4A0-100 Exam
4A0-100 Exam
4A0-100 Exam
Answer: B
QUESTION NO: 2
m
Which of the following are basic router functions? Choose two.
.co
A. Perform a Layer 2 header lookup
B. Broadcast a Layer 2 packet to all the interfaces.
C. IP header examination.
D. Determine the best path to the destination.
ng
Ki
Answer: C,D
am
QUESTION NO: 3
Ex
A. AAL1
ee
B. AAL2
C. AAL 3
Fr
D. AAL 5
Answer: D
QUESTION NO: 4
Which of the following are data rates defined for Ethernet operation over copper and fiber optic
cabling? (Choose three.)
A. 1 Mbps
B. 10 Mbps
C. 1000 Mbps
D. 10,000 Mbps
QUESTION NO: 5
An Ethernet switch receives a frame addressed to an unknown destination. Assuming the frame is
error-free, what will the switch do with the frame?
A. Hold it in a buffer until it learns the port on which the destination is located
B. Flood the frame out all ports except the source port
C. Filter the frame and restrict it only to the source port
D. Age out the source address forwarding table entry
m
Answer: B
.co
QUESTION NO: 6
ng
How does collision detection operate in the CSMA/CD algorithm?
Ki
A. It allows multiple hosts to exchange data simultaneously on the same medium
B. It allows multiple hosts to share the same medium by ensuring that only one host can transmit
am
at a time
C. Detects collisions on a full-duplex link
D. A host will only transmit upon receipt of the token
Ex
Answer: B
ee
QUESTION NO: 7
Fr
The Media Access Control (MAC) sub-layer is responsible for which two functions? (Choose two.)
Answer: C,D
QUESTION NO: 8
Answer: C
QUESTION NO: 9
Which statement best describes a Spanning Tree Protocol (STP) root bridge/switch?
m
A. It is the switch on the network with the lowest bridge priority value
.co
B. It is the switch with the highest numeric Media Access Control (MAC) address
C. It is the only switch on the network through which traffic flows
D. It is responsible for removing duplicate frames from the network
Answer: A ng
Ki
QUESTION NO: 10
am
An Ethernet switch with redundant links has the following entries in its Forwarding Data Base
(FDB):
Ex
00:60:AC:1F:E0:11 1
00:F0:DE:12:3C:87 2
Fr
It receives on port 2 a frame with the source Media Access Control (MAC) address
00:60:AC:1F:E0:11, and destination address 00:F0:DE:12:3C:87. What will the switch change in
its FDB?
A. It will remove the previous entry for MAC 00:F0:DE:12:3C:87 and replace it with a new one
mapping this address to port 1
B. It will set a timer on the previous entry for MAC 00:60:AC:1F:E0:11 and create a new entry
mapping this address to port 2
C. Replace the previous entry for MAC 00:60:AC:1F:E0:11 with a new one mapping this address
to port 2
D. It will create a new entry for MAC address 00:60:AC:1F:E0:11 mapping this address to port 2
and a new entry for MAC address 00:F0:DE:12:3C:87 mapping this address to port 1
QUESTION NO: 11
An 12-port Ethernet switch running the Spanning Tree Protocol (STP) can have how many root
ports?
A. 1
B. 2
C. 4
D. 12
m
Answer: A
.co
QUESTION NO: 12
ng
When a Rapid Spanning Tree Protocol (RSTP) switch receives a topology change Bridge Protocol
Data Unit (BPDU), how does it propagate this information through the network?
Ki
A. It sends it directly to the root switch
am
E. It processes the topology change but does not propagate the BPDU
Answer: B
ee
Fr
QUESTION NO: 13
Using Q-in-Q Virtual Local Area Network (VLAN) stacking, how does a carrier differentiate one
customer's traffic from that of another?
