640-607 640 - 607 Cisco Certified Network Associate 2.0 CCNA 2.0 Version 3.0 Leading the way in IT testing and certification tools, www.testking.
640 - 607 Important Note Please Read Carefully This product will provide you questions and answers along with detailed explanations carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of just cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything.
640 - 607 Q. 1 Your Ethernet network, 172.30.1.0, shuts down. Which update message is seen in your router's debug ip rip output regarding that network? A. B. C. D. subnet 172.30.1.0, metric 0 subnet 172.30.1.0, metric 1 subnet 172.30.1.0, metric 15 subnet 172.30.1.0, metric 16 Answer: D Explanation: In RIP when a network in not reachable then its metric is change to 16. Incorrect Answers: A is incorrect; this is not a valid metric. B is incorrect; this metric indicates that the network is up.
640 - 607 C is incorrect; the show boot IOS command displays the settings of the boot environment variables. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 128-137. http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1214ea1/3550cr/ccimtoc.htm Q. 3 When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? A. B. C. D.
640 - 607 The dialer map command is used to define one or more dial-on-demand numbers to reach one or more destinations for a particular interface. This is the exact command to associate an ISDN phone number with the next hop router address. Incorrect Answers: A is incorrect; this is not a valid command. C is incorrect; the isdn spid1 command specifies the SPID required for b channel to access the ISDN network when your router makes its call to the local ISDN exchange.
40 - 607 B. (config-if)# dialer-list 1 C. (config-if)# dialer map 1 D. (config-if)# dialer-route 1 Answer: A Explanation: Once the above commands have been entered to enabled DDR, then the last step required is to bind the traffic destination to an interface by linking the interesting traffic definition already created. This is done with the dialer-group command. In this case the proper command would be (config-if)# dialer-group 1.
640 - 607 Answer: B Explanation: To ensure that the line comes up the encapsulation type must be enabled. This is done with the encapsulation ppp command. Incorrect Answers: A is incorrect; the interface is already enable therefore this command in not required. C is incorrect; the serial interface has already been created, this command would not solve the problem. D is incorrect; this will only set the clock rate and not bring solve the problem. Steve McQuerry. Interconnecting Cisco Network Devices.
640 - 607 B is incorrect; as the DLCI are significant to just the two routers involved in the exchange of information it is not proper to refer to globally significant DLCI. C is incorrect; locally significant LMI is not the answer. LMIs are responsible for managing the connection between the routers and not the assignment of numbers. D is incorrect; globally significant LMI is not the answer. LMIs are responsible for managing the connection between the routers and not the assignment of numbers.
640 - 607 Delay of this IPX network, in ticks is 1 throughput 0 link delay 0 IPXWAN processing not enabled on this interface.
640 - 607 D is incorrect; this only part of the MAC address thus incorrect. F is incorrect; this is the IPX address. As stated previously this address is part layer 3 and part layer 2. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332 and 345-6. Q. 10 Which devices operate at all seven layers of the OSI model? (Choose three.) A. B. C. D. E. F.
640 - 607 Answer: C. Explanation: In general, IP addresses contain two fields: one for the network and another for host. Class A address have a range of 1 to 126 and the network portion of the IP address is restricted to the first eight bits (octet). Class B address have a range of 128 –191.255.0.0 and the network portion of the IP address is contain in the first 2 octets. Class C IP addresses has a range of 192.223.255.255.
640 - 607 C is incorrect; the network layer provides logical addressing so that routers can perform route determination. C is incorrect; the transport layer provides delivery of the data and error correction prior to retransmit. E is incorrect; the session layer is responsible for establishing, managing, and terminating communications sessions between presentation layer entities. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 11-12. Q.
640 - 607 Explanation: Bridge networks have the following characteristics: each segment has its own collision domain, all connected devices are part of the same broadcast domain, and all segments must have the same data link layer implementation. Incorrect Answers: B is incorrect; when a network is segmented by a bridge the collisions domains increase and not decrease. C and D are incorrect; the addition of a bridge to a network has no effect on the number of domains. Steve McQuerry.
640 - 607 Answer: A Explanation: The key to answering this question is “Serial0 is down”. This indicates that the actual serial inerface is down. Thus there is a problem with the physical layer. Incorrect Answers: B is incorrect; the exhibit does not indicate a problem with the data link layer. C is incorrect; the exhibit does not indicate a problem with the network layer. D is incorrect; if the output just indicated that “line protocol is down” then a their would be a problem with the line protocol.
640 - 607 C. Host 1-1 can not ping Host 1-2 D. Host 4-1 can not ping Host 1-2 E. Host 4-1 can ping Host 4-2 Answer: A, B and E. Explanation: If hosts from the different VLANs can ping each other then you can confirm the proper VLAN configuration and truck operation. Incorrect Answers: C is incorrect; if this occurred this would indicate a problem. D is incorrect; if this occurred this would indicate a problem. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 191-193. Q.
640 - 607 B. C. D. E. The VLAN must be named. An IP address must be configured for the ACCOUNTS VLAN. The desired ports must be added to the new VLAN: The VLAN must be added to the STP domain. Answer: A, B, D Explanation: To add a VLAN there are a number of things that must be done. First it must be created, then named and assigned ports. Incorrect Answers: C is incorrect; IP addresses do not need to be configured for VLANs. D is incorrect; the VLAN does not need to be added to the STP domain.
640 - 607 A is incorrect; in a switched environment the frame will not be immediately sent. B is incorrect; this is the point at which the cut-through mode will start sending a frame. C is incorrect; this is the point at which the fragment-free mode start sending a frame. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163. Leading the way in IT testing and certification tools, www.testking.
640 - 607 Q. 20 Which commands could be used at the command line interface to troubleshoot LAN connectivity problems on a router? (Choose three.) A. B. C. D. E. F. ping tracert ipconfig show ip route winipcfg show interfaces Answer: A, D, F Explanation: There are a number of commands that can be used to troubleshoot connectivity problems on a router.
640 - 607 Q. 21 What are the effects of sustained, heavy collisions in CSMA/CD LANs? (Choose three.) A. B. C. D. E. F. Increased broadcast traffic Delay Low throughput High throughput Congestion Higher bandwidth Answer: B, C, E Explanation: Whenever there is sustained high collision environment the results are longer delays, congestion and low throughput. Incorrect Answers: A is incorrect; this will not increase broadcast traffic. D is incorrect; due to the collision the throughput will decrease.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 45-48. Q. 23 Which of the following are unique characteristics of half-duplex Ethernet as compared to full-duplex Ethernet? (Choose two.) A. B. C. D. E. Shared collision domain.
640 - 607 D is incorrect; there is no need to a default gateway to telnet E is incorrect; you would not be able to ping id the IP address was wrong. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 103. Q. 25 Exhibit: Choose the correct cable to directly connect a router to another router over the Ethernet. A. B. C. D. Cable #1 Cable #2 Cable #3 Cable #4 Answer: C Explanation: A crossover cable must be used to connect similar devices.
640 - 607 Incorrect Answers: A is incorrect; the critical pairs are not twisted. B is incorrect; the critical pairs are not twisted. D is incorrect; the critical pairs are not twisted. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 51. Q. 26 Which two commands allow you to verify address configuration in your internetwork? A. B. C. D. E. F.
640 - 607 Choose the correct cable to connect an Ethernet switch to another Ethernet switch. A. B. C. D. Cable #1 Cable #2 Cable #3 Cable #4 Answer: C Explanation: A crossover cable must be used to connect similar devices. A crossover cable crosses the critical pairs in order to align, transmit, and receive signals. Incorrect Answers: A is incorrect; the critical pairs are not twisted. B is incorrect; the critical pairs are not twisted. D is incorrect; the critical pairs are not twisted. Steve McQuerry.
640 - 607 Q. 28 Which command displays all routed protocols and the interfaces on which the protocol is enabled? A. B. C. D. E. F. show protocols show protocol brief show interfaces protocol show interfaces show routed show routed interfaces Answer: D Explanation: The show interfaces command displays statistics fro all interfaces configured on the switch. This information is displayed by interface and includes the routing protocols. Incorrect Answers: A is incorrect; this is not a valid command.
640 - 607 Incorrect Answers: A is incorrect; prior to the increase in bytes the old window size was 3000 bytes. B is incorrect; window size is bytes not packets. D is incorrect; window size is bytes not segments E is incorrect; window size is bytes not frames. F is incorrect; window size is bytes not packets. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 213-214. Q. 30 Users on network 192.168.69.
