免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2258 | 回复: 6
打印 上一主题 下一主题

640-607 CCNA3.0 TESTKING 15.0 QA [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2003-08-14 10:44 |只看该作者 |倒序浏览
640-607
Cisco Certified Network Associate 3.0
CCNA 3.0
Version 15.0
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 2 -
Important Note
Please Read Carefully
Study Tips
This product will provide you questions and answers along with detailed explanations carefully compiled and
written by our experts. Try to understand the concepts behind the questions instead of cramming the questions.
Go through the entire document at least twice so that you make sure that you are not missing anything.
Further Material
For this test TestKing also provides:
* Study Guide. Concepts and labs.
* Interactive Test Engine Examinator. Check out an Examinator Demo at
http://www.testking.com/index.cfm?pageid=724
Latest Version
We are constantly reviewing our products. New material is added and old material is revised. Free updates are
available for 90 days after the purchase. You should check your member zone at TestKing an update 3-4 days
before the scheduled exam date.
Here is the procedure to get the latest version:
1. Go to www.testking.com
2. Click on Member zone/Log in
3. The latest versions of all purchased products are downloadable from here. Just click the links.
For most updates, it is enough just to print the new questions at the end of the new version, not the whole
document.
Feedback
Feedback on specific questions should be send to feedback@testking.com. You should state: Exam number and
version, question number, and login ID.
Our experts will answer your mail promptly.
Copyright
Each pdf file contains a unique serial number associated with your particular name and contact information for
security purposes. So if we find out that a particular pdf file is being distributed by you, TestKing reserves the
right to take legal action against you according to the International Copyright Laws.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 3 -
Note: For the simulation questions (13, 79, 195, 203, 331, 342, 357): If you are unsure of the testing
environment, try the following address:
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html
QUESTION NO: 1
You can configure PPP on which of the following types of physical interfaces? (Choose two)
A. Ethernet
B. Token Ring
C. Synchronous Serial
D. Asynchronous Serial
Answers: C, D.
Explanation: Point-to-Point Protocol (PPP) provides router-to-router and host-network connections over
synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols,
including IP and IPX. It also has built in security features such PAP (Password Authentication Protocol) and
CHAP (Challenged Handshake Authentication Protocol).
Incorrect Answers:
A: Ethernet is a LAN (Local Area Network) architecture. It uses either a star or a bus topology to exchange
data.
B: Token Ring is a type of network in which the computers are arranged in a circular fashion. These
computers pass a token between each other. This token is used to communicate data.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 373.
QUESTION NO: 2
Frame Tagging is used to interconnect multiple switches and to maintain VLAN information as traffic
goes between switches. Which of the following statements about the Frame Tagging are true? (Choose
two)
A. A Filtering table is developed for each switch.
B. Frame Tagging defines a unique user defined ID to each frame.
C. A unique identifier is placed in the header of each frame as it is forwarding between switches.
D. Frame Tagging is technique that examines particular information about each frame based on userdefined
offsets.
Answer: B, C.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 4 -
Explanation: Frame tagging or frame identification uniquely assigns a user-defined ID to each frame. This is
sometimes referred to as VLAN ID. Cisco created frame tagging to be used when an Ethernet frame traverses a
trunked link.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 186-187.
QUESTION NO: 3
Your company is having trouble connecting a Cisco router to a Nortel router using Frame Relay. What
is the default encapsulation type for Frame Relay on a Cisco router?
A. HDLC
B. PPP
C. IETF
D. Cisco
E. ANSI
Answer: D.
Explanation: Cisco is the default encapsulation type for Frame Relay on a Cisco router.
Note: For a router to operate in a Frame Relay network the serial interface must be configured for Frame Relay
Encapsulations. There are two types of Frame Relay encapsulation types: Cisco and IETF. When you are
connecting to a non Cisco router the frame relay encapsulation type is IETF.
Incorrect Answers
A. HDLC stands for High level Data Link Control. This is the encapsulation type on synchronous serial links.
B. Point to Point Protocol (PPP). This provides for host to network and router to router connections over
synchronous and asynchronous circuits.
C. IETF should be used in this scenario. However, the default Frame Relay encapsulation type on Cisco routers
is Cisco.
E. Cisco routers support three types of LMIs: Cisco, ANSI and Q933a. This question is looking for the default
encapsulation type.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 418-420, 416, and 373-
374.
QUESTION NO: 4
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 5 -
The IP address 131.107.0.0 is a class B address. What is the range of binary values for the first octet in
this address class?
A. 10000000-11111111
B. 00000000-10111111
C. 10000000-10111111
D. 10000000-11011111
E. 11000000-11101111
Answer: C
Explanation: Class B addresses have a range of 128 – 191. One of these numbers would appear in the first
octet of a Class B address. 128 and 191 are converted to binary below:
128 64 32 16 8 4 2 1
128 1 0 0 0 0 0 0 0
191 1 0 1 1 1 1 1 1
Therefore the first octet converted to binary is 10000000 – 10111111.
Incorrect Answers
A: The 10000000-11111111 range, 128-255, does not define an address class.
B: The 00000000-10111111 range, 0-191, does not define an address class.
D: The 10000000-11011111 range, 128-223, does not define an address class.
E: The 11000000-11101111 range, 192-239, does not define an address class.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 220 – 223.
QUESTION NO: 5
TCP is a connection-oriented protocol. An advantage of operating in a connection-oriented environment
is that a connection is established between both ends before the transfer of information can begin. What
is a disadvantage of using a connection-oriented protocol such as TCP?
A. Packet acknowledgement may add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss or duplication of data packets is more likely to occur.
D. The application layer must assume responsibility for correct sequencing of the data packets.
Answer: A.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 6 -
Explanation: One of the benefits of a connection-orientated protocol is that there is a guarantee of delivery of
data. This guarantee is provided as the two communicating exchange PDUs during transmission and if an
acknowledgement is not received then the data is retransmitted. As can be imagined this exchange of PDUs can
cause an increase in overhead.
Incorrect Answers:
B: Sequence numbers are added to insure correct order
C: Packet loss, duplication, and ordering are handled by connection-oriented protocols.
D: The transport layer (such as TCP) handles sequencing.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.
QUESTION NO: 6
Switches have three primary modes to handle frame switching. Which one of these modes looks at the
destination address and then immediately forwards the frame to the destination?
