ccna test 79 (2)

46. Which of the following is not valid?   A. router>show version  
B. router#show running-config  
C. router#show startup-config  
D. router#show RAM  
Answer D.  
47. Which of the following are basic
router functions?   A. Packet switching  
B. Packet filtering  
C. Path determination  
D. Rapid convergence  
Packets get switched once they are determined by the router where to go.  
48. Which of the following is not an interior routing protocol?   A. RIP  
B. IGRP  
C. OSPF  
D. BGP  
BGP is an exterior routing protocol designed to communicate
between autonomous systems.  
49. Which of the following routing protocols communicate r
outer information by sending the state of it s links to all routers
in it s domain?   A. BGP  
B. RIP  
C. IGRP  
D. OSPF  
This is a "link state" routing protocol. RIP and IGRP are distance vector,
and BGP communicates reachability between domains.  
50. What is a problem caused by distance vector routing protocols?   A. Split horizon  
B. Route Poison  
C. Counting to infinity  
D. Max hop count  
E. Hold down timers  
Answers ABDE are counter measures to the counting to infinity problem caused
by distance vector protocols.  
51. What router command will display the routing protocol settings configured
on a router?  
A. show protocol  
B. Show routing protocol  
C.Show ip protocol  
D. Show running-config  
This also displays timers, neighbors, and next update info.  
52. What helps mitigate the problems with link state protocols? Choose 2   A. Minimize router resource usage.  
B. Coordinate updates  
C. Minimum hop counts  
D. Distance vectoring  
53. Which router commands will enable RIP for 176.18.0.0? Choose 2   A. router rip  
B. network 176.18.0.0  
C. network rip  
D. network rip 176.18.0.0  
Router rip enables rip. Answer B enable the router to advertise to other routers
that it is available. You must be in the global configuration prompt.  
54. Which of the following is a disadvantage with the link state protocol?
Choose 3  
A. hold down counters  
B. unsynchronized updates  
C. high network bandwidth usage  
D. high router resource usage  
As link state packets flood the network, high network bandwidth can be a problem.  
55. Which of the following exist at the application layer of the TCPIP model?
Choose 3   A. SMTP  
B. FTP  
C. ICMP  
D. RIP  
E. IGRP  
Answers D and E and routing protocols.  
56. Which of the following translate Fully Qualified Domain Names
into IP addresses?   A. Wins  
B. DNS  
C. SNMP  
D. TCP  
57. Which of the following translate netbios names?   A. Wins  
B. DNS  
C. SNMP  
D. TCP  
Netbios names are the names of the computers specified in the identification tab
in the network neighborhood properties.  
58. Which of the following is not done by TCP?   A. Subnetting  
B. Error checking  
C. Sequencing  
D. Flow control  
59. What does UDP and TCP have in common? Choose 2   A. flow control  
B. error checking  
C. checksum  
D. provide destination and source port numbers  
UDP doesn t check for errors.  
60. Which of the following does the network layer do? Choose 2   A. Packet switching  
B. Translating  
C. Path determination  
D. Convert signals to bits  
61. Which of the following about ARP is true?
Choose 2  
A. It is in the application layer  
B. It is in the network layer  
C. It maps mac addresses to ip addresses  
D. It maps ip addresses to mac addresses  
At the same layer are RARP, ICMP, and IP.
RARP does what is in answer C.  
62. What protocol in the transport layer does
not guarantee packet delivery?   A. TCP  
B. IP  
C. IPX  
D. UDP  
It does a best effort delivery, but is faster than TCP.  
63. Which of the following is a class A ip address?   A. 10.14.16.12  
B. 127.0.0.1  
C. 172.15.42.34  
D. 209.123.32.212  
64. Which of the following is a class B address?   A. 10.14.16.12  
B. 127.0.0.1  
C. 172.15.42.34  
D. 209.123.32.212  
65. Which of the following is a loop back address?   A. 10.14.16.12  
B. 127.0.0.1  
C. 172.15.42.34  
D. 209.123.32.212  
This is used to test to see if IP is configured and working properly on your pc,  
66. Which of the following is a non routable ip address? Choose 2   A. 10.10.0.0  
B. 192.168.0.1  
C. 10.14.12.12  
D. 209.32.242  
Answer A B. These are good ip addresses to use behind a fire wall because
they will never be addresses that will be used on the internet.  
