINS Server Address      
DHCP Network and Subnet      
 57. Which command can be used to see if an address in the DHCP pool is already in use by another device?
 sh ip dhcp bindings      
 sh ip dhcp database      
 sh ip dhcp mapping       
sh ip dhcp conflict      
 58. Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?
SSH      
 SDM      
 ping      
 Telnet      
 traceroute      
 59. Which command would you use to see who has Telnet sessions to your router?
show user      
 show telnet      
 show sessions      
 show connections      
 60. Which of the following would you use to suspend a Telnet sessions?
 end keyword      
 suspend keyword      
CTRL-Shift-6 key sequence      
 CTRL-Shift-Del key sequence      
12660 participants so far
Number answered correctly: 71 out of 73

1 comment:

  1. [...] Answers for Interconnecting Cisco Networking Devices (ICND) Practice Questions-Module 4 August 2009 [...]

    ReplyDelete