CCNA Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How many octets does a Class A network have in the host field? a. 3 b. 2 c. 1 d. 4

a

IP addresses are represented using _____. a. 32-bit binary numbers b. 16-bit decimal numbers c. 8-bit binary numbers d. 8 sets of 4-bit decimal numbers

a

If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt? a. Enter the enable secret command. b. Enter the enable password command. c. Enter either the enable secret or the enable password command. d. Enter both the enable secret and the enable password commands

a

The decimal number 452 converted into a binary number, using successive division by 2, is _____. a. 111000100 b. 110000100 c. 111001100 d. 101000100

a

What information does the show running-config command provide on a Cisco router? a. Current (running) configuration in RAM b. System hardware and names of configuration files c. Amount of NVRAM used to store the configuration d. Version of Cisco IOS Software running on the router

a

What is the practical minimum number of bits that can be borrowed to form a subnet? a. 1 b. 2 c. 3 d. 4

a

Which Cisco IOS command displays the configuration of the system hardware and the software version information? a. show version b. show interfaces c. show startup-config d. show running-config

a

Which command would you use to see who has Telnet sessions to your router? a. show user b. show telnet c. show sessions d. show connections

a

Which of the following describes the DHCP server provided by the Cisco IOS? a. It is a full DHCP server. b. Its support is limited to assigning IP addresses to clients. c. It must obtain its DHCP information from a master DHCP server. d. It has limited DHCP support and can only assign IP addresses and default gateways to clients.

a

Which of the following is a Cisco IOS tool that can be used for secure remote access to another device? a. SSH b. SDM c. ping d. Telnet e. traceroute

a

Which statement best describes what the user EXEC mode commands allow you to configure on a Cisco router? a. You cannot configure anything; the user mode commands are used to display information. b. The user EXEC mode allows you to perform global configuration tasks that affect the entire router. c. The user EXEC mode commands allow you to enter a secret password so that you can configure the router. d. The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers.

a

Which of the following statements best describe the functions of a router in a network? (Choose two.) a. Routers maintain their routing tables and ensure that other routers know of changes in the network. b. Routers use the routing table to determine where to forward packets. c. Routers strengthen the signal over large distances in a network. d. Routers create larger collision domains. e. Routers use ICMP to communicate network information from their own routing table with other routers.

a,b

Which of the following components are common to routers, switches, and computers? (Choose three.) a. RAM b. CPU c. Motherboard d. Keyboard

a,b,c

Which of the following contains routing information that helps a router in determining the routing path? (Choose three.) a. IP address b. MAC address c. Routing table d. Routing protocol

a,b,c

Which of the following metrics are most commonly used by routing protocols to determine a network path? (Choose three.) a. Hop count b. Bandwidth c. Delay d. Packet length e. Distance f. Quantity

a,b,c

Which of the following can be protected with a password? (Choose four.) a. Console access b. vty access c. tty access d. User-level access e. EXEC-level access

a,b,c,e

Which of the following statements best describe the functions of a router in a network? (Choose two.) a. Routers maintain their routing tables and ensure that other routers know of changes in the network. b. Routers use the routing table to determine where to forward packets. c. Routers strengthen the signal over large distances in a network. d. Routers create larger collision domains. e. Routers use ICMP to communicate network information from their own routing table with other routers.

a,b,d

Which of the following are required DHCP parameters when configuring a DHCP server on a Cisco router? (Choose four.) a. Pool name b. Lease time c. Domain name d. Default router e. DNS server addresses f. WINS server addresses g. DHCP network and subnet h. Starting and ending addresses

a,b,g,h

Which of the following are binary default subnet masks? (Choose two.) a. 11111111.00000000.00000000.00000000 b. 11111111.11111111.01000000.00000000 c. 11111111.11111111.11111111.00000000 d. 255.255.224.0

a,c

How many host addresses can be used in a Class C network? a. 253 b. 254 c. 255 d. 256

b

How should you power up a Cisco router? a. Press the Reset button. b. Turn the power switch to "On." c. Connect the fiber cable to another router. d. Attach the power cable plug to the router power supply socket.

b

The decimal number 10 converts to the binary number _____. a. 10 b. 1010 c. 110 d. 1000

b

What is the decimal equivalent of the binary number 11000111? a. 218 b. 199 c. 179 d. 208

b

Where do the Cisco Router and Security Device Manager files reside? a. The PC b. The router c. The local client d. A network server

b

Which Cisco IOS command creates a message to be displayed upon router login? a. hostname hostname b. banner motd message c. hostname interface description d. description interface description

b

Which of the following describes the Cisco Router and Security Device Manager? a. It is a PC-based management system that can be used to configure features such as a DHCP server. b. It is a web-based management system that can be used to configure features such as a DHCP server. c. It is a server-based management system that can be used to configure features such as a DHCP server. d. It is a client-based management system that can be used to configure features such as a DHCP server.

b

Which of the following is a customized text that is displayed before the username and password login prompts? a. Message-of-the-day banner b. Login banner c. Access warning d. User banner e. Warning message

b

Which of the following are functions of DHCP? (Choose two.) a. DHCP dynamically assigns host names to client devices. b. DHCP dynamically assigns IP addresses to client devices. c. DHCP dynamically assigns a default gateway to client devices. d. DHCP dynamically assigns security access levels to client devices.

b,c

Which of the following types of ports do routers have? (Choose two.) a. Printer b. Console c. Network d. CD-ROM e. USB

b,c

Which of the following would be considered a physical threat? (Choose two.) a. A user leaving his password in his desk b. Someone turning off the power to the switch to block network access c. Someone turning off the air conditioning system in the network closet d. Someone breaking into the cabinet that contains the network documentation

b,c

Which of the following statements accurately describe a distance vector protocol? (Choose three.) a. IGRP was developed by Cisco to address the issues associated with routing in medium-size LANs. b. Examples of this protocol include RIP and IGRP. c. This protocol determines the direction (vector) and distance (hop count) to any network in the internetwork. d. Using this protocol, a router needs to know the entire path to every network segment. e. This process is also known as "routing by rumor." f. Routers running the distance vector routing protocol send periodic updates only when there are changes in the network.

b,c,e

Which of the following statements describe the function of routing tables? (Choose three.) a. Routing tables provide an ordered list of known network addresses. b. Routing tables are maintained through the transmission of MAC addresses. c. Routing tables contain metrics that are used to determine the desirability of the route. d. Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached through another router (the next-hop router) on the way to the final destination. e. When a router receives an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source. f. Although routing protocols vary, routing metrics do not.

b,c,e

Which of the following statements accurately describe a link-state routing protocol? (Choose three.) a. The link-state database is used to calculate the paths with the highest bandwidths on the network. b. Link-state routing protocols respond quickly to network changes. c. In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active. d. Link-state routing protocols send periodic updates (link-state refreshes) at long time intervals, approximately once every 30 minutes. e. In link-state routing protocols, every router tries to build its own internal map of the network topology. f. Link-state routing protocols send periodic updates even if no network changes have occurred.

b,d,e

2 to the fifth power is _____. a. 2 * 5 b. 128 c. 2 multiplied by itself 5 times d. None of the above

c

255.255.224.0 translates into the binary number _____. a. 11111111.00000000.11100000.00000000 b. 11111111.11100000.00000000.00000000 c. 11111111.11111111.11100000.00000000 d. 11111111.11111111.11110000.00000000

c

Using six subnet bits, how many usable subnets are created? a. 58 b. 60 c. 64

c

What is the maximum number of bits that can be borrowed to create a subnet for a Class C network? a. 2 b. 4 c. 6 d. 8

c

What is the primary purpose of setup mode on a Cisco router? a. To display the current router configuration b. To complete hardware and interface testing c. To bring up a minimal feature configuration d. To fully configure a Cisco router for IP routing

c

When you start a Cisco router, what should you see on the console? a. Cisco IOS debug messages b. The Diagnostic Console menu c. Cisco IOS Software output text d. A graphical picture showing the real-time status of the LED

c

Which Cisco IOS command configures a serial port in slot 0, port 1 on a modular router? a. interface serial 0-1 b. interface serial 0 1 c. interface serial 0/1 d. interface serial 0.1

c

Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode? a. exit b. quit c. disable d. userexec

c

Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router? a. clock rate 64 b. clock speed 64 c. clock rate 64000 d. clock speed 64000

c

Which of the following binary octets has an LSB of 0? a. 01100011 b. 10100101 c. 10011010 d. 10011001

c

Which of the following is the most secure method of remotely accessing a network device? a. HTTP b. Telnet c. SSH d. RMON e. SNMP

c

Which of the following would you use to suspend a Telnet session? a. end keyword b. suspend keyword c. Ctrl-Shift-6, x key sequence d. Ctrl-Shift-Del key sequence

c

Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for? a. 172.17.128.47 b. 172.17.128 c. 172.17 d. 10.172.47

c

A subnet mask tells the router to look at which portions of an IP address? a. Mask and host bits b. Host and network bits c. Host and subnet bits d. Network and subnet bits

d

All computers function using the _____. a. base 10 system b. decimal system c. numeric system d. binary system

d

If a router does not match the appropriate address portions to a number in its routing table, it _____. a. sends the packet back to the sender b. passes the packet to the next router in the hierarchy c. adds that number to its table d. discards the packet

d

If you enter a major command on a Cisco router, what happens? a. The router returns you to user EXEC mode. b. The router returns a list of possible commands. c. The router invokes a global configuration command. d. The router switches you from one configuration mode to another.

d

The binary number 11101000111 converted into a decimal number, using powers of 2, is _____. a. 1183 b. 1873 c. 1638 d. 1863

d

The decimal number 205 converted into a binary number is _____. a. 11011101 b. 11001001 c. 110001019 d. 11001101

d

To see how many bits you should borrow from the host portion of the network address to give you the number of subnets you need, you should _____. a. subtract the number of subnets you need from the host portion b. add the bit values from right to left until the total (decimal value) is just greater than the number of subnets you need c. add the bit values from left to right until the total (decimal value) is just greater than the number of subnets you need d. None of the above

d

Which Cisco IOS command do you use to set the console session timeout to 15 minutes and 30 seconds? a. set exec timeout 15 30 b. console timeout 15 30 c. timeout 15 30 d. exec-timeout 15 30

d

Which command can be used to see whether an address in the DHCP pool is already in use by another device? a. sh ip dhcp bindings b. sh ip dhcp database c. sh ip dhcp mapping d. sh ip dhcp conflicts

d

Which of the following subnet masks falls on octet boundaries? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. All of the above

d

A serial interface displays "Serial1 is up, line protocol is down." Which of the following situations can cause this error? (Choose two.) a. The clock rate has not been set. b. The interface has been manually disabled. c. No cable is attached to the serial interface. d. There are no keepalives. e. There is a mismatch in the encapsulation type.

d,e


Ensembles d'études connexes

Chapter 10 Interest Groups notes

View Set

Old Testament The History of Israel

View Set

Free Body Diagrams and Net forces

View Set

MicroEconomics Chapter 5-10 Exam Study Guide

View Set

econ test 2 chapter 12 extra questions

View Set

Exam #2 Pharm (9,10,11,8, 108, 67,68)

View Set

50 questions Comprehensive review

View Set