Free Sample Questions

 

1. To send data transmissions, Fiber-optic cables use light rather than electric signals. These optical light signals travel a fiberglass core and this technology is referred as fiber optics or optical cabling. There are two types of fiber optic cabling. These are _________:

a. Hub to repeater and repeater to hub cabling
b. Single Mode and Multi mode
c. Fiberglass core mode and Triple wire mode
d. PC to a Switch mode and Hub to Hub Mode
Answer: b
Explanation:
Optical fiber cable elements are typically coated with the plastic layers. The speed of data transmission of these cables is much faster than the other cables use for the same purpose. Their speed is high because these cables use light rather than electric signals for data transmission.

11. In OSI, an Application layer helps to evaluate what resources are necessary and what are the available resources for communication between two devices. It also helps to __________________________________:
a. Present data to application layer
b. Segment and reassemble data
c. Synchronizes client/server applications.
d. Formats packet to a frame

ANSWER: c
The application layer is a part of OSI layer. This layer helps in the interaction of software applications. Application layer is customized to function in a typical environment that is used to identify communication partners, , synchronizing communication and determining resource availability. That is why the option c is correct.

12. Presentation is a very important feature of the OSI Layer. Presentation helps the OSI Layer to present data to the application layer. It also helps to _____________________as well as, to act as a data format translator.

a. Make the structure of data and help to negotiate data transfer syntax to Layer 7
b. Provides error control and data integrity between applications
c. Provides system-independent processes to a host
d. Synchronizes client/server applications.

ANSWER: a
Explanation:
The Presentation Layer stands on the 6th position in the seven-layer OSI model. Application layer depends on Presentation layer for delivery and to format the information to itself for further processing or display. Conversion of an EBCDIC-coded text file to an ASCII-coded file is a good example of this layer.

13. In OSI LAYER, session is a feature which is used to determine the beginning, middle, and end of a session or conversation that occurs between applications. Its main function is to_____________________________:

a. Help in data encryption, decryption, compression, and decompression.
b. Handles dialog control among devices
c. Help to extend you Bandwidth Partition
d. Provides system-independent processes to a host

ANSWER: b
Explanation:
In seven-layer OSI model, Session layer comes on the 5th number. This Layer provides the mechanism for opening and closing. It is also used to manage a session between end-user application processes. In application environments this layer is used to use of remote procedure calls (RPCs).

14. Network determines the best path for packet delivery across the network. Another use of network is to determine logical addressing, which can easily identify the destination of a packet or datagram. But its main function is to _____________________________with the help of devices which include routers and layer 3 switches.

a. Segments and reassembles data.
b. Provide transparent data transfer by hiding details of the transmission from the upper layers.
c. Uses data packets (IP, IPX) and route update packets (RIP, EIGRP, and so on).
d. Provide system-independent processes to a host.

ANSWER: c
Formatted unit of data carried by a packet mode computer network is known as Data packet. If these packets are not being supported by communications links then it will simply transmit data as a series of characters, bytes, or bits alone. This is the main reason to rite update packets.

15. Data Link is used to oversee physical or hardware addressing, formats packets into a frame and provides error notification. One of the most important features of DATA Link is:

a. It ensures reliable data transfer from the Network layer to the Physical layer
b. It helps to Move bits between nodes
c. It uses routed protocols IP, IPX, and AppleTalk DDP
d. It is used to act as a data format translator

ANSWER: a
Explanation:
Data link is used to connect one location to another for the purpose of transmitting and receiving digital information. It consists of a transmitter and a receiver and the interconnecting data telecommunication circuit. These are handled by a link protocol that enables the digital data to be transferred from a data source to a data sink.

16. TCP/IP model is created to provide reliable networking and data integrity in the event of a disaster. This model is also known as _______________:

a. Data terminal equipment (DTE)
b. Data communications equipment
c. Network interface controller (NIC)
d. Department of Defense (DoD)

ANSWER: c
Explanation:
Network interface controller (NIC) is a device to handle an interface to a computer network. NIC allows a device (network-capable) to access that network. The chip present on the NIC contains a MAC Address. This address helps to identify the device uniquely on the LAN. The NIC presents on both the physical and data link layer.

