Legend | 
  
 
 answer | 
  | 
 Correct answer | 
  
 
   | 
  | 
 Your answer, Correct. | 
  
 
   | 
  | 
 Your answer, Incorrect. | 
  
 
 
  | 
  | 
 | 
 1. Which two statements about the functions of a hub are accurate? (Choose two.) 
  | 
  | 
A hub extends an Ethernet LAN. | 
 | 
 | 
 | 
 | 
 | 
 | 
A hub reduces the size of a collision domain. | 
 | 
 | 
 | 
 | 
 | 
 | 
Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth. | 
 | 
 | 
 | 
 | 
 | 
  | 
A hub is a data link layer device. | 
 | 
 | 
 | 
 | 
 | 
 | 
A hub amplifies the data signal before retransmitting it. | 
 | 
 | 
 | 
 | 
 | 
 2. Which three statements best describe collisions? (Choose three.) 
  | 
  | 
Collisions occur when two or more stations on a shared media transmit at the same time. | 
 | 
 | 
 | 
 | 
 | 
 | 
Larger segments are less likely to have collisions. | 
 | 
 | 
 | 
 | 
 | 
  | 
In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data. | 
 | 
 | 
 | 
 | 
 | 
 | 
Adding a hub to a network can improve collision issues. | 
 | 
 | 
 | 
 | 
 | 
  | 
Collisions are by-products of a shared LAN. | 
 | 
 | 
 | 
 | 
 | 
 | 
More segments on a network mean greater potential for collisions. | 
 | 
 | 
 | 
 | 
 | 
 3. Which of these choices best describes a collision domain? | 
 | 
two or more devices trying to communicate at the same time | 
 | 
 | 
 | 
 | 
 | 
 | 
two networks that are connected | 
 | 
 | 
 | 
 | 
 | 
  | 
network segments that share the same bandwidth | 
 | 
 | 
 | 
 | 
 | 
 | 
none of the above | 
 | 
 | 
 | 
 | 
 | 
 4. What type of hardware will help eliminate collisions? | 
 | 
repeater | 
 | 
 | 
 | 
 | 
 | 
  | 
bridge | 
 | 
 | 
 | 
 | 
 | 
 | 
hub | 
 | 
 | 
 | 
 | 
 | 
 | 
extender | 
 | 
 | 
 | 
 | 
 | 
 5. Which three factors are typical causes of network congestion? (Choose three.) 
  | 
  | 
high-bandwidth applications | 
 | 
 | 
 | 
 | 
 | 
 | 
many network segments | 
 | 
 | 
 | 
 | 
 | 
  | 
increasing volume of network traffic | 
 | 
 | 
 | 
 | 
 | 
 | 
more powerful computer and network technologies | 
 | 
 | 
 | 
 | 
 | 
  | 
few network segments | 
 | 
 | 
 | 
 | 
 | 
 | 
greater distances for LANs | 
 | 
 | 
 | 
 | 
 | 
 6. What are four characteristics of a bridge? (Choose four.) 
  | 
  | 
Bridges forward but do not filter data frames between LAN segments. | 
 | 
 | 
 | 
 | 
 | 
  | 
Bridges maintain MAC address tables. | 
 | 
 | 
 | 
 | 
 | 
  | 
Bridges are more “intelligent” than hubs. | 
 | 
 | 
 | 
 | 
 | 
 | 
Bridges can buffer and forward frames between two or more LAN segments. | 
 | 
 | 
 | 
 | 
 | 
 | 
Bridges create fewer collision domains. | 
 | 
 | 
 | 
 | 
 | 
  | 
Bridges operate at Layer 2 of the OSI model. | 
 | 
 | 
 | 
 | 
 | 
 7. What are two major benefits of adding a bridge to a network? (Choose two.) 
  | 
  | 
isolating potential network problems to specific segments | 
 | 
 | 
 | 
 | 
 | 
 | 
increasing the speed of a network | 
 | 
 | 
 | 
 | 
 | 
 | 
extending a LAN to cover greater distances by joining multiple segments | 
 | 
 | 
 | 
 | 
 | 
 | 
creating fewer collision domains | 
 | 
 | 
 | 
 | 
 | 
  | 
forwarding data frames between LAN segments | 
 | 
 | 
 | 
 | 
 | 
 8a. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame. | 
 | 
Flooding | 
 | 
 | 
 | 
 | 
 | 
  | 
Filtering | 
 | 
 | 
 | 
 | 
 | 
 | 
Forwarding | 
 | 
 | 
 | 
 | 
 | 
 8b. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment. | 
 | 
