Final Examination (Router Configuration)

30 Questions | Total Attempts: 418

SettingsSettingsSettings
Please wait...
Final Examination (Router Configuration)

A router is a device, which is used in networking to help with the distribution of internet within a given area. The router configuration quiz below tests on the different processes and procedures. All the best.


Questions and Answers
  • 1. 
    Which port number is used by SMTP ?
    • A. 

      20

    • B. 

      23

    • C. 

      25

    • D. 

      143

  • 2. 
    End system use port numbers to select the proper applications. What is the lowest port number that can be dynamically assigned by the host system ?
    • A. 

      1

    • B. 

      128

    • C. 

      256

    • D. 

      1024

  • 3. 
    During data transfer, what is the receiving host responsible for ? Choose two
    • A. 

      Encapsulation

    • B. 

      Bandwidth

    • C. 

      Segmentation

    • D. 

      Acknowledgement

    • E. 

      Reassembly

  • 4. 
    Which of the following describes the operation of TCP window size?
    • A. 

      Window size increases as all data transfers.

    • B. 

      Window size is the TCP process used prepare data for transmission.

    • C. 

      Window size is decreased if packets are lost.

    • D. 

      Window size of 15 means that the next byte expected is byte number 15.

  • 5. 
    What is the purpose of TCP/UDP port numbers ?
    • A. 

      To indicate the beginning of a three-way handshake

    • B. 

      To reassemble the segments into the correct order

    • C. 

      To identify the numbers of the data packets that can be sent without acknowledgment

    • D. 

      To track the different conversations crossing the network at the same time

  • 6. 
    There are ______ bits in an octet?
    • A. 

      8

    • B. 

      5

    • C. 

      4

    • D. 

      9

  • 7. 
    Unicast is considered a one to one type of communication ?
    • A. 

      True

    • B. 

      False

  • 8. 
    What does /28 represent in the previous question?
    • A. 

      The number of bits in the host portion of the IP address

    • B. 

      The number of bits in the network portion of the IP address

    • C. 

      The number of hosts in a network

  • 9. 
    What is the broadcast address for the network in which 192.168.242.5/20 is located?
    • A. 

      192.168.251.251

    • B. 

      192.168.250.250

    • C. 

      192.168.255.255

  • 10. 
    What is the net ID for the network in which 192.168.242.5/20 is located?
    • A. 

      192.168.241.1

    • B. 

      192.168.240.0

    • C. 

      192.168.242.2

  • 11. 
    You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.  How many hosts per network, and total networks do you get once subnetted.
    • A. 

      20 Hosts and 50 Subnets

    • B. 

      2 Hosts and 64 Subnets

    • C. 

      4 Hosts and 50 Subnets

    • D. 

      6 Hosts and 64 Subnets

  • 12. 
    Subnet the Class B IP Address 130.13.0.0 into 500 Subnets.  What is the new Subnet Mask and what is the Increment?
    • A. 

      Subnet Mask 255.255.255.0 with an Increment of 2

    • B. 

      Subnet Mask 255.255.255.192 with an Increment of 128

    • C. 

      Subnet Mask 255.255.255.128 with an Increment of 128

    • D. 

      Subnet Mask 255.255.255.128 with an Increment of 64

  • 13. 
    Subnet the Address 150.20.0.0 into networks supporting 500 Hosts each.  What is the New Subnet Mask and the IP Address Range of the first Network.
    • A. 

      Subnet Mask 255.255.255.0, Range 150.20.0.0 - 150.20.0.255

    • B. 

      Subnet Mask 255.255.0.0, Range 150.20.0.0 - 150.20.1.255

    • C. 

      Subnet Mask 255.255.255.254, Range 150.20.0.0 - 150.20.255.255

    • D. 

      Subnet Mask 255.255.254.0, Range 150.20.0.0 - 150.20.1.255

  • 14. 
    Refer to the exhibit. In this VLSM addressing scheme, what summary address would be sent from router A?
    • A. 

      172.16.0.0/16

    • B. 

      172.16.0.0/20

    • C. 

      172.16.0.0/24

    • D. 

      172.32.0.0/16

  • 15. 
    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three)
    • A. 

      The subnet mask in use is 255.255.255.192.

    • B. 

      The LAN interface of the router is configured with one IP address.

    • C. 

      The subnet mask in use is 255.255.255.128.

    • D. 

      The IP address 172.16.1.25 can be assigned to hosts in VLAN1.

    • E. 

      The LAN interface of the router is configured with multiple IP addresses.

  • 16. 
    Which layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?
    • A. 

      Access Layer

    • B. 

      Core Layer

    • C. 

      Data Link Layer

    • D. 

      Network Layer

  • 17. 
    Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?
    • A. 

      Application

    • B. 

      Access

    • C. 

      Distribution

    • D. 

      Core

  • 18. 
    Link aggregation should be implemented at which layer of the hierarchical network?
    • A. 

      Core only

    • B. 

      Distribution and core

    • C. 

      Access and distribution

    • D. 

      Access, distribution, and core

  • 19. 
     
    • A. 

      Scalability

    • B. 

      Security

    • C. 

      Redundancy

    • D. 

      Maintainability

  • 20. 
    Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?
    • A. 

      Application

    • B. 

      Access

    • C. 

      Distribution

    • D. 

      Network

  • 21. 
    • A. 

      Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.

    • B. 

      Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.

    • C. 

      Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.

    • D. 

      Perform all port access and Layer 3 security functions on C1.

  • 22. 
    Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)
    • A. 

      Power over Ethernet

    • B. 

      Load balancing across redundant trunk links

    • C. 

      Redundant components

    • D. 

      Quality of Service

    • E. 

      Link aggregation

  • 23. 
    Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

    • E. 

      Layer 5

  • 24. 
    Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

  • 25. 
    What are three benefits of a hierarchical network model? (Choose three.)
    • A. 

      Reduced contention for bandwidth

    • B. 

      Reduced size of the physical layout

    • C. 

      Increased fault tolerance of the network

    • D. 

      Elimination of the need for layer three functionality

    • E. 

      Simplification of management and troubleshooting