29. The Address Resolution Protocol (ARP), _____________________, and Proxy Address Resolution Protocol (Proxy ARP) are all protocols that are used at the TCP/IP model’s Internet layer.

a. Reverse Address Resolution Protocol (RARP)
b. Connectionless integrated Protocol (CIP)
c. Connection-Oriented Communication Protocol (COCP)
d. A reliable Transport Connection Protocol
Answer: a
Explanation:
Reverse Address Resolution Protocol (RARP) is a Link layer networking protocol. It is used by a host computer and it helps to obtain the Internet Protocol (IPv4) address. One of its greatest functions is to maintain a database of mappings by using link layer.

30. ARP is used to map a/an __________________ by sending a broadcast ARP. When the destination IP address is on another subnet, the sender broadcasts ARP for the router’s Ethernet port or default Gateway, so the MAC address sent back is that of the router’s Ethernet port.

a. Known IP Address to Reverse Resolution Protocol
b. MAC Layer Address to a data format translator
c. Known IP address to a MAC address
d. MAC Address to an OSI Model Layer
Answer: c
Explanation:
ARP stands for Address Resolution Protocol. The Broadcast ARP is for the default gateway when the destination IP address is on another subnet.

31. Network interface layer corresponds with the__________________________ of the OSI model. As this layer manages hardware addressing and physical data transfer

a. Physical and Application layer
b. Transport and Application layer
c. Data Link and Application layer for physical Data Transfer
d. Data Link and Physical layer for hardware addressing
ANSWER: d
Explanation:
This is due to the fact that this layer is used to manage the hardware addressing and physical data transfer. This helps the Data Link and Physical Layer to correspond with the OSI model for hardware addressing.


793. The process of encrypting and de-encrypting data is extremely hard on a router processor, you may choose to offload this work to a router VPN card (a hardware add-on), ________________, or a VPN concentrator (a specific device manages and maintains many VPN connections).

a. a PIX firewall (Cisco’s firewall platform)
b. Channel Service Unit/Data Service Unit (CSU/DSU) device
c. VLANs WAN connections
d. The WAN Physical Layer
Answer: a
Explanation:
Cisco PIX Firewall is a popular IP firewall and network address translation (NAT) appliance. This technology is sold for the Cisco Catalyst 6500 switch series and the 7600 Router series.

794. VPN connection is of great worth. This connection is used to apply a medium between employees for the telecommunication purposes in such a way that:

a. allow home users to connect into the office through VPN connection
b. allow home users to connect into the office MAC Address
c. does not allow home users to connect into the office
d. allow office users to connect into the office on the same building
Answer: a
Explanation:
VPN connection allows home users to connect into the office through a medium between employees for communication purposes.

795. Metro Ethernet technology began to emerge early in the new millennium as a viable alternative to __________when connecting offices within a metropolitan area (primarily major cities).

a. The WAN physical Layer
b. Traditional WAN connections
c. Baseband Technology
d. Virtual Private Networks (VPNs)
Answer: b
Explanation:
Metro Ethernet covers a metropolitan area that is based on the Ethernet standard. It is used to connect the businesses and subscriber on a large scale.

796. Using fiber optics cable to connect offices in the same general region allows for WAN links at speeds of 1000Mbps or greater, at a fraction of the cost of a standard T1 line. The WAN link can even terminate onto a standard Category _____________and plug directly into a switch using a fiber to copper converter at the customer premise.

a. 5E/6 UTP copper cable
b. 5N/6 UTP copper cable
c. 5E/7 UTP optic cable
d. 5EG/6 UTP copper cable
Answer: a
Explanation:
5E/6 UTP copper cable enables the WAN connections to be managed completely through VLANs with no dedicated router hardware in place.

NAT_Router#show ip nat translations
Pro Inside global Inside local Outside local Outside global
--- 5.1.1.10 192.168.1.50 --- ---
tcp 5.1.1.10:80 192.168.1.50:80 52.1.9.3:3367 52.1.9.3:3367
The destination and source ports in the above given code are:

a. 3367 and 80
b. 80 and 3367
c. 80 and 80
d. 3367 and 3367
Answer: b
Explanation:
You can easily distinguish the destination and source port numbers from the above given code.

