Legend |
answer |
|
Correct answer |
|
|
Your answer, Correct. |
|
|
Your answer, Incorrect. |
|
|
|
1. Which two statements about the functions of a hub are accurate? (Choose two.)
|
|
A hub extends an Ethernet LAN. |
|
|
|
|
|
|
A hub reduces the size of a collision domain. |
|
|
|
|
|
|
Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth. |
|
|
|
|
|
|
A hub is a data link layer device. |
|
|
|
|
|
|
A hub amplifies the data signal before retransmitting it. |
|
|
|
|
|
2. Which three statements best describe collisions? (Choose three.)
|
|
Collisions occur when two or more stations on a shared media transmit at the same time. |
|
|
|
|
|
|
Larger segments are less likely to have collisions. |
|
|
|
|
|
|
In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data. |
|
|
|
|
|
|
Adding a hub to a network can improve collision issues. |
|
|
|
|
|
|
Collisions are by-products of a shared LAN. |
|
|
|
|
|
|
More segments on a network mean greater potential for collisions. |
|
|
|
|
|
3. Which of these choices best describes a collision domain? |
|
two or more devices trying to communicate at the same time |
|
|
|
|
|
|
two networks that are connected |
|
|
|
|
|
|
network segments that share the same bandwidth |
|
|
|
|
|
|
none of the above |
|
|
|
|
|
4. What type of hardware will help eliminate collisions? |
|
repeater |
|
|
|
|
|
|
bridge |
|
|
|
|
|
|
hub |
|
|
|
|
|
|
extender |
|
|
|
|
|
5. Which three factors are typical causes of network congestion? (Choose three.)
|
|
high-bandwidth applications |
|
|
|
|
|
|
many network segments |
|
|
|
|
|
|
increasing volume of network traffic |
|
|
|
|
|
|
more powerful computer and network technologies |
|
|
|
|
|
|
few network segments |
|
|
|
|
|
|
greater distances for LANs |
|
|
|
|
|
6. What are four characteristics of a bridge? (Choose four.)
|
|
Bridges forward but do not filter data frames between LAN segments. |
|
|
|
|
|
|
Bridges maintain MAC address tables. |
|
|
|
|
|
|
Bridges are more “intelligent” than hubs. |
|
|
|
|
|
|
Bridges can buffer and forward frames between two or more LAN segments. |
|
|
|
|
|
|
Bridges create fewer collision domains. |
|
|
|
|
|
|
Bridges operate at Layer 2 of the OSI model. |
|
|
|
|
|
7. What are two major benefits of adding a bridge to a network? (Choose two.)
|
|
isolating potential network problems to specific segments |
|
|
|
|
|
|
increasing the speed of a network |
|
|
|
|
|
|
extending a LAN to cover greater distances by joining multiple segments |
|
|
|
|
|
|
creating fewer collision domains |
|
|
|
|
|
|
forwarding data frames between LAN segments |
|
|
|
|
|
8a. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame. |
|
Flooding |
|
|
|
|
|
|
Filtering |
|
|
|
|
|
|
Forwarding |
|
|
|
|
|
8b. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment. |
|
Flooding |
|
|
|
|
|
|
Filtering |
|
|
|
|
|
|
Forwarding |
|
|
|
|
|
8c. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame. |
|
Flooding |
|
|
|
|
|
|
Filtering |
|
|
|
|
|
|
Forwarding |
|
|
|
|
|
9. Which three characteristics apply to a switch? (Choose three.)
|
|
uses a table of MAC addresses to determine the port to which the data is to be sent |
|
|
|
|
|
|
connects LAN segments |
|
|
|
|
|
|
reduces the number of collision domains |
|
|
|
|
|
|
increases the number of collision domains |
|
|
|
|
|
|
filters data before forwarding it to its destination on the network |
|
|
|
|
|
10. Which three features differentiate switches from bridges? (Choose three.)
|
|
large frame buffers |
|
|
|
|
|
|
use of a table of MAC addresses to determine the segment to which the data is to be sent |
|
|
|
|
|
|
support for mixed media rates |
|
|
|
|
|
|
high port densities |
|
|
|
|
|
|
ability to segment LANs |
|
|
|
|
|
11. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.)