A. CSMA/CD
B. FULL DUPLEX
C. CUT THROUGH
D. HALF DUPLEX
E. FRAGMENTATION
F. STORE AND FORWARD
Answer: C.
Explanation:
In cut-through mode, the switch checks the destination address (DA) as soon as the header is received and
immediately begins forwarding the frame. Depending on the network transport protocol being used (connection
or connectionless orientate), there is a significant decrease in latency from input port to output port. The delay
in cut-through switching remains constant regardless of the size of the frame, because this switching mode starts
to forward the frame as soon as the switch reads the DA.
Incorrect Answers:
A: CSMA/CD is not a method of transporting frames. Rather it is a set of rules that are used to determine how
network devices will respond to two different devices attempting to communicate on a data channel at the
same time.
B: Full duplex refers to how two switches communicate with each other. In this case, there is a transmission of
data in two directions at the same time.
D: Half duplex refers to how two switches communicate with each other. With half duplex the communication
can only be in one direction and if not a collision will occur.
E: This is not a method of frame communication.
F: In store and forward the entire frame must first be received before it can be forwarded on.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 7 -
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-5.
QUESTION NO: 7
Which of the following are Application layer protocols that use TCP/IP? (Choose three.)
A. ARP
B. HTTP
C. SMTP
D. FTP
E. ICMP
Answer: B, C, D
Explanation: There are a number of TCP/IP application layer protocols. The common TCP/IP application
layer protocols include: FTP, Telnet, SMTP, and HTTP.
Incorrect Answers:
A. ARP operates at the Internetwork layer of the TCP/IP protocol stack.
E. ICMP operates at the Internetwork layer of the TCP/IP protocol stack.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 206 – 215.
QUESTION NO: 8
Two types of frame tagging are ISL and 802.lQuestion No: What is the purpose of Frame Tagging?
A. They provide best path determination.
B. They allow the exchange of filtering tables.
C. They specify different implementation of the Spanning-Tree Protocol.
D. They provide inter-switch VLAN communication.
Answer: D
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 8 -
Explanation: The purpose of frame tagging (ISL tagging) is to interconnect multiple switches and to keep
VLAN information as it goes through various switches.
Incorrect Answers:
A, B, and C. This are not the purposed for frame tagging.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 186 – 187.
QUESTION NO: 9
You company has decided to use RIP version 1 as the routing on a Cisco router. What is the command to
enable rip as the routing protocol on the company’s router?
Answer: Router rip
Explanation: The key characteristics of RIP include: it is a distance vector protocol, hop count is the metric
used for path selection, it maximum allowable hop count is 15, it broadcasts it entire routing table every 30
seconds by default and it can be load balanced as many as six equal cost paths (4 paths are the default). To
configure RIP not only does the router rip command need to be inputted but also it must be followed by the
network command. The network command must be issued for each directly connected network.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-279.
QUESTION NO: 10
Your company has decided to use IP RIP version 1 as the routing protocol. Which of the following are
the commands you can use to configure IP RIP version 1 on your router?
A. Router RIP
network 172.16.1.0
network 10.1.0.1
B. Router RIP
network 172.16.0.0
network 10.0.0.0
C. Router RIP
network 172.16.1.0 172.16.1.1
network 10.1.0.0 10.1.1.1
D. Router RIP
network 172.16.1.0 265.255.255.0
Network 10.1.0.0 255.255.0.0
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 9 -
Answer: B.
Explanation: To enable RIP version 1 not only does the router rip command need to be used but also it must be
followed by the network command. The network command must be issued for each directly connected
network. The network command must be followed by a valid network address.
Incorrect Answers:
A: Is this series of commands the network 10.1.0.1 is not a valid command.
C: If 4 networks are directly connected they must have their own network command.
D: There is no need to include a subnet mask with a network command.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-9.
QUESTION NO: 11
Spanning-Tree was originally developed by DEC. What is the reason Spanning-Tree is used in a
switched LAN?
A. To provide a mechanism for network monitoring in switched environments.
B. To prevent routing loops in networks with redundant paths.
C. To prevent routing switching loops in networks with redundant switched paths.
D. To manage, the addition, deletion, and naming of VLANs across multiple switches.
E. To segment a network into multiple collision domains.
Answer: B.
Explanation: The purpose of the Spanning Tree Protocol (STP) is to provide for redundant paths within a
switched environment while ensuring that there is a loop free network. This is done as the redundant ports are
blocked.
Incorrect Answers:
A. STP does not provide mechanism to monitor a switched network.
C. Loops are not referred to as “routing switching loops”.
D. STP is not used for VLAN management.
E. Switches create multiple collisions domains and not STP.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 155-156.
QUESTION NO: 12
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 10 -
Switches have three primary modes to handle frame switching. Which two statements about the store
and forward switching method are true? (Choose two)
A. Latency remains constant regardless of frame size.
B. Latency through the switch varies with frame length.
C. The switch receives the complete frame before beginning to forward it.
D. The switch checks the destination address as soon as it receives the header and begins forwarding the
frame immediately.
Answer B, C.
Explanation:
In store and forward mode, the switch must receive the complete frame before forwarding takes place. The
destination and source addresses are read, the cyclic redundancy check (CRC) is performed, relevant filters are
applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. The latency (or delay) through
the switch varies with frame length.
Incorrect Answers:
A: Is wrong because the latency changes with the frame size.
D: Is wrong because it waits for the complete name and not merely the destination address.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 162.
QUESTION NO: 13
Acme Ltd. consists of three campuses: North, Main and South. They have purchased three 2501 routers.
Each router has one Ethernet interface and two serial interfaces. Each campus is connected serially to its
neighbor. The routers have been working properly.
The connection between North and Main ceases operation one day and an unauthorized entry is detected
on the South router.
Determine the problem and restore connectivity. The network has been configured with the following
characteristics:
The routers are named North, Main, South.
All networks have the default subnet mask.
RIP is the routing protocol.
The clocking signal is provided on the serial 0 interface.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 11 -
Lab 1
Name: North
E0: 192.168.159.1
S0: 192.168.75.1
Secret password : testk
Lab 2
Name: Main
E0: 192.168.112.1
S0: 192.168.201.1
S1: 192.168.75.2
Secret password : testk
Lab 3
Name: South
E0: 192.168.65.1
S1: 192.168.201.2
Secret password : testk