640 - 607 E. 199.141.27.175 F. 199.141.27.208 Answer: A, C, D Explanation: When you base your calculations on the network address and the provided subnet mask the valid host addresses are 199.141.27.33, 199.141.27.119, and 199.141.27.126. Incorrect Answers: B, E and F are incorrect; these are not valid host addresses. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233-236. Q. 32 The network 172.12.0.
640 - 607 Answer: Explanation: In order for a Class B IP, such as 172.12.0.0, to have 458 IP available on each subnet then a subnet mask of 255.255.254.0. This subnet mask provides for 126 subnets and 510 IPs. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 234. Q.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 258-260. Q. 34 Given the following routing table entry, which of the following are used by default in the calculation of the number 1200? (Choose two.) 172.16.0.0 [100/1200] via 192.168.16.3, 00:00:55, Ethernet1 A. B. C. D. E. F. MTU bandwidth administrative distance hop count metric delay Answer: B, F Explanation: By default, only bandwidth and delay are used by the IGRP metric. In this case the metric is 1200.
640 - 607 Explanation: One form of frame tagging that VLANs use is ISL tagging. The ISL tag includes the VLAN ID. Incorrect Answers: A, C and E are incorrect; frame filtering will not achieve the desired result. D is incorrect; frame tagging does not include the trunk ID. Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) page 175. Q. 36 A routing table contains static, RIP, and IGRP routes for the same destination network. Which route would normally be used to forward data? A.
640 - 607 Explanation: IGRP requires an autonomous system number. The autonomous system number must be entered directly after the router igrp command and before the network command. Incorrect Answers: A is incorrect; the network command is used to identify the directly connected networks but this is done after the autonomous system number. B is incorrect; the IP address mask is not required. C is incorrect; metric weights are not required. E is incorrect; registered administrative id is not required.
640 - 607 Answer: Explanation: An IPX address is composed of two parts: the network number and the node number. For IPX the node number is usually obtain from MAC address of the network interface. In this case the network number is 4ad1 and the node number/MAC address is 021f.2cfe.8322. Thus the ipx address is 4ad1.021f.2cfe.8322. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332-333. Q. 40 Exhibit RouterA(config)#router igrp 100 RouterA(config-router)#network 192.168.3.
640 - 607 192.168.7.0 D. 172.16.0.0 E. 192.168.3.0 192.168.4.0 192.168.5.0 Answer: A Explanation: IGRP routing table contains all directly connected networks and those learned by IGRP. As Router A and Router B share a directly connected network thus they will share routing tables. Incorrect Answers: B is incorrect; Router B’s routing table will also contain the networks that are directly connected to Router A. C is incorrect; the routing table will also contain 172.16.0.0.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 387-400. Q. 42 You are the network administrator of the Tasti-Treats Cereal Company. You receive a call from a user who is unable to reach a server at a remote site. After further review, you discover the following information: Local PC – 10.0.3.35/24 Default gateway – 10.0.3.1 Remote server – 10.0.5.250/240 You then conduct the following tests from the offending local PC: ping 127.0.0.1 – successful ping 10.0.3.
640 - 607 A. B. C. D. E. F. show ip interface show cdb neighbors show cdp neighbors detail show ip route show ip link status telnet Answer: C Explanation: The show cdp neighbors detail command displays information about neighboring devices. The information displayed includes Layer 3 protocol information and Neighbor Device ID. The show cdp entry command also results in the same information as the show cdp neighbors detail command.
640 - 607 B is incorrect; the show ip route command displays the contents of the ip routing table. D is incorrect; the show interface command displays the serial interface configuration. F is incorrect; this is not a valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325, 280, and 106 Q. 45 Which of the following commands applies to an access control list to a router interface? A. B. C. D. E.
640 - 607 Security level is default Split horizon is enabled Rest of configuration omitted. What is the result of applying the access-list to Ethernet 0? A. B. C. D. E. Only e-mail and telnet access will be permitted out of Ethernet 0. All hosts on the 172.30.24.64 network will be permitted e-mail and telnet access. All TCP protocols will be permitted out of Ethernet 0 except e-mail and telnet. All IP traffic out of Ethernet 0 will be denied. The access-list is numbered incorrectly and will fail.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 163-165. Q. 48 Which of the following are true regarding passwords on a Cisco router? A. B. C. D. E. All passwords can be encrypted. All passwords can be entered using the set-up dialogue. A password can be set before a user can enter the privileged mode. A password can be set for individual lines. TACACS or Radius password authentication can be used.
640 - 607 Q. 50 What is the maximum length of the fast Ethernet cable 100BaseTx standard? A. B. C. D. 10 m 50 m 100 m 1000 m Answer: C Explanation: The 100BaseTx maximum cable length is 100 m. Incorrect Answers: A and B are incorrect; neither 10 m nor 50 m are maximum cable lengths. F is incorrect; this is the maximum length of fiber optic. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 45-46. Q. 51 Which of the following are true? A.
640 - 607 Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 33. Q. 52 What is a benefit of a virtual LAN (VLAN)? A. B. C. D. E. It increases the number of broadcast domains. It decreases the number of broadcast domains. It increases the number of collision domains. It decreases the number of collision domains. Since it is a virtual interface, it never shuts down. Answer: A Explanation: A VLAN is a logical broadcast domain that can span multiple physical LAN segments.
640 - 607 D is incorrect; filtering is most often achieved on a router with an access list. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 254-282. Q. 54 What are two characteristics of the RARP protocol? (Choose two.) A. B. C. D. It generates parameter problem messages. It maps IP addresses to Ethernet addresses. It maps Ethernet addresses to IP addresses. It is implemented directly on top of the data link layer.
640 - 607 Incorrect Answers: A is incorrect; increasing the idle time parameter will only result in increasing the idle time. C is incorrect; rebooting the router will only result in the router going through its post. D is incorrect; this action will not confirm whether a DDR has connectivity or not. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 397-407. Q.56 Which element is used to define the rate, in bits per second, that a Frame Relay switch agrees to transfer data? A.
640 - 607 Explanation: Tunneling is the process whereby a router encapsulates one Layer 3 protocol inside another protocol (typically IP) for transport across a network to another router. The receiving router de-encapsulates the packet, leaving the original packet. Incorrect Answers: A is incorrect; bridging occurs within the same collision domain. C is incorrect; data link control has nothing to do within communication between networks.
640 - 607 interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which two actions result from implementing this configuration? (Choose two.) A. B. C. D. E. IPX network 5c will not receive any traffic. Traffic from network 3d for network 4a will be forwarded out e0. Traffic from network 3d for network 3d will be forwarded out e0. Traffic from network 3d, destined for network 4a, will be forwarded out e2.
640 - 607 Answer: D Explanation: The shutdown command administratively disables an interface. The result is the interface will be down as will the line protocol. It will end calls in progress. Incorrect Answers: A is incorrect; the statement shows that the interface and the protocols are both up. This would not be the case if the shutdown command were used. B is incorrect; this statement shows that the line is up but the line protocol is down.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 269-273. Q. 62 Which two statements about IP RIP are true? (Choose two.) A. B. C. D. E. F. It limits hop counts to 31. It is a link-state routing protocol. It uses autonomous system numbers. It is capable of load sharing over multiple paths. It uses bandwidth as the metric for path selection.
640 - 607 Explanation: In a switched environment, packets are switched only between ports designated to be within the same “broadcast domain”. VLANs perform network portioning and traffic separation at Layer 2. So, interVLAN communication cannot occur without a Layer 3 device such as a router, because network layer (Layer 3) devices are responsible for communicating between multiple broadcast domains. Note that, at Layer 2, an interface uses ISL to communicate with a switch.
640 - 607 C. D. router(Config)# bandwidth 56000 router(Config-if)# clock rate 56000 Answer: B Explanation: The bandwidth command overrides the default bandwidth. The bandwidth has no effect on the actual speed of the line. Instead, it is used to compute routing metrics ad the load of the link. Bandwidth is expressed in Kilobits. It is specified during interface configuration.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163. Q. 67 In order to enable RIP which two tasks need to be performed? (Choose two) A. B. C. D. Specify the routing protocol. Configure static Rip routes. Specify directly connected subnets. Specify directly connected networks. Answer: A, D Explanation: In enable a router with RIP it takes two basic steps: select the routing protocol and identify the networks that the router is directly connected to.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 380-382. Q. 69 Which two statements about a bridge are true. (Choose two) A. B. C. D. A bridge floods multicasts. A bridge floods broadcasts. A bridge does not flood multicasts. A bridge does not flood broadcasts. Answer: A, B Explanation: A bridge must send all multicasts and broadcast to all ports, since there is only one broadcast domain.
