Featured

    Featured Posts

Popular Posts

OSI Model Layers and IP Routing: Multiple Choice Questions and Answers


301 Repeaters work at which layer of the OSI model?
A.) Network
B.) Session

C.) Transport
D.) Physical
Ans D
Repeaters work at the Physical layer of the OSI model by regenerating the signal to extend the
distance it can travel.

302 What protocols can you use while testing Trace?
A.) DECnet
B.) CLNS
C.) IP
D.) Old Vines
E.) Vines
F.) Chaos
Ans B C D E Type Trace ? At the router command prompt to see a list of available supported protocols for
tracing routes to IP addresses or Name addresses.

303 What utility can you use to see the path a packet takes through an internetwork?
A.) Route
B.) SNMP
C.) Trace
D.) Ping
Ans C
Trace - Uses Time-To-Live (TTL) values to generate messages from each router used along the
path. This is very powerful in its ability to locate failures in the path from the source to the
destination.

304 What is true about frame-relay DLCI?
A.) DLCI represents a single physical circuit
B.) DLCI is optional in all frame-relay networks
C.) DLCI identifies a logical connection between DTE devices
D.) DLCI is used to tag the beginning of a frame with VLAN information
Ans C
Data Link Connection Identifier (DLCI). A frame-relay service provider typically assigns DLCI
values that are used by frame-relay to distinguish between different virtual circuits on the network.
For the IP devices at each end of a virtual circuit to communicate, their IP addresses are mapped
to Dlci. Every DLCI value can have a global or local meaning.

305 Which frame has a Type field to identify the upper-layer protocol?
A.) 802.3
B.) 802.2
C.) 802.5
D.) Ethernet_II
Ans D
Ethernet_II has a Type field to identify the upper-layer protocol. This is best seen by capturing
packets with a sniffer and examining the packet.

306 Which protocol will let neighbor routers know if your internetwork experienced
congestion on a serial port?
A.) BootP
B.) IP
C.) ICMP
D.) ARP
E.) FTP
F.) RARP
Ans C
Internet Control Message Protocol - ICMP is a management protocol and messaging service
provider for IP. Its messages are carried as IP datagrams.
ICMP is used in the following events: Destination Unreachable - If a router cannot send an IP packet any further, it uses an ICMP echo
to send a message back to the sender notifying it that the remote node is unreachable.
Buffer Full - If a routers memory buffer is full ICMP will send out a message to the originator.
Hops - Each IP datagram is assigned a path. This consists of hops. If it goes through the
maximum number of hops, the packet is discarded and the discarding router sends an ICMP
echo to the host.
Ping - Ping use ICMP echo message to check connectivity.

307 What do you use the Aux port for?
A.) Console
B.) Terminal editing
C.) Modem
D.) Backup logging
Ans C
The auxiliary port is used to connect a modem to for dial backups.
308 The CSMA/CD Ethernet IEEE committee is defines as which of the following?
A.) 802.2
B.) 802.3
C.) 802.4
D.) 802.5
Ans B
The IEEE standard for Carrier Sense Multiple Access / Collision Detection is 802.3. Also know as
Ethernet.

309 How many Frame-relay encapsulation types are available with Cisco routers?
A.) Four
B.) Two
C.) Five
D.) Three
Ans B
The two types of Frame relay encapsulation are Cisco and IETF.
310 What is the maximum hop count for Link-State protocols?
A.) 15
B.) there is no hop count limit
C.) 256
D.) 16
Ans B
Link-state-based routing algorithms – also known as shortest path first (SPF) algorithms, maintain
a complex database of topology information. Whereas the distance vector algorithm has nonspecific
information about distant networks and no knowledge of distant routers, a link-state
routing algorithm maintains full knowledge of distant routers and how they interconnect.
CCNA Interview Questions Page 31 <<Previous Next>>

311 What information can you get from CDP info: (choose all that apply)
A.) Hardware platform
B.) One address per protocol
C.) Software platform
D.) Hostname
E.) The same info as show version
F.) Incoming/outgoing port
Ans A B D E F
All of the above except the software platform can be seen with the CDP information.

