Question 1
Question
Which of the following is the physical infrastructure that provides interconnections between ISPs?
Question 2
Question
Which of the following provides physical separation between service provider and customer responsibilities?
Question 3
Question
Which TCP/IP layer is responsible for path determination and end-to-end forwarding of datagrams?
Answer
-
The application services layer
-
The transport layer
-
The Internet protocol layer
-
The network interface layer
Question 4
Question
What information is part of the encapsulation done at the network interface layer?
Answer
-
Source and destination MAC addresses
-
Source and destination IP addresses
-
Source and destination port numbers
-
Source and destination email addresses
Question 5
Question
Which of the following shows a typical data packet flow when egressing an Nokia 7750 SR?
Answer
-
SF/CPM -> MDA -> IOM -> SFP
-
SF/CPM -> SFP -> IOM -> MDA
-
SF/CPM -> IOM -> MDA -> SFP
-
MDA -> IOM -> SF/CPM -> SFP
Question 6
Question
Which of the following is not a recommended usage of the compact flashes on an Nokia 7750 SR?
Answer
-
Using CF 1 to store debug logs.
-
Using CF 2 to store debug logs.
-
Using CF 3 to store accounting logs.
-
Using CF 3 to store system files.
Question 7
Question
Which of the following displays a hierarchial CLI command structure at the current context level?
Question 8
Question
Which of the following is NOT a valid log destination in an Nokia 7750 SR?
Answer
-
Main
-
Session
-
Syslog
-
Console
Question 9
Question
Which one of the following log-IDs is typically reserved for Network Management on an Nokia 7750 SR
Question 10
Question
Which of the following is NOT a type of Layer 2 network?
Question 11
Question
Which of the following statements about SONET/SDH is FALSE?
Answer
-
SONET/SDH is a Layer-1 technology
-
SDH is used primarily in North America
-
The basic SONET frame is the STS-1.
-
An STS-1 frame is exactly one third of an STM-1 frame
Question 12
Question
Which Ethernet frame field is found in the Ethernet II frame header but NOT in the Ethernet 802.3 frame header?
Answer
-
Preamble
-
Start Frame Delimiter
-
Source address
-
Type
Question 13
Question
Which address type is used to send frames to all devices in a Local Area Network?
Answer
-
Anycast
-
Multicast
-
Broadcast
-
Unicast
Question 14
Question
Which of the following is NOT a characteristic of a hub?
Answer
-
It performs signal amplification.
-
It replicates Ethernet frames across all ports except
the receiving port.
-
It inspects Layer 2 frame headers.
-
It operates in half-duplex mode.
Question 15
Question
After all PCs in the below network have communicated with each other, which interface will switch D populate in its MAC FDB for PC1?
Answer
-
1/1/1
-
1/1/2
-
1/1/3
-
1/1/4
-
1/1/6
Question 16
Question
What happens when a switch receives an Ethernet frame with an unknown source MAC address and a destination MAC address of ff:ff:ff:ff:ff:ff?
Answer
-
The destination MAC address is saved in the MAC FDB,
and the frame is discarded.
-
The destination MAC address is saved in the MAC
FDB, and the frame is flooded to all ports except the
receiving port.
-
The source MAC address is saved in the MAC FDB, and
the frame is discarded.
-
The source MAC address is saved in the MAC FDB, and the
frame is flooded to all ports except the receiving port.
Question 17
Question
An Ethernet Local Area Network (LAN) consists of the components shown in the diagram. How many broadcast and collision domains are on this LAN?
Answer
-
2 broadcast domains, 7 collision domains
-
2 broadcast domains, 9 collision domains
-
3 broadcast domains, 7 collision domains
-
3 broadcast domains, 9 collision domains
-
7 broadcast domains, 9 collision domains
Question 18
Question
Which of the following statements about LAG is FALSE?
Answer
-
It aggregates physical links between devices
-
It provides point-to-point redundancy between
devices.
-
It supports auto-negotiation on ports in the LAG
-
It improves performance by increasing bandwidth
between devices.
Question 19
Question
Which of the following protocols is used to prevent loops in Ethernet networks?
Question 20
Question
An 8-port Ethernet switch is configured with VLAN 100 on ports 1-4, and VLAN 200 on ports 5-8. What happens when the switch receives a frame with an unknown destination address on port 1?
Answer
-
The switch will flood the frames on ports 1 to 4.
-
The switch will flood the frames on ports 2 to 4.
-
The switch will flood the frames on ports 5 to 8.