Start by clicking on host that is connected to the router you want to configure.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 12 -
Answer Lab 1:
<Click on Host2, which is connected to the Lab 1 router>;
enable
config terminal
hostname North
enable secret testk
interface ethernet 0
ip address 192.168.159.1 255.255.255.0
no shutdown
exit
interface serial 0
ip address 192.168.75.1 255.255.255.0
clock rate 64000
no shutdown
exit
router rip
network 192.168.159.0
network 192.168.75.0
^z
copy running-config startup-config
Explanation:
Note: comments are added in text after the !-sign. They will not be shown during simulation.
First we click on the Lab 1 router.
Router Con0 is now available ! The router starts
Press RETURN to get started. ! Here we press return
Router>;enable ! We must enter EXEC mode (or enable mode as it also called)
Router#config terminal ! We must enter configuration mode.
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname North ! We change the host name
North(config)#enable secret testk ! We set the password
North(config)#interface ethernet 0 ! We enter interface configuration mode for ethernet 0
North(config-if)#ip address 192.168.159.1 255.255.255.0 ! We set the IP address for Ethernet 0.
! Note that we use a 24 bit network mask.
!It is a class C address.
North(config-if)#no shutdown ! We start the interface
%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 13 -
%LINK-3-UPDOWN: Interface Ethernet0, changed state to up
North(config-if)#exit ! We exit interface configuration for Ethernet 0
North(config)#interface serial0 ! We enter interface configuration mode for the serial0 interface.
! Note that there are no space in serial0
North(config-if)#ip address 192.168.75.1 255.255.255.0 ! IP address for serial0
! Cisco recommends to set the IP address of the interface before
! setting the clockrate
North(config-if)#clock rate 64000 ! We set a clockrate. We must do it to enable communication between
! the routers. They must be synchronized.
North(config-if)#no shutdown ! Start the serial0 interface
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up
%LINK-3-UPDOWN: Interface Serial0, changed state to up
North(config-if)#exit ! Exit interface configuration mode
North(config)#router rip ! Start the routing protocol. RIP does not need further configuration.
! RIP works well in this small network.
! We enter router configuration mode.
North(config-router)#network 192.168.159.0 ! We enable RIP on the network of Ethernet E0.
North(config-router)#network 192.168.75.0 ! We enable RIP on the network of Serial0.
North(config-router)#^Z ! We exit configuration mode and return to enable mode.
%SYS-5-CONFIG_I: Configured from console by console
North#copy running-config startup-config ! We save our configurations to NVRAM
Destination filename [startup-config]? ! We confirm with Enter.
North# ! We are finished.
You don't need to make full configuration because all routers have already been configured but they have some
mistakes. Your task is to find these mistakes and fix them. Maybe the easy way is to remember full config, but
better is to understand the right configuration. You need to add two networks for Lab 1 as we only have to add
the networks we have on the router. For LAB 2 we add three networks, and for LAB 3 we add two networks.
Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 374-403.
Note: If you are unsure of the testing environment, try the following address:
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/simulation/demo_sim.html
************************************
Answer Lab 2:
enable
config terminal
hostname Main
enable secret testk
interface ethernet 0
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 14 -
ip address 192.168.112.1 255.255.255.0
no shutdown
exit
interface serial 0
ip address 192.168.201.1 255.255.255.0
clock rate 64000
no shutdown
exit
interface serial 1
ip address 192.168.75.2 255.255.255.0
no shutdown
exit
router rip
network 192.168.75.0
network 192.168.112.0
network 192.168.201.0^z
copy running-config startup-config
Explanation: Very similar to Lab 1. We have two serial interfaces in lab 2 to configure. We must also make
sure that we enable RIP on all three interfaces with the network command.
******************************************
Answer Lab 3:
enable
config terminal
hostname South
enable secret testk
interface ethernet 0
ip address 192.168.65.1 255.255.255.0
no shutdown
exit
interface serial 1
ip address 192.168.201.2 255.255.255.0
no shutdown
exit
router rip
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 15 -
network 192.168.201.0
network 192.168.65.0
^z
copy running-config startup-config
Explanation: Very similar to Lab 1 and Lab 2. Lab C only has one serial interface, serial1.
QUESTION NO: 14
Which layer of the OSI model ensures reliable end-to-end delivery of data?
A. Application
B. Presentation
C. Session
D. Transport
E. Network
Answer: D
Explanation: The Transport Layer, Layer 4, of the OSI reference model provide to methods of end-to-end
delivery of data. These methods of delivery are reliable and unreliable. TCP is a reliable method and UDP is
unreliable.
Incorrect Answers:
A. The Application Layer is best described as the user interface. This is how users/applications access
protocols to access a network.
B. The Presentation Layer controls how data is presented and also provides other services such as encryption.
C. The Transport Layer is in charge of communication management (including establishing and terminating of
communication).
E. The Network Layer is responsible for an addressing scheme so that routers can determine a path.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 30.
QUESTION NO: 15
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 16 -
You company uses a switch in the training department. You need to be able to make changes to this
switch remotely so that you can allow different classrooms to have access to the Internet as needed. What
do you have to configure on this switch so that you can remotely make these changes? (Choose two.)
A. The switch name must match the workgroup name of the local network.
B. The switch must be configured with an IP address and default gateway.
C. The remote workstations must have access to the VSM of the switch.
D. CDP must be enabled on the switch so that other devices on the network can locate it.
Answer: B, C
Explanation:
To remotely configure a switch you will need to use the Visual Switch Manager (VSM). In order VSM to
function properly the switch will require an IP address and network connectivity. Remote locations must use a
web browser to connect to VSM.
Incorrect Answers:
A. VSM does not require that the switch name match the local workgroup name.
D. CDP is not required for VSM but it is used as an information-gathering tool.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 165 and 114.
QUESTION NO: 16
What one of the following is an example of a layer 2 MAC address?
A. 192.201.63.251
B. 19-22-01-63-25
C. 0000.1234.FEG
D. 00-00-12-34-FE-AA
Answer: D.
Explanation: MAC address is a uniquely assigned address to each device on the network. The MAC address is
48 bits in length and is expressed as hexadecimal digit. The first 6 digits specify the manufacturer ID and the
remaining 6 are unique to host. No two MAC addresses can be same. In addition MAC addresses are usually
comprised of 6 pairs, each pair can be two number, two letters or a combination of a number and a letter.
Incorrect Answers:
A: 192.201.63.251 contains to many number and is an IP address.
B: There only 6 pair combinations in 19-22-01-63-25.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 17 -
C: 0000.1234.FEG is short one letter or one number.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 20.
