Which layer of the OSI model deals with the logical addressing of a packet?
Select Answer
Network Layer.
Data Link Layer.
Transport Layer.
Physical Layer.
In the TCP/IP networking model, which layer is responsible for providing error recovery services?
Select Answer
Application Layer
Transport Layer
Physical Layer
Network Layer
What protocols get used in layers five through seven of the OSI model?
Select Answer
SNMP, VoIP, SMTP, POP3
HDLC, IEEE 802.3
TCP, UDP
IP
A and D only.
The TCP/IP model's "Segment" falls under what OSI layer?
Select Answer
L5PDU
L3PDU
L4PDU
None of the above.
This OSI layer utilizes the Telnet and VoIP protocols and deals with how to start, control, and end conversations.
Select Answer
Physical Layer.
Application Layer
Presentation Layer.
Data Link Layer.
None of the above.
Which of the following OSI layers typically does not need to add an encapsulation header?
Select Answer
Application
Transport
Network
DataLink
Which of the following protocols is not considered a protocol at the application layer?
Select Answer
HTTP
SMTP
Telnet
UDP
Which OSI layer defines the standards for cabling and connectors?
Select Answer
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5, 6, or 7
SNMP, resides on what layer of the most current TCP/IP model?
Select Answer
The Data Link Layer
The Internet/Network Layer
The Transport Layer
The Application Layer
DHCP, resides on what layer of the most current TCP/IP model?
Select Answer
Layer 3
Layer 2
Layer 4
Layer 5
This output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line listing details about the fields inside the respective header. You will need to remember some parts of the various headers, and compare those concepts to this output, to answer this question.
Based on the packet capture shown, which of the following is true?
Select Answer
Line A is used for logical addressing, routing, and path determination.
Line B is related to formatting data into frames appropriate for transmission onto some physical medium.
Line C information is used to route packets through the internetwork.
Line C corresponds to the Transport layer of the TCP/IP model.
Line D is used for connection establishment and termination, flow control, and segmentation of large data blocks into smaller parts for transmission.
Which of the following is a correctly displayed MAC address?
Select Answer
02ff.58c9.f588
192.168.0.1
2001:cdba::3257:9652
2001:cdba:0:0:0:0:3257:9652
A _________ address is an address a single host listens to on a network.
Select Answer
Broadcast
Multicast
Unicast
Singlecast
What answer best describes Twisted Pair?
Select Answer
Twisting the cables together helps cancel out most of the EMI.
Not twisting the wire pairs together helps cancel out most of the EMI.
Twisting the wire pairs together helps cancel out most of the EMI.
Not twisting the cables together helps cancel out most of the EMI.
When using 10BASE-T and 100BASE-T, devices transmit on Pin Positions 3,6?
Select Answer
Hubs & Network Printers.
Routers & PC NICs
Wireless Access Points & Switches
Switches & Hubs
Switches & Routers
A commonly used header format for an Ethernet Frame consists of
Select Answer
Preamble FCS, Pad, SFD, Destination, Source, Type
FSP, Preamble, SFD, Destination, Source, Type
Preamble, SFD, Destination, Source, Type
Preamble, Destination, Source, Type
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?
Select Answer
Only the devices that use cables are using Ethernet.
Only the devices that use wireless are using Ethernet.
Both the devices using cables and those using wireless are using Ethernet.
None of the devices are using Ethernet.
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Select Answer
RAM
ROM
Flash
NVRAM
Bubble
What type of cable is needed when connecting a Switch to a PC NIC?
Select Answer
a straight-through cable
a crossover cable
a UTP cable
a fiber cable
How many bytes are in the SFD field of an Ethernet frame?
Select Answer
7
1
6
2
How many bytes are in the FCS field of an Ethernet frame?
Select Answer
7
4
6
2
The following table represents an Ethernet frame. The numbers in the table represent bytes. What is the name of the field denoted with an asterisk?
7 |
1 |
* 6 |
6 |
2 |
Data |
4 |
Select Answer
SFD
Destination
Source
Type
Why would a computer need to request information from a DNS server?
Select Answer
The computer requires an IP address to retrieve the information from the DNS.
It requires a name, to retrieve the information requested.
The computer needs to convert a name to an IP address.
The DNS acts as the middle man and converts the IP address to a name so a direct connection can occur.
Which of the following is NOT a goal of routing protocol:
Select Answer
To dynamically learn routes and populate any given routers routing table with those routes.