A. The provider edge (PE) switch adds an additional field called a PE tag to the customer's Layer
2 data
B. The PE switch replaces the customer's VLAN tag with a carrier-assigned tag
C. The PE switch adds a second VLAN tag to identify the customer's traffic on the carrier's
network
D. The PE switch assigns a customer-specific priority label to the customer's traffic
Answer: C
An Ethernet switch is configured to support 4 Virtual Local Area Networks (VLANs). They are
configured as follows:
VLAN Port
101 1
101 2
102 3
102 4
103 5
m
103 6
104 7
.co
104 8
The switch receives a broadcast frame on port 7. Which VLAN members will receive this
broadcast frame? ng
Ki
A. None
B. 104
am
Answer: B
Ex
ee
QUESTION NO: 15
Which two 7750SR Service Router physical access methods are used to perform Out of Band
Fr
A. Console port
B. Management Ethernet port
C. Access ports
D. Network ports
Answer: A,B
QUESTION NO: 16
Changing which part of the 7750SR basic configuration also changes the command prompt?
Answer: B
QUESTION NO: 17
m
B. Create an IP address for the CPM Ethernet port
.co
C. Set the console port speed
D. Set the date/time for the system
Answer: D
ng
Ki
QUESTION NO: 18
am
The 201.148.26.0 network is subnetted using a /26 mask. How many subnets and host addresses
will you obtain with this mask?
A. 4 subnets, 64 hosts
Ex
B. 64 subnets, 4 hosts
C. 4 subnets, 62 hosts
ee
D. 6 subnets, 30 hosts
Answer: C
Fr
QUESTION NO: 19
What bit pattern identifies the network address in the subnet mask?
Answer: C
A. 172.16.224.255/18
B. 255.255.255.255
C. 224.1.2.1
D. 192.168.24.59/30
Answer: A
QUESTION NO: 21
m
Given the following:
.co
Network address: 190.160.0.0
Network prefix: /19
ng
What are the network and broadcast addresses for the third subnetwork? (Choose two.)
Ki
A. 190.160.64.0
am
B. 190.160.64.255
C. 190.160.95.255
D. 190.160.96.0
Ex
Answer: A,C
ee
QUESTION NO: 22
Fr
Why don't classful routing protocols use the first and last subnetworks?
Answer: D
QUESTION NO: 23
Answer: B
QUESTION NO: 24
Given a network address of 116.14.0.0, which of the following is a valid host address when using
the subnet mask 255.255.255.240?
m
A. 116.14.17.16
.co
B. 116.14.17.31
C. 116.14.17.192
D. 116.14.17.189
Answer: D ng
Ki
QUESTION NO: 25
am
Which three of the following are important considerations when designing subnets? (Choose
three.)
Ex
Answer: A,C,D
QUESTION NO: 26
You have a class B network with a 255.255.255.0 mask. Which of the following are true of this
network? (Select two)
QUESTION NO: 27
What is the address range, including the network (all 0) and broadcast (all 1) addresses, for the
fourth sub-network?
m
A. 208.40.224.0 ?208.40.224.255
.co
B. 208.40.4.0 ?208.40.4.255
C. 208.40.224.16 ?208.40.224.31
D. 208.40.224.48 ?208.40.224.63
Answer: D
ng
Ki
QUESTION NO: 28
am
You want to integrate a new network into an existing IP Wide Area Network. The current network
configuration is as follows:
Ex
If Variable Length Subnet Masking (VLSM) is used, what prefix is required to support an additional
7-host LAN segment?
A. /24
B. /27
C. /28
D. /29
E. /30
Answer: C
QUESTION NO: 29
A. 150.220.64.0/16
B. 150.220.0.0/17
C. 150.220.64.0/18
D. 150.220.0.0/18
Answer: C
m
QUESTION NO: 30
.co
You have been assigned the CIDR block of 116.65.4.0/22. Which of the following IP addresses
could you use as a host? Choose all that apply
A. 116.65.8.32
B. 116.65.7.64
ng
Ki
C. 116.65.6.255
D. 116.65.3.255
am
Answer: B,C
Ex
QUESTION NO: 31
ee
Represent the following list of addresses as the most accurate aggregate route:
60.48.0.0/24
Fr
60.48.1.0/24
60.48.2.0/24
60.48.3.0/24
60.48.4.0/24
60.48.5.0/24
60.48.6.0/24
60.48.7.0/24
A. 60.48.0.0/16
B. 60.48.0.0/17
C. 60.48.0.0/21
D. 60.48.0.0/24
QUESTION NO: 32
Your network administrator has subnetted your Class C address 198.17.54.0 into 14 useable
subnetworks. One network segment requires support for 30 hosts. Using supernetting techniques,
which subnetwork could you assign to the 30-host segment?