640 - 607 Q. 71 Which statement about an IP network is true? A. B. C. D. A broadcast source MAC contains all zeros. A MAC address is part of the physical layer of the OSI model. MAC addresses are used by bridges to make forwarding decisions: IP addresses are used by routers. IP addresses are now a flat addressing scheme: MAC addresses use a hierarchical addressing scheme.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 414. Q. 73 Which statement about the specialized IP addresses shown in the EXHIBIT is true? EXHIBIT: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 A. B. C. D. E. They are private IP addresses. They can not be leased with DHCP. They are allocated for VOL PVOLP. They represent IP classless addresses. They are used by the inter NIC for administration.
640 - 607 Explanation: The network layer defined how to transport traffic between devices that are not locally attached in the same broadcast domain. For the communication the device will require two pieces of information: a logical address associated with the source and destination stations and a path through the network to reach the desired destination. Both of the required information is stored in the devices routing table.
640 - 607 Answer: A, B, E Explanation: A switch has three basic functions, which increase the available bandwidth on a network. These functions are address learning, forward/filter decision, and loop avoidance, Incorrect Answers: C is incorrect; although a switch functions a lot like a multi-port bridge, a switch does not affect – nor is affected by – the hop count. D is incorrect; by their very design Broadcast are meant to be seen by everyone. Steve McQuerry. Interconnecting Cisco Network Devices.
640 - 607 D. One device per segment can currently send frames to the switch. Answer: B Explanation: A switch is usually only handle one media type at a time. Incorrect Answers: A, C and D are incorrect; the statements are characteristics of a network segment on a switch. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 78-80. Q. 79 Which three are typical operational phases in a basic connection oriented network service? (Choose three) A. B. C. D. E. F. G.
640 - 607 Answer: B Explanation: Acknowledgement is required to insure packets were not loss and this is how a reliable transport layer connection is maintained. Incorrect Answers: A is incorrect; route selection is performed by the network layer. C and D are incorrect; these are not transport layer functions. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 28-30. Q. 81 Using the TCP/IP suite a message is sent from host A to a destination IP address on the same LAN.
640 - 607 Explanation: The TCP/IP protocol stack is very similar to the OSI model protocol stack. With TCP/IP connection orientated and connection less communication is possible. Both IP and UDP are both connectionless. TCP is a connection-orientated protocol. Incorrect Answers: B is incorrect; RARP and not ARP provide this functionality. D is incorrect; ICMP is connection less. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 215-218. Q.
640 - 607 Explanation: The two protocol tools that use ICMP messaged to perform their function are ping and trace route. Incorrect Answers: B is incorrect; telnet uses TCP. C is incorrect; configure is not a protocol tool. E and F are incorrect; they are not part of ICMP, nor do they use ICMP. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-218. Q. 85 Which command successfully ping an individual IP address? A. B. C. D. Router>ping 192.5.5.0 Router# ping 192.5.5.
640 - 607 Explanation: Whenever a network is going to be divided by a router a number of factors needs to be considered when selecting a subnet mask. Two factors that need to be considered is the number of networks that you require and the maximum number of host each subnet will require. Incorrect Answers: B is incorrect; DHCP addressing is not relevant in the subnet mask design.
640 - 607 Answer: B Explanation: The show ipx interface command shows the status of the IPS interface and IPS parameters configured on each interface. This includes the IPX address. Incorrect Answers: A is incorrect; there is no such command as show ipx addresses. C is incorrect; the ipx network command is used to enable IPX routing on a particular interface. The parameter is used to identify the network that IPX is enabled on.
640 - 607 Incorrect Answers: B is incorrect; the number 10.2.0.0 is the problem for this option C is incorrect; each network identified must have its own network command. D is incorrect; this is not correct as there is no need to use the subnet mask for the networks. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277, 285-286. Q. 90 Which show command should you use to view Frame Relay local management interface (LMI) traffic statistics? A. B. C. D. E.
640 - 607 Answer: A Explanation: The proper syntax for configuring a second subinterface is interface 0.2 point-to-point. Option A is the closest to this command. The syntax after the command interface is serial interface number (0 in this case).subinterface number (2 in this case) and this followed by the either multipoint or point-to-point. Incorrect Answers: B is incorrect; remember that the syntax is suppose to be number.subinterface number and that there is suppose to be two hyphens in point -to-point.
640 - 607 Q. 93 Which two statements accurately define IP addressing rules? (Choose Two) A. B. C. D. IP multicast addresses start with 240 A host portion of all 1’s indicates a network broadcast The value of zero (0) in the host portion means “all hosts” on the network IP addresses are four octets long and contain a network portion and a host portion Answer: B, D Explanation: IP addresses contain 4 octets. IP addresses contain two parts: one to identify the network and the other to determine the host.
640 - 607 Incorrect Answers: D is incorrect; the encapsulation type must be done on the physical interface. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 428-429. Q. 95 What is the bandwidth capacity of an ISDN B channel? A. B. C. D. E. 16 Kbps 64 Kbps 128 Kbps 512 Kbps 1.54 Mbps Answer: B Explanation: The Bearer (B) channel transfer rate is 64 kbps. Incorrect Answers: A is incorrect; is the Delta (D) channel that has a transfer rate of 16 kbps.
0 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 304-305. Q. 97 Which router command allows you to determine if an IP access list is enabled on a particular interface? A. B. C. D. Router# show ip interface Router> show access-list Router# show ip access-list Router> show interface ip access-list Answer: A Explanation: The show ip interface command displays IP interface information and indicates whether any access lists are set for a specific interface.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325. Q. 99 Which statement about Ethernet networks is true? A. B. C. D. The advantage of a full duplex is the ability to transmit data over Mbase2 cable. Full duplex Ethernet requires a point-to-point connection when only two nodes are present. Ethernet switches can use full duplex mode to connect multiple nodes to a single port of a switch.
640 - 607 Incorrect Answers: A is incorrect; this would require all NICs to be upgraded, and result in a large collision domain with possible poor performance. B is incorrect; a router would become a bottleneck, and not allow efficient performance. D is incorrect; a bridge would be a bottleneck, and not be able to provide the necessary performance and throughput. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 31-38. Q. 101 A network is very congested.
640 - 607 Answer: D Explanation: A 100BaseT cable cannot be any longer than 100 meters. Incorrect Answers: A, B, C, & E are wrong. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 45. Q. 103 Which command sets the clock rate to 56 Kbps on serial0? A. B. C. D. E. F. G.
640 - 607 Incorrect Answers: A is incorrect; the command set must be followed by another parameter such as user and the set command cannot be used to get into the privileged mode C is incorrect; configure is used in privileged mode, but does not ENTER that mode. D is incorrect; this in not valid command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 69-70. Q. 105 In the setup dialogue what do the square bracket indicate? A. B. C. D. Current or default settings.
640 - 607 E is incorrect; this is not a valid command combination. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138-139. Q. 107 Which command retrieves the configuration file from NVRAM? A. B. C. D. Config NVRAM Copy NVRAM running-config Copy startup-config running-config Copy running-config startup-config Answer: C Explanation: To copy the IOS image in the NVRAM to the RAM the copy startup-config running-config command is used.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 101-102. Q. 109 Which line from a show spantree 1 command output indicates that virtual LAN1 (VLAN1) is functioning properly? A. B. C. D. E. Root port is fast Ethernet 0/26 Port Ethernet 0/1 of VLAN is forwarding Designated port is Ethernet 0/1, path cost 10 Designated root has priority 0 address 00D0.588F.B600 VLAN is executing the IEEE compatible spanning tree protocol.
640 - 607 Q. 111 Which encapsulation type should be used for the S0 port of Router R2? A. B. C. D. SAP HDLC ARP NOVELLETHER Answer: B Explanation: Actually we can answer this question using the exhibit in the following example. Router R2 S0 connects to Router R1 S0. Router R1 S0 uses HDLC, and BOTH sides must run the same protocol in order to communicate (it is like talking the same language; you can’t have one side English and the other Side French). So the correct answer is B – HDLC.
640 - 607 Which command specifies a second sub interface on serial interface 0? A. B. C. D. E. Interface s0.2 point-to-point Interface 2s0 point-to-point Subinterface 2s 0 point-to-point Interface s0 sub2 point-to-point Interface s0.1 point-to-point sub2 Answer: A Explanation: The proper syntax for configuring a second subinterface is interface 0.2 point-to-point. Option A is the closest to this command. The syntax after the command interface is serial interface number (0 in this case).
