Al's ICND1 Practice Test #1

Revised April 15, 2008

(If you find any errors, let me know!)

1. Routing occurs at which OSI layer?

  1. Physical
  2. Data link
  3. Network
  4. Transport

2. When using the router CLI, what hot-key sequence moves the cursor to the beginning of the current line?

  1. <CTRL> A
  2. <CTRL> B
  3. <CTRL> E
  4. <ESC> E

3. Which command displays a router's active configuration?

  1. show active-config
  2. show current-config
  3. show running-config
  4. show startup-config

4. What bit pattern is contained in the first octet of a class C IP address?
  1. 110xxxxx
  2. 0xxxxxxx
  3. 10xxxxxx
  4. 1111xxxx

5. The OSI term for a transport layer PDU is?

  1. Bit
  2. Packet
  3. Segment
  4. Frame

6. When using the router CLI, what hot-key sequence moves the cursor to the end of the current line?

  1. <CTRL> A
  2. <CTRL> E
  3. <CTRL> X
  4. <ESC> B

7. RIP is considered a "distance-vector" routing protocols because it?

  1. Uses hop count as its metric.
  2. Uses triggered updates.
  3. Is RFC-compliant.
  4. Periodically floods its routing table.

8. A UDP header contains which of the following fields?

  1. Sequence Number
  2. Port Number
  3. Acknowledgment Number
  4. Window Size

9. Which sequence of commands assign the IP address 1.2.3.4/16 to a router's FastEthernet 0/2 interface?

  1. Router1(config)#interface fa0/2
    Router1(config-if)#ip address 1.2.3.4/16
  2. Router1(config)#interface fast0/2
    Router1(config-if)#ip address 1.2.3.4 255.255.0.0
  3. Router1(config)#interface FastEthernet 0/2
    Router1(config-if)#ip address 1.2.3.4 mask 255.255.0.0
  4. Router1(config)#interface Fast 0/2
    Router1(config-if)#address 1.2.3.4 mask /16

10. A class B network with a subnet mask of 255.255.254.0 can support?

  1. 254 subnets, 254 hosts per subnet
  2. 128 subnets, 510 hosts per subnet
  3. 512 subnets, 128 hosts per subnet
  4. A 255.255.254.0 mask cannot be used with a class B network.

11. How many hosts can be placed on the 172.16.74.208/28 subnet?

  1. Fourteen.
  2. Sixteen
  3. Twenty-eight.
  4. Thirty-two.

12. What would be the result of performing a "reload" on a router that has its configuration register set to "0x2100"?

  1. The router would boot from Flash.
  2. The router would boot the mini-IOS from ROM.
  3. The router would boot the ROM monitor.
  4. The router would boot from NVRAM.

13. Given a subnet mask of 255.255.255.248, to which subnet does the host address 192.168.217.45 belong?

  1. 192.168.217.0/24
  2. 192.168.217.40/21
  3. 192.168.217.16/29
  4. 192.168.217.40/29

14. Which command initiates a file copy from a router's active configuration to a TFTP server?

  1. copy file server
  2. copy run tftp
  3. copy tftp running-config
  4. copy running-configuration tftp-server

15. What is the length of an Ethernet MAC address?

  1. 32 bits
  2. 32 bytes
  3. 48 bits
  4. 48 bytes

16. Which command displays the elapsed time since a router's last restart?

  1. show time
  2. show version
  3. show clock
  4. show reload

17. How many collision and broadcast domains exist within an eight port Ethernet switch that has all ports on VLAN 1?

  1. 1 collision, 8 broadcast
  2. 2 collision, 6 broadcast
  3. 4 collision, 4 broadcast
  4. 8 collision, 1 broadcast

18. Which progression is followed during router startup?

  1. POST, find/load startup config, find/load IOS
  2. Find/load IOS, find/load startup config, POST
  3. POST, find/load IOS, find/load startup config
  4. Find/load startup config, POST, find/load IOS

19. What is the purpose of a TCP destination port number?

  1. To specify the application that should receive the data.
  2. To specify the application that sent the data.
  3. To specify the network layer protocol in use.
  4. To specify the IP address of the destination.

20. On a Class B network with a "/26" mask, how many subnets and how many hosts per subnet can be supported?

  1. 1024 subnets, 64 hosts per subnet
  2. 1022 subnets, 62 hosts per subnet
  3. 1024 subnets, 62 hosts per subnet
  4. It is impossible to tell from the information given.

21. If six VLANs are configured on a twenty-four port Ethernet switch, how many collision and broadcast domains exist within the switch?