Flooding | 
 | 
 | 
 | 
 | 
 | 
 | 
Filtering | 
 | 
 | 
 | 
 | 
 | 
  | 
Forwarding | 
 | 
 | 
 | 
 | 
 | 
 8c. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame. | 
  | 
Flooding | 
 | 
 | 
 | 
 | 
 | 
 | 
Filtering | 
 | 
 | 
 | 
 | 
 | 
 | 
Forwarding | 
 | 
 | 
 | 
 | 
 | 
 9. Which three characteristics apply to a switch? (Choose three.) 
  | 
  | 
uses a table of MAC addresses to determine the port to which the data is to be sent | 
 | 
 | 
 | 
 | 
 | 
 | 
connects LAN segments | 
 | 
 | 
 | 
 | 
 | 
 | 
reduces the number of collision domains | 
 | 
 | 
 | 
 | 
 | 
  | 
increases the number of collision domains | 
 | 
 | 
 | 
 | 
 | 
  | 
filters data before forwarding it to its destination on the network | 
 | 
 | 
 | 
 | 
 | 
 10. Which three features differentiate switches from bridges? (Choose three.) 
  | 
 | 
large frame buffers | 
 | 
 | 
 | 
 | 
 | 
  | 
use of a table of MAC addresses to determine the segment to which the data is to be sent | 
 | 
 | 
 | 
 | 
 | 
  | 
support for mixed media rates | 
 | 
 | 
 | 
 | 
 | 
  | 
high port densities | 
 | 
 | 
 | 
 | 
 | 
 | 
ability to segment LANs | 
 | 
 | 
 | 
 | 
 | 
 11. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) 
  | 
  | 
Switches operate at much higher speeds than bridges. | 
 | 
 | 
 | 
 | 
 | 
 | 
Switches operate at lower speeds than bridges. | 
 | 
 | 
 | 
 | 
 | 
  | 
Switches support more advanced functionality than bridges. | 
 | 
 | 
 | 
 | 
 | 
 | 
Switches support less functionality than bridges. | 
 | 
 | 
 | 
 | 
 | 
  | 
Switches support dedicated communication between devices. | 
 | 
 | 
 | 
 | 
 | 
 | 
Switches do not support dedicated communication between devices. | 
 | 
 | 
 | 
 | 
 | 
 12. Which three statements about microsegmentation are accurate? (Choose three.) 
  | 
 | 
Implementing a bridge creates microsegmentation. | 
 | 
 | 
 | 
 | 
 | 
 | 
Microsegmentation increases bandwidth availability. | 
 | 
 | 
 | 
 | 
 | 
  | 
Each device on a network segment is connected directly to a switch port. | 
 | 
 | 
 | 
 | 
 | 
  | 
Microsegmentation eliminates collisions. | 
 | 
 | 
 | 
 | 
 | 
 | 
Microsegmentation limits the number of segments on a network. | 
 | 
 | 
 | 
 | 
 | 
  | 
Microsegmentation uses half-duplex operation. | 
 | 
 | 
 | 
 | 
 | 
 13a. The network sends and receives data frames one at a time, but not simultaneously. | 
 | 
Full-duplex communication | 
 | 
 | 
 | 
 | 
 | 
  | 
Half-duplex communication | 
 | 
 | 
 | 
 | 
 | 
 13b. This communication type effectively doubles the amount of bandwidth between the devices. | 
  | 
Full-duplex communication | 
 | 
 | 
 | 
 | 
 | 
 | 
Half-duplex communication | 
 | 
 | 
 | 
 | 
 | 
 13c. The network sends and receives data frames simultaneously. | 
  | 
Full-duplex communication | 
 | 
 | 
 | 
 | 
 | 
 | 
Half-duplex communication | 
 | 
 | 
 | 
 | 
 | 
 14a. At the end-user level, gives high-performance, PC workstation 100-Mbps access to a server | 
 | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
  | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
 | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 14b. Not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups; at the backbone level, provides interswitch connectivity for low- to medium-volume applications | 
  | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
 | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
 | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 14c. At the workgroup level, provides high-performance connectivity to the enterprise server | 
  | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
 | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
 | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 14d. At the backbone level, provides backbone and interswitch connectivity | 
 | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
 | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
  | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 14e. At the end-user level, provides connectivity between the end user and the user-level switch | 
 | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
  | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
 | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 14f. Provides interswitch connectivity for low- to medium-volume applications | 
  | 
Ethernet 10BASE-T | 
 | 
 | 
 | 
 | 
 | 
 | 
Fast Ethernet | 
 | 
 | 
 | 
 | 
 | 
 | 
Gigabit Ethernet | 
 | 
 | 
 | 
 | 
 | 
 15. When a Cisco device starts up, which of the following does it run to check its hardware? | 
 | 
flash | 
 | 
 | 
 | 
 | 
 | 
 | 
RAM | 
 | 
 | 
 | 
 | 
 | 
  | 
POST | 
 | 
 | 
 | 
 | 
 | 
 | 
TFTP | 
 | 
 | 
 | 
 | 
 | 
 16. When a Catalyst switch or Cisco router starts up, what is the first operation performed? | 
 | 
The device performs system startup routes. | 
 | 
 | 
 | 
 | 
 | 
  | 
The device performs hardware checking routines. | 
 | 
 | 
 | 
 | 
 | 
 | 
The device attempts to locate other devices on the network. | 
 | 
 | 
 | 
 | 
 | 
 | 
The device tries to find and apply software configuration settings. | 
 | 
 | 
 | 
 | 
 | 
 17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____. | 
 | 
CD-ROM | 
 | 
 | 
 | 
 | 
 | 
 | 
TFTP server | 
 | 
 | 
 | 
 | 
 | 
  | 
console terminal | 
 | 
 | 
 | 
 | 
 | 
 | 
modem connection | 
 | 
 | 
 | 
 | 
 | 
 18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration. | 
 | 
LAN port | 
 | 
 | 
 | 
 | 
 | 
 | 
uplink port | 
 | 
 | 
 | 
 | 
 | 
  | 
console port | 
 | 
 | 
 | 
 | 
 | 
 | 
auxilary port | 
 | 
 | 
 | 
 | 
 | 
 19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router? | 
 | 
user EXEC level | 
 | 
 | 
 | 
 | 
 | 
 | 
setup EXEC level | 
 | 
 | 
 | 
 | 
 | 
 | 
enable EXEC level | 
 | 
 | 
 | 
 | 
 | 
  | 
privileged EXEC level | 
 | 
 | 
 | 
 | 
 | 
 20. How do you instruct a Cisco device to parse and execute an entered command? | 
 | 
Press the Send key | 
 | 
 | 
 | 
 | 
 | 
  | 
Press the Enter key | 
 | 
 | 
 | 
 | 
 | 
 | 
Add a space at end of the command | 
 | 
 | 
 | 
 | 
 | 
 | 
Wait 5 seconds after you enter the command | 
 | 
 | 
 | 
 | 
 | 
 21. Which CLI prompt indicates that you are working in privileged EXEC mode? | 
  | 
hostname# | 
 | 
 | 
 | 
 | 
 | 
 | 
hostname> | 
 | 
 | 
 | 
 | 
 | 
 | 
hostname-exec> | 
 | 
 | 
 | 
 | 
 | 
 | 
hostname-config | 
 | 
 | 
 | 
 | 
 | 
 22. Which command would you enter in the privileged EXEC mode to list the command options? | 
  | 
? | 
 | 
 | 
 | 
 | 
 | 
 | 
init | 
 | 
 | 
 | 
 | 
 | 
 | 
help | 
 | 
 | 
 | 
 | 
 | 
 | 
login | 
 | 
 | 
 | 
 | 
 | 
 23a. Attach the power cable plug to the switch power supply socket. | 
 | 
Step 1 | 
 | 
 | 
 | 
 | 
 | 
  | 
Step 2 | 
 | 
 | 
 | 
 | 
 | 
 | 
Step 3 | 
 | 
 | 
 | 
 | 
 | 
 23b. Observe the boot sequence, including the Cisco IOS software output text on the console. | 
 | 
Step 1 | 
 | 
 | 
 | 
 | 
 | 
 | 
Step 2 | 
 | 
 | 
 | 
 | 
 | 
  | 
Step 3 | 
 | 
 | 
 | 
 | 
 | 
 23c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected. | 
  | 
Step 1 | 
 | 
 | 
 | 
 | 
 | 
 | 
Step 2 | 
 | 
 | 
 | 
 | 
 | 
 | 
Step 3 | 
 | 
 | 
 | 
 | 
 | 
 24. How do you start a Catalyst 2950 series switch? | 
 | 
Press the on/off switch. | 
 | 
 | 
 | 
 | 
 | 
 | 
Power up the redundant power supply. | 
 | 
 | 
 | 
 | 
 | 
 | 
Connect a network cable to another switch on the network. | 
 | 
 | 
 | 
 | 
 | 
  | 
Attach the power cable plug to the switch power supply socket. | 
 | 
 | 
 | 
 | 
 | 
 25. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? | 
 | 
the > prompt | 
 | 
 | 
 | 
 | 
 | 
 | 
the privileged EXEC prompt | 
 | 
 | 
 | 
 | 
 | 
  | 
the Management Console logon screen | 
 | 
 | 
 | 
 | 
 | 
 | 
a list of commands available on the switch | 
 | 
 | 
 | 
 | 
 | 
 26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch? | 
  | 
c? | 
 | 
 | 
 | 
 | 
 | 
 | 
c ? | 
 | 
 | 
 | 
 | 
 | 
 | 
help c | 
 | 
 | 
 | 
 | 
 | 
 | 
help c* | 
 | 
 | 
 | 
 | 
 | 
 27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”? | 
  | 
config? | 
 | 
 | 
 | 
 | 
 | 
 | 
config ? | 
 | 
 | 
 | 
 | 
 | 
 | 
help config | 
 | 
 | 
 | 
 | 
 | 
 | 
help config* | 
 | 
 | 
 | 
 | 
 | 
 28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? | 
 | 
ip address | 
 | 
 | 
 | 
 | 
 | 
 | 
ip address 196.125.243.10 | 
 | 
 | 
 | 
 | 
 | 
 | 
196.125.243.10 ip address | 
 | 
 | 
 | 
 | 
 | 
  | 
ip address 196.125.243.10 255.255.255.0 | 
 | 
 | 
 | 
 | 
 | 
 29. Which configuration mode will you use to configure a particular port on a switch? | 
 | 
user mode | 
 | 
 | 
 | 
 | 
 | 
 | 
global configuration mode | 
 | 
 | 
 | 
 | 
 | 
  | 
interface configuration mode | 
 | 
 | 
 | 
 | 
 | 
 | 
controller configuration mode | 
 | 
 | 
 | 
 | 
 | 
 30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? | 
 | 
MTU 1500 bytes | 
 | 
 | 
 | 
 | 
 | 
 | 
Hardware is … 10BaseT | 
 | 
 | 
 | 
 | 
 | 
  | 
Address is 0050.BD73.E2C1 | 
 | 
 | 
 | 
 | 
 | 
 | 
802.1d STP State: Forwarding | 
 | 
 | 
 | 
 | 
 | 
 31. Which show command requires that you have privileged EXEC mode access? | 
 | 
show ip | 
 | 
 | 
 | 
 | 
 | 
 | 
show version | 
 | 
 | 
 | 
 | 
 | 
  | 
show running | 
 | 
 | 
 | 
 | 
 | 
 | 
show interfaces | 
 | 
 | 
 | 
 | 
 | 
 32. How should you power up a Cisco router? | 
 | 
Press the Reset button. | 
 | 
 | 
 | 
 | 
 | 
  | 
Turn the power switch to “on.” | 
 | 
 | 
 | 
 | 
 | 
 | 
Connect the fiber cable to another router. | 
 | 
 | 
 | 
 | 
 | 
 | 
Attach the power cable plug to the router power supply socket. | 
 | 
 | 
 | 
 | 
 | 
 33. Which two of the following would be considered a physical threat? (Choose 2) 
  | 
 | 
A user leaving their password in their desk. | 
 | 
 | 
 | 
 | 
 | 
  | 
Someone turning off the power to the switch to block network access. | 
 | 
 | 
 | 
 | 
 | 
  | 
Someone turning off the air conditioning system in the network closet. | 
 | 
 | 
 | 
 | 
 | 
 | 
Someone breaking into the cabinet that contains the network documentation. | 
 | 
 | 
 | 
 | 
 | 
 34. Which four of the following can be protected with a password? (Choose 4) 
  | 
  | 
Console access | 
 | 
 | 
 | 
 | 
 | 
  | 
VTY access | 
 | 
 | 
 | 
 | 
 | 
  | 
TTY access | 
 | 
 | 
 | 
 | 
 | 
 | 
User level access | 
 | 
 | 
 | 
 | 
 | 
  | 
Exec level access | 
 | 
 | 
 | 
 | 
 | 
