1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 106 potx

10 428 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 160,69 KB

Nội dung

Chapter 6 1019 2. What is the maximum distance for thick Ethernet without using a repeater? C. 500m (1640.4 ft.) 3. 10-Mbps Ethernet operates within the timing limits offered by a series of no more than segments separated by no more than repeaters. C. Five, four 4. Fast Ethernet supports up to what transfer rate? C. 100 Mbps 5. Identify two Gigabit Ethernet cable specifications. C. 1000BASE-SX D. 1000BASE-LX 6. What is the transmission medium for 1000BASE-SX? D. Short-wave laser over multimode fiber 7. 4D-PAM5 encoding method is used in which of the following Gigabit Ethernet? C. 1000BASE-T 8. What is the IEEE standard for 10-Gb Ethernet? C. 802.3ae 9. Which of the following is not a feature of microsegmentation? D. It increases collisions. 10. Which of the following is used by LAN switches for making the forwarding decision? B. MAC address 11. Which of the following is a feature of full-duplex transmission? D. All of the above. 12. The three common types of switching methods are , , and . Answer: store-and-forward, cut-through, and fragment-free 13. The Spanning-Tree Protocol allows which of the following? B. A redundant network path without suffering the effects of loops in the network 1102.book Page 1019 Tuesday, May 20, 2003 2:53 PM 1020 Appendix C: Check Your Understanding Answer Key 14. Which of the following is not one of the STP port states? D. Transmitting 15. Which of the following is true concerning a bridge and its forwarding decisions? C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions. 16. Which of the following is not a feature of bridges? C. They do not make any forwarding decisions. 17. Which of the following statements is true of microsegmentation? A. Each workstation gets its own dedicated segment through the network. 18. Which of the following is true for LAN switches? B. They are very high-speed multiport bridges. Chapter 7 1. What transport layer protocol does TFTP use? C. UDP 2. Which of the following is a basic service of the transport layer? D. All of the above 3. Which of the following protocols operate at the TCP/IP Internet layer? D. All of the above 4. What is the first thing that happens when a DHCP client boots? C. DHCPDISCOVER 5. How does the network layer forward packets from the source to the destination? A. By using a routing table 6. If a device doesn’t know the MAC address of a device on an adjacent network, it sends an ARP request to what? D. All of the above 7. What is in a RARP request? A. A MAC header and the RARP request message 1102.book Page 1020 Tuesday, May 20, 2003 2:53 PM Chapter 7 1021 8. What are the two parts of an IP address? A. Network address and host address 9. What Internet protocol is used to map a known IP address to an unknown MAC address? C. ARP 10. Which of the following initiates an ARP request? D. A device that cannot locate the destination MAC address in its ARP table 11. Which of the following best describes an ARP table? D. A section of RAM on each device that maps IP addresses to MAC addresses 12. Which of the following best describes the ARP reply? A. A device sends its MAC address to a source in response to an ARP request 13. Why are current, updated ARP tables important? B. For limiting the number of broadcasts 14. Why is a RARP request made? A. A source knows its MAC address but not its IP address. 15. Which of the following best describes TCP/IP? A. It is a suite of protocols that can be used to communicate across any set of interconnected networks. 16. Which of the following does not describe the TCP/IP protocol stack? A. It maps closely to the OSI reference model’s upper layers. 17. The TCP/IP protocol suite has specifications for which layers of the OSI model? C. 3, 4, and 5 through 7 18. Which of the following is not a function of the network layer? D. UDP provides connectionless exchange of datagrams without acknowledgments. 19. Which of the following is one of the protocols found at the transport layer? B. UDP 1102.book Page 1021 Tuesday, May 20, 2003 2:53 PM 1022 Appendix C: Check Your Understanding Answer Key Chapter 8 1. How many bits are in an IP address? B. 32 2. What is the maximum value of each octet in an IP address? B. 255 3. The network number plays what part in an IP address? A. It specifies the network to which the host belongs. 4. The host number plays what part in an IP address? B. It designates which node on the subnetwork is being addressed. 