Create an account
Both the switches and hubs are being utilized within the CK network. Which of the following is true regarding the use of switches and hubs for the network connectivity in this network?
Switches increase the number of collision domains in the network.
Which one of the following characterisitcs is true regardigin the use of the hubs and switches?
Switches increase the number of collision domains in the network.
When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements?
A switch is a multiport bridge and Bridges and switches learn Mac addresses by examining the source MAC address of each frame received.
Which of the following correctly describe the various functions and virtues of a router?
Packet switching, Packet filtering and Internetwork communication.
The LAN needs are expanding at the CK corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the CK network. Which of the following are layer 1 devices that you can use?
A hub and A repeater.
Cisco is the leader in the router market space. What basic functions do their routers perform in a network?
Path selections and Packet switching.
Both bridges are switches are being used throughout the CK LAN. Which of the following statements are true regarding bridges and switches in this network?
Switches usually have a higher number of ports then most bridges, Both bridges and switches forward Layer 2 broadcasts and Both bridges and switches make forwarding decisions based on Layer 2 addresses.
As a network Admin, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of the devices in a WAN?
A CSU/DSU terminates a digital local loop, A modem terminates an analog local loop, A router is commonly considered a DTE device.
The CK network administrator needs to determine what LAN devices to install on the CK network. What are two advantages of using Layer 2 Ethernet switches over hubs?
Allowing simultaneous frame transmissions and filtering frames based on MAC addresses
CDP is being used trhoughout the CK network. What are two reasons why the CK network administrator would use CDP?
To obtain the IP address of a connected device in order to telnet to the device, To verify Layer 2 connectivity between two devices when Layer 3 fails.
CDP is running between two CK devices. What information is supplied by CDP?
Device Identifiers, Capabilities list, Platform
Two buildings on the London campus of a CK corporation must be connected to use Ethernet with a bandwidth of at least 100 Mbps. CK is concerned about possible problems from voltage potential differences between the two buldings. Which media type should be used from connections?
Fiber optic cable.
As a CCNA candidate, you must know the various layers of the OSI model. At which layers of the OSI model do Wide Area Networks operate in?
Physical Layer and Datalink Layer
While troubleshooting a connectivity problem on the network, you issure the ping command from your PC command prompt, but the output shows "request times out" At which OSI layer is this problem associated with?
The network layer
You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operations?
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first effected by this configuration error?
Which layer of the OSI reference model is responsible for ensuring reliable end to end delivery of data?
At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?
Which OSI layer is associated with the following: The acknowledgment of transmissions, sequencing, and flow control across a network?
Which OSI layer header contains the address of a destination host that is on another network?
Which of the following correctly describe steps in the OSI date encapsulation process?
The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
when files are transferred between a host and an FTP server, the data is divided into smaller pieces of transmission. As these pieces arrive at the destination host they must be reassembled to reconstruct the original file. What provides for the reassembly of these pieces into the correct order?
The sequence number in the TCP header.
Network equipment supporting the use of flow control mechanisms has been recently installed in the CK network. What is the purpose of flow control in a data network?
It provides a mechanism for the receiver to control the transmission speed
You have just installed a new web server on the Certkiller network. You are required to ensure that the web server is accessible from the Internet. The network uses private addressing, so and IP-to-registered address mapping is required. To do this, you entered the following command: CK(config)# ip nat inside source static 192.168.2.1 198.18.1.254 You unsuccessfully try to ping the Internet from the PC host on the LAN. During the troubleshooting process, you enter the "show ip nat translations" command but the output is blank. What is the most likely cause of the problem?
The interfaces must be configured for NAT.
As a CCNA candidate, you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model?
Telnet and FTP
As the Certkiller network administrator, you are required to have a firmunderstanding of the OSI model. Why does the data communication industry use the layered OSI reference model?
It encourages industry standardization by defining what functions occur at each layer of the model and It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshooting
You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network?
Congestion avoidance, Windowing and Buffering
Acknowledgements, sequencing, and flow control are functions that are handled by which layer of the OSI model?
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Decrease the window size.
You have set up an Internet based FTP server, where people can upload and download files. In terms of the OSI model, what is the highest layer used during the FTP sessions.
ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets?
They can provide hosts with information about network problems. and They are encapsulated within IP datagrams.
Although TCP segments are similar to UDP segments, TCP packets contains some additional fields. Which of the following are found in a TCP header, but not in a UDP header?
Sequence number, Window size, and Acknowledgment number
Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device?
VLAN and Swtich
The corporate head office of Certkiller has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence, what will happen?
UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?
Certkiller B > trace
You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?
show cdp neighbor detail
A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the show cdp neighbors command. In which OSI layer is the problem most likely occurring?
While troubleshooting a network connectivity problem, a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?
The network layer
Which line from the output of the show ip interface command indicates that there is a Layer 1 problem?
Serial0/1 is down, line protocol is down
At which layer of the OSI model does the protocol that provides the information displayed by the "show cdp neighbors" command operate?
Which three of the protocols below belong to the application layer? (Select three answer choices)
HTTPS, SMTP, and TFTP
You want to upgrade the Certkiller LAN so that all ports operate in full duplex mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet?
Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth
What are two characteristics of "store and forward" switching?
The switch receives the complete frame before beginning to forward it. and Latency through the switch varies with frame length
Split horizon has been enabled within the Certkiller routed network. Which one of the following statements best explains the split horizon rule?
