Would you like to submit the test?

Networking Questions And Answers Sample Test 2


Sample Networking Test 2 for you to Practice. Evaluate your Networking Test 2 test answering skills by trying the online Networking Sample Test 2 and know your score.

Networking Test 2


You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
1. What is the maximum distance with maximum data rate for 802.11b?



Explanation:

The IEEE 802.11b standard provides a maximum data rate of up to only 11Mbps, and you can be around 150 feet, maybe farther, depending on conditions.


2. What are the decimal and hexadecimal equivalents for the binary number 10110111?



Explanation:

You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.


3. Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?



Explanation:

A allows the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. A VPN can be set up across any type of link.


4. You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type in?



Explanation:

Since the question never mentioned anything about a suspended session, you can assume that the Telnet session is still open, and you would just type exit to close the session


5. Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____.



Explanation:

Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at layer 1. Word processing applications communicate to the Application layer interface, but do not operate at layer 7, so the answer would be none.


6. Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?



Explanation:

IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model.


7. Which of the following would be a good starting point for troubleshooting if your router is not translating?



Explanation:

In order for NAT to provide translation services, you must have ip nat inside and ip nat outside configured on your router's interfaces.


8.
 Which of the following are disadvantages of using NAT?

Translation introduces switching path delays.
Conserves legally registered addresses.
Causes loss of end-to-end IP traceability.
Increases flexibility when connecting to the Internet.
Certain applications will not function with NAT enabled.
Reduces address overlap occurrence.



Explanation:

NAT is not perfect and can cause some issues in some networks, but most networks work just fine. NAT can cause delays and troubleshooting problems, and some applications just won't work.


9. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?



Explanation:

The only command that shows which access lists have been applied to an interface is show ip interface Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.


10. Which of the following commands will configure all the default VTY ports on a router?



Explanation:

From global configuration mode, use the line vty 0 4 command to set all five default VTY lines.


11.
What is the maximum data rate for the 802.11a standard?



Explanation:

The IEEE 802.11a standard provides a maximum data rate of up to 54Mbps.


12. Which of the following is an example of a standard IP access list?



Explanation:

Standard IP access lists use the numbers 1-99 and 1300-1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.


13. When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined?



Explanation:

Clocking on a serial interface is always provided by the CSU/DSU (DCE device). However, if you do not have a CSU/DSU in your nonproduction test environment, then you need to supply clocking with the clock rate command on the serial interface of the router with the DCE cable attached.


14. Which command would you place on interface connected to the Internet?



Explanation:

As in access-lists, you must configure your interfaces before NAT will provide any translations. On the inside networks you would use the command ip nat inside. On the outside interface, you will use the command ip nat outside.


15. What is the maximum distance with maximum data rate for 802.11g?



Explanation:

The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps, but you need to be close to the access point, somewhere around 90 to 100 feet.


16. What multicast addresses does EIGRPv6 use?



Explanation:

EIGRPv6's multicast address stayed very near the same. In IPv4 it was 224.0.0.10; now it is FF02::A (A=10 in hexadecimal notation).


17. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?



Explanation:

A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.


18. You have a Cisco mesh network. What protocol allows multiple APs to connect with many redundant connections between nodes?



Explanation:

Each AP in a mesh network runs the Adaptive Wireless Path Protocol (AWPP). This protocol allows RAPs to communicate with each other to determine the best path back to the wired network via the RAP.


19. You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?



Explanation:

You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a metric of 16, this means it is inaccessible.


20.
Which of the following is true regarding access lists applied to an interface?





Explanation:

A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface


21. What VTP mode allows you to change VLAN information on the switch?



Explanation:

Only in server mode can you change VTP information on a switch.


22.
You type the following command into the router and receive the following output:

Router#show serial 0/0
        ^
% Invalid input detected at '^' marker.
Why was this error message displayed?



Explanation:

You can view the interface statistics from user mode, but the command is show interface serial 0/0.


23. Which of the following is a layer 2 protocol used to maintain a loop-free network?



Explanation:

The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.


24. To test the IP stack on your local host, which IP address would you ping?



Explanation:

To test the local stack on your host, ping the loopback interface of 127.0.0.1.


25. Which command will display the CHAP authentication process as it occurs between two routers in the network?



Explanation:

The command debug ppp authentication will show you the authentication process that PPP uses between point-to-point connections.


26. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?



Explanation:

When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP's case, hop count.


27. In which of the following technologies is the term HFC used?



Explanation:

In a modern network, hybrid fibre-coaxial (HFC) is a telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.


28.
The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?

Corp#sh ip route
[output cut]
R    192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C    192.168.20.0 is directly connected, Serial0/0
C    192.168.214.0 is directly connected, FastEthernet0/0



Explanation:

Since the routing table shows no route to the 192.168.22.0 network, the router will discard the packet and send an ICMP destination unreachable message out interface FastEthernet 0/0, which is the source LAN where the packet originated from.


29.
IGRP uses which of the following as default parameters for finding the best path to a remote network?

Hop count
MTU
Cumulative interface delay
STP
Path bandwidth value



Explanation:

IGRP uses bandwidth and delay of the line, by default, to determine the best path to a remote network. Delay of the line can sometimes be called the cumulative interface delay.


30. Which of the following is considered to be the address after translation?



Explanation:

The host on the private network after translation is considered to be an inside global host.




FreshersLive - No.1 Job site in India. Here you can find latest 2017 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.