Home Page Icon
Home Page
Table of Contents for
Assessment Test
Close
Assessment Test
by Todd Lammle
CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition
Cover Page
Title Page
Copyright
Dear Reader,
Acknowledgments
About the Author
Contents at a Glance
Contents
Introduction
CCENT Exam Objectives
Assessment Test
Answers to Assessment Test
Chapter 1: Internetworking
Internetworking Basics
Internetworking Models
The OSI Reference Model
Ethernet Networking
Ethernet Cabling
Data Encapsulation
Summary
Exam Essentials
Written Lab 1
Review Questions
Chapter 2: Internet Protocols
TCP/IP and the DoD Model
IP Addressing
IPv4 Address Types
Summary
Exam Essentials
Written Lab 2
Review Questions
Chapter 3: IP Subnetting, Troubleshooting IP, and Introduction to NAT
Subnetting Basics
Troubleshooting IP Addressing
Introduction to Network Address Translation (NAT)
Summary
Exam Essentials
Written Labs 3
Review Questions
Chapter 4: Cisco's Internetworking Operating System (IOS)
The IOS User Interface
Command-Line Interface (CLI)
Router and Switch Administrative Configurations
Router Interfaces
Viewing, Saving, and Erasing Configurations
Summary
Exam Essentials
Written Lab 4
Hands-on Labs
Review Questions
Chapter 5: Managing a Cisco Internetwork
The Internal Components of a Cisco Router
The Router Boot Sequence
Managing Configuration Register
Backing Up and Restoring the Cisco IOS
Backing Up and Restoring the Cisco Configuration
Using Cisco Discovery Protocol
Using Telnet
Resolving Hostnames
Checking and Troubleshooting Network Connectivity
Summary
Exam Essentials
Written Lab 5
Hands-on Labs
Review Questions
Chapter 6: IP Routing
Routing Basics
The IP Routing Process
Configuring IP Routing in the Network
Distance-Vector Routing Protocols
Routing Information Protocol
Verifying Your Configurations
Summary
Exam Essentials
Written Lab 6
Hands-on Labs
Review Questions
Chapter 7: Layer 2 Switching
Before Layer 2 Switching
Switching Services
Three Switch Functions at Layer 2
Cisco Catalyst Switches
Summary
Exam Essentials
Written Lab 7
Review Questions
Chapter 8: Wireless Technologies
Introducing Wireless Technology
The 802.11 Standards
Basic Service Sets
Wireless Security
Summary
Exam Essentials
Written Lab 8
Review Questions
Chapter 9: Security
Introduction to Security
Mitigating Security Threats
Virtual Private Networks
Summary
Exam Essentials
Written Lab 9
Review Questions
Chapter 10: Introduction to Wide Area Networks
Introduction to Wide Area Networks
Cabling the Wide Area Network
High-Level Data-Link Control (HDLC) Protocol
Point-to-Point Protocol
Summary
Exam Essentials
Written Lab 10
Hands-on Labs
Review Questions
Appendix A: Answers to Written Labs
Chapter 1 : Internetworking
Chapter 2 : Internet Protocols
Chapter 3 : IP Subnetting, Troubleshooting IP, and Introduction to NAT
Chapter 4 : Cisco's Internetworking Operating System (IOS)
Chapter 5 : Managing a Cisco Internetwork
Chapter 6 : IP Routing
Chapter 7 : Layer 2 Switching
Chapter 8 : Wireless Technologies
Chapter 9 : Security
Chapter 10 : Introduction to Wide Area Networks
Appendix B: Answers to Review Questions
Chapter 1 : Internetworking
Chapter 2 : Internet Protocols
Chapter 3 : IP Subnetting, Troubleshooting IP, and Introduction to NAT
Chapter 4 : Cisco's Internetworking Operating System (IOS)
Chapter 5 : Managing a Cisco Internetwork
Chapter 6 : IP Routing
Chapter 7 : Layer 2 Switching
Chapter 8 : Wireless Technologies
Chapter 9 : Security
Chapter 10 : Introduction to Wide Area Networks
Appendix C: About the Additional Study Tools
Additional Study Tools
System Requirements
Using the Study Tools
Troubleshooting
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
CCENT Exam Objectives
Next
Next Chapter
Answers to Assessment Test
Assessment Test
Which of the following describes a Class A address? (Choose three.)
