2019 Final Dien Tu Vien Thong 01
2019 Final Dien Tu Vien Thong 01
2019 Final Dien Tu Vien Thong 01
Mã đề thi 01
Question 1. Which statements correctly describe steps in the OSI data encapsulation process?
A. The transport layer divides a data stream into segments and may add reliability and flow
control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination
host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to
a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Answer: A D
Question 2. What layer of the OSI Model is included in TCP/IP Model‟s INTERNET layer?
A. Application
B. Session
C. Data Link
D. Presentation
E. Network
Answer: E
1
Question 3. Which layer in the OSI reference model is responsible for determining the
availability of the receiving program and checking to see if enough resources exist for that
communication?
A. transport
B. network
C. presentation
D. session
E. application
Answer: E
Question 4. Which three encapsulation layers in the OSI model are combined into the TCP/IP
application layer? (Choose three)
A. Session
B. Transport
C. Presentation
D. Application
E. Data-link
F. Network
Answer: A C D
Question 5. Which command can you enter to determine whether serial interface 0/2/0 has been
configured using HDLC encapsulation?
A. router#show platform
B. router#show ip interface s0/2/0
C. router#show interfaces Serial 0/2/0
D. router#show ip interface brief
Answer: C
2
Question 6. Which Layer 2 protocol encapsulation type supports synchronous and asynchronous
circuits and has built-in security mechanisms?
A. X.25
B. HDLC
C. PPP
D. Frame Relay
Answer: C
Question 7. Which of the following describes the roles of devices in a WAN? (Choose three)
A. A CSU/DSU terminates a digital local loop
B. A modem terminates a digital local loop
C. A CSU/DSU terminates an analog local loop
D. A modem terminates an analog local loop
E. A router is commonly considered a DTE device
F. A router is commonly considered a DCE device
Answers: A D E
Question 8. Which part of the PPPoE server configuration contains the information used to
assign an IP address to a PPPoE client?
A. virtual-template interface
B. DHCP
C. dialer interface
D. AAA authentication
Answer: A
Question 9. Which switching method duplicates the first six bytes of a frame before making a
switching decision?
A. fragment-free switching
B. cut-through switching
3
C. store-and-forward switching
D. ASIC switching
Answer: B
Question 10. Refer to the exhibit. What is the effect of the given configuration?
Switch#configuration terminal
Switch#interface VLAN 1
Switch(config-if)#ip address
192.168.2.2 255.255.255.0
Switch(config-if)#end
Question 14. Configuration of which option is required on a Cisco switch for the Cisco IP phone
to work?
A. PortFast on the interface
B. the interface as an access port to allow the voice VLAN ID
C. a voice VLAN ID in interface and global configuration mode
D. Cisco Discovery Protocol in global configuration mode
Answer: B
Question 15. Which three statements accurately describe layer 2 Ethernet switches? (choose
three)
A. Microsegmentation decreases the number of collisions on the network.
B. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths, each switched segment will
contain one root bridge with all its ports in the forwarding state. All other switches in that
broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and
layer 3 address information.
Answer: A D E
5
Question 16. Which utility can you use to determine whether a switch can send echo requests
and replies?
A. ping
B. traceroute
C. ssh
D. telnet
Answer: A
Question 17. On which type of port can switches interconnect for multi-VLAN communication?
A. interface port
B. access port
C. switch port
D. trunk port
Answer: D
Question 18. Which two types of information are held in the MAC address table? (Choose two)
A. MAC address
B. source IP address
C. destination IP address
D. Protocols
E. Port numbers
Answer: A E
Question 19. What are three benefits of implementing VLANs? (Choose three)
A. A more efficient use of bandwidth can be achieved allowing many physical groups to use the
same network infrastructure.
B. A higher level of network security can be reached by separating sensitive data traffic from
other
network traffic.
6
C. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus
reducing their size.
D. A more efficient use of bandwidth can be achieved allowing many logical networks to use the
same network infrastructure.
E. Port-based VLANs increase switch-port use efficiency, thanks to 802.1 Q trunks.
F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all
belong to the same broadcast domain. Broadcast storms can be mitigated by decreasing the
number of broadcast domains, thus increasing their size.
Answer: B C D
Question 20. Which command can you enter to view the ports that are assigned to VLAN 20?
A. Switch#show ip interface brief
B. Switch#show interface vlan 20
C. Switch#show ip interface vlan 20
D. Switch#show vlan id 20
Answer: D
Question 21. Which two circumstances can cause collision domain issues on VLAN domain?
(Choose two)
A. duplex mismatches on Ethernet segments in the same VLAN
B. multiple errors on switchport interfaces
C. congestion on the switch inband path
D. a failing NIC in an end device
E. an overloaded shared segment
Answer: A C
7
C. 10
D. 1024
Answer: B
Question 24. Which statement about vlan operation on Cisco Catalyst switches is true?
A. when a packet is received from an 802.1Q trunk, the vlan id can be determined from the
source MAC address table.
B. unknown unicast frames are retransmitted only to the ports that belong to the same vlan.
C. ports between switches should be configured in access mode so that vlans can span across the
ports.
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
Answer: B
Question 25. Which two statements about data VLANs on access ports are true ? (Choose two)
A. They can be configured as trunk ports
B. Two or more VLANs can be configured on the interface
C. 802.1Q encapsulation must be configured on the interface
D. Exactly one VLAN can be configured on the interface.
E. They can be configured as host ports.
Answer: D E
8
Question 26. Which feature facilitates the tagging of frames on a specific VLAN?
A. Routing
B. Hairpinning
C. Switching
D. Encapsulation
Answer: D
Question 27. Assuming the default switch configuration which vlan range can be added
modified and removed on a Cisco switch?
A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005
Answer: A
Question 28. Which DTP switchport mode allow the port to create a trunk port if the the port is
in trunk, dynamic auto and dynamic desirable mode?
A. Dynamic Auto
B. Dynamic Desirable
C. Access
D. Trunk
Answer: B
Question 29. What is the function of the command switchport trunk native vlan 999 on a trunk
port?
A. It designates VLAN 999 for untagged traffic.
B. It blocks VLAN 999 traffic from passing on the trunk.
C. It creates a VLAN 999 interface.
D. It designates VLAN 999 as the default for all unknown tagged traffic.
9
Answer: A
Question 30. If the primary root bridge experiences a power loss, which switch takes over?
A. switch 0040.0ВС0.90C5
B. switch 00E0.F90B.6BE3
C. switch 0004.9A1A.C182
D. switch 00E0.F726.3DC6
Answer: C
Question 31. If primary and secondary root switches with priority 16384 both experience
catastrophic losses, which tertiary switch can take over?
A. a switch with priority 20480
B. a switch with priority 8192
C. a switch with priority 4096
D. a switch with priority 12288
Answer: A
Question 32. Which spanning-tree protocol rides on top of another spanning-tree protocol?
A. MSTP
B. RSTP
C. PVST+
D. Mono Spanning Tree
Answer: A
Question 33. Which IEEE standard does PVST+ use to tunnel information?
A. 802.1x
B. 802.1q
C. 802.1w
10
D. 802.1s
Answer: B
Question 35. A network administrator needs to configure port security on a switch. Which two
statements are true? (Choose two)
A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the
voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the
running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface, the switch can learn new
addresses up to the maximum defined.
Answer: C E
Question 36. Which option is the default switch port port-security violation mode?
A. shutdown
B. protect
C. shutdown vlan
D. restrict
Answer: A
11
Question 37. By default, how many MAC addresses are permitted to be learned on a switch port
with port security enabled?
A. 8
B. 2
C. 1
D. 0
Answer: C
Question 38. Which type of device can be replaced by the use of subinterfaces for VLAN
routing?
A. Layer 2 bridge
B. Layer 2 switch
C. Layer 3 switch
D. router
Answer: C
Question 39. Which technology can enable multiple VLANs to communicate with one another?
A. inter-VLAN routing using a Layer 3 switch
B. inter-VLAN routing using a Layer 2 switch
C. intra-VLAN routing using router on a stick
D. intra-VLAN routing using a Layer 3 switch
Answer: A
Question 40. Which step in the router boot process searches for an IOS image to load into the
router?