|
|
Switches operate at much higher speeds than bridges. |
|
|
|
|
|
|
Switches operate at lower speeds than bridges. |
|
|
|
|
|
|
Switches support more advanced functionality than bridges. |
|
|
|
|
|
|
Switches support less functionality than bridges. |
|
|
|
|
|
|
Switches support dedicated communication between devices. |
|
|
|
|
|
|
Switches do not support dedicated communication between devices. |
|
|
|
|
|
12. Which three statements about microsegmentation are accurate? (Choose three.)
|
|
Implementing a bridge creates microsegmentation. |
|
|
|
|
|
|
Microsegmentation increases bandwidth availability. |
|
|
|
|
|
|
Each device on a network segment is connected directly to a switch port. |
|
|
|
|
|
|
Microsegmentation eliminates collisions. |
|
|
|
|
|
|
Microsegmentation limits the number of segments on a network. |
|
|
|
|
|
|
Microsegmentation uses half-duplex operation. |
|
|
|
|
|
13a. The network sends and receives data frames one at a time, but not simultaneously. |
|
Full-duplex communication |
|
|
|
|
|
|
Half-duplex communication |
|
|
|
|
|
13b. This communication type effectively doubles the amount of bandwidth between the devices. |
|
Full-duplex communication |
|
|
|
|
|
|
Half-duplex communication |
|
|
|
|
|
13c. The network sends and receives data frames simultaneously. |
|
Full-duplex communication |
|
|
|
|
|
|
Half-duplex communication |
|
|
|
|
|
14a. At the end-user level, gives high-performance, PC workstation 100-Mbps access to a server |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
14b. Not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups; at the backbone level, provides interswitch connectivity for low- to medium-volume applications |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
14c. At the workgroup level, provides high-performance connectivity to the enterprise server |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
14d. At the backbone level, provides backbone and interswitch connectivity |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
14e. At the end-user level, provides connectivity between the end user and the user-level switch |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
14f. Provides interswitch connectivity for low- to medium-volume applications |
|
Ethernet 10BASE-T |
|
|
|
|
|
|
Fast Ethernet |
|
|
|
|
|
|
Gigabit Ethernet |
|
|
|
|
|
15. When a Cisco device starts up, which of the following does it run to check its hardware? |
|
flash |
|
|
|
|
|
|
RAM |
|
|
|
|
|
|
POST |
|
|
|
|
|
|
TFTP |
|
|
|
|
|
16. When a Catalyst switch or Cisco router starts up, what is the first operation performed? |
|
The device performs system startup routes. |
|
|
|
|
|
|
The device performs hardware checking routines. |
|
|
|
|
|
|
The device attempts to locate other devices on the network. |
|
|
|
|
|
|
The device tries to find and apply software configuration settings. |
|
|
|
|
|
17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____. |
|
CD-ROM |
|
|
|
|
|
|
TFTP server |
|
|
|
|
|
|
console terminal |
|
|
|
|
|
|
modem connection |
|
|
|
|
|
18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration. |
|
LAN port |
|
|
|
|
|
|
uplink port |
|
|
|
|
|
|
console port |
|
|
|
|
|
|
auxilary port |
|
|
|
|
|
19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router? |
|
user EXEC level |
|
|
|
|
|
|
setup EXEC level |
|
|
|
|
|
|
enable EXEC level |
|
|
|
|
|
|
privileged EXEC level |
|
|
|
|
|
20. How do you instruct a Cisco device to parse and execute an entered command? |
|
Press the Send key |
|
|
|
|
|
|
Press the Enter key |
|
|
|
|
|
|
Add a space at end of the command |
|
|
|
|
|
|
Wait 5 seconds after you enter the command |
|
|
|
|
|
21. Which CLI prompt indicates that you are working in privileged EXEC mode? |
|
hostname# |
|
|
|
|
|
|
hostname> |
|
|
|
|
|
|
hostname-exec> |
|
|
|
|
|
|
hostname-config |
|
|
|
|
|
22. Which command would you enter in the privileged EXEC mode to list the command options? |
|
? |
|
|
|
|
|
|
init |
|
|
|
|
|
|
help |
|
|
|
|
|
|
login |
|
|
|
|
|
23a. Attach the power cable plug to the switch power supply socket. |
|
Step 1 |
|
|
|
|
|
|
Step 2 |
|
|
|
|
|
|
Step 3 |
|
|
|
|
|
23b. Observe the boot sequence, including the Cisco IOS software output text on the console. |
|
Step 1 |
|
|
|
|
|
|
Step 2 |
|
|
|
|
|
|
Step 3 |
|
|
|
|
|
23c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected. |
|
Step 1 |
|
|
|
|
|
|
Step 2 |
|
|
|
|
|
|
Step 3 |
|
|
|
|
|
24. How do you start a Catalyst 2950 series switch? |
|
Press the on/off switch. |
|
|
|
|
|
|
Power up the redundant power supply. |
|
|
|
|
|
|
Connect a network cable to another switch on the network. |
|
|
|
|
|
|
Attach the power cable plug to the switch power supply socket. |
|
|
|
|
|
25. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? |
|
the > prompt |
|
|
|
|
|
|
the privileged EXEC prompt |
|
|
|
|
|
|
the Management Console logon screen |
|
|
|
|
|
|
