Sei sulla pagina 1di 20

OED IT 6223 – CISCO 2

QUIZ 001

10/10

Question 1
Answer saved
Marked out of 1.00

Flag question

Question text

This layer provide fault isolation and high-speed backbone connectivity.


Select one:
a. Distribution layer
b. Network layer
c. Access layer
d. Core layer

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

Which of the following is NOT a feature of a Switched Network


Select one:
a. Quality of Service
b. None of the choices
c. Traffic management
d. Support to IP telephony
e. Support to wireless networking and connectivity
Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Select one:
a. Automatic-forward switching
b. Cut-through switch method
c. Store-and-forward switching
d. Rapid Frame forwarding

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

The primary function of this layer is to provide network access to the user.
Select one:
a. Distribution layer
b. Core layer
c. Network layer
d. Access layer

Question 5
Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following is NOT an element of converged network?


Select one:
a. Mobility
b. None of the choices
c. Voice Messaging
d. Call control
e. Automated Attendant

Question 6
Answer saved
Marked out of 1.00

Flag question

Question text

The _____ switches typically come with different sized chassis that allow for the installation
of different numbers of line card.
Select one:
a. Fixed configuration
b. Modular configuration
c. Server side configuration
d. Stackable configuration

Question 7
Answer saved
Marked out of 1.00
Flag question

Question text

A collection of interconnected switches forms a _______________________.


Select one:
a. Shared domain
b. Common domain
c. Broadcast domain
d. Collision domain

Question 8
Answer saved
Marked out of 1.00

Flag question

Question text

Which of the following statement is INCORRECT?


Select one:
a. The speed of network is the primary concern of the end user
b. The cost of a switch will depend on number and speed of the interfaces, supported
features, and expansion capability
c. When selecting the type of switch, rack units should always be considered. Rack units is
the number ports available in the network switch.
d. The capability of the switch to store frames is important in a network where there may be
congested ports to servers or other areas of the network.
e. Network switches must support the appropriate number of devices on the network.

Question 9
Answer saved
Marked out of 1.00
Flag question

Question text

TRUE or FALSE. Store-and-forward switching has two primary characteristics that


distinguish it from cut-through: error checking and automatic buffering.
Select one:
True
False

Question 10
Answer saved
Marked out of 1.00

Flag question

Question text

This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Select one:
a. Access layer
b. Core layer
c. Distribution layer
d. Network layer

Prelims

Question 1
Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following is the command to specify a VLAN name? Name of VLAN is
employee.
Select one:
a. name employee
b. set VLAN name = employee
c. name= employee /set
d. None of the choices
Clear my choice

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0)
for specific Fast Ethernet interface?
Select one:
a. ip address 192.168.10.2 255.255.0.0
b. ipconfig 192.168.10.2 255.255.0.0
c. ip 192.168.10.2 255.255.0.0
d. ipset 192.168.10.2 255.255.0.0
e. ipset config 192.168.10.2 255.255.0.0
Clear my choice

Question 3
Answer saved
Marked out of 1.00
Flag question

Question text

What are the 3 layers of the distribution access?


Select one:
a. Sender, Processor, Receiver Layer
b. Source, Middle, Destination layer
c. Access, distribution and Core layer
d. Layer 1, 2 and 3 Layer
Clear my choice

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

Which statement describe a characteristicof load balancing?


Select one:
a. Load balancing occurs when a router sends the same packet to different destination
networks.
b. If multiple paths with different metrics to a destinations exist, the router cannot support
load balancing.
c. Load balancing allows a router to forward packets over multiple paths to the same
destination network.
d. Unequal cost load balancing is supported by RIP.
Clear my choice

Question 5
Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
Select one:
a. Config mycompany -ipdomain
b. Ip configure mycompany.com
c. Ipconfig mycompany.com
d. Ip domain-name mycompany.com
Clear my choice

Question 6
Answer saved
Marked out of 1.00

Flag question

Question text

This is the practice of inserting a VLAN ID into a packet header in order to identify which
VLAN (Virtual Local Area Network) the packet belongs to.
Select one:
a. VLAN linkage
b. VLAN insertion
c. VLAN tagging
d. VLAN building
Clear my choice

Question 7
Answer saved
Marked out of 1.00
Flag question

Question text

A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Select one:
a. Cut-through switch method
b. Store-and-forward switching
c. Automatic-forward switching
d. Rapid Frame forwarding
Clear my choice

Question 8
Answer saved
Marked out of 1.00

Flag question

Question text

This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.
Select one:
a. Internetwork Time Protocol
b. Network Time Protocol
c. Synchronize Time Protocol
d. Real Time Protocol
Clear my choice

Question 9
Answer saved
Marked out of 1.00
Flag question

Question text

This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Select one:
a. Network layer
b. Distribution layer
c. Access layer
d. Core layer
Clear my choice

Question 10
Answer saved
Marked out of 1.00

Flag question

Question text

A type of VLAN that is configured to carry user-generated traffic.


Select one:
a. Voice VLAN
b. Default VLAN
c. Management VLAN
d. Data VLAN
e. Native VLAN
Clear my choice

Question 11
Answer saved
Marked out of 1.00
Flag question

Question text

What is the command to create a VLAN with a valid VLAN ID number 30?
Select one:
a. set vlan id = 30
b. create vlan 30
c. vlan id =30 –set
d. vlan 30
Clear my choice

Question 12
Answer saved
Marked out of 1.00

Flag question

Question text

This is a security technology that determines which devices attached to switch ports can
respond to DHCP requests. This can be used to prevent unauthorized DHCP messages
that contain information such as IP address related data being provided to legitimate
network devices.
Select one:
a. None of the choices
b. DHCP BlockIP
c. DHCP Firewall
d. DHCP Snooping
Clear my choice

Question 13
Answer saved
Marked out of 1.00
Flag question

Question text

Which statement is true regarding routing metrics?


Select one:
a. The larger metric generally represents the better path.
b. Routers compare metrics to determine the best path.
c. EIGRP uses bandwidth as its only metric.
d. All routing protocols use the same metrics.
Clear my choice

Question 14
Answer saved
Marked out of 1.00

Flag question

Question text

SSH protocol by default uses Port ______.


Select one:
a. 23
b. 22
c. 8080
d. 80
Clear my choice

Question 15
Answer saved
Marked out of 1.00
Flag question

Question text

A type of VLAN that is configured to carry user-generated traffic.


Select one:
a. Default VLAN
b. Native VLAN
c. Management VLAN
d. Data VLAN
Clear my choice

Question 16
Answer saved
Marked out of 1.00

Flag question

Question text

What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force
the clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.
Select one:
a. DHCP spoofing attack
b. DHCP phishing attack
c. DHCP backdoor attack
d. DHCP starvation attack
Clear my choice

Question 17
Answer saved
Marked out of 1.00
Flag question

Question text

A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward
compatibility with untagged traffic common to legacy LAN scenarios.
Select one:
a. Default VLAN
b. Data VLAN
c. Management VLAN
d. Native VLAN
Clear my choice

Question 18
Answer saved
Marked out of 1.00

Flag question

Question text

This attack tries to crack a password on another device. The first phase of this attack starts
with the attacker using a list of common passwords and a program designed to try to
establish a Telnet session using each word on the dictionary list.
Select one:
a. Telnet password attack
b. Brute force password attack
c. Telnet DoS attack
d. Crack password attack
Clear my choice

Question 19
Answer saved
Marked out of 1.00
Flag question

Question text

What is one feature that distinguishes routers from Layer 2 switches?


Select one:
a. Routers can be configured with IP addresses. Switches cannot.
b. Routers support a variety of interface types. Switches typically support Ethernet
interfaces.
c. Switches move packets from one physical interface to another. Routers do not.
d. Switches use tables of information to determine how to process data traffic. Routers do
not.
Clear my choice

Question 20
Answer saved
Marked out of 1.00

Flag question

Question text

What is the best practice relative to switch port modes?


Select one:
a. Do not use trunk switch port mode.
b. Use only access switch port mode.
c. Use the dynamic auto or dynamic desirable switch port mode.
d. Do not use the dynamic auto or dynamic desirable.
Clear my choice

Question 21
Answer saved
Marked out of 1.00
Flag question

Question text

What is the command to create a VLAN with a valid VLAN ID number 30?
Select one:
a. set vlan id = 30
b. Create vlan 30
c. vlan id =30 –set
d. Vlan 30
Clear my choice

Question 22
Answer saved
Marked out of 1.00

Flag question

Question text

Which two statements correctly describe the components of a router?


1. RAM permanently stores the configuration file used during the boot sequence.
2. ROM contains diagnostics executed on hardware modules.
3. NVRAM stores a backup copy of the IOS used during the boot sequence.
4. Flash memory does not lose its contents during a reboot.
5. ROM contains the most current and most complete version of the IOS.
6. Flash contains boot system commands to identify the location of the IOS
Select one:
a. 2 & 4
b. 1 & 5
c. 4 & 5
d. 1 & 2
Clear my choice

Question 23
Answer saved
Marked out of 1.00

Flag question

Question text

Which of the following describes Dynamic Trunking Protocol?


Select one:
a. Dynamic Trunking Protocol is a proprietary networking protocol developed by Cisco
Systems.
b. All of the choices
c. Dynamic Trunking Protocol is disable by default.
d. Switches from other vendors do not support Dynamic Trunking Protocol.
Clear my choice

Question 24
Answer saved
Marked out of 1.00

Flag question

Question text

The default VLAN for Cisco switches is ____________________.


Select one:
a. VLAN 1
b. VLAN local
c. VLAN 0
d. VLAN default
Clear my choice

Question 25
Answer saved
Marked out of 1.00
Flag question

Question text

What is the command to assign the port to a particular VLAN when the interface is in
access mode?
Select one:
a. switchport access vlanvlan-id
b. assignport access vlanvlan-id
c. setport access vlanvlan-id
d. defineport access vlanvlan-id
Clear my choice

Question 26
Answer saved
Marked out of 1.00

Flag question

Question text

Which of the following is NOT a feature of a Switched Network


Select one:
a. Quality of Service
b. Traffic management
c. None of the choices
d. Support to wireless networking and connectivity
e. Support to IP telephony
Clear my choice

Question 27
Answer saved
Marked out of 1.00
Flag question

Question text

A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.
Select one:
a. Rapid Frame forwarding
b. Cut-through switch method
c. Store-and-forward switching
d. Automatic-forward switching
Clear my choice

Question 28
Answer saved
Marked out of 1.00

Flag question

Question text

True of False. VLAN IDs 1 to 1005 are automatically created. ID 1 cannot be removed while
VLAN IDs 1002 to 1005 can still be removed.
Select one:
True
False

Question 29
Answer saved
Marked out of 1.00

Flag question

Question text
What is the best practice relative to switch port modes?
Select one:
a. Use the dynamic auto or dynamic desirable switch port mode.
b. Do not use the dynamic auto or dynamic desirable.
c. Use only access switch port mode.
d. Do not use trunk switch port mode.
Clear my choice

Question 30
Answer saved
Marked out of 1.00

Flag question

Question text

Which two statements correctly describe the concepts of administrative distance and
metric? (Choose two.)
1. The metric varies depending which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher administrative distances.
3. The value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count.
Select one:
a. 1 & 2
b. 4 & 5
c. 1 & 5
d. 2 & 4

Potrebbero piacerti anche