VoyForums

Login ] [ Contact Forum Admin ] [ Main index ] [ Post a new message ] [ Search | Check update time | Archives: 12[3] ]
Subject: Re: PLEASE send me industry exam


Author:
franxix (salu)
[ Next Thread | Previous Thread | Next Message | Previous Message ]
Date Posted: 08:27:00 07/03/08 Thu
In reply to: adamwahal 's message, "Re: PLEASE send me industry exam" on 10:59:53 02/08/08 Fri

>>>>>please send me ccna industry exam
>>>> exam please to this email:
>>>>adamwahal@yahoo.com
>>>Posted: Tue Aug 29, 2006 11:27 am Post subject:
>Re:
>>>
>>>
>>>-----------------------------------------------------
>-
>>-
>>>-------------------------
>>>
>>>ANSwer of ur Question
>>>
>>>Aiman
>>>aaiman@banglacafe.com
>>>
>>>
>>>================
>>>1 What is the term for the cabling that connects the
>>>customer premises equipment to the CO switch?
>>>
>>>demarc
>>>*local loop
>>>final mile
>>>DTE
>>>trunk line
>>>
>>>
>>>2 A network administrator wants to reconfigure a
>>>router. Which of the following will clear the
>>>running-configuration in preparation for the
>>>reconfiguration?
>>>
>>>erase running-config and then reload
>>>erase running-config
>>>reload
>>>no running-config and then reload
>>>*erase startup-config and then reload
>>>delete running-config
>>>
>>>
>>>3 A ping 192.1.1.20 command is issued on workstation
>A
>>>to determine if workstation B can be reached. What
>>>events will occur if this command is successful?
>>>(Choose two.)
>>>
>>>The router will block the ping request message.
>>>The router will reply to the echo request with a
>proxy
>>>ping response.
>>>Workstation A will send a UDP ping request message to
>>>workstation B.
>>>Workstation B will send a UDP ping reply message to
>>>workstation A.
>>>*Workstation A will send an ICMP echo request message
>>>to workstation B.
>>>*Workstation B will send an ICMP echo reply message
>to
>>>workstation A.
>>>
>>>
>>>4 How is spanning-tree path cost determined by
>>>default?
>>>
>>>total hop count
>>>*sum of the costs based on bandwidth
>>>dynamically determined based on load
>>>individual link cost based on latency
>>>
>>>
>>>5 Which of the following statements describes the
>>>operation of routing with EIGRP? (Choose three.)
>>>
>>>*As new neighbors are discovered, entries are placed
>>>in a neighbor table.
>>>If the feasible successor has a higher advertised
>cost
>>>than the current successor route, then it becomes the
>>>primary route.
>>>*If hello packets are not received within the hold
>>>time, DUAL must recalculate the topology.
>>>*The reported distance is the distance to a
>>>destination as advertised by a neighbor.
>>>Routes learned through IGRP are identified as
>internal
>>>routes.
>>>EIGRP builds one routing table that contains routes
>>>for all configured routed protocols.
>>>
>>>
>>>6 What are the two basic functions that a router uses
>>>to relay packets?
>>>
>>>filtering and switching
>>>path determination and filtering
>>>*path determination and switching
>>>traffic analysis and filtering
>>>
>>>
>>>7 A partial configuration of a Catalyst 1900 switch
>is
>>>shown in the graphic. Why do the following commands
>>>fail to delete VLAN1 and VLAN2? (Choose two.)
>>>
>>>no vlan 1
>>>no vlan 2
>>>
>>>VLAN 1 is not configured on the switch.
>>>*VLAN 1 is the default VLAN and cannot be removed.
>>>The network administrator is using the wrong
>command.
>>>*The switch is configured in VTP client mode.
>>>Ports are still assigned to VLAN 1 and VLAN 2 and the
>>>VLANs cannot be deleted until those assignments are
>>>removed.
>>>
>>>
>>>8 How many host addresses may be assigned on each
>>>subnetwork when using the 130.68.0.0 network address
>>>with a subnet mask of 255.255.248.0?
>>>
>>>30
>>>256
>>>*2046
>>>2048
>>>4094
>>>4096
>>>
>>>
>>>9 What is another term for latency?
