NRS-1

Network Routing Specialist 1

Network Routing Specialist 1


Kartei Details

Karten 215
Lernende 11
Sprache English
Kategorie Informatik
Stufe Andere
Erstellt / Aktualisiert 01.05.2013 / 04.01.2019
Weblink
https://card2brain.ch/box/nrs1
Einbinden
<iframe src="https://card2brain.ch/box/nrs1/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
A VPWS service maintains a MAC Forwarding Database (FDB) for Ethernet SAPs
Which of the following mediums can be used in a VPWS when defining SAPs (Select three)?
If a customer requires a point-to-point layer 2 VPN service between two locations which VPN service would be typically suited for this customer?
Which of the following statements is FALSE when describing a Virtual Private LAN Service?
If a customer requires a multipoint layer 2 VPN service between three or more locations which VPN service is best suited for this customer?
What does a VPLS solution look like from a customers perspective?
Which of the following best describes the function of the service label?
What is the network layer responsible for?
Which of the following are basic router functions? Choose two
Which ATM adaptation layer is usually used for transporting IP datagrams?
Which of the following are data rates defined for Ethernet operation over copper and fiber optic cabling? (Choose three)
An Ethernet switch receives a frame addressed to an unknown destination. Assuming the frame is error-free, what will the switch do with the frame?
How does collision detection operate in the CSMA/CD algorithm?
The Media Access Control (MAC) sub-layer is responsible for which two functions? (Choose two)
What is the purpose of carrier sense in the CSMA/CD algorithm?
Which statement best describes a Spanning Tree Protocol (STP) root bridge/switch?
An Ethernet switch with redundant links has the following entries in its Forwarding Data Base (FDB): MAC Address Port ------------------- -------- 00:60:AC:1F:E0:11 1 00:F0:DE:12:3C:87 2 It receives on port 2 a frame with the source Media Access Control (MAC) address 00:60:AC:1F:E0:11, and destination address 00:F0:DE:12:3C:87. What will the switch change in its FDB?
An 12-port Ethernet switch running the Spanning Tree Protocol (STP) can have how many root ports?
When a Rapid Spanning Tree Protocol (RSTP) switch receives a topology change Bridge Protocol Data Unit (BPDU), how does it propagate this information through the network?
An Ethernet switch is configured to support 4 Virtual Local Area Networks (VLANs). They are configured as follows: VLAN Port ------- ------ 101 1 101 2 102 3 102 4 103 5 103 6 104 7 104 8 The switch receives a broadcast frame on port 7. Which VLAN members will receive this broadcast frame?
Which of the following is an example of a valid host address?
Which two 7750SR Service Router physical access methods are used to perform Out of Band (OOB) management? (Choose two)
Why don t classful routing protocols use the first and last subnetworks?
Given a network address of 116.14.0.0, which of the following is a valid host address when using the subnet mask 255.255.255.240?
Given the following: Network address: 190.160.0.0 Network prefix: /19 What are the network and broadcast addresses for the third subnetwork? (Choose two)
Changing which part of the 7750SR basic configuration also changes the command prompt?
You have a class B network with a 255.255.255.0 mask. Which of the following are true of this network? (Select two)
Given the following: Network address: 208.40.224.0 Network prefix: /28. What is the address range, including the network (all 0) and broadcast (all 1) addresses, for the fourth sub-network?
You want to integrate a new network into an existing IP Wide Area Network. The current network configuration is as follows: Network address: 208.40.224.0 Network prefix: /27 Number of subnetworks: 6 If Variable Length Subnet Masking (VLSM) is used, what prefix is required to support an additional 7-host LAN segment?
Represent the following address in Classless Interdomain Routing (CIDR) notation: Network address: 150.220.64.0 Network mask: 255.255.192.0
You have been assigned the CIDR block of 116.65.4.0/22. Which of the following IP addresses could you use as a host? Choose all that apply
Represent the following list of addresses as the most accurate aggregate route: 60.48.0.0/24 60.48.1.0/24 60.48.2.0/24 60.48.3.0/24 60.48.4.0/24 60.48.5.0/24 60.48.6.0/24 60.48.7.0/24
Your network administrator has subnetted your Class C address 198.17.54.0 into 14 useable subnetworks. One network segment requires support for 30 hosts. Using supernetting techniques, which subnetwork could you assign to the 30-host segment?
Two networks, Network A and Network B, are connected through four routed paths. The paths are configured as follows: Path 1: Network A connects to Network B through three routers over a series of T1 (1.544Mbps) point-to-point links Path 2: Network A connects to Network B through four routers over a series of 10Mbps Ethernet links Path 3: Network A connects to Network B through three routers over a series of ISDN-BRI (128Kbps) links Path 4: Network A connects to Network B through two routers over a series dial-up (56Kbps) links If the routers run Routing Information Protocol (RIP) version 1, have no static routes configured, and all the paths described above are available, which path will the Network A and B routers choose first?
. A link state protocol uses what metric type to choose the best path to a destination network?
How would you best describe route poisoning in a Distance Vector routing protocol?
What are the maximum number of networks advertised in a RIPv1 Update?
List the correct sequence of operations when a router receives a Ethernet Frame from a LAN
Which two characteristics make RIPv2 preferable for use over RIPv1? (Choose two)
You decide that you want traffic destined for any unknown network to always exit the router over a specific interface. What type of route will you configure on the router?