312 How does the cut-through switching technique work?
A.) By using broadcast address as source addresses
B.) The switch waits only for the header to be received before it checks the destination address
and starts forwarding the packets
C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the
destination address in its forwarding, or switching, table and determines the outgoing interface
D.) By using a Class I repeater in a collision domain
Ans B
Cut-Through switching copies only the destination address which is the first 6 bytes after the
frame preamble into its buffer. The LAN switch then looks up the destination address in its
switching table and determines the outgoing interface. The frame is then sent to the interface. A
cut-through switch provides reduced latency because it begins to forward the frame as soon as it
read the destination address and determines the outgoing interface.

313 What is the protocol number for TCP?
A.) 80
B.) 21
C.) 11
D.) 6
Ans D
Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built in
reliability. It takes a large block of data and breaks it down into segments. It numbers and
sequences each segment so the destination's TCP protocol can re-assemble it back into the
original order. TCP uses acknowledgements via sliding windows. It has a large overhead due to
built in error checking. The protocol use protocol # 6.

314 Which of the following are Presentation Layer standards?
A.) JPEG and PICT
B.) MPEG and MIDI
C.) ASCII and EBCDIC
D.) NFS and SQL
Ans A B C
For example, the Presentation layer would be responsible for converting from EDCDIC to ASCII.
Data compression, decompression, encryption, and decryption are presentation layer.
Presentation layer standards include MPEG, MIDI, PICT, TIFF, JPEG, ASCII, and EBCDIC.

315 What is the administrative distance for RIP?
A.) 100
B.) 90
C.) 120
D.) 110
The correct answer(s): C
Routing Information Protocol (RIP) is a distance vector routing protocol that uses hop count as its
metric. The maximum hop count is 15, 16 hops is considered unreachable. RIP updates are
broadcast every 30 seconds by default. RIP has an administrative distance of 120.

316 IP standard access lists use which of the following as a basis for permitting or denying
packets?
A.) destination address
B.) port
C.) protocol
D.) source address
Ans D
For Standard access lists, only the source address is used as a basis for permitting or denying
packets.

317 If a frame is received at a switch and only the destination hardware address is read
before the frame is forwarded, what type of switching method is this?
A.) Store-and-drop
B.) Latency
C.) Store-and-forward
D.) Cut-through
Ans D
Cut-Through switching copies only the destination address which is the first 6 bytes after the
frame preamble into its buffer. The LAN switch then looks up the destination address in its
switching table and determines the outgoing interface. The frame is then sent to the interface. A
cut-through switch provides reduced latency because it begins to forward the frame as soon as it
read the destination address and determines the outgoing interface.

318 What is the purpose and default value of the CDP timer command?
A.) 90 seconds; interval before an entry expires
B.) 60 seconds; interval between updates
C.) 60 seconds; interval before an entry expires
D.) 90 seconds; interval between updates
Ans B
The CDP timer controls when the update of CDP information should be sent to the neighbor
router.

319 Choose the following that are benefits to segmenting with router:
A.) Flow Control
B.) Manageability
C.) Multiple Active Paths
D.) Explicit packet lifetime control
Ans A B C D
All of the above are benefits of segmenting with a router.

320 When discussing static routes, what is the gateway parameter used for?
A.) Determining the dynamic route
B.) Defining the subnet
C.) Defining the Administrative Distance
D.) Determining the next hop
Ans D
The gateway parameter determines the path to the next router.
CCNA Interview Questions Page 32
<<Previous Next>>

321 Which layer hides details of network dependent information from the higher layers by
providing transparent data transfer?
A.) Transport
B.) Physical
C.) Data Link
D.) Session
E.) Application
F.) Network
Ans A
The Transport layer does the following: Responsible for end-to-end integrity of data transmission.
Handles multiplexing upper-layer application, session establishment and tear down of virtual
circuits. Hides details of network dependent info from the higher layers by providing transparent
data transfer. The 'windows' works at this level to control how much information is transferred
before an acknowledgement is required.

