640-801 ccna voucher exam 2

26
Contents 1 How is the number 225 represented in binary?.......................2 2 A company with five locations, each requiring a single subnet with 55 IP addresses, was assigned two consecutive Class C addresses. Which routing protocols will support this addressing scheme? (Choose three.) ..................................................................... 2 3 Which statement is correct concerning routing and routed protocols? 2 4 An ISDN BRI line can be described as which of the following?.......2 5 Which address does a bridge use to build its bridging table?.......3 6 For the purpose of forwarding packets, which protocol manages communication between routers regarding available routes ?...........3 7 What is used to resolve known IP addresses to unknown MAC addresses? ..................................................................... 3 8 Which LMI types are available with Cisco routers?..................3 9 Which type of protocol is used between routers to communicate and maintain tables?..................................................... 4 10 How is spanning-tree path cost determined by default?.............4 11 Which of the following are commonly used routing metrics? (Choose three.).............................................................. 4 12 What can be created by borrowing bits From the host portion of an IP address?.......................................................... 4 13 Which automatic process is started first whenever power is applied to a Cisco router?................................................... 5 14 Which device uses logical addresses to interconnect networks or subnetworks?......................................................... 5 15 Which OSI model layer is responsible for regulating the flow of information From source to destination, reliably and accurately?.....5 16 Which mode will a router enter if it is unable to locate a valid startup configuration file during the boot process?..................5

Upload: kimheang

Post on 12-Nov-2014

2.823 views

Category:

Documents


0 download

DESCRIPTION

Voucher exam for ccna4 3.1

TRANSCRIPT

Page 1: 640-801 CCNA Voucher Exam 2

Contents1 How is the number 225 represented in binary?.........................................................................................2

2 A company with five locations, each requiring a single subnet with 55 IP addresses, was assigned two consecutive Class C addresses. Which routing protocols will support this addressing scheme? (Choose three.)..........................................................................................................................................................2

3 Which statement is correct concerning routing and routed protocols?......................................................2

4 An ISDN BRI line can be described as which of the following?..............................................................2

5 Which address does a bridge use to build its bridging table?....................................................................3

6 For the purpose of forwarding packets, which protocol manages communication between routers regarding available routes ?.........................................................................................................................3

7 What is used to resolve known IP addresses to unknown MAC addresses?.............................................3

8 Which LMI types are available with Cisco routers?.................................................................................3

9 Which type of protocol is used between routers to communicate and maintain tables?............................4

10 How is spanning-tree path cost determined by default?..........................................................................4

11 Which of the following are commonly used routing metrics? (Choose three.).......................................4

12 What can be created by borrowing bits From the host portion of an IP address?....................................4

13 Which automatic process is started first whenever power is applied to a Cisco router?.........................5

14 Which device uses logical addresses to interconnect networks or subnetworks?....................................5

15 Which OSI model layer is responsible for regulating the flow of information From source to destination, reliably and accurately?............................................................................................................5

16 Which mode will a router enter if it is unable to locate a valid startup configuration file during the boot process?.......................................................................................................................................................5

17 In reference to the TCP/IP model, which protocol is used to determine the network access layer address associated with a known Internet layer address?.............................................................................6

18 Given a router that has already been configured, what is the correct loading sequence when powering on?...............................................................................................................................................................6

19 Which utility shows the route a packet takes to reach its destination?....................................................6

20 What is the default ISDN encapsulation used on Cisco ISDN routers?..................................................6

21 Which command displays the active configuration of a router?.............................................................7

22 What is the purpose of the show cdp neighbors command?....................................................................7

23 What enables routers to learn of destination networks?..........................................................................7

24 Which device connects four-wire ISDN subscriber wiring to the conventional two-wire local loop?....7

Page 2: 640-801 CCNA Voucher Exam 2

25 Which Layer 4 protocol is connection-oriented and reliable?.................................................................8

26 Which statement describes dynamic routing correctly?..........................................................................8

27 Which item best describes the ping command?......................................................................................8

28 Which of the following authentication processes provides protection against playback attacks?...........8

29 All routers shown in the graphic are part of the same OSPF area. Which routers will PERTH engage in DR and BDR elections? (Choose three.).....................................................................................................9

30 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?............................................................................................9

31 What is the length of a MAC address?...................................................................................................9

32 Refer to the graphic. This company was assigned a Class C network address for its two sites. The network administrator subnetted accordingly and configured each router with RIP. However, these routers are unable to connect to each other. What could be the problem?...............................................................9

