ICND Part 1 Vol 1 Module 2 Review

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Whithickson
W
Whithickson
Community Contributor
Quizzes Created: 1 | Total Attempts: 251
Questions: 38 | Attempts: 251

SettingsSettingsSettings
ICND Quizzes & Trivia

This is Module Review Number 2 from ICND PArt 1 Vol 1.


Questions and Answers
  • 1. 

    Which two statements about the functions of a hub are accurate? (Choose two.) (Source: Understanding the Challenges of Shared LANs)

    • A.

      A hub extends an Ethernet LAN.

    • B.

      A hub reduces the size of a collision domain

    • C.

      Adding a hub eliminates the need for users on a network segment to compete for the same bandwidth.

    • D.

      A hub is a data link layer device.

    • E.

      A hub amplifies the data signal before retransmitting it.

    Correct Answer(s)
    A. A hub extends an Ethernet LAN.
    D. A hub is a data link layer device.
    Explanation
    A hub extends an Ethernet LAN by connecting multiple devices together, allowing them to communicate with each other. A hub is a data link layer device, as it operates at the physical layer of the OSI model, receiving and transmitting data packets between devices on the network.

    Rate this question:

  • 2. 

    Which three statements best describe collisions? (Choose three.) (Source: Understanding the Challenges of Shared LANs)

    • A.

      Collisions occur when two or more stations on a shared media transmit at the same time

    • B.

      Larger segments are less likely to have collisions.

    • C.

      In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.

    • D.

      Adding a hub to a network can improve collision issues.

    • E.

      More segments on a network mean greater potential for collisions.

    Correct Answer(s)
    A. Collisions occur when two or more stations on a shared media transmit at the same time
    C. In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.
    E. More segments on a network mean greater potential for collisions.
    Explanation
    Answer key is wrong in book. See p 2-7 bottom of page.

    Rate this question:

  • 3. 

    Which of these choices best describes a collision domain? (Source: Understanding the Challenges of Shared LANs)

    • A.

      Two or more devices trying to communicate at the same time

    • B.

      two networks that are connected

    • C.

      Network segments that share the same bandwidth

    • D.

      None of the above

    Correct Answer
    C. Network segments that share the same bandwidth
  • 4. 

    What type of hardware will help eliminate collisions? (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Repeater

    • B.

      Bridge

    • C.

      Hub

    • D.

      Extender

    Correct Answer
    B. Bridge
  • 5. 

    Which three factors are typical causes of network congestion? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      high-bandwidth applications

    • B.

      many network segments

    • C.

      increasing volume of network traffic

    • D.

      More powerful computer and network technologies

    • E.

      greater distances for LANs

    Correct Answer(s)
    A. high-bandwidth applications
    C. increasing volume of network traffic
    D. More powerful computer and network technologies
  • 6. 

    What are three characteristics of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Bridges forward but do not filter data frames between LAN segments.

    • B.

      Bridges maintain MAC address tables.

    • C.

      Bridges are more "intelligent" than hubs.

    • D.

      Bridges can buffer and forward frames between two or more LAN segments.

    • E.

      Bridges operate at Layer 2 of the OSI model.

    Correct Answer(s)
    B. Bridges maintain MAC address tables.
    C. Bridges are more "intelligent" than hubs.
    D. Bridges can buffer and forward frames between two or more LAN segments.
  • 7. 

    What are two major benefits of adding a bridge to a network? (Choose two.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Isolating potential network problems to specific segments

    • B.

      Increasing the speed of a network

    • C.

      Extending a LAN to cover greater distances by joining multiple segments

    • D.

      Creating fewer collision domains

    • E.

      Forwarding data frames between LAN segments

    Correct Answer(s)
    A. Isolating potential network problems to specific segments
    C. Extending a LAN to cover greater distances by joining multiple segments
  • 8. 

    Which three characteristics apply to a switch? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Uses a table of MAC addresses to determine the port to which the data is to be sent

    • B.

      Connects LAN segments

    • C.

      Reduces the number of collision domains

    • D.

      Increases the number of collision domains

    • E.

      Filters data before forwarding it to its destination on the network

    Correct Answer(s)
    A. Uses a table of MAC addresses to determine the port to which the data is to be sent
    B. Connects LAN segments
    D. Increases the number of collision domains
  • 9. 

    Which three features differentiate switches from bridges? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Large frame buffers

    • B.

      Use of a table of MAC addresses to determine the segment to which the data is to be sent

    • C.

      Support for mixed media rates

    • D.

      High port densities

    • E.

      Ability to segment LANs

    Correct Answer(s)
    A. Large frame buffers
    C. Support for mixed media rates
    D. High port densities
  • 10. 

    Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

    • A.

      Switches operate at much higher speeds than bridges.

    • B.

      Switches operate at lower speeds than bridges.

    • C.

      Switches support more advanced functionality than bridges.

    • D.

      Switches support less functionality than bridges.

    • E.

      Switches support dedicated communication between devices.

    Correct Answer(s)
    A. Switches operate at much higher speeds than bridges.
    C. Switches support more advanced functionality than bridges.
    E. Switches support dedicated communication between devices.
  • 11. 

    Which three statements about microsegmentation are accurate? (Choose three.) (Source: Maximizing the Benefits of Switching)

    • A.

      Implementing a bridge creates microsegmentation.

    • B.

      Microsegmentation increases bandwidth availability

    • C.

      Each device on a network segment is connected directly to a switch port.

    • D.

      Microsegmentation eliminates collisions.

    • E.

      Microsegmentation limits the number of segments on a network

    Correct Answer(s)
    B. Microsegmentation increases bandwidth availability
    C. Each device on a network segment is connected directly to a switch port.
    D. Microsegmentation eliminates collisions.
  • 12. 

    Upon initial installation of a Cisco switch or router, the network administratOr typically configures the networking devices from a -. (Source: Operating Cisco IOS Software)

    • A.

      CD-ROM

    • B.

      TFTP Server

    • C.

      Console Terminal

    • D.

      Modem Connection

    Correct Answer
    C. Console Terminal
  • 13. 

    If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the - of the device for remote configuration. (Source: Operating Cisco IOS Software)

    • A.

      LAN port

    • B.

      Uplink port

    • C.

      Console port

    • D.

      Auxiliary port

    Correct Answer
    D. Auxiliary port
    Explanation
    The auxiliary port is the preferred method for remote configuration of a remote device when a network administrator is supporting it. This port allows the administrator to establish a modem connection to the device, enabling remote access and configuration. The console port is typically used for local configuration, while the LAN and uplink ports are used for network connectivity. Therefore, the auxiliary port is the correct choice for remote configuration.

    Rate this question:

  • 14. 

    How do you instruct a Cisco device to parse and execute an entered command? (Source: Operating Cisco IOS Software)

    • A.

      Press the Send key

    • B.

      Press the Enter key

    • C.

      Add a space at the end of the command.

    • D.

      Wait 5 seconds after you enter a command.

    Correct Answer
    B. Press the Enter key
    Explanation
    To instruct a Cisco device to parse and execute an entered command, you need to press the Enter key. This is the standard method used to send the command to the device for processing.

    Rate this question:

  • 15. 

    Which CLI prompt indicates that you are working in privileged EXEC mode? (Source: Operating Cisco IOS Software)

    • A.

      Hostname#

    • B.

      Hostname>

    • C.

      Hostname-exec>

    • D.

      Hostname-config

    Correct Answer
    A. Hostname#
    Explanation
    The CLI prompt "hostname#" indicates that you are working in privileged EXEC mode. In this mode, you have access to all the commands and features of the Cisco IOS software and can make configuration changes to the device. The "#" symbol at the end of the prompt is the indicator that you are in privileged mode.

    Rate this question:

  • 16. 

    Which command would you enter in the privileged EXEC mode to list the command options? (Source: Operating Cisco IOS Software)

    • A.

      ?

    • B.

      Init

    • C.

      Help

    • D.

      Login

    Correct Answer
    A. ?
    Explanation
    In the privileged EXEC mode, entering the "?" command will list the available command options. This command is used to get help and display a list of available commands and their descriptions. It is a useful tool for navigating and using the Cisco IOS software effectively.

    Rate this question:

  • 17. 

    How do you start a Catalyst 2950 series switch? (Source: Starting a Switch)

    • A.

      Press the on/off switch

    • B.

      Power up the redundant power supply

    • C.

      Connect a network cable to another switch on the network

    • D.

      Attach the power cable plug to the switch power supply socket.

    Correct Answer
    A. Press the on/off switch
  • 18. 

    If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? (Source: Starting a Switch)

    • A.

