201. Identify the hardware component that stores the bootstrap program?
* Booter load
* Flash
Correct answer: A
ROM contains the boot strap code.
202. Which OSI layer provides mechanical, electrical, procedural for activating, maintaining physical link?
* Presentation
* Network
* Application
* Physical
* Transport
* Data-Link
Correct answer: D
Layer 1 the Physical layer performs this function.
203. Identify 2 characteristics of PPP?
* Uses LLC to establish the link
* Default serial encapsulation
* Support multiple layer 3 protocols
* Offers two types of authentication; PAP and CHAP
Correct answer: C D
PPP is not the default encapsulation and uses LCP not LLC to establish the link. It support multiple layer 3
protocols and supports authentication.
204. Identify 3 characteristics of a connection oriented protocol?
* Path determination
* Flow control
* Acknowledgements
* Uses hop count as metric
* 3 step handshake
Correct answer: B C E
Connection oriented protocols must first establish the connection (3 step handshake), employ methods to
acknowledge the receipt of data (acknowledgements) and slow down the flow of data if required (flow
205. What is the maximum hop count for IP RIP?
* Infinity
* 16
* 15
* 1
Correct answer: C
206. is the maximum hop count, underscoring the size limitation of RIP.
207. What is Cisco’s default encapsulation method on serial interfaces?
* Cisco
* Q933a
Correct answer: D
Cisco’s implementation of HDLC is only compatible with Cisco routers. It is the default encapsulation type
for serial interfaces.
208. Which of the following is a characteristic of a switch, but not of a repeater?
* Switches forward packets based on the IPX or IP address in the frame
* Switches forward packets based on the IP address in the frame
* Switches forward packets based on the MAC address in the frame
* Switches forward packets based only on the IP address in the packet
Correct answer: C
A repeater regenerates the signal it receives, a switch makes decisions based upon MAC addresses to
determine whether a frame should be forwarded. Repeaters forward all packets.
209. Ping uses which Internet layer protocol?
Correct answer: B
Internet Control Message Protocol - ICMP is a management protocol and messaging service provider for
IP. Its messages are carried as IP datagrams.
ICMP is used in the following events:
Destination Unreachable - If a router cannot send an IP packet any further, it uses an ICMP echo to send a
message back to the sender notifying it that the remote node is unreachable.
Buffer Full - If a routers memory buffer is full ICMP will send out a message to the originator.
Hops - Each IP datagram is assigned a path. This consists of hops. If it goes through the maximum number
of hops, the packet is discarded and the discarding router sends an ICMP echo to the host.
Ping - Ping use ICMP echo message to check connectivity.
210. Which is true regarding store-and-forward switching method?
* Latency varies depending on frame-length
* Latency is constant
* It is default for all Cisco switches
* It only reads the destination hardware address before forwarding the frame
Correct answer: A
Store-and-Forward switching copies the entire frame into its buffer and computes the CRC. If a CRC error
is detected, the frame is discarded, or if the frame is a runt (less than 64 bytes including the CRC) or a
giant (more than 1518 bytes including the CRC). The LAN switch then looks up the destination address in
its switching table and determines the outgoing interface. The frame is then forwarded to the outgoing
interface. Cisco Catalyst 5000 switches uses the Store-and-Forward method. The problem with Store-and-
Forward switching is latency is increased. Latency also varies with the size of the frame. The larger the
frame, the more latency associated. This of course is due to the fact that the entire frame is copied into its
buffer before being forwarded.
211. Which three of the following are true statements about connection-oriented sessions?
* The segments delivered are acknowledged back to the sender upon their reception
* Any segments not acknowledged the are retransmitted by the receiver
* A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data
* Segments are sequenced back into their proper order upon arrival at their destination
Correct answer: A C D
Connection-oriented services are useful for transmitting data from applications that are intolerant of delays
and packet re-sequencing. FTP and Telnet applications are based on connection-oriented services as well as
some voice and video programs. Any segment that is not acknowledged by the received is retransmitted by
the sender.