A. 198.17.54.0/28
B. 198.17.54.48/27
C. 198.17.54.80/26
m
D. 198.17.54.96/27
.co
Answer: D
QUESTION NO: 33
ng
How does the Transport Layer identify which application is to receive the data?
Ki
A. Using the IP address of the packet.
am
Answer: C
ee
QUESTION NO: 34
Fr
Two networks, Network A and Network B, are connected through four routed paths. The paths are
configured as follows:
Path 1: Network A connects to Network B through three routers over a series of T1 (1.544Mbps)
point-to-point links
Path 2: Network A connects to Network B through four routers over a series of 10Mbps Ethernet
links
Path 3: Network A connects to Network B through three routers over a series of ISDN-BRI
(128Kbps) links
Path 4: Network A connects to Network B through two routers over a series dial-up (56Kbps) links
If the routers run Routing Information Protocol (RIP) version 1, have no static routes configured,
and all the paths described above are available, which path will the Network A and B routers
A. Path 1
B. Path 2
C. Path 3
D. Path 4
Answer: D
QUESTION NO: 35
A link state protocol uses what metric type to choose the best path to a destination network?
m
A. Cost
.co
B. Delay
C. Hop count
D. Precedence
Answer: A
ng
Ki
am
QUESTION NO: 36
A distance vector routing protocol uses which metric to choose the preferred route to a
destination?
Ex
A. Bandwidth
ee
B. Precedence
C. Hop count
D. Cost
Fr
Answer: C
QUESTION NO: 37
How would you best describe route poisoning in a Distance Vector routing protocol?
A. Upon detecting a network failure, a router receiving an update about that neighbor will not flood
it back to the source router that sent it the update
B. Upon detecting a network failure, a router sourcing the network update will set the hop value in
the update to infinity and send a triggered update to its neighbors
C. Upon detecting a network failure, a router receiving an update about that neighbor will drop the
update
Answer: B
QUESTION NO: 38
A. 30
B. 255
C. 520
m
D. 25
.co
Answer: D
QUESTION NO: 39 ng
Ki
List the correct sequence of operations when a router receives a Ethernet Frame from a LAN.
Answer: A
ee
QUESTION NO: 40
Fr
Which answer reflects the correct message sequence used when a source attempts to ping a
destination for which it has no Address Resolution Protocol (ARP) cache entry?
A. Internet Control Messaging Protocol (ICMP) echo request, ARP request, ARP reply, ICMP echo
reply
B. ARP request, ARP reply, ICMP echo request, ICMP echo reply
C. ICMP echo request, ICMP echo reply, ARP request, ARP reply
D. ICMP echo request, ARP reply, ARP request, ICMP echo reply
Answer: B
Which two characteristics make RIPv2 preferable for use over RIPv1? (Choose two.)
Answer: A,D
m
QUESTION NO: 42
.co
You decide that you want traffic destined for any unknown network to always exit the router over a
specific interface. What type of route will you configure on the router?
A. Black-hole route
B. Default route
ng
Ki
C. Dynamic route
D. Alternate route
am
Answer: B
Ex
QUESTION NO: 43
ee
Answer: C
QUESTION NO: 44
What network type does not require DR/BDR elections for OSPF routers to form an adjacency with
one another.
A. Point-to-Point
B. Broadcast
Answer: A
QUESTION NO: 45
The Alcatel-Lucent 7750 SR's OSPF implementation supports which two packet exchange
authentication techniques? (Choose two.)
m
B. Internet Protocol Security (IPSec)
.co
C. Plain text
D. Rivest, Shamir, Adleman (RSA)
Answer: A,C
ng
Ki
QUESTION NO: 46
am
List the true statements with regards to the OSPF Hello protocol. (Choose two)
Answer: A,C
Fr
QUESTION NO: 47
Click the Exhibit Button below Given the broadcast network below, how many adjacencies will be
established in the entire network?