      The> prompt

    • B.

      The privileged EXEC prompt

    • C.

      The Management Console logon screen

    • D.

      A list of commands available on the switch

    Correct Answer
    A. The> prompt
  • 19. 

    What CLI command should you enter to display a list of commands that begin with the letter "C" on a Catalyst switch? (Source: Starting a Switch)

    • A.

      C?

    • B.

      C ?

    • C.

      ? help

    • D.

      Help c*

    Correct Answer
    A. C?
    Explanation
    To display a list of commands that begin with the letter "C" on a Catalyst switch, you should enter the command "c?". This command will provide a list of available commands that start with "C". It is a common convention in CLI (Command Line Interface) to use the "?" symbol as a wildcard to display a list of available options or commands.

    Rate this question:

  • 20. 

    What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with config? (Source: Starting a Switch)

    • A.

      Config?

    • B.

      Config ?

    • C.

      Help config

    • D.

      Help config*

    Correct Answer
    B. Config ?
  • 21. 

    Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? (Source: Starting a Switch)

    • A.

      Ip address

    • B.

      Ip address 196.125.243.10

    • C.

      196.125.243.10 ip address

    • D.

      Ip address 196.125.243.10 255.255.255.0

    Correct Answer
    D. Ip address 196.125.243.10 255.255.255.0
    Explanation
    The correct answer is "ip address 196.125.243.10 255.255.255.0". This command is used to configure an IP address and subnet mask on a switch. The IP address "196.125.243.10" and the subnet mask "255.255.255.0" are specified in the command, allowing the switch to be assigned a unique IP address within the network and defining the range of IP addresses that are considered local to the switch.

    Rate this question:

  • 22. 

    Which configuration mode will you use to configure a particular port on a switch? (Source: Starting a Switch)

    • A.

      User mode

    • B.

      Global configuration mode

    • C.

      Interface configuration mode

    • D.

      Controller configuration mode

    Correct Answer
    C. Interface configuration mode
    Explanation
    To configure a particular port on a switch, you would use the "interface configuration mode." This mode allows you to make changes and customize settings specifically for a particular interface or port on the switch. In this mode, you can configure parameters such as speed, duplex, VLAN membership, and security settings for the specific port you are working with.

    Rate this question:

  • 23. 

    When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? (Source: Starting a Switch)

    • A.

      MTU 1500 bytes

    • B.

      Hardware is ... 10BaseT

    • C.

      Address is 0050.BD73.E2Cl

    • D.

      802.1d STP State: Forwarding

    Correct Answer
    C. Address is 0050.BD73.E2Cl
    Explanation
    The output field "Address is 0050.BD73.E2Cl" indicates the MAC address that identifies the interface hardware.

    Rate this question:

  • 24. 

    Which show command requires that you have privileged EXEC mode access? (Source: Starting a Switch)

    • A.

      Show ip

    • B.

      Show version

    • C.

      Show running

    • D.

      Show interfaces

    Correct Answer
    C. Show running
    Explanation
    The show running command requires privileged EXEC mode access. This command displays the current running configuration of the device, including all the current settings and parameters. Privileged EXEC mode access is required because the running configuration contains sensitive information about the device's operation and settings, and only authorized users should have access to it.

    Rate this question:

  • 25. 

    How should you power up a Cisco router? (Source: Starting a Switch)

    • A.

      Press the Reset button

    • B.

      Turn the power switch to "on."

    • C.

      Connect the fiber cable to another router

    • D.

      Attach the power cable plug to the router power supply socket

    Correct Answer
    B. Turn the power switch to "on."
    Explanation
    To power up a Cisco router, you should turn the power switch to "on." This will provide the necessary electrical power to the router, allowing it to start functioning. Pressing the Reset button is not the correct method for powering up the router as it is primarily used for resetting the device to its default settings. Connecting the fiber cable to another router is not related to powering up the router, and attaching the power cable plug to the router power supply socket is a step that follows after turning the power switch on.

    Rate this question:

  • 26. 

    Which of two the following would be considered a physical threat? (Choose two.) (Source: Switch Security)

    • A.

      A user leaving a password in his or her desk

    • B.

      Someone turning off the power to the switch to block network access.

    • C.

      Someone turning off the air conditioning system in the network closet.

    • D.

      Someone breaking into the cabinet that contains the network documentation.

