Theory Mock Questions Flashcards

1
Q

With reference to the figure, identify the Device?

  • Firewall
  • Hub
  • Switch
  • Router
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A resilient network is essential. Which topology should be implemented to facilitate redundancy in the switch design?

Linear Bus

Star

Partial Mesh

Full Mesh

A

Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been tasked with renaming the switches within your organisation. Which one of the following would not change the Switch name as it is unacceptable?

R1(config)#host GlasgowEast

R1(config)#hostname Glasgow East

R1(config)#hostname GlasgowEast

R1(config)#host Glasgow_East

A

R1(config)#hostname Glasgow East

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which one of the following commands can be used to view if the switch is a server or a client ?

show VTP status

show VLAN brief

show VTP brief

show VLAN database

A

show VTP status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which one of the following commands can be used to view the configuration of a port on a switch?

show interface fa 0/1

show interface ge 1/0

show interface fa 0/0

show interface ge 0/0

A

show interface fa 0/1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric switching?

Switch ports are configured with the same speed

Switching between ports with multiple different speeds of like speed

Switch ports are configured with different speeds

Routing between ports of different speeds

A

Switch ports are configured with the same speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which switch frame forwards mode has the greatest latency?

Store and forward

Cut through

fragment free

Cut through store and forward

A

Store and forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which switch frame forwarding mode begins to sending the data as soon as the destination address is identified?

fragment free

store and forward

Cut through

Cut through store forward

A

Cut through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the protocols used for remote access

SSH & Telnet

FTP & Telnet

HTTP & SSH

Telnet & HTTP

A

SSH & Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A switch has yet to populate its MAC address table. What will happen when the switch receives a packet?

Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received

Discard the frame

Discard the source address and forward frame out all ports

Populate the MAC table with the frame destination address and forward the frame out all ports except the port on which the frame was received

A

Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of CRC?

switches packet to correct destination

prevents loops in switching

encapsulates data

error-detecting code commonly to detect accidental changes to raw data

A

error-detecting code commonly to detect accidental changes to raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What of the following would be the last host address of the 172.29.64.64/27?

172.29.64.0/27

172.29.64.126/27

172.29.64.94/27

172.29.64.65/27

A

172.29.64.94/27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port security is a function of which layer of the Cisco 3 Tier Model?

Backbone layer

Access Layer

Distribution Layer

Core Layer

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most common and effective switch topology utilised in modern LANs?

Star

Full Mesh

Hierarchical Tree

Linear Bus

A

Hierarchical Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Store and Forward is a method of forwarding data via a switch. Which one of the following best describes Store and Forward?

The switch will analyse the entire frame for the destination MAC address and then forward the frame

The switch will analyse the entire frame for the destination MAC address and then forward the packet

A

The switch will analyse the entire frame for the destination MAC address and then forward the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which one of the following commands can be used to view which VLAN a port is associated with?

show ver

show int f0/1

show VTP status

show vlan brief

A

show vlan brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the command to add a VLAN to your switch?

(config)#create VLAN 10

(config-if)# VLAN 10

(config)#int VLAN 10

(config-router)#int VLAN 10

A

(config-if)# VLAN 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What protocol is use when configuring router-on-a-stick?

802.1p

SSH

802.1q

encapsulation

A

802.1q

19
Q

What is the function of VTP Pruning?

Prevents switching loops

Minimises the area a LAN covers

Stops VLAN communications

Restricts the flood of broadcasts to only areas requiring these broadcasts

A

Restricts the flood of broadcasts to only areas requiring these broadcasts

20
Q

Which trunking protocol operating mode will not learn VLAN information from a VTP Server?

Server

Cisco

Client

Transparent

A

Transparent

21
Q

Which one of the following list of commands would you require set a switch as a VTP client? The password required is switch.

Switch(Config)# Show run

Switch(Config)# vtp mode client

Switch(Config)# vtp password switch

Switch(Config)# vtp client

Switch(Config)# vtp domain cisco

Switch(Config)# vtp password switch

Switch(Config)# Int f0/1

Switch(Config)# vtp domain cisco

Switch(Config)# vtp password switch

Switch(Config)# vtp mode client

Switch(Config)# vtp domain Cisco

Switch(Config)# vtp password switch

A

Switch(Config)# vtp mode client

Switch(Config)# vtp domain Cisco

Switch(Config)# vtp password switch

22
Q

Switches will compare the priority and MAC address for the lowest value to identify which of the following?

Root Switch

VTP Client

Root Bridge

VTP Server

A

Root Bridge

23
Q

Which of the following is the correct term that refers to the process of when a switch creates a dedicated path for sending and receiving transmissions with each connected host. Each host then has a separate collision domain and a dedicated bandwidth?

Tunneling

Micro Segmentation

Encapsulation

Packet Switching

A

Micro Segmentation

24
Q

Which of the following is a function of a bridge protocol data unit?

Used by STP to prune routes to control broadcast

Used by VTP to communicate with other switches to control broadcasts

Used by STP to communicate with other switches to prevent switching loops

Used by VTP to identify VTP server

A

Used by STP to communicate with other switches to prevent switching loops

25
Q

What is the correct state of ports in standard spanning tree?

