Routing And Switching 1, 2, & 6

20 Questions | Total Attempts: 80

SettingsSettingsSettings
Please wait...
LAN Switching Quizzes & Trivia

Chapter 1, 2, and 6


Questions and Answers
  • 1. 
    Which type of network allows a customer to connect to a secure company website to check on a delivery date?
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      Intranet

    • D. 

      Extranet

  • 2. 
    Which layer of the three-layer hierarchical design model is used to filter FTP traffic from a specific host?
    • A. 

      Access

    • B. 

      Distribution

    • C. 

      Core

    • D. 

      Aggregation

  • 3. 
    In the ECNM, where should an IPS or IDS be configured.
    • A. 

      Enterprise Edge

    • B. 

      Enterprise Campuse

    • C. 

      Service Provider Edge

    • D. 

      WAN Edge

  • 4. 
    In ECNM, where should QoS be implemented?
    • A. 

      Building Access Module

    • B. 

      Building Distribution Module

    • C. 

      Campus Core module

  • 5. 
    Which tool would enable a teleworker to communicate in real time with colleague?
    • A. 

      FTP

    • B. 

      E-mail

    • C. 

      Chat

    • D. 

      Telnet

  • 6. 
    What type of traffic, if found on an enterprise WAN link, indicates a problem with the network design?
    • A. 

      Departmental File Sharing

    • B. 

      Printing

    • C. 

      Internal Backup

    • D. 

      Intracampus voice

    • E. 

      All the above

  • 7. 
    What information can find by using the show mac-address-table command on a Cisco Catalyst switch?
    • A. 

      The Mac address of the console interface on the catalyst switch

    • B. 

      Mac address of the hosts connected to the switch ports

    • C. 

      The IP address of directly connected network devices

    • D. 

      The mapping between MAC address and IP address for network hosts

  • 8. 
    What troubleshooting a network problem, the network administrator issues the show version command on a router.  What information can be found using this command?
    • A. 

      The amount of NVRAM, DRAM, and flash memory installed on the router

    • B. 

      The bandwidth encapsulation, and I/O statistics on the interfaces

    • C. 

      Difference between the backup configuration and the current configuration

    • D. 

      The version of the routing protocols running on the router.

  • 9. 
    After gathering a through list of network applications, the traffic generated by these applications, and the priority of this traffic, a network engineer wants to integrate this information into a single document for analysis.  How can this  be accomplished?
    • A. 

      Create a physical topology map of the network and annotate it with the network application data.

    • B. 

      Create a logical topology map of the network and annotate it with the network application data

    • C. 

      Create a blueprint of the facility including network cable and telecommunications rooms, and annotate it with the network application data.

    • D. 

      Take a photograph of the facility, and annotate it with the network application data.

  • 10. 
    One evening a network administrator attempted to access a recently deployed website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was hundreds of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?
    • A. 

      It is normal web surfing activity.

    • B. 

      It is likely that someone attempted a DoS attack.

    • C. 

      The link to the website does not have enough capacity and needs to be increased.

    • D. 

      The web server was turned off and not able to service requests.

  • 11. 
    What type of media typically connects a MDF switch to an IDF switch in another building?
    • A. 

      Fiber-optic

    • B. 

      Coaxial-cable

    • C. 

      Unsheilded twisted pair

    • D. 

      Shielded twisted pair

  • 12. 
    Which the following devices can receive power over the same twisted pair Ethernet cable that carries data? 
    • A. 

      Wireless access point

    • B. 

      Monitors

    • C. 

      Web camera

    • D. 

      IP Phone

    • E. 

      Network switches

    • F. 

      Laptops

    • G. 

      Wireless access points, Web cameras, IP phone

  • 13. 
    Which of the following protocols can be used to access a Cisco router for in-band management? 
    • A. 

      ARP

    • B. 

      SSH

    • C. 

      FTP

    • D. 

      SMTP

    • E. 

      Telnet

    • F. 

      SSH & Telnet

  • 14. 
    A network analyst is documenting the existing network at ABC Corporation. The analyst decides to start at the core router to identify and document the Cisco network devices attached to the core. Which command executed on the core router provides the required information?
    • A. 

      Show version

    • B. 

      Show IP route

    • C. 

      Show tech-support

    • D. 

      Show running-config

    • E. 

      Show CDP neighbors detail

  • 15. 
    A network administrator suspects that there is a problem with the configuration of the RIP routing protocol. She investigates the interfaces and finds that all interfaces are up/up. Which of the following commands could help to identify the problem? 
    • A. 

      Show cdp neighbors

    • B. 

      Show ip route

    • C. 

      Show sessions

    • D. 

      Show ip protocols

    • E. 

      Show version

    • F. 

      Show IP route & Show IP protocols

  • 16. 
    As a network technician, you are troubleshooting a router configuration. You want to get a concise display of the status of the router interfaces. You also want to verify the IP address of each interface and the subnet mask in slash format (/XX). Which command would you use?
    • A. 

      Show protocols

    • B. 

      Show ip route

    • C. 

      Show running-config

    • D. 

      Show ip protocols

    • E. 

      Show ip interfaces brief

  • 17. 
    Which of the following is not a type of network protection device or technique to help security?
    • A. 

      DoS

    • B. 

      Firewall

    • C. 

      ACL

    • D. 

      IDS

    • E. 

      IPS

    • F. 

      DMZ

    • G. 

      VPN

  • 18. 
    What attribute is associated with link-state routing protocols? 
    • A. 

      Hop Count

    • B. 

      Poison reverse

    • C. 

      Low processor overhead

    • D. 

      Shortest path first calculation

  • 19. 
    Which two statements are true regarding the cost calculation for link in OSPF?
    • A. 

      It can be set with ip ospf cost command

    • B. 

      It is set to 1544 by default for all OSPF interfaces

    • C. 

      The configuration loopback addresses map link cost

    • D. 

      It may be calculated using the formula Reference bandwidth / Bandwidth

    • E. 

      A & D

  • 20. 
    For what two reason would network administrator choose to enable MD5 authentication and encryption for OSPF exchanges?
    • A. 

      To prevent routing information from being falsified

    • B. 

      To reduce OSPF information from being captured

    • C. 

      To keep routing information from being captured and deciphered

    • D. 

      To encrypt routing tables to prevent unauthorized viewing

    • E. 

      To ensure OSPF routing information takes priority over RIP or EIGRP

    • F. 

      A & C

Back to Top Back to top