QUESTION NO: 17
You issue the command show ip route which of the following correctly describes the codes displayed
in your route table after you issue this command? (Choose two.)
A. I-Indicates a route was learned through an internal protocol.
B. S-Indicates a route was learned through static command.
C. R-Indicates a route was learned through RIP.
D. S-Indicates a route was learned through a serial port.
E. R-Indicates a route was learned through a reliable port.
Answer: B, C
Explanation:
B: S stands for static.
C: R stands for RIP.
Note:
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route, o - ODR
Incorrect Answers
A: I stands for a route learned through IGRP.
D: S stands for static.
E: R stands for RIP.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 280 – 281.
QUESTION NO: 18
What can you use to connect a user’s pc directly to a router?
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 18 -
A. Connect the PC's COM port to the router's console port using a straight-through cable.
B. Connect the PC's COM port to the router's console port using a crossover cable.
C. Connect the PC's COM port to the router's Ethernet port using a straight-through cable.
D. Connect the PC's Ethernet port to the router's Ethernet port using a crossover cable.
E. Connect the PC's Ethernet port to the router's Ethernet port using a rollover cable.
F. Connect the PC's Ethernet port to the router's Ethernet port using a straight-through cable.
Answer: D.
Explanation: To connect the PC directly to the router we can use a cross-over RJ-45 cable and connect the
cable to an Ethernet port on the router and to the Network adapter on the PC.
Incorrect Answers
A, B: In order to connect to the console port of the router a rollover cable must be used.
C: To connect to an Ethernet port on the router we must use a network adapter on the PC.
E: A rollover cable can be used to connect a PC to the console port, not an Ethernet port, on the router.
Furthermore, one extra adapter would also be required.
F: A crossover cable must be used to directly connect a PC to a router.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 51 – 52.
QUESTION NO: 19
What are good reasons for using layer two switches? (Choose two)
A. To reduce collisions.
B. To increase collisions.
C. To increase the number of collision domains.
D. To decrease the number of collision domains.
E. To decrease the number of broadcast domains.
Answer: A, C.
Explanation:
A switch creates multiple collision domains, and reduces the number of nodes in the domain. This results in
less contention and interference which in turn reduces the number of collisions.
Incorrect Answers:
B: Switches are design to REDUCE collisions and not increase them.
D: When a switch segments a network it increase the number of domain and it does not reduce them.
E: A switch can neither increase nor decreases the broadcast domains.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 19 -
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 30-31.
QUESTION NO: 20
Full-duplex gives you the ability to send and receive data at the same time. Which of the following
Ethernet standards can operate in full-duplex mode? (Choose two.)
A. 10Base2
B. 10Base5
C. 10BaseT
D. 100BaseT
Answer: C, D
Explanation: In order for full duplex transmissions to be supported the “cable” requires a means by which to
receive and send transmissions at the same time. This is achieved through the use of twisted pairs. Both
10BaseT and 100BaseT utilize twisted pairs.
Incorrect Answers
A, B: Coaxial cable, either Thicknet (10Base5) or Thinnet (10Base2) only support one single transmission. If
there is more than one transmission then a collision will occur.
Reference:
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 15 – 16, and 164.
QUESTION NO: 21
Which of the following devices support Full Duplex Ethernet ? (Choose two.)
A. Switch to host.
B. Switch to switch.
C. Hub to hub.
D. Switch to hub.
E. Hub to host.
Answer: A, B
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 20 -
Explanation: Devices that are connected to switches can communicate in full duplex mode. This includes
switched that are connected to other switches.
Incorrect Answers:
C, D, and E. Hubs can only communicate in half duplex mode (CSMA/CD). Therefore none of these options
are correct.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 164 – 165.
QUESTION NO: 22
Which three are examples of the functions of connection oriented services? (Choose three)
A. Connection parameters are synchronized.
B. Any loss or duplication of packets can be corrected.
C. The data packet is independently routed and the service does not guarantee the packet will be
processed in order.
D. A data communication path is established between the requesting entity and the peer device on the
remote end system.
Answer: A, B, D.
Explanation:
In order to establish a connection-orientated service, the connection must first be established. An example of
this would the TCP/IP suites use of the three-way handshake. The sending and receiving of synchronization
and acknowledgment packets between the sending system and the receiving system accomplish a three-way
handshake. Errors can be corrected when the sender does not receive an acknowledgment, within a specified
amount of time, from the receiving system the packet will be resent.
Incorrect Answers:
C: Due to the acknowledgement of packets, the order that packets are received is ensured.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29-30.
QUESTION NO: 23
What is the correct order of PDUs in data encapsulation?
A. Data, Frame, Packet, Segment, Bit
B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Packet, Segment, Frame, Bit
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 21 -
E. Data, Segment, Frame, Packet, Bit
F. Data, Segment, Packet, Frame, Bit
Answer: F
Explanation: Encapsulation steps
Step 1: The application creates the data
Step 2: The transport layer segments the data.
Step 3: The network layer puts the data into packets.
Step 4: The data link layer puts data into frames.
Step 5: The physical layer transmits the bits.
Reference: Wendell Odom. Cisco CCNA Exam #640-607 Certification Guide. (Cisco Press: 2002) page 96.
QUESTION NO: 24
If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary.
Which of the following is the correct bit pattern for the first octet?
A. 0xxxxxxx
B. 10xxxxxx
C. 110xxxxx
D. 1110xxxx
E. 11110xxx
Answer: A
Explanation: The range for Class A address is 1 to 126. 10 convert into binary is 00001010. The only answer
that follows this pattern is A.
Incorrect Answers:
B. With a 1 in the first bit of the binary number the value will be at least 128. 128 is above the range of Class
A addresses.
C. With ones in the first 2 bits the value for the octet will need to be 192 or greater. This is outside the range of
Class A addresses.
D. With ones in the first 3 bits the value for the octet will need to be 224 or greater. This is outside the range of
Class A addresses.
E. With ones in the first 4 bits the value for the octet will need to be 240 or greater. This is outside the range of
Class A addresses.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 22 -
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 221 – 223.
QUESTION NO: 25
Which of the following statements about a reliable connection oriented data transfer are true? (Choose
two)
A. Recipients acknowledge receipt of data.
B. When buffers are filled to capacity, datagrams are discarded and not re transmitted.
C. Windows are used to control the amount in outstanding acknowledged data segments.
D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection.
E. The receiving device waits for acknowledgements from the sending device before accepting more data
segments.
Answer: A, C.
Explanation:
Connection orientated protocols, such as TCP, communication use acknowledgement of packets. This is how
error control is possible. To govern the flow of data between devices, TCP uses a flow control mechanism.
The receiving TCP reports a “window” to the sending TCP. This window specifies the number of octets,
starting with the acknowledgment number, that a receiving TCP is currently prepare to receive.
TCP windows sizes are variable during the lifetime of the connection. Each acknowledgment contains a
window advertisement that indicates how many bytes the receiver can accept. TCP also maintains a congestion
control window that is normally the size as the receiver’s window but is cut in half when a segment is lost (for
example, there is congestion). This approach permits the window to be expanded or contracted as necessary to
manage buffer space and processing.
Incorrect Answers:
B: With connection orientate protocols packet delivery is guaranteed. Packet will not be dropped. Flow
control (windowing) addresses the buffer issue.
D: If the sending system does not receive an acknowledgement from the receiving system then the packet will
be resent.
E: The receiving device sends the acknowledgement of packets and this states how much data the receiving
device can receive.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 213-4.
QUESTION NO: 26
Which two statements are valid? (Choose two.)
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 23 -
A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a
private broadcast domain.
B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions.
C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth.
D. Full-duplex Ethernet provides lower throughput than half-duplex Ethernet of the same bandwidth.
E. Full-duplex Ethernet consists of a shared cable segment while half-duplex Ethernet provides a point-topoint
link.
Answer: B, C
Explanation: Full-duplex involves only two participants. Both can transmit simultaneously. Half-duplex, on
the other hand, can have many participants on the same network segment. Only one be transmitting at a time.
B: Using Full-Duplex only two participants ensures that there can be no collisions. Half-duplex must use
CSMA/CD to handle the collisions.
C: Full-duplex mode is faster than half-duplex.
Incorrect Answers
A: All nodes on a half-duplex Ethernet segment share the same broadcast domain.
D: The opposite is true.
E: The opposite is true.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 164 – 165.
QUESTION NO: 27
What is the network address for a host with the IP address 123.200.8.68/28?
A. 123.200.8.0
B. 1231.200.8.32
C. 123.200.8.64
D. 123.200.8.65
E. 123.200.8.31
F. 123.200.8.1
Answer: C
Explanation: In a network with 28 network bits only the last four bits are used for the hosts. We write the 4th
octet in binary:
68 decimal = 01000100 binary (64+4)
We have to clear all host bits:
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 24 -
01000000 binary = 64 decimal
The network part is 123.200.8.64.
Incorrect Answers:
A. For the network to be represented as 123.200.8 then the IP address would need a /24 at the end. In this case
/28 was used.
B, D, E, and F. In these cases with the IP address provided these options are impossible.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 227 – 232.
QUESTION NO: 28
How does a layer two device such as a bridge or switch function?
A. It maintains a table of the IP address of the host connected to its internet segment
B. It passes packets outside of its network segment if its IP address cannot be found on its table.
C. It looks up the frames destination in its address table and sends the frame towards the destination.
D. It maintains the table of the data link layer and network layer addresses for the host connected to its
network segment.
Answer: C.
Explanation:
A transparent bridge stores information in memory in what is called a “forwarding table”. The forwarding table
lists each end station (from which the bridge has heard a frame within a particular time period) and the segment
on which it resides. When a bridge hears a frame on the network, it views the destination address and compares
it to the forwarding table to determine whether to filter, flood or copy the frame into another segment.
Incorrect Answers:
A: The forwarding table does not contain a list of IP address. Rather it contains a list of devices that it is
connect to and on which segment each device resides.
B: If the destination device is unknown to the bridge, the bridge forwards the frame to all segments except the
one on which it was received. This process is known as flooding.
D: The device maintains a list of the data link layer addresses for host connected to its network segment.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 22.
QUESTION NO: 29
Which of the following are reasons to use VLANs? (Choose three.)
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 25 -
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They enhance network security.
D. They increase the size of broadcast domains while decreasing the number of broadcast domains.
E. They increase the number of broadcasts domain while decreasing their size.
F. The simplify switch administration.
Answer: B, C, E
Explanation:
B: Users can logically be grouped into VLAN.
C: By grouping users into different VLANs, a secure VLAN can be created. Only some users could be allowed
to access the secure VLAN. This improves security.
E: Each separate VLAN is a separate broadcast domain. Creating VLAN increase the number of broadcast
domains and decrease the size of each broadcast domain.
Incorrect Answers
A: The size of the collision domain decreases by the use of VLANs.
D: The opposite is true.
F: VLANs must be configured so VLANs increase the switch administration.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 179 – 182.
QUESTION NO: 30
You need to segment your network which of the following hardware devices can you use to segment your
network? (Choose three.)
A. Hub
B. Repeater
C. Switch
D. Bridge
E. Router
F. Media converter
Answer: C, D, E
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 26 -
Explanation:
C: A switch is able to segment the network at the data link layer.
D: A bridge is able to segment the network at the data link layer.
E: A router is able to segment the network at the network layer.
Incorrect Answers
A: A hub regenerates and/or redistributes signal and work at physical layer of the OSI model and is unable to
segment the network.
B: A repeater only regenerates the signal and works at physical layer of the OSI model and is unable to
segment the network.
F: Media converter only connects dissimilar media, and connects them into a single segment.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 16 – 17.
QUESTION NO: 31
Your company is concerned about Security on your network. Each department has its own file server
and the company also has an enterprise server that is shared by all departments. The accounting
department is concerned about the accounting information being accessible from the other departments.
What can you as the network administrator use to control the information so that it’s not being passed
between the departments?
A. Bridge between management and sites.
B. Routers to provide the most secure segmentation.
C. A hub to provide the ease of management and a satisfactory alternative for the network security.
D. An Ethernet switch to secure separation through programming the access list of each port of the switch.
Answer: B.
Explanation:
Routers provide better separation, dividing the segments into both separate collision and broadcast domains, and
provide access lists for controlling security.
Incorrect Answers:
A, C, D: Are Layer 2 devices, which breaks up the collision domains, but is still one broadcast domain. Security
and filtering within these devices are primitive (although switching is a little more advanced). Any filtering that
can be done at layer 2 is primitive and requires a lot of administrative effort.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 18-28.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 27 -
QUESTION NO: 32
What are the advantages of using the OSI layered network model? (Choose three.)
A. Allows multiple-vendor development through standardization of network components.
B. Creates a list of communication rules that all companies must implement to get onto the Internet.
C. Allows various types of network hardware and software to communicate.
D. Prevents changes in one layer from affecting other layers, so it does not hamper development.
E. Allows companies to develop proprietary interfaces.
Answer: A, C, D
Explanation:
A: The OSI model promotes standardization.
C: The layered approach allows various types of network hardware and software to communicate.
D: Each layer should be a separate black box. A change in one layer would not impact other layers.
Incorrect Answers
B: The OSI model does not contain standardization of applications in this way.
E: Proprietary interfaces do not fit within the OSI model.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 11.
QUESTION NO: 33
You have a leased line configured at a small office that connects to the corporate office. You company
would also like to have a backup incase the lease line goes down. Which WAN service would you most
likely choose to backup the leased line?
A. Frame relay with SVC
B. Dedicated serial line
C. ISDN with DDR
D. ATM
Answer: C
Explanation: ISDN is a low-cost backup solution that only is used when it is needed. DDR (dial-on-demand)
dials up the remote site when traffic needs to be transmitted.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 28 -
Incorrect Answers
A: Frame Relay is a high-performance solution and would be a costly backup solution.
B: There is no need to use a dedicated connection. We only need to use the connection if the main line goes
down.
D: ATM is a high-performance solution and would be a costly backup.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 368 – 373 and 387 –389.
QUESTION NO: 34
What was one of the most important reasons the International Organization for Standardization released
the OSI model?
A. Users could access network server faster.
B. Different vendor’s networks could work with each other.
C. The industry could create a standard for how computers work.
D. The network administrator could increase the overall speed of their network.
Answer: B.
Explanation:
The ISO model separated the various functions so that a vendor did not have to write an entire stack. One
vendor could write device drivers for their device, and not worry about higher layers, and the work can be
contained and modularized. This also speeds up the process of bringing a product to market, as it minimizes
code that a vendor needs to write.
Incorrect Answers:
A: The ISO model does not make things faster; overall they might slow things down a bit because of the
overhead of passing data through the layers.
C: This ISO model is for networking, not computer functions.
D: The ISO model does not provide any speed boost.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10-12.
QUESTION NO: 35
Which channels are used by ISDN BRI?
A. 2d+b
B. 23d+b
C. 2b+d
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 29 -
D. 23b+d
Answer: C
Explanation: ISDN BRI has two Bearer Channels (B) and a Signaling channel (D).
Reference: Cisco CCNA Exam #640-607 Certification Guide. (Cisco Press: 2002) page 549.
QUESTION NO: 36
Access-list 122 permit ip 131.107.30.0 0.0.0.255 any
You apply the access-list above. Which is the effect?
A. Permit all packets matching the first three octets of the source address to all destinations.
B. Permit all packets matching the last of the destination address and accept all source address.
C. Permit all packets from the third subnet of the network address to all destinations.
D. Permit all packets matching the host bits in the source address to all destinations.
E. Permit all packets to destination matching the first three octets in the destination address.
Answer: A
Explanation: This is an extended access list that permits source packets matching the first three octets of the
131.107.30.0 address. Furthermore, the any keyword specifies that all destinations will be accepted.
Note: Syntax for an extended access list
access-list access-list-number {deny | permit} protocol source source-wildcard destination destinationwildcard
[precedence precedence] [tos tos]
Incorrect Answers
B: The source-wildcard is specified first before the destination wildcard.
C: All source addresses matching the first three octets of 131.107.30.0 will be permitted.
D: The mask used in access-list does not work as a subnet masks. A 0.0.0.255 access-list mask matches the first
three octets, not the last “host” octet.
E: The first three octets in the source, not destination, address must match. All destination addresses are
allowed with the any keyword.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 30 -
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304 – 306.
QUESTION NO: 37
Using a class C address range 192.168.21.12 your network needs twenty-eight subnets. Which subnet
mask should you use?
A. 255.255.0.28
B. 255.255.255.0
C. 255.255.255.28
D. 255.255.255.248
E. 255.255.255.252
Answer: D
Explanation: We need to expand the class C subnet mask, and based on the calculation above, the last octet is
divided into 5 bits network, 3 bits host, which is 248.
By using 5 bits of subnetting for the network subnet, you leave 3 bits for hosts.
128 64 32 16 8 4 2 1
x x x x x 5 bits of subnetting for network
x x x 3 bits of subnetting for host
So, the value is 128+64+32+16+8 = 248
A quick way to determine the required subnet mask for Class C addresses you can also use the table below:
(Please note: in this case as you need 28 subnets you need to use the 255.255.255.248 subnet. Always pick the
subnet mask that supports your requirements. This may mean you waste subnets and hosts but you will meet
your requirements.)
NUMBER OF BITS SUBNETMASK NUMBER OF
SUBNETS
NUMBER OF
HOSTS
2 255.255.255.192 2 62
3 255.255.255.224 6 30
4 255.255.255.240 14 14
5 255.255.255.248 30 6
6 255.255.255.252 62 2
Incorrect Answers:
A and C: It is not even a valid subnet mask, a valid subnet mask is a continuous string of one bits, then
followed by a continuous string of zero bits. Answer A and C both break this rule.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 31 -
B: This is a full Class C subnet mask, and only provides for ONE network, and we need 28.
E: This gives us 6 bits of network, and the problem calls for 5.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 228 – 236.
QUESTION NO: 38
Cisco supports three types of switching modes on switches. Which mode of switching can have a variable
latency through the switch?
A. Store-and-forward.
B. Cut-through.
C. Fragment-free.
Answer: A
There are 3 primary operating modes that are used for frame switching. These modes are sore-and-forward,
cut-through and fragment free. When store-and-forward is used the switch must receive the whole frame before
it can be forwarded. This makes the latency time variable.
Reference: Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163.
Incorrect answers:
B: During a cut-through operation, the switch forwards the frame once it receives the Destination Address.
This keeps the latency constant.
C: The fragment-free mode reads only the first 64 bytes before forwarding the frame. This makes the latency
time practically constant.
QUESTION NO: 39
Your company has purchased some Cisco routers from an online auction. You need to make a backup
copy of the IOS and store it on a TFTP server. Which of the following should be done prior to copying
the IOS image to a TFTP server? (Choose three.)
A. Make sure that the network server can be accessed.
B. Check that the authentication for access is set.
C. Ensure that the network server has adequate space for the code image.
D. Verify any file naming and path requirements.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 32 -
E. Make sure that the server can load and run the bootstrap code.
Answer: A, C, D
Explanation:
A: The TFTP server must be accessible from the router.
C: The TFTP server must be able to store the IOS image.
D: The file naming convention and the path of the TFTP server must be checked.
Incorrect Answers
B: TFTP does not use authentication.
E: The TFTP server does not have to boot IOS. It can use any operating system with network functionality.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 132 – 134.
QUESTION NO: 40
Which of the following correctly identifies switched and routed data flow?
A. Switches create a single collision domain and a single broadcast domain. Routers provide separate
broadcast domains.
B. Switches create separate collision domains but a single broadcast domain. Routers provide separate
broadcast domains.
C. Switches create a single collision domain and a separate broadcast domain. Router provides a separate
broadcast domain as well.
D. Switches create separate collision domains and separate broadcast domains. Routers provide separate
collision domains.
Answer: B
Explanation:
Switches break up the collision domains, but it is still a single broadcast domain. Routers also create separate
collision domains, but also separate broadcast domains, as routers usually do not pass broadcast traffic.
Incorrect Answers:
A: Switches create multiple collision domains.
C: Switches maintain one broadcast domain, and separate/multiple collision domains.
D: Switches maintain one broadcast domain.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 30-31.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 33 -
QUESTION NO: 41
Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP
and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the
possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.)
A. Link-state advertisement (LSA)
B. Spanning Tree Protocol.
C. Shortest path first tree.
D. Split horizon.
E. Hold-down timers.
Answer: D, E
Explanation: RIP and IGRP are distance vector routing protocols. RIP and IGRP use holddown counters and
split horizon to prevent route looping.
Note: Hold-downs are used to prevent regular update messages from inappropriately reinstating a route that
might have gone bad.
Split horizons derive from the premise that it is never useful to send information about a route back in the
direction from which it came.
Incorrect Answers
A: Link-state routing protocols use LSAs. However, LSAs are not used by distance vector routing protocols
like RIP or IGRP.
B, C: The spanning tree protocol and the shortest path first tree is used by Layer 3 routing protocol such as
Enhanced IGRP or OSPF, not by RIP or IGRP.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 266 – 268.
QUESTION NO: 43
You just finished installing a new operating system on a computer located in the accounting department.
You would like to verify the network configuration from the new computer so you establish FTP
connection to a remote TFTP server. Which layer of the OSI model did you use for this operation?
A. Application
B. Presentation
C. Session
D. Transport
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 34 -
E. Data link
F. Internet
Answer: A
Explanation: The Application layer is the layer at which users use protocols to achieve access to the network.
Using FTP to connect to a TFTP server is an excellent example.
Incorrect Answers
B. The presentation layer is focused on ensuring that data is readable once it has crossed the network.
C. The session layer of the OSI model is responsible for communication. That is, the establishment,
management, and ending of communication.
D. The transport layer is focused on providing the establishment guidelines of communication.
E. The data link layer provides the details on where the data is coming from and where it is going.
F. The internet layer is not a layer of the OSI Model. It is a layer in the TCP/IP model that corresponds to the
network layer of the OSI model.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10 – 18.
QUESTION NO: 44
Match the OSI layer with the appropriate description.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 35 -
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 36 -
Answer:
Explanation: The transport layer assembles the packets into data, and prepares the data for the session layer
above. The Network layer determines the route of moving data. Remember the Network layer is layer 3, and
routers work on layer 3. The network layer includes routing functions, and keep this in mind when the question
says determines the best way to move data. On the data link layer, the actual transmission occurs.
The physical layer does not modify the data and package it, not is involved with addressing and routing, so it
does not apply. The session layer also does not modify data or determine routes or transmit data, so it would not
apply to any of the above.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 12-13.
QUESTION NO: 45
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 37 -
You have installed a new PC to your access layer switch. You have configured the IP address, subnet
mask, default gateway, and DNS settings. You have verified that the information you have entered is
correct and that the proper cable was used however this PC is unable to access devices that are connected
to the same switch. What is the likely cause of this problem?
A. The router lacks a routing table entry for the new host.
B. The host switch port is assigned to the incorrect VLAN.
C. The host MAC address is incorrectly configured.
D. A VTP instance for the new host has not been installed.
Answer: B
Explanation: In order for a host to access a switch the host switch port must be configured for the correct
VLAN. By default VLAN 1 is configured for the ports.
Incorrect Answers
A: Hosts do not need route entries at the router.
C: This would cause this behavior.
D: There is no such ting as VTP instance.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 193 – 198.
QUESTION NO: 46
Cisco supports three different LMI types for Frame Relay. Which of the following are the type LMI
types? (Choose three.)
A. IETF
B. Q931
C. Q933A
D. IEEE
E. CISCO
F. ANSI
Answer: C, E, and F
Explanation: The Supported LMI Types are cisco (the default), ansi, and q933a.
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 38 -
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 415 – 416.
QUESTION NO: 47
Which hardware device enables high-speed data exchange on a LAN?
A. Hub
B. Bridge
C. Switch
D. Repeater
Answer: C
Explanation:
A switch can be used to gain high-speed data transfer between segments, especially when cut through is used.
The internals of the switch are specifically designed for high-speed transfer, even with high volumes.
Incorrect Answers:
A: A hub causes the segment to be shared, and collisions slow down the segment. A hub does not cause
segmentation.
B: A bridge usually separates a small amount of segments and with large amounts of data transfer across the
bridge; the bridge can become a bottleneck.
D: A repeater extends the distance of the segment by amplifying electrical signals, but does not segment the
LAN.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 32-38.
QUESTION NO: 48
To perform password recovery on a Cisco router you have to modify which of the following? (Choose
two.)
A. Nvram
B. Configuration register
C. Boot flash
D. Cmos
E. Flash
Answer: A, B
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 39 -
Explanation: During the password recovery procedure NVRAM and the configuration register are resetted.
Reference: Password Recovery Procedure
http://www.cisco.com/warp/public/474/pswdrec_2500.html
QUESTION NO: 49
You just purchased a brand new Cisco 2621 router. By default when the router boots which search
sequence does it use to locate the IOS software?
A. Flash, TFTP server, ROM
B. NVRAM, TFTP server, ROM
C. ROM, Flash, TFTP server
D. ROM, NVRAM, TFTP server
Answer: A
Explanation: First FLASH is used to load the IOS image. If that fails, the IOS image is loaded from a TFTP
server. It that fails as well then a minimal IOS is loaded from ROM.
Incorrect Answers
B: NVRAM is used to store configuration data, not IOS images.
C, D: Only if there is no IOS image in Flash memory or at FTP server, a basic version of IOS loaded from
ROM.
QUESTION NO: 50
You would like the router to look in NVRAM upon boot up. Which one of the following would be the
correct value for the configuration register?
A. 0x42
B. 0x2102
C. 0x001
D. 0x2101
Answer: B
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 40 -
Explanation: The factory-default setting for the configuration register is 0x2102. This indicates that the router
should attempt to load an IOS image from Flash memory and load the startup configuration. Flash memory is
also known as NVRAM.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 126 – 128.
QUESTION NO: 51
Which of the following are true about connection-oriented network servers? (Choose two.)
A. Non-reliable
B. Reliable
C. Less bandwidth-intensive
D. Handshaking
Answer: B, D
Explanation: Connection orientation connections are considered reliable as they ensure the deliver of data.
This is done through acknowledgements. Further when establishing a communication a three-way handshake is
used.
Incorrect Answers:
A. Connection orientated communication is reliable.
C. Due to the acknowledgements connection orientated communications are very bandwidth intensive.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 – 30.
QUESTION NO: 52
You have been hired as a consultant to troubleshoot the company’s network. You issue the debug ip rip
command to troubleshooting the rip network. You notice your Ethernet interface 10.1.0.0 shuts down.
Which update message is seen in your routers debug ip rip output regarding that network?
A. Subnet 10.1.0.0, metric 0
B. Subnet 10.1.0.0, metric 1
C. Subnet 10.1.0.0, metric 15
D. Subnet 10.1.0.0, metric 16
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 41 -
Answer: D
Explanation: RIP (Routing Information Protocol) is a distance vector protocol. RIP uses hope counts as
metric. The designers of RIP believed that the protocol was unlikely to be practical for networks with a
diameter larger than 15. The maximum hop count is therefore set to 15. In RIP when a network in not reachable
then its metric is changed to 16.
Incorrect Answers:
A: A metric of 0 denotes a directly connected route and indicates that the interface is up,.
B: This metric indicates that the interface is up and that the destination is reached with a hop count of 1.
C: This metric indicates that the interface is up and that the destination is reached with a hop count of 15.
RFC2453, RIP Version 2
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 276 –
278.
QUESTION NO: 53
You have been assigned a class C network address. Your manager has asked to you create 30 subnets
with at least 5 hosts per subnet for the different departments in your organization. What should the
subnet mask be to create 30 subnets?
Answer: 255.255.255.248
Explanation: We need 3 bits for the hosts (2^3-2=6 >; 5). This would provide for 30 subnets (2^5-2=30). A 29-
bit (24 + 5) network mask translates the 4th octet to 248 (=11111000 binary). The network mask used should be
255.255.255.248.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 225 – 226 and 236.
QUESTION NO: 54
Your manager is concerned about security on the subnet 10.0.1.0/24 that has the accounting servers on it.
He would like to make sure users can not telnet to those accounting servers and as asked you to add a
statement to your existing access-list to prevent users from accessing those devices via telnet. Which one
of the following statements should you enter?
A. Access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet
B. Access-list 115 deny tcp any 10.0.1.0 eq telnet
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 42 -
C. Access-list 115 deny udp any 10.0.1.0 eq 23
D. Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23
E. Access-list 15 deny telnet any 10.0.1.0 0.0.0.255 eq 23
Answer: D
Explanation: We must use an extended access list. The correct answer is:
Access-list 115 deny tcp any 10.0.1.0 0.0.0.255 eq 23
115 - the access-list number
deny – the access list denies traffic
any – any source is allowed
10.0.1.0 0.0.0.255 – allows any destination with addressing with the pattern 10.0.1.x
eq 23 – select the telnet port (TCP 23)
Note: Syntax extended access list.
access-list access-list-number [dynamic list-name [timeout value]] {deny | permit} protocol source sourcewildcard
destination destination-wildcard [precedence precedence] [tos tos] [log| log-input]
Incorrect Answers
A: We must specify both source (source + source wildcard) and destination (destination + destination
wildcard). Furthermore the mask is incorrect. The mask cannot be used as a subnet mask.
B, C: No destination wildcard is specified.
E: We cannot specify telnet as protocol. We specify it as a port with the eq 23 (or eq telnet)
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304 – 306.
QUESTION NO: 55
You purchased a router from an online auction and you are unable to login to privileged mode because
the router has been configured with a password. You need to perform password recovery. One of the
first steps in performing password recovery is recording the current configuration register setting from
user mode. What is the command to view the configuration register?
A. Show register.
B. Show flash.
C. Show boot.
D. Show version.
Answer: D
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 43 -
Explanation:
The show versi

论坛徽章:
0
2 [报告]
发表于 2003-08-14 10:50 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

http://www.net130.com/ccna/index.htm
上有PDF版,拿家慢慢看去。

论坛徽章:
0
3 [报告]
发表于 2003-08-14 11:21 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

强烈反对贴BIBLE 到CU 上面 污染环境

论坛徽章:
0
4 [报告]
发表于 2003-10-01 03:49 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

BIBLE是圣经的意思吧? 呵呵!

论坛徽章:
0
5 [报告]
发表于 2003-10-05 11:06 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

强烈推荐north提供的那个net130网站,我认为这是CCNA有关资料中最新最全的一个网站,谢谢你了!!

论坛徽章:
0
6 [报告]
发表于 2003-10-06 15:08 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

这个也不错的,大家如果有什么好东西,通知一下!

论坛徽章:
0
7 [报告]
发表于 2003-10-11 21:52 |只看该作者

640-607 CCNA3.0 TESTKING 15.0 QA

[quote]原帖由 "lgyyuuki"]强烈推荐north提供的那个net130网站,我认为这是CCNA有关资料中最新最全的一个网站,谢谢你了!![/quote 发表:


其实我有好多,不比那边的少!哈哈!!
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP