CertCities.com -- The Ultimate Site for Certified IT Professionals
Visit CertCities.com Forums and Ost Your Mind Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Friday: April 4, 2014


Cisco Exam #640-801: CCNA (MeasureUp, set 3)
Test your basic networking knowledge for Cisco's entry-level certification exam with these 10 questions and answers.


courtesy of   MeasureUp

Question:
1. What statement about the IP address 0.10.10.10 is most correct?

a. This is a Class A address.

b. This is a reserved private address.

c. It is a special Class A address that indicates "this route" in a routing table.

d. This is not a legal address.

e. This address can only be used for a network that is not exposed to the Internet.

···> read answer

2. Which of the following statements are true as they relate to the following configuration line? (Choose two.)

frame-relay lmi-type cisco

a. This line is not necessary.

b. The next hop address LMI type is autosensed.

c. The next hop address must not use LMI-type ANSI.

d. The command is incomplete.

e. The Frame Relay DLCI need not be configured.

···> read answer

3. When are the files stored in NVRAM transferred to RAM? (Choose two.)

a. Whenever the router is booted

b. Whenever the command "copy start run" is executed

c. Whenever the command "copy run start" is executed

d. Whenever the command "show startup-config" is executed

e. Whenever the command "show running-config" is executed

···> read answer

4. Which statement about the command configuration below is true?

switch(config)#line console 0
switch(config-line)#login
switch(config-line)#password cisco

a. These commands assign the password "cisco" for telnet users.

b. These commands set the password "cisco" to enter privileged mode.

c. The administrator forgot to put in the login name.

d. This configuration will only allow Telnet into console 0.

e. The console password is being set.

···> read answer

5. You are tasked with configuring a Cisco router. To configure Open Shortest Path (OSPF) you need to know the subnets of attached interfaces. What is the subnet on which host 165.20.90.90/20 resides?

a. 165.20.0.0

b. 165.20.90.0

c. 165.20.80.0

d. 165.20.64.0

e. 165.24.88. 0

···> read answer

6. Given the following dialog, what is the most logical command that the user should use next to get assistance?

Router_B#show art
^
% Invalid input detected at '^' marker.

a. ?

b. show ar ?

c. show arp

d. show ar?

e. Cannot be determined

···> read answer

7. What commands will list all protocols that are currently being routed? (Choose all that apply.)

a. show ip protocol

b. show protocol

c. show run

d. show start

···> read answer

8. Where is the power-on diagnostics for the router stored?

a. In Flash memory

b. In RAM

c. In ROM

d. In ROM or Flash memory

e. In NVRAM

···> read answer

9. How can a switch best be described?

a. It's a multi-port bridge.

b. It's a simple router.

c. It's an active hub.

d. It's a concentrator.

e. It's a passive hub.

···> read answer

10. What best describes the TCP "three way handshake"?

a. SYN - ACK SYN - ACK

b. SYN - SYN ACK - ACK

c. ACK - ACK SYN - FIN

d. SYN - ACK - FIN

···> read answer

1. Answer D is correct. The address is illegal because it has a value of zero (0) in the first octet. The class of an IP address is determined by the value of the first octet.

First Octet Rules:

  • If the first bit is 0, it's a Class A address.
  • If the first two bits are 10, it's a Class B address.
  • If the first three bits are 110 and the value is less than 224, it's a class C address.
  • No address can have a value of zero (0) in the first octet.
  • The address of 127 will be reserved for loopback addresses.
  • Addresses with a value of 10 will be reserved for private use.

The above rules provide the following ranges:

  • Class A 1 - 126
  • Class B 128 - 191
  • Class C 192 - 223

Refer to the following attempt to assign the above illegal address:

Router_C>en
Router_C#config t

Enter configuration commands, one per line:

End with CNTL/Z.
Router_C(config)#int e0

Router_C(config-if)#ip address 0.10.10.10 ...
255.255.255.0
Not a valid host address - 0.10.10.10
Router_C(config-if)#


2. Answers A and B are correct. Local Management Interface (LMI) is the protocol used between Frame Relay Data Terminal Equipment (DTE) and Data Communications Equipment (DCE) to manage a connection. The LMI type is only locally significant. LMI is communication between the local router and the local frame relay switch. The remote router and the remote frame relay switch can use different LMI types.

Three LMI protocol types are available in Cisco IOS software: Cisco, International Telecommunications Union (ITU) (q933a), and American National Standards Institute (ANSI). Each LMI option is slightly different and therefore is incompatible with the other two. As long as both the DTE and DCE on each end of an access link use the same LMI standard, LMI works fine.

