Sunday, August 25, 2013

CCNP QUESTION AND ANSWERS



https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos

CCNP ROUTING AND SWITCHING QUESTIONS AND ANSWERS number 001

1. Which of the following can you use to alleviate congestion in an internetwork
(if used correctly)?
A. Repeaters
B. Routers
C. DLC
D. Switches
E. Bridges
2. Choose the three layers Cisco uses for building its hierarchical internetwork
model.
A. Fundamental
B. Distribution
C. IGRP
D. Core
E. Backbone
F. Access
3. Identify the characteristics of a scalable internetwork.
A. Reliability
B. Responsiveness
C. Efficiency
D. Adaptability
E. Accessibility
F. All of the above
4. What is the primary function of the Core layer?
A. To distribute client/server router information
B. To provide an optimized and reliable transport structure
C. To provide access to various parts of the internetwork, as well as
to services
D. To provide access to corporate resources for a workgroup or users
on a local segment

5. What is the primary function of the Distribution layer?
A. To distribute client/server router information
B. To provide an optimized and reliable transport structure
C. To provide access to various parts of the internetwork, as well as
to services
D. To provide access to corporate resources for a workgroup or users
on a local segment
6. What is the purpose of the Access layer?
A. To distribute client/server router information
B. To provide an optimized and reliable transport structure
C. To provide access to various parts of the internetwork, as well as
to services
D. To provide access to corporate resources for a workgroup or users
on a local segment

7. How do LAN switches improve performance on a LAN?
A. By filtering via logical address
B. By regenerating the digital signal
C. By employing packet-switching that permits high-speed data
exchanges
D. By employing frame-switching that permits high-speed data
Exchanges
8. What is a benefit of bridge segmentation?
A. Regeneration and propagation
B. Segmenting, or breaking up, your network into smaller, more
manageable pieces
C. LAN queuing
D. Forwarding the frame before reception is complete

9. How does cut-through switching provide better performance than
other switching methods?
A. By using LAN queuing
B. By using microsegmentation
C. By receiving the entire frame onto onboard buffers, running a
CRC, and then forwarding the frames out the destination port
D. By forwarding the frame before reception is complete
10. LAN segmentation with switches is also called what?
A. Filtering
B. Microsegmentation
C. Bridging
D. Routing

11. Which Cisco layer governs access to Core layer resources?
A. Distribution
B. Core
C. Backbone
D. Access
12. Which layer should have the most redundancy?
A. Backbone
B. Core
C. Distribution
D. Access

13. How do bridges filter a network?
A. By logical address
B. By IP address
C. By hardware address
D. By digital signaling

14. How do routers filter a network? (Choose all that apply.)
A. By logical address
B. By IP address
C. By digital signaling
D. By hardware address
E. By IPX address
15. How do switches segment a network?
A. By logical address
B. By IP address
C. By hardware address
D. By IPX address
16. What is a drawback of filtering a network with bridges?
A. It segments the network.
B. It creates internetworks.
C. It forwards all broadcasts.
D. It filters frames.

17. How can you reduce routing table entries?
A. Route summarization
B. Incremental updates
C. IP filtering
D. VLANs
18. Which Cisco IOS features are available to help reduce bandwidth
usage? (Choose all that apply.)
A. Access lists
B. Snapshot routing
C. Compression of WANs
D. TTL
E. DDR
F. Incremental updates
19. Which Cisco IOS features serve to provide stability and availability?
(Choose all that apply.)
A. Reachability
B. Convergence
C. Alternative path routing
D. Snapshot routing
E. Tunneling
F. Dial backup
G. Load balancing

20. Which Cisco layer is responsible for breaking up collision domains?
A. Core
B. Backbone
C. Distribution
D. Access

Wednesday, August 21, 2013

THINK LIKE AS A HACKER THEN YOU WILL BE A CRACKER solved version




1. .The equation of XOR gate is ___________
Y= AB
Y= A+B
Y = A
Y= A + B

2.When a decimal is represented by its exact equivalent, it is known as the __________