5. What is the decimal equivalent of the binary number 101101? C. 45 6. Convert the decimal number 192.5.34.11 to its binary form. A. 11000000.00000101.00100010.00001011 7. Convert the binary IP address 11000000.00000101.00100010.00001011 to its decimal form. D. None of the above 8. What portion of the Class B address 154.19.2.7 is the network address? B. 154.19 9. What portion of the IP address 129.219.51.18 represents the network? A. 129.219 10. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0? B. 123.10.255.255 11. How many host addresses can be used in a Class C network? B. 254 12. How many subnets can a Class B network have? D. None of the above 13. What is the minimum number of bits that can be borrowed to form a subnet? B. 2 1102.book Page 1022 Tuesday, May 20, 2003 2:53 PM Chapter 8 1023 14. What is the primary reason for using subnets? C. To reduce the size of the broadcast domain 15. How many bits are in a subnet mask? B. 32 16. Performing the Boolean function as a router would on the IP addresses 131.8.2.5 and 255.0.0.0, what is the network/subnetwork address? D. None of the above 17. How many bits can be borrowed to create a subnet for a Class C network? C. 6 18. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been borrowed to create a subnet? C. 3 19. Performing the Boolean function as a router would on the IP addresses 172.16.2.120 and 255.255.255.0, what is the subnet address? C. 172.16.2.0 20. Which of the following best describes one function of Layer 3, the network layer, in the OSI model? C. It determines which is the best path for traffic to take through the network. 21. What function allows routers to evaluate available routes to a destination and to establish the preferred handling of a packet? B. Path determination 22. How does the network layer forward packets from the source to the destination? A. By using an IP routing table 23. What are the two parts of a network layer address that routers use to forward traffic through a network? A. Network address and host address 1102.book Page 1023 Tuesday, May 20, 2003 2:53 PM 1024 Appendix C: Check Your Understanding Answer Key Chapter 9 1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly. Repeating your words can be compared to , and the need to speak slowly can be compared to the functions of the transport layer. A. Reliability; flow control 2. The following characteristics describe what TCP/IP protocol: connection- oriented; resends anything not received; divides outgoing messages into segments. B. TCP 3. What does the window field in a TCP segment indicate? D. Number of octets that the device is willing to accept 4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP 5. What do TCP and UDP use to keep track of different conversations crossing a network at the same time? A. Port numbers 6. How does TCP synchronize a connection between the source and the destination before data transmission? B. Three-way handshake 7. Which range of port numbers is unregulated? D. Above 1023 8. With TCP transmission, what occurs if a segment is not acknowledged in a certain time period? D. Retransmission occurs. 9. Which best describes flow control? C. A method of preventing buffer overrun 10. Which of the following best describes the purpose of the TCP/IP protocol stack? C. Transfers information from one host to another in a sequence of datagrams 1102.book Page 1024 Tuesday, May 20, 2003 2:53 PM Chapter 9 1025 11. Which of the following is one of the protocols found in the transport layer? B. UDP 12. What is the purpose of port numbers? A. They keep track of different upper-layer conversations crossing the network at the same time. 13. Why are TCP three-way handshake/open connections used? Select all that apply. A. To ensure that lost data can be recovered if problems occur later B. To determine how much data the receiving station can accept at one time 14. What does a dynamic TCP window field do? C. It allows the window size to be negotiated dynamically during the TCP session, which results in more efficient use of bandwidth. 15. UDP segments use what protocols to provide reliability? B. Application layer protocols 16. A network redirector enables data to travel . D. None of the above 17. An example of a client/server application is . A. E-mail 18. The client side of the client/server relationship is . B. The requestor of services 19. Which of the following best describes a domain name? A. It represents the numeric address of an Internet site. 20. .com is the domain typically assigned to . D. Corporations 21. During a Telnet connection, the remote computer is responsible for . B. Processing 22. At which three layers of the OSI model does Telnet primarily work? D. Application layer, presentation layer, session layer 1102.book Page 1025 Tuesday, May 20, 2003 2:53 PM 1026 Appendix C: Check Your Understanding Answer Key 23. Typical anonymous FTP sessions use as the login ID and as the password. A. Anonymous; the user e-mail address 24. Instead of working with specific application programs, redirectors work with . A. Computer operating systems Chapter 10 1. Which of the following best describes a WAN? A. Connects LANs that are separated by a large geographic area 2. How do WANs differ from LANs? A. WANs emphasize access over serial interfaces operating at lower speeds. 