A. bootstrap
B. POST
C. mini-IOS
D. ROMMON mode
Answer: A
12
Question 41. If a router has four interfaces and each interface is connected to four switches, how
many broadcast domains are present on the router?
A. 1
B. 2
C. 4
D. 8
Answer: C
Question 42. A router has learned three possible routes that could be used to reach a destination
network. One route is from EIGRP and has a composite metric of 20514560. Another route is
from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or
routes will the router install in the routing table?
A. the RIPv2 route
B. all three routes
C. the OSPF and RIPv2 routes
D. the OSPF route
E. the EIGRP route
Answer: E
Question 43. A router has learned three possible routes that could be used to reach a destination
network. One route is from EIGRP and has a composite metric of 20514560. Another route is
from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or
routes will the router install in the routing table?
A. the RIPv2 route
B. all three routes
C. the OSPF and RIPv2 routes
D. the OSPF route
E. the EIGRP route
Answer: E
13
Question 44. How to configure RIPv2? (Choose two)
A. Enable RIP
B. Connect RIP to WAN interface
C. Enable auto-summary
D. Enable authentication
Answer: A
Question 45. Which two options are requirements for configuring RIPv2 for IPv4 (Choose two)?
A. enabling RIP authentication
B. connecting RIP to a WAN Interface
C. enabling auto route summarization
D. allowing unicast updates for RIP
E. enabling RIP on the router
Answer: D E
Question 47. Which three statements about link-state routing are true? (Choose three)
A. It uses split horizon.
B. Updates are sent to a broadcast address.
C. RIP is a link-state protocol.
14
D. Updates are sent to a multicast address by default.
E. Routes are updated when a change in topology occurs.
F. OSPF is a link-state protocol.
Answer: D E F
Question 48. Which three characteristics are representative of a link-state routing protocol?
(Choose three)
A. provides common view of entire topology
B. exchanges routing tables with neighbors
C. calculates shortest path
D. utilizes event-triggered updates
E.utilizes frequent periodic updates
Answer: A C D
Question 49. What are two drawbacks of implementing a link-state routing protocol? (Choose
two)
A. the sequencing and acknowledgment of link-state packets
B. the high volume of link-state advertisements in a converged network
C. the requirement for a hierarchical IP addressing scheme for optimal functionality
D. the high demand on router resources to run the link-state routing algorithm
E. the large size of the topology table listing all advertised routes in the converged network
Answer: C D
Question 50
What is the effect of the overload keyword in a static NAT translation configuration?
A. It enables port address translation.
B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.
15
D. It enables the outside interface to forward traffic.
Answer: A
Question 51. Which two types of NAT addresses are used in a Cisco NAT device? (Choose two)
A. inside local
B. inside global
C. inside private
D. outside private
E. external global
F. external local
Answer: A B
Question 52. What is the danger of the “permit any” entry in a NAT access list?
A. It can lead to overloaded resources on the router.
B. It can cause too many addresses to be assigned to the same interface.
C. It can disable the overload command.
D. It prevents the correct translation of IP addresses on the inside network.
Answer: A
Question 53. Which type of address is the public IP address of a NAT device?
A. outside global
B. outside local
C. inside global
D. inside local
E. outside public
F. inside public
Answer: C
16
Question 54. Which command can you enter to display the hits counter for NAT traffic?
A. show ip nat statistics
B. debug ip nat
C. show ip debug nat
D. clear ip nat statistics
Answer: A
A. ICANN
B. APNIC
C. RIR
D. ISPs
Answer: D
Question 57. Where does the configuration reside when a helper address is configured to support
DHCP?
A. on the switch trunk interface.
B. on the router closest to the client.
C. on the router closest to the server.
17
D. on every router along the path.
Answer: B
Question 59. Which NTP command configures the local device as an NTP reference clock
source?
A. ntp peer
B. ntp broadcast
C. ntp master
D. ntp server
Answer: C
Question 60. Which of the following privilege level is the most secured?
A. Level 0
B. Level 1
C. Level 15
D. Level 16
Answer: C
18