  1. Six collision, twenty-four broadcast
  2. Six collision, six broadcast
  3. Twenty-four collision, twenty-four broadcast
  4. Twenty-four collision, six broadcast

22. What is the length of an IP version 4 address?

  1. 32 bits
  2. 32 bytes
  3. 48 bits
  4. 48 bytes

23. What type of cable is typically used to connect a host's NIC to an Ethernet switch port?

  1. Category 5 "straight-through"
  2. Category 5 "crossover"
  3. Category 5 "rolled"
  4. Category 5 "host"

24. What is the purpose of the "Window" field in a TCP header?

  1. To acknowledge a particular sequence number.
  2. To specify the number of TCP segments that can be transmitted without receiving an acknowledgement.
  3. To request that a segment be retransmitted.
  4. To allow the NSA to observe your data in accordance with the USA Patriot Act of 2001 (Public Law 107-56).
  5. To specify the number of bytes of data that can be sent without receiving an acknowledgement.

25. Which of the following are IPv4 IGP's?

  1. RIPv1
  2. RIPv2
  3. OSPF
  4. EIGRP

26. What is indicated by an amber LED above a switch interface?

  1. That the interface's green LED has burned out.
  2. That the interface is an IEEE 802.1Q VLAN trunk.
  3. That the LED will soon turn red, so the packets should slow down.
  4. That the interface is administratively disabled.
  5. That the interface is active, but blocking user data for some reason.

27. Which of the following are delay-sensitive applications that use UDP?

  1. FTP
  2. VoIP
  3. TFTP
  4. Video
  5. RARP

28. In which format are MAC addresses commonly displayed?

  1. Octal
  2. Decimal
  3. Hexadecimal
  4. None of these, they use the metric system.

29. When using the Cisco IOS CLI, which key sequence redisplays the previous command?

  1. <CTRL> A
  2. <ESC> B
  3. <CTRL> P
  4. <ESC> P
  5. <CTRL> N

30. Which layer of the TCP/IP model is responsible for bit encoding?

  1. Application
  2. Transport
  3. Internet
  4. Network Access

31. What is the metric used by RIPv2?

  1. Autonomous System Number
  2. Hops
  3. MTU
  4. Cost
  5. A composite of bandwidth and delay
  6. Meters

32. What is the maximum distance allowed for a 100Base-TX segment?

  1. 328 feet
  2. 100 kilometers
  3. 100 furlongs
  4. 100 parsecs

33. What is the definition of "MTU"?

  1. Mainframe Terminal Unit - The politically correct name for a "dumb terminal"
  2. Minimum TCP Unit - the smallest TCP segment that will not result in a frame of less than 64 bytes.
  3. Maximum Transmission Unit - the largest packet that can fit in a legally-sized frame.
  4. Matador Trampling Unit - the quantity by which rodeo bulls are measured.

34. Which Cisco IOS command displays the status of all router interfaces?

  1. show router interface status
  2. show interfaces
  3. show status
  4. display ip interface

35. What is the difference between a "frame" and a "cell"?

  1. A frame is a layer-two PDU, a cell is a layer-three PDU.
  2. A bad frame is confined to a cell until it is placed on parole.
  3. A cell is a fixed-length frame.
  4. There are always 53 ATM cells to an Ethernet frame.

36. What of the following does RIPv2 offer that RIPv1 does not?

  1. Triggered incremental updates to speed convergence.
  2. Multicast updates to reduce CPU impact on non-router hosts.
  3. Optional MD5 authentication.
  4. Split-horizon with poison-reverse to reduce the chance of routing loops.
  5. Classless routing that supports VLSM and discontiguous networks.

37. Where is the POST code located?

  1. Flash
  2. NVRAM
  3. RAM
  4. ROM
  5. On a TFTP server
  6. Across the isle from the General Mills code.

38. What happens when a file is transferred into RAM using "copy tftp running-config"?

  1. The contents of the file are appended to the running configuration.
  2. The contents of the file completely overwrite the running configuration.
  3. The contents of the file are merged into the running configuration.
  4. The contents of the file are merged into NVRAM.

39. What is the purpose of the "clock rate" command?

  1. To set the available bandwidth for routing protocols.
  2. To set the data rate of an asynchronous serial interface.
  3. To set the OSPF cost of an interface.
  4. To set the data rate of a DCE interface.