67. Which of the following binary numbers represent 10.12.16.6   A. 00001010.00001100.00010000.00000110  
B. 00011110.01010000.11001100.00110101  
C. 01101010.11001010.01000101.01010011  
D. 10001001.11010101.11111111.00000000  
D cannot be used at all because you can t have all 1 s or 0 s  
68. What does the process of AND in do?   A. It determines the value of an ip address  
B. It determines the port that TCP will use  
C. It determines if two ip addresses are on the same network  
D. It decides the ip address subnet  
You do this by writing out all the ip addresses in binary and match them
against their subnets.After you match up the 1 s and 0 s you can decide
if they are on the same network by seeing if all the numbers match.
Check the test info page for an example.  
69. Which of the following is a class C address?   A. 124.12.13.44  
B. 210.24.56.76  
C. 127.0.0.1  
D. 10.14.12.16  
An address above 191 for the first octet shows a class C address.  
70. Of the following address address 11100000.11000000.11110000.10000000,
what is true? Choose 2  
A. It is a class C address  
B. It has a host id of 192.224.128  
C. It has a host id 128  
D. It is a class B address.  
71. Which layer is responsible for providing mechanisms for
multiplexing upper-layer application, session establishment,
and tear-down of virtual circuits?  
A. Application  
B. Presentation  
C. Session  
D. Transport  
72. Which layer is responsible for coordinating communication
between systems?   A. Application  
B. Presentation  
C. Session  
D. Physical  
73. Which layer is responsible for negotiating data transfer syntax?  
A. application  
B. presentation  
C. session  
D. transport  
74. Which of the following is a characteristic of a switch,
but not of a repeater?  
A. Switches forward packets based on the IPX or IP address in the frame.  
B. Switches forward packets based only on the IP address in the packet.  
C. Switches forward packets based on the IP address in the frame  
D. Switches forward packets based on the MAC address in the frame  
Switches are network device that filters, forwards, and floods frames based
on the destination address of each frame.
The switch operates at the data link layer of the OSI model.
Switches use layer 2 addresses to filter the network  
75. How does the cut-through switching technique work?  
A. The LAN switch copies the entire frame into its buffers and then looks up
the destination address in its forwarding, table and determines the outgoing interface  
B. The switch waits only for the header to be received
before it checks the destination address and starts forwarding the packets  
C. By using broadcast addresses as source addresses  
D. By using a Class II repeater in a collision domain  
Packet switching approach that streams data through a switch
so that the leading edge of a packet exits the switch at the output port before
the packet finishes entering the input port. A device using cut-through packet switching reads, processes, and forwards packets
as soon as the destination address is looked up, and the outgoing port determined.
Also known as on-the-fly packet switching
76. How do switches use store and forward?   A. The switch waits only for the header to be received  
before it checks the destination address and starts
forwarding the packets  
B. The LAN switch copies the entire frame into
its buffers and then looks up the destination address
in its forwarding, table and determines
the outgoing interface  
C. By using a class II repeater in a collision domain  
D. By using broadcast addresses as source addresses  
Packet-switching technique in which frames are completely processed
before being forwarded out the appropriate port.
This processing includes calculating the CRC and checking the destination address.
In addition, frames must be temporarily stored until network resources
(such as an unused link) are available to forward the message. Contrast
with cut-through packet switching.  
77. Choose all of the following that are needed to support full-duplex Ethernet.  
A. Multiple paths between multiple stations on a link  
B. Full-duplex NIC cards  
C. Loop back and collision detection disabled  
D. Automatic detection of full-duplex operation by all connected stations  
Capability for simultaneous data transmission between a sending station
and a receiving station.  
78. What two types of technology does 100BaseT use?  
A. Switching with 53-byte cells  
B. CSMA/CD  
C. IEEE 802.5  
D. 802.3u  
100-Mbps baseband Fast Ethernet specification using UTP wiring.
Like the 10BaseT technology on which it is based, 100BaseT sends link
pulses over the network segment when no traffic is present. However,
these link pulses contain more information than those used in 10BaseT.
Based on the IEEE 802.3 standard.  
79. Choose all of the following that are advantages
to segmenting with routers.  
A. Manageability  
B. Flow control  
C. Explicit packet lifetime control  
D. Multiple active paths  
All of the above is correct.
A router is a Network layer device that uses one or more metrics
to determine the optimal path along which network traffic should be forwarded.
Routers forward packets from one network to another based on network layer information.
­
        All from www.chinaitlab.com   Thanks.
 
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值