Theory Mock Questions Flashcards
With reference to the figure, identify the Device?
- Firewall
- Hub
- Switch
- Router
Hub
A resilient network is essential. Which topology should be implemented to facilitate redundancy in the switch design?
Linear Bus
Star
Partial Mesh
Full Mesh
Partial Mesh
You have been tasked with renaming the switches within your organisation. Which one of the following would not change the Switch name as it is unacceptable?
R1(config)#host GlasgowEast
R1(config)#hostname Glasgow East
R1(config)#hostname GlasgowEast
R1(config)#host Glasgow_East
R1(config)#hostname Glasgow East
Which one of the following commands can be used to view if the switch is a server or a client ?
show VTP status
show VLAN brief
show VTP brief
show VLAN database
show VTP status
Which one of the following commands can be used to view the configuration of a port on a switch?
show interface fa 0/1
show interface ge 1/0
show interface fa 0/0
show interface ge 0/0
show interface fa 0/1
What is symmetric switching?
Switch ports are configured with the same speed
Switching between ports with multiple different speeds of like speed
Switch ports are configured with different speeds
Routing between ports of different speeds
Switch ports are configured with the same speed
Which switch frame forwards mode has the greatest latency?
Store and forward
Cut through
fragment free
Cut through store and forward
Store and forward
Which switch frame forwarding mode begins to sending the data as soon as the destination address is identified?
fragment free
store and forward
Cut through
Cut through store forward
Cut through
Identify the protocols used for remote access
SSH & Telnet
FTP & Telnet
HTTP & SSH
Telnet & HTTP
SSH & Telnet
A switch has yet to populate its MAC address table. What will happen when the switch receives a packet?
Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received
Discard the frame
Discard the source address and forward frame out all ports
Populate the MAC table with the frame destination address and forward the frame out all ports except the port on which the frame was received
Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received
What is the function of CRC?
switches packet to correct destination
prevents loops in switching
encapsulates data
error-detecting code commonly to detect accidental changes to raw data
error-detecting code commonly to detect accidental changes to raw data
What of the following would be the last host address of the 172.29.64.64/27?
172.29.64.0/27
172.29.64.126/27
172.29.64.94/27
172.29.64.65/27
172.29.64.94/27
Port security is a function of which layer of the Cisco 3 Tier Model?
Backbone layer
Access Layer
Distribution Layer
Core Layer
Access Layer
Which of the following is the most common and effective switch topology utilised in modern LANs?
Star
Full Mesh
Hierarchical Tree
Linear Bus
Hierarchical Tree
Store and Forward is a method of forwarding data via a switch. Which one of the following best describes Store and Forward?
The switch will analyse the entire frame for the destination MAC address and then forward the frame
The switch will analyse the entire frame for the destination MAC address and then forward the packet
The switch will analyse the entire frame for the destination MAC address and then forward the frame
Which one of the following commands can be used to view which VLAN a port is associated with?
show ver
show int f0/1
show VTP status
show vlan brief
show vlan brief
What is the command to add a VLAN to your switch?
(config)#create VLAN 10
(config-if)# VLAN 10
(config)#int VLAN 10
(config-router)#int VLAN 10
(config-if)# VLAN 10
What protocol is use when configuring router-on-a-stick?
802.1p
SSH
802.1q
encapsulation
802.1q
What is the function of VTP Pruning?
Prevents switching loops
Minimises the area a LAN covers
Stops VLAN communications
Restricts the flood of broadcasts to only areas requiring these broadcasts
Restricts the flood of broadcasts to only areas requiring these broadcasts
Which trunking protocol operating mode will not learn VLAN information from a VTP Server?
Server
Cisco
Client
Transparent
Transparent
Which one of the following list of commands would you require set a switch as a VTP client? The password required is switch.
Switch(Config)# Show run
Switch(Config)# vtp mode client
Switch(Config)# vtp password switch
Switch(Config)# vtp client
Switch(Config)# vtp domain cisco
Switch(Config)# vtp password switch
Switch(Config)# Int f0/1
Switch(Config)# vtp domain cisco
Switch(Config)# vtp password switch
Switch(Config)# vtp mode client
Switch(Config)# vtp domain Cisco
Switch(Config)# vtp password switch
Switch(Config)# vtp mode client
Switch(Config)# vtp domain Cisco
Switch(Config)# vtp password switch
Switches will compare the priority and MAC address for the lowest value to identify which of the following?
Root Switch
VTP Client
Root Bridge
VTP Server
Root Bridge
Which of the following is the correct term that refers to the process of when a switch creates a dedicated path for sending and receiving transmissions with each connected host. Each host then has a separate collision domain and a dedicated bandwidth?
