Tải bản đầy đủ (.pdf) (10 trang)

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 106 potx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (160.69 KB, 10 trang )

Chapter 6 1019
2. What is the maximum distance for thick Ethernet without using a repeater?
C. 500m (1640.4 ft.)
3. 10-Mbps Ethernet operates within the timing limits offered by a series of no
more than segments separated by no more than
repeaters.
C. Five, four
4. Fast Ethernet supports up to what transfer rate?
C. 100 Mbps
5. Identify two Gigabit Ethernet cable specifications.
C. 1000BASE-SX
D. 1000BASE-LX
6. What is the transmission medium for 1000BASE-SX?
D. Short-wave laser over multimode fiber
7. 4D-PAM5 encoding method is used in which of the following Gigabit Ethernet?
C. 1000BASE-T
8. What is the IEEE standard for 10-Gb Ethernet?
C. 802.3ae
9. Which of the following is not a feature of microsegmentation?
D. It increases collisions.
10. Which of the following is used by LAN switches for making the forwarding
decision?
B. MAC address
11. Which of the following is a feature of full-duplex transmission?
D. All of the above.
12. The three common types of switching methods are ,
, and .
Answer: store-and-forward, cut-through, and fragment-free
13. The Spanning-Tree Protocol allows which of the following?
B. A redundant network path without suffering the effects of loops in the
network


1102.book Page 1019 Tuesday, May 20, 2003 2:53 PM
1020 Appendix C: Check Your Understanding Answer Key
14. Which of the following is not one of the STP port states?
D. Transmitting
15. Which of the following is true concerning a bridge and its forwarding decisions?
C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
16. Which of the following is not a feature of bridges?
C. They do not make any forwarding decisions.
17. Which of the following statements is true of microsegmentation?
A. Each workstation gets its own dedicated segment through the network.
18. Which of the following is true for LAN switches?
B. They are very high-speed multiport bridges.
Chapter 7
1. What transport layer protocol does TFTP use?
C. UDP
2. Which of the following is a basic service of the transport layer?
D. All of the above
3. Which of the following protocols operate at the TCP/IP Internet layer?
D. All of the above
4. What is the first thing that happens when a DHCP client boots?
C. DHCPDISCOVER
5. How does the network layer forward packets from the source to the destination?
A. By using a routing table
6. If a device doesn’t know the MAC address of a device on an adjacent network, it
sends an ARP request to what?
D. All of the above
7. What is in a RARP request?
A. A MAC header and the RARP request message
1102.book Page 1020 Tuesday, May 20, 2003 2:53 PM
Chapter 7 1021

8. What are the two parts of an IP address?
A. Network address and host address
9. What Internet protocol is used to map a known IP address to an unknown MAC
address?
C. ARP
10. Which of the following initiates an ARP request?
D. A device that cannot locate the destination MAC address in its ARP table
11. Which of the following best describes an ARP table?
D. A section of RAM on each device that maps IP addresses to MAC addresses
12. Which of the following best describes the ARP reply?
A. A device sends its MAC address to a source in response to an ARP request
13. Why are current, updated ARP tables important?
B. For limiting the number of broadcasts
14. Why is a RARP request made?
A. A source knows its MAC address but not its IP address.
15. Which of the following best describes TCP/IP?
A. It is a suite of protocols that can be used to communicate across any set of
interconnected networks.
16. Which of the following does not describe the TCP/IP protocol stack?
A. It maps closely to the OSI reference model’s upper layers.
17. The TCP/IP protocol suite has specifications for which layers of the OSI model?
C. 3, 4, and 5 through 7
18. Which of the following is not a function of the network layer?
D. UDP provides connectionless exchange of datagrams without acknowledgments.
19. Which of the following is one of the protocols found at the transport layer?
B. UDP
1102.book Page 1021 Tuesday, May 20, 2003 2:53 PM
1022 Appendix C: Check Your Understanding Answer Key
Chapter 8
1. How many bits are in an IP address?

