Review Questions
1. Which of the following statements about the functions of a hub are accurate? (Choose two.)
a. A hub extends an Ethernet LAN.
e. A hub amplifies the data signal before retransmitting it.
2. Which of the following statements best describe collisions? (Choose three.)
a. Collisions occur when two or more stations on a shared media transmit at the same time.
c. In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.
e. Collisions are by-products of a shared LAN.
3. Which of these choices best describes a collision domain?
c. Network segments that share the same bandwidth
4. What type of hardware will help eliminate collisions?
b. Bridge
5. Which of the following factors are typical causes of network congestion? (Choose three.)
a. High-bandwidth applications
c. Increasing volume of network traffic
e. Few network segments
6. Which of the following are characteristics of a bridge? (Choose three.)
b. Bridges maintain MAC address tables.
d. Bridges can buffer and forward frames between two or more LAN segments.
e. Bridges create fewer collision domains.
7. Which of the following are major benefits of adding a bridge to a network? (Choose two.)
a. Isolating potential network problems to specific segments
e. Forwarding data frames between LAN segments
8. Match each of the following terms related to the operation of a switch in a network to its description.
_B_ If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame.
_C_ If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment.
_A_ If the switch does not have an entry for the destination address, it will transmit
the frame out of all ports except the port on which it received the frame.
a. Flooding
b. Filtering
c. Forwarding
9. Which of the following characteristics apply to a switch? (Choose three.)
a. Uses a table of MAC addresses to determine the port to which the data is to be sent
b. Connects LAN segments
d. Increases the number of collision domains
10. Which of the following features differentiate switches from bridges? (Choose three.)
a. Large frame buffers
c. Support for mixed media rates
d. High port densities
11. Which of the following statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.)
a. Switches operate at much higher speeds than bridges.
c. Switches support more advanced functionality than bridges.
e. Switches support dedicated communication between devices.
12. Which of the following statements about microsegmentation are accurate? (Choose three.)
b. Microsegmentation increases bandwidth availability.
c. Each device on a network segment is connected directly to a switch port.
d. Microsegmentation eliminates collisions.
13. Match each of the following function descriptions with either full-duplex or halfduplex
communication.
_B_ The network sends and receives data frames one at a time, but not
simultaneously.
_A_ This communication type effectively doubles the amount of bandwidth
between the devices.
_A_ The network sends and receives data frames simultaneously.
a. Full-duplex communication
b. Half-duplex communication
14. Match each of the following connectivity functions to the appropriate Ethernet type.
_B_ At the end-user level, gives high-performance PC workstations 100-Mbps access to a server
_C_ Not typically used at the end-user level
_A_ At the workgroup level, provides connectivity between the end user and workgroups
_B_ At the backbone level, provides interswitch connectivity for low- to medium volume applications
_B_ At the workgroup level, provides high-performance connectivity to the enterprise server
_C_ At the backbone level, provides backbone and interswitch connectivity
_A_ At the end-user level, provides connectivity between the end user and the userlevel switch
_C_ Provides interswitch connectivity for low- to medium-volume applications
a. Ethernet 10BASE-T
b. Fast Ethernet
c. Gigabit Ethernet
15. When a Cisco device starts up, which of the following does it run to check its hardware?
c. POST
16. When a Catalyst switch or Cisco router starts up, what is the first operation performed?
b. The device performs hardware checking routines.
17. Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____.
b. TFTP server
18. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration.
d. auxiliary port
di.
19. Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
d. Privileged EXEC level
20. How do you instruct a Cisco device to parse and execute an entered command?
b. Press the Enter key.
21. Which CLI prompt indicates that you are working in privileged EXEC mode?
a. hostname#
22. Which command would you enter in the privileged EXEC mode to list the command options?
a. ?
23. Match each of the following steps of the physical Catalyst switch startup process to its description.
_A_ Step 1
_B_ Step 2
_C_ Step 3
a. Attach the power cable plug to the switch power supply socket.
b. Observe the boot sequence, including the Cisco IOS Software output text on the console.
c. Verify that all cable connections are secure, the terminal is connected to the console port, and the console terminal application is selected.
24. How do you start a Catalyst 2950 series switch?
d. Attach the power cable plug to the switch power supply socket.
25. If the POST completes successfully on a Catalyst switch, what display could you see on the console?
a. The > prompt
26. What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch?
a. c?
27. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with “config”?
b. config ?
28. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch?
d. ip address 196.125.243.10 255.255.255.0
29. Which configuration mode do you use to configure a particular port on a switch?
c. Interface configuration mode
30. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
c. Address is 0050.BD73.E2C1
31. Which show command requires you to have privileged EXEC mode access?
c. show running
32. How should you power up a Cisco router?
b. Turn the power switch to “On.”
.
33. Which of the following would be considered a physical threat? (Choose two.)
b. Someone turning off the power to the switch to block network access
c. Someone turning off the air conditioning system in the network closet
34. Which of the following can be protected with a password? (Choose four.)
a. Console access
b. VTY access
c. TTY access
e. EXEC-level access
35. Which of the following is a customized text that is displayed before the username and password login prompts?
b. Login banner
36. Which of the following is the most secure method of remotely accessing a network device?
c. SSH
37. Which of the following is an IOS command that can be used to control access to a switch port based on a MAC address?
b. port-security
38. Which of the following is an IOS command that can be used to increase the security of unused switch ports?
a. shutdown
39. Which problem is caused by redundant connections in a network?
b. Loops
40. Which statement best describes how loops can affect performance in a switched LAN?
a. Broadcast storms can be created when loops occur, preventing data from being transmitted over the network.
41. Which statement accurately describes Spanning Tree Protocol?
a. STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time.
42. Which of the following IOS commands is the most useful when troubleshooting media issues?
c. show interface
43. Which of the following IOS commands is the most useful when troubleshooting port access issues?
c. show interface
44. Which of the following are methods used to mitigate configuration issues? (Choose three.)
b. Secure the configuration.
c. Verify changes before you save.
d. Know what you have before you start.
Комментариев нет:
Отправить комментарий