This line is unnecessary since the LMI type cisco is the default and sets the LMI type to autosensed. If the LMI is autosensed, either "cisco", "ansi", or "q933a" can be used on the other end of the link. This command is not incomplete and the Data Link Connection Identifier (DLCI) for the interface must still be configured.

The following configuration shows a switch between a network using two different LMI types:

Current configuration: !
version 11.3
no service password-encryption
!
hostname Router_B
!
enable secret 5 $1$eZ3D$vnTjKaCLtbSCcMF1mGzZm0
enable password cnaprep
!
frame-relay switching
isdn switch-type ntt
!
interface Serial0
no ip address
no ip mroute-cache
shutdown
no fair-queue
clockrate 4000000
!
interface Serial1
encapsulation frame-relay
no ip mroute-cache
keepalive 15
clockrate 2000000
frame-relay lmi-type ansi
frame-relay intf-type dce
frame-relay route 100 interface Serial2 200
!
interface Serial2
encapsulation frame-relay
frame-relay lmi-type cisco
no ip mroute-cache
keepalive 15
clockrate 115200
frame-relay intf-type dce
frame-relay route 200 interface Serial1 100


3. Answers A and B are correct. When you boot the router, the startup-configuration file, which is stored in non-volatile random access memory (NVRAM), is moved to random access memory (RAM). Of course, you could manually move it to RAM using the "copy start run" command.

The "copy run start" command will take the currently running-config and write it to the startup-config file. This is normally done after configuring the router with the desired settings. To save the settings, copy the contents of running-config to startup-config before shutting down the router or the settings will be lost.

Any command that has "show" in its command is a passive command that will only allow you to list or view information. "Show startup-config" displays the content of the startup-configuration used during bootup.

"Show running-config" displays the settings presently being used by the router.


4. Answer E is correct. The configuration example above is correct for setting a password to the console port.

Cisco switches use an Internetwork Operating System (IOS) for configuration very similar to the one that is used on routers. The only differences are in the choices for each command.

There are several ways to control access to a Cisco switch. You can password protect access via the console and via a Telnet session. After passing these login passwords, you will be in User mode with very limited access to the switch configuration. Two password options can be used to access Privileged mode, where more powerful commands can be entered. The "enable password" command will establish the password needed to enter privileged EXEC mode. It is a clear text password and is not considered very secure. The "enable secret" command can be used to create an encrypted password. Both control access to privileged mode. There are no login names used in the Cisco IOS.

The command "login" tells the router to display a login prompt when attempting to login.

The command "password cisco" sets the console login password to "cisco".

You would configure the login for Telnet sessions by first entering "vty 0 15".

You cannot Telnet to the console port. It requires a direct connection using terminal emulation software such as Windows HyperTerminal.


5. Answer C is correct. The IP address given, 165.20.90.90/20, is a Class B network which has a default subnet mask of 255.255.0.0. The subnet mask used in this problem is 255.255.240.0, which means that you have 20 network bits (/20) total and 12 host bits. Therefore, four bits in the third octet are used for subnetting.

If you converted this subnet mask to binary, you would have the following pattern:

11111111.11111111.11110000.00000000

To determine the number of subnets, use the 2^N-2 formula on the number of subnet bits (4). This yields:

16 - 2 = 14 networks (subnets)

To calculate the range of host addresses per network, use the 2^N-2 formula on the number of host bits (12). This yields:

4096- 2 = 4094 (hosts per subnet)

Use the following table to determine what the available IP addresses are:

128 064 032 016 008 004 002 001
128 192 224 240 248 252 254 255

Notice that this table is built by first writing the number one (001) starting at the right margin, then doubling it successively from right to
left like this, 1, 2, 4, 8, 16, 32, 64, 128. Next, starting from the left, add the number in the top row to the previous number in the bottom row like this: 128, 128 + 64 = 192, 192 + 32 = 224, 224 + 16 = 240, 240 + 8 = 248, 248 + 4 = 252, 252 + 2 = 254, 254 + 1 = 255.

Using this table, find the subnet mask number you are working with in the lower row. In this case you are using the 240 from the third octet. Take the number directly above the 240, which is 16, and this is the incremental value of the subnet numbers in the associated octet (the third octet in this case).This means that the subnet numbers begin with 165.20.0.0 and increment by 16 in the third octet for a total of 6 subnets. The resulting subnets are:

165.20.0.0
165.20.16.0
165.20.32.0
165.20.48.0
165.20.64.0
165.20.80.0
165.20.96.0

Repeating this pattern all the way to the last subnet:

165.20.240.0

Notice that you begin with the zero subnet and carry it through to the subnet with the same number as the subnet mask. This yields 14 subnets, but the formula says to delete two of them: the first and the last.