747. Configure two additional static NAT translations. If the NAT_Router receives a request to its inside global address that uses SMTP, it should be sent to_____________. If the NAT router receives a DNS request on the inside global address, it should forward it to the internal DNS server.

a. Internal DNS address
b. The internal email server
c. The external email server
d. An internal HTTP server
Answer: b
Explanation:
All other traffic should keep forwarding to the internal web server. This is the main purpose of this configuration.


748. _______enables you to define a pool of addresses to translate from and a pool of addresses to translate to. The primary application of this type of NAT is to temporarily overcome overlapping IP addresses.

a. Static NAT
b. Inside global NAT
c. Dynamic NAT
d. Instant Access Inside NAT
Answer: c
Explanation:
This is not the same thing as allowing multiple hosts to share the same IP address (known as NAT overloading). Dynamic NAT makes many one-to-one mappings without requiring you to configure them statically.

676. When you look at the figure, you can see that the Homer router is closest to the destination (Network 1), so that is the place to begin configuration:

a. Homer>enable
Homer#configure terminal
Homer(config)#access-list 30 deny 172.16.50.0 0.0.0.255
b. network>enable
Homer#configure terminal
Homer(config)#access-list 30 deny 172.16.50.0 0.0.0.255
c. Homer>enable
Subnet mask#configure terminal
Homer(config)#access-list 30 deny 172.16.50.0 0.0.0.255
d. Homer>enable
Homer#configure terminal
Homer(config)#access-list 30 deny 172.16.50.0 0.0.0.258

Answer: a
Explanation:
The correct syntax for writing the configuration as per the diagram is:
Homer>enable
Homer#configure terminal
Homer(config)#access-list 30 deny 172.16.50.0 0.0.0.255


677. According to the figure, there are two possible places to apply the access list on the Homer router: inbound on the S0/0 interface, or outbound on the Fa0/0 interface. The correct syntax will be:


a. Homer(config)#interface fastethernet 0/0
Homer(config-if)#ip access-group 30 in

b. Homer(config)#interface fastethernet 0/1
Homer(config-if)#ip access-group 30 in

c. Homer(config)#interface fastethernet S0/1
Homer(config-if)#ip access-group 30 in

d. Homer(config)#interface fastethernet 0/0
Homer(config-if)#ip access-group 30 out

Answer: d
Explanation:
As mentioned in the figure, there are two methods to apply the access list on the homer router. So the correct syntax will be:
Homer(config)#interface fastethernet 0/0
Homer(config-if)#ip access-group 30 out

695. For TCP-established command access list argument, you can access the command prompt on the Marge router and enter the following line: Marge(config)#access-list 110 permit TCP any established. This access list is then applied to the interface connected to the Internet in the incoming direction and then returns:

a. Marge(config)#interface serial 1/0
Marge(config-if)#ip access-group 110 in

b. Marge(config)#interface serial 1/0
Marge(config-if)#ip access-group 110 out

c. Marge(config)#interface serial 1/0
Marge(config-if)#ip access-class 110 in

d. Marge(config)#interface serial 1/110
Marge(config-if)#ip access-group 110 in

Answer: a
Explanation:
To satisfy yourself about the working of access list the following command is then applied to the interface connected to the Internet in the incoming direction:
Marge(config)#interface serial 1/0
Marge(config-if)#ip access-group 110 in

696. Although permitting only the TCP established sessions is very secure, it is not flawless. Cisco therefore created something known as_____________, implemented in firewall feature-set IOS versions.
a. Three way handshake system
b. Context Based Access Control (CBAC)
c. WEP based access control (WPAC)
d. Dial-on-demand routing (DDR)
Answer: b
Explanation:
CBAC is the abbreviation of Context-based access control which is used to filter out the UDP and TCP packets present on application layer protocol. They are designed in such a way that they can be used for, extranets, intranets and internets.


697. A ___________transcends the typical access list number ranges, enabling you to assign a logical name to the access list. In addition to the logical name, these lists also allow some simple editing by removing the individual access list lines without deleting and re-creating the entire access list.

a. Named access list
b. Extended access list
c. Standard access list
d. Unidirectional access list
Answer: a
Explanation:
In very recent IOS versions, the named access lists have been enhanced to allow complete flexibility of inserting and even rearranging access list entries.