33 Network broacast traffic From the Business Department is needlessly reaching the Engineering Department LAN. What can be done to contain this traffic within the Business Department network while maintaining connectivity with enterprise servers and the Internet? (Choose two.)....................................10

34 Which of the following is the reference point between the NT1 and the phone company network?.....10

35 Which of the following are types of EIGRP packets? (Choose three.).................................................10

36 Which representations have the same meaning when representing the subnet mask?...........................11

37 Which of the following commands sets a condition to allow packets through a named ACL?.............11

38 What are the advantages of OSPF in comparison with RIP v2? (Choose two.)....................................11

39 Which of the following is used for the delivery of EIGRP routing information?..................................11

40 The ISDN, Frame Relay, and HDLC encapsulations are defined at which layer of the OSI model?....12

41 How are VLANs configured?...............................................................................................................12

42 Which device allows data communication to occur between VLANs?.................................................12

43 Which statements describe the operation of VLANs? (Choose two.)...................................................12

44 The switches in the graphic are configured for VTP as shown. Select the statements that correctly describe the operation of these switches. (Choose two.)............................................................................13

45 Which of the following WAN services uses two data link layer encapsulations, one for data and one for signaling?.............................................................................................................................................13

46 When connecting two routers From different vendors using a dedicated point-to-point connection, which type of encapsulation should be used?............................................................................................13

47 What are two authentication options supported by PPP? (Choose two.)...............................................14

48 What is another term for latency?.........................................................................................................14

49 Which command will successfully configure a router to use PPP encapsulation on one of its links?...14

Page 3: 640-801 CCNA Voucher Exam 2

50 Which ISDN channel is used for call setup?.........................................................................................14

51 What are the effects of LAN segmentation using a switch? (Choose three.)........................................15

52 Which router parameters can be set From global configuration mode? (Choose two.).........................15

53 Which of the following describe the Spanning Tree Protocol? (Choose two.)......................................15

54 Which packet-switched WAN technologies are characterized by the use of Permanent Virtual Circuits (PVCs)?.....................................................................................................................................................15

55 Within a Frame Relay network, which methods are used by switches to inform DTEs of congestion?16

56 Which layer of the OSI model provides negotiation of data transfer syntax?.......................................16

57 What is the command syntax used to create a subinterface?.................................................................16

58 What are the functions of a Layer 2 Ethernet switch? (Choose three.).................................................16

59 Which command will display the name of the Cisco IOS currently running on a router?.....................17

60 Which connection modes are supported on a Frame Relay subinterface? (Choose two.).....................17

61 How is RIP configured on a router?.....................................................................................................17

62 In an effort to minimize traffic, an administrator decided to keep web traffic From causing the ISDN link to come up by denying WWW traffic to the 192.168.20.5 remote server. Two minutes after making changes to the configuration as shown in the graphic, the administrator notices that web traffic is still passing over the link. What is the most likely cause of the problem?........................................................18

63 Which fields are common to the TCP and the UDP segments? (Choose two.).....................................18

64 Which commands will configure the router ports with IP addresses as shown in the diagram? (Choose three.)........................................................................................................................................................18

Page 4: 640-801 CCNA Voucher Exam 2

1 How is the number 225 represented in binary?

  11001111  11011011  11110011√ 11100001

2 A company with five locations, each requiring a single subnet with55 IP addresses, was assigned two consecutive Class C addresses.Which routing protocols will support this addressing scheme? (Choosethree.)

  RIPv1√ RIPv2  IGRP√ OSPF√ EIGRP

3 Which statement is correct concerning routing and routed protocols?

  A routed protocol allows the routers to communicate with otherrouters and maintain tables for a routing protocol.  A routing protocol allows routers to communicate with otherrouters and maintain tables for a routed protocol.√ Routers only need to use routing protocols to work properly.  There is no difference between routed and routing protocols.

4 An ISDN BRI line can be described as which of the following?

√ 2B + D  2D + B  23B + D  23D + B

Page 5: 640-801 CCNA Voucher Exam 2

5 Which address does a bridge use to build its bridging table?

  destination IP address√ destination MAC address  source IP address  source MAC address

6 For the purpose of forwarding packets, which protocol managescommunication between routers regarding available routes ?