The IP address in the question, 165.20.90.90, would therefore fall in the range between 165.20.80.0 and 165.20.96.0. There are 4094 usable IP addresses in this range. You cannot use the first, 165.20.80.0, because this is the subnet number itself. This number cannot be assigned to a host. The last number in this subnet is 165.20.95.255, but this cannot be assigned to a host because this is the broadcast address for the subnet. That leaves you with the first usable IP address of 165.20.80.1, and all addresses between it and the broadcast address are valid.

Therefore, the host with IP address 165.20.90.90/20 is in subnet 165.20.80.0.


6. Answer D is correct. If you forget how a command is spelled, or what the exact command is, you can use the "?" to help you complete the command. This is known as "context sensitive" help.

To see a list of the options available for a command, type the command, followed by a space and a question mark, and you will receive a list of available options for the command you typed. If you do not even know what commands are available, simply type the ? and a list of available commands is displayed. If you have forgotten how to spell a certain command, but remember it begins with the letters "cl", type "cl?" (notice no space between the l and the ?) and the context sensitive help mode of the command line interface will list all commands available that begin with "cl". In this case, the user has either mis-keyed a character or is not sure what the command should be.

Since the error occurred at the "t" in "art", you can substitute a question mark for the "t" to find valid commands beginning with "ar". Refer to the following:

Router_B#sh ar?
WORD
arap
arp

The following is an example of the context sensitive help mode, available in all Cisco routers and switches, showing the options available for a particular command:

Router#show access-lists ?
<1-2699> ACL number
WORD ACL name
| Output modifiers

The router context sensitive help displays command line options that are available for this major command.

If you use "show ar ?", it would be ambiguous, as shown below:

Router_B#show ar ?
% Ambiguous command: "show ar"

If you simply typed "?", you would get a list of all commands available in privileged mode, and it would not help to determine the correct spelling of the subcommand under "show".

If you typed "show arp", the command would display the contents of the arp cache. It would not be the most likely command to enter because the user would have entered it in the first place if he knew it.


7. Answers B and C are correct. The "show run" command is the short form for "show running-config". It is one of the most useful commands used to see the current, active configuration of a router. This command displays the details of all interfaces, whether they are completely configured or not, including both IP and IPX.

The "show protocol" command also lists details for all protocols configured on a router. An example of the output of the "show protocol" command is shown below:

Router_B#show protocol
Global values:
Internet Protocol routing is enabled
Appletalk routing is enabled
BRI0 is administratively down, line protocol is down
BRI0:1 is administratively down, line protocol is down
BRI0:2 is administratively down, line protocol is down
Serial0 is administratively down, line protocol is down
Serial1 is administratively down, line protocol is down
Serial2 is administratively down, line protocol is down
Serial3 is administratively down, line protocol is down
TokenRing0 is administratively down, line protocol is down

The "show ip protocol" command will show just the ip routing protocols that are currently configured, not IPX, Appletalk, or any others. The following is an example output of the "show ip protocol" command:

router#show ip protocol
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 8 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is
Incoming update filter list for all interfaces is
Default version control: send version 1, receive any version
Interface Send Recv Triggered RIP Key-chain
Ethernet0 1 1 2
Routing for Networks:
192.168.1.0
Routing Information Sources:
Gateway Distance Last Update
(this router) 120 00:00:10
Distance: (default is 120)

Show start will display the contents of the startup-config file, which may or may not show all the currently routed protocols.


8. Answer C is correct. The router is very similar to a PC and will store its power-on diagnostics in read only memory (ROM). You can enter the router's diagnostic mode by modifying the configuration register and changing the configuration register bit number 15 (hex # 0x8000) to 1. This will ignore the non-volatile random access memory (NVRAM) startup-configuration file and put the router in diagnostic mode.

The configuration register is a 16-bit register in the router, which is used to set the startup process for the router. The important bits of the configuration register are:

  • 00 to 03 - boot field
  • 06 - ignore NVRAM contents
  • 08 - disable key
  • 10 - enable all zero broadcast
  • 11 to 12 - console line speed
  • 13 - boot from ROM is netboot fails
  • 14 - IP broadcast does not have a network number
  • 15 - enable diagnostics and ignore NVRAM

The startup-configuration file is stored in NVRAM. The full-featured Internetwork Operating System (IOS) is stored in Flash. The running-configuration file is stored in random access memory (RAM).


