Assessment Test

  1. You reload a router with a configuration register setting of 0x2101. What will the router do when it reloads?
    1. The router enters setup mode.
    2. The router enters ROM monitor mode.
    3. The router boots the mini-IOS in ROM.
    4. The router expands the first IOS in flash memory into RAM.
  2. Which of the following commands provides the product ID and serial number of a router?
    1. show license
    2. show license feature
    3. show version
    4. show license udi
  3. Which command allows you to view the technology options and licenses that are supported on your router along with several status variables?
    1. show license
    2. show license feature
    3. show license udi
    4. show version
  4. You want to send a console message to a syslog server, but you only want to send status messages of 3 and lower. Which of the following commands will you use?
    1. logging trap emergencies
    2. logging trap errors
    3. logging trap debugging
    4. logging trap notifications
    5. logging trap critical
    6. logging trap warnings
    7. logging trap alerts
  5. IPv6 unicast routing is running on the Corp router. Which of the following addresses would show up with the show ipv6 int brief command?

    Corp#sh int f0/0

    FastEthernet0/0 is up, line protocol is up

     Hardware is AmdFE, address is 000d.bd3b.0d80 (bia 000d.bd3b.0d80)

    [output cut]

    1. FF02::3c3d:0d:bdff:fe3b:0d80
    2. FE80::3c3d:2d:bdff:fe3b:0d80
    3. FE80::3c3d:0d:bdff:fe3b:0d80
    4. FE80::3c3d:2d:ffbd:3bfe:0d80
  6. A host sends a type of NDP message providing the MAC address that was requested. Which type of NDP was sent?
    1. NA
    2. RS
    3. RA
    4. NS
  7. Each field in an IPv6 address is how many bits long?
    1. 4
    2. 16
    3. 32
    4. 128
  8. What does the command routerA(config)#line cons 0 allow you to perform next?
    1. Set the Telnet password.
    2. Shut down the router.
    3. Set your console password.
    4. Disable console connections.
  9. Which two statements describe the IP address 10.16.3.65/23? (Choose two.)
    1. The subnet address is 10.16.3.0 255.255.254.0.
    2. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
    3. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
    4. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
    5. The network is not subnetted.
  10. On which interface do you configure an IP address for a switch?
    1. int fa0/0
    2. int vty 0 15
    3. int vlan 1
    4. int s/0/0
  11. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
    1. 192.168.168.129–190
    2. 192.168.168.129–191
    3. 192.168.168.128–190
    4. 192.168.168.128–192
  12. Which of the following is considered to be the inside host's address after translation?
    1. Inside local
    2. Outside local
    3. Inside global
    4. Outside global
  13. Your inside locals are not being translated to the inside global addresses. Which of the following commands will show you if your inside globals are allowed to use the NAT pool?

    ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248

    ip nat inside source list 100 int s0/0 Corp overload

    1. debug ip nat
    2. show access-list
    3. show ip nat translation
    4. show ip nat statistics
  14. How many collision domains are created when you segment a network with a 12-port switch?
    1. 1
    2. 2
    3. 5
    4. 12
  15. Which of the following commands will allow you to set your Telnet password on a Cisco router?
    1. line telnet 0 4
    2. line aux 0 4
    3. line vty 0 4
    4. line con 0
  16. Which router command allows you to view the entire contents of all access lists?
    1. show all access-lists
    2. show access-list
    3. show ip interface
    4. show interface
  17. What does a VLAN do?
    1. Acts as the fastest port to all servers
    2. Provides multiple collision domains on one switch port
    3. Breaks up broadcast domains in a layer 2 switch internetwork
    4. Provides multiple broadcast domains within a single collision domain
  18. If you wanted to delete the configuration stored in NVRAM, choose the best answer for the Cisco objectives.
    1. erase startup
    2. delete running
    3. erase flash
    4. erase running
  19. Which protocol is used to send a destination network unknown message back to originating hosts?
    1. TCP
    2. ARP
    3. ICMP
    4. BootP
  20. Which class of IP address provides 15 bits for subnetting?
    1. A
    2. B
    3. C
    4. D
  21. There are three possible routes for a router to reach a destination network. The first route is from OSPF with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a composite metric of 20514560. Which route will be installed by the router in its routing table?
    1. RIPv2
    2. EIGRP
    3. OSPF
    4. All three
  22. Which one of the following is true regarding VLANs?
    1. Two VLANs are configured by default on all Cisco switches.
    2. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed.
    3. You should not have more than 10 switches in the same VTP domain.
    4. You need to have a trunk link configured between switches in order to send information about more than one VLAN down the link.
  23. How many broadcast domains are created when you segment a network with a 12-port switch?
    1. 1
    2. 2
    3. 5
    4. 12
  24. What protocols are used to configure trunking on a switch? (Choose two.)
    1. VLAN Trunking Protocol
    2. VLAN
    3. 802.1q
    4. ISL
  25. What is a stub network?
    1. A network with more than one exit point
    2. A network with more than one exit and entry point
    3. A network with only one entry and no exit point
    4. A network in which the one entry point is also the exit point.
  26. Where is a hub specified in the OSI model?
    1. Session layer
    2. Physical layer
    3. Data Link layer
    4. Application layer
  27. What are the two main types of access control lists (ACLs)? (Choose two.)
    1. Standard
    2. IEEE
    3. Extended
    4. Specialized
  28. Which of the following is the best summarization of the following networks: 192.168.128.0 through 192.168.159.0?
    1. 192.168.0.0/24
    2. 192.168.128.0/16
    3. 192.168.128.0/19
    4. 192.168.128.0/20
  29. What command is used to create a backup configuration?
    1. copy running backup
    2. copy running-config startup-config
    3. config mem
    4. wr net
  30. 1000Base-T is which IEEE standard?
    1. 802.3f
    2. 802.3z
    3. 802.3ab
    4. 802.3ae

Answers to Assessment Test

  1. C. 2100 boots the router into ROM monitor mode, 2101 loads the mini-IOS from ROM, and 2102 is the default and loads the IOS from flash. See Chapter 7 for more information.
  2. D. The show license udi command displays the unique device identifier (UDI) of the router, which comprises the product ID (PID) and serial number of the router. See Chapter 7 for more information.
  3. B. The show license feature command allows you to view the technology package licenses and feature licenses that are supported on your router along with several status variables related to software activation and licensing, both licensed and unlicensed features. See Chapter 7 for more information.
  4. B. There are eight different trap levels. If you choose, for example, level 3, level 0 through level 3 messages will be displayed. To specify level 3 the command is logging trap errors. See Chapter 7 for more information.
  5. B. This can be a hard question if you don't remember to invert the 7th bit of the first octet in the MAC address! Always look for the 7th bit when studying for the Cisco R/S, and when using EUI-64, invert it. The EUI-64 autoconfiguration inserts an FF:FE in the middle of the 48-bit MAC address to create a unique IPv6 address. See Chapter 1 for more information.
  6. A. The NDP neighbor advertisement (NA) contains the MAC address. A neighbor solicitation (NS) was initially sent asking for the MAC address. See Chapter 1 for more information.
  7. B. Each field in an IPv6 address is 16 bits long. An IPv6 address has eight fields for a total of 128 bits. See Chapter 1 for more information.
  8. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information.
  9. B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254. See Chapter 1 for more information.
  10. C. The IP address is configured under a logical interface, called a management domain or VLAN 1, by default. See Chapter 2 for more information.
  11. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 1 for more information.
  12. C. An inside global address is considered to be the IP address of the host on the private network after translation. See Chapter 5 for more information.
  13. B. Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question, we need to see if access list 100 is configured correctly, if at all, so show access-list is the best answer. See Chapter 6 for more information.
  14. D. Layer 2 switching creates individual collision domains per port. See Chapter 2 for more information.
  15. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 6 for more information.
  16. B. To see the contents of all access lists, use the show access-list command. See Chapter 6 for more information.
  17. C. VLANs break up broadcast domains at layer 2. See Chapter 2 for more information.
  18. A. The command erase startup-config deletes the configuration stored in NVRAM. Using erase-startup will also work as the IOS will complete the command for you. See Chapter 7 for more information.
  19. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 1 for more information.
  20. A. Class A addressing provides 22 bits for host subnetting. Class B provides 16 bits, but only 14 are available for subnetting. Class C provides only 6 bits for subnetting. See Chapter 1 for more information.
  21. B. Only the EIGRP route will be placed in the routing table because EIGRP has the lowest administrative distance (AD), and that is always used before metrics. See Chapter 3 for more information.
  22. D. Switches send information about only one VLAN down a link unless it is configured as a trunk link. See Chapter 2 for more information.
  23. A. By default, switches break up collision domains on a per-port basis but are one large broadcast domain. See Chapter 2 for more information.
  24. C, D. VLAN Trunking Protocol (VTP) is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1q and ISL encapsulations are used to configure trunking on a port. See Chapter 2 for more information.
  25. D. Stub networks have only one connection to an internetwork. Default routes should be set on a stub network or network loops may occur; however, there are exceptions to this rule. See Chapter 3 for more information.
  26. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1 for more information.
  27. A, C. Standard and extended access control lists (ACLs) are used to configure security on a router. See Chapter 6 for more information.
  28. C. If you start at 192.168.128.0 and go through 192.168.159.0, you can see that this is a block of 32 in the third octet. Since the network address is always the first one in the range, the summary address is 192.168.128.0. What mask provides a block of 32 in the third octet? The answer is 255.255.224.0, or /19. See Chapter 1 for more information.
  29. B. The command to back up the configuration on a router is copy running-config startup-config. See Chapter 7 for more information.
  30. C. IEEE 802.3ab is the standard for 1 Gbps on twisted-pair. See Chapter 1 for more information.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset