Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
CISCO 100-490 Supporting Cisco Routing and Switching Network Devices v3.0 – Quiz 01 covered:
CISCO 100-490 Supporting Cisco Routing and Switching Network Devices v3.0
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
What is the primary function of the Network layer in the OSI model?
Correct
Explanation: According to the OSI model, the Network layer (Layer 3) is responsible for logical addressing and routing of packets. This layer adds logical addressing information (such as IP addresses) to the data received from the Transport layer and determines the best path for data to travel through the network based on routing protocols like OSPF or EIGRP.
Incorrect
Explanation: According to the OSI model, the Network layer (Layer 3) is responsible for logical addressing and routing of packets. This layer adds logical addressing information (such as IP addresses) to the data received from the Transport layer and determines the best path for data to travel through the network based on routing protocols like OSPF or EIGRP.
-
Question 2 of 30
2. Question
Which protocol is used to prevent loops in Ethernet networks and ensures a loop-free topology?
Correct
Explanation: Spanning Tree Protocol (STP) is used to prevent loops in Ethernet networks by actively blocking redundant paths, thus ensuring a loop-free topology. STP calculates the shortest path to the root bridge and blocks redundant paths to avoid loops while allowing for network redundancy.
Incorrect
Explanation: Spanning Tree Protocol (STP) is used to prevent loops in Ethernet networks by actively blocking redundant paths, thus ensuring a loop-free topology. STP calculates the shortest path to the root bridge and blocks redundant paths to avoid loops while allowing for network redundancy.
-
Question 3 of 30
3. Question
In Cisco IOS, what is the purpose of the “privileged EXEC mode”?
Correct
Explanation: The “privileged EXEC mode” in Cisco IOS provides access to all available commands on the device, allowing administrators to perform advanced configuration tasks such as modifying routing tables, configuring access control lists (ACLs), and managing system resources. This mode is typically accessed using the “enable” command after logging into the device.
Incorrect
Explanation: The “privileged EXEC mode” in Cisco IOS provides access to all available commands on the device, allowing administrators to perform advanced configuration tasks such as modifying routing tables, configuring access control lists (ACLs), and managing system resources. This mode is typically accessed using the “enable” command after logging into the device.
-
Question 4 of 30
4. Question
What is the purpose of subnetting in TCP/IP networking?
Correct
Explanation: Subnetting divides a larger network into smaller, more manageable subnetworks, thereby increasing the number of available IP addresses within the network. This helps in efficient address allocation and reduces IP address wastage.
Incorrect
Explanation: Subnetting divides a larger network into smaller, more manageable subnetworks, thereby increasing the number of available IP addresses within the network. This helps in efficient address allocation and reduces IP address wastage.
-
Question 5 of 30
5. Question
Which Cisco device is typically used to connect multiple network segments together and forward data based on MAC addresses?
Correct
Explanation: Cisco Catalyst switches are commonly used to connect multiple network segments within a LAN and forward data based on MAC addresses at Layer 2 of the OSI model.
Incorrect
Explanation: Cisco Catalyst switches are commonly used to connect multiple network segments within a LAN and forward data based on MAC addresses at Layer 2 of the OSI model.
-
Question 6 of 30
6. Question
When troubleshooting network connectivity issues, which tool is commonly used to identify the route that packets take to reach their destination?
Correct
Explanation: Traceroute is a diagnostic tool used to identify the route that packets take from the source to the destination. It shows the IP addresses of all the routers that the packets pass through, helping in diagnosing connectivity issues along the path.
Incorrect
Explanation: Traceroute is a diagnostic tool used to identify the route that packets take from the source to the destination. It shows the IP addresses of all the routers that the packets pass through, helping in diagnosing connectivity issues along the path.
-
Question 7 of 30
7. Question
Which routing protocol typically uses the Dijkstra algorithm to calculate the best path to a destination network?
Correct
Explanation: OSPF (Open Shortest Path First) is a link-state routing protocol that typically uses the Dijkstra algorithm to calculate the best path to a destination network based on metrics such as cost or bandwidth.
Incorrect
Explanation: OSPF (Open Shortest Path First) is a link-state routing protocol that typically uses the Dijkstra algorithm to calculate the best path to a destination network based on metrics such as cost or bandwidth.
-
Question 8 of 30
8. Question
In Cisco IOS, what is the purpose of the “global configuration mode”?
Correct
Explanation: The “global configuration mode” in Cisco IOS is used to configure device-specific settings and parameters, such as interface configurations, routing protocols, and device hostname. Commands entered in this mode affect the entire device.
Incorrect
Explanation: The “global configuration mode” in Cisco IOS is used to configure device-specific settings and parameters, such as interface configurations, routing protocols, and device hostname. Commands entered in this mode affect the entire device.
-
Question 9 of 30
9. Question
Which protocol provides secure remote access to Cisco devices for configuration and management?
Correct
Explanation: SSH (Secure Shell) provides encrypted and secure remote access to Cisco devices for configuration and management. It is preferred over Telnet due to its enhanced security features, including encryption of data transmitted over the network.
Incorrect
Explanation: SSH (Secure Shell) provides encrypted and secure remote access to Cisco devices for configuration and management. It is preferred over Telnet due to its enhanced security features, including encryption of data transmitted over the network.
-
Question 10 of 30
10. Question
What is the purpose of VLANs (Virtual Local Area Networks) in a switched network?
Correct
Explanation: VLANs are used to segment a switched network into smaller broadcast domains, thereby reducing the broadcast traffic on each segment and improving network performance and security. Each VLAN operates as a separate logical network, even though devices may physically connect to the same switch.
Incorrect
Explanation: VLANs are used to segment a switched network into smaller broadcast domains, thereby reducing the broadcast traffic on each segment and improving network performance and security. Each VLAN operates as a separate logical network, even though devices may physically connect to the same switch.
-
Question 11 of 30
11. Question
When troubleshooting network issues, what is the purpose of using a loopback interface on a Cisco device?
Correct
Explanation: A loopback interface is a virtual interface on a Cisco device that allows for testing and troubleshooting without requiring physical connectivity to the network. It can be configured with an IP address and used to generate simulated network traffic for testing purposes.
Incorrect
Explanation: A loopback interface is a virtual interface on a Cisco device that allows for testing and troubleshooting without requiring physical connectivity to the network. It can be configured with an IP address and used to generate simulated network traffic for testing purposes.
-
Question 12 of 30
12. Question
What is the first step in the troubleshooting process when dealing with a network issue?
Correct
Explanation: The first step in the troubleshooting process is to identify the problem by gathering information, analyzing symptoms, and determining the scope and impact of the issue. Once the problem is clearly defined, appropriate steps can be taken to resolve it.
Incorrect
Explanation: The first step in the troubleshooting process is to identify the problem by gathering information, analyzing symptoms, and determining the scope and impact of the issue. Once the problem is clearly defined, appropriate steps can be taken to resolve it.
-
Question 13 of 30
13. Question
Which Cisco device is typically used to connect different networks together and forward data based on IP addresses?
Correct
Explanation: Cisco ISR (Integrated Services Router) routers are typically used to connect different networks together and forward data based on IP addresses at Layer 3 of the OSI model.
Incorrect
Explanation: Cisco ISR (Integrated Services Router) routers are typically used to connect different networks together and forward data based on IP addresses at Layer 3 of the OSI model.
-
Question 14 of 30
14. Question
What is the primary function of the ping command in network troubleshooting?
Correct
Explanation: The ping command is used to send ICMP Echo Request messages to a destination device and measure the round-trip time for the packets to travel to the destination and back. It helps in testing network connectivity and identifying potential latency issues.
Incorrect
Explanation: The ping command is used to send ICMP Echo Request messages to a destination device and measure the round-trip time for the packets to travel to the destination and back. It helps in testing network connectivity and identifying potential latency issues.
-
Question 15 of 30
15. Question
What is the purpose of DHCP (Dynamic Host Configuration Protocol) in TCP/IP networking?
Correct
Explanation: DHCP is used to dynamically assign IP addresses, as well as other network configuration parameters (such as subnet mask, default gateway, DNS server) to devices on a network. This simplifies network administration by automating the IP address assignment process.
Incorrect
Explanation: DHCP is used to dynamically assign IP addresses, as well as other network configuration parameters (such as subnet mask, default gateway, DNS server) to devices on a network. This simplifies network administration by automating the IP address assignment process.
-
Question 16 of 30
16. Question
Which routing protocol is classified as a distance vector routing protocol?
Correct
Explanation: RIP is classified as a distance vector routing protocol, which uses hop count as its metric for path selection. It periodically broadcasts routing information to its neighboring routers.
Incorrect
Explanation: RIP is classified as a distance vector routing protocol, which uses hop count as its metric for path selection. It periodically broadcasts routing information to its neighboring routers.
-
Question 17 of 30
17. Question
Which remote access protocol transmits data in clear text and is therefore considered less secure?
Correct
Explanation: Telnet transmits data in clear text, making it susceptible to eavesdropping and interception. For this reason, it is considered less secure compared to SSH, which provides encrypted communication.
Incorrect
Explanation: Telnet transmits data in clear text, making it susceptible to eavesdropping and interception. For this reason, it is considered less secure compared to SSH, which provides encrypted communication.
-
Question 18 of 30
18. Question
What is the purpose of trunking in Ethernet networks?
Correct
Explanation: Trunking is used to forward traffic between different VLANs (Virtual Local Area Networks) over a single physical link, allowing multiple VLANs to communicate with each other within a network.
Incorrect
Explanation: Trunking is used to forward traffic between different VLANs (Virtual Local Area Networks) over a single physical link, allowing multiple VLANs to communicate with each other within a network.
-
Question 19 of 30
19. Question
Which mode in Cisco IOS allows for the modification of interface parameters such as IP addresses and subnet masks?
Correct
Explanation: Interface configuration mode in Cisco IOS allows administrators to modify interface parameters such as IP addresses, subnet masks, and other interface-specific settings.
Incorrect
Explanation: Interface configuration mode in Cisco IOS allows administrators to modify interface parameters such as IP addresses, subnet masks, and other interface-specific settings.
-
Question 20 of 30
20. Question
What is the purpose of documentation in network configuration and troubleshooting?
Correct
Explanation: Documentation in network configuration and troubleshooting provides a record of changes made to network configurations, which is crucial for maintaining an accurate and up-to-date inventory of network devices and configurations, as well as for troubleshooting historical issues.
Incorrect
Explanation: Documentation in network configuration and troubleshooting provides a record of changes made to network configurations, which is crucial for maintaining an accurate and up-to-date inventory of network devices and configurations, as well as for troubleshooting historical issues.
-
Question 21 of 30
21. Question
What is the purpose of VLAN tagging?
Correct
Explanation: VLAN tagging adds information to Ethernet frames to identify the VLAN membership of the frame. This allows switches to correctly forward frames to the appropriate VLANs based on the tagging information.
Incorrect
Explanation: VLAN tagging adds information to Ethernet frames to identify the VLAN membership of the frame. This allows switches to correctly forward frames to the appropriate VLANs based on the tagging information.
-
Question 22 of 30
22. Question
Which command is used to save the current configuration of a Cisco device to non-volatile memory?
Correct
Explanation: The “copy running-config startup-config” command is used to save the current running configuration of a Cisco device to non-volatile memory (NVRAM), ensuring that the configuration is retained across reboots.
Incorrect
Explanation: The “copy running-config startup-config” command is used to save the current running configuration of a Cisco device to non-volatile memory (NVRAM), ensuring that the configuration is retained across reboots.
-
Question 23 of 30
23. Question
What is the purpose of establishing a hypothesis during the troubleshooting process?