>>>
>>>backoff algorithm
>>>hold-down timer
>>>*propagation delay
>>>redundancy
>>>
>>>
>>>10 What are the two authentication options supported
>>>by PPP?
>>>
>>>PAP and clear text
>>>*PAP and CHAP
>>>CHAP and clear text
>>>PPP does not support authentication
>>>
>>>
>>>11 Which statement best describes the difference
>>>between exterior routing protocols and interior
>>>routing protocols?
>>>
>>>Exterior routing protocols are used for
>communications
>>>within a single autonomous system, and interior
>>>routing protocols are used for communications between
>>>autonomous systems.
>>>Interior routing protocols are used between neighbor
>>>routers, and exterior routing protocols are used
>>>between peer routers.
>>>Interior routing protocols are used by mid size
>>>companies, and exterior routing protocols are used by
>>>large organizations.
>>>*Interior routing protocols are used for
>>>communications within a single autonomous system, and
>>>exterior routing protocols are used for
>communications
>>>between autonomous systems.
>>>
>>>
>>>12 Which of the following is a non-ISDN compatible
>>>device that requires a terminal adapter to connect to
>>>an ISDN network?
>>>
>>>NT1
>>>NT2
>>>TA1
>>>TA2
>>>TE1
>>>*TE2
>>>
>>>
>>>13 Which device imposes boundaries on broadcast
>>>traffic?
>>>
>>>bridge
>>>repeater
>>>*router
>>>transceiver
>>>
>>>
>>>14
>>>Refer to exhibit. Given the topology shown in the
>>>exhibit, what three commands are needed to configure
>>>EIGRP on the Paris router? (Choose three.)
>>>
>>>*Paris(config)# router eigrp 100
>>>Paris(config)# router eigrp
>>>Paris(config-router)# network 192.168.6.0
>>>Paris(config-router)# network 192.168.7.0
>>>Paris(config-router)# network 192.168.8.0
>>>Paris(config-router)# network 192.168.9.0
>>>
>>>
>>>15 Which ISDN channel is used for call setup?
>>>
>>>B
>>>*D
>>>X
>>>SS-7
>>>PRI
>>>BRI
>>>
>>>
>>>16
>>>Host A in the graphic has received its DHCP
>>>configuration from R1. Host A is unable to reach the
>>>Internet. What could cause this problem?
>>>
>>>The DNS server is not on the same LAN as Host A.
>>>The ip helper-address command must be configured on
>>>the Ethernet interface.
>>>*Host A did not receive the correct gateway address.
>>>The DHCP service has not been enabled on interface
>>e0.
>>>The router IP address has been excluded from the DHCP
>>>pool.
>>>The subnet mask in the network command is incorrect.
>>>
>>>
>>>17 Which utility can be used to verify connectivity
>>>through all seven layers of the OSI model?
>>>
>>>netstat
>>>ping
>>>*Telnet
>>>traceroute
>>>
>>>
>>>18 Which OSI model layer is responsible for
>regulating
>>>the flow of information from source to destination,
>>>reliably and accurately?
>>>
>>>application
>>>presentation
>>>session
>>>*transport
>>>network
>>>
>>>
>>>19 Which of the following represents a group of
>>>routers under a common administration and is required
>>>when configuring routing protocols such as EIGRP?
>>>
>>>control group
>>>*autonomous system
>>>corporate system
>>>Domain Name System
>>>local-area network
>>>wide-area network
>>>
>>>
>>>20 How is RIP configured on a router?
>>>
>>>RIP is configured globally and then assigned an IP
>>>address and subnet mask.
>>>RIP is configured globally and then applied to each
>>>interface that will participate in the RIP routing
>>>process.
>>>RIP is configured individually on each interface that
>>>will participate in the RIP routing process.
>>>*RIP is enabled globally and then networks are
>>>associated with the RIP routing process.
>>>
>>>
>>>21 What are the advantages of OSPF in comparison with
>>>RIP v2? (Choose two.)
>>>
>>>OSPF provides support for Classless Interdomain
>>>Routing but RIP v2 does not.
>>>*OSPF may result in faster convergence, due to
>>>triggered updates.
