Theory Mock Questions Flashcards

(44 cards)

1
Q

With reference to the figure, identify the Device?

  • Firewall
  • Hub
  • Switch
  • Router
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A resilient network is essential. Which topology should be implemented to facilitate redundancy in the switch design?

Linear Bus

Star

Partial Mesh

Full Mesh

A

Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been tasked with renaming the switches within your organisation. Which one of the following would not change the Switch name as it is unacceptable?

R1(config)#host GlasgowEast

R1(config)#hostname Glasgow East

R1(config)#hostname GlasgowEast

R1(config)#host Glasgow_East

A

R1(config)#hostname Glasgow East

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which one of the following commands can be used to view if the switch is a server or a client ?

show VTP status

show VLAN brief

show VTP brief

show VLAN database

A

show VTP status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which one of the following commands can be used to view the configuration of a port on a switch?

show interface fa 0/1

show interface ge 1/0

show interface fa 0/0

show interface ge 0/0

A

show interface fa 0/1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric switching?

Switch ports are configured with the same speed

Switching between ports with multiple different speeds of like speed

Switch ports are configured with different speeds

Routing between ports of different speeds

A

Switch ports are configured with the same speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which switch frame forwards mode has the greatest latency?

Store and forward

Cut through

fragment free

Cut through store and forward

A

Store and forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which switch frame forwarding mode begins to sending the data as soon as the destination address is identified?

fragment free

store and forward

Cut through

Cut through store forward

A

Cut through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the protocols used for remote access

SSH & Telnet

FTP & Telnet

HTTP & SSH

Telnet & HTTP

A

SSH & Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A switch has yet to populate its MAC address table. What will happen when the switch receives a packet?

Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received

Discard the frame

Discard the source address and forward frame out all ports

Populate the MAC table with the frame destination address and forward the frame out all ports except the port on which the frame was received

A

Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of CRC?

switches packet to correct destination

prevents loops in switching

encapsulates data

error-detecting code commonly to detect accidental changes to raw data

A

error-detecting code commonly to detect accidental changes to raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What of the following would be the last host address of the 172.29.64.64/27?

172.29.64.0/27

172.29.64.126/27

172.29.64.94/27

172.29.64.65/27

A

172.29.64.94/27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port security is a function of which layer of the Cisco 3 Tier Model?

Backbone layer

Access Layer

Distribution Layer

Core Layer

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most common and effective switch topology utilised in modern LANs?

Star

Full Mesh

Hierarchical Tree

Linear Bus

A

Hierarchical Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Store and Forward is a method of forwarding data via a switch. Which one of the following best describes Store and Forward?

The switch will analyse the entire frame for the destination MAC address and then forward the frame

The switch will analyse the entire frame for the destination MAC address and then forward the packet

A

The switch will analyse the entire frame for the destination MAC address and then forward the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which one of the following commands can be used to view which VLAN a port is associated with?

show ver

show int f0/1

show VTP status

show vlan brief

A

show vlan brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the command to add a VLAN to your switch?

(config)#create VLAN 10

(config-if)# VLAN 10

(config)#int VLAN 10

(config-router)#int VLAN 10

A

(config-if)# VLAN 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What protocol is use when configuring router-on-a-stick?

802.1p

SSH

802.1q

encapsulation

19
Q

What is the function of VTP Pruning?

Prevents switching loops

Minimises the area a LAN covers

Stops VLAN communications

Restricts the flood of broadcasts to only areas requiring these broadcasts

A

Restricts the flood of broadcasts to only areas requiring these broadcasts

20
Q

Which trunking protocol operating mode will not learn VLAN information from a VTP Server?

Server

Cisco

Client

Transparent

21
Q

Which one of the following list of commands would you require set a switch as a VTP client? The password required is switch.

Switch(Config)# Show run

Switch(Config)# vtp mode client

Switch(Config)# vtp password switch

Switch(Config)# vtp client

Switch(Config)# vtp domain cisco

Switch(Config)# vtp password switch

Switch(Config)# Int f0/1

Switch(Config)# vtp domain cisco

Switch(Config)# vtp password switch

Switch(Config)# vtp mode client

Switch(Config)# vtp domain Cisco

Switch(Config)# vtp password switch

A

Switch(Config)# vtp mode client

Switch(Config)# vtp domain Cisco

Switch(Config)# vtp password switch

22
Q

Switches will compare the priority and MAC address for the lowest value to identify which of the following?

Root Switch

VTP Client

Root Bridge

VTP Server

23
Q

Which of the following is the correct term that refers to the process of when a switch creates a dedicated path for sending and receiving transmissions with each connected host. Each host then has a separate collision domain and a dedicated bandwidth?

Tunneling

Micro Segmentation

Encapsulation

Packet Switching

A

Micro Segmentation

24
Q

Which of the following is a function of a bridge protocol data unit?