Prevent a looping route.
Add the last acquired route to the routing table when there is more than one route to a subnet.
Replace lost routes.
How does the receiver of an HDLC frame know what has been encapsulated within that frame?
Select Answer
HDLC only encapsulates IPv4
Based on the FCS field
From the IP address (IPv4, IPv6, and so on)
The Type field in the header
Based on the Flag field
Refer to the diagram and exhibit. Where will traffic destined for the 5.0.0.0 network be sent by R1?
R1's Routing Table: 2.0.0.0 -> R3 3.0.0.0 -> R4 4.0.0.0 -> 4 5.0.0.0 -> 4 default -> R2 |
Select Answer
R4
R3
It will be locally delivered via R1's interface 4.
R2
A leased line provides a _________ service.
Select Answer
Layer 2
Layer 5
Layer 3
Layer 1
Which of the following set of commands requires a user to enter a password of "cisco" when consoling into a switch or router?
Select Answer
enable
configure terminal
line console 0
login
password cisco
enable
configure memory
console line 0
login
password cisco
enable
line console 0
password cisco
enable
configure terminal
password cisco
None of the answers is correct. The password must be set before the login command.
The CLI does this, when you enter Ctrl-P?
Select Answer
It display the most recently used command.
It takes you forward to your most recent command.
It moves the cursor backwards, deleting a single character.
It moves the cursor backwards without deleting characters.
Which command sets and automatically encrypts the privileged enable mode password?
Select Answer
enable password [password].
enable secret [password].
password enable [password].
secret enable [password].
All of the following commands will erase the contents of NVRAM, except?
Select Answer
write erase
erase startup-config
erase nvram
erase flash
Which command is used to access context sensitive help in a Cisco switch or router?
Select Answer
help
/help
?
/?
Which of the following is a reason a switch would flood a frame?
Select Answer
The switch could not locate a match for the destination address.
A malicious user is attempting to sabotage the LAN network.
The switch got stuck in an infinite loop.
B or C only.
You are given the following output:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following is true about this interface output?
Select Answer
The duplex was definitely configured with the duplex full interface subcommand.
speed 100 interface subcommand was definitely used.
Full duplex was automatically set from factory.
duplex full subcommand may have been used.
Which of the following is NOT a purpose of the Media Access Control Address (MAC) in the Ethernet protocol?
Select Answer
To uniquely identify devices at Layer 2
To allow communication between different devices on the same network
To provide frames source and destination address in a LAN
Allow communication with devices on a different network
Currently, besides the ports assigned to VLAN 2 and VLAN 3, the rest of the switch is in its default configuration. What would be the result of assigning ports Fa0/13 through Fa0/24 on this switch to a new VLAN 4?
Select Answer
12 new broadcast domains
1 new broadcast domain
12 new collision domains
1 new collision domain
Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface?
Switch# show interfaces status Port Name Status Vlan Duplex Speed Type Gi0/1 notconnect 1 auto auto 10/100/1000BaseTX Gi0/2 connect 1 a-half a-100 10/100/1000BaseTX Gi0/3 notconnect 1 auto auto 10/100/1000BaseTX Gi0/4 connect 1 half 100 10/100/1000BaseTX Gi0/5 notconnect 1 auto auto 10/100/1000BaseTX Gi0/6 connect 1 a-full 1000 10/100/1000BaseTX |
Select Answer
The interface speed has been autonegotiated.
The duplex full command has been configured.
The speed 100 command has been configured.
The interface duplex has been autonegotiated.
Consider the following output from a Cisco Catalyst switch:
Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3
Which of the following answers are true about this switch?
Select Answer
The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB.
The switch has learned three MAC addresses since the switch powered on.
The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch
02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
The password required to log into user mode through a Telnet connection is called what?
Select Answer
admin password.
enable password.
remote password.
vty password
None of the above.
When configuring SSH for the first time on a switch, which of the following commands will need to run before the "crypto key generate RSA" command will work?
Select Answer
"ip ssh version {version}"
"ip domain-name {name}"
"the command is missing the key size parameter (crypto key generate rsa 512)"
"banner"
Which command would you type to view the last 10 commands you entered in the console?
Select Answer
display history
show commands
call commands
show history
What password does the router use for privileged mode when both enable password blue and enable secret red are configured?
