8. the host address: ’’5c.0000.0ca1.4567’ is valid for which protocol stack? a.) sna b.) decnet c.) chaos d.) ip e.) appletalk f.) ipx ' j5 J3 M2 l. a+ R
f + B' K$ s5 Y @. Q8 b4 E4 K
9. given the following static route command, ip route 3.3.3.0 255.255.255.0 4.4.4.4 125, which portion represents the tcp/ip destination network? a.) 4.4.4.4 b.) route c.) 255.255.255.0 d.) 3.3.3.0 e.) 125 6 O P% x: z! w( [) d
d ( p5 h: ~5 ?8 V2 ^ O
10. the physical layer works with which of the following: a.) segments b.) globules c.) frames d.) packets e.) bits 6 D" o* b' E, N/ }2 M( H
e
$ x, w& k% l9 _. q( e9 H$ w11. which commands will restart the router? a.) system restart b.) restart c.) shutdown system d.) reload e.) down f.) system exit
/ D. s" Q) V% qd
& W5 z/ v# q2 {: R! U4 y7 X12. which of the following are examples of the session layer? (2 answers) a.) sql b.) tcp c.) nfs d.) token ring e.) llc
+ J- j: i; ]% U5 S7 i3 {! p( Ja c controls mechanisms such as checkpoints, terminations, and restarts to establish, maintain, and synchronize communications between applications. examples: sql, rfc, rpc, x-windows, netbios names 13. which command will display the data link connection identifiers (dlci’s)? (2 answers) a.) show version b.) show connection c.) show frame-relay pvc d.) show dlci e.) show running-config / e" ^7 U+ E3 a& D
c e for ’show frame-relay pvc’ the permanent virtual circuit (pvc) descriptions also include the dlci numbers. note: ’show unning-config’ will only display dlcis if the frame-relay map statement is used for multi-point interfaces or if you use sub-interfaces. if you are using inverse-arp it will not show up in the running config.
9 c0 E+ B& t- S4 m/ J, p14 the datalink layer is broken down into 2 layers, llc and mac. the llc establishes media independence and what else?(2 ans) a.) rip updates. b.) the datalink layer does not have sublayers. c.) provides sap’s (service advertising protocol). d.) provides windowing. e.) provides flow control. f.) provides sap’s (service access points).
6 o ]2 P; {9 ^0 P3 Ke f osi layer-2 sap allows the upper layers to encapsulate multiple layer 3 protocols. ipx sap is a protocol used to advertise netware services every 60 seconds. + W5 ?) ?& o5 _
15. which of the following is an example of the network layer? a.) ipx b.) llc c.) spx d.) token ring e.) sql
: s: P. U4 E" \5 c0 Ra
" l6 G5 x! |. N5 }3 o16. when calculating valid host address for tcp/ip, the host bits can not be all 1’s or all 0’s. which of the following is an invalid host address, using the subnet mask 255.255.255.192 ? a.) 200.1.1.161 b.) 200.1.1.127 c.) 200.1.1.65 d.) 200.1.1.66 e.) 200.1.1.129
, U0 r& B+ c e" [& tb in binary, mask .192 = 11000000 and host .127 = 01111111. for 200.1.1.127, all of the host bits are 1’s using that mask. router(config-if)#ip address 200.1.1.127 255.255.255.192 bad mask /26 for address 200.1.1.127
9 Z Y: Z" `$ n3 y- {* v, g8 O; q17. novell netware has an ethernet frame type called ethernet_ii. what is the matching cisco command line keyword for this encapsulation method? a.) gns b.) snap c.) arpa d.) novell-ether e.) sap f.) dix
6 W( I0 x. I* u$ X% qc
3 s8 P T$ p* N+ d% ?) @18 when setting up a frame-relay network between a cisco router and a non-cisco router, what encapsulation type should you use? a.) sap b.) cisco c.) q933a d.) iana e.) ietf f.) apollo & B' \/ K) G: r$ a- I# A6 U1 P
e % I+ }- r$ e* M4 l- G9 F; R% ]
19 in regards to tcp/ip, which class of address allows for the fewest valid internet hosts? a.) a b.) classes are not used in tcp/ip. c.) e d.) d e.) c f.) b ) k7 n( E c ]+ E
e 7 w. y. a: z7 m& H$ {" Y% i0 L7 B
20. which of the following are characteristics of udp? (5 answers) a.) udp is at the transport layer. b.) udp is connectionless. c.) udp is unreliable. d.) udp is used with tftp. e.) udp uses no acknowledgements. f.) udp is connection oriented. |