正文

CCNA 801 Certification Practice Exam #12007-09-23 18:47:00

【评论】 【打印】 【字体: 】 本文链接:http://blog.pfan.cn/ccna/29620.html

分享到:

 

 

24

 Take Assessment - CCNA 801 Certification Practice Exam #1 (下) - CCNA 4 WAN Technologies (Version 3.1)

Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)

BECN
DLCI
DE
FECN
LMI
Inverse ARP

25


A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?
Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco
Router(config)# line virtual terminal
Router(config-line)# enable login
Router(config-line)# password cisco
Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco
Router(config)# enable secret cisco
Router(config)# enable cisco
26
A network administrator is evaluating authentication protocols for a PPP link. Which of the following reasons might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
establishes identities with a two-way handshake
uses a three-way authentication periodically during the session to reconfirm identities
control by the remote host of the frequency and timing of login events
transmits login information in encrypted format
uses an unpredictable variable challenge value to prevent playback attacks
makes authorized network administrator intervention a requirement to establish each session

*27


Refer to the graphic. Two switches are connected together through a trunk port. SW2 displays the message shown. Which of the following will solve the duplex mismatch?
SW1(config)# interface fastethernet 0/1
SW1(config-if)# duplex full
SW1(config)# interface fastethernet 0/1
SW1(config-if)# full-duplex
SW2(config)# interface fastethernet 0/1
SW2(config-if)# duplex full
SW2(config)# interface fastethernet 0/1
SW2(config-if)# full-duplex

 
28
Which of the following is a characteristics of TCP? (Choose two.)
data transport reliability
best path determination
establishing, maintaining, and terminating virtual circuits
encapsulation of packets in a data frame with source and destination MAC addresses
best-effort datagram delivery

29
Which of the following application layer protocols use TCP? (Choose three.)
SMTP
FTP
SNMP
HTTP
TFTP
DHCP

30
Which of the following router commands will verify that a path exists to a destination network?
Router# show ip interfaces brief
Router# show ip route
Router# show cdp neighbors
Router# show running-config
Router# show protocols
31
Which of the following are used to prevent routing loops in networks that use distance vector routing protocols? (Choose 2.)
link-state advertisements (LSA)
Spanning Tree Protocol
shortest path first tree
split horizon
hold-down timers

*32
Which two statements are true about the committed information rate on a Frame Relay link? (Choose two.)
The sum of the CIRs for all PVCs must be less than the port speed.
The sum of the CIRs for all PVCs must equal the port speed.
The sum of the CIRs for all PVCs can be greater than the port speed.
The DE bit will be set on frames that are transmitted in excess of the CIR.
Frames that are transmitted at greater than the CIR will be discarded at the source.
It is impossible to transmit frames at a rate in excess of the CIR.

33
Which of the following statements are true regarding PPP? (Choose three.)
PPP can use synchronous and asynchronous physical media.
PPP can only be used between two Cisco devices.
PPP carries packets from several network layer protocols in LCPs.
PPP uses LCPs to establish, configure, and test the data link connection.
PPP uses LCPs to agree on format options such as authentication, compression, and error detection.

34
Which sequence of commands is used to configure a loopback address on a router?
Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1
Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1
Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.0
Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.255

35
Which statement is true regarding the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)
A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.
192.168.7.9 is the destination network for this route.
192.168.7.24 is the next-hop router in this command.
This command is issued from the interface configuration mode.
This command is used to define a static route.

36


Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?
EIGRP does not support VLSM.
The routers were not configured to monitor neighbor adjacency changes.
The default bandwidth was used on the routers.
An incorrect IP address was configured on a router interface.

37
Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)
most
host
all
any
some
sum

*38
Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)
improper placement of enterprise level servers
addition of hosts to a physical segment
replacement of hubs with workgroup switches
increasing use of bandwidth intensive network applications
creation of new collision domains without first adding network hosts
migration to full-duplex Ethernet within the LAN

39
Which statements are true regarding the Frame Relay LMI? (Choose three.)
The LMI provides a virtual circuit (VC) status mechanism.
The LMI type must always be manually configured.
The available LMI types are NI1, DMS100 and 5ESS.
The LMI types supported by Cisco routers are CISCO and IETF.
The LMI type configured on the router must match the one used on the Frame Relay switch.
The LMI uses reserved DLCIs to exchange messages between the DTE and DCE.

*40


The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements that are true. (Choose two.)
CDP operates at the network layer of the OSI model.
The output of this command displays information about directly connected Cisco devices only.
The switch is attached to the SanJose1 FastEthernet0/21 interface.
SanJose1 is running CDP version 12.0.
SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.
SanJose2 is a 2600 series router running several routed protocols.
36


Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?
EIGRP does not support VLSM.
The routers were not configured to monitor neighbor adjacency changes.
The default bandwidth was used on the routers.
An incorrect IP address was configured on a router interface.