>>>OSPF's built-in features make it easy to design,
>>>implement, and troubleshoot.
>>>*OSPF routers build a complete view of the network,
>>>reducing the potential for routing loops.
>>>OSPF sends periodic link state advertisements to keep
>>>the link active.
>>>OSPF routers have lower memory and processor
>>>requirements.
>>>
>>>
>>>22 Which protocol of the TCP/IP model internet layer
>>>provides connectionless, best-effort-delivery of
>>>datagrams?
>>>
>>>ARP
>>>ICMP
>>>*IP
>>>RARP
>>>TCP
>>>DNS
>>>
>>>
>>>23 Which of the following is an alternative to a
>>>dedicated WAN link?
>>>
>>>X.25
>>>ISDN
>>>*T1
>>>DS3
>>>
>>>
>>>24
>>>The internetwork in the diagram is assigned a Class B
>>>network address of 130.68.0.0. The network cannot use
>>>subnet zero but will use a single network mask for
>the
>>>internetwork. What subnet mask should be assigned to
>>>ensure the maximum number of host addresses are
>>>available for use on each subnetwork?
>>>
>>>255.255.224.0
>>>255.255.240.0
>>>255.255.248.0
>>>255.255.252.0
>>>255.255.255.224
>>>255.255.255.240
>>>
>>>
>>>25
>>>A packet destined for 10.188.12.12 is received by a
>>>router with the configuration shown in the graphic.
>>>The routing table displays the following lines:
>>>
>>>10.0.0.0/24 is subnetted, 3 subnets
>>>R 10.5.5.0 [120/1] via 10.20.20.2, 00:00:18,
>>Serial0/0
>>>C 10.20.20.0 is directly connected, Serial0/0
>>>C 10.10.10.0 is directly connected, FastEthernet0/0
>>>
>>>What will happen?
>>>
>>>The packet will be forwarded to the next hop.
>>>The router will forward the packet out all ports.
>>>*The packet will be dropped.
>>>The router will forward the packet out all ports
>>>except the receiving port.
>>>
>>>
>>>26 How is an access list implemented in a router?
>>>
>>>Enter the access list statements globally and apply
>>>the list globally.
>>>*Enter the access list statements globally and apply
>>>the list to a specific interface.
>>>Enter the access list statements on a specific
>>>interface and apply the list globally.
>>>Enter the access list statements on a specific
>>>interface and apply the list to that same interface.
>>>
>>>
>>>27 What are the primary functions of a Layer 2
>>>Ethernet switch? (Choose three.)
>>>
>>>*filters traffic between LAN segments
>>>*achieves greater bandwidth per user
>>>prevents hosts from sending broadcasts
>>>*increases the number of broadcast domains through
>>>VLANs
>>>decreases the number of collision domains through
>>>VLANs
>>>
>>>
>>>28 Which of the following describes the CIR in a
>Frame
>>>Relay network?
>>>
>>>*guaranteed data rate that the service provider
>>>commits to providing
>>>maximum data burst rate that the switch can handle
>>>number of simultaneous virtual circuits available
>from
>>>a service provider
>>>number of simultaneous DLCIs that can be established
>>>across the cloud
>>>
>>>
>>>29 Which statements reflect the process of common LAN
>>>protocols accessing the media? (Choose three.)
>>>
>>>*Ethernet is a non-deterministic protocol that allows
>>>the first node that accesses the medium to transmit
>>>its data.
>>>*Token Ring is a deterministic protocol that allows
>>>only one node within the ring a turn to transmit data
>>>before passing control to the next node.
>>>Token Ring is a non-deterministic protocol that uses
>a
>>>first-come, first-serve approach for nodes to seize
>>>the token and transmit data.
>>>FDDI networks use a deterministic approach to assure
>>>that each node has fair access to the medium.
>>>*Ethernet and Token Ring networks avoid collisions by
>>>allowing only one node to transmit at a time.
>>>Ethernet is a deterministic protocol that uses
>CSMA/CD
>>>to assure that each node takes turns to access the
>>>medium.
>>>
>>>
>>>30 What is the purpose of DLCIs in Frame Relay?
>>>
>>>They determine the Frame Relay encapsulation type.