Information about a route should never be sent back in the direction from which the original update came.
Which of the following commands would be applied to a WAN interface, but not on LAN Interface?
encapsulations PPP and authentication CHAP
What kind of cable should be used to establish a trunked line between two Catalyst switches?
A cross-over cable
Assuming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?
The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?
Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Which of the following can lead to the contribution of LAN traffic congestion?
Too many hosts in a broadcast domain, Broadcast storms and Low bandwidth
On a half-duplex Ethernet LAN, two hosts attempt to send data simultaneously, resulting in a collision. Following this collision, what will the hosts do?
An electrical pulse indicates that the collision has cleared.
Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?
Half-duplex Ethernet uses a loopback circuit to detect collisions. and Full-duplex Ethernet makes use of two pairs of wires for data.
Why is full-duplex Ethernet superior to its single-duplex counterpart?
It operates without collisions and It provides faster data transfer
When you compare the differences between half-duplex and full-duplex Ethernet, which of the following characteristics are exclusive to half-duplex?
Half-duplex Ethernet operates in a shared collision domain. and Half-duplex Ethernet has lower effective throughput.
Two stations on the Certkiller LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network?
A jam signal informs all devices that a collision occurred., The devices that are involved in the collision stops transmitting for a short time. and The collision invokes a random back-off algorithm.
With regard to Ethernet media access methods, which of the following are true?
A device listens and waits until the media is not busy before transmitting. and All devices on an Ethernet segment see data that passes on the network medium.
Which two statements describe the operation of the CSMA/CD access method, which is in use on the Certkiller network?
In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. and After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Which three statements are true about the operation of a full-duplex Ethernet network, which is being used in the Certkiller LAN?
The host network card and the switch port must be capable of operating in full-duplex mode., There are no collisions in full-duplex mode. and A dedicated switch port is required for each full-duplex node.
The Certkiller network administrator wants to use a router named CK1 to segment the local network. What are some of the advantages of using CK1 to segment the network? (Choose two)
Filtering can occur based on Layer 3 information and Broadcasts are not forwarded across the router
Which of the following devices can the Certkiller network administrator use to segment the LAN?
Switches, Bridges, and Routers
The Certkiller corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?
It will prevent segment 1's broadcasts from getting to segment 2.
You want to influence the root bridge selection within the Certkiller LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)
MAC Address and Bridge Priority
A Certkiller Ethernet switch receives a unicast frame with a destination MAC that IS listed in the switch table. What will this switch do with the frame?
The switch will forward the frame to a specific port
In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
In an improperly implemented redundant topology
The Certkiller network administrator needs to a switch named CK1 to become the root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge?
Configure the switch so that it has lower priority than other switches in the network
CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast address?
A broadcast address will never be the source address of a frame
The system LED is amber on a new Certkiller Catalyst 2950 series switch. What does this indicate?
The system is malfunctioning.
Some of the older Certkiller switches store the entire frame before forwarding it to the destination. What are two effects on network performance of configuring a switch to do this?
Increased latency and Filtering of all frame errors
As a Certkiller trainee you are required to set the default gateway on a Cisco switch to the IP address of 192.168.1.115. Which IOS command should you use?
CertK Switch(config)# ip default-gateway 192.168.1.115
You need to perform some initial configuration tasks on a new Certkiller switch. What is the purpose of assigning an IP address to a switch?
To allow remote management of the switch.
You need to perform some initial configuration tasks on a new Certkiller switch. What are the possible trunking modes for this switch port?
Auto, On, and Desirable
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location?
The switch must be reachable through a port connected to its management VLAN. and The switch must be configured with an IP address, subnet mask, and default gateway.
While troubleshooting a connectivity problem, the Certkiller network administrator notices that a port status LED on a Cisco Catalyst Series switch is alternating between green and amber. Which condition could this indicate?
The port is experiencing errors
You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the routers. Which router commands will allow you to find the ip address associated with each MAC address?
show arp and Show interface
The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?
ARP and ICMP
While troubleshooting an issue in the Certkiller LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?
This is an Ethernet port operating at half duplex
When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?
Auto, Desirable, and On
Which of following VLAN frame encapsulation types are configurable on a Cisco switch?
802.1Q and ISL
Certkiller users have noticed extremely slow network performance, intermittent connectivity, and connection losses. After entering the "show interfaces" command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?
You are experiencing intermittent issues relating to congestion within the Certkiller network. What are the possible causes of congestion on this LAN?
A broadcast domain with too many hosts, Broadcast storms, and Low bandwidth
You need to configure two Certkiller switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?
Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
VTP will allow switches to share VLAN configuration information
A Certkiller switch is configured with all ports assigned to VLAN 2. In addition, all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?
An additional broadcast domain will be created.
A new switch is installed in the Certkiller network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in order for this to occur?
The switch that will share the VLAN information must be in the VTP Server mode. ,The switches must be in the same VTP domain., The switches must be configured to use the same STP version. and The switches must be connected over VLAN trunks.
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge?
Configure the switch so that it has a lower priority than other switches in the network.
Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network?
By default, which of the following factors determines the spanning-tree path cost?
It is the sum of the costs based on bandwidth
What is the purpose of the spanning-tree algorithm in a switched LAN?
To prevent switching loops in networks with redundant switched paths.
Which two of the following values does STP take into consideration when it elects the root bridge?
The Bridgeg ID and The bridge priority
What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged?
All switch and bridge ports are in either the forwarding or blocking state.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together