a list of commands available on the switch |
|
|
|
|
|
26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch? |
|
c? |
|
|
|
|
|
|
c ? |
|
|
|
|
|
|
help c |
|
|
|
|
|
|
help c* |
|
|
|
|
|
27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”? |
|
config? |
|
|
|
|
|
|
config ? |
|
|
|
|
|
|
help config |
|
|
|
|
|
|
help config* |
|
|
|
|
|
28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? |
|
ip address |
|
|
|
|
|
|
ip address 196.125.243.10 |
|
|
|
|
|
|
196.125.243.10 ip address |
|
|
|
|
|
|
ip address 196.125.243.10 255.255.255.0 |
|
|
|
|
|
29. Which configuration mode will you use to configure a particular port on a switch? |
|
user mode |
|
|
|
|
|
|
global configuration mode |
|
|
|
|
|
|
interface configuration mode |
|
|
|
|
|
|
controller configuration mode |
|
|
|
|
|
30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? |
|
MTU 1500 bytes |
|
|
|
|
|
|
Hardware is … 10BaseT |
|
|
|
|
|
|
Address is 0050.BD73.E2C1 |
|
|
|
|
|
|
802.1d STP State: Forwarding |
|
|
|
|
|
31. Which show command requires that you have privileged EXEC mode access? |
|
show ip |
|
|
|
|
|
|
show version |
|
|
|
|
|
|
show running |
|
|
|
|
|
|
show interfaces |
|
|
|
|
|
32. How should you power up a Cisco router? |
|
Press the Reset button. |
|
|
|
|
|
|
Turn the power switch to “on.” |
|
|
|
|
|
|
Connect the fiber cable to another router. |
|
|
|
|
|
|
Attach the power cable plug to the router power supply socket. |
|
|
|
|
|
33. Which two of the following would be considered a physical threat? (Choose 2)
|
|
A user leaving their password in their desk. |
|
|
|
|
|
|
Someone turning off the power to the switch to block network access. |
|
|
|
|
|
|
Someone turning off the air conditioning system in the network closet. |
|
|
|
|
|
|
Someone breaking into the cabinet that contains the network documentation. |
|
|
|
|
|
34. Which four of the following can be protected with a password? (Choose 4)
|
|
Console access |
|
|
|
|
|
|
VTY access |
|
|
|
|
|
|
TTY access |
|
|
|
|
|
|
User level access |
|
|
|
|
|
|
Exec level access |
|
|
|
|
|
35. Which two of the following are customized text that is displayed before the username and password login prompts?
|
|
Message Of the Day |
|
|
|
|
|
|
Login Banner |
|
|
|
|
|
|
Access warning |
|
|
|
|
|
|
User Banner |
|
|
|
|
|
|
Warning message |
|
|
|
|
|
36. Which of the following is the most secure method of remotely accessing a network device? |
|
http |
|
|
|
|
|
|
telnet |
|
|
|
|
|
|
ssh |
|
|
|
|
|
|
rmon |
|
|
|
|
|
|
snmp |
|
|
|
|
|
37. Which of the following is an IOS feature that can be used to control access to the VTY ports? |
|
shutdown |
|
|
|
|
|
|
port security |
|
|
|
|
|
|
access list |
|
|
|
|
|
|
firewall |
|
|
|
|
|
38. Which of the following is an IOS command that can be used to control access to a switch port based upon a MAC address? |
|
shutdown |
|
|
|
|
|
|
port security |
|
|
|
|
|
|
mac-secure |
|
|
|
|
|
|
firewall |
|
|
|
|
|
39. Which of the following is an IOS command that can be used to increase the security of unused switch ports? |
|
shutdown |
|
|
|
|
|
|
port security |
|
|
|
|
|
|
mac-secure |
|
|
|
|
|
|
firewall |
|
|
|
|
|
40. Which problem is caused by redundant connections in a network? |
|
microsegmentation |
|
|
|
|
|
|
loops |
|
|
|
|
|
|
degradation |
|
|
|
|
|
|
collisions |
|
|
|
|
|
41. Which statement best describes how loops can affect performance in a switched LAN? |
|
Broadcast storms may be created when loops occur, preventing data from being transmitted over the network. |
|
|
|
|
|
|
Any multicast, broadcast, or unknown traffic will be flooded out to all ports. |
|
|
|
|
|
|
Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames. |
|
|
|
|
|
|
The loop removes the frame from the network. |
|
|
|
|
|
42. Which statement accurately describes Spanning-Tree Protocol? |
|
STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. |
|
|
|
|
|
|
STP automatically keeps the previously inactive path inactive. |
|
|
|
|
|
|
STP eliminates the segments in which there are problems. |
|
|
|
|
|
|
STP allows ports to listen to, forward, and flood data frames. |
|
|
|
|
|
43. Which of the following is an IOS command that is the most useful when troubleshooting media issues? |
|
show controller |
|
|
|
|
|
|
show run |
|
|
|
|
|
|
show interface |
|
|
|
|
|
|
show counters |
|
|
|
|
|
44. Which of the following is an IOS command that is the most useful when troubleshooting port access issues? |
|
show controller |
|
|
|
|
|
|
show run |
|
|
|
|
|
|
show interface |
|
|
|
|
|
|
show counters |
|
|
|
|
|
45. Which three of the following are methods used to mitigate configuration issues? (Choose 3)
|
|
Secure unused ports |
|
|
|
|
|
|
Secure the configuration |
|
|
|
|
|
|
Verify changes before you save |
|
|
|
|
|
|
Know what you have before you start |
|
|
|
|
|
19233 participants so far |
Number answered correctly: 39 out of 56 |
No comments:
Post a Comment