Used by STP to prune routes to control broadcast

Used by VTP to communicate with other switches to control broadcasts

Used by STP to communicate with other switches to prevent switching loops

Used by VTP to identify VTP server

A

Used by STP to communicate with other switches to prevent switching loops

25
What is the correct state of ports in standard spanning tree? Block, listen, learn, forward, disable Block, disabled, listen, learn, forwarding Block, listen, learn, disabled, forward Block, filtering, listening, learning, disabled
Block, listen, learn, forward, disable
26
VLAN Trunking Protocol uses which protocols? frames and packets LAPA and LAPB 802.1q and ISL UDP and TCP
802.1q and ISL
27
Which of the following is UNTRUE when configuring VLANs? VLAN 1 cannot be deleted, amended or renamed Voice should use the Native VLAN Hosts can be moved from VLAN to VLAN without the need to change wiring. The management VLAN should not be used for transferring data
Voice should use the Native VLAN
28
Sub interfaces, routing protocol, trunk protocol, address scheme require to be configured for which function? VTP STP UDP Inter-VLANs
Inter-VLANs
29
You are tasked with creating a sub-interface on a router. Which group of command would be configured for VLAN 40? R1(conf-if)# int fa0/0 R1(conf-subif)# ip address 172.16.16.1 255.255.248.0 R1(conf-subif)# encapsulation dot1q 40 R1(conf-if)# int fa0/0.1 R1(conf-subif)# ip address 172.16.16.1 255.255.248.0 R1(conf-subif)# encapsulation dot1q 40 R1(conf-if)# int fa0/0.40 R1(conf-subif)# ip address 172.16.16.1 255.255.248.0 R1(conf-subif)# encapsulation dot1q R1(conf-if)# fa0/0.40 R1(conf-subif)# ip address 172.16.16.1 255.255.248.0 R1(conf-subif)# encapsulation dot1q 40
R1(conf-if)# int fa0/0.1 R1(conf-subif)# ip address 172.16.16.1 255.255.248.0 R1(conf-subif)# encapsulation dot1q 40
30
From the list provided below, identify the most appropriate set of commands for configuring the switch port to run as an access port Switch(config)#int f0/9 Switch(config-if)#switchport access mode Switch(config-if)#switchport access VLAN 12 Switch(config)#int f0/9 Switch(config-if)#mode access Switch(config-if)#switchport access VLAN 12 Switch(config)#int f0/9 Switch(config-if)# switchport mode access Switch(config-if)#switchport VLAN 12 Switch(config)#int f0/9 Switch(config-if)#switchport mode access Switch(config-if)#switchport access VLAN 12
Switch(config)#int f0/9 Switch(config-if)#switchport mode access Switch(config-if)#switchport access VLAN 12
31
Which one of the following security standards would utilise a radius or AAA server for authentication AES WPA2-enterprise TKIP WPA2-personal
WPA2-enterprise
32
WPA2 is which of the following? Encryption protocol Authorisation protocol Audit Protocol Authentication protocol
Authentication protocol
33
In a wireless network a mac address or ip addresses can be specified to control access to particular devices. This is a method of which one of the following? Authentication Audit Communication Encryption
Authentication
34
Wireless communications operates on a shared media. This required which one of the following technologies to manage communications on the shared media? Carrier Sense Multiple Access/Collision Avoidance Carrier Sense Multiple Access/Collision Detection Carrier Sense Multiple Access/Collision Acceptance Carrier Sense Multiple Access/Collision Defence
Carrier Sense Multiple Access/Collision Avoidance
35
One of the following is not associated with the topologies of wireless networking? Enhanced Service Set (ESS) Infrastructure Ad-hoc Extended Service Set (ESS)
Enhanced Service Set (ESS)
36
Which of the following is not wireless Network Mode option? 802.11b 802.11a/g 802.11b/g Mixed
802.11a/g
37
To configure a wireless access point which of the following are required? Browser software and MAC address of the Access Point A crossover cable and MAC address of the Access Point Command prompt and IP address of the Access Point Browser software and the IP address of the Access point
Browser software and the IP address of the Access point
38
When installing a wireless ESS. The use of which channels should be utilised to prevent communication problems? Channels 2, 6 & 9 Channels 1, 6 & 11 Channels 1,3 & 6 Channels 2, 6 & 10
Channels 1, 6 & 11
39
Which carrier frequency is used by the wireless standard 802.11n? 5 GHz 2.4 GHz & 5 GHz 2.4 GHz 2.9 GHz
2.4 GHz & 5 GHz
40
In the hierarchical model which layer provide a boundary definition using access lists and other filters to limit what gets into the backbone of the network? * Access * Core * Distribution * Boundary
Distribution
41
Which technology allows 2 routers to communicate using a straight through cable TIA/EIA 568B TIA/EIA 568A MDI MDIX
MDIX
42
An organisation has 2 networks, one for data only and the other for telephony and a separate video conference room. Which of the following term describes this organisations network? Non-Converged Converged Individual Flexible
Non-Converged
43
A communication which can send and receive information between 2 devices but NOT simultaneously. Which type of communication is enabled? Symmetrial asymmetric Half Duplex Full Duplex
Half Duplex
44
Figure 1 is a transceiver. Which type of cable should be used? Fibre Ethernet Wireless Coaxial
Fibre