Question 1:
If you want to turn off the name-to-address
translation in the router, which command would you use?
A. no ip host
B.
no ip address
C. no ip name-search
D. no ip domain-lookup
Question 2:
Which of the following best describes TCP/IP?
A. 7
Layer Model that enables communication among any set of interconnected networks
B. Proprietary protocol that can only be used with WANs
C. Proprietary
protocol that can only be used with LANs
D. Allows communication among a variety of interconnected networks and
can be used in both LANs and WANs
Question 3:
Which of the following best describes the TCP/IP
protocol stack?
A. Transfers information in a sequence of datagrams.
B. Enables communication among any set of interconnected networks.
C. Maps
closely to the OSI reference model in the upper layers.
D. Reassembles
datagrams into complete messages at the receiving location.
Question 4:
A router received a packet with a destination address
of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet
network address for the destination host?
A. 172.16.1.0
B. 172.16.4.0
C. 172.16.8.0
D. 172.16.12.0
Question 5:
What is the purpose of ICMPs?
A. They put the
internetwork in control mode so that protocols can be set up.
B. They are
messages that the network uses to monitor connection protocols.
C. They are
standard binary messages that act as model internetwork protocols.
D. They are messages carried in IP datagrams used to send error and
control messages.
Question 6:
If a router has a serial interface S0, with IP address
107.85.20.2, using a subnet mask of 255.255.255.240, what is the broadcast
address used for hosts on this subnet?
A. 107.85.20.15
B. 107.85.20.255
C. 107.85.255.255
D. 107.255.255.255
Question 7:
What provides sequencing of segments with a forward
reference acknowledgment, numbers datagrams before transmission, and reassembles
the segments into a complete message?
A. Simple UDP acknowledgment
B.
Expectational acknowledgments
C. TCP sequence and acknowledgment numbers
D. Header checksums and data protocol checksums
Question 8:
What will the source do if it is using a window size
that is too large for the destination to handle and does not receive an
acknowledgement from the destination?
A. Resend the data
B. Stop sending
data
C. Confirm the window size with the destination
D. Query the
destination to see if the line is still up
Question 9:
If you want to specify one or more hosts that supply
host name information, which command would you use?
A. ip host
B. ip
address
C. ip name-server
D. ip domain-lookup
Question 10:
In the output of show hosts , what does perm
mean?
A. The entry has not yet expired.
B. The entry was acquired from
DNS use.
C. The entry was learned from DNS and now has permanent status.
D. The entry was manually configured in a static host table.
Question 11:
What is the purpose of ICMP testing?
A. Determines if messages reach their destination
B. Makes sure that all activity on the
network is being monitored
C. Determines if the network is in privileged
mode or user mode
Question 12:
At which Layer of the OSI model would flow control
problems exist?
A. Application
B. Presentation
C. Session
D. Transport
Question 13:
If a device on a network does not know its Layer 3
address how can it find it?
A. ARP
B. RARP
C. Sends an alert to the
network administrator.
D. Broadcasts a request to the Domain Name Server
(DNS) for help.
Question 14:
What is the purpose of the protocol field?
A.
Allows dynamic generation of source protocols
B. Changes other protocols so
that they can be used by IP
C. Numbers the Layer 3 protocol and makes it
similar to a port number
D. Determines the Layer 4 protocol being carried within an IP datagram
Question 15:
Which command locates path failures from the source
to destination?
A. ARP
B. Ping
C. Trace
D. Telnet
Question 16:
If Host A is setting up a three-way handshake with
Host B, and Host A sends a segment with sequence number n to Host B, what is
Host B going to send back to Host A as an acknowledgment?
A. n
B. n1
C. n + n
D. n + 1
Question 17:
Which protocol is found in the Transport Layer?
A.
IPX
B. LLC
C. RIP
D. UDP
Question 18:
What is one way port numbers are used?
A. Source
systems generate port numbers to predict destination addresses.
B. To keep track of different conversations crossing the network at
the same time.
C.
Source systems use port numbers to keep session organized and to select the
proper application.
D. End systems use port numbers to dynamically assign
end users to a particular session, depending on their application use.
Question 19:
If you want to associate a name with an IP address,
such as asu 129.219.2.1, what command structure would you use?
A. ip name asu
129.219.2.1
B. ip host asu 129.219.2.1
C. ip host name asu 129.219.2.1
D. ip host address asu 129.219.2.1
Question 20:
How are IP addresses usually expressed?
A. Binary
code
B. 4 octet subnet mask
C. 32-bit dotted decimal
D. Transmission
control protocol
Question 21:
How does the Cisco IOS software deal with
name-to-address mappings?
A. It does not use name-to-address mappings.
B.
It takes each IP address and assigns a unique name to it.
C. It identifies
the subnet mask being used at the destination site and routes data there.
D. It maintains a cache of host name-to-address mappings for use by
commands.
Question 22:
What does the response * mean, when it comes in response to the trace command
A. The network refused the trace.
B. Timed out waiting for trace reply.
C. The destination device refused the trace.
D. The source used a trace that was not supported by the network protocol.
Question 23:
What best describes the function of broadcast
addresses?
A. Used to send a message to all nodes on a network/subnet.
B.
Used to send a message to a single network destination.
C. Used to send a
message to every node the router has access to.
D. Used to send a message to
every router on a network in a WAN.
Question 24:
What is the function of ARP?
A. It is used to map
a known MAC address to an unknown IP address.
B. It is used to develop a
cached Layer 4 address resource table.
C. It is used to map a known IP address to an unknown MAC address.
D. It sends a broadcast message looking
for the router IP address.
Question 25:
Which layer in the TCP/IP model includes file transfer, e-mail, remote login,
and network management?
A. Application
B. Transport
C. Internet
D. Network
Risposte: DDBCD ACACD ADBDC DDBBC DBACA