A. 5
B. 7
C. 10
D. 9
E. 15
QUESTION NO: 48
Answer: A
m
.co
QUESTION NO: 49
ng
OSPF Router A has interfaces in Area 0, Area 1, and Area 3. OSPF Router B has interfaces in
Area 0 and Area 4. OSPF Router C has interfaces in Area 0 and Area 5. For which OSPF areas
will Router A maintain a link state database? (Choose all that apply)
Ki
A. OSPF Area 0
am
B. OSPF Area 1
C. OSPF Area 3
D. OSPF Area 4
Ex
E. OSPF Area 5
Answer: A,B,C
ee
Fr
QUESTION NO: 50
Answer: A,C
QUESTION NO: 51
A. LSA Type 1
B. LSA Type 4
C. LSA Type 3
D. LSA Type 5
Answer: D
QUESTION NO: 52
Which OSPF LSA type is used to summarize networks from one area to another?
m
A. LSA Type 1
.co
B. LSA Type 2
C. LSA Type 3
D. LSA Type 4
Answer: C
ng
Ki
am
QUESTION NO: 53
A router (called Router A) belongs to OSPF Area 0 and OSPF Area 2. Area 2 is a Normal Area.
There is an Autonomous System Boundary Router within Area 2. From the list below, select valid
Ex
A. LSA Type 0
B. LSA Type 3
C. LSA Type 4
Fr
D. LSA Type 5
E. LSA Type 7
Answer: B,C,D
QUESTION NO: 54
A. 0-2400
B. 0-64511
C. 64512-65535
Answer: C
QUESTION NO: 55
Which of the following best defines an Autonomous System, as discussed within the context of
BGP?
m
administrative authority.
.co
D. Autonomous Systems are used by a single administrative authority to separate routing domains
that utilize different routing protocols.
Answer: C
ng
Ki
QUESTION NO: 56
am
Choose two of the following reasons to implement BGP in your organization? (Choose two)
C. Your Organization has legacy routers and cannot sustain Internet traffic
D. Your organization needs to monitor and control traffic passing through it
ee
Answer: A,D
Fr
QUESTION NO: 57
A. BGP uses I-BGP to discover a route to the internal BGP speaker and then establishes a
peering session.
B. BGP requires an IGP to discover a route to the internal BGP speaker and then uses E-BGP to
establish a peering session.
C. BGP requires an EGP to discover a route to the internal BGP speaker and then uses I-BGP to
establish a peering session.
D. BGP requires an IGP to discover a route to the internal BGP speaker and then is able to
establish an I-BGP peering session.
QUESTION NO: 58
A. A bi-directional path that uses label switching technology to forward traffic to its destination.
B. A bi-directional path that uses labels to represent the router route-table to forward traffic to its
destination.
C. A uni-directional path that uses label switching technology to forward traffic to its destination.
D. A uni-directional path that uses labels to represent the router route-table to forward traffic to its
m
destination.
.co
Answer: C
QUESTION NO: 59
ng
Where, in a network, would you expect to find a "P" router?
Ki
A. At the edge of the network facing the customer.
am
Answer: C
ee
QUESTION NO: 60
Fr
A. True
B. False
Answer: B
QUESTION NO: 61
m
.co
An Ethernet Local Area Network (LAN) consists of the components shown in the diagram below:
How many broadcast and collision domains are on this LAN?
Answer: C
Ex
QUESTION NO: 62
ee
A. The switch merely looks at the source mac address before switching
Fr
B. The switch looks at the source and destination mac address before switching.
C. The switch looks at the IP header information before switching
D. The switch receives the whole frame before switching.
Answer: D
QUESTION NO: 63
Which Ethernet frame field does the receiver use to verify the integrity of the received bits?
A. Destination address
B. Frame check sequence
C. Preamble sequence
Answer: B
QUESTION NO: 64
Which Ethernet frame fields are not considered when calculating the frame size? (Choose two.)
m
Answer: B,D
.co
QUESTION NO: 65
ng
Which of the following must be true for an Ethernet network to operate in full duplex mode?
Ki
(Choose two.)
Answer: A,D
ee
QUESTION NO: 66
Fr
m
.co
ng
Ki
am
Dedicated Ethernet connections for each of the hubs and the database servers on the Fast
Ethernet switch
Which two of the following statements concerning this networks operation are true? (Choose two.)
Answer: C,D
m
.co
ng
Ki
An Ethernet Local Area Network (LAN) consists of the following components:Four 24-port
am
A. 1
B. 2
C. 4
ee
D. 16
Answer: A
Fr
QUESTION NO: 68
A. Link establishment
B. Authentication
C. Window size negotiation
D. Routing
Answer: A,B