-
The switch will flood the frames on ports 2 to 8.
Question 21
Question
Which of the following statements about VLAN stacking is FALSE?
Answer
-
It allows a service provider to support customers that use overlapping VLAN IDs.
-
It increases the number of VLANs a service provider can support.
-
It increases the size of the VLAN ID field in the Ethernet header.
-
It allows a service provider to add another VLAN tag to traffic.
Question 22
Question
Which of the following is used to connect multiple broadcast domains?
Answer
-
Hub
-
Switch
-
Router
-
Repeater
Question 23
Question
Which of the following IP header fields is used to distinguish IPv4 from IPv6 traffic?
Answer
-
Type of Service
-
Version
-
Identification
-
Protocol
Question 24
Question
Which of the following is NOT a Regional Internet Registry?
Answer
-
ARIN
-
IANA
-
RIPE NCC
-
AfriNIC
Question 25
Question
Which of the following is a unicast address that is assigned to two or more devices on the same network?
Answer
-
Network address
-
Broadcast address
-
Multicast address
-
Anycast address
Question 26
Question
Which of the following about hierarchical IPv4 addressing is FALSE?
Answer
-
It creates a two-level address hierarchy.
-
It increases the number of IP addresses available in
the Internet.
-
It supports route summarization to reduce routing
table size.
-
It supports subnetting to divide a network into smaller
networks.
Question 27
Question
A network has an address of 206.47.132.0 and a network mask of 255.255.254.0. How many subnetworks can be created if each subnetnetwork must have at least 25 hosts?
Question 28
Question
Which of the following is the broadcast address of the network to which host 172.16.176.135/18 belongs?
Answer
-
172.16.176.255
-
172.16.191.255
-
172.16.255.255
-
172.255.255.255
Question 29
Question
How many subnets can be created from network 138.120.140.0/22 if each subnet must support 126 hosts?
Question 30
Question
Which of the following statements about a system IP address on an Nokia 7750 SR is FALSE?
Answer
-
It is a loopback address.
-
It has a fixed prefix value of /32.
-
It is manually configured by an operator.
-
It is associated with the management port.
Question 31
Question
Which of the following is a characteristic of route aggregation?
Answer
-
It summarizes subnet addresses into classful addresses.
-
It maps multiple private IP addresses into one public
IP address.
-
It divides a network into multiple subnets.
-
It reduces the number of route advertisements within a network.
Question 32
Question
What is the most specific aggregate prefix for the following 3 subnets?
Answer
-
134.234.123.0/25
-
134.234.123.0/24
-
134.234.123.128/24
-
134.234.122.0/23
Question 33
Question
Which of the following is NOT part of the IP forwarding process?
Answer
-
Perform longest match lookup for the destination IP address.
-
Perform MAC address learning.
-
Push traffic through the switch fabric.
-
Identify physical egress interface.
Question 34
Question
Which DHCP message is used by a client to inform a DHCP server that it accepts the assigned IP address?
Answer
-
Discover
-
Request
-
Offer
-
Acknowledgement
Question 35
Question
What type of message is an ARP response?
Answer
-
A unicast message
-
A broadcast message
-
A multicast message
-
An anycast message
Question 36
Question
Which of the following statements about ICMP is TRUE?
Answer
-
ICMP is used to resolve a MAC address for a given IP address.
-
ICMP messages are generated by Ethernet switches.
-
ICMP messages are encapsulated within IP datagrams.
-
ICMP relies on the CSMA/CD algorithm
Question 37
Question
Which of the following about the routing table on an Nokia 7750 SR is false?
Answer
-
The routing table is maintained by the CPM
-
The routing table contains next-hop information
-
The routing table is used in the MPLS data plane
-
The routing table is used to construct a forwarding table
Question 38
Question
Which of the following protocols is NOT used to build a routing table?
Answer
-
LPD
-
OSPF
-
BGP
-
Static Routing
Question 39
Question
Router R5 receives four route updates for the same prefix. Which of the four routes will be installed in R5’s routing table?
Answer
-
Routes learned from R1
-
Routes learned from R2
-
Routes learned from R3
-
Routes learned from R4
Question 40
Question
Router R5 receives four route updates for the same prefix. Which of the four routes will be installed in R5’s routing table?
Answer
-
Route learned from router R1
-
Route learned from router R2
-
Route learned from router R3
-
Route learned from router R4
Question 41
Question
Which of the following about a static route in an Nokia 7750 SR is FALSE?
