Expert Answers

1.        The access list type that only examines the source IP address in a packet is:
A.      Source Access List
B.       Standard Access Lists
C.       Extended Access Lists
D.      Simple Access Lists

2.       Indicate whether the following statements are either true or false.
A.      Packets are always compared to each line of the access list in sequential order.
B.       Packets are compared to all lines of the access list.
C.       There is an implicit “deny” at the beginning of each access list.

3.       Extended access lists (IP) check for which of the following?
A.      Source IP address
B.       Destination IP address
C.       Protocol field
D.      Port number

4.       Standard access lists (IP) check for which of the following?
A.      Source IP address
B.       Destination IP address
C.       Protocol field
D.      Port number

5.        Which routing protocol by default uses bandwidth and delay as metrics?
A.      RIP
B.       BGP
C.       EIGRP
D.      OSPF

6.       When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined?
A.      It is supplied by the CSU/DSU
B.       It is supplied by the far end router
C.       it is determined by the clock rate command
D.      it is supplied by the layer 1 bit streaming clocking and timing rules

7.        What command mode must you be in if you wish to change the configuration of a router?
A.      User mode
B.       Administrative Exec mode
C.       Privileged mode
D.      Superuser mode

8.       When setting the auxiliary password what command must you remember to use so the router will prompt for authentication?
A.      Logon
B.       Login
C.       Authentication
D.      Password

9.      What are two reasons that a network administrator would use access lists? (choose two)
A.      to control vty access into a router
B.       to control broadcast traffic through a router
C.       to filter traffic as it passes through a router
D.      to filter traffic that originates from a router

10.      Which protocol should you block with an ACL to stop a ping into your corporate network?
A.      IP
B.       TCP
C.       ICMP
D.      UDP
E.       ARP

11.      When discussing reserved IP addresses which of the following is interpreted to mean “all networks?”
A.      Node address of all 1s
B.       Network address of all 1s
C.       Network address of all 0s
D.      Node address of all 0s

12.      True or False: Using route distribution, routers within an autonomous system can use different AS numbers to communicate routing information.
A.      True
B.       False

13.     Frame Relay provides a communications interface between which of the following?
A.      Demarc and the CO
B.       Demarc and the local loop
C.       DTE and DCE
D.      DTE and the CO

14.     Frame Relay virtual circuits are identified by which of the following?
A.      VPI
B.       DLCI
C.       VCI
D.      CSU/DSU

15.     __________ identify the virtual circuit (PVC or SVC) to the routers and provider’s switches participating in the Frame Relay network.

16.     ___________ is a signaling standard between a CPE device (router) and a frame switch and is responsible for managing and maintaining status between these devices.