Would you like to submit the test?

Networking Questions And Answers Sample Test 9


Sample Networking Test 9 for you to Practice. Evaluate your Networking Test 9 test answering skills by trying the online Networking Sample Test 9 and know your score.

Networking Test 9


You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
1. What command will permit SMTP mail to only host 1.1.1.1?



Explanation:

When trying to find the best answer to an access-list question, always check the access-list number and then the protocol. When filtering to an upper-layer protocol, you must use an extended list, numbers 100-199 and 2000-2699. Also, when you filter to an upper-layer protocol, you must use either tcp or udp in the protocol field. If it says ip in the protocol field, you cannot filter to an upper-layer protocol. SMTP uses TCP.


2.
   What does RIPv2 use to prevent routing loops?
CIDR
Split horizon
Authentication
Classless masking
Holddown timers



Explanation:

RIPv2 uses the same timers and loop-avoidance schemes as RIPv1. Split horizon is used to stop an update from being sent out the same interface it was received on. Holddown timers allow time for a network to become stable in the case of a flapping link.


3.   How long is an IPv6 address



Explanation:

An IPv6 address is 128 bits long.


4. Which command is used to determine if an IP access list is enabled on a particular interface?



Explanation:

The show ip interface command will show you if any outbound or inbound interfaces have an access list set.


5. When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined?



Explanation:

Clocking on a serial interface is always provided by the CSU/DSU (DCE device). However, if you do not have a CSU/DSU in your nonproduction test environment, then you need to supply clocking with the clock rate command on the serial interface of the router with the DCE cable attached.


6. What is the purpose of flow control?



Explanation:

Flow control allows the receiving device to control the transmitter so the receiving device's buffer does not overflow.


7. Which command will show you all the translations active on your router?



Explanation:

The command show ip nat translations will show you the translation table containing all the active NAT entries.


8.
Pat Address Translation is also termed what?



Explanation:

Another term for port address translation is NAT Overload because that is the command used to enable port address translation.


9.
Which of the following statement is true?



Explanation:

Switches break up collision domains, and routers break up broadcast domains.


10. What command is used to create a backup configuration?



Explanation:

The command to back up the configuration on a router is copy running-config startup-config.


11.
Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224?



Explanation:

A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides 8 subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then only 6 subnets would be available for use.


12.
Which of the following are types of flow control?

Buffering
Cut-through
Windowing
Congestion avoidance



Explanation:

The common types of flow control are buffering, windowing, and congestion avoidance.


13. Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?



Explanation:

IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model.


14. Which of the following is considered to be the address before translation?



Explanation:

The host on the private network before translation is considered to be an inside local host.


15.
If you want to disable STP on a port connected to a server, which command would you use?



Explanation:

If you have a server or other devices connected into your switch that you're totally sure won't create a switching loop if STP is disabled, you can use something called portfast on these ports. Using it means the port won't spend the usual 50 seconds to come up while STP is converging.


16. What are the decimal and hexadecimal equivalents for the binary number 10110111?



Explanation:

You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.


17. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?



Explanation:

All Cisco routers have a default configuration register setting of 0x2102, which tells the router to load the IOS from flash memory and the configuration from NVRAM


18. Which of the following is true regarding VTP?



Explanation:

All Cisco switches are VTP servers by default. No other VTP information is configured on a Cisco switch by default. You must set the VTP domain name on all switches to be the same domain name or they will not share the VTP database.


19. Which of the following commands sets the secret password to Cisco?



Explanation:

The enable secret password is case sensitive, so the second option is wrong. To set the enable secret <password>, use the enable secret <password> command from global configuration mode.


20. What is the maximum data rate for the 802.11b standard?



Explanation:

The IEEE 802.11b standard provides a maximum data rate of up to 11Mbps.


21. Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?



Explanation:

To turn a binary number into decimal, you just have to add the values of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.

Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.


22. What keystroke will terminate setup mode?



Explanation:

You can exit setup mode at any time by using the keystroke Ctrl+C.


23. Which command will show you whether a DTE or a DCE cable is plugged into serial 0?



Explanation:

The show controllers serial 0 command will show you whether either a DTE or DCE cable is connected to the interface. If it is a DCE connection, you need to add clocking with the clock rate command.


24.
The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services?



Explanation:

PPP is your only option, as HDLC and Frame Relay do not support these types of business requirements. PPP provides dynamic addressing, authentication using PAP or CHAP, and callback services.


25.
Which of the following types of connections can use full duplex?

Hub to hub
Switch to switch
Host to host
Switch to hub
Switch to hostwing types of connections can use full duplex?



Explanation:

Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.


26. What is the frequency range of the IEEE 802.11a standard?



Explanation:

The IEEE 802.11a standard runs in the 5GHz RF range.


27.
Which of the following services use TCP?

DHCP
SMTP
HTTP
TFTP
FTP



Explanation:

SMTP, HTTP and FTP use TCP.


28.
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?



Explanation:

First, you must know that a /20 is 255.255.240.0, which is a block size of 16 in the third octet. Counting by 16s, this makes our subnet 48 in the third octet, and the wildcard for the third octet would be 15 since the wildcard is always one less than the block size.


29.
Which of the following services use UDP?

DHCP
SMTP
SNMP
FTP
HTTP
TFTP



Explanation:

DHCP, SNMP, and TFTP use UDP.


30.
 
If you wanted administrators to see a message when logging into the router, which command would you use?



Explanation:

The typical banner is a message of the day (MOTD) and is set by using the global configuration mode command banner motd.




FreshersLive - No.1 Job site in India. Here you can find latest 2017 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.