Answer
-
It is manually configured by an administrator
-
It is preferred over dynamic protocols by default
-
It changes dynamically if the topology changes
-
It can be used for routing within the same autonomous system
Question 42
Question
When configuring a static route on router R2, what next hop address should be used to reach a host on 192.168.1.0/27?
Answer
-
10.1.1.1
-
10.1.1.2
-
10.2.3.2
-
10.2.3.3
Question 43
Question
Which of the following about an IP filter in an Nokia 7750 SR is FALSE?
Answer
-
It is also known as an Access Control List (ACL).
-
It is applied to all interfaces by default.
-
It can be used to filter traffic based on IP addresses.
-
It can be applied to egress traffic.
Question 44
Question
Which of the following about the displayed IP filter on an Nokia 7750 SR is TRUE?
Answer
-
It discards traffic from network 1.2.3.0/24.
-
It discards traffic to network 1.2.3.0/24.
-
It discards all traffic except the traffic from network 1.2.3.0/24.
-
It discards all traffic except the traffic to network 1.2.3.0/24.
Question 45
Question
Which of the following about a router running a link state routing protocol is FALSE?
Answer
-
It uses an SPF algorithm to calculate the routing table.
-
Route updates are driven by topology changes.
-
It sends copies of the routing table to neighbour routers.
-
It has a view of the entire network topology
Question 46
Question
Which routing protocol uses hop count for path selection?
Answer
-
OSPF
-
RIPv2
-
IS-IS
-
Static Routing
Question 47
Question
Which routing protocol is best used to provide routing between autonomous systems?
Question 48
Question
Which of the following about the OSPF routing protocol is TRUE?
Answer
-
It is a distance vector protocol.
-
It uses SPF algorithm for route selection.
-
It uses hop count to determine metric value.
-
It is used for routing between different autonomous sytems.
Question 49
Question
Which of the following is used by OSPF to identify the most up-to-date routing information?
Answer
-
Priority value in the Hello packet.
-
Age in the Link State Advertisement.
-
Master/slave status in the Database Description packet.
-
Sequence number in the Link State Advertisement
Question 50
Question
Which of the following about BGP is FALSE?
Answer
-
It is a link state protocol.
-
It uses TCP sessions to establish BGP peering.
-
It can be used for routing within an autonomous system.
-
It can be used for routing between autonomous systems.
Question 51
Question
Which of the following about autonomous systems is FALSE?
Answer
-
AS numbers can be assigned by RIRs.
-
AS numbers can be assigned by ISPs.
-
Private AS numbers are advertised on the Internet.
-
eBGP is used between different autonomous systems.
Question 52
Question
Which of the following is TRUE about a CE router that is involved in a VPN service?
Answer
-
It is aware of the VPN services provided by the service provider.
-
It resides on the service provider premises.
-
It connects to at least one PE router.
-
It connects to at least one CE router.
Question 53
Question
What is the function of a SAP?
Answer
-
It provides a P device with service access.
-
It provides a CE device with service access.
-
It binds the service to an MPLS service tunnel.
-
It binds the service to an MPLS transport tunnel.
Question 54
Question
Which of the following about the service label is FALSE?
Answer
-
The ingress PE device encapsulates customer data with a service label.
-
A service label identifies the service that data belongs to.
-
The egress PE device strips the service labels and forwards unlabeled packets.
-
A P device performs a service label swap operation.
Question 55
Question
Which device adds MPLS labels to packets that enter a service provider network?
Question 56
Question
Which of the following about VPWS is FALSE?
Answer
-
VPWS is a Layer 2 service.
-
VPWS emulates a single leased line between two locations.
-
Each VPWS maintains a MAC FDB.
-
VPWS customers do not have knowledge of the service provider network.
Question 57
Question
Which of the following about VPLS is FALSE?
Answer
-
VPLS is a Layer 2 service.
-
VPLS emulates a switched Ethernet service.
-
VPLS customers don’t have knowledge of the service provider network.
-
Each PE maintains a VRF instance for each VPLS.
Question 58
Question
Which device is the termination point of a Label Switched Path (LSP)?
Question 59
Question
What operation is performed by an iLER when it receives a packet?
Answer
-
It pushes a new MPLS label and forwards the packet to the next LSR.
-
It swaps the MPLS albel and forwards the packet to the next LSR.
-
It forwards the packet to the next LSR without altering the MPLS label.
-
It pops the MPLS label and forwards the packet to the next IP router.
Question 60
Question
Which of the following devices performs a label swap operation?