640 - 607 Q. 113 Which statement should you use to deny FTP access only from Network 210.93.105.0 to Network 223.8.151.0? A. B. C. D. Access-list one deny 210.93.105.0.0.0.0.0.0 any eq ftp access-list one permit any. Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq ftp Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq ftp Access-list 100 permit ip any any Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.
640 - 607 When we look at the bit locations, the first two bits of the fourth octet will be 128+64=192. Thus the subnet mask will be 255.255.255.192. Since there is no room to adjust the allocation, everything fits fully into 8 bits, none of the other subnet masks will provide this combination. Incorrect Answers: B, C and D are incorrect; these subnet mask provide too many networks and not enough host addresses. Steve McQuerry. Interconnecting Cisco Network Devices.
640 - 607 Answer: C Explanation: Connectionless protocols have many advantages. One of the main advantages is that there is a reduction in overhead traffic, as acknowledgments are not sent. This does, though, increase the likeyhood of a lost packet. Incorrect Answers: A is incorrect; there is no packet acknowledgement in UDP. B is incorrect; this is the opposite, UDP does not guarantee against packet loss. D is incorrect; UDP does not expect packet ordering. Steve McQuerry.
640 - 607 Incorrect Answers: A is incorrect; an ipx address does contain the network number but it does not contain an IP address. B is incorrect; the MAC address and node number are most often the same thing. D is incorrect; the ipx address does not contain the subnet number. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 332-333. Q. 119 Which two statements about integrated services digital network (ISDN) are true? (Choose two) A. B. C. D.
640 - 607 A is incorrect; this is both the wrong mode and command. B is incorrect; this is both the wrong mode and command. C is incorrect; this is the proper mode but the wrong command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 277-279. Q. 121 What are 4 ways network management can be simplified by using the virtual LANs (VLANs)? (Choose four) A. B. C. D. E. F. VLANs allow you to implement multiple layers switching easily.
640 - 607 F. Stored and forwarded. Answer: F Explanation: In store and forward mode, the switch must receive the complete frame before forwarding takes place. The destination and source addresses are read, the cyclic redundancy check (CRC) is performed, relevant filters are applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. The latency (or delay) through the switch varies with frame length. Incorrect Answers: A is incorrect; CSMA/CD is the physical method used on a 802.
640 - 607 Q. 124 Which technology do catalyst switches use to resolve topology loops and ensure data use flows properly through a single network path? A. B. C. D. Virtual LANs. Frame filtering. Cut through switching. Spanning tree protocol. Answer: D Explanation: Spanning Tree protocol builds ONE path through all the nodes, and eliminates any loops. Anything sent along the tree will not encounter any loops because the protocol will eliminate any loops.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 163-165. Q. 126 What is a backoff on an 802.3 network? A. B. C. D. It is latency in store and forward switching. It is the time used for token passing for machine to machine. It is the retransmission delay that is reinforced when a collision occurs. It is the result of two nodes transmitting at a same time the frames from each transmitting device collide and are damaged.
640 - 607 Incorrect Answers: B: Incorrect because there is no configuration to startup. C, D, E: Incorrect because there is no longer a configuration to run, these modes do not exist. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 84-90 and 134. Q. 128 What is a key use of a device hardware address? A. B. C. D. E. To obtain a vendor code/serial number from the user. To transmit a frame from one interface to another interface.
640 - 607 Incorrect Answers: A is incorrect; the show ip command displays the switches current IP configuration. C is incorrect; this is not a valid command. D is incorrect; Frame-relay will require another parameter after the show frame-relay IOS command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 421-424 and 82. Q. 130 Which element is used to define the rate, in bits per second, which a Frame Relay switch agrees to transfer data? A. B. C. D. E.
640 - 607 Answer: A Explanation: This is a CIDR problem, also called supernetting. When you see the /xx notation, the xx is the consecutive number of one bits in the subnet mask. In this case, /30 = 30, and is also a subnet mask of 255.255.255.252. This leaves 2 bits (4 hosts) for host addressing, however since we reserve 2 addresses, that leaves a net of 2 Host Addresses, max. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 227-234. Q.
640 - 607 Incorrect Answers: A is incorrect; the session layer is responsible for establishing, managing, and terminating communications sessions between presentation layer entities. This layer is not responsible for the ping command. C is incorrect; the transport layer of the OSI model is responsible for the delivery of information in either a reliable or unreliable manner. Ping does not reside at this layer of the OSI model. D is incorrect; there no maintenance layer in the OSI model. Steve McQuerry.
640 - 607 Answer: A, C Explanation: Multiple encapsulations can be specified on an interface, but only if multiple network numbers have also been assigned, where each network number belongs to only one encapsulation type and each encapsulation type has only one network number. Although several encapsulation types can share the same interface, clients and servers with different encapsulation types cannot communicate directly with each other.
640 - 607 A, B, and D are incorrect; they do not provide a maximum of 126 hosts. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 233-236. Q. 137 In Cisco IOS software, which command displays the backup configuration? A. B. C. D. E. show flash show version show tftp-config show backup-config show startup-config Answer: E Explanation: This shows the startup configuration in NVRAM, which is the backup for the running configuration that runs in RAM.
640 - 607 A is incorrect; UDP is neither reliable nor acknowledged. B is incorrect; UDP is not acknowledged. C is incorrect; UDP is not reliable. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 207. Q. 139 What are the two sublayers of the data link layer? (Choose two) A. B. C. D. E. MAC LLC SAP LCP NetWare Core Protocol (NCP) Answer: A, B Explanation: The data link layer has two sublayers. These sublayers are: MAC and LLC.
640 - 607 D and E are incorrect; routes can be temporary or permanent, but this is an attribute of the route entry itself. This does not determine path information. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 250-252. Q. 141 Which keystroke allows IOS to complete a partial command entry? A. B. C. D. Answer: A Explanation: Tab completes a partially entered command if enough characters have been entered to make it unambiguous.
640 - 607 A, B, C and E are incorrect; due to the fact that each workstation is connected to it’s own 10 Mbps port, each port can provided it full 10 mbps. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 170-175. Q. 143 Which two WAN data link layer protocols support multiple upper layer protocols? (Choose Two) A. B. C. D. PPP LAPD ISDN HDLC Answer: A, D Explanation: Cisco has a proprietary HDLC.
640 - 607 Incorrect Answers: A and B are incorrect; these are not valid commands. In addition, A is in the wrong mode. C is incorrect; this is the wrong network number. The 199 is a Class C subnet, using a default mask of 255.255.255.0, the network requires 3 octets of individual (1-254) networking addressing. 199.55.0.0 will cause a all zeros subnet broadcast. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 276-277. Q. 145 What does the command show access-list 101 list? A.
640 - 607 Incorrect Answers: A is incorrect; this is not a valid command. D is incorrect; the show running-config displays a lot of information but it does not display access list information. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 324-325. Q. 147 Which statement about the Point-to-Point protocol (PPP) is true? A. B. C. D.
640 - 607 Explanation: There are a number of WAN encapsulation types available. The two most commonly used are Point-to-Point Protocol (PPP) and Cisco High-Level Data Link Control (HDLC). The reason HDLC is employed so much is that it is the default encapsulation type on point-to-point dedicated links and circuit switched connections. PPP is a non-proprietary encapsulation and this is while it is used to communicate between devices from different vendors.
640 - 607 Answer: B, C Explanation: The show ip route command displays the contents of the IP routing table. The routing table includes entries for all known networks and subnetworks plus it displays how the information was learnd. The show frame-relay map command show the Frame Relay DLCI-to-IP address mappings. When the results of these two commands are considered together will provide the data needed to determine routing information. Incorrect Answers: A and D are incorrect; neither are valid commands.
640 - 607 A. B. C. D. E. To map IP addresses to Ethernet addresses To map common names to network addresses To forward SNMP alerts to management consoles To generate an echo reply in response to a ping test To send a host or post unreachable message from a router to the source of an undeliverable packet Answer: D, E Explanation: ICMP has a great many functions that it can perform. Two of these functions are: destination unreachable messages and echo reply messages.
640 - 607 E. 172.37.2.55 to 172.37.2.126 Answer: C Explanation: When we say 28 bits of subnetting, this is similar to a CIDR question. We have a subnet mask of 28 bits of ones followed by 4 bits of zeros, or 255.255.255.240, and gives subnets with a stride of 16, or 14 hosts per subnet (16-2 because we subtract out the two broadcast ranges of all zeros and all ones) This will yield subnets, some networks are as follows: 172.37.2.0. 172.37.2.16 172.37.2.32 172.37.2.48 172.37.2.