B. 32
2. What is the maximum value of each octet in an IP address?
B. 255
3. The network number plays what part in an IP address?
A. It specifies the network to which the host belongs.
4. The host number plays what part in an IP address?
B. It designates which node on the subnetwork is being addressed.
5. What is the decimal equivalent of the binary number 101101?
C. 45
6. Convert the decimal number 192.5.34.11 to its binary form.
A. 11000000.00000101.00100010.00001011
7. Convert the binary IP address 11000000.00000101.00100010.00001011 to its
decimal form.
D. None of the above
8. What portion of the Class B address 154.19.2.7 is the network address?
B. 154.19
9. What portion of the IP address 129.219.51.18 represents the network?
A. 129.219
10. Which of the following addresses is an example of a broadcast address on the
network 123.10.0.0 with a subnet mask of 255.255.0.0?
B. 123.10.255.255
11. How many host addresses can be used in a Class C network?
B. 254
12. How many subnets can a Class B network have?
D. None of the above
13. What is the minimum number of bits that can be borrowed to form a subnet?
B. 2
1102.book Page 1022 Tuesday, May 20, 2003 2:53 PM
Chapter 8 1023
14. What is the primary reason for using subnets?

C. To reduce the size of the broadcast domain
15. How many bits are in a subnet mask?
B. 32
16. Performing the Boolean function as a router would on the IP addresses 131.8.2.5
and 255.0.0.0, what is the network/subnetwork address?
D. None of the above
17. How many bits can be borrowed to create a subnet for a Class C network?
C. 6
18. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224,
how many bits have been borrowed to create a subnet?
C. 3
19. Performing the Boolean function as a router would on the IP addresses
172.16.2.120 and 255.255.255.0, what is the subnet address?
C. 172.16.2.0
20. Which of the following best describes one function of Layer 3, the network layer,
in the OSI model?
C. It determines which is the best path for traffic to take through the network.
21. What function allows routers to evaluate available routes to a destination and to
establish the preferred handling of a packet?
B. Path determination
22. How does the network layer forward packets from the source to the destination?
A. By using an IP routing table
23. What are the two parts of a network layer address that routers use to forward
traffic through a network?
A. Network address and host address
1102.book Page 1023 Tuesday, May 20, 2003 2:53 PM
1024 Appendix C: Check Your Understanding Answer Key
Chapter 9
1. When conversing with an individual whose primary language is different than
yours, you might need to repeat your words and speak more slowly. Repeating

your words can be compared to , and the need to speak slowly
can be compared to the functions of the transport layer.
A. Reliability; flow control
2. The following characteristics describe what TCP/IP protocol: connection-
oriented; resends anything not received; divides outgoing messages into
segments.
B. TCP
3. What does the window field in a TCP segment indicate?
D. Number of octets that the device is willing to accept
4. What transport protocol exchanges datagrams without acknowledgments or
guaranteed delivery?
A. UDP
5. What do TCP and UDP use to keep track of different conversations crossing a
network at the same time?
A. Port numbers
6. How does TCP synchronize a connection between the source and the destination
before data transmission?
B. Three-way handshake
7. Which range of port numbers is unregulated?
D. Above 1023
8. With TCP transmission, what occurs if a segment is not acknowledged in a
certain time period?
D. Retransmission occurs.
9. Which best describes flow control?
C. A method of preventing buffer overrun
10. Which of the following best describes the purpose of the TCP/IP protocol stack?
C. Transfers information from one host to another in a sequence of datagrams
1102.book Page 1024 Tuesday, May 20, 2003 2:53 PM
Chapter 9 1025
11. Which of the following is one of the protocols found in the transport layer?

B. UDP
12. What is the purpose of port numbers?
A. They keep track of different upper-layer conversations crossing the network
at the same time.
13. Why are TCP three-way handshake/open connections used? Select all that apply.
A. To ensure that lost data can be recovered if problems occur later
B. To determine how much data the receiving station can accept at one time
14. What does a dynamic TCP window field do?
C. It allows the window size to be negotiated dynamically during the TCP
session, which results in more efficient use of bandwidth.
15. UDP segments use what protocols to provide reliability?
B. Application layer protocols
16. A network redirector enables data to travel .
D. None of the above
17. An example of a client/server application is .
A. E-mail
18. The client side of the client/server relationship is .
B. The requestor of services
19. Which of the following best describes a domain name?
A. It represents the numeric address of an Internet site.
20. .com is the domain typically assigned to .
D. Corporations
21. During a Telnet connection, the remote computer is responsible for
.
B. Processing
22. At which three layers of the OSI model does Telnet primarily work?
D. Application layer, presentation layer, session layer
1102.book Page 1025 Tuesday, May 20, 2003 2:53 PM
1026 Appendix C: Check Your Understanding Answer Key
23. Typical anonymous FTP sessions use as the login ID and