Binary Coded Decimal
Hexa Decimal
Decimal
Octal

3. _____ adds two binary digits and produces two binary outputs called Sum and Carry.
Half Adders
Full Adders
Binary Adders
None of the above

4. 2’s complement of 01101 is __________
10111
001101
01110
10011

5.In this ___________system, the digits are 0to 9 and A to F.
Binary
Octal
Hexadecimal
Decimal

6.Read the following statement and state True or False
a.    In 8085 Microprocessor, 8 bit Internal data bus carries instructions and data between the CPU registers
b.    In Microprocessors, Oscillators are not Crystal-, LC- or RC- Controlled
False, True
False, False
True, True
True, False

7. Read the following statement and state True or False
a.    Pins 1 and 2 serve to connect a crystal, LC circuitry or RC circuitry network to X1 and X2
b.    Pin 3 Carries the RESET OUT Signal
True, True
False, False
True, False
False, True

8. Read the following statement and state True or False
a.    Repeated Subtraction is the only method to convert Decimal number to Binary
b.    In order to convert a hexadecimal number to binary, each hexadecimal digit has to be converted to its 4 bit equivalent

False, False
True, False
True, True
False, True

9.Read the following statement and state True or False
a.    One of the two coding method is, EBCDIC
b.    ASCII was developed by a committee with representatives from a variety of computer manufacturers

True, True
False, False
False, True
True, False

10. In an AND gate Input A is 0 and Input B is 1, and the output is passed through the Inverter, what could be the final output from the circuit?
1
-1
0
none of the above


11. Read the following statement and state True or False
a.    An Inverter is a gate with only one input signal and multiple output signals
b.    An non inverting amplifier isolates two other circuits
True, True
False, False
False, True
True, False

12. Read the following statement and state True or False
a.    A half Adder is a logic circuit that adds 2 bits
b.    Arithmetic Logic Units Process Hexadecimal numbers
True, True
False, False
False, True
True, False

13. Which of the following tools is used to control the movement of slides during a presentation?
Slide Effects
Slide Show
Custom Animation
Slide Transition


14. Which of the following key combinations is used to print a presentation in PowerPoint 2010
Ctrl + P




15. Which of the following is used to save or export a Portable Document Format (PDF) file?
ANSWER:- XPS


16. Which of the following keys will you use if you want to erase on-screen annotations of a presentation in PowerPoint 2010?
L
B
P
E



17. Which of the following keys will you use if you want to end a presentation in PowerPoint 2010?
Spacebar
Home
Hyphen
Backspace


18. You type a document and you want to insert header from third page. Which of the following technique will you use to accomplish the task?
Go to the third page and insert header
Use a Quick Style
Use page break
Use section break



19. John prepares a document. He inserts some tables in it. In one table, John wants to divide a cell into two rows and four columns. What should he do to accomplish the task?
Use the Split Cells option
Use the Merge Cells option
Draw lines in the cell to divide it
Use the Split Table option



20. Sam works in an office and he is assigned with the task of preparing a document. He uses Microsoft  Word 2010 for creating documents. He inserts a picture in the document. He wants to apply sepia tone to the picture. Which of the following will he choose on the Format tab to accomplish the task?

Change Picture
Color
Picture Effects
Reset Picture


21. You work in an office and you are assigned with the task of writing a document. In the document, there are some words that need reference. What will you do to give the reference for the words on the same page?
Type the reference at the end of the page
Create footnote
Create header
Create footer


22. You review a document and you want to add some suggestions to a part of the document. What will you do to accomplish the task?
Insert a footer
Enable Track Changes
Insert a caption
Insert a comment

23. You work in an office and you are assigned with the task of typing a document. In the document, some words have the same type of formatting. What will you do to ease the task of applying the same type of formatting to
different words?
Create a Quick Style
Create a template
Select all the words together and apply the formatting
Create a theme


24. John wants to send letters to invite his fifty friends on his birthday party. What will he do to ease the task of creating fifty letters?
Use a Quick Style
Use Mail Merge
Use building blocks
Use a template



25. You work as an Office Assistant for BlueSoft Inc. You have created a document in Microsoft Office Word. You need to view the document as it will appear on the printed page. Which of the following views will you use to  accomplish the task?
Web Layout
Draft
Print Layout
Full Screen Reading



26. Sam prepares a document. He inserts some tables in it. In one table, Sam wants to combine four cells   into a single cell. What should he do to accomplish the task?