The decimal value of the first octet can range from 1 to 126.
The decimal value of the first octet can range from 1 to 192.
The first octet represents the entire network portion of the address.
The default mask for a Class A network is 255.255.0.0.
The value of the first binary place in the first octet must be 0.
What does the command
routerA(config)#
line cons 0
allow you to perform next?
Set the Telnet password.
Shut down the router.
Set your console password.
Disable console connections.
Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
192.168.168.129–190
192.168.168.129–191
192.168.168.128–190
192.168.168.128–192
What does the
passive
command provide to dynamic routing protocols?
Stops an interface from sending or receiving periodic dynamic updates
Stops an interface from sending periodic dynamic updates but not from receiving updates
Stops the router from receiving any dynamic updates
Stops the router from sending any dynamic updates
Which protocol does Ping use?
TCP
ARP
ICMP
BootP
How many collision domains are created when you segment a network with a 12-port switch?
1
2
5
12
Which of the following commands will allow you to set your Telnet password on a Cisco router?
line telnet 0 4
line aux 0 4
line vty 0 4
line con 0
If you wanted to delete the configuration stored in NVRAM, what would you type?
erase startup
erase nvram
delete nvram
erase running
Which protocol is used to send a destination network unreachable message back to originating hosts?
TCP
ARP
ICMP
BootP
Which class of IP address has the most host addresses available by default?
A
B
C
A and B
What is the subnet address of 172.16.159.159/22?
172.16.0.0
172.16.128.0
172.16.156.0
172.16.192.0
How many broadcast domains are created when you segment a network with a 12-port switch?
1
2
5
12
What PDU is at the Transport layer?
User data
Session
Segment
Frame
What is a stub network?
A network with more than one exit point
A network with more than one exit and entry point
A network with only one entry and no exit point
A network that has only one entry and exit point
Where is a hub specified in the OSI model?
Session layer
Physical layer
Data Link layer
Application layer
What does the command
show controllers s 0
provide?
The type of serial port connection (e.g., Ethernet or Token Ring)
The type of connection (e.g., DTE or DCE)
The configuration of the interface, including the IP address and clock rate
The controlling processor of that interface
What is the main reason the OSI model was created?
To create a layered model larger than the DoD model
So application developers can change only one layer's protocols at a time
So different networks could communicate
So Cisco could use the model
Which layer of the OSI model creates a virtual circuit between hosts before transmitting data?
Application
Session
Transport
Network
Data Link
Which protocol does DHCP use at the Transport layer?
IP
TCP
UDP
ARP
How do you copy a router IOS to a TFTP host?
copy run starting
copy start running
copy running tftp
copy flash tftp
If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64Kbps serial link?
RouterA(config)
#bandwidth 64
RouterA(config-if)
#bandwidth 64000
RouterA(config)
#clockrate 64000
RouterA(config-if)
#clock rate 64
RouterA(config-if)
#clock rate 64000
Which of the following commands will set your prompt so you can set your Telnet password on a Cisco router?
line telnet 0 4
line aux 0 4
line vty 0 4
line con 0
What command do you use to set the enable secret password on a Cisco router to
todd
?
RouterA(config)
#enable password todd
RouterA(config)
#enable secret todd
RouterA(config)
#enable secret password todd
RouterA(config-if)
#enable secret todd
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK.
Which protocol is used to find an Ethernet address from a known IP address?
IP
ARP
RARP
BootP
Which command is used to enable RIP on a Cisco router?
copy tftp rip
router rip on
router rip
on rip routing
Which additional configuration step is necessary in order to connect to an AP that has SSID broadcasting disabled?
Set the SSID value in the client software to
public
.
Configure open authentication on the AP and the client.
Set the SSID value on the client to the SSID configured on the AP.
Configure MAC address filtering to permit the client to connect to the AP.
Which encryption type does WPA2 use?
AES-CCMP
PPK via IV
PSK
TKIP/MIC
What are two security appliances that can be installed in a network? (Choose two.)
ATM
IDS
IOS
IPS
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
Allow unrestricted access to the console or VTY ports.
Use a firewall to restrict access from the outside to the network devices.
Use SSH or another encrypted and authenticated transport to access device configurations.
Always use Telnet to access the device command line because it is automatically encrypted.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset