ccna q # a 640

135
640-801 The Building Scalable Cisco Certification exam is a qualifying exam for the CCNA certifications. The exam will certify that the successful candidate has important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalability for Cisco routers connected to LANs and WANs. The exam covers topics on Advanced IP Addressing, Routing Principles, Configuring the EIGRP, Configuring the Open Shortest Path First Protocol, Configuring IS-IS, Manipulating Routing Updates, and configuring basic BGP. We provide CCNA sample questions that help test your preparedness for taking the actual cisco certification exam. CCNA 640-801 sample questions help in consolidating your concepts, preparation and also as exam cram. Each CCNA sample question is based on respective vendors published exam objectives and designed to help attain cisco certification. 1. Which of the following about Routing Protocols is correct? (choose all that apply) A. RIP 2 is a Distance Vector Protocol B. The RIP 1 uses bandwidth and delay as the metric C. RIP 1 uses subnet mask D. The holdown timer value for RIP is 240 sec E. The Update timer value of IGRP is 90 sec Answer :A & E 2. What command is used to delete the configuration stored in NVRAM? A. erase startup-config B. erase running-config C. delete nvram D. erase nvram Answer :A 3. What is the maximum number of hops that OSPF allows before marking a network as unreachable? A. 15 B. 16 1

Upload: azad-khan

Post on 02-Apr-2015

450 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: CCNA Q # A 640

640-801

The Building Scalable Cisco Certification exam is a qualifying exam for the CCNA certifications. The exam will certify that the successful candidate has important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalability for Cisco routers connected to LANs and WANs. The exam covers topics on Advanced IP Addressing, Routing Principles, Configuring the EIGRP, Configuring the Open Shortest Path First Protocol, Configuring IS-IS, Manipulating Routing Updates, and configuring basic BGP.

We provide CCNA sample questions that help test your preparedness for taking the actual cisco certification exam. CCNA 640-801 sample questions help in consolidating your concepts, preparation and also as exam cram. Each CCNA sample question is based on respective vendors published exam objectives and designed to help attain cisco certification.

1. Which of the following about Routing Protocols is correct? (choose all that apply) A. RIP 2 is a Distance Vector Protocol B. The RIP 1 uses bandwidth and delay as the metric C. RIP 1 uses subnet mask D. The holdown timer value for RIP is 240 sec E. The Update timer value of IGRP is 90 sec

Answer :A & E

2. What command is used to delete the configuration stored in NVRAM? A. erase startup-config B. erase running-config C. delete nvram D. erase nvram

Answer :A

3. What is the maximum number of hops that OSPF allows before marking a network as unreachable?

A. 15 B. 16 C. 255 D. Unlimited E. 99

Answer :D

4. Which routing protocol would allow a network administrator scalability, VLSM support and minimize overhead if the network administrator wants to merge different networks all using routers from multiple vendors?

A. VTP B. RIP C. IGRP D. EIGRP E. OSPF

1

Page 2: CCNA Q # A 640

Answer :E

5. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table?

A. The update information will replace the existing routing table entry. B. The update information will be added to the existing routing table. C. The existing routing table entry will be deleted from the routing table and

all routers will exchange routing updates to reach convergence. D. The update will be ignored and no further action will be taken.

Answer :E

6. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table?

A. The update information will replace the existing routing table entry. B. The update information will be added to the existing routing table. C. The existing routing table entry will be deleted from the routing table and

all routers will exchange routing updates to reach convergence. D. The update will be ignored and no further action will be taken.

Answer :E

7. What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame?

A. Modified Cut Through B. Store and Forward C. Cut Through D. Fragment Free

Answer :C

CCNA Sample Questions

640-801

8. Which of the following belong to the ISDN TE2 function group? (Choose two) A. a router serial interface B. an ISDN phone C. a router ISDN BRI "U" interface D. a standard pc E. an ISDN terminal adapter

Answer :A & D

9. Which protocol is used to look up an IP address from a known Ethernet address? A. TCP

2

Page 3: CCNA Q # A 640

B. RARP C. ARP D. IP

Answer :B

10. You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses its configuration each time it is rebooted. You study the output displayed in the exhibit. What is the cause of the problem?

Exhibit:

----- output omitted ---- Cisco 2620 (MPC860) processor (revision 0x200) with 16384/2048K bytes of memory. Processor board ID JAD05076EF6 (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. 2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 2 Low speed serial(sync/async) network interface(s)

32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write)

Configuration register is 0x2142

A. There is insufficient RAM for the IOS image B. The configuration register is misconfigured C. There is insufficient flash memory D. NVRAM failed POST E. There is insufficient NVRAM

B

11. If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?

A. 2046 B. 8190 C. 4094 D. 4096 E. 1024

Answer :C

12. The Frame Relay circuit between router A and router B is experiencing congestion. Which type of notification are used to alleviate the congestion? (Choose three)

3

Page 4: CCNA Q # A 640

A. DE B. BECN C. DLCI 100 is Down D. CIR E. FECN

Answer :D, B & A

13. At which OSI layer does data translation and code formatting occur? A. Network B. Physical C. Data link D. Transport E. Session F. Presentation

Answer :F

14. Which one of the following is a reason to use a hardware address? A. To transmit a packet from one local device to another local device. B. To transmit a frame from one interface to another interface. C. To obtain a vendor code/serial number from the user. D. To transmit data from one local device to remote device across Internet. E. To contain logical information about a device to use an end-to-end

transmission.

Answer :B

CCNA Sample Questions

640-801

15. Which wireless data communication type has a high data rate but is limited to very short distances?

A. Infrared B. Broadband Personal Communication Service (PCS) C. Narrowband D. Spread spectrum

Answer :A

4

Page 5: CCNA Q # A 640

16. Ethernet networks are broadcast domains and collision domains. How the hosts on an Ethernet network will know when to resume transmissions after a collision has occurred? (Choose all that apply)

A. The router on the segment will signal that the collision has cleared. B. The jam signal indicates that the collision has been cleared. C. The hosts will attempt to resume transmission after a time delay has

expired. D. The destination host sends a request to the source for retransmission. E. An electrical pulse indicates that the collision has cleared.

Answer :C

17. Which command must be entered when connecting two routers without external DCE devices via a serial link?

A. Serial up. B. Dte rate. C. Dce rate. D. Clock rate. E. Line protocol up.

Answer :D

18. How2Pass Router Simulation. Please read the instructions and problem statement carefully. Complete your configuration and press the Done button when finished.

Answer : Troubleshooting In the simulation, click Host D, a dialog box will appear, select the Cisco Terminal option and press the OK button, to establish a terminal session to the router Kenan.

Press ‹Enter› key to enter the User EXEC mode.

Enter the privileged EXEC mode by typing enable at the Kenan> prompt and then the password how2pass at the Password: prompt. The privileged EXEC mode prompt, Kenan#, will be displayed. Issue the command show running-config (abbreviated as sh runn), read the output carefully to find any missing or wrong configuration. Whenever you see the prompt --More-- at the bottom of a page, you can press spacebar to see the next output page. Notice the running-config entries for interface serial1. It has wrong IP address and subnet mask. Notice the word shutdown below Serial1. To confirm this, issue show interface serial 1 command. The output confirms that the interface is shutdown. This simulation also supports ping, show ip protocol and show ip route commands for effective debugging. Do the configuration shown below and ping to a remote ip address. Save your configuration using copy running-config startup-config (abbreviated as copy runn start) command. Now press the Done button. Configuration Required

5

Page 6: CCNA Q # A 640

Kenan#config t Enter configuration commands, one per line. End with CNTL/Z. Kenan(config)#int s1 Kenan(config-if)#ip address 192.168.69.2 255.255.255.0 Kenan(config-if)#no shutdown %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up %LINK-3-UPDOWN: Interface Serial1 changed state to up Kenan(config-if)#^z

%SYS-5-CONFIG_I: Configured from console by console Kenan#ping 192.168.59.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.69.1, timeout is 2 seconds: ! ! ! ! ! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

Kenan#copy runn start Destination filename [startup-config]? Building configuration...

19. Which of the following will configure a static route on Router A to network 180.18.30.0/24 with an administrative distance of 90?

A. Router(config)# ip route 90 180.18.30.0 255.255.255.0 182.18.20.2 B. Router(config)# ip route 180.18.30.0 255.255.255.0 182.18.20.2 90 C. Router(config)# ip route 180.18.30.1 255.255.255.0 182.18.20.1 90 D. Router(config)# ip route 180.18.20.1 255.255.255.0 182.18.30.0 90 E. Router(config)# ip route 90 180.18.20.1 255.255.255.0 182.18.20.2

Answer :B

20. What is a trunk link? A. A link that is only part of one VLAN and is referred to as the native

VLAN of the port B. A link that can carry multiple VLANs C. A switch port connected to the Internet D. Data and voice capability on the same interface

Answer :B

6

Page 7: CCNA Q # A 640

21. What does the concept route aggregation mean when one talks about using variable subnet masking?

A. Combining routes to multiple networks into one supernet. B. Deleting unusable addresses through the creation of many subnets. C. Calculating the available host addresses in the AS. D. Reclaiming unused space by means of changing the subnet size.

Answer :A

22. What PPP protocol provides dynamic addressing, authentication, and multilink? A. HDLC B. LCP C. NCP D. X.25

Answer :B

23. Study the network topology exhibit carefully, in particular the two switches SW1, SW2, and the router RT3. Which statements are true in this scenario? (Select two)

A. The hosts on the 192.168.1.0 network form one collision domain, and the hosts on the 192.168.2.0 network form a second collision domain.

B. Each host is in a separate collision domain. C. All the devices in both networks will receive a broadcast to

255.255.255.255 sent by host A. D. Only the devices in network 192.168.1.0 will receive a broadcast to

255.255.255.255 sent by host A. E. All the devices on both networks are members of the same collision

domain.

Answer :D & B

24. What is the purpose of Inverse ARP? A. It is used to map a known DLCI to an IP address B. It is used to map a known DLCI to a MAC address C. It is used to map a known IP address to a MAC address D. It is used to map a known MAC address to an IP address E. It is used to map a known MAC address to DLCI

Answer :A

7

Page 8: CCNA Q # A 640

25. You want to configure a router for load balancing across 4 unequal cost paths on your network. Which of the following routing protocols can you use? (Choose two)

A. RIP v1 B. RIP v2 C. OSPF D. IGRP E. EIGRP F. VLSM

Answer :D & E

26. At what layer data is split into segments A. Transport B. LAN C. Session D. Data Link

Answer :A

27. Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server?

A. The MAC address of Host A. B. The MAC address of the server network interface. C. The MAC address of router interface E1. D. The MAC address of router interface E0.

Answer :D

28. What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame?

A. Fragment Free B. Store and Forward C. Modified Cut Through D. Cut Through

Answer :D

29. The exhibit displays the partial contents of an encapsulation header. Which of the following are true of the network traffic represented in this diagram? (Select three)

A. This is traffic from an FTP server. B. This is a UDP header. C. The last PDU received in this session had a sequence number of 292735. D. This is an OSI layer 4 header.

8

Page 9: CCNA Q # A 640

E. This is traffic from a Telnet client.

Answer :D, A &C

30. What does the concept route aggregation mean when one talks about using variable subnet masking?

A. Reclaiming unused space by means of changing the subnet size. B. Combining routes to multiple networks into one supernet. C. Calculating the available host addresses in the AS. D. Deleting unusable addresses through the creation of many subnets.

Answer :B

31. What OSI layer is FRAME-RELAY mapped to? A. Network B. Transport C. Data Link D. Physical

Answer :C

32. Please drag the appropriate options to the correct targets. After completing the question press the push button below the question to save your response.

Answer: 1:E,2:A,3:F

Explanation: LAPD - provides the data link protocol that allows delivery of messages across that D-channel to the local switch. LAPB - Protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. It is defined by ITU-T Recommendations Q.920 and Q.921. TE1 - ISDN -capable four-wire cable. Understands signaling and 2B=D. Uses an S reference point. ITU.T.430 - Defines connectors, encoding, framing, and reference points. TE2 - Equipment that does not understand ISDN protocols and specifications (no ISDN awareness). Uses an R reference point, typically an RS-232 or V.35 cable, to connect to a TA. NT1 - CPE equipment in North America. Connects with a U reference point (two-wire) to the telco.

33. Which routing protocol would allow a network administrator scalability, VLSM support and minimize overhead if the network administrator wants to merge different networks all using routers from multiple vendors?

A. OSPF B. VTP C. EIGRP D. RIP E. IGRP

Answer :A

9

Page 10: CCNA Q # A 640

34. What Channel is provided by ISDN BRI? A. 2B+1D B. 30B+1D C. 23B+1D D. 2D+1B

Answer :A

35. Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)

A. It is globally significant. B. It is an optional parameter required only if multiple OSPF processes are

running on the router. C. All routers in the same OSPF area must have the same process ID if they

are to exchange routing information. D. It is needed to identify a unique instance of an OSPF database. E. It is locally significant.

Answer :D & E

36. Given the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are interconnected over a trunked link.

Which of the following conditions would verify VLAN and trunk operation? (choose 3)

A. A. Host 1-1 can ping Host 1-2 B. B. Host 1-1 can ping Host 4-2 C. C. Host 1-1 can not ping Host 1-2 D. D. Host 4-1 can not ping Host 1-2 E. E. Host 4-1 can ping Host 4-2

Answer :A, D, E

10

Page 11: CCNA Q # A 640

37. By looking at the configuration, Which additional command must be issued on the Branch router before interesting traffic will be sent to the Remote router?

Hostname: Branch Hostname: Remote PH# 123-6000, 123-6001 PH# 123-8000, 123-8001 SPID1: 32055512360001 SPID1: 32055512380001 SPID2: 32055512360002 SPID2: 32055512380002

isdn switch-type basic ni username Remote password cisco interface bri0 ip address 10.1.1.1 255.255.255.0 encapsulation ppp ppp authentication chap isdn spid1 41055512360001 isdn spid2 41055512360002 dialer map ip 10.1.1.2 name Remote 1238001 dialer-list 1 protocol ip permit

A. (config-if)# dialer-group 1 B. (config-if)# dialer-list 1 C. (config-if)# dialer map 1 D. (config-if)# dialer-route 1

Answer : A

Explanation :The "dialer-group #" command tells the access-list (used with the dialer-list # command), which interface to activate when it finds interesting traffic. The numbers at end of each command must match.

38. You are the network administrator of the RouterSim global software Company. You receive a call from a user who is unable to reach a server at a remote site. After further review you discover the following info:

Local PC 190.0.3.35/24 Default Gateway 190.0.3.1 Remote Server 190.0.5.250/24

You then conduct the following tests from the offending local PC: Ping 127.0.0.1 - Unsuccessful Ping 190.0.3.35 - Successful Ping 190.0.3.1 - Unsuccessful Ping 190.0.5.250 - Unsuccessful

Which of the following problems would create the test results listed above?

A. TCP/IP not correctly installed B. Local physical layer problem C. NIC not functioning D. Remote physical layer problem

11

Page 12: CCNA Q # A 640

Answer : A

Explanation :If you cannot ping the loopback address of 127.0.0.1, then something is wrong with the IP configuration of the host.

39. Choose three reasons why the networking industry uses a layered model. (Choose 3)

A. Allow changes in one layer to occur without changing other layers B. To get Gigabit speeds on LANs C. Clarify what general functions is to be done rather than how to do it D. To create filter tables on LANs E. Order network troubleshooting steps

Answer :A, C, E

Explanation : The reasons to use a layer model are:

1. Clarify what general function is to be done rather than how to do it. 2. Reduce the complexity of networking into more manageable sublayers. 3. Enable interoperability using standard interfaces. 4. Allow changes in one layer to occur without changing other layers. 5. Speed up network industry progress by allowing specialization. 6. Allow for shortcut explanations to facilitate protocol comparisons. 7. Order network troubleshooting steps. 8. Facilitate systematic troubleshooting.

37. What is a disadvantage to using bridges in your network?

A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

Answer : C

Explanation : Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really a disadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames.

41. You work as network administrator at Brain dump. Your trainee is configuring a router with both physical and logical interfaces. He asks you what factor determines the OSPF router ID. What should you tell him?

A. The lowest IP address of any interface. B. The highest IP address of any interface. C. The highest IP address of any logical interface. D. The middle IP address of any logical interface. E. The lowest IP address of any physical interface. F. The highest IP address of any physical interface.

12

Page 13: CCNA Q # A 640

G. The lowest IP address of any logical interface.

Answer :F

Explanation: The OSPF topology database includes information about routers and the subnets, or links, to which they are attached. To identify the routers in the neighbor table’s topology database, OSPF uses a router ID (RID) for each router. A router’s OSPF RID is that router’s highest IP address on a physical interface when OSPF starts running.