640 - 607 Explanation: Each interface that has the IP protocol, will show all IP addresses that were configured on that interface, with subnet masks. Incorrect Answers: A is incorrect; this only shows the IP to host mappings, like the mapping of a HOSTS table. C, D, E, and F are incorrect; these options do not provide this information. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 106-110. Q. 156 What is the connection-oriented protocol in the TCP/IP protocol stack? A. B.
640 - 607 Explanation: There are two main signaling types: Baseband and Broadband. Incorrect Answers: B is incorrect; The T is the cabling type, in this case Twisted Pair. C is incorrect; 100 is the speed, in this case 100mbps. D is incorrect; Spectrum, such as fiber, would be part of the cabling type. E is incorrect; 100 is the speed category, in this case 100mbps. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 44-45. Q. 158 Click the task button & Place the encapsulation.
640 - 607 Answer: Explanation: We can also look at this as layer functions, then sort: Step One: Physical Layer Step Two: Transport Layer Step Three: Application Layer Step Four: Data Link Layer Step Five: Network Layer Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 10-14. Leading the way in IT testing and certification tools, www.testking.
640 - 607 Q. 159 Which command displays the interfaces using a given access list? A. B. C. D. E. F. Show filters Show IP interface Show active list Show interface parameters Configure IP access list Show access-list interfaces Answer: B Explanation: The show ip interface command displays IP interface information and indicates whether any access lists are set for a specific interface. Incorrect Answers: A and C-F are incorrect; theses are not valid commands. Steve McQuerry.
640 - 607 B. C. D. E. Network IP-Address IP address IP-address subnet mask. The exit command from the enable configuration Copy running-configuration to startup-configuration Answer: C Explanation: The ip address command is used to start IP processing on a router (in fact the same command is also used to do the same on a switch. Incorrect Answers: A is incorrect; this is not a valid command. B is incorrect; the network command is most often used to identify directly connected networks.
640 - 607 Which line from a show spantree one-command output indicates that Virtual LAN1 (VLAN1) is functioning properly? A. B. C. D. E. Root mode is fast Ethernet 0/26. Port Ethernet 0/1 of VLAN is forwarding. Designated port in Ethernet 0/1 path cos10. Designated root has priority 0, address 0000.588fb600 VLAN1 is executing the IEEE compatible spanning tree protocol. Answer: E Explanation: To determine if the VLAN is functioning properly on will need to examine the first line of the output.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 413-414. Q. 165 What is the most common mail to device? A. B. C. D. Hub Router Repeater Switch Answer: D Q. 166 While you are preparing the initial configuration of your router and enable IP you find that you need to use a telnet session to check for a network address parameter. Your telnet logging and your virtual transmission session on the other device are successful.
640 - 607 B. show flash C. show Config D. show version Answer: D Explanation: the show version command displays information about the system hardware, the software version the names and sources of the configuration files and the boot images. Incorrect Answers: A is incorrect; is not a valid command. B is incorrect; the show flash command displays the contents of the Flash memory, which includes the image filenames and sizes.
640 - 607 Image text-bas: 0x80008084, database: 0x809CD49C E) Cisco 2611 (MP C860) processor (revision 0x100) with 24576K/8192K bytes of memory, Processor board ID 04614954 M860 processor, part number 0 mask 32, Bridging software, X.25 software, Version 3.0.0, 2 Ethernet/IEEE 802.3 interface(s) Answer: D Explanation: This is the result of the show version command, which displays the configuration of the system hardware, and the software version. These can be configured during the initial configuration.
640 - 607 Which encapsulation type should be used for the S0 port of router R2? A. B. C. D. SAP HDLC ARPA Novel Ether Answer: B Explanation: Router R2 S0 connects to Router R1 S0. Router R1 S0 uses HDLC, and BOTH sides must run the same protocol in order to communicate (it is like talking the same language; you can’t have one side English and the other Side French). So the correct answer is B – HDLC.
640 - 607 Which encapsulation type should be used for the e1 port of Router R3? A. B. C. D. SAP HDLC ARPA Novell-Ether Answer: D Explanation: In order for both routers to communicate they must be using the same type of encapsulation. Thereore e1 of router R3 must have novell-ether encapsulation. Incorrect Answers: A, B, and C are incorrect; the two routers must have the same encapsulation type to communicate properly thus these encapsulation types could not be used. Steve McQuerry.
640 - 607 B. C. D. 600 - 699 800 - 899 1000 - 1099 Answer: C Explanation: Access list exist for IPX traffic, just like they do with IP traffic. Like IP there are ranges for IPX access list. The IPX access list ranges are: 800 to 899 – standard access lists, 900 to 999 – extended access lists, and 1000 to 1099 – SAP filter access lists. Incorrect Answers: A is incorrect; 100-199 is the range for an extended ip access address. C is incorrect; this is not a defined access list range.
640 - 607 B is incorrect; this is not a true statement. C is incorrect; store-and-forward switching increases latency. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 162-163. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/lanswtch.htm Q. 173 Exhibit: The exhibit shows an IP address and its subnet mask. What is the last available host address for this IP subnet? A. B. C. D. E. 172.20.7.255 172.20.7.197 172.20.7.190 172.20.7.129 172.20.255.
640 - 607 Incorrect Answers: A is incorrect; this is the IP that would be used to send a broadcasts to all host of the 172.20.7 subnet. B is incorrect; with the facts of this question this is not a valid IP. D is incorrect; this is the IP address used to send a message to all hosts on the 172.20 network. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 232-234 Q. 174 What is the bit length and expression form of a MAC address? A. B. C. D. E.
640 - 607 Incorrect Answers: A, B, D are not valid IOS commands. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 94. Q. 176 Which router component stores routing tables, ARP cache, and packet buffers? A. B. C. D. ROM RAM NVRAM Flash memory Answer: B Explanation: RAM (random access memory) is used by all computers to store information. Cisco routers use RAM to store packet buffers, routing tables and ARP cache.
640 - 607 Incorrect Answers: C is incorrect; hierarchical areas make for a more efficient use of address but will not prevent loops. D is incorrect; link State is a different method than Vector Routing, they are not combined for loop elimination. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 266-270. Q. 178 Which command should you use to configure a router so that it can become a TFTP host for router system image that is run in Flash? A. B. C. D. E.
640 - 607 Incorrect Answers: A is incorrect; IOS images are stored on a tftp server and not a ftp server. This is not a valid command. B is incorrect; IOS images are stored on a tftp server and not a ftp server. This is not a valid command. C is incorrect; the copy flash tftp command actually copies the IOS from the router to the tftp server. This is the exact opposite of what the question asked. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138-140. Q.
640 - 607 This command copies the configuration in the NVRAM into the RAM. The other two commands are configure memory (an older command that can most often still be used) and configure terminal command. The configure terminal command will open the command line from which changes to the RAM can be made. Incorrect Answers: C is incorrect; this is not a valid command. D and E are incorrect; both of these commands will make changes to the NVRAM and not the RAM directly. Steve McQuerry.
640 - 607 B. Line console Login Password Cisco C. Line login terminal Password Cisco D. Line console 0 Login Password CISCO E. Line console 0 Login Password Cisco Answer: E Explanation: This is the proper procedure. Incorrect Answers: A is incorrect; this set of commands are used to establish a login password for incoming Telnet sessions. B is incorrect; the first command is incomplete. The command should be line console 0. C is incorrect; there is no such command.
640 - 607 Explanation: If you want to prevent unauthorized people from logging into your router then you should use the line console command. After this you will need to enter a password. Incorrect Answers: A is incorrect; line console 0 command is for configuring the console password not its type. B is incorrect; this command is used for console and not a serial line. D is incorrect; this command is not used to establish connection to a remote host.
640 - 607 Incorrect Answers: A is incorrect; the user mode is indicated by a > prompt. B and D are incorrect, this are not valid router prompts. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 69-70. Q. 187 Which statement about half-duplex Ethernet operation is true? A. With half duplex transmission frames feed into a single cable in one direction at a time. B.
640 - 607 E is incorrect; its speed 10 times faster, not 100 times. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 44-45. Q. 189 What is back off on an 802.3 network? A. B. C. D. It is latency stored and forward switching. It is the time used to token passing from machine to machine. It is re transmission delay that is encountered when a collision occurs.
