402 What is a characteristic of Store and Forward switches?
A.) They work at wire speed.
B.) They are the same as Cut-Through switching in 'prune' mode.
C.) They forward based on transport layer info.
D.) They forward the frame before it is completely read.
E.) They increase latency.
Ans E
Store and froward will not forward fragments. The longer the packet, the longer the delay
(latency) in the switch. There is no such thing as 'prune' mode.
403 The Internet Protocol (IP) occurs at what layer of the seven layer model?
A.) Physical
B.) Presentation
C.) Network
D.) Datalink
E.) Session
F.) Transport
Ans C
IP is a routed protocol that occurs at layer 3. Other layer 3 protocols include IPX, APPLETALK,
and DECNET.
404 In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts?
A.) D
B.) E
C.) Classes are not used in TCP/IP.
D.) B
E.) C
F.) A
Ans E
Class A = 16.7 million hosts
Class B = 65,534 hosts
Class C = 254 hosts
405 For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface?
A.) novell-ether
B.) gns
C.) snap
D.) arpa
E.) sap F.) dix
Ans A
At the time when Cisco first supported IPX, Novell-Ether (Novell proprietary 802.3 'raw') was the
default frame type for NetWare 2.x and 3.x file servers. Now, Novell has changed their default
frame type to 802.2 (which is really IEEE 802.3 Ethernet, with LLC 802.2 headers).
406 Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching
Cisco command line keyword for this encapsulation method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
Ans C
Novell 802.2 = sap (contains 802.2 LLC headers)
Novell 802.3 = novell-ether (NetWare proprietary)
Ethernet_II = arpa (the Internet standard)
snap = snap (field type set to 'AA')
407 There are 2 types of PPP authentication supported by the Cisco IOS. What are they?
A.) PAP
B.) PREDICTOR
C.) MD5
D.) CHAP
E.) STACKER
F.) MSCHAP
Ans A D
Router(config-if)#ppp authentication ?
chap Challenge Handshake Authentication Protocol (CHAP)
pap Password Authentication Protocol (PAP)
408 Which of the following are examples of the Transport Layer?
A.) Token Ring
B.) UDP
C.) TCP
D.) IP
E.) SQL
F.) LLC
Ans B C
TCP is connection oriented.
UDP is connectionless.
409 Which of the following describe SMTP?
A.) Used for downloading files to the router.
B.) Used for sending e-mail.
C.) Uses TCP.
D.) Uses UDP. E.) Uses port 25.
F.) Used for managing IP devices.
Ans B C E
Send / Simple (depending on literature) Mail Transport Protocol (SMTP) is used for delivering
mail to other mail servers. It uses port 25, and relies on TCP.
POP 3 (Post Office Protocol version 3) is used for retrieving mail from mail servers to clients.
410 What is the standard ISDN term for a native ISDN modem?
A.) ET
B.) LE
C.) TE2
D.) TE3
E.) TA
Ans E
The marketing term 'ISDN modem' was created to help sell the ISDN idea to America. There is no
such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (TA)
allows you to connect a PC to a digital ISDN line directly. In the real world, ISDN is digital,
modems are analog.
CCNA Interview Questions Page 41
<<Previous Next>>
411Which of the following are Transport layer protocols?
A.) UDP
B.) TCP
C.) NBP
D.) IP
E.) SPX
Ans A B C E
TCP (Transmission Control Protocol) and UDP are used by TCP/IP.
SPX (Sequenced Packet Exchange) is used with IPX.
NBP (Name Binding Protocol) is used with Appletalk.
412 When determining whether or not to route a LAN segment, which rule of thumb do you
use?
A.) 60/40
B.) 50/50
C.) 80/20
D.) 90/10
E.) 70/30
Ans E
The industry standard rule is 80/20, which means 80% local, 20% over the router.
However, according to Cisco's online documentation, the answer is 70/30.
This makes sense, considering more and more traffic is starting to go from the desktop to an
ultimate destination outside the local are network, such as the Internet.
413 Which of the following are examples of the Session Layer?A.) TCP
B.) LLC
C.) SQL
D.) NFS
E.) Token Ring
Ans C D
Session layer examples include Netbios Names, SQL, NFS, X Windows, and RPC.
414 Which layer of the 7 layer model provides services to the Application layer over the
Session layer connection?
A.) Transport
B.) Application
C.) Session
D.) Network
E.) Datalink
F.) Presentation
Ans F
The OSI Presentation layer is sandwiched between the Application and Session layers.