3. Which of the following are examples of WAN technologies? B. Frame Relay, ISDN 4. Which layers of the OSI model do WAN standards describe? D. Physical and data link 5. Which best describes data circuit-terminating equipment (DCE)? D. Consists of physical devices at the end of a WAN connection 6. Which of the following components provides interface voice-grade services, channel service units/digital service units (CSUs/DSUs) that interface T1/E1 services, and terminal adapters/Network Termination 1 (TAs/NT1s) that interface Integrated Services Digital Network (ISDN) services? C. Modems 7. Which of the following concentrates the dial-in and dial-out user connections? D. Communication servers 8. Some WAN physical and data link layer standards are: D. All of the above 1102.book Page 1026 Tuesday, May 20, 2003 2:53 PM Chapter 10 1027 9. Match the functions with the components. A. RAM/DRAM B. NVRAM C. ROM D. Flash memory E. Interface Options: A. RAM that retains its contents when a unit is powered off B. Volatile memory that can be read and written by the microprocessor C. Volatile memory that can be read but not written by a microprocessor D. Nonvolatile storage that can be electrically erased and reprogrammed so that software images can be stored, booted, and rewritten as necessary E. Connection between two systems or devices D. 1-b, 2-a, 3-c, 4-d, 5-e 10. Any internetwork will probably include the following: D. All of the above 11. Which of the following are data link encapsulations for WAN? D. All of the above 12. What are the main functions of routers? D. Both A and B 13. Which is an IBM-designed WAN data link for Systems Network Architecture (SNA) environments, largely being replaced by the more versatile HDLC? C. Synchronous Data Link Control Protocol 14. Which WAN data link protocol is used for signaling and call setup on an ISDN D channel? A. LAPD 15. Identify the WAN circuit-switched service(s): D. Both A and C 1102.book Page 1027 Tuesday, May 20, 2003 2:53 PM 1028 Appendix C: Check Your Understanding Answer Key 16. Which service has become an extremely popular WAN technology in its own right, is more efficient than X.25 but with similar services, has a maximum band- width of 44.736 Mbps, and offers extremely popular 56-Kbps and 384-Kbps implementations in the United States? A. Frame Relay 17. Identify the cell-switched technology/technologies: D. Both A and B 18. Identify the common type(s) of DSL technology/technologies: D. All of the above 19. Which is a family of very high-speed physical layer technologies with a series of data rates available with special designations, implemented at different Optical Carrier (OC) levels ranging from 51.84 Mbps (OC-1) to 9952 Mbps (OC-192), that can achieve these amazing data rates by using wavelength division multi- plexing (WDM)? A. SONET 20. Which are the kind of routers that form the primary paths for traffic that is sourced from and destined to other networks? C. Backbone routers Chapter 11 1. A router initializes by doing which of the following? C. Loading the bootstrap, the setup procedure, and the operating system 2. During the setup process in a router, what keys can be used to escape the sequence? C. Ctrl + c 3. Match the configuration setting on the right with the items on the left that are needed to establish a HyperTerminal session: A. BAUD None B. DATA BITS 1 C. PARITY 8 D. STOP BITS None E. FLOW CONTROL 9600 1102.book Page 1028 Tuesday, May 20, 2003 2:53 PM . number 10 110 1? C. 45 6. Convert the decimal number 19 2. 5.34 .11 to its binary form. A. 11 000000.0000 010 1.0 010 0 010 .000 010 11 7. Convert the binary IP address 11 000000.0000 010 1.0 010 0 010 .000 010 11 to. transport layer? B. UDP 11 02. book Page 10 21 Tuesday, May 20 , 20 03 2: 53 PM 10 22 Appendix C: Check Your Understanding Answer Key Chapter 8 1. How many bits are in an IP address? B. 32 2. What is the maximum. portion of the Class B address 15 4 .19 .2. 7 is the network address? B. 15 4 .19 9. What portion of the IP address 12 9. 21 9 . 51. 18 represents the network? A. 12 9. 21 9 10 . Which of the following addresses

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

w