Chapter 2 and 3 : Network Concepts (Practice Questions)
Which of the following configuration register values tells the router to use configuration information from NVRAM?
0x2102
Which pins are used in a Cat 5 Ethernet (100BASE-T) UTP cable?
1, 2, 3, and 6
Which of the following is true of CSMA/CD? (Select two.)
1. A device with data to send first listens to the transmission medium to determine whether it is free. 2. If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions.
Which of the following accurately describe how switches and hubs work? (Select two.)
1. A hub repeats frames to all ports, regardless of the destination address. 2. Switches use the hardware address in the frame to send frames only to the port where the device is attached.
Which of the following are limitations of the TCP/IP model? (Select two.)
1. A particular protocol implementation may not represent every layer. 2. TCP/IP layers are theoretical and do not actually perform real functions.
Which of the following methods helps to detect lost packets? (Select two.)
1. Acknowledgements 2. Sequencing
Which of the following statements are true about bridges? (Select two.)
1. Bridges connect two network segments with the same network address. 2.Bridges convert one type of transmission medium into another.
Which two of the following statements accurately describe full-duplex Ethernet? (Select two.)
1. It uses direct point-to-point connections between the sender and receiver 2. It is collision-free.
Which of the following measures can you implement to help secure access to a router? (Select two.)
1. Keep the router in a locked room. 2. Set a password and use the login command.
Which of the following are functions of the MAC sublayer in the OSI model? (Select two.)
1. Letting devices on the network have access to the LAN. 2. Defining a unique hardware address for each device on the network.
Which of the following are limitations of the OSI model? (Select two.)
1. OSI layers are theoretical and do not actually perform real functions. 2. A particular protocol implementation may not represent every OSI layer.
You are deploying a new 10GB Ethernet network using Cat 6 cabling. Which of the following are true concerning this media? (Select two.)
1. PVC insulation surrounds each copper wire. 2. It supports 10 GB Ethernet connections.
Which of the following lists accurately describes TCP and UDP? (Select two.)
1. UDP: connectionless, unreliable, unsequenced, low overhead 2. TCP: connection-oriented, reliable, sequenced, high overhead
Which of the following are true about Gigabit Ethernet? (Select two.)
1. Uses CSMA/CD 2. Can use both copper and fiber optic
You are troubleshooting a router at the console. You issued the following command at the CLI: pdx#debug arp You see debug output, but the output scrolls past faster than you can read. What two commands allow you to view debug output one page at a time? (Select two.)
1. logging buffered 2. show log
You want to view the feature sets that have been enabled on a router and what types of licenses they use. Which commands can you use to do this? (Select two. Each option is a complete solution.)
1. show license 2. show version
What is the maximum cable length for UTP Ethernet T implementations?
100 meters
As specified in the Ethernet standards, what is the maximum number of hosts supported on a single subnet?
1024
While working at the console of a Cisco device, you need to view a list of the commands that are available in the current mode. Which command should you use?
?
Match each Ethernet frame component with its description.
A set of alternating ones and zeros terminated by two ones (11): Preamble Information that needs to be transmitted from one host to the other.: Packet Verifies that the frame contents arrived uncorrupted.: Frame Check Sequence Identifies the receiving host's MAC address.:Destination address Junk data required to make 64 bytes.: Pad Identifies the sending host's MAC address.: Source address Specifies the Network/Internet layer protocol being used.: Type
During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the MAC address of the destination IP address?
ARP
What is the purpose of a frame check sequence (FCS) footer?
Checksum error detection
Each connection in the image is labeled A-G. Drag the cable type from the left that you would use to make each connection type.
Connection A: Ethernet straight-through cable Connection B: Ethernet crossover cable Connection C: Ethernet straight-through cable Connection E: Ethernet crossover cable Connection F: Ethernet straight-through cable Connection G: Ethernet crossover cable
What is the purpose of the CRC in network communications?
Detect data errors
Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a right-to-use evaluation license.
Feature: securityk9
Which fiber optic cable requires the exposed fiber tip to be polished as part of the assembly process?
Field terminated epoxy connectors
What role does ARP play in the routing process?
If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.
Put the OSI model layers in order.
Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical
Match each characteristic on the left with the appropriate fiber optic connector on the right.
MT-RJ: Metal guide pins for alignment LC: Half the size of other connectors ST: Bayonet-type connector SC: Push-on, pull-off connector
Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right.
Network Layer: Packets Data Link Layer: Frames Physical Layer: Bits Transport Layer: Segments Application Layer: Data
You have issued the following command and received the response as shown. Router#sh start%%Non-volatile configuration memory has not been set up or has bad checksum Which of the following is a reason for this response?
No configuration file has been saved to NVRAM.
Which of the following describes the function of a dedicated wireless access point on a network?
On a network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.
An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?
Port or socket number
While working at the console of a Cisco device, you need to use the same command repeatedly. Given that the command is quite long, what can you do to avoid having to retype it over and over?
Press the Up arrow key.
You are working on a Cisco device. The prompt is showing Router#. Which mode are you in?
Privileged EXEC
Which mode is required to install the license on a Cisco device?
Privileged exec mode
You just installed a new router (RTR07) in a field office. As part of the initial setup, you want to configure a description for the eighth gigabit Ethernet interface. Which of the following would set the description to WAN to Main Office?
RTR07(config)#int gi0/8 RTR07(config)#description WAN to Main Office
What is the purpose of a network model?
Standardize processes at each layer.
Match the memory types with the information they store.
Stores the running-configuration file, routing tables, and ARP tables.: RAM Stores the Cisco IOS software.: Flash Stores the startup-configuration file.: NVRAM Stores POST and the boot loader software.: ROM
You are the senior network administrator for a large company. A junior administrator from one of your field offices sent you a router that he thinks is faulty. He says the router always uses default settings and boots to setup mode even though he has verified that startup-config contains the correct values. What is the most likely source of the problem?
The router configuration register is set to bypass startup configuration.
Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right.
Transport Layer: Segments Link Layer: Frames Application Layer: Data Internet Layer: Packets
When you start up your router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password: The sky is blue Router> For security purposes, you would like to change the message The grass grows green to read Only administrator access is allowed. Which command should you use?
banner login *Only administrator access is allowed*
You need to back up the current IOS image on your router to the TFTP server. The TFTP server's IP address is 192.56.145.23. Which of the following commands do you use?
copy flash tftp
You have made configuration changes to your Cisco device. Now you want to save the changes to use the next time the device is booted up. Which command could you use?
copy run start
You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use?
copy start tftp
Which command would you use to remove the contents of NVRAM?
erase nvram
You want to add a description to the first serial interface on the router. Which commands would you use?
int ser 0 description BOS to SFO
You need to add multiprotocol label switching (MPLS) support to a router using the Data feature set. Which feature set must be enabled before the Data feature set can be enabled?
ipbasek9
Following are three banner types that can be configured on a router: exec motd login If all three banners were configured, in which order would they display when a Telnet session is used to connect to the router?
motd, login, exec
You want to look at the size of the configuration files. Which command would you use?
show flash
What term does the OSI model use that is different from the TCP/IP model uses to refer to frame, packet, and segment?
Protocol data unit (PDU)
You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups separated with VLANs: Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the functionality requirements and provides the simplest, most economical administration?
Router
You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation?
Router
During the initial setup of a router, which of the following commands would set the host name as LAS?
Router(config)#hostname LAS
Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?
Routers use ARP to resolve known IP addresses into MAC addresses.
Match each command to its corresponding operation.
Save the current configuration to NVRAM.: copy run start Load the current configuration saved in NVRAM into memory.: copy start run Save the current configuration to a network server.: copy run tftp Copy a configuration file from a network server into NVRAM.: copy tftp start
A client computer starts to download some files from an FTP server named FTPsvr1. While the first download is in progress, the user opens a second instance of the FTP program and initiates a second download. What do the server and the client use to keep each download separate?
Session ID
The Cisco IOS image file names contain several parts. It's important to understand this naming convention when you are choosing the correct IOS software. Consider the filename c2900-universalk9-mz.SPA.157-3.M5.bin. Match the parts of the file name on the left with the description on the right.
