Alcatel-lucent Scalable IP Networks Exam - B

35 Questions

Settings
Please wait...
Alcatel-lucent Scalable IP Networks Exam - B

Preparing for the Network Routing Specialist I (NRS I) Certifications Exam (4A0-100)


Questions and Answers
  • 1. 
    1. When a frame with an unknown destination MAC address enters a switch, the switch will forward it out which ports?
    • A. 

      A. None

    • B. 

      B. All

    • C. 

      C. All unicast ports

    • D. 

      D. All except the port that received the frame

  • 2. 
    • A. 

      A. Hubs forward broadcast traffic out every port, switches do not.

    • B. 

      B. Switches eliminate the need for thicknet cabling.

    • C. 

      C. Switches support multiple physical connections to hosts.

    • D. 

      D. Switches forward unicast traffic only to a specific destination port.

  • 3. 
    3. Which of the following is not true about Link Aggregation Groups?
    • A. 

      A. They protect against single or multiple link failures.

    • B. 

      B. They can contain up to eight physical links.

    • C. 

      C. They can protect against a switch failure by calculating multiple paths to the root.

    • D. 

      D. They can be configured to enter a down state if a certain number of links in the bundle fail.

  • 4. 
    4. Which of the following is not true of the STP protocol?
    • A. 

      A. It calculates a root bridge.

    • B. 

      B. It uses a cost value on each port to determine the path to the root bridge.

    • C. 

      C. It ensures a loop-free topology.

    • D. 

      D. It provides load-sharing capability.

  • 5. 
    5. The advantage of using VLANs is ______.
    • A. 

      A. They can increase the security of your network.

    • B. 

      B. They can interconnect multiple broadcast domains.

    • C. 

      C. They can limit the amount of broadcast traffic between groups of devices.

    • D. 

      D. A and C but not B

  • 6. 
    • A. 

      A. Routers provide broadcast domain separation.

    • B. 

      B. Hubs provide collision domain separation.

    • C. 

      C. VLANs provide broadcast domain separation.

    • D. 

      D. Switches provide collision domain separation.

  • 7. 
    7. The method that LAGs use to provide load balancing is best described as:
    • A. 

      A. Aggregates all source/destination conversations into a single conversation equally across all links

    • B. 

      B. Uses the same physical link for each source/destination conversation

    • C. 

      C. Statistically balances conversations based on the source MAC address

    • D. 

      D. Distributes egress frames equally across all links in the bundle

  • 8. 
    • A. 

      A. Nothing because the port threshold of 2 active links has not been reached

    • B. 

      B. The LAG begins using equal costing across all links because of the dynamiccost parameter.

    • C. 

      C. The LAG updates its BPDUs and recalculates STP.

    • D. 

      D. The LAG changes its OSPF cost for the bundle but takes no other action.

  • 9. 
    9. What is the primary reason that Ethernet switched networks require STP?
    • A. 

      A. STP provides for link backup between switches.

    • B. 

      B. A loop-free topology is more efficient.

    • C. 

      C. Redundant paths can lead to broadcast storms and FDB instability.

    • D. 

      D. STP updates the OSPF routing protocol cost upon link failure.

  • 10. 
    10. The mechanism that STP uses to prevent loops in an Ethernet switched network is ______.
    • A. 

      A. STP elects a root and selectively blocks higher cost paths to the root from each bridge.

    • B. 

      B. STP blocks ports on all bridges that are not the root bridge.

    • C. 

      C. STP proactively changes all paths to the root bridge so that they are equal cost.

    • D. 

      D. STP uses BPDUs to set up a virtual path between each source and destination pair.

  • 11. 
    • A. 

      A. The bridge priority

    • B. 

      B. The MAC address of the lowest switch port

    • C. 

      C. The bridge priority unless there is a tie, and then the lowest MAC address

    • D. 

      D. The BID unless there are multiple bridge priorities that are equal

  • 12. 
    12. What distinguishes an alternate port from a back-up port in STP?
    • A. 

      A. The alternate port has a higher path to the root.

    • B. 

      B. The back-up port has a lower priority.

    • C. 

      C. The back-up port is used only when the alternate port fails.

    • D. 

      D. The back-up port is on the same switch as the designated switch.

  • 13. 
    13. Which of the following is false regarding VLANs?
    • A. 

      A. They provide for broadcast domain separation.

    • B. 

      B. A single VLAN can exist on multiple switches.

    • C. 

      C. They require a separate physical connection per VLAN for interswitch links.

    • D. 

      D. They use a 12-bit VLAN ID to identify each VLAN.

  • 14. 
    • A. 

      A. Blocking

    • B. 

      B. Forwarding

    • C. 

      C. Listening

    • D. 

      D. Learning

  • 15. 
    15. The technology that allows multiple customers with the same VLANs to use the same provider backbone for their Ethernet traffic is known as ______.
    • A. 