  DNS  ICMP√ RIP  ARP  CDP  STP

7 What is used to resolve known IP addresses to unknown MAC addresses?

√ ARP  DNS  DHCP  RARP

8 Which LMI types are available with Cisco routers?

  ANSI, Cisco, HDLC√ ANSI, Cisco, q933a  ANSI, Cisco, DLCI  Cisco, IETF, q933a

Page 6: 640-801 CCNA Voucher Exam 2

9 Which type of protocol is used between routers to communicate andmaintain tables?

  non-routable  routable  routed√ routing

10 How is spanning-tree path cost determined by default?

  total hop count√ sum of the costs based on bandwidth  dynamically determined based on load  individual link cost based on latency

11 Which of the following are commonly used routing metrics? (Choosethree.)

  ARP√ hop count  window size√ delay√ load  media type

12 What can be created by borrowing bits From the host portion of an IPaddress?

  extended IP addresses  additional IP addresses  segments√ subnetworks  smaller collision domains

Page 7: 640-801 CCNA Voucher Exam 2

13 Which automatic process is started first whenever power is appliedto a Cisco router?

  empties contents of NVRAM  looks for the configuration file√ performs a POST  starts the operating system

14 Which device uses logical addresses to interconnect networks orsubnetworks?

  hub  layer 2 switch√ router  bridge  repeater

15 Which OSI model layer is responsible for regulating the flow ofinformation From source to destination, reliably and accurately?

  application  presentation  session√ transport  network

16 Which mode will a router enter if it is unable to locate a validstartup configuration file during the boot process?

  boot mode  config mode  RXBOOT mode√ ROM monitor mode  setup mode  turnkey mode

Page 8: 640-801 CCNA Voucher Exam 2

17 In reference to the TCP/IP model, which protocol is used todetermine the network access layer address associated with a knownInternet layer address?

√ ARP  ICMP  IP  RARP  TCP  UDP

18 Given a router that has already been configured, what is the correctloading sequence when powering on?

  bootstrap, RAM, operating system√ bootstrap, configuration file, operating system  bootstrap, operating system, configuration file  operating system, configuration file, RAM

19 Which utility shows the route a packet takes to reach itsdestination?

  netstat  ping  Telnet√ traceroute

20 What is the default ISDN encapsulation used on Cisco ISDN routers?

  SLIP  PPP√ HDLC  VPP

Page 9: 640-801 CCNA Voucher Exam 2

21 Which command displays the active configuration of a router?

  Router# show flash  Router# show configuration√ Router# show running-config  Router# show startup-config

22 What is the purpose of the show cdp neighbors command?

  to display a summary of the configurations of all directlyattached Cisco devices√ to display information about all Cisco devices that are directlyconnected to a local device  to display information about all Cisco networks in the WAN  to display addressing information about all remote routers  to display the names of all OSPF neighbors in the local area

23 What enables routers to learn of destination networks?

  proxy ARP  CAM table exchanges  host name tables√ routing protocols  DNS lookups

24 Which device connects four-wire ISDN subscriber wiring to theconventional two-wire local loop?

√ NT1  NT2  TE1  TE2

Page 10: 640-801 CCNA Voucher Exam 2

25 Which Layer 4 protocol is connection-oriented and reliable?

  ICMP√ TCP  TFTP  UDP  HTTP

26 Which statement describes dynamic routing correctly?

√ Dynamic routing automatically adjusts for topology or trafficchanges.  Dynamic routing must always be used to reach a stub network.  Dynamic routing uses route information entered by anadministrator.  Dynamic routing reveals everything known about an entireautonomous system.

27 Which item best describes the ping command?

√ It uses ICMP echo packets to verify connectivity at the TCP/IPinternet layer.  It checks for connectivity at the TCP/IP application layer.  It uses Time to Live (TTL) values to generate messages From eachrouter used along a path.  It verifies sliding window settings at the TCP/IP transport layer.

28 Which of the following authentication processes provides protectionagainst playback attacks?

√ CHAP  DDI  PAP  TCP

Page 11: 640-801 CCNA Voucher Exam 2

29 All routers shown in the graphic are part of the same OSPF area.Which routers will PERTH engage in DR and BDR elections? (Choosethree.)

√ LONDON√ PALMER  CAIRO√ FRANKLIN

30 How many host addresses may be assigned on each subnetwork whenusing the 130.68.0.0 network address with a subnet mask of255.255.248.0?

  30  256√ 2046  2048  4094  4096

31 What is the length of a MAC address?

  12 bits  24 bits  38 bits√ 48 bits

32 Refer to the graphic. This company was assigned a Class C networkaddress for its two sites. The network administrator subnettedaccordingly and configured each router with RIP. However, theserouters are unable to connect to each other. What could be theproblem?