Tunneling
Micro Segmentation
Encapsulation
Packet Switching
Micro Segmentation
Which of the following is a function of a bridge protocol data unit?
Used by STP to prune routes to control broadcast
Used by VTP to communicate with other switches to control broadcasts
Used by STP to communicate with other switches to prevent switching loops
Used by VTP to identify VTP server
Used by STP to communicate with other switches to prevent switching loops
What is the correct state of ports in standard spanning tree?
Block, listen, learn, forward, disable
Block, disabled, listen, learn, forwarding
Block, listen, learn, disabled, forward
Block, filtering, listening, learning, disabled
Block, listen, learn, forward, disable
VLAN Trunking Protocol uses which protocols?
frames and packets
LAPA and LAPB
802.1q and ISL
UDP and TCP
802.1q and ISL
Which of the following is UNTRUE when configuring VLANs?
VLAN 1 cannot be deleted, amended or renamed
Voice should use the Native VLAN
Hosts can be moved from VLAN to VLAN without the need to change wiring.
The management VLAN should not be used for transferring data
Voice should use the Native VLAN
Sub interfaces, routing protocol, trunk protocol, address scheme require to be configured for which function?
VTP
STP
UDP
Inter-VLANs
Inter-VLANs
You are tasked with creating a sub-interface on a router. Which group of command would be configured for VLAN 40?
R1(conf-if)# int fa0/0
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40
R1(conf-if)# int fa0/0.1
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40
R1(conf-if)# int fa0/0.40
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q
R1(conf-if)# fa0/0.40
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40
R1(conf-if)# int fa0/0.1
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40
From the list provided below, identify the most appropriate set of commands for configuring the switch port to run as an access port
Switch(config)#int f0/9
Switch(config-if)#switchport access mode
Switch(config-if)#switchport access VLAN 12
Switch(config)#int f0/9
Switch(config-if)#mode access
Switch(config-if)#switchport access VLAN 12
Switch(config)#int f0/9
Switch(config-if)# switchport mode access
Switch(config-if)#switchport VLAN 12
Switch(config)#int f0/9
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access VLAN 12
Switch(config)#int f0/9
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access VLAN 12
Which one of the following security standards would utilise a radius or AAA server for authentication
AES
WPA2-enterprise
TKIP
WPA2-personal
WPA2-enterprise
WPA2 is which of the following?
Encryption protocol
Authorisation protocol
Audit Protocol
Authentication protocol
Authentication protocol
In a wireless network a mac address or ip addresses can be specified to control access to particular devices. This is a method of which one of the following?
Authentication
Audit
Communication
Encryption
Authentication
Wireless communications operates on a shared media. This required which one of the following technologies to manage communications on the shared media?
Carrier Sense Multiple Access/Collision Avoidance
Carrier Sense Multiple Access/Collision Detection
Carrier Sense Multiple Access/Collision Acceptance
Carrier Sense Multiple Access/Collision Defence
Carrier Sense Multiple Access/Collision Avoidance
One of the following is not associated with the topologies of wireless networking?
Enhanced Service Set (ESS)
Infrastructure
Ad-hoc
Extended Service Set (ESS)
Enhanced Service Set (ESS)
Which of the following is not wireless Network Mode option?
802.11b
802.11a/g
802.11b/g
Mixed
802.11a/g
To configure a wireless access point which of the following are required?
Browser software and MAC address of the Access Point
A crossover cable and MAC address of the Access Point
Command prompt and IP address of the Access Point
Browser software and the IP address of the Access point
Browser software and the IP address of the Access point
When installing a wireless ESS. The use of which channels should be utilised to prevent communication problems?
Channels 2, 6 & 9
Channels 1, 6 & 11
Channels 1,3 & 6
Channels 2, 6 & 10
Channels 1, 6 & 11
Which carrier frequency is used by the wireless standard 802.11n?
5 GHz
2.4 GHz & 5 GHz
2.4 GHz
2.9 GHz
2.4 GHz & 5 GHz
In the hierarchical model which layer provide a boundary definition using access lists and other filters to limit what gets into the backbone of the network?
- Access
- Core
- Distribution
- Boundary
Distribution
Which technology allows 2 routers to communicate using a straight through cable
TIA/EIA 568B
TIA/EIA 568A
MDI
MDIX
MDIX
An organisation has 2 networks, one for data only and the other for telephony and a separate video conference room. Which of the following term describes this organisations network?
Non-Converged
Converged
Individual
Flexible
Non-Converged
A communication which can send and receive information between 2 devices but NOT simultaneously. Which type of communication is enabled?
Symmetrial
asymmetric
Half Duplex
Full Duplex
Half Duplex
Figure 1 is a transceiver. Which type of cable should be used?
Fibre
Ethernet
Wireless
Coaxial
Fibre