Select Answer
None; the service password-encryption command needs to be issued
The password red
The password blue
The password configured last
The password configured first
Which answers encrypt the password that will be required of a user after they type the enable EXEC command?
Select Answer
enable password-value
enable password password-value
enable secret password-value
password password-value
Which answer is true about the term "line status"?
Select Answer
It is a layer 1 status.
It is a layer 2 status.
Line status is always down if the protocol status is down.
Line status deals with data link layer problems.
Consider the network of an enterprise department is down after renovation. After a quick show interfaces command on one of the switches, you evaluated the protocol status is down due to the line status being down. Upon further inspection of the physical network Tech A and Tech B come up with the following diagnoses:
Tech A says that the cause could be that the switch is connected to the core router with a straight-through cable.
Tech B says that the core routers power switch is in the off state.
Who is correct?
Select Answer
Tech A only.
Tech B only.
Both Tech A and Tech B.
Neither Tech A or Tech B.
Which of the following is a result of using VLAN trunking?
Select Answer
VLAN tagging
Additional Ethernet frame headdings
Allows multiswitch VLANs
All of the above.
None of the above.
Which of the following commands will enable a disabled VLAN?
Select Answer
enable vlan [number]
no shutdown vlan [number]
vlan enable [number]
None of the above.
What command will list both access and trunk ports in a VLAN?
Select Answer
show vlan brief, show vlan num
show vlan id num
show access and trunk num
There is no command that lets you see trunk ports and acces in the VLAN
Which of the following is true about VLANs?
Select Answer
All switches must come from the same manufacturer for VLANs to work properly.
The default VLAN is 0.
VLAN trunking must be enabled to send information about multiple VLANs over a single link.
VLANs break up collision domains by default.
Cisco switches do not have a default VLAN unless configured first.
Refer to the exhibit. The device that is located off SW1's G0/1 interface is complaining that it is unable to send any traffic. Which command would be used to fix this problem?
SW1#show vlan brief SW1# |
Select Answer
SW1(config-vlan)#no shutdown
SW1(config-if)#no shutdown
SW1(config)#vlan 400 enable
SW1(config)#vlan 400 status enable
QUESTION 1 of 50
Introduction to TCP/IP Networking
Which layer of the OSI model deals with the logical addressing of a packet?
Select Answer
Network Layer.
Data Link Layer.
Transport Layer.
Physical Layer.
In the TCP/IP networking model, which layer is responsible for providing error recovery services?
Select Answer
Application Layer
Transport Layer
Physical Layer
Network Layer
What protocols get used in layers five through seven of the OSI model?
Select Answer
SNMP, VoIP, SMTP, POP3
HDLC, IEEE 802.3
TCP, UDP
IP
A and D only.
The TCP/IP model's "Segment" falls under what OSI layer?
Select Answer
L5PDU
L3PDU
L4PDU
None of the above.
This OSI layer utilizes the Telnet and VoIP protocols and deals with how to start, control, and end conversations.
Select Answer
Physical Layer.
Application Layer
Presentation Layer.
Data Link Layer.
None of the above.
Which of the following OSI layers typically does not need to add an encapsulation header?
Select Answer
Application
Transport
Network
DataLink
Which of the following protocols is not considered a protocol at the application layer?
Select Answer
HTTP
SMTP
Telnet
UDP
Which OSI layer defines the standards for cabling and connectors?
Select Answer
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5, 6, or 7
SNMP, resides on what layer of the most current TCP/IP model?
Select Answer
The Data Link Layer
The Internet/Network Layer
The Transport Layer
The Application Layer
DHCP, resides on what layer of the most current TCP/IP model?
Select Answer
Layer 3
Layer 2
Layer 4
Layer 5
This output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line listing details about the fields inside the respective header. You will need to remember some parts of the various headers, and compare those concepts to this output, to answer this question.
Based on the packet capture shown, which of the following is true?
Select Answer
Line A is used for logical addressing, routing, and path determination.
Line B is related to formatting data into frames appropriate for transmission onto some physical medium.
Line C information is used to route packets through the internetwork.
Line C corresponds to the Transport layer of the TCP/IP model.
Line D is used for connection establishment and termination, flow control, and segmentation of large data blocks into smaller parts for transmission.
Which of the following is a correctly displayed MAC address?
Select Answer
02ff.58c9.f588
192.168.0.1
2001:cdba::3257:9652
2001:cdba:0:0:0:0:3257:9652
A _________ address is an address a single host listens to on a network.