  RIP cannot be used in place of a static route.√ RIPv1 was configured instead of RIPv2.  RIPv2 was configured instead of RIPv1.  RIP does not support stub networks.

Page 12: 640-801 CCNA Voucher Exam 2

33 Network broacast traffic From the Business Department is needlesslyreaching the Engineering Department LAN. What can be done to containthis traffic within the Business Department network whilemaintaining connectivity with enterprise servers and the Internet?(Choose two.)

  Establish a VTP domain to contain the extraneous traffic.  Provide greater bandwidth to the Engineering Department LAN.  Utilize full-duplex Ethernet on the Engineering Department LAN.√ Place the business department on a separate subnet and routebetween networks.  Change the switch IP address to an address on the EngineeringDepartment LAN.√ Create separate VLANs and subnets for the two departments androute between the two.

34 Which of the following is the reference point between the NT1 andthe phone company network?

  R  S  T√ U

35 Which of the following are types of EIGRP packets? (Choose three.)

√ hello  respond√ DUAL  query√ acknowledgement  holddown

Page 13: 640-801 CCNA Voucher Exam 2

36 Which representations have the same meaning when representing thesubnet mask?

  /10 and 255.224.0.0  /15 and 255.255.0.0√ /21 and 255.255.248.0  /24 and 255.255.0.0

37 Which of the following commands sets a condition to allow packetsthrough a named ACL?

  adjust  apply  control√ permit

38 What are the advantages of OSPF in comparison with RIP v2? (Choosetwo.)

  OSPF provides support for Classless Interdomain Routing but RIP v2does not.√ OSPF may result in faster convergence, due to triggered updates.  OSPF’s built-in features make it easy to design, implement, andtroubleshoot.√ OSPF routers build a complete view of the network, reducing thepotential for routing loops.  OSPF sends periodic link state advertisements to keep the linkactive.  OSPF routers have lower memory and processor requirements.

39 Which of the following is used for the delivery of EIGRP routinginformation?

  Reliable Transport Protocol (RTP)√ Diffusing Update Algorithm (DUAL)  Protocol-Dependent Modules (PDMs)  Routing Table Maintenance Protocol (RTMP)

Page 14: 640-801 CCNA Voucher Exam 2

40 The ISDN, Frame Relay, and HDLC encapsulations are defined at whichlayer of the OSI model?

  network  session√ data link  transport  physical

41 How are VLANs configured?

  by moving switches to different router ports  by changing switchports for each host on the segment  by physically moving equipment to a different network√ through software  through hardware  automatically with a plug and play module

42 Which device allows data communication to occur between VLANs?

  bridge  hub  switch√ router

43 Which statements describe the operation of VLANs? (Choose two.)

  All switch ports assigned to a VLAN are part of the same collisiondomain.  All switch ports assigned to a VLAN are part of the same broadcastdomain.√ Using VLANs to logically organize workgroups minimizes latency inthe network.  Members can be assigned to VLANs based on port ID, MAC address, orprotocol.√ Multiple VLANs can be assigned to a single, Layer 3 networkaddress and routers can be used to route traffic between VLANs.

Page 15: 640-801 CCNA Voucher Exam 2

44 The switches in the graphic are configured for VTP as shown. Selectthe statements that correctly describe the operation of theseswitches. (Choose two.)

√ A new VLAN can be added to Switch1 and that information will beadded only to Switch2.  An existing VLAN can be deleted From Switch2 and that VLAN will bedeleted From Switch1 and Switch4.  A new VLAN can be added to Switch4 and that information will beadded to Switch1, Switch2, and Switch3.√ A new VLAN can be added to Switch1 and that information will beadded to Switch2 and Switch4.  A new VLAN can be added to Switch3 and that information will beadded to Switch1, Switch2, and Switch4.  An existing VLAN can be deleted From Switch4 and that VLAN will bedeleted From Switch1 and Switch2.

45 Which of the following WAN services uses two data link layerencapsulations, one for data and one for signaling?

√ ISDN  Frame Relay  ATM  FDDI

46 When connecting two routers From different vendors using a dedicatedpoint-to-point connection, which type of encapsulation should beused?