Use Banded Columns optioN
Use Merge Cells option
Use Split Cells option
Use Split Table option


27. John works as an Office Assistant for HappyTech Inc. He is assigned with the task of creating invitation cards for his colleagues. There are about 200 employees in the company. What should he do to ease the creation of cards?
Create individual invitation cards
Create a Quick Style
Create a theme
Create a template


28. Which of the following resources is MOST important for accessing remote virtual environments on
a client machine?

Network speed
CPU speed
High speed memory
Drive space

29. user sent an email requesting that a technician check if a computer is on and connected to the
Internet so the user can login from home. Which of the following commands in the command
prompt would a technician use to verify if the computer is on and connected without having to go
to the computer?
NSLOOKUP
NETSTAT
PING
IPCONFIG

30. A technician recently removed spyware from a computer and now the user is getting error
messages about system files. Which of the following tools would a technician use to verify all
system files are intact and in their original versions?
Repair Disk
SFC
FIXMBR
ASR


31. The computer starts up and runs for less than a minute before shutting down or locking up. This is
a symptom of:

overheating
incompatible RAM
faulty hard drive
bad internal USB hub

32. A computer’s time settings reset every time it is unplugged. This is a symptom of a faulty:
memory module
power supply
motherboard
CMOS battery


33. A technician is configuring a PC that will have confidential information stored on it. To ensure that
only authorized users can access this PC, which of the following should the technician do? (Select
TWO).
Disable the guest account
Install antivirus applications
Disable DHCP
Change the SSID
Change the default username


34. A technician recently installed a new video card in a PC. The PC already has integrated video on
the motherboard. When the technician turns on the PC, there is no video. Which of the following is
MOST likely the cause?

The motherboard BIOS version is out of date
The incorrect video card drivers are installed
The power connector for the video card is unplugged
The video card is unsupported by the motherboard


35. Which of the following BEST describes a method for installing an operating system across the
network?

USB 3.0
IEEE 1394
PXE
NTFS


36. A technician has been dispatched to a customer site to diagnose an issue where the computer
turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from
the computer. Which of the following is the BEST solution?
Power down the system and replace the CPU
Power down the system and replace the power supply
Install an additional case fan for proper ventilation
Remove the side panel for proper ventilation


37. A technician has installed several new devices on a computer. The computer no longer boots
properly, and the technician needs to determine which device driver may be causing the issue.
Which of the following allows the operating system to run in a limited capacity with minimal device
drivers loaded?
Last known good configuration
Recovery console
Power shell
Safe mode



38. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but
does not want to use an encryption method. Which of the following methods would be BEST to
accomplish this?

MAC filtering
SSL VPN
PPPoE
WPA Enterprise

39. Joe, a network technician, is tasked with installing a router and firewall to get an office working
with Internet access. Which of the following features MUST be configured to allow sharing of a
single public IP address?
QoS
POP3
PAT
SMTP

40. Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?
RAS
PPTP
IPSec
ICA

41. Two duplicate pieces of equipment can be used in conjunction for which of the following
purposes? (Select TWO)

High availability
Fault tolerance

Reduce latency
Wi-MAX


42. The T568B wiring standard slates that CAT5 cables should be coded as follows:
White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,
White/Orange, Orange, White/Green, Blue,


43. Using network monitoring tools would allow an administrator to do which of the following?
Configure offline devices
Examine performance issues
Install additional software and updates
View syslog events


44. Which of the following wireless technologies can operate at only 5GHz?
802.11b/g
802.11g
802.11b
802.11a


45. Which of the following devices allows multiple internal IP addresses to access an external website
with minimal impact to the network bandwidth?

Proxy
Load balancer
Router
Bandwidth shaper


46. A VPN connection is not working correctly and the technician is unable to ping the VPN server.
Which of the following actions should the technician do FIRST?