    Correct Answer(s)
    B. Someone turning off the power to the switch to block network access.
    C. Someone turning off the air conditioning system in the network closet.
    Explanation
    The two options that would be considered physical threats are someone turning off the power to the switch to block network access and someone turning off the air conditioning system in the network closet. Both of these actions can directly impact the functionality and availability of the network and its components. Leaving a password in a desk and breaking into the cabinet containing network documentation are security risks, but they do not fall under the category of physical threats.

    Rate this question:

  • 27. 

    Which four of the following can be protected with a password? (Choose four.) (Source: Switch Security)

    • A.

      Console access

    • B.

      VTY access

    • C.

      TTY access

    • D.

      User level access

    • E.

      Exec level access

    Correct Answer(s)
    A. Console access
    B. VTY access
    D. User level access
    E. Exec level access
    Explanation
    I believe book is wrong again, it lists TTY. But see page 2-79 bottom of page. lists user login. same as router

    Rate this question:

  • 28. 

    Which of the following is customized text that is displayed before the usemame and password login prompts? (Source: Switch Security)

    • A.

      Message of the day

    • B.

      Login banner

    • C.

      Access warnmg

    • D.

      Warnmg message

    Correct Answer
    B. Login banner
    Explanation
    A login banner is customized text that is displayed before the username and password login prompts. It is typically used to provide important information or warnings to users before they log in to a system.

    Rate this question:

  • 29. 

    Which of the following is the most secure method of remotely accessing a network device? (Source: Switch Security)

    • A.

      HTTP

    • B.

      Telnet

    • C.

      SSH

    • D.

      RMON

    • E.

      SNMP

    Correct Answer
    C. SSH
    Explanation
    SSH (Secure Shell) is the most secure method of remotely accessing a network device. Unlike HTTP and Telnet, which transmit data in plain text, SSH encrypts all data, including passwords and commands, providing confidentiality and protection against eavesdropping. RMON (Remote Monitoring) and SNMP (Simple Network Management Protocol) are network monitoring protocols and do not provide secure remote access like SSH does. Therefore, SSH is the best choice for securely accessing a network device remotely.

    Rate this question:

  • 30. 

    Which of the following is a Cisco IOS feature that can be used to control access to the vty ports? (Source: Switch Security)

    • A.

      Shutdown

    • B.

      Port security

    • C.

      Access-list

    • D.

      Firewall

    Correct Answer
    C. Access-list
    Explanation
    Access-list is a Cisco IOS feature that can be used to control access to the vty ports. Access-lists are used to filter traffic based on specific criteria such as source and destination IP addresses, protocols, and port numbers. By configuring an access-list on the vty ports, administrators can restrict or allow access to the device based on defined rules. This helps in enhancing the security of the network infrastructure by preventing unauthorized access to the vty ports.

    Rate this question:

  • 31. 

    Which of the following is a Cisco IOS command that can be used to control access to a switch port based upon a MAC address? (Source: Switch Security)

    • A.

      Shutdown

    • B.

      Port security

    • C.

      Mac-secure

    • D.

      Firewall

    Correct Answer
    C. Mac-secure
    Explanation
    The correct answer is "mac-secure." This command is used in Cisco IOS to control access to a switch port based on a MAC address. It allows the network administrator to specify which MAC addresses are allowed or denied access to the port, enhancing security by preventing unauthorized devices from connecting to the network.

    Rate this question:

  • 32. 

    Which of the following is a Cisco IOS command that can be used to increase the security of unused switch ports? (Source: Switch Security)

    • A.

      Shutdown

    • B.

      Port security

    • C.

      Mac-secure

    • D.

      Firewall

    Correct Answer
    A. Shutdown
    Explanation
    The correct answer is "shutdown." By using the "shutdown" command, the administrator can disable unused switch ports, effectively preventing unauthorized access or potential security breaches. This command ensures that only authorized devices can connect to active switch ports, thereby increasing the overall security of the network.

    Rate this question:

  • 33. 

    Which problem is caused by redundant connections in a network? (Source: Maximizing the Benefits of Switching)

    • A.

      Microsegmentation

    • B.

      Loops

    • C.

      Degradation

    • D.

      Collisions

    Correct Answer
    B. Loops
    Explanation
    Redundant connections in a network can cause loops. Loops occur when there are multiple paths between network devices, leading to packets being continuously forwarded in a loop without reaching their intended destination. This can result in network congestion, increased latency, and even network failures. Therefore, loops caused by redundant connections are a problem in a network.

