The following are similar to some of the questions on the CCIE written which I failed by about 8%. Please forward your answers and explanations. Multiple answers are possible.
1. What is not a basic function of a bridge?
a. Multiple network interconnection.
b. Broadcast suppression.
c. Protocol independent routing.
d. Network extension.
e. Packet forwarding.
2. What is the purpose of a spanning tree algorithm?
a. Selects the best path between LANs for redundancy.
b. Only used by DEC bridges to dynamically configure a routing table.
c. Reduces the number of broadcasts necessary by forwarding a specific subset.
d. Used by bridges to dynamically discover a loop-free topology that includes a path to every set of LANs.
e. Defined by IEEE 802.1d to enforce a hybrid star/bus network topology.
3. A "routed" protocol has the following characteristics:
a. Conforms exactly to the OSI Reference Model.
b. Uses a metric to calculate the best path.
c. Embeds an identifier in each packet which uniquely specifies a logical grouping of hosts.
d. Ensures a loop-free topology.
e. All of the above.
A and B have been replaced with bridges to isolate the traffic on the ethernet links.
Host1-------RouterA ----------------Router B--------Host2
4. What addressing changes need to made to Host 1 and Host 2?
a. Change the network address on Host 1 and Host 2?
b. Change the host addresses on both Host 1 and Host 2.
c. Change the MAC address on Bridge A.
d. Change the host address, serial connection will use another network number and Host 2 will use a third network number.
e. None. Since they are all connected, no network numbers are necessary.
5,. Which is not a valid bridge number in a route designator?
a. 0x3
b. 0x7
c. 0xb
d. 0xf
e. 0x11
6.. Which is not a true statement about the User Datagram Protocol (UDP)?
a. UDP can be used in place of TCP as a transport protocol.
b. UDP is a connection-less protocol.
c. UDP packets use error checking to provide high reliability.
d. UDP uses IP to transport messages.
e. UDP uses port numbers to distinguish between multiple destinations on a given
host computer.
7. Occasionally the "show interface" display for token ring will show 0000.0000.0000 (all zeros) as the BIA interface MAC or hardware address. What does this usually mean?
a. IP has not been configured yet.
b. Interface is acting as the Active Monitor.
c. Software error
d. The ring is beaconing
e. Interface has never successfully inserted into the ring
8. According to information on a interface it can do Source Route Transparent bridging. This means:
a. Token ring using SNAP encapsulation to Token ring using 802.3 encapsulation conversion.
b. Routing Information Fields (RIF) will be added or removed as necessary when going between the different types of media.
c. This interface can only forward traffic to ethernet segments.
d. Will source-route transparently bridge token ring frames to FDDI.
e. Packets received on this interface without a Routing Information Field (RIF) will be transparently bridged.
9.. When a packet is blocked because it fails to match a filter or access list, what type of ICMP message is sent to the destination?
a. Destination Unreachable
b. Access Denied
c. Source Quench
d. Time Exceeded
e. None
10.. Which is the true statement about Link State routing protocols?
a. Link state routing uses the Bellman-Ford algorithm.
b. Each router is responsible for learning about its neighbors and their links and flooding this information to all of the other routers in the network.
c. All routers using a Link State protocol will have the same topology map of the network.
d. Best routes are determined dynamically starting with the lowest MAC address.
e. Convergence can take a very long time, as every router must build a new topological map.
11. A brand new Cisco router has no configuration defined. Which of the following is not a method that can be used to configure the router for the first time?
a. By connecting to the console port and suing TFTP to download a configuration file that has been created ahead of time.
b. By connecting to the console port and running the Setup dialogue.
c. By connecting to the console port and directly typing in configuration commands.
d. Using SNMP via a network management station.
e. Using bootp in conjunction with SLARP/RARP to download a configuration file that has been created ahead of time.
12. Which of the following EXEC commands is used to list a router's configuration stored in NVRAM?
a. list configuration
b. show nvram
c. show configuration
d. write configuration
e. write terminal
13. Which command places a copy of the active configuration into NVRAM?
a. write configuration
b. save
c. write nvram
d. copy config nvram
e. write memory
14. Which command places a copy of the active configuration into FLASH memory?
a. write flash
b. save
c. write memory
d. copy config flash
e. None of the above
15. If there were a high number of collisions this may be caused by:
a. Possible unterminated link
b. Impedance mismatch
c. Too many hosts on the ring
d. Software error
e. Transceiver jabber
16. A network administrator has lost the passwords to their Cisco router. How can this password be retrieved?
a. Call the Cisco Technical Assistance Center (TAC). Under software support, all passwords must be registered.
b. For the modular systems (AGS+, AGS+, MGS, CGS, IGS) and Cisco 7000: Power off router, move jumper on configuration register or toggle dipswitch to enter test
mode. When the router is powered back on, it will
automatically enter test mode, and the contents of NVRAM can be examined.
c. For the Cisco 3000 and Cisco 4000: Cold start or warm start the system and hit the break key while the system is booting. The router will go into ROM monitor
mode. Change the software registers, boot the router and check the contents of NVRAM.
d. Log onto the router and do a "write erase" to empty the contents of NVRAM. New passwords and then be configured.
e. Both (b) and (c)
17. What effect would this configuration command have: line vty 0 4 no password vtypassword
a. All telnet connections to the router will be denied
b. Only one telnet connection at the router will be allowed at a time
c. Virtual terminal sessions will not be able to enter enable mode