640 - 607 Explanation: Adding an access list to a router, as a packet filter is a two-step process. First, you create the list. Then, you apply that list to any interface that you want to filter the selected traffic. Incorrect Answers: C is incorrect; an existing access list is bound to the interface D is incorrect; there is no need to copy an access list, an access list can be bound to multiple interfaces. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 310-311.
640 - 607 Q. 191 Which command displays access list 111? A. B. C. D. Show access-list 111 Show IP access list 111 Display IP address list 111 Display access-list 111 details Answer: A Explanation: To display the contents of access list 11 the show access-list 111 command would need to be used. Incorrect Answers: B is incorrect; to show the contents of all ip access lists the show ip access-lists command is required.
640 - 607 Q. 193 Given the following criteria for granting access from a remote site to your LAN : restrict access on interface E0 E0=128.12.22.55 Deny access to telnet, FTP All other types of operations. Which line should come last in configuring your access list? A. B. C. D. E. Access-List 101 Access-List 101 deny E0 telnet FTP Access list 101 allow all except FTP telnet Access list 101 permit IP 0.0.0.0 255.255.255.255 any Access List 101 deny IP 128.12.22.
640 - 607 Answer: A Explanation: When Inverse ARP is not supported by a remote router, or when you want to control broadcast traffic when using routing, you must define the address-to-DCLI table statically. These entries are referred to as static maps. Incorrect Answers: B is incorrect; defining an IP address would not have the desired effect. C is incorrect; DHCP can’t provide a mapping to a remote Frame Relay router.
640 - 607 C. D. E. 112 kps 128 kps 144 kps Answer: E Explanation: A BRI Circuit is 2 x 64K data channels plus one 16K control channel = 144K A PRI Circuit is 23 64K data channels plus one 64K control channel = 1.544M = T1 (for USA) Incorrect Answers: A is incorrect; one B channel is 64 and the one class D is 16 kbps. 54 kbps is impossible. B is incorrect; a BRI contains 2 B channels 2 x 64 = 128 plus a 16 class D channel for a total of 144 kbps.
640 - 607 A. B. C. D. Data link connection identifier (DLCIs) CNs FECNs Local management interface LMI Answer: A Explanation: The DLCI (Data-Link Connection Identifier) is a number that identifies the logical circuit between the router and the Frame Relay switch. The Frame Relay switch maps the DLCIs between each pair of routers to create a PVC. DLCIs have local significance in that the identifier references the point between the local router and the Frame Relay switch, which it is connected.
640 - 607 http://www.cisco.com/univercd/cc/td/doc/product/atm/c8540/12_0/13_19/cmd_ref/show.htm#xtocid223934 Q. 200 Which three pieces of CDP information about neighboring routers are displayed on your console terminal? (Choose three) A. B. C. D. E. The neighboring router’s host name The neighboring router’s hardware platform Up to one address for each protocol supported Up to two addresses for each protocol supported As many addresses as are configured for each protocol supported.
640 - 607 Explanation: Connection oriented protocols are reliable as the usually acknowledge the receipt of data packets. TCP is connection oriented. Incorrect Answers: A is incorrect; TCP is connection oriented and guarantees packet delivery and order. B is incorrect; TCP is connection oriented, and guarantees packet ordering C is incorrect; TCP does not mix with UDP, a different transport protocol. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 29 and 207. Q.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 217-218. Q. 204 IPX traffic using different encapsulation types can go over the same datalink. A TRUE B. FALSE Answer: A Explanation: Multiple encapsulation can be specified on an interface, but only if multiple network numbers have also been assigned, where each network number belongs to only one encapsulation type and each encapsulation type has only one network number.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 230-236. Q. 206 What is the protocol and what is the second part of the following network address? 255.255.255.255 A. B. C. D. IP, a flooded broadcast IP, a directed broadcast IPX, a flooded broadcast IPX, a remote directed broadcast Answer: A Explanation: Flooded broadcast (255.255.255.255) are not propagate and are considered local and are sent to every host on the network.
640 - 607 C is incorrect; well-known ports are functions of UDP & TCP. D is incorrect; ICMP, which is used for the ping command, does not validate routes. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 28-30. Q. 208 Calculate the number of usable networks and usable hosts for the network 210.106.14.0/24. A. B. C. D.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 99 and 167. http://www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr1902.htm Q. 210 Which two IPX encapsulation names are correctly paired with the Cisco IOS encapsulation names? (Choose two) A. B. C. D. Ethernet_II-ARPA Ethernet_802.3-SAP Ethernet_802.
640 - 607 Explanation: By partitioning the address ranges increases the availability of addresses. Instead of having one size fits all, the address ranges are pooled into different sizes to satisfy different needs, and provides a better distribution of addresses. Incorrect Answers: B is incorrect; hierarchical addressing will not effect the distance between routers. C is incorrect; Hierarchical addressing should DECREASE router memory requirements.
640 - 607 Answer: C Explanation: If no configuration file exists for the router in NVRAM, the operating system executes a question driven initial configuration routine often referred to as the system configuration dialog. This special mode is also known as the setup dialog. Incorrect Answers: A is incorrect; there is no copy mode B is incorrect; you can’t do configurations in user mode. The router only enters this mode when it has already been configured.
640 - 607 C. D. E. A network number and host number. A broadcast number and unicast number. A domain identifier and a device identifier. Answer: C Explanation: The network layer address exists at Layer 3 of the OSI reference model. These address are hierarchical in that they define networks first and then devices or nodes on each of the networks. Incorrect Answers: A is incorrect; a URL is used in the application layer, (HTTP). B is incorrect; this is describing a MAC address which is Layer 2.
640 - 607 Click the task button. Place the name of OSI layer next to its description. Leading the way in IT testing and certification tools, www.testking.
640 - 607 Answer: Explanation: The transport layer assembles the packets into data, and prepares the data for the session layer above. The Network layer determines the route of moving data. Remember the Network layer is layer 3, and routers work on layer 3. The network layer includes routing functions, and keep this in mind when the question says determines the best way to move data. On the datalink layer, the actual transmission occurs.
640 - 607 A. B. C. D. Switches create a single collision domain and a single broadcast domain. Routers provide broadcast domains. Switches create separate collision domains but a single broadcast domain. Routers provide a broadcast domains. Switches create a single collision domain and a separate broadcast domain. Router provides a broadcast domain as well. Switches create separate collision domains and separate broadcast domains. Routers provide collision domains.
640 - 607 128 64 32 16 8 x x x x 4 2 1 x x x x 5 bits of subnetting for network 3 bits of subnetting for host So, the value is 128+64+32+16+8 = 248 Incorrect Answers: A and C are incorrect; it is not even a valid subnet mask, a valid subnet mask is a continuous string of one bits, then followed by a continuous string of zero bits. Answer A and C both break this rule. B is incorrect; this is a full Class C subnet mask, and only provides for ONE network, and we need 28.
640 - 607 A. B. C. D. Bridge between management and sites. Routers to provide the most secure segmentation. A hub to provide the ease of management and a satisfactory alternative for the network security. An Ethernet switch to secure separation through programming the access list of each port of the switch. Answer: B. Explanation: Routers provide better separation, dividing the segments into both separate collision and broadcast domains, and provide access lists for controlling security.
640 - 607 Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 22. Q. 223 Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. B. C. D. E. Recipients acknowledge receipt of data. When buffers are filled to capacity, datagrams are discarded and not re transmitted. Windows are used to control the amount in outstanding acknowledged data segments.
640 - 607 C. D. The data packet is independently routed and the service does not guarantee the packet will be processed in order. A data communication path is established between the requesting entity and the peer device on the remote end system. Answer: A, B, D. Explanation: In order to establish a connection-orientated service, the connection must first be established. An example of this would the TCP/IP suites use of the three-way handshake.
640 - 607 What is an example of a valid MAC address? A. B. C. D. 192.201.63.251 19-22-01-63-25 0000.1234.FEG 00-00-12-34-FE-AA Answer: D. Explanation: MAC address is a uniquely assigned address to each device on the network. The MAC address is 48 bit in length and are expressed as hexadecimal digit. The first 6 digits specify the manufacturer ID and the remaining 6 are unique to host. No two MAC addresses can be same.
640 - 607 Incorrect Answers: A is incorrect; is this series of commands the network 10.1.0.1 is not a valid command. C is incorrect; if 4 networks are directly connected they must have their own network command. D is incorrect; there is no need to include a subnet mask with a network command. Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 278-9. Q.