40. Which of the following are legal subnet masks?

  1. 240.0.0.0
  2. 255.255.248.0
  3. 255.255.254.224
  4. 255.255.255.254
  5. 0.255.255.255

41. Which key sequence suspends a Telnet session?

  1. <CTRL> <ALT> <DEL>
  2. <CTRL> <SHIFT> <6> x
  3. <ESC> <DEL> <HOME> x
  4. <BREAK> <HOME> <CAPSLOCK>

42. What is the function of DHCP?

  1. To automatically assign IP addresses to hosts.
  2. To automatically assign MAC addresses to hosts.
  3. To automatically assign names to hosts.
  4. To convert an IPv4 address into an IPv6 address.

43. Which of the following items might a DHCP server supply to a client?

  1. Subnet mask
  2. DNS server address
  3. IP address
  4. MAC address
  5. Default gateway
  6. All of the above.

44. Which of the following are characteristics of a computer network?

  1. Color
  2. Speed
  3. Charm
  4. Reliability
  5. Grace
  6. Topology
  7. Security
  8. Cost

45. Which subnets mask is equivalent to "/30"?

  1. 255.225.225.252
  2. 255.255.255.224
  3. 255.255.255.248
  4. 255.255.255.252
  5. 255.255.255.254

46. Which subnet mask allows for at least 63 hosts per subnet and at least 87 subnets on a class B network?

  1. 255.255.255.192
  2. /24
  3. 255.255.248.0
  4. /20
  5. 255.255.0.0

47. Which command terminates an inbound Telnet session?

  1. Router>clear line 2
  2. Router>disconnect line 2
  3. Router#clear line 2
  4. Router#disconnect line 2
  5. Router(config)#clear line 2

48. Which of the following are computer network topologies?

  1. Ring
  2. Helix
  3. Bus
  4. Spiral
  5. Star
  6. Curlicue
  7. Mesh

49. What is "DoS"?

  1. Department of Security
  2. Denial of Service
  3. Dial-on Switching
  4. Double or Single

50. Which of the following is a strong password?

  1. Cisco
  2. san-fran
  3. July!4!!
  4. Heather
  5. ROUTER


ANSWERS

 1. C       11. A       21. D       31. B       41. B
 2. A       12. C       22. A       32. A       42. A
 3. C       13. D       23. A       33. C       43. ABCE
 4. A       14. B       24. E       34. B       44. BDFGH
 5. C       15. C       25. ABCD    35. C       45. D
 6. B       16. B       26. E       36. BCE     46. B
 7. D       17. D       27. BD      37. D       47. C
 8. B       18. C       28. C       38. C       48. ACEG
 9. B       19. A       29. C       39. D       49. B
10. B       20. C       30. D       40. ABD     50. C


NOTES
4. Since 11000000 is 192, and 1101111 is 223, 110xxxxx covers the range of class "C" addresses.
5. "PDU" is "Protocol Data Unit".
7. The routing table is a list of destinations and distances, and is thus a multi-valued variable (a "vector", in mathematical terms).
10. With a class B network, this mask specifies seven subnet bits (128 subnets) and nine host bits (510 hosts/subnet).
11. A "/28" mask specifies four host bits, and two to the fourth minus two is 14.
12. The right-most hex digit (least-significant four bits) of the config register is the "boot field". Setting it to zero specifies that the router start ROMMON.
13. With a 255.255.255.248 mask (/29), the subnets increment by eight (0, 8, 16, 24, 32, 40, 48 ...), so the host is on the "40" subnet.
17. Each port on a switch is a collision domain, and each VLAN is a broadcast domain.
20. The default mask for a class B is /16, so a /26 mask specifies ten subnet bits (1024 subnets), and six host bits (62 hosts per subnet).
21. Each port on a switch is a collision domain, and each VLAN is a broadcast domain.
29. <CTRL> P (for "previous") is the same as the "up arrow".
30. The "Network Access" layer of the TCP/IP model corresponds to layers one and two of the OSI model. Bit encoding is a Layer-1 (Physical layer) function.
32. 328 feet is approximately equal to 100 meters.
39. The "clock rate" command is not normally used on a production router.
40. The ones in a subnet mask must be "contiguous" (form an unbroken string) starting from the left.
45. A "225" is not a "255"!
46. Sixty-three subnets requires at least six subnet bits, and 87 hosts/subnet requires at least seven host bits. Answer "A" has too few host bits, "C", "D" and "E" have too few subnet bits.
47. You have to be in privileged mode to execute the "clear line" command.
50. Strong passwords contain mixed-case letters, along with numbers and special symbols.


Return to the top of this Exercise!

Return to the directory of Goodies!


Copyright © 2008
Alchemy, Inc.
All rights reserved.