Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
1 4155Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session
1 4628What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
1 7377We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
1 4836With distance vector routing protocols, it is never useful to send the same routing update packet back out the same interface that it was learned. This concept is called what? A.) Holddown timers B.) Poison Reverse C.) Count to infinity D.) Split Horizon E.) Link State
2 4970Which of the following are ways to provide login access to a router? A.) HTTP B.) Console C.) Telnet D.) Aux Port E.) SNMP F.) LLC
3 15966What two types of PPP data compression are available using Cisco IOS? A.) Predictor B.) DoubleSpace C.) Stacker D.) PAP E.) ZIP F.) CHAP
2 7599In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
1 3774Which of the following are examples of the Transport Layer? A.) SQL B.) UDP C.) IP D.) LLC E.) ARP
1 3894Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent? A.) Escape sequence to exit the menu. B.) Nothing, just part of the banner. C.) Tic Tac Toe Macro. D.) Delimiting Character E.) Message border character. F.) Number of times message to be displayed.
1 3935There is a process in Frame-Relay where LMI resolves an IP address from a DLCI number. What is this called? A.) arp B.) inverse arp C.) rarp D.) automap E.) reverse arp F.) arp
2 5563When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO
1 3999You want to segment a network. The network is running SNA and Netbios. Which device should NOT be used to segment the network? A.) A store and forward switch. B.) A router. C.) A Catalyst 5000. D.) A cut-through switch. E.) A bridge.
1 4104Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
2 4821Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) Token Ring E.) FDDI F.) TCP
2 5137
Define topology?
When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?
What is mtu and what is its size for transmission?
What are 10base2, 10base5 and 10baset ethernet lans?
How do we do encryption and authentication in L2F?
Define network congestion?
Differnce between the communication and transmission?
Why is vlan used?
Explain the difference between baseband and broadband transmission in ccna?
What is difference between tcp/ip and osi model?
What is default packet size of ipv6?
What is the mesh network?
What is the default size of frame?
What are the things that can be accessed in a CISCO router’s identifying information?
What is Route Poisoning?