640 - 607 A. B. C. D. A Filtering table is developed for each switch. Frame Tagging defines a unique user defined ID to each frame. A unique identifier is placed in the header of each frame as it is forwarding between switches. Frame Tagging is technique that examines particular information about each frame based on userdefined offsets. Answer: B, C. Explanation: Frame tagging or frame identification uniquely assigns a user-defined Id to each frame. This is sometimes referred to as VLAN ID.
640 - 607 D. The application layer must assume responsibility for correct sequencing of the data packets. Answer: A. Explanation: One of the benefits of a connection-orientated protocol is that there is a guarantee of delivery of data. This guarantee is provided as the two communicating exchange PDUs during transmission and if an acknowledgement is not received then the data is retransmitted. As can be imagined this exchange of PDUs can cause an increase in overhead.
640 - 607 In store and forward mode, the switch must receive the complete frame before forwarding takes place. The destination and source addresses are read, the cyclic redundancy check (CRC) is performed, relevant filters are applied, and the frame is forwarded. If the CRC is bad, the frame is discarded. The latency (or delay) through the switch varies with frame length. Incorrect Answers: A: Is wrong because the latency changes with the frame size.
640 - 607 Q. 236 Full Duplex Ethernet can operate between which of the following devices? (Choose two.) A. B. C. D. E. Switch to host. Switch to switch. Hub to hub. Switch to hub. Hub to host. Answer: A, B Q. 237 What is the bit pattern for the first octet of a class A network address? A. B. C. D. E. 0xxxxxxx 10xxxxxx 110xxxxx 1110xxxx 11110xxx Answer: A Explanation: Class A networks use a default subnet mask of 255.0.0.0 and have 0-126 as their first octet. 126 binary is 01111111. Q.
640 - 607 F. 201.100.5.1 Answer: C Q. 239 Which devices can be used to segment a network? (Choose three.) A. B. C. D. E. F. hub repeater switch bridge router media converter Answer: C, D, E Q. 240 Which WAN service would a small office (SOHO) most likely choose as a backup for leased lines? A. B. C. D. frame relay with svc dedicated serial line isdn with ddr atm Answer: C Q. 241 What is the effect of the following access list condition? access.list 101 permit ip 10.25.30.0 0.0.0.255 any A.
640 - 607 B. C. D. E. Permit all packets matching the last of the destination address and accept all source address. Permit all packets from the third subnet of the network address to all destinations. Permit all packets matching the host bits in the source address to all destinations. Permit all packets to destination matching the first three octets in the destination address.. Answer: A Q. 242 Which of the following should be done prior to backing up an IOS image to a network server? (Choose three.) A.
640 - 607 Q. 244 Which of the following are options for Frame Relay lmi types? (Choose three.) A. B. C. D. E. F. IETF Q931 Q933A IEEE CISCO ANSI Answer: C, E, F Q. 245 When a router boots. Which default search sequence does it use to locate the IOS software? A. B. C. D. Flash, TFTP server, ROM NVRAM, TFTP server, ROM ROM, Flash, TFTP server ROM, NVRAM, TFTP server Answer: A Q.
640 - 607 Q. 247 What is the default encapsulation type for Frame Relay on a Cisco router? A. B. C. D. E. HDLC PPP IETF Cisco ANSI Answer: C Q. 248 What is the range of binary values for the first octet in class B addresses? A. B. C. D. E. 10000000-11111111 00000000-10111111 10000000-10111111 10000000-11011111 11000000-11101111 Answer: C Q. 249 Which of the following are TCP/IP Application layer protocols? (Choose three.) A. B. C. D. E.
640 - 607 Q. 250 What is the purpose of ISL and 802.lq frame tagging? A. B. C. D. They provide best path determination. The allow the exchange of filtering tables. They specify different implementation of the Spanning-Tree Protocol. They provide interswitch VLAN communication. Answer: D Q. 251 What is the purpose of Spanning-Tree in a switched LAN? A. B. C. D. E. To provide a mechanism for network monitoring in switched environments. To prevent routing loops in networks with redundant paths.
640 - 607 Which of the following statements describe the codes displayed in the show ip route command? (Choose two.) A. B. C. D. E. I-Indicates a route was learned through an Internal protocol. S-Indicates a route was learned through static command. R-Indicates a route was learned through RIP .S-Indicates a route was learned through a serial port. R-Indicates a route was learned through a reliable port. Answer: B, C Q.
640 - 607 Q. 256 In what switch mode read first part of frame with destination address and send frame immediately? A. Store-and-forward B. Cut-through C. Fragment-free Answer: B Q. 257 Which of the following are benefits of VLANs? (Choose threee.) A. B. C. D. E. F. They increase the size of collision domains. They allow logical grouping of users by function. They enhance network security. They increase the size of broadcast domains while decreasing the number of broadcast domains.
640 - 607 Q. 259 Which of the following describes isdn bri servie? A. B. C. D. 2d+b 23d+b 2b+d 23b+d Answer: C Q. 260 What type of switching create variable latency through the switch? A. Store-and-forward B. Cut-through C. Fragment-free Answer: A Q. 261 Which of the following are used to prevent routing loops in network that use distance vector routing protocols? (Choose two.) A. B. C. D. E.
640 - 607 A new host has been connected to a workgroup switch. Although its Layer 3 configuration is correct, the host is unable to access the server resources on its network segment. What is the likely cause of this problem? A. B. C. D. The router lacks a routing table entry for the new host. The host switch port is assigned to the incorrect VLAN. The host MAC address is incorrectly configured. A VTP instance for the new host has not been installed. Answer: C Q.
640 - 607 A. B. C. D. 0x42 0x2102 0x001 0x2101 Answer: B Q. 266 What do you use for loop avoidance? (Choose two.) A. Poison reverse. B. Split horizon. C. Link state protocol. Answer: A, B Q. 267 Which of the following access list statements will deny all telnet connections to subnet 10.0.1.0/24? A. B. C. D. E. access-list 15 deny tcp 10.0.1.0 255.255.255.0 eq telnet access-list 115 deny tcp any 10.0.1.0 eq telnet access-list 115 deny udp any 10.0.1.0 eq 23 access-list 115 deny tcp any 10.0.1.0 0.0.0.
640 - 607 C. A routed protocol determines the path of a packet through a network. D. A routing protocol operates at the transport layer of the OSI model. E. A routed protocol updates the routing table of a router. Answer: A, B Q. 269 Which commands will allow you to identify the local dlci number? (Choose two.) A. B. C. D. E. show frame-relay local-dlci show frame-relay pvc show frame-relay dlci show frame-relay map show ip route Answer: B, D Q.
640 - 607 You have just finished configuring a router. The changes have been made successfully and everything is working correctly. You then save your changes and reboot the router. None of your changes are active after reboot. However, when you look at the contents of startup-config, your changes are there. Which of the following indicates the source of the problem? A. B. C. D. Hardware failure NMVRAM prevents the router from loading the configuration.
640 - 607 A network administrator has installed a new router in the Lisbon office and is unable to backup the IOS image of the new router to a TFTP server located in the Gibraltar office. Given the network diagram, identify the source of the problem. A. B. C. D. E. Incorrect default gateway of the tftp server. Incorrect subnet mask of the tftp server. Incorrect IP address of the tftp server. Incorrect IP address on E0 of the Gibraltar server. Incorrect subnet mask on the Lisbon router. Answer: E Q.
640 - 607 Q. 275 Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity? A. B. C. D. E. F. DLCI BECN FECN LMI CIR de Answer: D Q. 276 Which connection allows the use of full-duplex Ethernet? (Choose three.) A. B. C. D. E. Switch to host. Switch to switch. Hub to hub. Switch to hub. To host. Answer: A, B, E Q. 277 Identify the effect of Ctrl-Z? A. B. C. D. Exits back to privileged exec mode. Disconnects from the router.
640 - 607 Q. 278 Which WAN technology was designed to work over traditional phone lines and provide small offices and user with higher speed digital dial-up service? A. B. C. D. frame relaty x.25 ATM ISDN Answer: D Q. 279 Which WAN technology uses high-performance digital lines and IS packet switched? A. B. C. D. FDDI ISDN ATM Frame Relay Answer: D Q. 280 Question on PPP authentication. We have two Cisco routers with the hostnames Router1 and Router2.
640 - 607 Answer: A Q. 281 What are possible causes of LAN traffic congestion? (Choose four.) A. B. C. D. E. F. Too many hosts in a broadcast domain. Full Duplex operation. Broadcast storms. Multicasting. Segmentation. Low bandwidth. Answer: A, C, D, F Q. 282 What output interface status would you see if peer interface (on second end of link) is administratively down? A. B. C. D.