  Cisco  HDLC  IETF√ PPP

Page 16: 640-801 CCNA Voucher Exam 2

47 What are two authentication options supported by PPP? (Choose two.)

  clear text√ PAP√ CHAP  LCP  SLIP

48 What is another term for latency?

  backoff algorithm  hold-down timer√ propagation delay  redundancy

49 Which command will successfully configure a router to use PPPencapsulation on one of its links?

  router> encapsulation ppp  router# encapsulation ppp  router(config)# encapsulation ppp√ router(config-if)# encapsulation ppp

50 Which ISDN channel is used for call setup?

  B√ D  X  SS-7  PRI  BRI

Page 17: 640-801 CCNA Voucher Exam 2

51 What are the effects of LAN segmentation using a switch? (Choosethree.)

√ dedicated bandwidth between source and destinations  enlarged collision domains  decreased broadcast domains√ increased number of collision domains√ increased latency in the network

52 Which router parameters can be set From global configuration mode?(Choose two.)

  IP address  Telnet password√ hostname  console password  subnet mask√ enable secret password

53 Which of the following describe the Spanning Tree Protocol? (Choosetwo.)

  It prevents routing loops.  It prevents broadcasts in a switched network.  It operates at Layer 3.√ It uses BPDUs to select the shortest path in a switched network.  It allows a router to load balance across redundant links.√ It prevents switching loops.

54 Which packet-switched WAN technologies are characterized by the useof Permanent Virtual Circuits (PVCs)?

  Frame Relay and ISDN√ Frame Relay and X.25  ISDN and X.25  ISDN only

Page 18: 640-801 CCNA Voucher Exam 2

55 Within a Frame Relay network, which methods are used by switches toinform DTEs of congestion?

  CCP and LMI  CIR and LATE  DLCI and SPID√ FECN and BECN

56 Which layer of the OSI model provides negotiation of data transfersyntax?

  application  presentation  session√ transport  network

57 What is the command syntax used to create a subinterface?

√ Router(config-if)# int s0.115 point-to-point  Router(config-if)# int s0 subinterface 115 point-to-point  Router(config-if)# subinterface 115 point-to-point  Router(config-if)# subinterface s0.115 point-to-point

58 What are the functions of a Layer 2 Ethernet switch? (Choose three.)

  preventing broadcasts√ increasing available bandwidth per user√ decreasing the size of collision domains√ isolating traffic among segments  routing traffic between different networks  decreasing the number of broadcast domains

Page 19: 640-801 CCNA Voucher Exam 2

59 Which command will display the name of the Cisco IOS currentlyrunning on a router?

  show ip interfaces  show ip route  show cdp nei detail√ show version

60 Which connection modes are supported on a Frame Relay subinterface?(Choose two.)

  dynamic  multicast√ multipoint  multipoint-to-point√ point-to-point  static

61 How is RIP configured on a router?

  RIP is configured globally and then assigned an IP address andsubnet mask.  RIP is configured globally and then applied to each interface thatwill participate in the RIP routing process.  RIP is configured individually on each interface that willparticipate in the RIP routing process.√ RIP is enabled globally and then networks are associated with theRIP routing process.

Page 20: 640-801 CCNA Voucher Exam 2

62 In an effort to minimize traffic, an administrator decided to keepweb traffic From causing the ISDN link to come up by denying WWWtraffic to the 192.168.20.5 remote server. Two minutes after makingchanges to the configuration as shown in the graphic, theadministrator notices that web traffic is still passing over thelink. What is the most likely cause of the problem?

  The dialer-group has not been applied to outbound traffic.  The access-list is incorrectly configured.  Broadcasts are creating “interesting” traffic and keeping the linkactive.√ The command ip access-group 128 out is missing From the bri0/0interface.

63 Which fields are common to the TCP and the UDP segments? (Choosetwo.)

√ source address  sequence number  acknowledgement number  options  checksum√ destination port

64 Which commands will configure the router ports with IP addresses asshown in the diagram? (Choose three.)

√ R1(config)# interface s0R1(config-if)# ip address 10.1.1.146 255.255.255.252√ R1(config)# interface e0R1(config-if)# ip address 10.1.7.254 255.255.252.0  R1(config)# interface s0R1(config-if)# ip address 10.1.1.147 255.255.255.0  R1(config)# interface e0R1(config-if)# ip address 10.1.4.0 255.255.252.0  R2(config)# interface e0R2(config-if)# ip address 10.1.16.1 255.255.255.0√ R2(config)# interface e0R2(config-if)# ip address 10.1.31.254 255.255.240.0