9. Answer A is correct. From one perspective, switches are bridges with lots of ports and faster internal processing. A switch is very similar to a bridge in that they both deal exclusively with Layer 2 addresses. A switch learns the location of devices based on the interface to which they are connected. They both rely on the spanning tree algorithm to provide loop-free paths to a destination. Switches form a separate collision domain for each port. All ports on bridges and switches are in the same broadcast domain. Routers separate LAN segments into multiple broadcast domains.

A router makes forwarding decisions based on IP addresses. A bridge or switch increases available bandwidth because it creates separate collision domains for each port. A router creates separate broadcast domains for each interface.

An active hub is a powered hub that acts like a multiport repeater. A concentrator is another name for an active hub. Neither breaks up a LAN segment into multiple collision domains.

A passive hub forms a single collision domain but does not act like a repeater like an active hub does.


10. Answer B is correct. "Handshaking" is the process of initiating, acknowledging, and confirming a TCP connection. It is a three step process as outlined below:

Step One: Host A --(Seq 100) SYN --> Host B

Host A wants to initiate a connection with Host B. It sends out a SYN (Synchronize) segment saying something like:

"Hello! Can you hear me? I want to start a conversation. This transmission has a Sequence Number of 100."

Host A also sends this sequence number so that Host B will know what number to expect in the next transmission.

Step Two: Host A <-- SYN/ACK (Seq 300) -- Host B

Host B sends back a SYN/ACK (Acknowledge) segment saying something like:

"Yes, I heard you. I expect sequence number 101 on the next transmission.
This transmission has a Sequence number of 300."

Host B also sends a sequence number, so Host A will know what number to
expect in the next transmission.

Step Three: Host A -- ACK (Seq 101) --> Host B

Host A sends back an ACK (Acknowledge) segment saying something like:

"Great let's talk...I expect sequence number 301 on the next transmission.
This transmission has a Sequence Number of 101."

To start a TCP connection, TCP uses the three-way connection-establishment sequence as described above. To terminate a connection, a four-way termination sequence is used, adding a FIN bit to the sequence. The termination sequence is described as ACK, FIN; ACK; ACK, FIN; ACK.


Questions and answers provided by MeasureUp. To order the full version of this exam simulation, click here.


More Pop Quiz:


There are 32 CertCities.com user Comments for “Cisco Exam #640-801: CCNA (MeasureUp, set 3)”
Page 1 of 4
1/28/06: jimmy salam from lagos says: its nice. pls i want a cheat sheet on the current ccna 640-801 exams.
2/15/06: mohammed from jordan says: POST REMOVED: Mohammed, we do not permit the solicitation of braindumps at CertCities.com. Please refrain from doing so in the future. -- Dan Hong, associate Web editor
2/17/06: tuyen from 84 says: tuyen nhan
3/15/12: Camila from IOZgPwYSEXhp says: Rajeshji,I am trying to setup Dot1x atahentictuion for our company wierd users. got one cisco 3560 switch as radius client,ISA as Radius server and using windows XP as client.Configuation done in switch to enable Dot1x authentcation. In XP we use Authentication as MD5 Challenge. now when i connect to Switch port it immeadiatey asking username and password. but after giving the credentials its rejecting the request.Using MD5 challenge atahentictuion in XP can i achieve the port atahentictuion?ThanksShibu
9/22/12: ipad vpn from [email protected] says: ÔÚÏß´úÀí¶¼²»ÊÇÌ«ºÃÓã¬ÏÞÖƶà,ºÜ²»°²È«£¬ÎÒÒ»Ö±ÓÃVPNµÄ£¬ºÜ·½±ã£¬ÍƼöÒ»¸öhttp://www.35vpn.com/ £¬¶à×é·þÎñÆ÷Çл»,Ëٶȷɿì. http://www.35vpn.com/
7/1/13: louisvuittonttoutlet.com from [email protected] says: good share. louisvuittonttoutlet.com http://www.louisvuittonttoutlet.com
7/1/13: michael kors outlet online from [email protected] says: nice articles michael kors outlet online http://www.michaelkorsioutlet.org/
7/5/13: gucci outlet online from [email protected] says: ths gucci outlet online http://www.guccioutletstore-online.com
7/5/13: louboutin outlet from [email protected] says: ths louboutin outlet http://www.christianlouboutinoutleta.com
7/25/13: Herve Leger uk from [email protected] says: good articles Herve Leger uk http://www.herveleger-outlet.co.uk/
First Page   Next Page   Last Page
Your comment about: “Cisco Exam #640-801: CCNA (MeasureUp, set 3)”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top