Correct
Explanation: Establishing a hypothesis involves formulating a theory about the root cause of the problem based on available information and observations. This helps guide the troubleshooting process towards identifying and resolving the underlying issue.
Incorrect
Explanation: Establishing a hypothesis involves formulating a theory about the root cause of the problem based on available information and observations. This helps guide the troubleshooting process towards identifying and resolving the underlying issue.
-
Question 24 of 30
24. Question
Which type of Cisco router is typically used in small to medium-sized business networks and supports various WAN connectivity options?
Correct
Explanation: Cisco ISR (Integrated Services Router) routers are commonly used in small to medium-sized business networks due to their versatility, supporting various WAN connectivity options such as DSL, Ethernet, and T1/E1.
Incorrect
Explanation: Cisco ISR (Integrated Services Router) routers are commonly used in small to medium-sized business networks due to their versatility, supporting various WAN connectivity options such as DSL, Ethernet, and T1/E1.
-
Question 25 of 30
25. Question
What is the purpose of a service-level agreement (SLA) in network management?
Correct
Explanation: A service-level agreement (SLA) is a contract between a service provider and a customer that defines the expected level of service, including uptime, performance, and support, as well as remedies in case of service disruptions or failures.
Incorrect
Explanation: A service-level agreement (SLA) is a contract between a service provider and a customer that defines the expected level of service, including uptime, performance, and support, as well as remedies in case of service disruptions or failures.
-
Question 26 of 30
26. Question
Which diagnostic tool is used to monitor and manage network devices and gather information for performance monitoring and fault detection?
Correct
Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage network devices, gather information for performance monitoring, and detect faults by polling devices for status information and receiving traps or alerts.
Incorrect
Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage network devices, gather information for performance monitoring, and detect faults by polling devices for status information and receiving traps or alerts.
-
Question 27 of 30
27. Question
What is the primary function of a router in a network?
Correct
Explanation: A router is a networking device that forwards data packets between different networks or subnetworks based on IP addresses, enabling communication between devices on different LANs or subnets.
Incorrect
Explanation: A router is a networking device that forwards data packets between different networks or subnetworks based on IP addresses, enabling communication between devices on different LANs or subnets.
-
Question 28 of 30
28. Question
Which remote access protocol is deprecated due to security vulnerabilities and should be replaced with more secure alternatives?
Correct
Explanation: Telnet is deprecated due to security vulnerabilities, such as transmitting data in clear text, making it susceptible to eavesdropping and interception. It is recommended to replace Telnet with more secure alternatives like SSH.
Incorrect
Explanation: Telnet is deprecated due to security vulnerabilities, such as transmitting data in clear text, making it susceptible to eavesdropping and interception. It is recommended to replace Telnet with more secure alternatives like SSH.
-
Question 29 of 30
29. Question
What is the primary function of the Transport layer in the OSI model?
Correct
Explanation: The Transport layer (Layer 4) is responsible for establishing, maintaining, and terminating connections between devices, ensuring reliable end-to-end communication by providing services such as error detection, flow control, and data segmentation.
Incorrect
Explanation: The Transport layer (Layer 4) is responsible for establishing, maintaining, and terminating connections between devices, ensuring reliable end-to-end communication by providing services such as error detection, flow control, and data segmentation.
-
Question 30 of 30
30. Question
In Cisco IOS, what is the purpose of the “privileged EXEC mode”?
Correct
Explanation: The “privileged EXEC mode” in Cisco IOS provides access to all available commands on the device, allowing administrators to perform advanced configuration tasks such as modifying routing tables, configuring access control lists (ACLs), and managing system resources. This mode is typically accessed using the “enable” command after logging into the device.
Incorrect
Explanation: The “privileged EXEC mode” in Cisco IOS provides access to all available commands on the device, allowing administrators to perform advanced configuration tasks such as modifying routing tables, configuring access control lists (ACLs), and managing system resources. This mode is typically accessed using the “enable” command after logging into the device.