July 14, 2010

CCNA Interview Question -7

CCNA: Cisco Certified Network Associate Study Guide
120 Identify the access-list range for an extended IP access-list?
A.) 800 - 899
B.) 1 - 99
C.) 1000 - 1099
D.) 100 - 199


Ans D
IP extended access-lists use the number range of 100-199.


121 Identify the X.25 addressing standard?
A.) X.121
B.) X.25a
C.) ITU-1
D.) Q933a


Ans A
The X.25 layer 3 addressing standards is X.121.


122 Identify 3 features of IGRP?
A.) Composite metric
B.) New horizon
C.) Flash updates
D.) 60 periodic updates
E.) Poison reverse


Ans A C E
IGRP uses a composite metric made up of bandwidth and delay by default, it updates every 60 seconds and will trigger an update if the topology changes.


123 Where is the backup configuration file stored?
A.) RAM
B.) ROM
C.) Console
D.) NVRAM


Ans D
One location to store the backup configuration is NVRAM.


124 Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology?
A.) Ethernet II, Snap
B.) Ethernet 802.3, Novell-Ether
C.) Ethernet SNAP, Arpa
D.) Ethernet 802.2, Snap


Ans B
The default IPX LAN encapsulation is Novell-Ether which is 802.3


125 Identify 3 characteristics regarding IP access-lists?
A.) Can be configured as a standard access-list
B.) Can be run from another router running IP
C.) Can be configured as a named access-list
D.) Are the same as IPX access-lists
E.) Can be configured as an extended access-list


Ans A C E
There are 3 types of IP access-lists; standard, extended and named. Named access-lists can be either standard or extended depending on how they are configured.


126 Identify 3 ways in which a router can be configured?
A.) TFTP
B.) Nvram
C.) Ping
D.) Console
E.) Trace


Ans A B D
Changes to the configuration can be entered via the console, a config stored in NVRAM or on a TFTP server. Trace and ping are tools to verify connectivity.


127 A traffic light is an example of what type of mechanism?
A.) Collision detection
B.) Flow control
C.) Sequence numbering
D.) Network management


Ans B
A Traffic light is an example of flow control.


128 Windowing is a type of?
A.) Negative acknowledgement
B.) Address resolution
C.) Layer transition mechanism
D.) Flow control


Ans D
Windowing allow the sender and receiver to dictate how much information that can be received prior to an acknowledgement. It is a form of flow control.


129 Identify the 2 types of access-list filters that control SAP traffic?
A.) Novell-ether
B.) Arpa
C.) Input-sap-filter
D.) Round-robin
E.) Output-sap-filter


Ans C E
SAP's can be blocked by 2 methods; inbound and outbound.


130 Identify the 3 guidelines for routers in the same autonomous system?
A.) Must be configured for IGRP or RIP
B.) Interconnected
C.) Assigned the same autonomous system number
D.) Configured for the same routing protocol
E.) Must be same model of router


Ans B C D
Autonomous system must be interconnected, assigned the same AS # and configured with the same routing protocol.
CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802


131 Identify the hardware component used to store buffers, tables, running-configuration etc?


A.) NVRAM
B.) ROM
C.) RAM
D.) Flash


Ans C
RAM is the dynamic memory area. ROM contains the boot strap code, NVRAM contains the startup-config and Flash contains the IOS.


132 Identify 3 UDP characteristics?


A.) Reliable communication protocol
B.) Applications that use UDP must incorporate reliability
C.) Connection-less oriented
D.) Incorporates no handshaking


Ans B C D
UPD is a layer 4 Transport protocol. It is connection-less because it does establish a connection therefore the 3 step handshake is not needed, it does NOT implement any flow control or acknowledgments. Any application that uses UDP must incorporate any needed reliability.


133 Identify the IPX standard access-list number range?


A.) 600 - 699
B.) 1000 - 1099
C.) 1 - 99
D.) 100 - 199
E.) 800 - 899


Ans E
IPX standard access-list range is 800-899.


134 Which OSI layer provides best effort end to end packet delivery?


A.) Data-Link
B.) Presentation
C.) Network
D.) Transport
E.) Physical
F.) Application


Ans C
Layer 3 the Network layer performs this function.


135 Identify the 2 methods to modify the routers boot sequence?
A.) Setup program
B.) Boot system commands
C.) RXBoot
D.) Config-register


Ans B D
'Boot system' command the 'config-register' are used to manipulate the boot sequence.


136 Identify the 3 pieces of hardware you would not install to prevent broadcasts?


A.) Switch
B.) Repeater
C.) Bridge
D.) Router


Ans A B C
Router are implemented not only to break up networks into smaller segments but they are used to block broadcasts.


137 Identify 2 features of PPP PAP authentication?


A.) Username and password is sent in clear text
B.) Authentication messages are sent periodically during the connection
C.) More secure than CHAP
D.) Remote node is control of authentication process


Ans A D
PPP PAP authentication sends the username and passwords in clear text and the remote node initiates the authentication process.


138 Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame?


A.) Fragment-free
B.) Store and Forward
C.) Cut-through
D.) Fast forward


Ans C
Cut through examines the destination MAC address and begins forwarding the frame prior to receiving the entire frame.


139 Identify 1 characteristic of RARP?


A.) IP to MAC address translation
B.) Connectionless delivery of packets
C.) Can be used to initiate remote O/S load sequence
D.) Generates error and control messages


Ans C
Reverse Address Resolution Protocol is used to obtain a layer 3 address if the MAC address is known which then facilitates the loading of the O/S.


140 Identify the protocol to test connectivity without configuring any layer 3 protocols?


A.) TCP
B.) Ping
C.) IP
D.) CDP
E.) Telnet


Ans D
CDP can be used to verify connectivity prior to any layer 3 protocols being configured.
CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802

No comments:

Post a Comment