37
Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)
most
host
all
any
some
sum

38
Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)
improper placement of enterprise level servers
addition of hosts to a physical segment
replacement of hubs with workgroup switches
increasing use of bandwidth intensive network applications
creation of new collision domains without first adding network hosts
migration to full-duplex Ethernet within the LAN

39
Which statements are true regarding the Frame Relay LMI? (Choose three.)
The LMI provides a virtual circuit (VC) status mechanism.
The LMI type must always be manually configured.
The available LMI types are NI1, DMS100 and 5ESS.
The LMI types supported by Cisco routers are CISCO and IETF.
The LMI type configured on the router must match the one used on the Frame Relay switch.
The LMI uses reserved DLCIs to exchange messages between the DTE and DCE.

*40


The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements that are true. (Choose two.)
CDP operates at the network layer of the OSI model.
The output of this command displays information about directly connected Cisco devices only.
The switch is attached to the SanJose1 FastEthernet0/21 interface.
SanJose1 is running CDP version 12.0.
SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.
SanJose2 is a 2600 series router running several routed protocols.
41


Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two).
3 collision domains
3 broadcast domains
5 broadcast domains
9 collision domains
10 collision domains
13 collision domains

42
The output of the show ip interfaces brief command indicates that Serial0 is up but the line protocol is down. Which of the following are possible causes for the line protocol being in the down state? (Choose two.)
The clock rate is not set on the DTE.
An incorrect default gateway is set on the router.
A network is missing from the routing protocol configuration.
The encapsulation on the Serial0 interface is incorrect.
Keepalives are not being sent by the remote device.

43
What is the purpose of the Spanning Tree Protocol (STP)?
prevents Layer 2 loops
prevents routing loops on a router
creates smaller collision domains
creates smaller broadcast domains
allows Cisco devices to exchange routing table updates

44
When EIGRP is configured on a router, which table of DUAL information is used to calculate the best route to each destination router?
router table
topology table
DUAL table
CAM table
ARP table

45
Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?
172.0.0.0
172.16.134.0
172.16.134.32
172.16.134.48
172.16.134.47
172.16.134.63
46
Which two commands show when the last RIP routing update was received? (Choose two.)
Router# show ip protocols
Router# show version
Router# show interfaces
Router# show ip updates
Router# show ip route

47
Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup, signaling, and termination?
show interface bri0/0
show isdn active
debug isdn q921
debug isdn q931
debug ppp negotiation
debug ppp authentication

48
What information is displayed in the output of the show interfaces serial 0/0 command for a Frame Relay connection?
the DCLI-to-IP address mappings for each PVC
the number of PVCs that are active on the router
the number of BECN packets sent
the encapsulation type

49


Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)
The missing information for Blank 1 is the command show ip route.
The missing information for Blank 1 is the command debug ip route.
The missing information for Blank 2 is the number 100.
The missing information for Blank 2 is the number 120.
The missing information for Blank 3 is the letter R.
The missing information for Blank 3 is the letter C.

50
Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?
Ports are manually configured to be in the forwarding state.
Ports listen and learn before going into the forwarding state.
Ports must be blocked before they can be placed in the disabled state.
It takes 15 seconds for a port to go from blocking to forwarding.

51
Which commands are used to verify the content and placement of access control lists? (Choose three.)
show ip interface
show ip route
show processes
show running-config
show cdp neighbor
show access-lists

52
Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)
192.168.14.8
192.168.14.16
192.168.14.24
192.168.14.32
192.168.14.148
192.168.14.208

53
A Catalyst switch must be in which VTP mode in order to delete or add VLANs to a management domain?
client
server
domain
transparent
designated

54
Which of the following are required when creating a standard access control list? (Choose two.)
destination address and wildcard mask
source address and wildcard mask
subnet mask and wildcard mask
access list number between 100 and 199 or 2000 and 2699
access list number between 1 and 99 or 1300 to 1999

55
Why are static routes often used with ISDN DDR?
They are more stable than dynamic routing protocols.
They are more accurate than dynamic routing protocols because they are put in by a network administrator.
They are easier to modify when a faster technology is installed.
They prevent the unnecessary activation of the link.

56
Which statement describes the process that occurs in Network Address Translation (NAT) overloading?
Multiple private IP addresses are mapped to one public IP address.
The number of usable addresses assigned to a company is divided into smaller manageable groups.
A pool of IP addresses are mapped to one or more MAC addresses.
The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured.

57


Refer to the graphic. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?
192.168.16.63/27
192.168.16.158/27
192.168.16.192/27
192.168.16.113/30
192.168.16.145/30
192.168.16.193/30

58
Which statements are true regarding the command sequence shown below? (Choose three.)

RouterA(config)# interface loopback 0
RouterA(config-if)# ip address 192.168.31.33 255.255.255.255
It creates a virtual, software only, interface.
It uses a wildcard mask of 255.255.255.255.
It ensures than an interface is always active for OSPF processes.
It provides a way to test the convergence of OSPF routing updates.
The mask of 255.255.255.255 is called a host mask.
These commands can only be issued to configure serial interfaces.
 
Google
 

阅读(17469) | 评论(6)


版权声明:编程爱好者网站为此博客服务提供商,如本文牵涉到版权问题,编程爱好者网站不承担相关责任,如有版权问题请直接与本文作者联系解决。谢谢!

评论

loading...
您需要登录后才能评论,请 登录 或者 注册