    Rate this question:

  • 34. 

    Which statement best describes how loops can affect performance in a switched LAN? (Source: Maximizing the Benefits of Switching)

    • A.

      Broadcast storms may be created when loops occur, preventing data trom being transmitted over the network.

    • B.

      Any multicast, broadcast, or unknown traffic will be flooded out to all ports.

    • C.

      Incorrect information may be updated to the MAC address tables, resulting in inaccurate forwarding of frames

    • D.

      The loop removes the frame trom the network.

    Correct Answer
    A. Broadcast storms may be created when loops occur, preventing data trom being transmitted over the network.
    Explanation
    Loops in a switched LAN can lead to the creation of broadcast storms, which can have a negative impact on network performance. Broadcast storms occur when a broadcast message is continuously forwarded and replicated by switches, causing excessive network traffic and congestion. This prevents other data from being transmitted effectively over the network, leading to performance issues. Therefore, the statement "Broadcast storms may be created when loops occur, preventing data from being transmitted over the network" accurately describes how loops can affect performance in a switched LAN.

    Rate this question:

  • 35. 

    Which statement accurately describes Spanning-Tree Protocol? (Source: Maximizing  Benefits of Switching)  

    • A.

      STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time

    • B.

      STP automatically keeps the previously inactive path inactive.

    • C.

      STP eliminates the segments in which there are problems.

    • D.

      STP allows ports to listen to, forward, and flood data frames.

    Correct Answer
    A. STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time
    Explanation
    Spanning-Tree Protocol (STP) assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. This means that STP prevents loops and ensures that there is a single active path for data transmission. By designating one bridge as the root bridge and determining the shortest path to reach it, STP eliminates redundant paths and avoids network congestion. It achieves this by blocking certain ports, effectively keeping previously inactive paths inactive. This ensures a stable and efficient network topology.

    Rate this question:

  • 36. 

    Which of the following is a Cisco IOS command that is the most useful when troubleshooting media issues? (Source: Troubleshooting Switch Issues)

    • A.

      Show controller

    • B.

      Show run

    • C.

      Show interface

    • D.

      Show counters

    Correct Answer
    C. Show interface
    Explanation
    The command "show interface" is the most useful when troubleshooting media issues because it provides detailed information about the interfaces on a Cisco device. This command displays the status, configuration, and statistics of the interfaces, allowing the user to identify any issues related to media connectivity. By examining the output of this command, network administrators can determine if there are any errors, collisions, or other problems with the media, helping them diagnose and resolve media-related issues effectively.

    Rate this question:

  • 37. 

    Which of the following is a Cisco IOS command that is the most useful when troubleshooting port access issues? (Source: Troubleshooting Switch Issues)

    • A.

      Show controller

    • B.

      Show run

    • C.

      Show interface

    • D.

      Show counters

    Correct Answer
    C. Show interface
    Explanation
    The "show interface" command is the most useful when troubleshooting port access issues. This command provides detailed information about the interface, including its status, configuration, and statistics. By using this command, network administrators can quickly identify any errors, collisions, or other issues that may be affecting port access. It also provides information about the interface's current operational state, such as its speed, duplex mode, and VLAN membership. Therefore, the "show interface" command is essential for diagnosing and resolving port access problems.

    Rate this question:

  • 38. 

    Which three of the following are methods used to mitigate configuration issues? (Choose three.) (Source: Troubleshooting Switch Issues)

    • A.

      Secure unused ports.

    • B.

      Secure the configuration.

    • C.

      Verify changes before you save.

    • D.

      Know what you have before you start.

    Correct Answer(s)
    B. Secure the configuration.
    C. Verify changes before you save.
    D. Know what you have before you start.
    Explanation
    The three methods used to mitigate configuration issues are:
    1. Secure the configuration: This involves implementing security measures such as password protection, encryption, and access control lists to prevent unauthorized access and changes to the configuration settings.
    2. Verify changes before you save: This involves testing and validating any configuration changes before saving them to ensure they do not cause any issues or disruptions in the network.
    3. Know what you have before you start: This refers to having a clear understanding of the existing network configuration and documentation before making any changes, to avoid any unintended consequences or conflicts.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 10, 2009
    Quiz Created by
    Whithickson
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.