Select Answer
Broadcast
Multicast
Unicast
Singlecast
What answer best describes Twisted Pair?
Select Answer
Twisting the cables together helps cancel out most of the EMI.
Not twisting the wire pairs together helps cancel out most of the EMI.
Twisting the wire pairs together helps cancel out most of the EMI.
Not twisting the cables together helps cancel out most of the EMI.
When using 10BASE-T and 100BASE-T, devices transmit on Pin Positions 3,6?
Select Answer
Hubs & Network Printers.
Routers & PC NICs
Wireless Access Points & Switches
Switches & Hubs
Switches & Routers
A commonly used header format for an Ethernet Frame consists of
Select Answer
Preamble FCS, Pad, SFD, Destination, Source, Type
FSP, Preamble, SFD, Destination, Source, Type
Preamble, SFD, Destination, Source, Type
Preamble, Destination, Source, Type
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?
Select Answer
Only the devices that use cables are using Ethernet.
Only the devices that use wireless are using Ethernet.
Both the devices using cables and those using wireless are using Ethernet.
None of the devices are using Ethernet.
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Select Answer
RAM
ROM
Flash
NVRAM
Bubble
What type of cable is needed when connecting a Switch to a PC NIC?
Select Answer
a straight-through cable
a crossover cable
a UTP cable
a fiber cable
How many bytes are in the SFD field of an Ethernet frame?
Select Answer
7
1
6
2
How many bytes are in the FCS field of an Ethernet frame?
Select Answer
7
4
6
2
The following table represents an Ethernet frame. The numbers in the table represent bytes. What is the name of the field denoted with an asterisk?
7 |
1 |
* 6 |
6 |
2 |
Data |
4 |
Select Answer
SFD
Destination
Source
Type
Why would a computer need to request information from a DNS server?
Select Answer
The computer requires an IP address to retrieve the information from the DNS.
It requires a name, to retrieve the information requested.
The computer needs to convert a name to an IP address.
The DNS acts as the middle man and converts the IP address to a name so a direct connection can occur.
Which of the following is NOT a goal of routing protocol:
Select Answer
To dynamically learn routes and populate any given routers routing table with those routes.
Prevent a looping route.
Add the last acquired route to the routing table when there is more than one route to a subnet.
Replace lost routes.
How does the receiver of an HDLC frame know what has been encapsulated within that frame?
Select Answer
HDLC only encapsulates IPv4
Based on the FCS field
From the IP address (IPv4, IPv6, and so on)
The Type field in the header
Based on the Flag field
Refer to the diagram and exhibit. Where will traffic destined for the 5.0.0.0 network be sent by R1?
R1's Routing Table: 2.0.0.0 -> R3 3.0.0.0 -> R4 4.0.0.0 -> 4 5.0.0.0 -> 4 default -> R2 |
Select Answer
R4
R3
It will be locally delivered via R1's interface 4.
R2
A leased line provides a _________ service.
Select Answer
Layer 2
Layer 5
Layer 3
Layer 1
Which of the following set of commands requires a user to enter a password of "cisco" when consoling into a switch or router?
Select Answer
enable
configure terminal
line console 0
login
password cisco
enable
configure memory
console line 0
login
password cisco
enable
line console 0
password cisco
enable
configure terminal
password cisco
None of the answers is correct. The password must be set before the login command.
The CLI does this, when you enter Ctrl-P?
Select Answer
It display the most recently used command.
It takes you forward to your most recent command.
It moves the cursor backwards, deleting a single character.
It moves the cursor backwards without deleting characters.
Which command sets and automatically encrypts the privileged enable mode password?
Select Answer
enable password [password].
enable secret [password].
password enable [password].
secret enable [password].
All of the following commands will erase the contents of NVRAM, except?
Select Answer
write erase
erase startup-config
erase nvram
erase flash
Which command is used to access context sensitive help in a Cisco switch or router?
Select Answer
help
/help
?
/?
Which of the following is a reason a switch would flood a frame?
Select Answer
The switch could not locate a match for the destination address.
A malicious user is attempting to sabotage the LAN network.
The switch got stuck in an infinite loop.
B or C only.
You are given the following output:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following is true about this interface output?
Select Answer
The duplex was definitely configured with the duplex full interface subcommand.
speed 100 interface subcommand was definitely used.