415 What type of switching creates variable latency through the switch?
A.) Cut-Through
B.) Inverted
C.) Layer 4
D.) Multiplexed
E.) Store and Forward
Ans E
DEFINITION: Latency = Delay.
Because a store and forward switch reads the whole frame before forwarding,a larger frame
takes longer than a shorter frame.
416 The network portion of an address typically represents a:
A.) Router
B.) Ethernet MAC address.
C.) Computer
D.) Host
E.) Segment
Ans E
Every network segment is represented by a network or subnetwork address.
417 The Physical layer works with which of the following:
A.) Segments
B.) Datagrams
C.) Packets
D.) Bits
E.) Frames
The correct answer(s): D
Physical - bits
Datalink - frames Network - packets
418 Which of the following is an example of the Network Layer?
A.) LLC
B.) SQL
C.) Token Ring
D.) IPX
E.) SPX
Ans D
Most protocol suites have different OSI layer protocols within them. At layer 3,
IP is for TCP/IP. TCP is layer 4.
IPX is for IPX/SPX. SPX is layer 4.
DDP is for Appletalk
419 When setting up a frame-relay network between a Cisco router and a non-Cisco router,
what encapsulation type should you use?
A.) SAP
B.) CISCO
C.) IANA
D.) Apollo
E.) IETF
F.) Q933A
Ans E
The Internet Engineering Task Force (IETF) encapsulation method is the standard encapsulation
type for Frame Relay. Cisco routers default to the CISCO encapsulation method, because it was
created before there was a standard.
420 A user device that connects to a DCE must be which of the following?
A.) DTE
B.) CPE
C.) Demarc
D.) DCE
E.) CO
Ans A
DTE's are the router side, and receive clocking.
DCE's are the DSU/CSU side, and provide clocking.
It may or may not be Customer Premises equipment.
CCNA Interview Questions Page 42
<<Previous Next>>
421 What does the parameter -- LOG -- do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a packet matches a particular access list
entry.
E.) Ensures the IPX protocol places a log in the fireplace. Ans D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
422 Given the global configuration commands:
'banner motd #'
'Hello #'
When would the message be displayed?
A.) The message of the day banner shows up before login.
B.) The message of the day banner shows up during logoff.
C.) These commands are not the right syntax for MOTD.
D.) Message of the day banners are displayed upon entering global config mode.
E.) Message of the day banners are not possible.
F.) The message of the day would be, 'Hello #'
Ans A
Message of the day banners are displayed when a user logs on to the router. In the example
above, the '#' is the unique delimiting (terminating) character. In this way, banners can have
multiple lines, terminated not by hitting <ENTER>, but rather by the chosen (unique) delimiting
character.
423 Which ISDN specification deals with call Setup and Teardown?
A.) Q-Series
B.) J-Series
C.) I- Series
D.) C- Series
E.) F-Series
Ans A
The 2 most important ISDN specifications are Q & I:
Q = Call setup and teardown.
I = Concepts and terminology.
424 All equipment located at the customers site is called:
A.) CPE
B.) CO
C.) DCE
D.) Demarc
E.) DTE
Ans A
CPE - Customer Premise Equipment
425 Which layer allows multiple Ethernet devices to uniquely identify one another on the
Datalink layer?
A.) Transport
B.) Session
C.) Network
D.) Datalink - MAC Sublayer
E.) Datalink - LLC Sublayer Ans D
Ethernet MAC addresses are 48 bits long, and provide a unique hardware identifier.
426 Which of the following are examples of ICMP?
A.) Traceroute
B.) Web Browsing
C.) Ping
D.) Telnet
E.) Destination Unreachable message from a router
F.) Inverse Tunnels
Ans A C E
Ping and Traceroute are used by ICMP for Testing.
Destination Unreachable messages are generated by a router when it does not have a route to
the network.
427 Novell NetWare has an Ethernet frame type called Ethernet_SNAP. What is the
matching Cisco command line keyword for this encapsulation method?
A.) arpa
B.) sap
C.) snap
D.) gns
E.) dix
F.) novell-ether
Ans C
Novell 802.2 = sap (contains 802.2 LLC headers)
Novell 802.3 = novell-ether (NetWare proprietary)
Ethernet_II = arpa (the Internet standard)
snap = snap (field type set to 'AA')
428 Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network
portion of the address?