Specifies that the file has been digitally signed by Cisco.: SPA Identifies the platform on which the image runs.: C2900 Runs in RAM as opposed to running directly from flash.: m Indicates that all of the features, turned on and off by a software license is included.: Universal Includes export controlled cryptography software.: k9 This is the 3rd maintenance release.: -3 Major Release 15, minor release 7.: 157 Is the file extension.: Bin Indicates the file as a compressed image.: z Specifies the version of the IOS: M5
You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose?
Switch
How does TCP handle data sequencing?
TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.
You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your plan? (Select two.)
1. Cat5e twisted pair cable 2. RJ-45 connectors
Which of the following mechanisms are used on Ethernet networks to control access to the transmission medium? (Select two.)
1. Collision detection 2. Backoff
Consider the output from the show license command shown in the figure below. Click on all feature sets that have been enabled using a product authorization key (PAK).
1. Feature ipbasek9 2. Feature securityk9
Which of the following are features of multimode fiber cable? (Select three.)
1. Has a core diameter around 50 to 100 microns 2. Transfers data through the core using multiple light rays 3. Supports only limited distance cable lengths
The TCP/IP protocol stack uses port numbers to determine protocol use. Port usage is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). Which of the following are characteristics of registered ports? (Select two.)
1. Is assigned by ICANN for a network service. 2. Has port numbers ranging from 1024 to 49151.
Which two of the following statements accurately describe half-duplex Ethernet? (Select two.)
1. It sends both signals along the same wire. 2. It uses collision detection and recovery.
You need to add VoIP and IP telephony support to a router. Which feature set must be enabled to do this?
Unified Communication
Match the TCP/IP protocols with their functions.
Used to send email messages between mail servers.: SMTP Used to assign IP addresses to hosts.: DHCP Used to send messages to groups of users.: IGMP Used to get the MAC address of a host from its IP address.: ARP
Match the firewall types on the left with the characteristics shown on the right. (Firewall types may be used more than once.)
Usually a software firewall: Host-based firewall Most robust and secure firewall: Network-based firewall Considered a hardware firewall: Network-based firewall Installed on a single computer: Host-based firewall Installed on the edge of a network: Network-based firewall Less robust and less customizable: Host-based firewall
You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDIX is not enabled on these devices, drag the appropriate type of cabling on the left to each connection type on the right.
Workstation to switch: Straight-through Ethernet cable Router to switch: Straight-through Ethernet cable Switch to switch: Crossover Ethernet cable Workstation to router: Crossover Ethernet cable Router to router: Crossover Ethernet cable
You use a Cisco 2900 router in your network. You are considering purchasing and implementing the Unified Communications feature set on this router. However, you would like to evaluate this feature set for a period of time prior to purchasing it. Which command activates the evaluation right-to-use license for this feature set?
license boot module c2900 technology-package uck9
You need to enable the Security feature set on a router. You visited the Cisco website to purchase the feature set and create a product authorization key (PAK). Cisco emailed you a license file (FTX1788948P_201304123432565291.lic), which you copied to a USB drive. You connected the USB drive to the device. Now you need to install the license. Which commands should you enter prior to the reload command?
license install usbflash1:FTX1788948P_201304123432565291.lic
After the completion of regularly scheduled maintenance on a router, you want to remove the message-of-the-day (MOTD) banner. Which command will accomplish that task?
no banner motd
You have a test lab that you use to test different configurations before deploying them in your live network. You have been testing several commands from configuration mode, then going back to enable mode to view the running configuration. Every time you exit configuration mode, the following output is displayed: %SYS-5-CONFIG_I: Configured from console by console What command can stop these messages from appearing on your screen?
no logging console
While working at the console of a Cisco device, you need to view a list of the commands that are currently stored in the history buffer of the system. Which command should you use?
show history
Which command would you use to show you the following information in a table? Feature name Enforcement Evaluation Subscription Enabled RightToUser
show license feature
You need to add the Security feature set to a router. Prior to accessing Cisco's website to purchase the appropriate license, you need to record the router's UDI. Which command can you use to do this?
show license udi
You would like to see logging message from IOS appear on the terminal. However, IOS does not send log messages to a terminal session over IP when using a remote SSH session. What command would send terminal output to the terminal session?
terminal monitor
Put the boot sequence process items in order.