Block, listen, learn, forward, disable

Block, disabled, listen, learn, forwarding

Block, listen, learn, disabled, forward

Block, filtering, listening, learning, disabled

A

Block, listen, learn, forward, disable

26
Q

VLAN Trunking Protocol uses which protocols?

frames and packets

LAPA and LAPB

802.1q and ISL

UDP and TCP

A

802.1q and ISL

27
Q

Which of the following is UNTRUE when configuring VLANs?

VLAN 1 cannot be deleted, amended or renamed

Voice should use the Native VLAN

Hosts can be moved from VLAN to VLAN without the need to change wiring.

The management VLAN should not be used for transferring data

A

Voice should use the Native VLAN

28
Q

Sub interfaces, routing protocol, trunk protocol, address scheme require to be configured for which function?

VTP

STP

UDP

Inter-VLANs

A

Inter-VLANs

29
Q

You are tasked with creating a sub-interface on a router. Which group of command would be configured for VLAN 40?

R1(conf-if)# int fa0/0
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40

R1(conf-if)# int fa0/0.1
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40

R1(conf-if)# int fa0/0.40
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q

R1(conf-if)# fa0/0.40
R1(conf-subif)# ip address 172.16.16.1 255.255.248.0
R1(conf-subif)# encapsulation dot1q 40

A

R1(conf-if)# int fa0/0.1

R1(conf-subif)# ip address 172.16.16.1 255.255.248.0

R1(conf-subif)# encapsulation dot1q 40

30
Q

From the list provided below, identify the most appropriate set of commands for configuring the switch port to run as an access port

Switch(config)#int f0/9
Switch(config-if)#switchport access mode
Switch(config-if)#switchport access VLAN 12

Switch(config)#int f0/9
Switch(config-if)#mode access
Switch(config-if)#switchport access VLAN 12

Switch(config)#int f0/9
Switch(config-if)# switchport mode access
Switch(config-if)#switchport VLAN 12

Switch(config)#int f0/9
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access VLAN 12

A

Switch(config)#int f0/9

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access VLAN 12

31
Q

Which one of the following security standards would utilise a radius or AAA server for authentication

AES

WPA2-enterprise

TKIP

WPA2-personal

A

WPA2-enterprise

32
Q

WPA2 is which of the following?

Encryption protocol

Authorisation protocol

Audit Protocol

Authentication protocol

A

Authentication protocol

33
Q

In a wireless network a mac address or ip addresses can be specified to control access to particular devices. This is a method of which one of the following?

Authentication

Audit

Communication

Encryption

A

Authentication

34
Q

Wireless communications operates on a shared media. This required which one of the following technologies to manage communications on the shared media?

Carrier Sense Multiple Access/Collision Avoidance

Carrier Sense Multiple Access/Collision Detection

Carrier Sense Multiple Access/Collision Acceptance

Carrier Sense Multiple Access/Collision Defence

A

Carrier Sense Multiple Access/Collision Avoidance

35
Q

One of the following is not associated with the topologies of wireless networking?

Enhanced Service Set (ESS)

Infrastructure

Ad-hoc

Extended Service Set (ESS)

A

Enhanced Service Set (ESS)

36
Q

Which of the following is not wireless Network Mode option?

802.11b

802.11a/g

802.11b/g

Mixed

A

802.11a/g

37
Q

To configure a wireless access point which of the following are required?

Browser software and MAC address of the Access Point

A crossover cable and MAC address of the Access Point

Command prompt and IP address of the Access Point

Browser software and the IP address of the Access point

A

Browser software and the IP address of the Access point

38
Q

When installing a wireless ESS. The use of which channels should be utilised to prevent communication problems?

Channels 2, 6 & 9

Channels 1, 6 & 11

Channels 1,3 & 6

Channels 2, 6 & 10

A

Channels 1, 6 & 11

39
Q

Which carrier frequency is used by the wireless standard 802.11n?

5 GHz

2.4 GHz & 5 GHz

2.4 GHz

2.9 GHz

A

2.4 GHz & 5 GHz

40
Q

In the hierarchical model which layer provide a boundary definition using access lists and other filters to limit what gets into the backbone of the network?

  • Access
  • Core
  • Distribution
  • Boundary
A

Distribution

41
Q

Which technology allows 2 routers to communicate using a straight through cable

TIA/EIA 568B

TIA/EIA 568A

MDI

MDIX

A

MDIX

42
Q

An organisation has 2 networks, one for data only and the other for telephony and a separate video conference room. Which of the following term describes this organisations network?

Non-Converged

Converged

Individual

Flexible

A

Non-Converged

43
Q

A communication which can send and receive information between 2 devices but NOT simultaneously. Which type of communication is enabled?

Symmetrial

asymmetric

Half Duplex

Full Duplex

A

Half Duplex

44
Q

Figure 1 is a transceiver. Which type of cable should be used?

Fibre

Ethernet

Wireless

Coaxial

A

Fibre