Note: The OSPF router ID is a 32-bit IP address selected at the beginning of the OSPF process. Thehighest IP address configured on the router is the router ID. If a loopback address is configured, then it is the router ID. In case of multiple loopback addresses, the highest loopback address is the router ID. Once the router ID is elected it doesn't change unless the IP address is removed or OSPF restarts.

42. Which of the following routes will be used to forward data in a situation where a routing table contains static, RIP, and IGRP routes destined to the same network with each set to its default administrative distance?

A. The IGRP route B. The static route C. The RIP route D. All three will load balance.

Answer :B

Explanation:To decide which route to use, IOS uses a concept called Administrative Distance. Administrative distance is a number that denotes how believable an entire routing protocol is on a single router. The lower the number, the better, or more believable the routing protocol. Route Type Administrative Distance

o Static 1 o IGRP 100 o RIP 120

42. What is the basic characteristic of switches and hubs?

A. Hubs cannot filter frames. B. Using hubs is costly with regard to bandwidth availability. C. Switches do and can not forward broadcasts. D. Switches are more efficient than hubs in processing frames. E. Switches increase the number of collision domains in the network.

Answer :E

Explanation:Switches increases the number of collisions domains in the network. Switches that are configured with VLANs will reduce the size of the collision domains by increasing the number of collision domains in a network, but making them smaller than that of one big, flat network.

13

Page 14: CCNA Q # A 640

43. When you consider half-duplex and full-duplex Ethernet, what are unique for half-duplex Ethernet? (Select two options.)

F. Half-duplex Ethernet operates in a shared collision domain. G. Half-duplex Ethernet operates in an exclusive broadcast domain. H. Half-duplex Ethernet has efficient throughput. I. Half-duplex Ethernet has lower effective throughput. J. Half-duplex Ethernet operates in an exclusive collision domain.

Answer :A, D

Explanation:A single device could not be sending a frame and receiving a frame at the same time because it would mean that a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is called half-duplex logic. Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full duplex means that an Ethernet card can send and receive concurrently.

45. You are a Cisco certified expert. You have been contracted by the Braindumps Pro chain to fix a problem that was caused by a MCP certified technician who could not complete the configuration of the routers. This Braindumps Pro chain has three stores and wanted to maintain their bicycle repair business in a centralized manner through network connectivity. They then asked the local MCP certified technician to configure the routers, but the technician failed to establish connectivity among the routers. The routers are named Braindumps1, Braindumps2, and Braindumps3, respectively. Identify the faults(s) and make the appropriate change(s) to rectify the configuration of the routers.

The MCP technician configured the routers with the specification that follows:

o The routers are named Brain dump1, Brain dump2, and Brain dump3. o RIP is the routing protocol o Clocking is provided on the serial 0 interfaces o The password on each router is "Brain dump" o The subnet mask on all interfaces is the default mask. o The IP addresses are listed in chart below.

Brain dump1 E0 192.168.27.1 E1 192.168.29.1 S0 192.168.31.1 Secret password: Brain dump

Brain dump2 E0 192.168.35.1 S0 192.168.33.1 S1 192.168.31.2 Secret password: Brain dump

14

Page 15: CCNA Q # A 640

Brain dump3 E0 192.168.37.1 S1 192.168.33.2 Secret password: Brain dump

To configure the router click on the host icon that is connected to the router by a serial cable.

Answer : Click on Host 2:

Router Brain dump1: Brain dump1 enable Password: Brain dump Brain dump1 # config terminal Brain dump1 (config) # interface ethernet 0 Brain dump1 (config-if) # ip address 192.168.27.1 255.255.255.0 Brain dump1 (config-if) # no shutdown Brain dump1 (config-if) # exit Brain dump1 (config) # interface ethernet 1 Brain dump1 (config-if) # ip address 192.168.29.1 255.255.255.0 Brain dump1 (config-if) # no shutdown Brain dump1 (config-if) # exit Brain dump1 (config) # interface serial 0 Brain dump1 (config-if) # ip address 192.168.31.1 255.255.255.0 Brain dump3 (config-if) # clock rate 64000 Brain dump1 (config-if) # no shutdown Brain dump1 (config-if) # exit. Brain dump1 (config) # router rip Brain dump1 (config-router) # network 192.168.27.0 Brain dump1 (config-router) # network 192.168.29.0 Brain dump1 (config-router) # network 192.168-31.0 Brain dump1 (config-router) # Ctrl-Z Brain dump1 # copy running-config startup-config

15

Page 16: CCNA Q # A 640

Click on Host 4 Router Brain dump2: Brain dump2 enable Password: Brain dump Brain dump2 # config t Brain dump2 (config) # interface ethernet 0 Brain dump2 (config-if) # ip address 192.168.35.1 255.255.255.0 Brain dump2 (config-if) # no shutdown Brain dump2 (config-if) # exit Brain dump2 (config) # interface serial 0 Brain dump2 (config-if) # ip address 192.168.33.1 255.255.255.0 Brain dump2 (config-if) # clock rate 64000 Brain dump2 (config-if) # no shutdown Brain dump2 (config-if) # exit Brain dump2 (config) # interface serial 1 Brain dump2 (config-if) # ip address 192.168.31.2 255.255.255.0 Brain dump2 (config-if) # no shutdown Brain dump2 (config-if) # exit Brain dump2 (config) # router rip Brain dump2 (config-router) # network 192.168.35.0 Brain dump2 (config-router) # network 192.168.33.0 Brain dump2 (config-router) # network 192.168.31.0 Brain dump2 (config-router) # Ctrl-Z Brain dump2 # copy running-config startup-config

Router Brain dump3: Click on Host6 Brain dump3 enable Password: Brain dump Brain dump3 # config t Brain dump3 (config) # interface ethernet 0 Brain dump3 (config-if) # ip address 192.168.37.1 255.255.255.0. Brain dump3 (config-if) # no shutdown Brain dump3 (config-if) # exit Brain dump3 (config) # interface serial 1 Brain dump3 (config-if) # ip address 192.168.33.2 255.255.255.0 Brain dump3 (config-if) # no shutdown Brain dump3 (config-if) # exit Brain dump3 (config) # router rip Brain dump3 (config-router) # network 192.168.33.0 Brain dump3 (config-router) # network 192.168.37.0 Brain dump3 (config-router) # Ctrl-Z Brain dump3 # copy running-config startup-config

46. The following exhibit shows the Braindumps.biz WAN. Study it carefully:

16

Page 17: CCNA Q # A 640

What are the broadcast addresses of the subnets in the Braindumps network? (Select three options). A. 172.16.82.255 B. 172.16.95.255 C. 172.16.64.255 D. 172.16.32.255 E. 172.16.47.255 F. 172.16.79.255

Answer :B, E, F

Explanation:The subnets in the network are subnetted Class B addresses. A /20 subnet mask means that the subnet addresses increment by 16.

For example: 172.16.16.0, 172.16.32.0, 172.16.48.0, 172.16.64.0 etc. The broadcast address is the last IP address before the next subnet address. B: The switch IP address (172.16.82.90) is in the 172.16.80.0 subnet. 172.16.95.255 is the broadcast address for the 172.16.80.0 subnet. E: 172.16.47.255 is the broadcast address for the 172.16.32.0 subnet. F: 172.16.79.255 is the broadcast address for the 172.16.64.0 subnet.

47. You are a network administrator at Braindumps. The Braindumps network is illustrated in the following exhibit. Study it carefully:

17

Page 18: CCNA Q # A 640

Routers Braindumps1 and Braindumps2 are connected through their social interfaces, however, they cannot communicate. You ascertain that Braindumps1 has the correct configuration.

Can you identify the fault on router Braindumps2?

A. Link reliability is insufficient B. IPCP is not open C. Incorrect subnet mask D. Incompatible encapsulation E. Bandwidth allocation is too low F. Incomplete IP address

Answer :D

Explanation :HDLC and PPP Configuration HDLC and PPP configuration is straightforward. You just need to be sure to configure the same WAN data-link protocol on each end of the serial link. Otherwise, the routers will misinterpret the incoming frames, because each WAN data-link protocol uses a different frame format. Other than configuring some optional features that are all you need to do.

48. You are a network administrator at Braindumps. The Braindumps network is illustrated in the following exhibit. Study it carefully:

You want to prevent users on the Research Network and the Internet from accessing the Braindumps Support server, but you want to allow all other Braindumps users access to the server. You create an access control list (ACL) called research block. The ACL contains the following statements:

deny 172.16.102.0 0.0.0.255 172.16.104.255 0.0.0.0 permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0

Which of the following commands sequences will place this list to meet these requirements?

18

Page 19: CCNA Q # A 640

A. Brain dump1 (config)# interface e0 Brain dump1 (config-if)# ip access-group research block in

B. Brain dump1 (config)# interface s0 Brain dump1 (config-if)# ip access-group research block out

C. Brain dump2 (config)# interface s0 Brain dump2 (config-if)# ip access-group research block out

D. Brain dump2 (config)# interface s1 Brain dump2 (config-if)# ip access-group research block in

E. Brain dump3 (config)# interface s1 Brain dump3 (config-if)# ip access-group research block in

F. Brain dump3 (config)# interface e0 Brain dump3 (config-if)# ip access-group research block out

Answer :F

Explanation:To enable the ACL on an interface and define the direction of packets to which the ACL is applied, the ip access-group command is used. When referring to a router, these terms have the following meanings.

o Out - Traffic that has already been through the router and is leaving the interface; the source Would be where it's been (on the other side of the router) and the destination is where it's Going.

o In - Traffic that is arriving on the interface and which will go through the router; the source would Be where it's been and the destination is where it's going (on the other side of the router).

49. You are a network administrator at Braindumps. You are troubleshooting a router problem. You issue the show ip route command on one of the routers. The output from the command is shown in the following exhibit: Router Brain dump# Show in ip route.

What does [120/3] represent?

A. 120 is the bandwidth allocation and 3 is the routing process number. B. 120 is the administrative distance and 3 is the metric for that route. C. 120 is the value of the update timer and 3 is the number of updates

received. D. 120 is the UDP port for forwarding traffic and 3 is the number of bridges.

Answer :B

Explanation:To decide which route to use, IOS uses a concept called Administrative Distance. Administrativedistance is a number that denotes how believable an entire routing protocol is on a single router. The lower the number,

19

Page 20: CCNA Q # A 640

the better, or more believable the routing protocol. Route Type Administrative Distance Route Type Administrative Distance

o Connected 0 o EIGRP 90 o IGRP 100 o OSPF 110 o RIP 120

For RIP, the metric is the hop count, so in this case the route is 3 hops away.

A. SSL B. SLIP C. PAP D. LAPB E. CHAP F. VNP

Answer :C, E

Explanation :Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) authenticate the endpoints on either end of a point-to-point serial link. Chap is the preferred method today because the identifying codes flowing over the link are created using a MD5 one-way hash, which is more secure that the clear-text passwords sent by PAP.

If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by default?

A. ROM B. RAM C. Flash D. Bootstrap E. Startup-.config

Answer :C

Explanation :Flash memory - Either an EEPROM or a PCMCIA card, Flash memory stores fully functional IOS images and is the default location where the router gets its IOS at boot time. Flash memory also can be used to store any other files, including configuration files.

What could be the rationale behind using passive-interface command when configuring a router?

A. Allows interfaces to share common IP addresses. B. Allows an interface to remain up without the aid of keepalives. C. Allows a router to send routing and not receive updates via that interface. D. Allows a routing protocol to forward updates that is missing its IP address. E. Allows a router to receive routing updates on an interface but not send updates via

that interface.

20

Page 21: CCNA Q # A 640

Answer :E

Explanation:The passive-interface command is used to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while allowing updates to be exchanged normally over other interfaces. For any interface specified as passive, no routing information will be sent. Routing information received on that interface will be accepted and processed by the router. This is often useful for DDR links such as ISDN.

A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 F. 255.255.255.252

Answer :C

Explanation:The network currently consists of 5 networks and another network will be acquired. That gives us atotal of 6 networks. This requires that we use 3 bits for the network address. Using the formula 2n-2 we get 6. This also leaves us with 5 bits for hosts, which gives us 30 hosts.

You are a network administrator at Braindumps. You need to troubleshoot the Braindumps network shown in the exhibit. Study the Exhibit carefully:

21

Page 22: CCNA Q # A 640

The host, EX1, is connected to the Braindumps1 LAN, but it cannot get access to resources on any ofthe other networks. The host's configuration is as follows:

Host address: 192.168.5.45 Subnet mask: 255.255.255.240 Default gateway: 192.168.5.32 Which of the following is the cause of this problem?

A. The default gateway is a subnetwork address. B. The default gateway is on a different subnet address as the host. C. The IP address of the host is on a different subnet. D. The host subnet mask is incompatible to the subnet mask of the attached router

interface.

Answer :A

Explanation:The range of the subnet used in this question is 192.168.166.32 to 192.168.166.47.192.168.166.32 is the network address and 192.168.166.47 is the broadcast. This leaving a usable host address range of 192.168.166.33 to 192.168.166.46.

The default gateway for the host should be 192.168.166.33.

Which of the following are benefits of segmenting a network with a router? (Select all that apply)

A. Broadcasts are not forwarded across the router. B. All broadcasts are completely eliminated. C. Adding a router to the network decreases latency. D. Filtering can occur based on Layer 3 information. E. Routers are more efficient than switches and will process the data more quickly. F. None of the above.

22

Page 23: CCNA Q # A 640

Answer :A, D

MCSE Sample Questions : Microsoft XP Professional

Microsoft XP Professional

1. Fun and Fantasy is an online flower shop.The shop has a large clientele and large number of transactions takes place daily.Due to the heavy traffic, the online customers of the Fun and Fantasy shop complain about the slow downloading of the Web site.For this purpose, Ron the owner of the Web site consults the software administrator.The software administrator suggests about installing Windows XP professional.Identify the feature of Window XP professional edition, which would help in solving the above problem?

A. support for multiple processors B. Domain name service C. Support for 32 bit CPU D. Internet remote service

Answer: A

2. Mary works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, Mary divided the students in a group of two and asked them to complete the installation on their respective machines.But none of the students were able to complete the installation process.Identify the solution that is the cause to the above problem.

A. Needs to run XP Upgrade Adviser to avoid compatibility problem B. Needs to run XP Upgrade Professional to avoid compatibility problem C. Needs to run XP Upgrade Home Edition to avoid compatibility problem D. Needs to run XP Service Pack to avoid compatibility problem

Answer: A

3. anes Technologies is a leading microprocessor manufacturing organization.After the launch of Windows XP professional in the market and its spreading popularity day by day, Ron, the owner of the organization decided to upgrade machines operating system in the office.This is decided because the interface of Windows XP would help the employees in increasing their work efficiency. To familiarize employees with the installation procedure of Windows XP professional, Ron also arranged a training session for the employees.But during the installation process, some employees found problem in installing Windows XP.Identify the correct sequence of steps for installing Windows XP that would help the employees in completing their task.

A. File copy, GUI mode setup, Text mode setup, Windows welcome B. GUI mode setup, File copy, Text mode setup, Windows welcome C. Text mode setup, GUI mode setup, File copy, Windows welcome D. File copy, Text mode setup, GUI mode setup, Windows welcome

23

Page 24: CCNA Q # A 640

Answer: D

4. The hardware engineer of Janes Technologies is stuck at a point during the installation process of Windows XP professional.He wants to eliminate forced reboot after file copying phase of the setup process is complete.For this purpose, he is unable to find a command that will perform this operation.Identify the command and help him in completing the installation process.

A. /noreboot B. /noboot C. /nostart D. /norestart

Answer: A

5. Mary works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, Mary divided the students in a group of two and asked them to complete the installation on their respective machines.The students were able to complete the installation process successfully but were finding problem in creating and deploying disk images.Now help the students by identifying the file that is used for creating and deploying disk images.

A. sys.exe B. sys.dll C. sysprep.dll D. sysprep.exe

Answer: D

6. You need to support eight users who work at one of your company%26apos;s remote offices.The users work on Windows XP Professional computers.There is a firewall at the remote office.Identify the component that is installed by default during the installation process of Windows XP in the remote office?

A. Fax service B. Networking service C. Network file and Print services D. Indexing service

Answer: D

7. Ron has recently purchased a new computer system.He has planned to install Windows XP professional on the system along with other several software.For this purpose, he has consulted the vendor to install the software as required by him.But after several notifications also, the vendor was unable to reach his place and perform the task.Then, he decided to install Windows XP at his own.Identify the file that will provide him detailed instruction and technical information during the installation process.

A. Deploy.chm B. Ref.chm C. Ins.chm

24

Page 25: CCNA Q # A 640

D. Help.chm

Answer: A

8. Mary while instructing the class about the installation process of different versions of Windows also decided to discuss the importance and significance of the Windows Setup Manager Wizard.Identify the operating system, which supports this wizard and creates an answer file for automated installation process?

A. Windows 95 B. Windows XP Professional C. Windows 98 D. Windows me

Answer: B

9. Don is a system administrator for a renowned travel agency.The agency is planning to upgrade its computer systems to Windows XP Professional.Most of the computers are networked but some computers do not have CD-ROM drives.How can Don upgrade the computer systems without CD-ROM drives to Windows XP Professional?

A. can attach a portable tape backup unit to each computer and install the operating system from it.

B. can use the windows installer program to push out the operating system. C. can perfom the installation over a network share. D. can not install windows XP Professional unless he installs a CD-ROM

drive in the computer systems that do not have them.

Answer: C

10. Don is using a dual boot system between Windows 2000 Professional and Windows XP Professional.Ron installed Windows 2000 Professional in a primary partition which is C drive, and Windows XP Professional is installed in the logical drive in extended partition which is D drive.Don now planned to install Windows 2003 in the unallocated space in the hard disk.When Don attempt to create a new primary partition using Disk Management snap-in, he received a message prompting him to make necessary change.The following shows the content of your Boot.ini: [operating systems] multi(0)disk(0)rdisk(0)partition(1)%255cWINNT=%2526quot;Windows 2000 Professional%2526quot; multi(0)disk(0)rdisk(0)partition(2)%255cWINNT=%2526quot;Windows XP Professional%2526quot; Identify the change that should be done in boot.ini.

A. multi(0)disk(0)rdisk(0)partition(3)%255cWINNT="Windows 2000 Professional" /fastdetect

B. multi(0)disk(0)rdisk(0)partition(1)%255cWINNT="Windows XP Professional" /fastdetect

C. multi(0)disk(0)rdisk(0)partition(2)%255cWINNT=%2526quot;Windows 2000 Professional%2526quot; /fastdetect

25

Page 26: CCNA Q # A 640

D. multi(0)disk(0)rdisk(0)partition(3)%255cWINNT=%2526quot;Windows XP Professional%2526quot;/fastdetect

Answer: C

You are the administrator at a small network environment with 8 Windows XP clients in a workgroup.You want to create a shared folder located on a FAT32 volume on one of the clients and use share permissions to protect it.When you open the Properties sheet of the folder you are about to share, you notice you are able to share the folder but there is not an option to assign share permissions to individual groups and users.What should you do?

A. After sharing the folder, switch to the Security tab and set appropriate permissions.

B. Disable the Use simple file sharing option in Folder Options. C. Protect the Shared Folder with a password and give this password only to the

users that need access. D. Convert the FAT32 volume to NTFS.

Answer: B

You are the administrator at a large company.The company policy is that all data is stored on file servers using shared folders, never locally.Many users have a notebook which they often take out of the office.All these users are a member of the Power Users group on their Windows XP client.You want to prevent all these users from making some of the shared folders available offline.What should you do?

A. In the Advanced properties for Offline Files, select the Never allow my computer to go offline check box on each of the client computers.

B. Disable the option Allow Caching of files in this shared folder in the Caching settings of each appropriate shared folder on the file servers.

C. On the Offline Files tab of Folder Options disable the option Enable Offline Files on each file server.

D. On the Offline Files tab of Folder Options disable the option Enable Offline Files on each client computer.

Answer: B

You are the administrator at a huge company.You just recently upgraded almost all Windows 98 clients to Windows XP.In some rare situations you installed Windows XP on a second partition to create a dual-boot installation.At one of these clients you need to install a new 40 GB hard disk and format it as one partition which both operating systems will be able to access.What should you do?

A. Use Windows 98 to format the partition with FAT32. B. Use Windows XP to format the partition with FAT32. C. Use Windows 98 to format the partition with NTFS. D. Use Windows XP to format the partition with NTFS.

Answer: A

You are the administrator of a medium sized company.All the clients are running Windows XP Professional.At the end of a workday, you install an unsigned driver for a mass storage device on one of the clients.When the computer restarts you get a

26

Page 27: CCNA Q # A 640

blue screen with Stop 0xc0000218 (0xe11a30e8, 0x00000000, 0x000000000, 0x00000000) UNKNOWN_HARD_ERROR.What should you do?

A. Start Windows in Safe mode and reinstall the driver. B. Boot the computer from the Windows XP Professional installation CD and run

Automated System Recovery. C. Start Windows using the Last Known Good configuration. D. Start Windows using the Recovery Console and restore the most recent full

backup.

Answer: C

You are the desktop administrator at a major enterprise.You just installed a second disk in one of the Windows XP clients and formatted it with NTFS.You are moving a large amount of files from an NTFS compressed folder on C: to a new uncompressed folder on the new D: drive.What will be the compression state of the files after they are moved?

A. The files will be compressed. B. The files will be uncompressed. C. Both the target folder and the files will be compressed. D. Only the target folder but not the files will be compressed

Answer: B

You have upgraded 10 laptops to Windows XP Professional.All users complain they experience problems when putting the computer in standby mode.You investigate and discover that the client computers' BIOS version does not support ACPI.What should you do to solve their problems?

(Choose 2) A. Perform a complete re-install of Windows XP B. Disable Power Management C. Update the BIOS D. Perform an in-place upgrade of Windows XP

Answer: C, D

You are the desktop administrator for your company.Five users in the Marketing department use software that produces a large amount of graphics and video related files on their local hard disks.They want this data to be included in the daily backup, but you do not want to pull hundreds of gigabytes extra over the company's LAN.

All their computers are connected to a single 100Mbps switch so you decide to add a tape drive to one of the Windows XP Professional desktops in the Marketing department.You create a share on each desktop computer, which contains the data that should be included in the backup.Because of the large amount of data, you want to use a backup method that takes the least amount of time to backup the data to tape.

Which of the following backup methods should you use?

27

Page 28: CCNA Q # A 640

A. Perform a Normal/Full backup every Monday and an Incremental backup for Tuesday, Wednesday, Thursday, and Friday.

B. Perform a Normal backup every Monday and a Copy backup for Tuesday, Wednesday, Thursday, and Friday.

C. Perform a Normal backup every Monday and a Differential backup for Tuesday, Wednesday, Thursday, and Friday.

D. Perform a Weekly backup every Monday.Create an Daily backup for Tuesday, Wednesday, Thursday, and Friday.

Answer: A

You are the desktop administrator for your company.All client desktop computers run Windows XP Professional and have one 80GB dynamic disk with 2 simple NTSF volumes.The C: volume holds the operating system and the user's applications.The D: volume contains only user data.

One of the users in the Marketing department requires more disk space for user data.Instead of restoring the contents of both drives on a larger hard disk, you decide to add an additional hard disk.How should you configure the disks for the best performance and the most usable disk space?

A. Create a spanned volume by extending volume D: to include the unallocated disk space of the second disk.

B. Create a striped volume by extending volume D: to include the unallocated disk space of the second disk.

C. Create a mirrored volume by mirroring the contents of volume D: to a new volume E: on the second disk.

D. Create a new simple volume on the second hard disk and mount it to a folder on volume D:

Answer: A

You are the network administrator at a small-sized company.Your workgroup became too large so you installed a Windows 2000 domain controller and turn the workgroup into a domain.You have successfuly joined all the Windows XP Professional clients to the domain and everything seemed to work fine.The next morning some of your users complain they are not able to switch users using the Fast User Switching feature.What should you do?

A. Click User Accounts in the Control Panel, click Change the way users log on or off and enable the Use Fast User Switching option

B. Click User Accounts in the Control Panel, click Change the way users log on or off and enable the Use Welcome Screen option

C. Instruct your users to press the WIN-L button to switch users. D. Inform the users Fast User Switching is not available on computers that are joined

to a domain.

Answer: D

You want to reduce the amount of space used on one of your FAT32 drive fast, so you decide to compress a folder named Odata with user data such as Word and Excel docs.When you want to enable compression on the folders properties sheet

28

Page 29: CCNA Q # A 640

you notice compression is not available.How can you compress the files with the least amount of administrative effort and still be able to read the files?

A. Convert the drive to NTFS using convert.exe /fs:ntfs to enable NTFS File Compression

B. Convert the drive to NTFS using fs.exe /ntfs to enable NTFS File Compression C. Create a new Compressed Folder and drag all the files from the Odata folder to

the Compressed Folder and delete the original Odata folder D. Use NTbackup.exe to create a file backup with maximum compression and delete

the original Odata folder

Answer: C

You are the desktop administrator for your company.All client desktop computers run Windows XP Professional.A user in the Marketing department has a scanner connected to his client computer.This morning the user received a popup when he started the image scanning software asking him if he wanted to search the Internet for new software and drivers.The user accepts and the update utility downloads and installs an updated driver for the scanner.

When the user attempted to use the scanner, the computer stopped responding.He calls you and explains the problem.He also informs you that he already rebooted the computer but when he tried to use the scanner again the computer stopped responding again.

What should you tell the user to do?

A. Restart the computer using the Last Known Good Configuration. B. Use the Recovery Console to disable the device and restore the previous driver. C. Configure the Driver Signing options to Ignore unsigned files. D. Use the Driver Roll Back option in Device Manager to restore the previous driver.

Answer: D

You are the desktop administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.You create a shared folder on one of the client computers and you assign the share permission Full Control to the Sales group and read to Everyone.You assign the share permission Change to Michael, who is a member of the Marketing group.You deny Full Control NTFS permissions for the Marketing group.

What are Michael's effective permissions when connecting to the shared folder?

A. Read B. Read and Execute C. Change D. Full Control E. No access

Answer: E

29

Page 30: CCNA Q # A 640

You are the administrator for a small company with 15 clients.All client desktop computers run Windows XP Professional and are members of a single workgroup.One of the computers is equipped with a large and fast SCSI hard disk to allow for a centralized location for file sharing.The disk is still basic and contains one large FAT32 partition.Because this computer contains most of the company's critical data, you have been asked to implement a fault tolerant solution to protect the data.Although you perform a backup every night, the downtime to restore the data could have disastrous financial consequences, so you decide to add an additional SCSI disk and create a mirrored volume.

What should you do to be able to implement the RAID 1 solution on the computer?

A. Use Disk Management to convert the disk to dynamic. B. Use Disk Management to convert the disk to NTFS. C. Run Windows XP Setup and press F6 to install the Windows Mirrored Volume

driver. D. Reinstall the computer with Windows 2000 or 2003 Server.

Answer: D

You are the domain administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.One of the users, Julia, created a shared folder on her computer and asks you to set the permissions.She wants everyone in the Sales department to be able to do everything except changing permissions for the shared folder.Nobody else in the company should be granted access of any kind.She wants to maintain Full Control over the shared folder's permission settings.

How should you assign the permissions?

(Choose 3.) A. Remove Everyone from the share permissions. B. Assign the share permission Full Control to the Sales group. C. Assign the share permission Change to the Sales group. D. Assign Full Control share permissions to Julia. E. Deny the share permission Full Control to the Sales group. F. Deny the share permission Full Control to Everyone. G. Assign the NTSF permission Modify to the Sales group.

Answer: A, C, G

You are the desktop administrator for your company.All client computers run Windows XP Professional and are members of a single Windows 2003 domain.All clients use a single shared Internet connection.You want to install 20 new clients using an answer file and you are current testing out the image on a test client.You've added the following text to the unattend.txt file:

[UserData]ProductID = ABCDE-12345-FGHI6-JKLM7-NOPQ8

30

Page 31: CCNA Q # A 640

When you run the installation on the test computer, you notice that the Activation failed.What should you do to allow automatic product activation during setup?

A. Open port 80 and 443 on the firewall. B. Add AutoActivate = Yes to the [Unattended] section of the answer file. C. Add the msoobe /a command to the autoexec.bat of each client. D. Add the /a and /ID parameters to winnt.exe when starting setup on the clients.

Answer: B

You want to share a printer on your Windows XP Professional client named Wrkst12, to allow IPP clients to print documents across the Internet.You installed PWS, shared the printer under the name Printer01, and set the appropriate permissions.What is the correct URL users should use to connect to the printer by using the Add Printer wizard?

A. http://Wrkst12/Printers/Printer01/.printer B. http://Wrkst12/Printer01/.printer C. http://Wrkst12/Printer01/ D. http://Wrkst12/Printers/Printer01/ E. http://Printer01/

Answer: A

You are a network technician assigned to troubleshoot problems with your company's enterprise network Windows 2000 environment.You have just been informed that a user's computer running Windows XP Professional has crashed.Upon inspection you notice that this computer will begin to load but the GUI no longer will come up.It will not load past the POST.What utility can you use to retrieve the files off this computer before the hard drive is formatted and a new image put back on?

A. ScanDisk B. Disk Manager C. Device Manager D. Last Known Good Configuration E. Recovery Console F. Safe Mode

Answer: E

You share a folder on your computer and you assigned the share permission Change to Everyone.John, a user from the Sales department, has been granted Full Control NTFS permission to the folder.John is also a member of the Sales group, which has been assigned Read NTFS permissions.What are John's effective permissions when connecting to the shared folder?

A. Read B. Read and Execute C. Change D. Full Control

Answer: C

31

Page 32: CCNA Q # A 640

Your Windows XP Professional computer won't boot correctly.You want to use the Recovery Console to troubleshoot, but you did not install it using the winnt32.exe /cmdcons command.How should you access the Recovery Console?

A. Using the Windows XP Advanced Options Menu at system startup B. By pressing the F8 key at system startup C. From Repair option of Setup D. Add the /cmdcons switch to the Windows XP ARC path in the boot.ini file.

Answer: C

Which of the following is true concerning drive compression in Windows XP Professional?

A. You can compress files and folders only on drives formatted with NTFS. B. Compressed files and folders cannot be shared. C. Compressed files and folders can be encrypted. D. Compressed files and folders cannot be encrypted

Answer: A, D

You run a third-party groupware application on your Windows XP Professional machine.The system has a 350 MHz processor and 256 MB of RAM.When you start a Word processor your machine starts performing very bad.You run System Monitor for a few minutes and notice the following averages: % Processor Time: 90%, Page per Sec: 0.7%, Disk Time: 14%.Which component is probably the cause of the slow performance?

A. Processor B. Physical Disk C. RAM D. Page File

Answer: A

You are the desktop administrator for your company.All client desktop computers run Windows XP Professional and are members of a Windows 2000 domain.You have lost your file encryption certificate and you cannot access your encrypted files.What are possible ways to decrypt the files?

A. Restore a backup copy of your file encryption certificate and private key in a .pfx file format from a floppy disk.

B. Log on as the administrator of the local computer and decrypt the files. C. Log on as the domain administrator and decrypt the files. D. Log on as the administrator of the local computer and take ownership of the files. E. Restore a backup copy of the file using NT Backup.

Answer: A, C

You are using Windows XP Professional operating system on your laptop with docking station.While in the office your files are redirected from "My Documents" local folder to a folder on the network file server.You want to be able to view these files either at work or on the road and have all files in this folder be current and up to date.What is the correct procedure to accomplish this?

(select all that apply)

32

Page 33: CCNA Q # A 640

A. From My Computer, Tools Menu, Folder Options, Enable Offline Files. B. From the Remote Directory, File Menu, Select Make Available Offline. C. Copy the remote folder to your local directory.On the folders properties page,

select synchronize with offline folders. D. From the Local Directory, File Menu, Select Make Available Offline. E. Select Synchronize all offline files before logging off.

Answer: A, E

You are setting up a user to print to a Network Printer without assigning this user to a print server.What is the proper way to configure this user's PC?

A. In the printers properties dialogue, specify the port to print to LPT1: B. Set the Spool Settings to spool document first, and then print C. Select Automatically Detect My Plug and Play Printer D. Add a Standard TCP/IP local port E. Enable Printer Pooling F. Stop and restart the print spool service

Answer: D

You are installing an LPR port on your Windows XP Professional client to be able to print to a print device connected to a UNIX print server.Which of the following information do you need to provide?

A. IP address or host name of the UNIX print server B. IP address or host name of the print device C. The name of the print queue on the UNIX server D. The name of the print queue on the print device

Answer: A, C

You are the administrator at a small law firm.A couple of minutes ago, one of your Windows XP Professional clients' hard disk crashed, and you plan to recover from this disaster using Automated System Recovery.You have the tape from the ASR set you created by using Backup's ASR Wizard, but you cannot find the ASR floppy disk.

What should you do to be able to perform the ASR restore?

(Select the best answer.) A. Use the Backup utility on another Windows XP Professional client to recreate the

ASR floppy. B. Use the Backup utility on another Windows XP Professional client to restore the

necessary files from the %systemroot%\repair directory on the tape to a floppy. C. Copy the ASR.* files from the i386 directory on the Installation CD to a boot

floppy. D. Copy the ASR.* files from the %systemroot%\repair directory on another

Windows XP Professional client to a floppy disk. E. Perform the restore without using the ASR floppy disk.

Answer: B

33

Page 34: CCNA Q # A 640

You are the administrator of a small Windows 2000 Active Directory domain.You want to install 20 non-PXE compliant Windows XP Professional clients by using RIS.You installed and configured Remote Installation Services on the DHCP server.You configured the clients to boot from the network but when you boot a client you are not prompted to start the download of the client installation wizard.What should you do?

A. Run RIPREP.exe on the target clients before you boot them. B. Create a boot disk with a network client and manually start the installation by

running winnt.exe. C. Create a startup disk by using the RBFG.exe utility. D. Install a WINS server in the domain. E. Install a DNS server in the domain.

Answer: C

You are the domain administrator at a large company.Your company uses a custom directory application for contact information.You want this application to be automatically installed when users from the Sales department log on to a computer.Which of the following should you do?

A. Assign the package to the computer accounts of the users in the Sales department. B. Publish the package to the computer accounts of the users in the Sales department. C. Assign the package to the user accounts of the users in the Sales department. D. Publish the package to the user accounts of the users in the Sales department.

Answer: C

You have recently upgraded several Windows 98 clients to Windows XP Professional.To make use of advanced NTFS features such as file and folder permissions and encryption, you decide to convert the client's hard disks to NTFS.What should you do?

A. Run the convert C: /fs:ntfs command. B. Upgrade the clients again and choose to convert the file system this time. C. Use the Disk Manager to convert the file system. D. Reformat the disk with NTFS and restore a full backup

Answer: A

You are the desktop administrator at a small company.All clients run Windows XP Professional.One of these clients is used as a print server, besides two locally attached printers the print server serves several Hewlett Packet JetDirect network printers configured to use a standard TCP/IP port.One of the users complains about print jobs taking too much time to be printed.You verify the print server and notice the C: drive is nearly full.What should you do the increase the performance of the print server?

A. Change the location for the print spooler on the Advanced tab of the Printer properties to another disk.

B. Change the location for the print spooler on the Advanced tab of the Print Server properties to another disk.

C. Relocate the print queue of the network printers to the JetDirect adapters. D. Replace the Standard TCP/IP port with a DLC port for the HP printers.

34

Page 35: CCNA Q # A 640

Answer: B

MCSE Sample Questions : Microsoft Windows Server 2003 Environment

Microsoft Windows Server 2003 Environment

1. You are the desktop support specialist for your company. Your company has 20 users and four computers. The network is shown in the exhibit (See the exhibit below). On Monday, the operating system on a computer named COMP2 was upgraded from Windows NT 4.0 to Windows 2000 Professional. On Tuesday morning, a user on COMP2 complains that while he is able to log on to the domain, he is not able to access files on a server named SERV2 or connect to the Internet. You find that the user on COMP1 is able to connect to SERV2 and the Internet. What would be the most likely cause of the problem?

A. Incorrect IP address on COMP2. B. Incorrect default gateway on COMP2. C. COMP2 does not have a domain computer account. D. The network does not have a WINS server.

Answer: B

2. You are the workgroup administrator for a small office. The office contains 12 Windows 2000 professional computers. Each computer is assigned a private IP address in the 172.10.X.X range. One computer has a dial-up connection to the Internet. To enable all users to access the Internet, you enable ICS (Internet Connection Sharing) on the computer with the dial up connection. You configure ICS and reboot the computer. You notice that none of the other users can connect to the ICS computer, and the ICS

35

Page 36: CCNA Q # A 640

computer cannot see the other computers in the network. What could be the problem?

A. Configure the other computers to use the ICS computer as a proxy. B. Configure the other computers to receive their IP address automatically. C. Configure the other computers to use the ICS computer as their default

gateway. D. Enable Internet Connection Sharing on all of the computers.

Answer: B

3. You provide technical support for a company with several locations. In a remote sales office, there are 5 Windows 2000 Professional computers. All computers are connected in a workgroup, as shown in the exhibit. (See the exhibit below). The manager's computer has a 56K dial up connection to the Internet. The manager calls and explains that she had enabled ICS (Internet Connection Sharing) on her computer. Once ICS had been enabled, none of the other users were able to access a shared folder on the manager's computer. What should you instruct her to do?

A. Configure the dial-up connection to disable shared access. B. Configure the dial-up connection to disable on-demand dialing. C. Disable data encryption in the new dial-up connection. D. Use the ipconfig command to release and renew your network TCP/IP

address.

Answer: A

4. You are installing a computer named COMP2 on a Windows 2000 network as shown in the exhibit (See the exhibit below). Your network uses TCP/IP as the only network protocol. You configure COMP2 with an IP address of 192.168.10.16, a subnet mask of 255.255.255.0, and a default gateway of 192.168.2.1 Though you are able to log onto the domain, you are not able to connect to any resources on SERV2. Users need to be able to access this server to access documents and shared printers. What should you do to ensure that USER2 can connect to network resources?

36

Page 37: CCNA Q # A 640

A. Configure Client2 to use a Default Gateway of 192.168.10.1 B. Configure Client2 to use a TCP/IP address of 192.168.2.16 C. Configure Client2 to use a TCP/IP address of 192.168.5.16 D. Create a computer account on the domain for USER2

Answer: A

5. You are configuring the dial-up connection for the portable computer shown in the exhibit (See the exhibit below). What address should you use as the default gateway for the portable computer's dial-up connection?

A. 192.168.111.42 B. 192.168.100.21

37

Page 38: CCNA Q # A 640

C. 192.168.100.1 D. 209.29.9.20

Answer: C

6. You are setting up a computer for students to use to practice exercises for their certification exams. You want to configure the computer so that users can boot into both Windows 98 and Windows 2000 Professional. You want to ensure that students can access all drive resources from either operating system. What should you do?

A. Create a single FAT32 partition. B. Create a single NTFS volume. C. Configure one NTFS volume, and one extended FAT32 partition. D. Configure a dynamic volume.

Answer: A

7. Your Windows 2000 professional computer has a shared laser printer that is used by several other users in the office. Users are complaining that they are not able to submit print jobs to the shared printer. Your computer has two hard disks. Drive C is almost out of free space, while drive D has ample free space. You suspect that the lack of free space on drive C is preventing users from submitting print jobs. What can you do to allow print jobs to spool on Drive D?

A. From the Print Server Properties dialog box, change the spool folder to a folder on drive D.

B. From the Printer Properties dialog box, change the spool folder to a folder on drive D.

C. Use the Microsoft Redirector to send the print jobs to Drive D. D. Make drive D a dynamic volume and extend drive C onto drive D.

Answer: A

8. You are the network administrator for a small company. A Windows 2000 server serves as a domain controller, DNS server and serves file and print functions. Users home folders are located on this computer so that all user files will be backed up every night with the server backup. Because of drive space limitations, you have defined disk quotas for the user's home folders. The office manager, Sandra, informs you that when she tries to save documents to her home folder, she receives the error: 'Insufficient disk space'. She informs you that she must be able to save her important files into this folder as soon as possible. Other users are not encountering this problem. What should you do?

A. Set the compression attribute for Sandra's folder. B. Grant Sandra Full Control permission to her home folder. C. Have Sandra save the files to her local hard disk. D. Increase the Server's disk quota entry.

Answer: D

38

Page 39: CCNA Q # A 640

9. You have a Windows NT 4.0 Workstation computer with an NTFS file system that you use for software development. As your company upgrades their systems to Windows 2000, you will need to be able to test applications in both the Windows NT Workstation environment and the Windows 2000 environment. You decide that the easiest course of action would be to install Windows 2000 Professional in a dual boot environment with Windows NT 4.0 Workstation on your computer. What should you do before installing Windows 2000 Professional?

A. Edit the BOOT.INI file to reflect the new installation of Windows 2000 Professional.

B. Install Service Pack 3 or later for Windows NT Workstation 4.0. C. Install Service Pack 4 or later for Windows NT Workstation 4.0. D. Convert the NTFS file system to FAT.

Answer: C

10. Your office is part of a larger Windows 2000 network. Two computers named PUB1 and PUB2 have identical laser printers shared as LASER1 and LASER2 During a particularly busy day, LASER1 has run out of toner. You do not have another toner cartridge to service it. Several users have print jobs waiting to print on PUB1. You need to send all print jobs waiting on PUB1 to the printer on PUB2. You also want any print jobs that may be sent to PUB1 later in the day to be sent to the printer on PUB2. What is the best course of action?

A. Change the spool settings for PUB1 to point to the spooler directory on PUB2.

B. Change the share name of LASER1 to LASER2. C. Configure LASER1 to add a port and set the port to \\PUB2\LASER2. D. Configure LASER2 to add an input path and set the path to \\PUB1\

LASER1.

Answer: C

You install an updated device driver for a SCSI adapter on your Windows 2000 Professional computer. After installation you are prompted to restart your computer. During startup, your computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock up. How can you fix the problem?

A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the remove command to remove the device driver.

B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot menu Use the remove command to remove the device driver.

Answer: B

39

Page 40: CCNA Q # A 640

The president of your company collects manager's weekly reports in a shared folder on her Windows 2000 Professional computer called reports. Because the reports contain sensitive information, she asks you to prevent users from enabling offline access for the network share that contains the financial report. What should you do?

A. Use Windows Explorer to disable Offline Files. B. Use Windows Explorer to disable Caching for the reports on the network share. C. Set the Manager's access level to read-only. D. Implement a domain policy to block the synchronization of offline files.

Answer: B

You install an updated device driver for a SCSI adapter on your Windows 2000 Professional computer. After installation you are prompted to restart your computer. During startup, your computer appears to lock up. You try to boot in safe mode, but again, your computer appears to lock up. How can you fix the problem?

A. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the remove command to remove the device driver.

B. Start the computer by using the Windows 2000 Professional CD-ROM. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

C. Insert the Emergency Repair Disk. Select Recovery Console from the Repair menu. Use the disable command to disable the device driver.

D. Press F8 during startup to access the Windows 2000 boot menu Select debug mode from the boot menu Use the remove command to remove the device driver.

Answer: B

You are the desktop Administrator for a Windows 2000 network. Client computers on your network receive their TCP/IP configuration from a DHCP server. You have purchased 25 new computers with PXE compliant network cards. You decide to use RIS to deploy a Windows 2000 image to the 25 new computers. For the first 17 computers, the installation works fine. For the remaining 8 computers, the installation fails. What is the likely cause of the problem?

A. Your DHCP server does not have enough available IP addresses for the new computers.

B. There are not enough licenses configured in RIS for the new computers. C. You have not created enough computer accounts for the new computers. D. You have reached the maximum number of clients for a Windows 2000 network.

Answer: A

You are the desktop administrator for your company. Your network has 130 Windows 2000 client computers. You need to apply the latest service pack to all 130 computers. To save time, you decide to use a Windows Installer package to install the service pack on all 130 computers. You create an installer package, and assign it to the domain. The next day, you check the status of the installation and find that the service pack has only been installed on the computers in some departments in

40

Page 41: CCNA Q # A 640

the domain, but not others. What can you do to ensure that the service pack is applied to all computers in the domain?

A. Ensure that all client computers have the latest version of the Windows Installer. B. Log into each of the client computers using an administrative account to install

the service pack. C. Create a Windows Installer assignment file. Specify each computer in the domain

by name. D. Ensure that all users in the domain have permission to access the share and folder

that contains the service pack installation files.

Answer: D

You have 45 computers in your network that you must upgrade from Windows NT 4.0 Workstation to Windows 2000 Professional. You want to use Setup Manager to create an unattended installation file to reduce the need for user interaction during the upgrade process. Since you will be installing Windows 2000 from a CD ROM, how can you use an unattended installation?

A. Install Setup Manager on each Windows NT 4.0 Workstation computers. Start the installation from within Setup Manager by specifying the unattended text file to use.

B. Rename Unattend.txt to Winnt.sif. Copy this file to the C:\WINNT\SYSTEM32\INSTALL directory.

C. Rename Unattend.txt to Winnt.sif. Keep this file on a floppy disk in the drive during installation.

D. Use setup manager to specify the names of the 45 computers that will be upgraded.

Answer: C

You are upgrading several computers in your office from Windows NT 4.0 to Windows 2000. While running Windows 2000 setup on one computer, you encounter a read error with the CD-ROM, and are forced to terminate setup. You replace the CD ROM, but find that you are not able to boot the computer into Windows 2000 or Windows NT. You attempt to boot from the CD ROM, and find that the computer does not support booting from the CD ROM. What can you do to recover the installation?

A. Boot the computer from a Windows NT boot disk. Delete the WINNT directory. Rename the $WINNT.OLD directory to WINNT.

B. Create a Windows NT Boot disk. Copy the real-mode CD-ROM drivers to this disk. Boot with the floppy disk and run setup again from the CD ROM.

C. On another computer, create a set of Windows 2000 installation disks. Use these disks to restart the installation on the failed computer.

D. Press F8 while booting the computer. Select 'Rollback to previous version of Windows' from the recovery options menu.

Answer: C

Your network has 25 computers that have been purchased over the course of time. These computers need to be upgraded from Windows NT 4.0 Workstation or Windows 9x to Windows 2000. These computers come from a variety of vendors and feature a variety of hardware. You decide that you want to use Sysprep and a third

41

Page 42: CCNA Q # A 640

party disk imaging software to simplify installations. You want to ensure that Windows 2000 detects the new variety of hardware without generating errors. What should you do?

A. Remove all devices in Device Manager before running Sysprep. B. Include the -pnp perameter when you run sysprep. C. Include the -redetect perameter when you run sysprep. D. Check the 'Force hardware redetection' checkbox when you run sysprep.

Answer: B

You are planning to deploy Windows 2000 Professional on 25 identical new computers in your company. You decide to use Sysprep and a third party disk imaging software to simplify installations. You install Windows 2000 on one computer. You then log in using the local administrator account and install the applications that the users will use and configure the initial desktop settings. You want to ensure that the users will receive the desktop settings, shortcuts and start menu that you have configured. What should you do?

A. Run Sysprep. Sysprep will always use the active profile as the default. B. Specify the administrator profile in the [profiles] section of the sysprep.inf. C. Log into the computer as Default User. Set up the desktop settings, shortcuts and

start menu settings. D. Copy the Administrator profile to the Default User profile. Grant permissions to

the Everyone group to use the profile.

Answer: D

You are the desktop administrator for your company's network. The network is configured as shown in the Exhibit (See the exhibit below). You have just received 25 new PXE compliant computers that need to be installed on the network. You decide to use Remote Installation Service (RIS) to deploy Windows 2000 on the new computers. Assuming that you have already created a RIS image, and placed the image on the RIS server, what must you do to ensure that the new computers can receive a RIS image?

A. Add a WINS to the network.

42

Page 43: CCNA Q # A 640

B. Add a DHCP to the network. C. Create a set of RIS boot disks. D. Create computer accounts in the domain for the new computers.

Answer: B

You are the desktop administrator for the finance department. A user named Tom transfers from the sales department to the finance department. You add Tom's user account to the finance group, which has Full Control access to the FinanceFiles folder. When Tom tries to access the FinanceFiles folder, he is denied access. What could be the cause of the problem?

A. Tom's account must be given permissions on the share as well. B. Tom may have a policy restriction which does not allow him to access the

FinanceFiles folder. C. Tom may still be a member of a group that has been explicitly denied access the

FinanceFiles folder. D. You must add Tom's account directly to the FinanceFiles folder.

Answer: C

Your Windows 2000 Professional computer has several shared folders. You are conducting a security audit and wish to view the permissions on each of the shared folders. How can you quickly view all shared folders on your computer? on of ShareA. What should you do?

A. User Windows Explorer to search for shared folders. B. Use System information in Computer Management to view shared folders. C. Use disk management to view the shared folders on each drive. D. Use Shared Folders in Computer Management to view shared folders.

Answer: D

A manager in your office received a new Windows 2000 Professional laptop computer. You have been asked to configure offline files for the manager to work on documents at home. You enable offline files, and have the manager log off of the network. During the logoff process, the expected synchronization of offline files does not occur. You have the manager log back on to the network. What can you do to correct the problem?

A. Enable file and print sharing. When the manager logs off, the files will synchronize.

B. Manually synchronize all offline files. C. On the server, make all files available offline. When the manager logs off, the

files will synchronize. D. Do nothing. Windows 2000 Professional does not tell you when Synchronization

happens.

Answer: C

You use a Windows 2000 Professional computer to run a third party application to log network activity in your office. These log files are kept in a folder that has limited access. You schedule a task to run a clean-up program to purge old log files from the log file folder. When the scheduled task runs, it terminates without

43

Page 44: CCNA Q # A 640

deleting any files. To test the application, you log into the computer, and run the application. It runs correctly. What can you do to ensure that the application will work as a scheduled task?

A. Configure the scheduled task to run under your account. B. Configure the Task Scheduler service account to use a local Administrator

account. C. Give the task scheduler service full control permission for the directory. D. Configure the Task Scheduler service to start automatically.

Answer: A

You are setting up a Windows 2000 professional laptop computer to use offline files. You set up a shortcut to a folder that is shared on a Windows 2000 Server computer. When you attempt to configure the shortcut to be available, you do not see the option to make the folder available offline. What should you do?

A. Establish an offline files link to the folder in Computer Management. B. Configure the folder on the network share for offline access in Windows

Explorer. C. Connect to the network before trying to make the shortcut available offline. D. Copy the folder from the network share, and select 'Make Available Offline' in the

local folder properties.

Answer: B

You have a Windows 2000 Professional computer that runs several monitoring applications that occasionally make changes to registry entries. You use Windows Backup to make a nightly backup of the computer. You want to ensure that the current registry objects are included in the backup. What should you do?

A. Configure Windows Backup to back up the entire hard drive. B. Configure Windows Backup to back up the System State data. C. Select 'Registry Files' under 'Additional Files to back up' in Windows Backup. D. Configure Windows Backup to backup open files.

Answer: B

You have a Windows 2000 Professional computer that is used by several users. You occasionally set up special accounts for visiting vendors to log into the computer. These accounts have limited access to the network, and are named guest1, guest2, guest3, etc... You create a script to delete these accounts periodically from the computer. You want to use Windows scheduler to run this script on a regular basis. You want to ensure that the script will run regardless of which account is currently logged on to the computer. What should you do?

A. Schedule the task to run under an Administrative account. B. Log on as administrator and schedule the task to run as guest1. C. Give the guest accounts local administrative rights. D. Grant the guest accounts 'execute' permissions to the script.

Answer: A

You are the desktop support specialist for a magazine publishing company. One computer in the office is used to download images from digital cameras and from

44

Page 45: CCNA Q # A 640

the Internet. Many users log in to this computer each day. A user complains that this computer has stopped responding. You find that someone has installed drivers for a digital camera. These drivers were not approved for use with Windows 2000. You want to ensure that only drivers that are approved for use with Windows 2000 are used on this computer. Which settings should you enable in the Deliver Signing Options dialog box?(Choose all that apply)

A. Ignore B. Warn C. Block D. Apply setting as system default.

Answer: C, D

You connect a USB printer to your Windows 2000 Professional computer. You install the device driver for the printer. During the install process, the computer displays a fatal error. You restart the computer, and the computer locks up while loading Windows 2000 Professional. You start the computer in safe mode. What should you do next?

A. Enabling driver signing. Set driver signing to Block installation of unsigned drivers.

B. Remove the printer from the printers applet in control panel. C. Disable the printer device driver using the disable command. D. Disable the printer device driver in Computer Management.

Answer: D

The president of your company collects manager's weekly reports in a shared folder on her Windows 2000 Professional computer called reports. Because the reports contain sensitive information, she asks you to prevent users from enabling offline access for the network share that contains the financial report. What should you do?

A. Use Windows Explorer to disable Offline Files. B. Use Windows Explorer to disable Caching for the reports on the network share. C. Set the Manager's access level to read-only. D. Implement a domain policy to block the synchronization of offline files.

Answer: B

The manager of the finance department has two spreadsheets that contain sensitive information. She has used Windows 2000 encryption to ensure the security of the files on her local computer. She would like to make a backup of the files. What should you advise her to do?

A. Copy the files to a network share on an NTFS volume B. Copy the files to a floppy disk and use the CIPHER command to encrypt them. C. Place the files in an encrypted folder and copy the folder to a floppy disk. D. Use her computer to format a floppy disk and copy the files to the disk.

Answer: A

You are asked to establish a dial-up connection on a Windows 2000 Professional computer in the Accounts Payable department to connect a custom application to

45

Page 46: CCNA Q # A 640

the vendor's network. You have limited information about the type of connection. Because of the sensitive nature of the connection you want to make sure that authentication information is not sent in plain text. Click the exhibit button to view the Advanced Security Settings dialog box. In the Advanced Security Settings dialog box, which options should be checked? (Choose all that apply)

A. Unencrypted password (PAP) B. Shiva Password Authentication Protocol (SPAP) C. Challenge Handshake Authentication Protocol (CHAP) D. Microsoft CHAP (MS-CHAP) E. Microsoft CHAP Version 2 (MS-CHAP v2) F. For MS-CHAP based protocols, automatically use my Windows logon name and

password

Answer: C, D, E

You are the desktop administrator for your network. Sam, the manager of the sales department, complains that someone has been deleting files from his hard disk. He asks you if you can track any users that delete files from his computer in the future. What should you do? (Choose all that apply)

A. Enable a Group Policy for auditing successful object access events. B. Enable a Group Policy for auditing unsuccessful object access events. C. Enable the local Group Policy for auditing successful system events. D. Enable the local Group Policy for auditing unsuccessful system events. E. Use Windows 2000 Explorer to enable auditing for Sam's files. F. Enable auditing in the properties of any share that exists on Sam's computer.

Answer: A, E

46

Page 47: CCNA Q # A 640

Your company has an outside sales team. Recently each of the outside sales staff was given a new Windows 2000 portable computer. The sales team now wants to be able to dial into the network from client sites. For security purposes, you have been asked to set up connections that use smart cards for two-factor authentication. The connection is already configured on the server. You need to configure each laptop to use this connection. What should you do?

A. Set the dial-up connection to use EAP. B. Set the dial-up connection to use SPAP. C. Use the software that came with the smart card to create the connection. D. Issue a client side certificate for each of the portable computers. Configure each

connection as a VPN connection.

Answer: A

You have a need to provide a vendor with a Windows 2000 based portable computer with an external Zip drive. You find an external Zip drive in the supply closet. You attach the drive to the parallel port of the portable computer, and configure the parallel port as an ECP port. Your port settings are shown in the exhibit (See the exhibit below). Windows 2000 Professional has detected the change to the port, but does not detect the attached drive. You need to resolve the problem quickly. What should you do?(Choose all that apply)

A. Configure the ECP port to use any interrupt assigned to the port. B. Configure the ECP port to not use the automatic resource setting. C. Change the LPT Port Number to Unassigned. D. Configure the ECP port to enable legacy Plug and Play detection.

Answer: D

You get a great deal on a refurbished laser printer. The printer is plug and play compliant and connects to your USB port. The printer is on the current Windows

47

Page 48: CCNA Q # A 640

2000 Hardware Compatibility List (HCL). You install the printer and run the manufacturers setup program. During the installation, you receive the error shown in the exhibit (See the exhibit below). What should you do?

A. Change the USB port setting to enable legacy Plug and Play detection. B. Configure the USB port to Disable Error Detection. C. Connect the printer as a shared device on a non-Windows 2000 computer. D. Install the WDM-compliant device drivers using the Add New Hardware wizard.

Answer: D

You are the network consultant for a small company. Part of the office network is shown in the exhibit (See the exhibit below). The network has built up as the company grew. Originally a Windows NT 4.0 peer-to-peer network running NWLINK protocol, the network has grown into a Windows 2000 domain. Not all computers in the network can access all other computers in the network. Though the network works now, the general manager has asked you fix the connectivity problem and prepare the network for Internet connectivity. What should you do?

A. Change all NWLINK computers to the 802.2 frame type. B. Install TCP/IP on the Windows NT 4.0 Workstations. C. Change the default network protocol to NWLink IPX/SPX D. Add the NetBEUI protocol to the binding order on all client computers.

Answer: B

You are the desktop administrator for your company. Pat, a manager in the accounting department asks for your help. Pat needs to copy a spreadsheet to a floppy disk so she can use it at home. On her hard drive, compressed, the file is less than 1 MB in size. However, when Pat attempts to copy the file to an empty floppy disk, she receives the error: 'Insufficient Disk Space' What should you suggest to Pat to do?

A. Use Drivespace.exe to compress the entire floppy disk.

48

Page 49: CCNA Q # A 640

B. Format the Floppy disk on the Windows 2000 computer. Set the compression attribute on the floppy disk to on.

C. Use another program to compress the bitmap file before copying it to the floppy disk.

D. Copy an empty compressed folder to the floppy disk. Copy the compressed bitmap file to the folder on the floppy disk.

Answer: C

You are the desktop administrator for a graphic arts studio. To support a processor intensive rendering program, you have purchased a computer with Dual Pentium 4 processors. You install Windows 2000 Professional on the computer. In Device Manager you notice that the drivers for the second processor are not installed. How can you enable support for the second processor?

A. Re-install Windows 2000 Professional. Specify the additional driver for the second processor.

B. Remove the current processor from device manager, System devices. Reboot to allow Windows 2000 to detect the second processor.

C. Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the computer to support the second processor.

D. Boot Windows 2000 Professional into a command prompt only. Use HALBUILD.EXE to rebuild the hardware abstraction layer (HAL).

Answer: C

You are preparing a RIS installation of Windows 2000 Professional on 45 PXE compliant computers. You install Windows 2000 on a reference computer along with all application and desktop settings. You use sysprep to shut down the computer, and you create an image of the test computer for distribution. When you apply the image to the next computer, you notice that a key application has not been installed. You want to correct the problem with the least amount of effort. What should you do?

A. Use Setup manager to specify a network installation directory for the application. B. Install the application and create the RIS image again. C. Use Sysdiff to take a snapshot of the application installation. Use Windiff to apply

the change to the rest of the computers. D. Add the application install path to the [apps] section of the unattended.txt file

Answer: B

MCSE Sample Questions : Microsoft Windows Server 2003 Network Infrastructure

Microsoft Windows Server 2003 Network Infrastructure

1. As a newly recruited network administrator of a company your boss has told you that the network ID of this network is 192.168.1.1 and subnet mask is 255.255.255.240 and has two subnets, but he wanted to create a new subnet

49

Page 50: CCNA Q # A 640

for IT and Marketing departments. What is the total number of subnets that can be created from the existing subnet mask?

A. 5 B. 4 C. 14 D. 41

Answer: C

2. What is the maximum number of PPTP and L2TP connections that can be supported on a Windows 2003 Enterprise edition?

A. 1000 and 5000 B. 1000 and 1500 C. 1000 and 1000 D. 5000 and 1000

Answer: C

3. As part of trouble shooting errors in a VPN connection, what logs must be checked?

A. IPSec logging B. Event viewer C. VPNSec Log D. All of above

Answer: a

4. A network has an unauthorized DHCP server. What is the utility to detect this?

A. DHCPUnatho B. DetectDHCP C. DHCPLOC D. There is no way to detect an authorised DHCP server

Answer: C

5. What is the recommended way for making DNS servers aware of other namespaces?

A. STUB Zone B. Conditional Forwarding C. Forward lookup D. Reverse lookup

Answer: B

6. What is the broadcast address of the subnet 192.18.12.128 / 255.255.255.224 and address range 192.18.12.129 through 192.18.12.158?

A. 192.18.12.159 B. 192.18.12.128 C. 192.18.12.158 D. 192.18.12.129

50

Page 51: CCNA Q # A 640

Answer: D

7. Which is the best option for troubleshooting name resolution problems?A. NSlookup B. Systems Monitor C. DNS log in Event Viewer D. Network Monitor

Answer: A

8. You have installed a Windows Server 2003 DNS server, but because of security reasons, you have to install this behind a firewall. What port on the firewall must be opened so that users can access the server?

A. IP and UDP port 42 B. UDP and TCP port 53 C. TCP 53 but not UDP D. PPTP and UDP 21

Answer: B

9. In an IPSec tunnel what types of traffic can be secured?A. Multicast B. Unicast C. Kerberos D. Resourse Reservation Protocol(RSVP)

Answer: B

10. An administrator has to choose between compatibility at the same time security is the top most priority for implementing a Virtual Private Network?

A. PPPoE B. LT2P C. PPTP D. PPP

Answer: B

MCSE Sample Questions : Windows Server 2003 Active Directory Infrastructure

Windows Server 2003 Active Directory Infrastructure

1. As the network administrator you have been requested to create a site link to join two sites together for replication. First you click Start, point to Programs, point to Administrative Tools, and then click to open Active Directory Sites and Services. What is the next step in creating this site link?

A. Click two or more sites to connect and click OK B. Right-click on Licensing Site Setting and then click on properties. C. Open Inter-Site Transport folder and then right-click IP or SMTP folder

51

Page 52: CCNA Q # A 640

D. Enter a name for the site link bridge. E. In the New Object Link dialog box click New Site Link Bridge.

Answer: C

2. In any Active Directory forest there are five Operations Masters roles that must be assigned to one or more domain controllers. Which of the following answers correctly depicts these roles?

A. Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root Domain

B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative ID master.

C. Root Master, Domain Name Master, Infrastructure Master, PDC Emulator, Relative ID master.

D. Trust Master, Root Master, Infrastructure Master, PDC Emulator, Relative ID master.

Answer: B

3. A hierarchical structure made up of multiple domains that trust each other is called a(n) _______?

A. Forest B. Schema C. Site D. Organizational Unit E. Tree

Answer: E

4. You have been told that you need to track down the source of a breach in network security. As a network technician for your company's Windows 2000 network you quickly pull up Event Viewer and examine the security logs on the Domain Controllers. However upon viewing the security log you notice there are key and lock icon symbols you do not understand. What could these mean?

A. The key icon represents that this event is locked with a normal password while the lock icon represents that this event is locked with an encryption.

B. The key icon represents that the event is a key alert record while the lock icon indicates that this event can only be unlocked by its owner.

C. The key icon represents that the event occurred successfully while the lock icon represents event occurred unsuccessfully.

D. The key icon represents that this event contains errors, warnings, or vital information while the lock icon represents that this event is normal and within guidelines.

Answer: C

5. As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the local administrator assigned to

52

Page 53: CCNA Q # A 640

the Marketing OU still has access and can remove print jobs from it. What can you do to change this?

A. Remove the permissions for the local administrator from the printer. B. Remove printer permissions from the local administrator. C. Remove the Everyone group from the printer. D. Delete the printer object.

Answer: A

6. You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?

A. When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database.

B. When you rename the root domain server you will simply rename the child domain also.

C. When you rename the root domain server you will lose the entire network orphaning the child domains.

D. When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name.

Answer: C

7. Windows 2000 Active Directory contains both logical and physical components. Which of the following are physical components of Active Directory?

A. Trees B. Organizational Units C. Sites D. Domains E. Domain Controllers

Answer: C, E

8. You are the network administrator for a company that has a Windows 2000 single domain with three sites containing two domain controllers in each. The company only has two IP site links: Atlanta_Detroit and Dallas_Detroit. You are contemplating on adding another domain controller within each site to handle all replication for each site. How should you configure this domain Controller?

A. Configure the new domain controller to be an IP preferred bridgehead server.

B. Configure the new domain controller to be a site link. C. Configure the new domain controller to be a subnet.

53

Page 54: CCNA Q # A 640

D. Configure the new domain controller to be a replication master.

Answer: A

9. You are requested to perform a transfer of the role of relative ID master for a domain within your company. Where would you begin this transfer?

A. Open the Active Directory Schema snap-in B. Open the Active Directory Sites and Services console C. Open the Active Directory Domains and Trusts console D. Open the Active Directory Users and Computers console

Answer: D

10. You have just assisted your company in migrating to Windows 2000 Active Directory. In addition you have installed an intranet server with Web hosting services for each department within your company. One department, the legal department, actually hosts both a web services and ftp services on its intranet server. You need to identify the legal department's intranet server as the host for both ftp and web server within the DNS server's resource records. Which type of resource record should you create to identify this server?

A. Alias (CNAME) B. Mail Exchange (MX) C. Pointer (PTR) D. Service (SVR) E. Name Server (NS) F. Start of Authority (SOA)

Answer: D

As the network administrator you have just been informed that one of your authorized Power Users has deleted several local user accounts. You explain to this mortified employee that he needs to perform an authoritatively restore on the select portion of Active Directory data deleted. What must be done before he can use NTDSUTIL utility to authoritatively restore the data?