      A. VLAN trunking

    • B. 

      B. VLAN tunneling

    • C. 

      C. VLAN stacking

    • D. 

      D. IEEE 802.1p

  • 16. 
    • A. 

      A. Excessive broadcasts would make the network unusable.

    • B. 

      B. Ethernet lacks hierarchical addressing.

    • C. 

      C. Ethernet switches cannot build forwarding tables.

    • D. 

      D. Ethernet cables can only be of a limited length.

  • 17. 
    Which of the following is true about Layer 3 addressing?
    • A. 

      A. It is embedded in the device’s firmware.

    • B. 

      B. It provides for a logical hierarchy.

    • C. 

      C. It allows for duplicate addresses on the Internet.

    • D. 

      D. Addresses are not required to be registered if they are used on the Internet.

  • 18. 
    Which of the following is not true about an IP packet?        
    • A. 

      A. The TTL field ensures that IP packets have a limited lifetime.

    • B. 

      B. The maximum size is 65,535 octets.

    • C. 

      C. The total length field includes the IP header.

    • D. 

      D. The current version is IPv5.

  • 19. 
    Which of the following is a valid host IP address?
    • A. 

      A. 192.168.300.4

    • B. 

      B. 255.70.1.1

    • C. 

      C. 224.0.0.1

    • D. 

      D. 10.254.1.1

  • 20. 
     An IP address has a first octet represented in binary as 11000001; the equivalent in decimal is ______.
    • A. 

      A. 190

    • B. 

      B. 193

    • C. 

      C. 192

    • D. 

      D. 11,000,001

  • 21. 
     The address 224.100.1.1 under traditional classful addressing would be ______.
    • A. 

      A. Class A

    • B. 

      B. Class B

    • C. 

      C. Class C

    • D. 

      D. None of the above

  • 22. 
    Which of the following is not a private address?
    • A. 

      A. 172.18.20.4

    • B. 

      B. 10.0.1.1

    • C. 

      C. 200.1.1.254

    • D. 

      D. 192.168.0.1

  • 23. 
     Which of the following is not a reason that subnetting is superior to class-based addressing? .
    • A. 

      A. It reduces the Internet routing table size.

    • B. 

      B. You can identify the host portion of the address without the need for a mask.

    • C. 

      C. It creates greater internal address flexibility.

    • D. 

      D. It allows for more efficient use of address space

  • 24. 
    • A. 

      A. 16

    • B. 

      B. 32

    • C. 

      C. 4

    • D. 

      D. 8

  • 25. 
    • A. 

      A. 255

    • B. 

      B. 64

    • C. 

      C. 100

    • D. 

      D. 128

  • 26. 
    • A. 

      A. /8

    • B. 

      B. /11

    • C. 

      C. /10

    • D. 

      D. /16

  • 27. 
    A network with a /30 mask allows you to have how many usable host addresses?
    • A. 

      A. 4

    • B. 

      B. 2

    • C. 

      C. 6

    • D. 

      D. 0

  • 28. 
    • A. 

      A. Host 0 on the 10.1.1.0 subnet

    • B. 

      B. Network 10.1.1.0

    • C. 

      C. Illegal because 10.0.0.0 is a Class A

    • D. 

      D. Subnet 10.1.1.0

  • 29. 
    The concept of allowing a single route entry to represent many network addresses is known as ______.
    • A. 

      A. CIDR

    • B. 

      B. Route aggregation

    • C. 

      C. VLSM

    • D. 

      D. Classless addressing

  • 30. 
    • A. 

      A. 216

    • B. 

      B. 218

    • C. 

      C. 219

    • D. 

      D. 224

  • 31. 
    Given network 175.100.0.0/16, if you create four subnets, how many addresses are available on each subnet?
    • A. 

      A. 16,384

    • B. 

      B. 4,096

    • C. 

      C. 16,382

    • D. 

      D. 4,094

  • 32. 
    • A. 

      A. 10.15.255.255

    • B. 

      B. 10.15.0.255

    • C. 

      C. 10.15.127.255

    • D. 

      D. 10.15.128.255

  • 33. 
    • A. 

      A. subnet 10.0.0.0/16

    • B. 

      B. subnet 10.255.0.0/16

    • C. 

      C. subnet 10.10.10.0/16

    • D. 

      D. host 10.10.10.0/32

  • 34. 
    Given network 135.100.0.0/16, you need nine subnets, and of these nine, one subnet needs to be split into 13 additional subnets. Choose the most likely masks you would create for this.
    • A. 

      A. /20 for the first eight subnets, /23 for the remaining 13

    • B. 

      B. /20 for the first eight subnets, /24 for the remaining 13

    • C. 

      C. /24 for all subnets

    • D. 

      D. /19 for the first eight subnets, /24 for the remaining 13

  • 35. 
    • A. 

      A. /20

    • B. 

      B. /17

    • C. 

      C. /21

    • D. 

      D. /19