Saturday, 8 November 2008

CCNA2 - Final Exam (unofficial) 2

CCNA2 - Final Exam (unofficial) 2

***** I GOT THESE EXAMS FROM YOU GUYS (site visitors)...
***** SO THESE TESTS ARE NOT THE ONES I USUALLY POST
***** THE ONES I KNOW ARE CORRECT FOR SURE!

I DONT HAVE THE ANSWERS BUT I HOPE THIS WILL BE SOME HELP TO GET PREPARED!

ASAP I GET THE RIGHT EXAMS I WILL POST THEM FOR YOU!

-things2share-

Version II:

1

What is accomplished by segmenting a LAN with a bridge?

*increase large collision domains

reduce large collision domains

reduce small broadcast domains

increase small broadcast domains





2

How many Telnet sessions can take place simultaneously on a router running a sta

ndard edition of the IOS?

4

*5

8

10



3

What is a disadvantage of cut-through switching?

*no error checking

a decrease in error checking

decrease in number of collision domains

decrease in bandwidth

increased latency



4

Which of the following are data link layer encapsulation details? (Choose two.)

*Packets are put into frames.

Data is packaged into a packet.

Data is segmented into segments.

Data is converted for Internet travel.

*An address is added to identify the directly connected device.



5

Select the characteristics specified by 10BaseT. (Choose three.)

*twisted pair cable

T style connectors

*baseband transmission

10 gigabits per second data rate

*10 megabits per second data rate

decimal encoded data transmission



6

A LAN is to be added to an unused router Ethernet interface. What steps must be

performed to configure this interface to allow connectivity to the hosts on this

LAN? (Choose two.)

*Enter the command no shutdown.

A password must be set on the interface.

The interface DCE clock rate must be set.

The interface must be configured for virtual terminal access.

*The interface must be configured with an IP address and subnet mask.

The router must be put in setup mode in order for the interface to be configured



7

Which media types can be used in an implementation of a 10BASE-T network? (Choos

e three.)

Category 5 UTP *

Category 5e UTP *

Category 3 UTP *

coaxial cable

multi-mode fiber

single mode fiber



8

If 4 bits are borrowed from the host field of a Class C address to create subnet

s, what will the range of usable host addresses be in the last subnet?

.224 to .239

.225 to .239

.225 to .254

.241 to .254

.241 to .255

*.240 to .255



9

Which of the following describe how a device on a LAN builds a table of MAC addr

esses? (Choose two.)

*by monitoring the traffic that occurs on the local network segment

via FTP from the nearest router

by sending a request to the nearest domain name server

*by broadcasting an ARP request



10

Which of the following best describes how the Gigabit Ethernet, Media Access Con

trol method views the link?

ring

shared bus

point-to-point *

star

extended star



11

What is the purpose of Positive Acknowledgment and Retransmission (PAR)?

PAR allows the presentation layer to request that data be resent in a format the

destination host can process.

PAR provides a mechanism for the receiving device to request that all segments b

e retransmitted if one segment is corrupt.

*PAR helps ensure that a number of data segments sent by one host are received b

y another host before additional data segments are sent.

PAR is used to renegotiate the window size during the synchronization process.



12

Which criteria identify a Class B address? (Choose two.)

decimal number in first octet between 127-191

decimal number in first octect between 128-192

*decimal number in first octect between 128-191

first bit of binary IP address is 0

*first two bits of binary IP address are 10

first three bits of IP binary address are 110



13

An administrator has made routing protocol changes to a router's configuration.

To ensure that the changes are implemented, the active configuration is saved an

d the router is reloaded. After the router has initialized, the output on the sc

reen displays "Would you like to enter the initial configuration dialog?[yes/no]

:" Why did this dialog appear?

There was a POST failure.

The incorrect IOS loaded.

There was an error in the startup configuration file.

*The configuration register was set to ignore NVRAM.



14

What operations are performed during router initialization? (Choose three.)

*The IOS is loaded into RAM.

*The generic bootstrap loader tests all interfaces.

All directly connected network devices are identified.

*A valid configuration file is loaded from NVRAM if specified by the configurati

on register.

A question driven setup menu is presented if a valid configuration file cannot b

e loaded.



15

For a network manager planning the installation of a new network, which of the f

ollowing will be needed to implement a typical 10BASE-T network installation? (C

hoose three.)



RJ-11

BNC connectors

RJ-48 patch cables

RJ-45 connectors *

Category 5 UTP cables *

hubs or switches *





16

A company with a Class B license needs to have a minimum of 1,000 subnets with e

ach subnet capable of accommodating 50 hosts. Which mask below is the appropriat

e one?

255.255.0.0

255.255.240.0

255.255.255.0

*255.255.255.192

255.255.255.224



17

A network administrator can establish a remote session to a host using the Route

r> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet

Boston command to connect to the same interface. Which of the following could be

the problem? (Choose two.)

*The ip host table on the router is not configured.

The command telnet Boston was issued from the wrong router prompt.

The routing table is missing.

*Domain name services are not available.



18

Which of the following network components would be considered Layer 1 devices? (

Choose three.)

*hub

router

bridge

switch

*repeater

*transceiver



19

What is the maximum distance that 10BASE-T will transmit data before signal atte

nuation affects the data delivery?

*100 meters

185 meters

300 meters

500 meters



20

What is the result of executing the erase startup-config command?

It deletes the active configuration file from RAM.

*It deletes the backup configuration file in NVRAM.

It deletes the saved configuration file from ROM.

It deletes the saved configuration file from the C: drive.







21

Which of the following imposes boundaries on broadcast traffic?

Bridge

Repeater

*Router

Transceiver



22

Which utility shows the route a packet takes to reach its destination?

netstat

ping

Telnet

*traceroute



23

Which device is considered a multi-port bridge?

hub

router

*switch

gateway

transceiver

repeater



24

What organization developed the TCP/IP reference model?

Internet Engineering Task Force (IETF)

National Intstitute of Standards and Technology (NIST)

Department of the Navy (DoN)

Department of Defense (DoD) *

Massachusetts Institute of Technology (MIT)

Stanford University



25 Which of the following is true regarding CDP and the graphic shown?

CDP running on Router D will gather information about routers A, B, C, and E.

*By default, Router A will receive CDP advertisements from routers B and C.

If routers D and E are running different routing protocols, they will not exchan

ge CDP information.

Router E can use CDP to identify the IOS running on Router B.



26

How would an administrator configure a static route for use if a primary route f

ailed?

configure the route with a metric greater than the default value

configure the route and the router will activate it as needed

configure the route to activate by using the redistribute static command

*configure the route with an administrative distance greater than the default va

lue



27

Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correc

t answer from the list below.

156

158

160

*162

164

166



28

What happens on an Ethernet network after a collision occurs? (Choose three.)

*A backoff algorithm is invoked and transmission is stopped.

Devices involved in the collision have a random period of time for priority retr

ansmission of the damaged packet.

The devices involved in the collision release a token indicating the time each s

tation may begin retransmitting.

*The devices involved in the collision do not have priority to transmit data.

*The devices with data to transmit return to a listen-before-transmit mode.

Transmit work will restart with the reissuance of all data.



29

Which of the following types of networks pass a token sequentially to each host?

(Choose two.)

Ethernet

*Token Ring

*FDDI

Frame Relay

ISDN



30

What is the length of a MAC address?

8 bits

8 bytes

24 bits

24 bytes

*48 bits

48 bytes



31 Which of the following are TCP services? (Choose three.)

address resolution

*end-to-end communication

*flow control

*reliability of data delivery

path determination

data representation

No comments: