Site hosted by Angelfire.com: Build your free website today!

Semester 3 Final Exam

Question 1:
Which device is one of the most common Layer 2 devices?

A.   LAN switch
B.   Active hub
C.   Passive hub
D.   Router


Question 2:
What is used to alleviate congestion?

A.   Install more hubs
B.   Use an extended star
C.   Use a bus topology
D.   Increase the bandwidth


Question 3:
Which type of access list would permit or deny part of a protocol suite?

A.   Standard
B.   General
C.   Specific
D.   Extended


Question 4:
Which IPX routing command is used to show the number and type of packets received and transmitted by the router?

A.   show ipx servers
B.   show ipx route
C.   show ipx traffic
D.   show ipx interface


Question 5:
Which metrics does Novell RIP use?

A.   Bandwidth and delay
B.   Ticks and hop count
C.   Distance and cost
D.   Size and throughput


Question 6:
At which Layer of the OSI model would you classify the loss of network connectivity due to a loose patch cable?

A.   Layer 7
B.   Layer 5
C.   Layer 3
D.   Layer 1


Question 7:
Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)?

A.   RIP
B.   IGRP
C.   OSPF
D.   EIGRP


Question 8:
What describes the time necessary to move a packet from the data link layer to the physical layer?

A.   Packet delay
B.   Transmission time
C.   Convergence
D.   Queuing


Question 9:
What protocol is used to allow redundant paths in a switched/bridged network?

A.   RIP
B.   Spanning Tree
C.   IGRP
D.   ISL


Question 10:
What is a benefit of using VLANs?

A.   Extended collision domains
B.   Increased administration
C.   Multiple cable runs
D.   Tighter network security


Question 11:
What is your first step in the troubleshooting process?

A.   Analyze data
B.   Undo previous network changes
C.   Gather data
D.   Ignore the call


Question 12:
What is correct regarding the node number using Novell's IPX addressing scheme?

A.   80 bits long
B.   Written in decimal
C.   Same as the MAC address
D.   Number assigned by an administrator


Question 13:
What does the split horizon rule help prevent?

A.   Static routes
B.   Routing loops
C.   Dynamic routes
D.   Large ARP tables


Question 14:
Internetwork design seeks to provide the greatest availability for the least _________.

A.   design time
B.   cost
C.   network downtime
D.   installation time


Question 15:
How often are RIP updates broadcast?

A.   Every 15 seconds
B.   Every 30 seconds
C.   Every 60 seconds
D.   Every 90 seconds

Question 16:
Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?

A.   0.0.0.32
B.   0.0.0.63
C.   0.0.63.255
D.   0.0.0.31


Question 17:
Which backup type does NOT reset the archive bit and stores all files that have been created and modified since the last full backup?

A.   Hierarchical
B.   Differential
C.   Copy
D.   Daily


Question 18:
What is the recommended maximum number of users in a peer-to-peer network?

A.   5
B.   10
C.   15
D.   20


Question 19:
A peer-to-peer network is also known as what type of network?

A.   Client-server
B.   Thin client
C.   Workgroup
D.   Home office


Question 20:
Which of the following is another term for shortest path first routing algorithm?

A.   Source bridging
B.   Store-and-forward
C.   Distance-vector
D.   Link state


Question 21:
Which OSI layer is responsible for finding the best path through the internetwork?

A.   1
B.   2
C.   3
D.   4


Question 22:
Switches that receive the entire frame before sending it, use what type of frame forwarding?

A.   Cut-through
B.   Receive and send
C.   Copy and send
D.   Store-and-forward


Question 23:
Which represents the time it takes a frame to travel from its source station to its final destination on the network?

A.   Hop count
B.   Bits per second
C.   Latency
D.   Tick time


Question 24:
Which of the following is used to keep a list of equipment repairs?

A.   Security record
B.   Software record
C.   Maintenance record
D.   Policy record


Question 25:
Which command will test the loopback function on the NIC?

A.   Ping 127.0.0.1
B.   Telnet 127.0.0.1
C.   Ping 127.0.0.0
D.   Telnet 127.0.0.0


Question 26:
Which of the following devices establishes a bandwidth domain also known as the collision domain?

A.   Repeater
B.   Switch
C.   Active hub
D.   Passive hub


Question 27:
What is the encapsulation type on a router for a Novell network running version 3.12?

A.   Novell-ether
B.   ARPA
C.   SNAP
D.   SAP


Question 28:
Which Layer of the OSI model is concerned with the topology of a network?

A.   Transport
B.   Network
C.   Data Link
D.   Physical


Question 29:
Which of the following refers to the data capacity of a link?

A.   Bandwidth
B.   Reliability
C.   Hop Count
D.   Delay


Question 30:
What allows a router to accept a packet on one interface and forward it to another interface?

A.   Broadcast forwarding
B.   Switching function
C.   Filter and control function
D.   Path determination

Question 31:
What would the wildcard mask be to deny traffic only on network 195.67.52.0?

A.   0.0.255.255
B.   255.255.255.0
C.   0.0.0.255
D.   255.255.0.0


Question 32:
Select the correct IOS command for configuring IGRP as the routing protocol.

A.   Router#router igrp 100
B.   Router(config-router)>router igrp 100
C.   Router(config)#router igrp 100
D.   Router(config-if)#set router igrp 100


Question 33:
Entries made by an administrator to manipulate a routing table are referred to as which of the following?

A.   Static routes
B.   Dynamic routes
C.   ARP tables
D.   Routing tables


Question 34:
What is a VLAN used to create?

A.   Autonomous systems
B.   Broadcast domains
C.   Network Sectors
D.   Virtual sections


Question 35:
At what time interval does IGRP send routing updates?

A.   120 seconds
B.   30 seconds
C.   60 seconds
D.   90 seconds


Question 36:
Which type of route is used when no other routes are known to the destination?

A.   Static
B.   Default
C.   Dynamic
D.   Next available


Question 37:
A wildcard mask bit of "0" means that the corresponding bit must be _________.

A.   matched
B.   ignored
C.   deleted
D.   passed


Question 38:
Which of the following are used with VLANs to tighten network security?

A.   Access control lists
B.   Frame tagging
C.   Source-bridging
D.   ARP tables


Question 39:
A numbered access list in the range of 800-899 would be what type of access list?

A.   IPX standard
B.   Appletalk
C.   IP standard
D.   IP extended


Question 40:
What is the term used when ports on a switch are administratively assigned to a VLAN?

A.   Dynamic
B.   Static
C.   Default
D.   Polled


Question 41:
The star/extended star topology uses what type of standard?

A.   Token ring
B.   Ethernet 802.3
C.   Ethernet 802.5
D.   ARCNET


Question 42:
What happens to a packet that does not match any of the tests in an access list?

A.   It is discarded.
B.   It is sent to the recipient.
C.   It is stored until the access list is updated.
D.   It is returned to the sender.


Question 43:
In an access list, what word can replace 0.0.0.0 255.255.255.255?

A.   Permit
B.   Accept
C.   Any
D.   All


Question 44:
What is the first step in LAN design?

A.   Establish the design goals
B.   Estimate the design cost
C.   Determine the network users
D.   Determine the physical size


Question 45:
A switch segments a LAN into which of the following?

A.   Microsegments
B.   Workgroups
C.   Broadcast domains
D.   Access groups

Question 46:
Where should workgroup servers be placed?

A.   MDF
B.   POP
C.   VCC
D.   IDF


Question 47:
How are link-state routing updates triggered?

A.   By timers
B.   By topology changes
C.   By protocol changes
D.   By changing the NIC


Question 48:
What effect does upgrading to a bridge from a hub have on latency of the network?

A.   Decreases it
B.   No effect
C.   Eliminates it
D.   Increases it


Question 49:
At which Layer of the OSI model would flow control problems exist?

A.   Application
B.   Presentation
C.   Session
D.   Transport


Question 50:
Which OSI layer does a router use to make its forwarding decisions?

A.   1
B.   2
C.   3
D.   4


Question 51:
What is the maximum size of an IPX network number?

A.   Eight binary digits
B.   Eight hexadecimal digits
C.   Eight decimal digits
D.   Eight octal digits


Question 52:
Where should extended access lists be placed?

A.   Close to the source
B.   Close to the destination
C.   On any router in the network
D.   Midway between source and destination


Question 53:
Which routing protocol is used to communicate between autonomous systems?

A.   RIP
B.   Ethernet
C.   Token Ring
D.   Exterior routing protocols


Question 54:
What is the term used when switch ports are automatically assigned to a VLAN?

A.   Dynamic
B.   Static
C.   Port-centric
D.   Default


Question 55:
What is the effect of a switch on bandwidth?

A.   Dedicates bandwidth
B.   Shares bandwidth
C.   Decreases bandwidth
D.   Eliminates bandwidth


Question 56:
Which metric is used in RIP?

A.   Bandwidth
B.   Delay
C.   Hop count
D.   Traffic load


Question 57:
What do routers use to maintain tables?

A.   Broadcast forwarding
B.   IP Tunneling
C.   Routed protocols
D.   Routing protocols


Question 58:
What routing protocol does Novell use?

A.   Novell IGRP
B.   NOvell RIP
C.   Novell EIGRP
D.   Novell IPX


Question 59:
Which configuration command is used to set the number of routes used for load sharing?

A.   ipx routing
B.   ipx networks
C.   ipx maximum-paths
D.   router rip