Assessment Test

  1. Which of the following describes a Class A address? (Choose three.)
    1. The decimal value of the first octet can range from 1 to 126.
    2. The decimal value of the first octet can range from 1 to 192.
    3. The first octet represents the entire network portion of the address.
    4. The default mask for a Class A network is 255.255.0.0.
    5. The value of the first binary place in the first octet must be 0.
  2. What does the command routerA(config)#line cons 0 allow you to perform next?
    1. Set the Telnet password.
    2. Shut down the router.
    3. Set your console password.
    4. Disable console connections.
  3. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
    1. 192.168.168.129–190
    2. 192.168.168.129–191
    3. 192.168.168.128–190
    4. 192.168.168.128–192
  4. What does the passive command provide to dynamic routing protocols?
    1. Stops an interface from sending or receiving periodic dynamic updates
    2. Stops an interface from sending periodic dynamic updates but not from receiving updates
    3. Stops the router from receiving any dynamic updates
    4. Stops the router from sending any dynamic updates
  5. Which protocol does Ping use?
    1. TCP
    2. ARP
    3. ICMP
    4. BootP
  6. How many collision domains are created when you segment a network with a 12-port switch?
    1. 1
    2. 2
    3. 5
    4. 12
  7. Which of the following commands will allow you to set your Telnet password on a Cisco router?
    1. line telnet 0 4
    2. line aux 0 4
    3. line vty 0 4
    4. line con 0
  8. If you wanted to delete the configuration stored in NVRAM, what would you type?
    1. erase startup
    2. erase nvram
    3. delete nvram
    4. erase running
  9. Which protocol is used to send a destination network unreachable message back to originating hosts?
    1. TCP
    2. ARP
    3. ICMP
    4. BootP
  10. Which class of IP address has the most host addresses available by default?
    1. A
    2. B
    3. C
    4. A and B
  11. What is the subnet address of 172.16.159.159/22?
    1. 172.16.0.0
    2. 172.16.128.0
    3. 172.16.156.0
    4. 172.16.192.0
  12. How many broadcast domains are created when you segment a network with a 12-port switch?
    1. 1
    2. 2
    3. 5
    4. 12
  13. What PDU is at the Transport layer?
    1. User data
    2. Session
    3. Segment
    4. Frame
  14. What is a stub network?
    1. A network with more than one exit point
    2. A network with more than one exit and entry point
    3. A network with only one entry and no exit point
    4. A network that has only one entry and exit point
  15. Where is a hub specified in the OSI model?
    1. Session layer
    2. Physical layer
    3. Data Link layer
    4. Application layer
  16. What does the command show controllers s 0 provide?
    1. The type of serial port connection (e.g., Ethernet or Token Ring)
    2. The type of connection (e.g., DTE or DCE)
    3. The configuration of the interface, including the IP address and clock rate
    4. The controlling processor of that interface
  17. What is the main reason the OSI model was created?
    1. To create a layered model larger than the DoD model
    2. So application developers can change only one layer's protocols at a time
    3. So different networks could communicate
    4. So Cisco could use the model
  18. Which layer of the OSI model creates a virtual circuit between hosts before transmitting data?
    1. Application
    2. Session
    3. Transport
    4. Network
    5. Data Link
  19. Which protocol does DHCP use at the Transport layer?
    1. IP
    2. TCP
    3. UDP
    4. ARP
  20. How do you copy a router IOS to a TFTP host?
    1. copy run starting
    2. copy start running
    3. copy running tftp
    4. copy flash tftp
  21. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64Kbps serial link?
    1. RouterA(config)#bandwidth 64
    2. RouterA(config-if)#bandwidth 64000
    3. RouterA(config)#clockrate 64000
    4. RouterA(config-if)#clock rate 64
    5. RouterA(config-if)#clock rate 64000
  22. Which of the following commands will set your prompt so you can set your Telnet password on a Cisco router?
    1. line telnet 0 4
    2. line aux 0 4
    3. line vty 0 4
    4. line con 0
  23. What command do you use to set the enable secret password on a Cisco router to todd?
    1. RouterA(config)#enable password todd
    2. RouterA(config)#enable secret todd
    3. RouterA(config)#enable secret password todd
    4. RouterA(config-if)#enable secret todd
  24. Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)
    1. It specifies use of a static encryption key that must be changed frequently to enhance security.
    2. It requires use of an open authentication method.
    3. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    4. It requires that all access points and wireless devices use the same encryption key.
    5. It includes authentication by PSK.
  25. Which protocol is used to find an Ethernet address from a known IP address?
    1. IP
    2. ARP
    3. RARP
    4. BootP
  26. Which command is used to enable RIP on a Cisco router?
    1. copy tftp rip
    2. router rip on
    3. router rip
    4. on rip routing
  27. Which additional configuration step is necessary in order to connect to an AP that has SSID broadcasting disabled?
    1. Set the SSID value in the client software to public.
    2. Configure open authentication on the AP and the client.
    3. Set the SSID value on the client to the SSID configured on the AP.
    4. Configure MAC address filtering to permit the client to connect to the AP.
  28. Which encryption type does WPA2 use?
    1. AES-CCMP
    2. PPK via IV
    3. PSK
    4. TKIP/MIC
  29. What are two security appliances that can be installed in a network? (Choose two.)
    1. ATM
    2. IDS
    3. IOS
    4. IPS
  30. What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
    1. Allow unrestricted access to the console or VTY ports.
    2. Use a firewall to restrict access from the outside to the network devices.
    3. Use SSH or another encrypted and authenticated transport to access device configurations.
    4. Always use Telnet to access the device command line because it is automatically encrypted.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.49.182