322 What information is provided by the local management interface (LMI)?
A.) LMI encapsulation type
B.) The current DLCI values
C.) The status of virtual circuits
D.) The global or local significance of the DLCI values
Ans B C D
LMI is a standard related to Frame Relay. It provides information related to PVCs.

323 Which layer defines the physical topology?
A.) Application
B.) Transport
C.) Network
D.) Data Link
E.) Physical
F.) Session
Ans E
The Physical layer deals with the actual physical medium and the method of transporting 1s and
0s.

324 What key do you use to view the last command?
A.) Left Arrow
B.) Space Bar
C.) Up Arrow
D.) Right Arrow
Ans C
CTRL+P as well as the Up Arrow keyboard commands will show the last command.

325 Which of the follow do not belong to the customer?
A.) CO
B.) DCE
C.) Router
D.) CPE
E.) Demarc
F.) DTE
Ans A E
Central Office (CO) - A switching facility that provides the nearest point of presence for a
provider's WAN service.
Demarcation (Demarc) - The point at which the CPE ends and the local loop portion of the
service begins. Usually the telecommunications closet at the subscriber's location.
CPE, DTE, DCE, and the router are all typically owned by the customer. DTE devices are usually
routers, DCE devices are CSUs/DSUs, or WAN interfaces that have a built in CSU/DSU in the
router. CPE stands for Customer Premise Equipment.

326 What is the IEEE specification for Spanning Tree Protocol?
A.) 802.9
B.) 803.ud
C.) 803
D.) 802.1d
Ans D
IEEE 8021.d Spanning Tree Protocol (STP) was developed to prevent routing loops in a network.
If a router, switch, or hub has more then one path to the same destination, a routing problem
could occur. To prevent this, the Spanning Tree Protocol is executed between the devices to
detect and logically block redundant paths from the network. The main function of the Spanning
Tree Protocol is to allow redundant network paths without suffering the effects of loops in the
network.
The Spanning Tree Algorithm (STA) implemented by STP prevents loops by calculating a stable
Spanning Tree network topology. When creating fault tolerant internetworks, a loop-free path
must exist between all Ethernet nodes in the network. Spanning Tree frames called Bridge
Protocol Data Units (BPDUs) are sent and received by all switches in the network at regular
intervals.

327 CO is an acronym for which of the following?
A.) Central Office
B.) Capital Office C.) Central Operator
D.) Company Office
Ans A
Central Office (CO) - A switching facility that provides the nearest point of presence for a
provider's WAN service.

328 What is convergence time?
A.) The update time
B.) The time it takes to reload a router
C.) The time it takes for a packet to reach its destination
D.) The time is takes for all routers update their tables after a change takes place
Ans D
Convergence is slower for Distant Vector routing and is faster for Link State routing.

329 Which of the following are Session Layer standards?
A.) ASCII and EBCDIC
B.) MPEG and MIDI
C.) NFS and SQL
D.) JPEG and PICT
Ans C
Session layer protocols include NFS, SQL, RPC, Appletalk Session Protocol (ASP), XWindows,
and NetBEUI.

330 What is the IP extended access list range?
A.) 1000-1099
B.) 100-199
C.) 1-99
D.) 101-200
Ans B
100-199 is the range for Extended IP access lists.

331 Define Poison Reverse?
A.) To prevent regular update messages from reinstating a route that has gone down
B.) Packets sent out that are not destined for a network go to the default network
C.) Information received on an interface cannot be sent back out the same interface
D.) When a network goes down, the router enters in its table the number 16 to signify destination
unreachable
Ans D
By entering a 16 as the hop count, the other routers know that the destination is unreachable.

332 What is the default interval for SAP updates?
A.) 60 seconds B.) 15 seconds
C.) 30 seconds
D.) 120 seconds
Ans A
By default, the SAP (Service Access Protocol) sends out updates every 60 seconds. This value
can be changed to alter the update interval. To decrease WAN traffic, the update interval could
be increased to every 5 minutes.

333What does a router do with a packet that it does not have a destination network for?
A.) Sends it to the Serial port
B.) Drops the packet
C.) Sends it back out the same interface it received it in
D.) Forwards the packet to the next hop
Ans B
When a router does not have a destination for a packet, it drops the packet into the bit bucket.
334 What type of frame does CDP use to gather information about it's neighbors?
A.) TCP/IP
B.) Novell-ether
C.) Subnetwork Access Protocol (SNAP)
D.) Ethernet_II

Ans C
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information
on other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By
default CDP sends out a broadcast every 60 seconds and it holds this information for 180
seconds. CDP is enabled by default.

335 Which protocol is used for booting diskless workstations?
A.) IP
B.) ARP
C.) RARP
D.) TCP
E.) SNMP
Ans C
Reverse Address Resolution Protocol - RARP is ARP's counterpart, but it resolves IP addresses
to MAC addresses typically on diskless workstations.

336 Which layer is responsible for synchronizing sending and receiving applications?
A.) Presentation
B.) Session
C.) Transport
D.) Application
E.) Network
Ans D
The Application layer performs the following: Synchronizing sending and receiving applications.
Program-to program communication. Identify and establish the availability of the intended
communication partner, and determine if sufficient resources exist for the communication. Popular application protocols include WWW, SMTP, EDI, FTP, Telnet, and SNMP

337 Which protocol gets a hardware address from a known IP address?
A.) RARP
B.) TCP
C.) IP
D.) BootP
E.) ARP
F.) ICMP
Ans E
Address Resolution Protocol - ARP is responsible for resolving MAC addresses to IP address. It
stores these in its arp cache for later use. It does this to inform a lower layer of the destination's
MAC address.

338 Which layer defines bit synchronization?
A.) Application
B.) Network
C.) Transport
D.) Physical
E.) Session
F.) Session
Ans D
The Physical layers deals with synchronizing the 1s and 0s on the wire.

339 Which is true regarding half duplex Ethernet operation?
A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the
receiver circuit at the other end
B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet
and Fast Ethernet
C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation
similar to a one way bridge
D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast
Ethernet
Ans C
Half-Duplex - Capability for data transmission in only one direction at a time between sending
station and a receiving station.

340 When would you use ISDN?
A.) To connect LANs using POTS
B.) To support applications requiring voice, data, and video
C.) When you need a consistent and very high rate of data speed
D.) To connect to IBM mainframes
Ans B
IDSN supports high speed voice, data and video and is a good choice for many small businesses.
CCNA Interview Questions Page 34

350 Which protocol will send a message to routers if a network outage or congestion
occurs?
A.) ARP
B.) TCP
C.) IP
D.) ICMP
Ans D
Internet Control Message Protocol - ICMP is a management protocol and messaging service
provider for IP. Its messages are carried as IP datagrams.
ICMP is used in the following events:
Destination Unreachable - If a router cannot send an IP packet any further, it uses an ICMP echo
to send a message back to the sender notifying it that the remote node is unreachable.
Buffer Full - If a routers memory buffer is full ICMP will send out a message to the originator.
Hops - Each IP datagram is assigned a path. This consists of hops. If it goes through the
maximum number of hops, the packet is discarded and the discarding router sends an ICMP
echo to the host.
Ping - Ping use ICMP echo message to check connectivity.
author

Author Name

Author Description!

Get Free Email Updates to your Inbox!

Post a Comment

www.CodeNirvana.in

Translate

Total Pageviews

Copyright © CCNA QUESTIONS AND ANSWERS | Blogger Templates | Designed By Code Nirvana