A.) 0000
B.) 1
C.) 3456
D.) 1ace
E.) 0000.0c12.3456
F.) 1aceb0b
Ans F
IPX addresses are 80 bits total: The first section of the address is the network portion, the last 3
groups of numbers are the host.
429 In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically
detect the LMI type. What is this known as?
A.) Psychic
B.) ESP
C.) Inverse ARP
D.) Hello
E.) Reverse ARP
F.) Autosense Ans F
Autosense allows the router to determine which LMI type the frame relay switch is using. Options
include CISCO, ANSI, and Q933A.
430 What type of Ethernet operation allows only one entity to transmit at a time? For
example, if someone else is transmitting, they must wait.
A.) Full-Duplex
B.) Dual-Duplex
C.) Half-Duplex
D.) Latex
E.) Quarter-Duplex
F.) Suplex
Ans C
Half-Duplex is like a one-lane bridge. If one car is going over the bridge, all other cars must wait
on the other side before crossing
CCNA Interview Questions Page 43
<<Previous Next>>
431 Which of the following are examples of the Application Layer?
A.) LLC
B.) Token Ring
C.) Spreadsheet
D.) TCP
E.) IP
F.) Word Processor
Ans C F
Pretty much any end-user program is an example of the Application Layer.
432 Which technologies listed below help prevent network loops in a switched (bridged)
environment?
A.) Store-and-Forward
B.) IEEE 802.1d
C.) Diikjstra Algorithm
D.) Cut-Through
E.) Spanning Tree Protocol
F.) Routing
Ans B E
The Spanning Tree Protocol (STP) eliminates loops by disabling the port(s) that are causing the
bridging loop. This is also called putting a port into 'blocking' mode. The industry standard for STP
is IEEE 802.1d
433 Which OSI Reference Layer controls end-to-end (host to host) communication?
A.) Transport
B.) Physical
C.) Datalink
D.) Network E.) Session
Ans A
The Session layer controls a conversation between applications.
The Transport layer controls communications between hosts.
434 What is the first step in data encapsulation?
A.) User information is converted into data.
B.) Frames are put into bits.
C.) Data is converted into segments.
D.) Segments are converted into datagrams and packets.
E.) Packets are put into logical frame.
Ans A
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits.
435 We know that TCP provides connection oriented services, what else does it provide?
A.) FECN & BECN
B.) Path discovery.
C.) Flow control and error checking.
D.) Name resolution.
E.) File manipulation.
Ans C
The transmission control protocol uses acknowledgements and windowing to handle flow control
and error checking.
436 With distance vector routing protocols, it is never useful to send the same routing
update packet back out the same interface that it was learned. This concept is called
what?
A.) Holddown timers
B.) Poison Reverse
C.) Count to infinity
D.) Split Horizon
E.) Link State
Ans D
Split horizon is the concept of: 'Don't tell me what I just told you.'
437 Which of the following are ways to provide login access to a router?
A.) HTTP
B.) Console
C.) Telnet
D.) Aux Port
E.) SNMP
F.) LLC Ans A B C D
You can connect via Aux, Console, Telnet, or HTTP to a Cisco router.
SNMP can support Community (password protected) SET and PUT commands, but you can not
issue a command line interface command with it.
438 What two types of PPP data compression are available using Cisco IOS?
A.) Predictor
B.) DoubleSpace
C.) Stacker
D.) PAP
E.) ZIP
F.) CHAP
Ans A C
Stacker and predictor have similar compression rates.
Stacker uses more CPU, while predictor uses more RAM.
439 In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII?
A.) Presentation
B.) Application
C.) Transport
D.) Session
E.) Datalink
F.) Network
Ans A
The OSI Presentation layer includes EBCIDIC, ASCII, PICT, GIF, MIDI, and MPEG.
Encryption can also occur at this layer.
440 Which of the following are examples of the Transport Layer?
A.) SQL
B.) UDP
C.) IP
D.) LLC
E.) ARP
Ans B
TCP is connection oriented.
UDP is connectionless.
CCNA Interview Questions Page 44
<<Previous Next>>
441 Given the global configuration command 'banner motd #7 Hello #', what do the '#'
symbols represent?
A.) Escape sequence to exit the menu.
B.) Nothing, just part of the banner.
C.) Tic Tac Toe Macro.
D.) Delimiting Character
E.) Message border character.
F.) Number of times message to be displayed. Ans D
Delimiting characters allow you to have a message the is more than one line. You simply type as
many lines as you want, ending with the delimiting (terminating) character.