A. Republish the SYSVOL B. Bring down all domain controllers at the site and reboot C. Perform a Primary restore D. Synchronize Active Directory Services E. Nonauthoritatively restore the System State data F. Revoke and reissue orphaned certificates

Answer: E

Your company uses Windows 2000 IIS server and log files you have enabled a reverse lookup zone. This will assist in running troubleshooting tools. Because your company is experiencing trouble with a DNS server you decide to use NSLOOKUP to confirm that zone delegation was successful. At the command prompt on your DNS server, you type NSLOOKUP 10.0.0.25 command. What do you expect to see next?

A. Hostname

54

Page 55: CCNA Q # A 640

B. Server zone C. DNS log file D. DNS queries

Answer: A

You have been requested to create a group Policy (GPO) linked to a domain. The GPO will be applied to all users in the domain. What is the first step in creating a GPO?

A. Open the DispatchPolicy GPO console B. Open Active Directory Users and Computers C. Add the Group Policy snap-in to the MMC console D. Open Active Directory Sites and Services

Answer: B

You have been asked to troubleshoot a problem with your DNS servers that appears to not be making zone transfers between primary and secondary DNS servers. You begin to solve this problem by opening the DNS console tree, right click the name server, then click Properties. On the Logging tab, select the debug options and click OK. Which of the following are solutions for transfer problems between primary and secondary zones?

(Choose all that apply). A. Make sure the serial numbers for the zones involved in the transfer are not the

same on each server. B. Make sure a site-link server is properly configures between each zone. C. Delete the secondary DNS server from the primary and reboot. D. Eliminate the possibility of network connectivity between the two hosts. Use the

PING command to ping each DNS host by its IP address from its remote counterpart.

E. Verify that the primary and secondary DNS servers involved in the transfer are both started and that the zone is not paused.

Answer: A, E

As the network administrator you have been asked to move a domain controller from one site to another existing site using Windows 2000 Active Directory. To accomplish this you begin by getting into the Active Directory Sites and Services console. Then you select the domain controller that you want to move. What do you do next?

A. Right-click the domain controller, select Cut, navigate to the new site and Paste it there.

B. Click Move on the Action menu, select the site to which you want to move the domain controller in the Move Server dialog box and click OK.

C. Drag the domain controller to the new site and drop it there. D. Right-click the domain controller, select Advanced, select the site to which you

want to move the domain controller in the Move Server dialog box, and click OK.

Answer: B

55

Page 56: CCNA Q # A 640

As a network technician you have been requested to restore a mistakenly deleted organizational Unit from the Active Directory. You first perform a nonauthoritative restore of the System State data. After which you next chose to use the NTDSUTIL utility to authoritatively restore the organizational unit (OU) that has been mistakenly deleted. The deleted OU is named "prepexams1" and was located in the knowledgeoasis.com domain. At the command prompt you type the utility command 'ntdsutil' and enter, then the type of restore command 'authoritative restore' and enter. Which of the following commands should you enter next to restore this OU?

A. Ntdsutil OU=prepexams1,DC=knowledgeoasis,DC=com B. Restore subtree OU=prepexams1,DC=knowledgeoasis,DC=com C. Restore database OU=prepexams1,DC=knowledgeoasis,DC=com D. Authoritative restore OU=prepexams1,DC=knowledgeoasis,DC=com

Answer: B

You need to create a reverse lookup zone to enable reverse lookup queries. To create a reverse lookup zone you will need to open DNS console and expand the DNS server. What should you do next?

A. Right-click the DNS server and click Properties. B. Right-click the Reverse Lookup Zone folder and click Advanced. C. Right-click the DNS server and select New Domain. D. Right-click the Reverse Lookup Zone folder and click New Zone.

Answer: D

As network administrator you have been asked to create an Active Directory structure to allow local administrators at your company's branch offices to control users and local resources. The local administrators should control only resources in branch offices. What should you do to accomplish this request?

A. Create a child OU for each branch office, place users and resources in it, and delegate control of each OU to local administrators at each office.

B. Create a schema that contains formal definition of administrative duties and structure over users and resources in each branch.

C. Create an implicit trust object thast grants specific authority to the local administrator over their branch domain.

D. Create an explicit one-way nontransitive trust between domains that allow the branch administrators to controller their users and resources.

Answer: A

You are the backup operator of a Windows 2000 domain. The domain has 2 domain controllers and one certificate server at the central office and 1 domain controller at a branch office. You have been requested to add the domain controller in the remote branch office to your regular once a week backup at the central office. You schedule the backup job to include the system state data from both locations. What will be backed up from the branch office?

A. SYSVOL B. Registry C. Certificate database D. COM+ Class Registration database E. System boot files

56

Page 57: CCNA Q # A 640

F. None of the above

Answer: F

You are an Account Operator responsible for maintaining Windows 2000 Active Directory and the network directory infrastructure. You have been using Windows 2000 Group Policy objects to assign .msi packages to a group of Windows 2000 Professional workstations based on their membership in an organizational unit. Recently you added several new users to the OUs receiving the .msi packages. All seems to performing properly until you are contacted by one of the new users. This user states that an error message: The feature you are trying to install cannot be found in the source directory. What is the solution(s) to this problem?

(Choose all that apply) A. You must ensure that the user has sufficient permissions for the SDP and the

application. B. Make sure the network is operating correctly. C. You must ensure that the user has Apply Group Policy permission for the GPO. D. You must ensure that the user has READ permission for the GPO.

Answer: A, B, C, D

Network+ Sample Questions

Network+ is a certification that measures the technical knowledge of networking professionals. Earning the Network+ certification means that the candidate possesses the knowledge needed to configure and operate a variety of networking products.

The Network+ test is available throughout the world in a variety of languages including English, German, French and Japanese.

Following are some Network+ sample questions:

1. You install File and Printer Sharing for Microsoft Networks.You share a folder and leave the password option blank.Who can gain access to the folder

A. Anyone who can gain access to your network and has a Microsoft redirector such as the Client for Microsoft Networks installed.

B. Windows 98 will not allow a blank password in this field. C. Anyone with Internet Explorer installed. D. Only users that are members of the same workgroup as you.

Answer: A

2. The figure below shows a typical Home Network Setup.Identify the network components marked in red.

57

Page 58: CCNA Q # A 640

Answer:

A: Cable/DSL ModemB: CAT 5 Ethernet cableC: Wireless SignalE: Wirelss Router

3. Some protocols are considered to be technically non-routable.Which of the following statements best describes the most common reason why a protocol would be considered non-routable

A. It does not contain the appropriate Data Link layer information required by routers.

B. It uses advanced Transport layer services to move across the Internet and avoids the routing overhead required by the more primitive networking protocols.

C. It defines Physical layer network addresses for internal routing. D. It does not specify the Network layer addresses required by routers.

Answer: D

4. What is the binary network ID of the loopback IP addressA. 1 B. 10101010 C. 0 D. 1111111

Answer: D

5. You are the LAN administrator for your company.You have couple Windows 2000 Professional clients that dial in via PPP to the company network’s RAS server.You want the remote clients to be assigned dynamic IP addresses.You reserve a pool of class B addresses for these clients.Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s.What should you do

A. Run ipconfig with the /release and /renew switch on the client

58

Page 59: CCNA Q # A 640

B. Run ipconfig with the /renew_all switch on the client C. Run winipcfg on the client D. Do nothing.This is normal

Answer: D

6. You are configuring a router.According to the manual, you will need a transceiver to connect to the LAN ports of the router.What kind of physical interface does the router have

A. MSAU B. RJ-11 C. AUI D. BNC

Answer: C

7. Which of the following are connectionless protocols.(Choose the three best answers.)

A. IP B. SPX C. IPX D. UDP

Answer: A, C, D

8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently connected using NBT

A. Use NBTSTAT B. Use NETSTAT C. Use NSLOOKUP D. Use IPCONFIG

Answer: A

9. You are setting up a new Windows 98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information.What must you do to configure the IP address on the workstation after you add the TCP/IP protocol

A. The DHCP option is enabled automatically, and the server will auto-configure everything.

B. Find out what the subnet mask on your network is, and add this information only.

C. Manually enter an IP address that is not in use on the network. D. Put the address of the router in the default gateway, and put all 0s in the IP

field.

Answer: A

10. Which of the following is considered a Network Attached Storage deviceA. A 60 GB DAT tape drive attached to the Network Server

59

Page 60: CCNA Q # A 640

B. A file server with special software that is at a separate location from the departmental file server

C. In a Windows NT environment, it would be the Backup Domain Controller

D. A high speed specialized sub-network attached to the enterprise

Answer: B

Credit card size, designed for notebooks, self-configuring, and non-OS dependent describes which PC bus architecture

A. PCI B. ISA C. EISA D. PCMCIA

Answer: D

What protocol is used between E-Mail serversA. HTTP B. POP3 C. SNMP D. SMTP

Answer: D

When installing a manually configured adapter, what information must you know to avoid resource conflicts

A. IRQ B. Number of bits C. Base I/O port address D. Base Memory address

Answer: A, C & D

Which of the following OSI layers is responsible for identifying communications partners

A. Application B. Session C. Network D. Presentation

Answer: A

A broadcast message is an example of which dialog control methodA. Half duplex B. Baseband C. Broadband D. Simplex

Answer: D

60

Page 61: CCNA Q # A 640

Which of the following are used to resolve Windows NetBIOS names to IP addresses

A. DNS B. WINS C. LMhosts file D. Hosts file

Answer: B,C

What is a routerA. A hardware device that connects dissimilar networks, such as Cat 5 cabling and

FDDI B. A network host that reads the source and destination addresses in the packet

header and makes decisions about where to forward the packet C. A network host that can forward LAN-based email messages onto the Internet,

after repackaging them into the SMTP format D. A software system that can translate between dissimilar networks such as Ethernet

and Token Ring

Answer: B

Which of the following is Class C IP address?A. 10.10.14.118 B. 135.23.112.57 C. 191.200.199.199 D. 204.67.118.54

Answer: D

A Windows 95 user complains that she cannot connect to any other computers on her local subnet even when using the IP address to communicate.However, she can ping 127.0.0.1 and receive a reply.Other users on her subnet do not report having any trouble.All client computers on the network are WINS-enabled.What is the most probable cause of the problem?

A. The TCP/IP stack is not installed properly B. The subnet mask is not correct, check whether the subnet mask is configured

correctly. C. The default gateway is not configured properly. D. The computer is not configured to use LMHOSTS

Answer: B

WINS or ___ may be used for NetBIOS name resolution?A. HOSTS B. DNS C. LMHOSTS

Answer: C

You have set up a server that connects to an Internet services provider ( ISP) over ISDN line.How should the default gateway address be configured so that

61

Page 62: CCNA Q # A 640

windows 95 users on the local network can access the Internet through the RAS server.The RAS server is located on the same subnet as that of the WIN95 machines.

A. The default Gateway address on WINS95 must specify the IP address of the remote ISP

B. The default Gateway on WN95 must specify the IP address of the RAS server on the local network.

C. The HOSTS file in WIN95 machines must be configured with the host name of the RAS Server.

D. The HOSTS file in WIN 95 machines must be configured with the host name of the ISP

Answer: B

Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?

A. 802.2 B. 802.1d C. 802.3 D. 802.5

Answer: C

Disk Striping with Parity corresponds to which RAID level?A. RAID 0 B. RAID 1 C. RAID 3 D. RAID 5

Answer: D.

Which of the following media types is most susceptible to EMI?A. Fiber Optic B. STP C. Co-axial D. UTP

Answer: D

Which type of connector does a 10BaseT Ethernet cable use?A. BNC B. RJ-45 C. RJ-11 D. MSAU

Answer: B

Which of the following is suitable for mission critical and time sensitive applications?

A. 10BaseT B. 10Base2 C. Token Ring

62

Page 63: CCNA Q # A 640

D. Mesh

Answer: C

What is the default subnet mask for Class C network?A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.0.255.0

Answer: C

Which of the following network topologies have each computer connected to a central point?

A. Bus B. Ring C. Star D. Mesh

Answer: C

Which of the following network topologies is the most fault tolerant?A. Bus B. Mesh C. Star D. Ring

Answer: B

A Bus network topology is best described as which of the following?A. All computers are attached to a single cable in a chain style B. All computers are connected to a central point C. All computers are connected to every other computer or resource in the network D. Fault Tolerant

Answer: A

A Ring network topology provides two links from each computer.A link in and a link out.

A. True B. False

Answer:A

Which connector is often used with Thinnet cable?A. RJ-11 B. AUI C. DIX D. BNC

Answer:D

63

Page 64: CCNA Q # A 640

Which of the following media connectors are used in conjunction with telephones?

A. RJ-45 B. RJ-11 C. RJ-T D. None of the above are correct

Answer:B

10BaseT Ethernet networks, most commonly use which of the following types of cable?

A. Fiber B. Coax C. STP D. UTP

Answer:D

A Gateway is able to connect network environments that are dissimilar.A. True B. False

Answer:A

AUI connectors are commonly associated with which of the following items?A. A Vampire Tap B. Fiber Optic Cable C. 10Base2 D. Wireless Networks

Answer:A

A hub works in conjunction with which of the following network topologies?A. Ring B. Star C. Bus D. Mesh

Answer:B

Which of the following is a correct MAC address?A. 190.168.80.1 B. www.certyourself.com C. 08:34:FE:4C:F2:54 D. G2:G3:23:87:GG

Answer:C

A Hub operates at which of the following layers of the OSI model?A. Physical B. Session

64

Page 65: CCNA Q # A 640

C. Transport D. Application

Answer:A

Which of the following devices operate at the Data Link layer of the OSI model?A. A Hub B. A NIC C. A Switch D. A Router

Answer:C

A Router operates in which layer of the OSI model?A. The Physical Layer B. The Data Link Layer C. The Transport Layer D. The Network Layer

Answer:D

A Network Interface Card operates at the Network Layer of the OSI model.A. True B. False

Answer:B

Which of the following is the correct order of the OSI model from bottom to top?A. Application, Presentation, Session, Transport, Network, Data Link, Physical B. Physical, Network, Data Link, Session, Transport, Application, Presentation C. Physical, Data Link, Network, Transport, Session, Presentation, Application D. Application, Session, Presentation, Transport, Network, Data Link, Physical

Answer:C

What is the maximum speed of 10Base5 Ethernet cable?A. 100 Mbps B. 500 Mbps C. 50 Mbps D. 10 Mbps

Answer:D

100Base-FX uses which of the following types of cable?A. Fiber Optic B. Unshielded Twisted Pair C. Coax D. Shielded Twisted Pair

Answer:A

65

Page 66: CCNA Q # A 640

Which of the following TCP/IP protocols is used to communicate between a Web Browser and a Web Server?

A. SMTP B. HTTP C. UDP D. POP3

Answer:B

Which of the following layers of the OSI model does a Bridge operate in?A. The Data Link Layer B. The Network Layer C. The Transport Layer D. The Session Layer

Answer:A

While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server.Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised.Which of the following solutions are you most likely to implement?

A. A firewall system at the connection point to the Internet B. A more secure password policy C. File-level encryption D. Kerberos authentication

Answer: A

A server has two NIC cards installed.The first one uses IRQ 10 and I/O range of B800-B81F.The second uses IRQ 10 and I/O range of D700-D80A.What action, if any, should be taken?

A. No action is required. B. Locate any available IRQ to resolve the IRQ conflict. C. Locate any available I/O range to resolve the I/O conflict. D. Change the I/O of the second NIC to B800-B81F.

Answer: B

Which of the following IEEE 802 standards pertain to token ring?A. IEEE 802.5 B. IEEE 802.3 C. IEEE 802.2 D. IEEE 802.11

Answer: A

51. Protocol that is often used to facilitate communications with an IBM mainframe?

A. NetBEUI B. RIP

66

Page 67: CCNA Q # A 640

C. DLC

Answer: C

52. Which of these protocols provide fast connectionless communications that relies on upper layers of the OSI model for error correction?

A. TCP (Transmission Control Protocol) B. UDP (User Datagram Protocol) C. SPX

Answer: B

53. Can be used to reduce traffic bottlenecks in a NetBEUI network?A. bridge B. router C. gateway

Answer: A

54. You have just finished the installation of two computers on a 28 computer network using Novell's IPX/SPX.Both computers initialize with no error messages yet they cannot contact other computers on the network.All other computers are functioning normally.You probably have an ___?

A. incorrect IRQ B. incorrect frame type C. invalid IP setting

Answer: B

55. Uses amplifiers to regenerate analog signals?A. baseband B. broadband C. fiber-optic

Answer: B

56. Uses single frequency digital signals?A. baseband B. broadband C. multiband

Answer: A

57. You are hired to investigate a slow performing network server for a client.Using the performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%, Page faults/sec= 25.What one change will increase the performance of this network server the most?

A. buy another CPU B. add another hard drive C. increase RAM

67

Page 68: CCNA Q # A 640

Answer: C

58. Which of the following should you check if you can connect using the IP address but NOT with the host name?

A. DNS B. WINS C. DHCP

Answer: A

59. The fastest method of transporting data with a switch?A. store and forward B. cut through C. loop back

Answer: B

60. Although NOT fault tolerant this RAID level is often used when one wants the highest level of performance?

A. RAID 0 B. RAID 1 C. RAID 5

Answer: A

61. Four _____ are used in the 5-4-3 rule of 10Base2 networking?A. repeaters B. segments C. routers

Answer: A

62. You have just finished installing an Ethernet PCI NIC (network interface card) in a client's computer.The computer initializes successfully and has no apparent hardware problems.The computer however is not able to communicate with other computers on this NetBEUI network.All other client computers are able to communicate.What is the most likely cause of this problem?

A. IRQ conflict B. incorrect transceiver setting C. incorrect frame type

Answer: B

63. The two key components of a digital signature include the secure hash algorithm and a ___ ?

A. blowfish value B. certificate authority C. IPSec

Answer: B

68

Page 69: CCNA Q # A 640

64. The Microsoft version of Novell's IPX/SPX protocol?A. ODI B. NWLink C. DLC

Answer: B

65. Utility used to run applications on a computer at a remote location?A. ODI B. Telnet C. ARP (Address Resolution Protocol)

Answer: B

66. Topology that offers the highest level of redundancy, is easy to troubleshoot but is expensive to install.It is the topology of the internet?

A. star B. ring C. mesh

Answer: C

67. Ordinary telephone wire has a thickness of AWG 22.Of the following which is the thickest wire?

A. AWG 14 B. AWG 28 C. AWG 32

Answer: A

68. Backup method which clears the archive bit and is the shortest to perform but takes the longest to restore?

A. full B. incremental C. differential

Answer: B

69. Which of the following protocols map a logical address to a MAC (Media Access Control) address?

A. DNS B. WINS C. ARP

Answer: C

70. The major limiting factor for how long a cable can be in a segment is ___?A. collisions B. EMI C. attenuation

69

Page 70: CCNA Q # A 640

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

Backing up the system state in Win 2000 Prof will backup the ___?A. registry B. boot files C. all of the above

Answer: C

Equipment that is designed to help identify breaks and shorts in cables?A. TDR B. performance monitor C. SNMP

Answer: A

Which company developed the Unix Operating System?A. Sun B. Microsoft C. ATT

Answer: C

To start a Win 2000 Prof computer in the safe mode press ___ at startup?A. F8 B. Ctl and Esc C. F1

Answer: A

A bridge filters traffic using which type of address?A. IP address B. MAC address C. TCP address

Answer: B

A large network with 500 users notice that at specific times in the morning and afternoon network congestion ties up their computers.What is the most likely cause?

A. power fluctuations B. a terminator is not grounded C. many users are logging on or off

70

Page 71: CCNA Q # A 640

Answer: C

A ___ is created when a unique IP address and port number are used to connect two computers?

A. SAP B. media transfer coefficient C. socket

Answer: C

During disaster recovery of a Win 2000 Prof computer if you "Enable Boot Logging" the file ___ is saved to the C:\winnt folder for analysis?

A. setuplog.txt B. bootlog.txt ntbtlog.txt

Answer: C

Which of these WAN (Wide Area Network) protocols is the fastest?A. Frame Relay B. ATM C. X.25

Answer: B

The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec.nt, config.nt, and setup.log?

A. True B. False

Answer: A

OSI layer responsible for mail and file transfers?A. transport B. data link C. application

Answer: C

A protocol that functions at the network layer of the OSI model?A. TCP B. IP C. SPX

Answer: B

A major advantage of ___ in an NT network is centralized security and administration?

A. user-level security B. share-level security C. RAID 5

71

Page 72: CCNA Q # A 640

Answer: A

OC-1 has a transmission rate that is close to ___ ?A. T-1 B. T-3 C. ISDN

Answer: B

The maximum number of populated segments allowed in an Ethernet network?A. 3 B. 4 C. 5

Answer: A

Using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is sent to the ___?

A. switch B. bridge C. default gateway

Answer: C

Entry in DNS to identify your mail server?A. IDC B. TU C. MX

Answer: C

Toplology which is the least expensive to install?A. ring B. star C. bus

Answer: C

Utility which can be used to identify bottlenecks in the network?A. PING B. WINIPCFG C. TRACERT

Answer: C

What is the first octet range for a class A IP address?A. 1- 126 B. 1- 128 C. 1- 191

Answer: A

72

Page 73: CCNA Q # A 640

91. After you setup the IP address and subnet mask your FIRST test should be with ___?

A. tracert to a known good server B. ping 127.0.0.1 C. ping another computer on your segment

Answer: B

92. NetBIOS computer names can have up to ___ characters?A. 256 B. 15 C. 20

Answer: B

93. Refers to the part of the network that is separated by routers, bridges, or switches?

A. partition B. node C. segment

Answer: C

94. Data is organized into FRAMES for transmission at this OSI level?A. physical B. data-link C. network

Answer: B

95. 10Base2 coaxial has a limit of ___ computers per segment?A. 2 B. 30 C. 100

Answer: B

96. Cable used for ArcNet networks?A. RG-58 B. RG-59 C. RG-62

Answer: C

97. A Class A IP address uses the last ___ octet(s) for the host ID.The host ID is the unique part and identifies the individual user and part of the reason 50% of all IP addresses are Class A?

A. one B. two C. three

73

Page 74: CCNA Q # A 640

Answer: C

98. Of the three (3) RAID levels used by a Win 2000 server choose the one(s) that is/are fault tolerant?

A. 0, 1, and 5 B. 1 and 5 C. 5

Answer: B

99. The best method to restore the latest copy of the registry in a Win 2000 Server is to select the ___?

A. Emergency Repair Disk (ERD) B. Recovery Console C. Last Known Good Configuration

Answer: C

100. What routing protocol counts hops to the destination along multiple paths to determine the most efficient route?

A. ARP B. DLC C. RIP

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

The source and destination addresses are stored in the ___ of a packet?A. data B. trailer C. header

Answer: C

Most commonly used type of modem?A. synchronous B. asynchronous C. external

Answer: B

Operates at the network layer of the OSI model?A. bridge B. gateway C. router

74

Page 75: CCNA Q # A 640

Answer: C

Disk duplexing (RAID 1) requires a minimum of ___?A. 2 hard drives and 1 controller B. 3 hard drives and 2 controllers C. 2 hard drives and 2 controllers

Answer: C

Organization responsible for the OSI model?A. ANSI B. IEEE C. ISO

Answer: C

Which topology uses the least amount of cabling?A. star B. bus C. ring

Answer: B

According to RFC 1918 this range of Class A IP addresses are reserved for private intranets and are not supposed to be used on the internet (where x is any number from 1 to 254)?

A. 10.x.x.x B. 20.x.x.x C. 30.x.x.x

Answer: A

Cable classification for 10Base5 thicknet coaxial?A. RG-8 B. RG-10 C. RG-58

Answer: A

Dial-up protocol that uses a virtual private network (VPN)?A. SLIP (Serial Line Internet Protocol) B. PPTP (Point-to-Point Tunneling Protocol) C. PPP (Point to Point Protocol)

Answer: B

Type 9 ___ rated coaxial cable should be installed in drop ceilings to conform to fire code regulations?

A. SPF B. PVC C. plenum

75

Page 76: CCNA Q # A 640

Answer: C

111. The best device to use when monitoring a broadcast storm?A. TDR B. Digital Voltmeter C. Protocol Analyzer

Answer: C

112. Class A IP addresses can accomodate 16 million hosts while a Class B can accomodate ___?

A. 254 B. 65,534 C. 4 million

Answer: B

113. SNMP relies on the information found in ___ to chart and graph components of the network for analysis and troubleshooting?

A. SMPs B. MIBs C. SAPs

Answer: B

114. Prescribes the greatest packet octet length that can be transmitted?A. SAP B. subnet mask C. MTU

Answer: C

115. The default protocol on NT4 or Win 2000 servers?A. IPX/SPX B. NWLink C. TCP/IP

Answer: C

116. A standard security algorithm developed in 1975 that uses 56-bit symmetric key encryption?

A. DES B. EAP C. PAP

Answer: A

117. Win 2000 security service that maintains permissions and passwords used to logon?

A. MMPE B. CHAP

76

Page 77: CCNA Q # A 640

C. SAM

Answer: C

118. A voice grade demand priority standard developed by HP that is capable of 100Mbps transmissions?

A. 100VG-AnyLAN B. 100BaseT C. 100BaseFX

Answer: A

119. PPP is part of the ___ OSI layer?A. physical B. data link C. network

Answer: B

120. Network connection device that is capable of sending packets along multiple paths depending on which path is the most efficient?

A. bridge B. router C. all of the above

Answer: B

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

121. Processes data using applications stored on its hard drive and sends the results back to the client.Saving the client the extra hard drive space he would need for the application as well as the CPU processing time?

A. file server B. print server C. application server

Answer: C

122. The static HOSTS text file used on UNIX systems that requires manual entries by the administrator was the precursor of ___.Today the HOSTS file system finds use mainly in maximum security operations which don't want anything changed automatically?

A. WINS B. LMHOSTS C. DNS

Answer: C

77

Page 78: CCNA Q # A 640

123. The minimum category of UTP cable that will meet the 10BaseT standard?

A. cat2 B. cat3 C. cat5

Answer: B

124. The easiest protocol to setup?A. NetBEUI B. NWLink C. TCP/IP

Answer: A

125. Displays data on hardware components such as memory, CPU, and the hard drive in a chart or graph which describes how these devices are operating?

A. protocol analyzer B. performance monitor C. network monitor

Answer: B

126. The OSI layer responsible for name recognition, security logins, and synchronization of the connection?

A. presentation B. application C. session

Answer: C

127. Has twenty-four 64 Kbps channels for a total of 1.544 Mbps throughput?

A. T3 B. T1 C. X.25

Answer: B

128. Microsoft recommends that the %CPU usage should not be above 90% for a single CPU or above __% for multiple processors for any extended period?

A. 50 B. 70 C. 90

Answer: A

78

Page 79: CCNA Q # A 640

129. Your customer's computer is loaded with peripherals and is using COM1, COM2, LPT5, and LPT7.You install the NIC on IRQ3 and have a conflict.Which of the following is the NIC conflicting with?

A. the printer B. COM1 C. COM2

Answer: C

130. The most widely used protocol?A. NetBEUI B. NWLink C. TCP/IP

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

131. Can be thought of as a "hop counter" determining how many hops it takes along various paths to the destination and then telling the router which is the one with the least number of hops which most of the time is the quickest route?

A. DLC B. SAP C. RIP

Answer: C

132. Apple's LocalTalk protocol has a ___ computer limit?A. 8 B. 32 C. 128

Answer: B

133. Ensures that one device is NOT overwhelmed by another with a data transmission?

A. SMB B. CRC C. flow control

Answer: C

134. You are setting up a 10Base2 Ethernet network for a client with three segments.There are 20 computers in each segment.How many terminators will you need for this network?

A. 1

79

Page 80: CCNA Q # A 640

B. 2 C. 6

Answer: C

135. Used to connect different media types but cannot filter or segment traffic?

A. bridge B. hub C. router

Answer: B

136. The most efficient way to control security in a client/ server network is to assign permissions to ___?

A. each shared resource B. directories C. groups

Answer: C

137. Which of the following IRQs can you set your NIC to without usually causing a conflict?

A. 4 B. 7 C. 10

Answer: C

138. ArcNet is one of the oldest protocols used.What year was it invented?A. 1967 B. 1977 C. 1987

Answer: B

139. OSI layer that determines whether the transmission is a full or half-duplex transfer?

A. presentation B. session C. application

Answer: B

140. Compensates for a hard drive failure on an NT server?A. RAID B. WINS C. DHCP

Answer: A

80

Page 81: CCNA Q # A 640

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

141. In addition to DNS, DHCP, and Active Directory to boot from an RIS server in Win 2000 requires a ___ compliant NIC?

A. RAS B. PXE C. SAP

Answer: B

142. The most popular dial-up protocol?A. SLIP B. UDP C. PPP

Answer: C

143. The standard for several hubs connected in a linear fashion (token-bus)?

A. 802.3 B. 802.4 C. 802.5

Answer: B

144. The minimum number of disks required to implement a fault tolerant RAID system?

A. 1 B. 2 C. 3

Answer: B

145. For increased security Win 2000 enables encryption of files or folders on ___ volumes?

A. FAT32 B. NTFS C. either FAT32 or NTFS

Answer: B

146. Characteristic of the TCP protocol?A. fast but unreliable delivery B. best effort delivery C. assurance of packet delivery

81

Page 82: CCNA Q # A 640

Answer: C

147. Cable type that offers the least resistance to EMI?A. coaxial B. fiber-optic C. UTP

Answer: C

148. Novell introduced TCP/IP as its default protocol in NetWare ___ ?A. 3.x B. 4.x C. 5.x

Answer: C

149. This OSI layer packages bits into frames?A. physical B. data-link C. network

Answer: B

150. Protocol used in Win 2000 to print to a URL on the internet.It requires either Peer Web Services or a IIS server to be installed?

A. IPP B. SAP C. IPSec

Answer: A

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

151. Novell added ___ which could bind many protocols to a NIC starting with NetWare 4.0?

A. NDIS B. TSM C. ODI

Answer: C

152. Port ___ is assigned to the SMTP?A. 21 B. 25 C. 80

82

Page 83: CCNA Q # A 640

Answer: B

153. You are setting up a local peer-to-peer network that will have seven Win 98 computers.Internet access is not needed.Which protocol should you use?

(NetBEUI is the best one but if its not listed then pick the one with the lowest overhead)

A. X.25 B. NWLink C. TCP/IP

Answer: B

154. Used for installing Win NT4?A. setup.exe B. winnt.exe C. win.com

Answer: B

155. OSI layer responsible for error checking frames and adding MAC addresses to its tables?

A. presentation B. transport C. data-link

Answer: C

156. The initial formation of the packet header is started at this OSI level?A. Application B. Session C. Physical

Answer: A

157. For a Class C IP address the first ___ octet(s) are reserved for the network ID?

A. 1 B. 2 C. 3

Answer: C

158. Utility used to check SMTP connectivity?A. SNMP B. LMHOSTS C. Telnet

Answer: C

83

Page 84: CCNA Q # A 640

159. Prevents bounce-back of signals in a 10Base2 network?A. T-connector B. BNC C. terminator

Answer: C

160. A set of "rules" for network transmissions?A. topologies B. protocols C. gateways

Answer: B

« Previous || Next »Network+ Sample Question Number :

What bridging protocol can be used to prevent bridge looping when more than one physical path exists between two or more network segments?

A. The Spanning Tree Protocol B. The Inverted Tree Protocol C. The Transparent Tree Protocol D. The Domain Name Tree Protocol E. The Looping Bridge Protocol

Answer: A

What are the two methods switching hubs use to transport data between devices?A. Routing B. Forwarding C. Cut-through D. Active E. Store-and-forward

Answer: E,C

What happens when a device is disconnected from the middle of a BUS network?A. The hub will propagate error messages to the rest of the network B. All devices on the network will fail C. The Server will stop responding to that device D. Data will not be able to get to devices on the other side of this device E. If a bridge is on the network, only that segment will be effected

Answer: A

What are some advantages of a Client/Server network over a Peer-to-Peer network?

A. Performance is better on a Peer-to-Peer B. Security is better on a Client/Server

84

Page 85: CCNA Q # A 640

C. Performance is better on a Client/Server D. Security is better on a Peer-to-Peer E. Client/Server is easier to administrate

Answer: E,B

Name two protocols in the TCP/IP suite that function at the Transport layer of the OSI model.

A. TCP B. IP C. UDP D. SNMP E. ARP

Answer: C,A

IP is responsible for sorting and _________________ of packets.A. Addressing B. Holding C. Organizing D. Delivery E. Verifying

Answer: D

What is the first octet range for a class B IP address?A. 127-191 B. 128-191 C. 192-223 D. 1-127 E. 128-255

Answer: B

What is the first octet range for a class C IP address?A. 1-126 B. 128-191 C. 192-225 D. 192-223 E. 192-255

Answer: D

What method of transporting data with a switch is fastest?A. Store-and-forward B. Cut-through C. Routing D. Spanning Tree E. Pass-Through

Answer: B

85

Page 86: CCNA Q # A 640

171. The inner core of a coaxial cable that carries the signals is made of ___?

A. aluminum B. copper C. zinc

Answer: B

172. Active hubs can ___?A. route the signal using the most efficient path B. send an acknowledgement once the packet is received C. regenerate the signal like repeaters

Answer: C

173. RAID 5 requires a minimum of __ hard drives?A. 3 B. 4 C. 5

Answer: A

174. What is an advantage of Cat 3 UTP cable instead of RG-58 A/U coaxial?

A. UTP supports longer cable segments B. UTP is less susceptible to EMI C. UTP is easier to install and less expensive

Answer: C

175. A packet in a TCP/IP network whose destination is outside the local network goes to the ___?

A. TCP transceiver B. default gateway C. IP subnet

Answer: B

176. One important difference between routers and bridges is that when a bridge can't locate the destination address in its table it ___?