Full duplex was automatically set from factory.
duplex full subcommand may have been used.
Which of the following is NOT a purpose of the Media Access Control Address (MAC) in the Ethernet protocol?
Select Answer
To uniquely identify devices at Layer 2
To allow communication between different devices on the same network
To provide frames source and destination address in a LAN
Allow communication with devices on a different network
Currently, besides the ports assigned to VLAN 2 and VLAN 3, the rest of the switch is in its default configuration. What would be the result of assigning ports Fa0/13 through Fa0/24 on this switch to a new VLAN 4?
Select Answer
12 new broadcast domains
1 new broadcast domain
12 new collision domains
1 new collision domain
Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface?
Switch# show interfaces status Port Name Status Vlan Duplex Speed Type Gi0/1 notconnect 1 auto auto 10/100/1000BaseTX Gi0/2 connect 1 a-half a-100 10/100/1000BaseTX Gi0/3 notconnect 1 auto auto 10/100/1000BaseTX Gi0/4 connect 1 half 100 10/100/1000BaseTX Gi0/5 notconnect 1 auto auto 10/100/1000BaseTX Gi0/6 connect 1 a-full 1000 10/100/1000BaseTX |
Select Answer
The interface speed has been autonegotiated.
The duplex full command has been configured.
The speed 100 command has been configured.
The interface duplex has been autonegotiated.
Consider the following output from a Cisco Catalyst switch:
Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3
Which of the following answers are true about this switch?
Select Answer
The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB.
The switch has learned three MAC addresses since the switch powered on.
The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch
02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
The password required to log into user mode through a Telnet connection is called what?
Select Answer
admin password.
enable password.
remote password.
vty password
None of the above.
When configuring SSH for the first time on a switch, which of the following commands will need to run before the "crypto key generate RSA" command will work?
Select Answer
"ip ssh version {version}"
"ip domain-name {name}"
"the command is missing the key size parameter (crypto key generate rsa 512)"
"banner"
Which command would you type to view the last 10 commands you entered in the console?
Select Answer
display history
show commands
call commands
show history
What password does the router use for privileged mode when both enable password blue and enable secret red are configured?
Select Answer
None; the service password-encryption command needs to be issued
The password red
The password blue
The password configured last
The password configured first
Which answers encrypt the password that will be required of a user after they type the enable EXEC command?
Select Answer
enable password-value
enable password password-value
enable secret password-value
password password-value
Which answer is true about the term "line status"?
Select Answer
It is a layer 1 status.
It is a layer 2 status.
Line status is always down if the protocol status is down.
Line status deals with data link layer problems.
Consider the network of an enterprise department is down after renovation. After a quick show interfaces command on one of the switches, you evaluated the protocol status is down due to the line status being down. Upon further inspection of the physical network Tech A and Tech B come up with the following diagnoses:
Tech A says that the cause could be that the switch is connected to the core router with a straight-through cable.
Tech B says that the core routers power switch is in the off state.
Who is correct?
Select Answer
Tech A only.
Tech B only.
Both Tech A and Tech B.
Neither Tech A or Tech B.
Which of the following is a result of using VLAN trunking?
Select Answer
VLAN tagging
Additional Ethernet frame headdings
Allows multiswitch VLANs
All of the above.
None of the above.
Which of the following commands will enable a disabled VLAN?
Select Answer
enable vlan [number]
no shutdown vlan [number]
vlan enable [number]
None of the above.
What command will list both access and trunk ports in a VLAN?
Select Answer
show vlan brief, show vlan num
show vlan id num
show access and trunk num
There is no command that lets you see trunk ports and acces in the VLAN
Which of the following is true about VLANs?
Select Answer
All switches must come from the same manufacturer for VLANs to work properly.
The default VLAN is 0.
VLAN trunking must be enabled to send information about multiple VLANs over a single link.
VLANs break up collision domains by default.
Cisco switches do not have a default VLAN unless configured first.
Refer to the exhibit. The device that is located off SW1's G0/1 interface is complaining that it is unable to send any traffic. Which command would be used to fix this problem?
SW1#show vlan brief SW1# |
Select Answer
SW1(config-vlan)#no shutdown
SW1(config-if)#no shutdown
SW1(config)#vlan 400 enable
SW1(config)#vlan 400 status enable
1:00:00
Your Exam is paused.
Please wait...
Since this is a preview of our actual test taking interface your progress cannot not be saved.