442 There is a process in Frame-Relay where LMI resolves an IP address from a DLCI
number. What is this called?
A.) arp
B.) inverse arp
C.) rarp
D.) automap
E.) reverse arp
F.) arp
Ans B
Inverse Arp maps the Local DLCI number to the remote IP address.
Inverse Arp is a function of LMI.
443 When setting up a WAN network, everything outside of the Demarc is not owned by
the customer. Which of the following are not owned by the customer?
A.) The T1 line.
B.) LAN
C.) The Router
D.) DTE
E.) PC's
F.) CO
Ans A F
The Central Office is the where phone people work.
The Telco maintains ownership of its physical wiring, and leases their use to their customers.
444 You want to segment a network. The network is running SNA and Netbios. Which
device should NOT be used to segment the network?
A.) A store and forward switch.
B.) A router.
C.) A Catalyst 5000.
D.) A cut-through switch.
E.) A bridge.
Ans B
SNA and Netbios are non-routable, you should bridge them.
The most correct answer for this question is 'A Router.'
The purpose here is to recognize that Layer 2 protocols can not be routed.
However, there are ways to turn a non-routable protocol into a routable protocol via a protocol
gateway, DLSW+, RSRB and other technologies.
445 Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up
control options on the WAN data link.
A.) RFC 1661
B.) High Level Datalink Protocol (HDLC)
C.) Challenge Handshake Authentication Protocol (CHAP)
D.) SS7 E.) Link Control Protocol (LCP)
Ans E
LCP negotiates many of the PPP settings during call setup.
446 Which of the following is an example of the Physical Layer?
A.) SQL
B.) IP
C.) LLC
D.) Token Ring
E.) FDDI
F.) TCP
Ans D E
FDDI, Token Ring and Ethernet are all physical layer framing standards.
447 Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support,
and what other features?
A.) Call waiting
B.) Compression
C.) ADSL
D.) 1.544 Mbps
E.) Call screening
F.) Negative 'G' support
Ans B E
Caller ID is part of ISDN and you can screen calls based on it.
Cisco can compress with Stacker or Predictor.
448 The Network layer works with which of the following:
A.) Globules
B.) Bits
C.) Packets
D.) Segments
E.) Frames
Ans C
Physical - bits
Datalink - frames
Network - packets
449 An optional parameter on an IPX access is the 'LOG' parameter. This records accesslist
violations when a packet matches. What else does the 'LOG' option do?
A.) Records the number of times that a packet matches the list.
B.) Return a message to user who is denied access the by list.
C.) Notifies an SNMP Agent.
D.) Saves the log to NVRAM.
E.) Send an SNMP Trap.
Ans A
It will record to the log. By default a Cisco router logs to RAM and can display the offense to the
console, which is not recommended. It is suggested that you log to a syslog server, for less router CPU impact.
450 Which is not a common problem with Distance-Vector routing?
A.) Slow convergence.
B.) Complex configuration.
C.) Routing loops.
D.) Periodic updates can slow convergence.
E.) Counting to infinity.
Ans B
Easy Config:
Router(config)#router rip
Router(config-router)#network 10.0.0.0
Router(config-router)#
That’s it! (Remember that the network is followed by the CLASSFUL address.)
Popular Posts
-
OSI Model Explained Summary:Definitions and Functions The Open Systems Interconnect (OSI) model has seven layers. This article des...
-
After setting up any routing protocol that you want to implement - RIP, OSPF, or EIGRP - you can view all of your routing information throug...
-
1 As system administrator, you type "debug ipx sap" and receive the following lines as part of the IOS response: type 0x4, &qu...
-
Networking Questions : Questions on OSI Model with answers [PDF] Q1- What does the acronym OSI stand for? Ans- Open System Interconnec...
-
Some Best Routing CCNA Examination Answers Exams solutions What is the correct order for PDU encapsulation? Frame Header-Network Hea...
-
isco certification ,class ccna, certification books ,new cisco ccna ,ccna study guides, cisco voip training ,cisco courses ,london ccna ,exa...
-
OSPF,IGRP ,EIGRP Multiple Choice Questions 851. What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.)...
-
101 What IP command would you use to test the entire IP stack? A.) Stack-test
-
201 Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above,
-
CCNA rev 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 APJ Online CCNA Tutorial Session 1 of 3 23rd Feb 2009 APAC &am...
Post a Comment