640 - 607 C. Private IP address node number D. Public IP address directed broadcast E. Private IP address directed broadcast Answer: C Q. 284 What IP address class is multicast? A. B. C. D. E. A B C D E Answer: D Q. 285 Which of the following metrics does IGRP use by default to determine the best path to destination? (Choose two.) A. B. C. D. E. F. Maximum Transmission Unit Cumalative Interface delay. Path bandwidth value. Reliability from source to destination. Link loading in bits-per-second.
640 - 607 A. B. C. D. Increate the idle import parameter Send interesting traffic across the link Switch Repeater Answer: B Q. 287 You got a new testing application on a new server in your office. This testing application work with a few hosts. The new server and hosts work with 10 Mbps and make a bandwidth problem for all the rest nontesting hosts. The rest of the hosts in your office network with 2 Mbps. What is the most economical decision would you implement for resolving this problem? A.
640 - 607 Answer: A Q. 289 How do you change the Console password to "cisco"? A. Router(config)# line con 0 Router(config-line)# login Router(config-line)# password cisco B. Router(config)# line con 0 Router(config-line)# login Router(config-line)# password Cisco Answer: A Q. 290 Cisco IOS allows which keystroke(s) to complete the syntax of a partially entered command? A. B. C. D. E. Ctrl+shift+6 then x. Ctrl+Z TAB /? Shift Answer: C Q.
640 - 607 Which OSI layer uses positive acknowledgement and retransmission to ensure reliable delivery? A. B. C. D. E. F. Application Presentation Session Transport Data link Physical Answer: D Q. 293 Which of the following are associated with the Presentation Layer of the OSI model? (Choose three.) A. B. C. D. E. F. Rich Text Format (RTF) Quick Time movie FTP TFTP SMTP MIDI Answer: A, B, F Q. 294 Which of the following are reasons to use a bridge to segment a network? (Choose two.) A. B. C. D. E. F.
640 - 607 Answer: B, E Q. 295 Which of the following are application layer protocols? (Choose two.) A. B. C. D. E. Ping Telnet FTP TCP IP Answer: B, C Q.296 Hosts in the Sales Department are unable to access a new server at the remote office. Consider the IP addressing scheme in the accompanying graphic to determine the problem. A. B. C. D. The default gateway of the workstations in the sales department is incorrect. The subnet mask of the workstations in the sales department in incorrect.
640 - 607 E. The serial 0 interface on the Home Office router and the serial 1 interface on the Remote Office router are not on the same subnetwork. Answer: A Q.297 Company ABC has just added an employee workstation to its network. The employee is unable to connect to the server at IP address 192.168.10.98/27. Identify the incorrectly configured network parameter. A. B. C. D. workstation IP address. workstation subnet mask. workstation default gateway. router interface E0 IP address. Answer: C Q.
640 - 607 B. ROM C. FLASH D. NVRAM Answer: D Q299 A. Serial 0 is up, line protocol is down. B. Serial 0 is down, line protocol is down. C. Serial 0 is down, line protocol is up. D. Serial is administratively down, line protocol is down. E. Serial 0 is administratively down, line protocol is up. F. Serial 0 is administratively up, line protocol is down. Answer: B Q.300 Which commands displays RIP routing updates as they are sent and received by the router? A. B. C. D. E.
640 - 607 A. B. C. D. router rip router igrp 100 router ospf 1 router eigrp 100 Answer: D Q.302 Which command must be entered when connecting two routers without external DCE devices via a serial linl? A. B. C. D. E. serial up line protocol up clock rate dce rate dte rate Answer: C Q.303 What function does the up arrow key provide within the Cisco router IOS? A. B. C. D. Recalls the previous command line. Moves the cursor one line ip. Redisplays the current command line. Capitalize the command line.
640 - 607 Which of the following statements are true regarding full-duplex Ethernet when compared to half-duplex Ethernet? (Choose two.) A. Full-duplex Ethernet consists of a shared broadcast domain, while half-duplex Ethernet consists of a private broadcast domain. B. Full-duplex Ethernet is collision free, while half-duplex Ethernet is subject to collisions. C. Full-duplex Ethernet provides higher throughput than half-duplex Ethernet of the same bandwidth. D.
640 - 607 You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address of 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis? A. B. C. D. E. ping 127.0.0.0 ping 203.125.12.1 telnet 127.0.0.1 ping 127.0.0.1 tracert 203.125.12.1 Answer: D Q.308 Which of the following is true concerning Frame Relay multipoint subinterfaces? A. B. C. D.
640 - 607 A. B. C. D. ISDN Frame Relay ATM FDDI Answer: A Q.311 A small enterprise has class C network license. The enterprise requires 5 usable subnets, each capable of accommodating at least 18 hosts. Enter the appropriate subnet mask below. Answer: 255.255.255.224 Q.312 Which command correctly configures an IP address on a Cisco router interface? A. B. C. D. E. F. router(config-if)# ip address 172.18.32.1 subnet mask 255.255.252.0 router(config-if)# 172.18.32.1 255.255.252.
640 - 607 Answer: E Q.314 Which of the following is a subnet broadcast address for network 201.57.78.0/27? A. B. C. D. E. F. 201.57.78.33 201.57.78.64 201.57.78.87 201.57.78.97 201.57.78.159 201.57.78.254 Answer: B Q.315 What is the decimal and hexadecimal equivalent of the binary number 10101010? Answer: Decimal Hexadecimal : 170 : AA Q.316 Based on the debug output shown, what type of handshake occurred for PPP authentication? A. B. C. D.
640 - 607 Answer: C Q.317 What does the word “any” mean in the following extended access list statement? access-list 101 permit ip any 192.168.69.0 0.0.0.255 eq tcp A. B. C. D. E. F. check any of the bits in the source address permit any wildcard mask for the address accept any source address check any bit in the destination address permit 255.255.255 0.0.0.0 accept any destination address Answer: C Q.318 Which command sends and receives ICMP echo messages to verify connectivity from host to host? A.
640 - 607 C. D. E. F. Physical Presentation Session Transport Answer: B Q.320 Which layer in the TCP/IP model corresponds to the OSI network layer? A. B. C. D. E. Application Transport Internet Network Physical Answer: C Q.321 You are the network administrator of the Tasti-Treats Cereal Company. You receive a call from a user who is unable to reach a server at a remote site. After further review, you discover the following information: Local PC – 10.0.3.35/24 Default gateway – 10.0.3.
640 - 607 C. D. Local NIC not functioning Remote physical layer problem Answer: B Explanation: The client was only able to ping itself, not the default gateway or the remote server. A local physical layer problem, for example a faulty patch cable, could explain the results above. Incorrect Answers: A: You would not be able to ping anything if TCP/IP was not correctly installed. C: You would not be able to ping anything of the local NIC was not functioning.
640 - 607 Answer: A, C: Q. 325 Simulation answer: Lab A enable config terminal hostname East enable secret cisco interface ethernet 0 ip address 192.168.159.1 255.255.255.0 Leading the way in IT testing and certification tools, www.testking.
640 - 607 no shutdown exit interface serial 0 clock rate 64000 ip address 192.168.75.1 no shutdown exit router rip network 192.168.159.0 network 192.168.75.0 ^z copy running-config startup-config ************************************ Lab B enable config terminal hostname Central enable secret cisco interface ethernet 0 ip address 192.168.112.1 255.255.255.0 no shutdown exit interface serial 0 clock rate 64000 ip address 192.168.201.1 no shutdown exit interface serial 1 ip address 192.168.75.
640 - 607 network 192.168.75.0 ^z copy running-config startup-config ****************************************** Lab C enable config terminal hostname West enable secret cisco interface ethernet 0 ip address 192.168.65.1 255.255.255.0 no shutdown exit interface serial 1 ip address 192.168.201.1 no shutdown exit router rip network 192.168.201.0 network 192.168.65.0 ^z copy running-config startup-config Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 374-403.
640 - 607 Q. 326 Simulation answer: ____________________________________________ enable config terminal enable secret silver line vty 0 4 login password graphlte ^z copy running-config startup-config Wendell Odom. Cisco CCNA Exam #640-507 Certification Guide. (Cisco Press: 2000) pages 28-30. Leading the way in IT testing and certification tools, www.testking.
640 - 607 Q327. Answer: Unknown Leading the way in IT testing and certification tools, www.testking.
640 - 607 Q.328 Answer: Unknown Leading the way in IT testing and certification tools, www.testking.