1. Power-on self-test checks hardware. 2. Boot loader software is loaded. 3. IOS is loaded. 4. Startup-config is loaded.
You want to make a console connection to a router using the serial port on a PC. Select the necessary components to make the console connection. Select only the necessary components.
1. Rollover Cable 2. Console Port 3. Terminal Emulation Program
Which of the following are general advantages of using routers on your network? (Select three.)
1. Routers provide multiple links between devices to support load balancing. 2. Routers support multiple routing protocols for better flexibility. 3. Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges.
Which two of the following functions are performed by IP? (Select two.)
1. Routing datagrams to their destination. 2. Identifying hosts with the IP address.
You want to implement an Ethernet network using the 100Base-FX standard and the minimum hardware specifications possible. You need to support distances of up to 1,000 meters without repeaters. Which of the following should you include in your plan? (Select two.)
1. SC connectors 2. Single-mode fiber optic cable
Match the TCP/IP protocols with their functions.
Group 1 Used to get the IP address of a host from a known MAC address.: RARP BOOTP Group 2 Used to transfer files.: FTP TFTP Group 3 Used to identify routes through an internetwork.: RIP OSPF
Match the layers of the TCP/IP model to the corresponding layers of the OSI model. (Each option may be used more than once.)
Application: Application Session: Application Network: Internet Physical: Link Presentation: Application Transport: Transport Data Link: Link
How does configuring banners add to the security of your router?
Banners provide a notice of intent, informing users that access is controlled or that activity may be logged.
Match the TCP/IP layers with their function
Breaks the data into pieces.: Transport Prepares the data to be sent.: Application Adds physical addresses.: Link Adds logical addresses.: Internet
The configuration register runs during the POST. What does it control?
How the router boots up.
You have a small network with two switches, SwitchA and SwitchB. MDI-X is not enabled on either switch. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do?
Connect SwitchA and SwitchB using a crossover cable.
You are a field technician for a large company. You have been sent to a remote site to troubleshoot a downed router. When you arrive at the remote site, how will you connect your laptop to the router?
Connect the laptop's COM/USB port to the router's console port using a rollover cable.
At which layer of the OSI model do network switches operate that do not support routing?
Data Link
The following items describe the functions performed at various OSI model layers: 1. Logical topology, hardware addresses, media access, framing 2. Logical device identification, path identification, and selection 3. Flow control, reliable data transfer, windowing, segmentation, and sequencing 4. Converting data to 0s and 1s, bit signaling, and synchronization Which of the following correctly identifies, in order, the layers that perform each of the functions listed here?
Data Link, Network, Transport, Physical
Match each TCP and/or UDP ports to the service that uses it.
Dynamic Host Configuration Protocol (DHCP): UDP ports 67 and 68 Network News Transport Protocol (NNTP): TCP Port 119 Simple Network Management Protocol (SNMP): TCP ports 161 and 162 Domain Name System: TCP and UDP port 53 Telnet: TCP and UDP port 23 Trivil File Transfer Protocol (TFTP): UDP port 69
The process of breaking a message into packets, adding control information and other information, and then transmitting the message through the transmission medium is known as __________?
Encapsulation
Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.)
Is responsible for how messages are electrically transmitted.: Link Is responsible for forwarding packets through multiple networks.: Internet Is responsible for describing the physical layout of the network.: Link Is responsible for error checking and reliable delivery.: Transport Integrates network functionality into the host operating system.: Application Provides the capability for services to operate on the network: Application Uses ports to enable application-to-application communications between hosts.: Transport Is not concerned with reliable delivery of information.: Internet
Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.
Layer 2 source address: 000b5f2a2222 Layer 3 source address: 192.168.11.11 Layer 2 destination address: 080046987654 Layer 3 destination address: 192.168.10.12
Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right.
Layer 2 source address: 080046987654 Layer 3 source address: 192.168.10.12 Layer 2 destination address: 000b5f2a2222 Layer 3 destination address: 192.168.11.11
What is the first thing that happens when a collision occurs on an Ethernet network?
The device that detected the collision transmits a jam signal.
What is the backoff on an Ethernet network?
The random amount of time a device waits before retransmitting after a collision.
Which is the primary role of a firewall?
To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.