 35. Which two of the following are customized text that is displayed before the username and password login prompts? 
  | 
  | 
Message Of the Day | 
 | 
 | 
 | 
 | 
 | 
  | 
Login Banner | 
 | 
 | 
 | 
 | 
 | 
 | 
Access warning | 
 | 
 | 
 | 
 | 
 | 
 | 
User Banner | 
 | 
 | 
 | 
 | 
 | 
 | 
Warning message | 
 | 
 | 
 | 
 | 
 | 
 36. Which of the following is the most secure method of remotely accessing a network device? | 
 | 
http | 
 | 
 | 
 | 
 | 
 | 
 | 
telnet | 
 | 
 | 
 | 
 | 
 | 
  | 
ssh | 
 | 
 | 
 | 
 | 
 | 
 | 
rmon | 
 | 
 | 
 | 
 | 
 | 
 | 
snmp | 
 | 
 | 
 | 
 | 
 | 
 37. Which of the following is an IOS feature that can be used to control access to the VTY ports? | 
 | 
shutdown | 
 | 
 | 
 | 
 | 
 | 
  | 
port security | 
 | 
 | 
 | 
 | 
 | 
 | 
access list | 
 | 
 | 
 | 
 | 
 | 
 | 
firewall | 
 | 
 | 
 | 
 | 
 | 
 38. Which of the following is an IOS command that can be used to control access to a switch port based upon a MAC address? | 
 | 
shutdown | 
 | 
 | 
 | 
 | 
 | 
 | 
port security | 
 | 
 | 
 | 
 | 
 | 
  | 
mac-secure | 
 | 
 | 
 | 
 | 
 | 
 | 
firewall | 
 | 
 | 
 | 
 | 
 | 
 39. Which of the following is an IOS command that can be used to increase the security of unused switch ports? | 
  | 
shutdown | 
 | 
 | 
 | 
 | 
 | 
 | 
port security | 
 | 
 | 
 | 
 | 
 | 
 | 
mac-secure | 
 | 
 | 
 | 
 | 
 | 
 | 
firewall | 
 | 
 | 
 | 
 | 
 | 
 40. Which problem is caused by redundant connections in a network? | 
 | 
microsegmentation | 
 | 
 | 
 | 
 | 
 | 
  | 
loops | 
 | 
 | 
 | 
 | 
 | 
 | 
degradation | 
 | 
 | 
 | 
 | 
 | 
 | 
collisions | 
 | 
 | 
 | 
 | 
 | 
 41. Which statement best describes how loops can affect performance in a switched LAN? | 
  | 
Broadcast storms may be created when loops occur, preventing data from being transmitted over the network. | 
 | 
 | 
 | 
 | 
 | 
 | 
Any multicast, broadcast, or unknown traffic will be flooded out to all ports. | 
 | 
 | 
 | 
 | 
 | 
 | 
Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames. | 
 | 
 | 
 | 
 | 
 | 
 | 
The loop removes the frame from the network. | 
 | 
 | 
 | 
 | 
 | 
 42. Which statement accurately describes Spanning-Tree Protocol? | 
  | 
STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. | 
 | 
 | 
 | 
 | 
 | 
 | 
STP automatically keeps the previously inactive path inactive. | 
 | 
 | 
 | 
 | 
 | 
 | 
STP eliminates the segments in which there are problems. | 
 | 
 | 
 | 
 | 
 | 
 | 
STP allows ports to listen to, forward, and flood data frames. | 
 | 
 | 
 | 
 | 
 | 
 43. Which of the following is an IOS command that is the most useful when troubleshooting media issues? | 
  | 
show controller | 
 | 
 | 
 | 
 | 
 | 
 | 
show run | 
 | 
 | 
 | 
 | 
 | 
 | 
show interface | 
 | 
 | 
 | 
 | 
 | 
 | 
show counters | 
 | 
 | 
 | 
 | 
 | 
 44. Which of the following is an IOS command that is the most useful when troubleshooting port access issues? | 
 | 
show controller | 
 | 
 | 
 | 
 | 
 | 
 | 
show run | 
 | 
 | 
 | 
 | 
 | 
  | 
show interface | 
 | 
 | 
 | 
 | 
 | 
 | 
show counters | 
 | 
 | 
 | 
 | 
 | 
 45. Which three of the following are methods used to mitigate configuration issues? (Choose 3) 
  | 
 | 
Secure unused ports | 
 | 
 | 
 | 
 | 
 | 
  | 
Secure the configuration | 
 | 
 | 
 | 
 | 
 | 
  | 
Verify changes before you save | 
 | 
 | 
 | 
 | 
 | 
  | 
Know what you have before you start | 
 | 
 | 
 | 
 | 
 | 
19233 participants so far | 
Number answered correctly: 39 out of 56 | 
No comments:
Post a Comment