A. sends the transmission to the default gateway B. dumps the packet C. broadcasts the transmission to all ports

Answer: C

177. Novell's NetWare 5.0 was developed in part from the ___ standard?A. ATM B. NDIS C. X.500

86

Page 87: CCNA Q # A 640

Answer: C

178. The freely distributed open source Unix based operating system that has gained in popularity recently?

A. XP B. Linux C. DLC

Answer: B

179. The term used to describe the physical layout of a network?A. protocol B. server C. topology

Answer: C

180. Is the interface between the NIC drivers and MAC sublayer?A. WINS B. NDIS C. DLC

Answer: B

181. Which topology provides for equal access to the network for all computers?

A. star B. bus C. ring

Answer: C

182. Using the TCP/IP protocol when is a subnet mask required?A. only when connecting outside the LAN B. only when using TCP/IP C. for both intranet and internet usage

Answer: C

183. OSI level that ensures error-free delivery of packets?A. data-link B. network C. transport

Answer: C

184. The IEEE specification for a token ring network?A. 802.3 B. 802.5

87

Page 88: CCNA Q # A 640

C. 802.6

Answer: B

185. RIP counts hops (or routers it encounters) as the packet travels to its destination.Another name for a hop is a ___?

A. interval B. sequence C. metric

Answer: C

186. A protocol that functions at the transport layer of the OSI model?A. IP B. IPX C. SPX

Answer: C

187. How many bits are there in an IP address?A. 64 B. 32 C. 128

Answer: B

188. An easy to configure, fast, and efficient protocol recommended for small non-routable networks?

A. NetBEUI B. TCP/IP C. X.25

Answer: A

189. What type of troubleshooting device examines the network at the packet level?

A. TDR B. VOM C. protocol analyzer

Answer: C

190. Resolves domain names into IP addresses?A. DHCP B. DNS C. WINIPCFG

Answer: B

___ uses data encryption to secure data being transmitted over the internet so even if it is intercepted it can't be read without knowing the key?

88

Page 89: CCNA Q # A 640

A. DLC B. SSL C. ARP

Answer: B

Device drivers can be disabled in Win 2000 Prof in Device Manager or by using the ___?

A. ERD B. Recovery Console C. RDISK

Answer: B

Smart Cards in Win 2000 use the ___ RAS authentication protocol for security?A. PAP B. MSCHAP C. EAP

Answer: C

Because of its low overhead this is the fastest of these protocols?A. TCP/IP B. NWLink C. NetBEUI

Answer: C

The ERD made in the Win 2000 Server Backup utility contains the files needed to boot the computer?

A. True B. False

Answer: B

Your client has a 10Base2 Ethernet network which is using 160m of RG-58A/U cable and two 50 ohm terminators that are both grounded.What is wrong with his network?

A. the terminators should be 93 ohms B. he should be using RG-59/U cable C. only one terminator should be grounded

Answer: C

Of the following the one that is NOT an alogorithm that determines the shortest path for routers?

A. SAP B. RIP C. OSPF

Answer: A

89

Page 90: CCNA Q # A 640

The most common topology in use today among corporate users?A. bus B. ring C. star-bus

Answer: C

Uses a 93 ohm resistor?A. RG62 B. RG58 C. RG59

Answer: A

OSI level responsible for compression and encryption of data?A. session B. application C. presentation

Answer: C

Analog transmissions with multiple frequencies such as cable television signals use ___?

A. baseband B. broadband C. multiband

Answer: B

Network device which cannot be used to filter traffic by segmenting a network?A. bridge B. hub C. switch

Answer: B

RAID can be used in these network operating systems?A. NT B. Netware C. all of the above

Answer: C

When multiple protocols are used in a network ___ should always be placed at the top of the binding order?

A. TCP/IP B. IPX/SPX C. the one most frequently used

Answer: C

90

Page 91: CCNA Q # A 640

The standard cabling type used in AppleTalk and Token Ring?A. UTP B. STP C. RG-58A/U

Answer: B

Arrange these WAN technologies in chronological order beginning with the oldest?

A. X.25, ISDN, ATM B. ISDN, X.25, ATM C. ATM, ISDN, X,25

Answer: A

A crossover cable can be used to connect?A. a hub to a hub B. a computer to a computer C. all of the above

Answer: C

The RJ-45 connector used in UTP networks has ___ wires?A. 2 pairs or 4 B. 4 pairs or 8 C. 6 pairs or 12

Answer: B

Displays the IP configuration information on a Win NT computer?A. IPCONFIG B. WINIPCFG C. ARP

Answer: A

Displays the IP configuration information on a Win 98 computer?A. IPCONFIG B. WINIPCFG C. WINS

Answer: B

211. The IEEE 802 standards operate at these layers of the OSI model?A. network and transport B. session and presentation C. physical and data link

Answer: C

91

Page 92: CCNA Q # A 640

212. Can be used to show only one IP address for multiple users on the subnet?

A. proxy server B. DHCP server C. DNS server

Answer: A

213. What must be configured in TCP/IP for two computers on the same segment to communicate with each other?

A. IP address and subnet mask B. default gateway C. all of the above

Answer: A

214. The Windows NetBIOS name resolution protocol?A. DNS B. WINS C. NDIS

Answer: B

215. The IEEE standard for wireless networks?A. 802.2 B. 802.11 C. 802.8

Answer: B

216. SLIP supports ___?A. TCP/IP B. NetBEUI C. all of the above

Answer: A

217. The proposed IPv6 standard is designed to dramatically extend the present limit of 4 billion IP addresses by using ___ bits instead of the present 32 bit IP addresses in use today?

A. 64 bit B. 128 bit C. 256 bit

Answer: B

218. You are installing cables for an Ethernet network in an office.The office manager doesn't want the media hanging in the crawl spaces and drop ceiling and wants you to share an existing conduit that already has telephone cables to hide the network cables you are installing.The cable segments will not be over 100 m.Which type of media should you choose?

92

Page 93: CCNA Q # A 640

A. coaxial B. UTP C. fiber optic

Answer: C

219. ArcNet was originally setup to operate at ___ Mbps?A. 10 Mbps B. 2.5 Mbps C. 100 Mbps

Answer: B

220. Besides Token Ring ___ also uses tokens?A. ArcNet B. FDDI C. all of the above

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

221. Running performance monitor your CPU usage averages 45% except when you load an application and it surges to 100%.Is there a problem?

A. yes, your CPU needs an upgrade or multiple CPUs may have to be installed

B. yes, but it is not the CPU, you need more RAM C. no, its normal for the %usage to surge when loading an application

Answer: C

222. Interface between the computer and POTS?A. ATAPI B. SONET C. TAPI

Answer: C

223. The following protocols are supported by RAS?A. TCP/IP B. NetBEUI C. all of the above

Answer: C

93

Page 94: CCNA Q # A 640

224. Which architecture is recommended under high network utilization of up to 70% or 80%?

A. Ethernet bus B. Token Ring C. DLC

Answer: B

225. A token-ring network has a maximum limit of ___ computers?A. 1024 B. 260 C. 512

Answer: B

226. Dial-up protocol used when a secure connection is desired?A. PPP B. SLIP C. PPTP

Answer: C

227. Your IP address is 135.72.14.43.What portion of this IP address identifies your network ID?

A. 135 B. 135.72 C. 135.72.14

Answer: B

228. Allows users to connect to a remote network with a PPP dial-up connection?

A. RAS B. SAP C. SONET

Answer: A

229. Which of the following protocols need to be installed on your client's NT system before DHCP and DNS can be enabled?

A. TCP/IP B. IPX/SPX C. NetBEUI

Answer: A

230. A router uses ___ addressing to choose its path?A. physical B. logical C. system

94

Page 95: CCNA Q # A 640

Answer: B

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

231. A ___ is used to connect two pieces of 10Base2 coaxial cable together?A. T-connector B. barrel connector C. patch cable

Answer: B

232. One reason the ATM WAN protocol is faster than Frame Relay is because its packets are a ___ size which allows them to be switched and routed more easily?

A. variable B. fixed C. compressed

Answer: B

233. SQL is used to ___?A. access databases B. setup the default gateway C. identify a defective NIC

Answer: A

234. Which of the following is a routable protocol?A. LAT B. NWLink C. DLC

Answer: B

235. Uses token passing?A. Frame Relay B. ArcNet C. ATM

Answer: B

236. For Cat 5 UTP, patch cables from the wall outlet to the computer can be a maximum of ___ m?

A. 1 B. 3 C. 10

95

Page 96: CCNA Q # A 640

Answer: B

237. The static text file ___ and DNS contain similar names and IP addresses?

A. LMHOSTS B. HOSTS C. WINS

Answer: B

238. Increases the data rate of modems?A. encryption B. compression C. synchronization

Answer: B

239. Wireless technology commonly used to connect workstations that are all located in a single room?

A. IrDA B. microwave C. SONET

Answer: A

240. Your customer has a client/ server Ethernet network consisting of a server and 225 computers running Win NT4.What kind of security would you recommend to him for centralized control of access to files and directories on the network?

A. use a password for each file and groups for each directory B. use a password for each file and directory shared C. setup groups of shared resources and users who have access to these

groups

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

241. Characteristic of an IEEE 802.3 10BaseT Ethernet network?A. BNC T-connectors B. RJ-11 C. UTP

Answer: C

96

Page 97: CCNA Q # A 640

242. You suspect a faulty NIC is causing a broadcast storm in a network.What troubleshooting tool would you use to locate which computer has the defective NIC?

A. VOM B. protocol analyzer C. TDR

Answer: B

243. A dial-up protocol that does not support automatic IP addressing using DHCP?

A. PPP B. DLC C. SLIP

Answer: C

244. Of the two types of routers the one that uses the discovery process to create its routing table?

A. static B. dynamic C. multiplexed

Answer: B

245. Your client's NT server has been having trouble booting.Where should you look first for some answers?

A. performance monitor B. event viewer C. SNMP

Answer: B

246. Another fast non-routable protocol with low overhead developed by DEC?

A. ATM B. LAT C. SPX

Answer: B

247. You are hired to setup a 100Mbps Ethernet network for a client in an office that already has cat 3 UTP installed.Your client wants to keep the costs to a minimum but needs the 100Mbps throughput.What should you recommend?

A. keep the existing cable but purchase 100Mbps hubs B. keep the existing cable but use 100Mbps patch cable from the wall outlet C. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps

NICs

Answer: C

97

Page 98: CCNA Q # A 640

248. Your client's 10BaseT Ethernet network using NetBEUI wants to access data on an IBM mainframe.What device will allow this connection?

A. bridge B. gateway C. router

Answer: B

249. Of the following protocols which is the fastest?A. TCP/IP B. IPX/SPX C. UDP/IP

Answer: C

250. Access to files and folders in Win 2000 is accomplished using ___ ?A. compression B. tunneling C. permissions

Answer: C

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

251. What happens when a device is disconnected from the middle of a BUS network?

A. The hub will propagate error messages to the rest of the network B. All devices on the network will fail C. The Server will stop responding to that device D. Data will not be able to get to devices on the other side of this device E. If a bridge is on the network, only that segment will be effected

Answer: B

252. Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?

A. Too many MAUs would exceed the cable limits imposed by the Token Ring specification

B. Too many MAUs would create to large of a collision domain for communications to take place

C. Too many MAUs require more electricity than the devices can support D. Too many devices connected through MAUs requires more time to get

control of the token that communications becomes unacceptable E. There is no limit to the number of MAUs a token ring network can support

Answer: D

98

Page 99: CCNA Q # A 640

253. How many devices can communicate simultaneously within a Token-ring LAN?

A. One for each MAU on the LAN B. One C. Two D. As many devices as the administrator defines within the NOS E. Between 1 and 5 if the ring speed is 16mbp/s

Answer: B

254. What are three common items that must be configured correctly when installing a Network Interface Card (NIC)?

A. PCI or ISA slot B. IRQ setting C. DMA Address D. Driver E. I/O Address

Answer: B,C,D,E

255. When troubleshooting connection problems you can confirm that physical layer devices are communicating by visually inspecting _______________ on the NIC and hub.

A. Cross over cable B. The Link-Lights C. The electrical connection D. The Patch cable E. The power light

Answer: B

256. What is the name of a common test performed on a NIC with vendor supplied diagnostic software?

A. NIC Test B. Diagnostic Test C. PING D. Loopback E. NICBack

Answer: D

257. Name two driver interfaces that allow a NIC to communicate on more than one protocol.

A. NDIS B. NetBEUI C. NetBIOS D. ODI E. UNIX

Answer: D,A

99

Page 100: CCNA Q # A 640

258. Bridges operate at the _____________ OSI level.A. The Data-Link Layer B. Top Layer C. The Transport Layer D. The Session Layer E. The Network Layer

Answer: A

259. What bridging method is commonly used in Ethernet with only one bridge.

A. Collision B. Routing C. Transparent D. Spanning Tree E. Open Shortest Path First (OSPF)

Answer: C

260. Where are bridging address tables maintained when using source-route bridging?

A. In routing tables on the hard drive B. In routing tables in RAM C. In routing tables in ROM D. At each PC on the network E. On special routing devices

Answer: A

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

261. Can switching hubs propagate broadcast packets on the network?A. Yes B. No

Answer: A

262. How many physical addresses can be assigned to a NIC?A. One B. Two C. Three; One by the IEEE, one by the NIC vendor, and one by the Network

Administrator D. Depends on the NOS E. Depends on the NIC driver

Answer: A

100

Page 101: CCNA Q # A 640

263. What are the two types of routing connections?A. Token passing B. Connectionless C. Reliable D. Connection Orientated E. Unreliable

Answer: D,B

264. What type of routing connection would typically fragment data packets?

A. Connection Orientated B. Cut-Through C. Reliable D. Connectionless E. Static

Answer: D

265. What name is given to Novell's client software loaded on the workstation, and what feature does it provide that earlier versions of the Generic Windows client do not offer?

A. NETX B. Client for NetWare Networks C. Client32 D. Support for NetWare Print Queues E. Support for NetWare Directory Services

Answer: C,E

266. If two computers are assigned the same IP address then ___?A. neither computer will be able to connect B. the first computer to sign on will be able to connect the other will not C. both computers will be able to connect to the local network but not to the

internet

Answer: B

267. The physical address assigned by the NIC manufacturer?A. subnet mask B. IP address C. MAC address

Answer: C

268. Similar to WINS in that it resolves NetBIOS names into IP address but stores this information in a text file?

A. LMHOSTS B. DLC C. DNS

101

Page 102: CCNA Q # A 640

Answer: A

269. A small peer to peer network uses ___ security?A. user-level B. share-level C. permissions for

Answer: B

270. The TCP/IP protocol used on the internet allows for approximately ___ billion unique IP addresses?

A. 1 B. 4 C. 10

Answer: B

« Previous || Next »Network+ Sample Question Number : 1-10| 11-20| 21-30| 31-40| 41-50| 51-60| 61-70| 71-80| 81-90| 91-100| 101-110| 111-120| 121-130| 131-140| 141-150| 151-160| 161-170| 171-180| 181-190| 191-200| 201-210| 211-220| 221-230| 231-240| 241-250| 251-260| 261-270|

271-274

271. Records the number of hops and latency of the packet on its way to its destination?

A. IPCONFIG B. TRACERT C. PING

Answer: B

272. NDIS operates at which layer of the OSI model?A. presentation B. data-link C. network

Answer: B

273. When checking the TCP/IP protocol you have just finished installing for connectivity the proper first step it to ___?

A. PING another computer on that segment B. PING 127.0.0.1 C. PING the default gateway

Answer: B

274. As data travels down the OSI layers it reaches the ___ layer which is responsible for its bit conversion and actual transmission to other computers?

A. network B. application

102

Page 103: CCNA Q # A 640

C. physical

Answer: C

« Previous

http://www.globalguideline.com/interview_questions/Questions.php?sc=Basic_Networking_Concepts_Interview_Questions_and_Answers&page=2

103