as the password.
A. Anonymous; the user e-mail address
24. Instead of working with specific application programs, redirectors work with
.
A. Computer operating systems
Chapter 10
1. Which of the following best describes a WAN?
A. Connects LANs that are separated by a large geographic area
2. How do WANs differ from LANs?
A. WANs emphasize access over serial interfaces operating at lower speeds.
3. Which of the following are examples of WAN technologies?
B. Frame Relay, ISDN
4. Which layers of the OSI model do WAN standards describe?
D. Physical and data link
5. Which best describes data circuit-terminating equipment (DCE)?
D. Consists of physical devices at the end of a WAN connection
6. Which of the following components provides interface voice-grade services,
channel service units/digital service units (CSUs/DSUs) that interface T1/E1
services, and terminal adapters/Network Termination 1 (TAs/NT1s) that
interface Integrated Services Digital Network (ISDN) services?
C. Modems
7. Which of the following concentrates the dial-in and dial-out user connections?
D. Communication servers
8. Some WAN physical and data link layer standards are:
D. All of the above
1102.book Page 1026 Tuesday, May 20, 2003 2:53 PM
Chapter 10 1027
9. Match the functions with the components.
A. RAM/DRAM
B. NVRAM

C. ROM
D. Flash memory
E. Interface
Options:
A. RAM that retains its contents when a unit is powered off
B. Volatile memory that can be read and written by the microprocessor
C. Volatile memory that can be read but not written by a microprocessor
D. Nonvolatile storage that can be electrically erased and reprogrammed so that
software images can be stored, booted, and rewritten as necessary
E. Connection between two systems or devices
D. 1-b, 2-a, 3-c, 4-d, 5-e
10. Any internetwork will probably include the following:
D. All of the above
11. Which of the following are data link encapsulations for WAN?
D. All of the above
12. What are the main functions of routers?
D. Both A and B
13. Which is an IBM-designed WAN data link for Systems Network Architecture
(SNA) environments, largely being replaced by the more versatile HDLC?
C. Synchronous Data Link Control Protocol
14. Which WAN data link protocol is used for signaling and call setup on an ISDN D
channel?
A. LAPD
15. Identify the WAN circuit-switched service(s):
D. Both A and C
1102.book Page 1027 Tuesday, May 20, 2003 2:53 PM
1028 Appendix C: Check Your Understanding Answer Key
16. Which service has become an extremely popular WAN technology in its own
right, is more efficient than X.25 but with similar services, has a maximum band-
width of 44.736 Mbps, and offers extremely popular 56-Kbps and 384-Kbps

implementations in the United States?
A. Frame Relay
17. Identify the cell-switched technology/technologies:
D. Both A and B
18. Identify the common type(s) of DSL technology/technologies:
D. All of the above
19. Which is a family of very high-speed physical layer technologies with a series of
data rates available with special designations, implemented at different Optical
Carrier (OC) levels ranging from 51.84 Mbps (OC-1) to 9952 Mbps (OC-192),
that can achieve these amazing data rates by using wavelength division multi-
plexing (WDM)?
A. SONET
20. Which are the kind of routers that form the primary paths for traffic that is
sourced from and destined to other networks?
C. Backbone routers
Chapter 11
1. A router initializes by doing which of the following?
C. Loading the bootstrap, the setup procedure, and the operating system
2. During the setup process in a router, what keys can be used to escape the
sequence?
C. Ctrl + c
3. Match the configuration setting on the right with the items on the left that are
needed to establish a HyperTerminal session:
A. BAUD None
B. DATA BITS 1
C. PARITY 8
D. STOP BITS None
E. FLOW CONTROL 9600
1102.book Page 1028 Tuesday, May 20, 2003 2:53 PM

×