212. What does a metric of 16 hops represent when using RIP?
* Number of hops to the destination
* Destination unreachable
* Number of routers
* Bandwidth
Correct answer: B
Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric.
The maximum hop count is 15, 16 hops is considered unreachable. RIP updates are broadcast every 30
seconds by default. RIP has an administrative distance of 120.
213. You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you
consider when you define the subnet mask for the network?
* The location of DHCP servers
* The volume of traffic on each subnet
* The number of subnets on the network
* The location of the default gateway
* The number of host IDs on each subnet
Correct answer: C E
When determining which subnet mask to use, you must determine how many hosts and how many subnets
are required.
214. What is the difference between TCP and UDP?
* TCP is connection-oriented; UDP uses acknowledgements only
* TCP is connection-oriented; UDP is connectionless
* Both TCP and UDP are connection-oriented, but only TCP uses windowing
* TCP and UDP both have sequencing, but UDP is connectionless
The correct answer(s): B
TCP provides guaranteed connection oriented delivery of packets, UDP does not.
215. What does the ‘S’ mean when looking at the routing table?
* Statically connected
* Directly connected
* Dynamically attached
* Shutdown route
Correct answer: A
Statically connected routes are those that an administrator has manually entered into the routing table.
216. Why would you use static routing instead of dynamic routing?
* When you want automatic updates of the routing tables
* All the time
* When you have very few routes and want to conserve bandwidth
* When you have a gateway of last resort
Correct answer: C
Static routes are typically used when there are very few routes and you want to conserve bandwidth. Since
routing protocols are constantly sending their updates across the wire, it can cause a great deal of
217. On Cisco catalyst 5000 how would you set the second port on the controller in the first slot to full duplex?
* Set port duplex 1/1 full
* Set port duplex 1/2 full
* Set port duplex 0/1 full
* Set port duplex 0/2 full
Correct answer: B
The syntax is: set type duplex slot/port
1. What does the acronym ARP stand for?
* Address Resolution Phase
* ARP Resolution Protocol
* Address Resolution Protocol
* Address Recall Protocol
Correct answer: C
The Address Resolution Protocol (ARP) resolved IP addresses toMAC addresses.
2. What is the default encapsulation of Netware 3.12?
* Ethernet_II
* 802.5
* 802.2
* 802.3
Correct answer: C
The 802.2 Frame Type is the default frame-type for Netware 3.12.
3. Regarding frame relay, which of the following statements are true?
* You must use ANSI encapsulation if connecting to non-Cisco equipment
* You must use IETF encapsulation if connecting to non-Cisco equipment
* You must use Q.933a encapsulation if connecting to non-Cisco equipment
* You must use Cisco encapsulation if connecting to non-Cisco equipment
Correct answer: B
Cisco’s encapsulation for Frame relay is proprietary. To communicate with non-Cisco equipment when
using frame-relay encapsulation, the IETF method must be used.
4. What is required to support full-duplex Ethernet?
* Multiple paths between multiple stations on a link
* Automatic sensing operation by all connected stations
* Loopback and collision detection disabled
* Full-duplex NIC cards
Correct answer: C D
Full duplex ethernet requires that the NIC supports full-duplex, and loopback and collision detection are
5. Which layer is responsible for determining if sufficient resources for the intended communication
* Application
* Network
* Session
* Presentation
* Transport
Correct answer: A
The Application layer is responsible for determining if sufficient resources for the intended
communication exists.
6. What are the 2 functions of the Data Link Mac layer?
* Handles access to shared media
* Manages protocol access to the physical network medium
* Provides SAPs for higher level protocols
* Allows multiple devices to uniquely identify one another on the data link layer
Correct answer: B D
Media Access Control (MAC) -The MAC sublayer manages protocol access to the physical network
medium. The IEEE MAC specification defines MAC addresses, which allow multiple devices to uniquely
identify one another at the data link layer.
7. Describe End to End network services: (Choose all that apply)
* Best Route selection
* Accomplished Segment by Segment, each segment is autonomous
* Flow Control & Data Integrity
* Best efforts packet delivery
Correct answer: A B C D
All of the above End to End network services.
8. Which of the following provide correct information about a protocol at the transport layer of the OSI
* UDP - Provides Connectionless datagrams service
* TCP - Provides Connection Oriented Services
* SMTP - Provides Mail Exchange
* IP - Route determination
* TCP - Provides Flow Control and Error Checking
* FTP - Transfers of Files
Correct answer: A B E
Only TCP and UDP work at the Transport layer of the above choices. IP is a Network layer protocol.
SMTP and FTP are application layer protocols.
9. Which protocol works at the Internet layer and is responsible for making routing decisions?
* IP
Correct answer: B
Internet Protocol - IP provides routing and a single interface to the upper layers. No upper layer protocol
and now lower layer protocol have any functions relating to routing. IP receives segments from the
transport layer and fragments them into packets including the hosts IP address.
10. Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session
establishment, and tear down of virtual circuits?
* Session
* Network
* Physical
* Transport
* Application
* Presentation
Correct answer: D
The Transport layer does the following: Responsible for end-to-end integrity of data transmission. Handles
multiplexing upper-layer application, session establishment and tear down of virtual circuits. Hides details
of network dependent info from the higher layers by providing transparent data transfer. The ‘windows’
works at this level to control how much information is transferred before an acknowledgement is required.
11. Which of the following are logged when IP access list logging is enabled?
* source address
* protocol
* source port
* destination address
* access list number
* destination port
Correct answer: A B C D E F
All of the above are logged when IP access list logging is enabled.
12. What’s the default CDP holdtime in seconds for Cisco routers?
* 30 seconds
* 180 seconds
* 90 seconds
* 60 seconds
Correct answer: B
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information on
other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By default CDP
sends out a broadcast every 60 seconds and it holds this information for 180 seconds. CDP is enabled by
13. Which two of the following protocols are used at the Transport layer?
* BootP
Correct answer: B E
TCP and UDP operate at the Transport layer.
14. LAN stands for which of the following?
* Local Area Network
* Local Arena Network
* Local Area News
* Logical Area Network
Correct answer: A
LAN stands for Local Area Network
15. Choose three reasons why the networking industry uses a layered model:
* It facilitates systematic troubleshooting
* It allows changes in one layer to occur without changing other layers
* It allows changes to occur in all layers when changing one protocol
* It clarifies how to do it rather than what general function to be done
* It clarifies what general function is to be done rather than how to do it
Correct answer: A B E
Why do we have a Layered Model?
1) It reduces complexity
2) Allows for a standardized interface
3) Facilitates modular engineering
4) Ensures interoperable technology
5) Accelerates evolution
6) Simplifies teaching and learning
16. Which layer is responsible for identifying and establishing the availability of the intended
communication partner?
* Application
* Presentation
* Transport
* Session
* Network
Correct answer: A
The Application layer performs the following: Synchronizing sending and receiving applications. Programto
program communication. Identify and establish the availability of the intended communication partner,
and determine if sufficient resources exist for the communication. Popular application protocols include
WWW, SMTP, EDI, FTP, Telnet, and SNMP
2 Comments so far »
1. paul said,
Identify the OSI layer associated with bits?
* Physical
* Network
* Binary
* Data link
Correct answer: A
The Physical layer converts the frames to bits.
I am positive that Data Link is dealing with frames and bits - D
2. vamshi said,
Identify the OSI layer associated with bits?
* Physical
* Network
* Binary
* Data link
Correct answer: A
The Physical layer converts the frames to bits
The above ans is wrong because physical layer converts
bits into electrical signals (or) radio waves(i.e wireless)
so correct ans is D (Data link)