>>>*They identify the logical circuit between a local
>>>router and a Frame Relay WAN switch.
>>>They represent the keepalives used to maintain the
>PVC
>>>in an active state.
>>>They represent the physical address of the router
>>>attached to a Frame Relay network.
>>>
>>>
>>>31 An administrator has an older 1900 switch located
>>>on the edge of the network. What can the network
>>>administrator do to ensure that it does not become
>the
>>>root bridge of the spanning-tree network?
>>>
>>>decrease the BPDU hello timer update on the 1900
>>>assign the highest IP address to the switch that
>>>should be the root
>>>assign the lowest IP address to new root bridge
>>>*assign the lowest priority to the switch that should
>>>be the root
>>>assign the highest priority to the new root bridge
>>>decrease the BID on the 1900 switch
>>>
>>>
>>>32 What command is used to verify that a Frame Relay
>>>link is up and operational?
>>>
>>>Router# show line
>>>Router# show version
>>>*Router# show interface
>>>Router# show frame-relay
>>>Router# show frame-relay status
>>>
>>>
>>>33 Which of the following are true regarding bridges
>>>and switches? (Choose two.)
>>>
>>>Bridges are faster than switches because they have
>>>fewer ports.
>>>*A switch is a multiport bridge.
>>>*Bridges and switches learn MAC addresses by
>examining
>>>the source MAC address of each frame received.
>>>A bridge will forward a broadcast but a switch will
>>>not.
>>>Bridges and switches increase the size of a collision
>>>domain.
>>>
>>>
>>>34 Which of the following does CHAP authentication
>use
>>>to increase security on a PPP link? (Choose three.)
>>>
>>>periodic verification of identity while the link is
>>>established
>>>*secure recording of playback attacks
>>>transmission of the CHAP password in plain text
>>>*the use of a unique and random challenge value
>>>the use of a two-way handshake of CHAP exchanges
>>>*identity verification at the startup of a link
>>>
>>>
>>>35 When a user generates information to be sent on a
>>>network, in what order does data encapsulation
>occur?
>>>
>>>data, frame, segment, packet, bits
>>>data, packet, frame, segment, bits
>>>data, packet, segment, frame, bits
>>>*data, segment, packet, frame, bits
>>>
>>>
>>>36 Which of the following are characteristics of
>>>RIPv2? (Choose two.)
>>>
>>>requires classful addressing for configured
>>interfaces
>>>*forwards routing updates using multicasts
>>>forwards routing updates using broadcasts
>>>operates as a hybrid routing protocol
>>>*supports variable-length subnet masking
>>>
>>>
>>>37 Which command will verify that a router is
>>>configured with RIPv2 and that the hold-down timer
>and
>>>administrative distance are set to the default
>>values?
>>>
>>>show ip route
>>>show interface brief
>>>*show ip protocols
>>>show interface
>>>
>>>
>>>38
>>>The network in the graphic is using EIGRP with the
>>>metrics shown. Router A has a route to network
>>>210.67.130.0 through Router C, with a feasible
>>>distance of three. What will happen if the direct
>link
>>>between A and C becomes unavailable? (Choose two.)
>>>
>>>DUAL will immediately promote the feasible successor
>>>route through Router B to successor route status.
>>>The route to Network C on Router A will be placed in
>>>Active status.
>>>The route to Network C on Router A will be placed in
>>>Passive status.
>>>Router A will send query packets to all neighbor
>>>routers.
>>>Router A will mark the link as down until regularly
>>>scheduled update packets are received.
>>>
>>>
>>>39 What operations can be executed from the Router>
>>>prompt? (Choose two.)
>>>
>>>*enter privileged mode with the enable command
>>>modify passwords
>>>modify the router name with the hostname command
>>>*view basic router status
>>>view passwords
>>>view the running-configuration with the show
>>>running-config command
>>>
>>>
>>>40 What is the reference point for a connection
>>>between a TA and a non-ISDN-compatible device?
>>>
>>>*R
>>>S
>>>T
>>>U
>>>
>>>
>>>41 Which item is a commonly used metric?
>>>
>>>ARP
>>>*Hop Count
>>>Acknowledgment Number
>>>Time
>>>
>>>
>>>42 Which ISDN channels are used for voice, video, and
>>>data?
>>>
>>>A channels
>>>*B channels
>>>E channels
>>>D channels
>>>Q channels
>>>E channels
>>>
>>>
>>>43 A static route needs to be configured to network
>>>192.17.10.0/24. This route should have an
>>>administrative distance of 180. Which command will
>>>configure this route if the IP address of the next
>hop
>>>interface is 10.15.0.1?
>>>
>>>Router(config)# ip route 192.17.10.1 255.255.255.0
>>>10.15.0.0 180
>>>*Router(config)# ip route 192.17.10.0 255.255.255.0
>>>10.15.0.1 180
>>>Router(config)# ip route 10.15.0.1 192.17.10.0
>>>255.255.255.0 180
>>>Router (config)# ip static-route 192.17.10.0
>>>255.255.255.255 10.15.0.1 180
>>>Router (config)# ip default-route 192.17.10.0
>>>255.255.255.255 10.15.0.1 180
>>>
>>>
>>>44 Which statements are true regarding OSPF DR and
>BDR
>>>elections? (Choose three.)
>>>
>>>*The command ip ospf prioritypriority number is used
>>>to set the priority value that determines the DR.
>>>The default priority value for a router connected to
>a
>>>multiaccess network is 0.
>>>The router with the highest MAC address is elected as
>>>the DR when the default priority values are used.
>>>The loopback interface must be configured on the DR.
>>>*The BDR is selected from remaining routers and uses
>>>the same criteria applied in the DR election.
>>>*There are no DRs or BDRs on point-to-point links.
>>>
>>>
>>>45 Which packet-switched WAN technologies are
>>>characterized by the use of Permanent Virtual
>Circuits
>>>(PVCs)?
>>>
>>>Frame Relay and ISDN
>>>*Frame Relay and X.25
>>>ISDN and X.25
>>>ISDN only
>>>
>>>
>>>46 Which statement describes the store and forward
>>>transmission mode of an Ethernet switch?
>>>
>>>It is also referred to as a hybrid mode or as error
>>>sensing mode.
>>>It requires the switch to read the first 64 bytes of
>>>an Ethernet frame and then begins to forward the
>>data.
>>>It decreases the latency of the transmission but has
>>>very little error detection.
>>>*It increases latency with large frames, but error
>>>detection is high.
>>>
>>>
>>>47 Which configuration parameters can a host receive
>>>from a DHCP server? (Choose three.)
>>>
>>>MAC address
>>>outside global address
>>>*DNS server address
>>>DHCP helper address
>>>*default gateway address
>>>*IP address/subnet mask
>>>
>>>
>>>48 Which layer of the OSI model can provide
>>>connection-oriented and reliable data transfer
>between
>>>two hosts?
>>>
>>>application
>>>presentation
>>>session
>>>*transport
>>>
>>>
>>>49 Which utility shows the route a packet takes to
>>>reach its destination?
>>>
>>>netstat
>>>ping
>>>Telnet
>>>*traceroute
>>>
>>>
>>>50 Which command displays the active configuration of
>>>a router?
>>>
>>>Router# show flash
>>>Router# show configuration
>>>*Router# show running-config
>>>Router# show startup-config
>>>
>>>
>>>51 In an IPv4 environment, what information is used
>by
>>>the router to forward data packets from one interface
>>>of a router to another?
>>>
>>>*destination network address
>>>source network address
>>>source MAC address
>>>well known port destination address
>>>
>>>
>>>52
>>>In an effort to minimize traffic, an administrator
>>>decided to keep web traffic from causing the ISDN
>link
>>>to come up by denying WWW traffic to the 192.168.20.5
>>>remote server. Two minutes after making changes to
>the
>>>configuration as shown in the graphic, the
>>>administrator notices that web traffic is still
>>>passing over the link. What is the most likely cause
>>>of the problem?
>>>
>>>The dialer-group has not been applied to outbound
>>>traffic.
>>>The access-list is incorrectly configured.
>>>Broadcasts are creating "interesting" traffic and
>>>keeping the link active.
>>>The command ip access-group 128 out is missing from
>>>the bri0/0 interface.
>>>
>>>
>>>53 Which layer of the OSI model establishes, manages,
>>>and terminates sessions between applications?
>>>
>>>Layer 7
>>>Layer 6
>>>*Layer 5
>>>Layer 4
>>>Layer 3
>>>Layer 2
>>>
>>>
>>>54 When using distance-vector routing protocols in a
>>>frame relay environment with multiple DLCIs on a
>>>single physical router interface, split-horizon
>issues
>>>must be resolved. According to Cisco best practices,
>>>what should be configured to manage these issues?
>>>
>>>a single network address
>>>multiple LMIs
>>>*subinterfaces
>>>multiple IP addresses on the same subnet
>>>
>>>
>>>55 Which automatic process is started first whenever
>>>power is applied to a Cisco router?
>>>
>>>empties contents of NVRAM
>>>looks for the configuration file
>>>*performs a POST
>>>starts the operating system
>>>
>>>
>>>56 What is the length of a MAC address?
>>>
>>>12 bits
>>>24 bits
>>>38 bits
>>>*48 bits
>>>
>>>
>>>57 Identify the correct pairing of protocols and
>their
>>>classifications.
>>>
>>>Routed - IP, RIP
>>>Routed - RIP, OSPF
>>>Routing - IPX, RIP
>>>*Routing - OSPF, RIP
>>>
>>>
>>>58 Which protocols or applications allow a network
>>>administrator to monitor a network? (Choose three.)
>>>
>>>FTP
>>>*SNMP
>>>*RMON
>>>*syslog
>>>DHCP
>>>SMTP
>>>
>>>
>>>59 Which type of encapsulation is recommended to be
>>>used to connect two routers from different vendors
>>>through a dedicated point-to-point connection?
>>>
>>>CIR
>>>FCS
>>>ANSI
>>>*PPP
>>>HDLC
>>>
>>>
>>>60 Which command will display statistics for all
>>>interfaces configured on a router?
>>>
>>>list interfaces
>>>*show interfaces
>>>show processes
>>>show statistics
>>>
>>>
>>>61 What is the correct order of the layers of the OSI
>>>reference model, starting at the lowest layer and
>>>working up the model?
>>>
>>>data link, physical, transport, network,
>presentation,
>>>session, application
>>>physical, data link, network, session, transport,
>>>presentation, application
>>>physical, data link, network, transport,
>presentation,
>>>session, application
>>>*physical, data link, network, transport, session,
>>>presentation, application
>>>application, session, presentation, transport, data
>>>link, network, physical
>>>
>>>
>>>62 What is the purpose of the IOS enable secret
>>>command?
>>>
>>>to set password protection on incoming Telnet
>>sessions
>>>*to set password protection on the console terminal
>>>to allow a user access to User mode
>>>to allow a user to enter a password that will be
>>>encrypted
>>>
>>>
>>>63 How are VLANs configured?
>>>
>>>by moving switches to different router ports
>>>by changing switchports for each host on the segment
>>>by physically moving equipment to a different
>network
>>>*through software
>>>through hardware
>>>automatically with a plug and play module
>>>
>>>
>>>64
>>>The administrator of the network shown in the graphic
>>>would like to use VLSM to subnet the company's Class
>C
>>>address. Which subnet masks should be used on the
>LANs
>>>and serial links to waste the fewest host addresses?
>>>(Choose three.)
>>>
>>>255.255.255.0
>>>255.255.255.192
>>>255.255.255.224
>>>255.255.255.240
>>>255.255.255.248
>>>*255.255.255.252
>>>
>>>
>>>65 Which fields are common to the TCP and the UDP
>>>segments? (Choose two.)
>>>
>>>*source address
>>>sequence number
>>>acknowledgement number
>>>options
>>>checksum
>>>*destination port
>>>
>>>Back to top

[ Next Thread | Previous Thread | Next Message | Previous Message ]


[ Contact Forum Admin ]


Forum timezone: GMT-8
VF Version: 3.00b, ConfDB:
Before posting please read our privacy policy.
VoyForums(tm) is a Free Service from Voyager Info-Systems.
Copyright © 1998-2019 Voyager Info-Systems. All Rights Reserved.