Call their local ISP
Verify the IP information of the server
Check their local Internet connection
Verify the hostname of the server



47. A technician wants to use an existing DHCP server for three additional VLANs. Which of the
following features needs to be configured to allow for this addition?

DHCP server
Proxy server
Repeater
DHCP relay

48. Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?
Windows any time update
Windows upgrade advisor
WAIK

Microsoft Application Compatibility Toolkit


49. Which of the following VPN types support the VPN Reconnect feature of Windows 7?
L2TP/IPsec
PPTP
IKEv2
SSTP


50. You are responsible for managing company laptops that have Windows 7 installed at a small library. You want to prevent staff from uploading files using FTP to FTP sites but allow them to send outbound email messages using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to achieve this?
Inbound rules
Outbound rules

Isolation rules
Authentication exemption rules


51. Your friend has installed new device drivers on his computer. Unfortunately it was a beta early release and his computer boots to a blank screen now. You help him out by restarting the computer and pressing F8. However, what Advanced Boot Option would NOT help fix the situation?
Enable Boot Logging
Safe Mode
Safe Mode with Networking
Last Known Good Configuration (Advanced)


52. Your friend has set up a wireless network at his home. He found it easy to set up the third party WAP from the local PC shop. However, his next door neighbour just informed him that she can access his network and do all her online shopping for free. Since your friend does not really like his neighbor he wants to stop this happening. What should he do?
Enable Windows Firewall
Change the security settings of his WAP
Change the SSID for the WAP
Implement 802.11i


53. Which file in Windows 7 is cataloged by windows system image manager to create and answer file?
Boot.wim
Install.wim
Setup.exe
Install.wim


54. In which format is the answer file of customized Windows 7 image is stored?
Text
Batch
Exe
XML


55. Which version of TPM is required for configuring bitlocker in Windows 7?
TPM 1.0
TPM 1.2
TPM 2.0
None


56. You have installed Windows 7 in a client machine which had winsowsXp installed. Which operation you will perform to remove windows Xp installation data from the machine?
Simply Delete windows.old folder from the system drive
Do not perform any operation
Use disk cleanup and remove previously installed windows installation(s)
Run bcdedit

57. Which is the next immediate step you will perform after you have created a native virtual hard disk to access the disk?
Initialize the disk as an MBR
Create a partition
Both of the above
None of the above


58. Which of the following commands does not save changes before exiting from the VI editor?
:q!
:q
zz
:w


59. Which of the following commands pipes stdout and stderr from cmd1 to cmd2?
cmd2 | cmd1
cmd2 2>&1 | cmd1
cmd1 | cmd2
cmd1 2>&1 | cmd2


60. You work as the Network Administrator for McNeil Inc. The company has a Linux- based network. You are working as a root user on the Red Hat operating system. Joe is a user in your company. You want to remove Joes tmp files that are 3 days older. Which of the following command  syntaxes should you use to accomplish the task?
find /tmp -cmin +3 -user Joe -ok rm {} \;
find /tmp -ctime +3 user Joe -ok rm {} \;
find /tmp -ctime +3 -user Joe -ok rm {} \;
find /tmp -cmin +3 user Joe -ok rm {} \;


61. You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to know how many words are  present in the file named file1.txt. You type the following command on the terminal: wc file1.txt.  The command displays the following output:
40 245 1800 file1.txt How many words are present in the file file1.txt?

40
285
245
1800


62. Which of the following is NOT true about the inode table in the Linux operating system?
It contains the location information where data is stored in the hard disk
It contains information about what type of access permission of the file is available to whom
It contains the last access time, last modification time, however it does not store the last inode change time.
It contains the file type of the specified file


63. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, wants to combine the contents of the Sale1.txt and Sale2.txt files to a new file named FinSale.txt. Which of the following commands will he use to accomplish the task?

ls Sale1.txt Sale2.txt < FinSale.txt
cat Sale1.txt Sale2.txt < FinSale.txt
ls Sale1.txt Sale2.txt > FinSale.txt
cat Sale1.txt Sale2.txt > FinSale.txt

64. You work as a Network Administrator for company.com Inc. You have created a PostScript file by using a program. You want to convert it to a PDF file. Which of the following commands will you use to accomplish the task?
ps2pdf
enscript
pdf2ps
a2ps



65. Fill in the blank with the command to complete the statement below. Do not enter the full path of the command. The ________ command is used to compare the contents of two files for  differences in the Red Hat operating system

diff
differ
deff
daff


66. John is a newly appointed Network technician at McNeil Inc. The company has a Linux-based Network. John is currently working on the /tmp directory. The /tmp directory has a file named file3.txt. John wants to copy this file in a subdirectory named backup of his home directory /home/John. Which of the following commands should John use to accomplish his task? Each correct answer represents a complete solution. Choose three

cp file3.txt /home/John/backup
cp file3.txt /home/John/backup/

cp file3.txt backup
cp file3.txt ~/backup


67. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task?

VI
NMAP
MS Word
GZIP


68. Which of the following is a utility that can function as an independent spell checker?
spell
nice
aspell
inspell


69. You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?
history !#
history !!
history ##
history !1


70. Which of the following SHELL commands displays currently logged-in users and their tasks?
w
finger
whoami
who


71. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.
touch -t 200911110259.58 private.txt
rm private.txt #11 Nov 2009 02:59:58 am
touch private.txt #11 Nov 2009 02:59:58 am
touch -d "11 Nov 2009 02:59:58 am" private.txt



72. Which of the following are the Graphical Mail clients in Red Hat Enterprise Linux?
Each correct answer represents a complete solution. Choose two
Pidgin
Mozilla
Evolution

mutt



73. You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based  network.  By using the VI utility, you have created a document that has 100 lines. You want to replace all the occurrences of "net" with "Net" in the first 50 lines of the document. Which of the following commands will you use?
:1,$ s/net/Net/g
:1,100 s/net/Net/g
:1,50 s/net/Net/g
:s/net/Net/g

74. Which of the following commands will you execute to fix other writable files in your home directory?
find -perm -002 -exec chmod o-w {} \;
find /home -type d -ls
find ~ -perm -002 -exec chmod o-w {} \;
find ~ -perm -002 -exec chmod -w {} \;


75. John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linuxbased network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

touch VAR1
env -u VAR1
export VAR1
echo $VAR1

76. You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?
wc -c file1.txt >>error.txt
wc -c file1.txt 1>error.txt
wc -c file1.txt 2>error.txt
wc -c file1.txt >error.txt


77. If you want a very good display, then assigns more amount of RAM for display
True
False


78. The most popular Wi-Fi standard which uses Complimentary Code Keying(CCK) is _____
802.11b
802.11a
802.11g
802.11n

79. Which is the Wi-Fi standard which is known as WiMax which combines the benefits of both Broadband and Wireless?
802.11b
802.11a
802.16
802.11g


80. What is the frequency & data transfer rate of 802.11a standards?
5 GHZ, 54Mbps
2.4GHZ, 11Mbps
2.4GHZ, 54Mbps
2.4GHZ, 140 Mbps


81. Small size of IDE drives can hold _________
10GB
20GB to 30GB
30GB to 40GB
40GB

82.  are the two different sizes of SO-DIMM modules available?
2.375inch
2.625inch

2.525inch
2.750inch



83.  Telecommunication industry specification describing how mobile computers can be easily interconnected using a short run wireless connection.

Bluetooth
Infrared
Wi-Fi
GPRS

84. An amount of memory which stores the data temporarily to compensate for difference in data transmission from one device to another
Latch
Flip-Flop
Buffer
Cache

85. _________ is the process in which saving of image of your desktop with all open files & documents and power down of your computer happens
Hibernation
Sleep mode
Shutdown
Restart

86. The common desktop systems mostly uses _________ monitor for display
Liquid crystal display
Cathode ray tube
Thin film transistor
None of the above


87. What is the code name for speed step technology?
Geyser Ville
Core2duo
Paxville
None of the above

88. Quebec _____________________ the St. Lawrence River
rises in a magnificent way above
rises in a magnificent way , way above
rises magnificently above
rises magnificently way above


89. A _______________ can be defined as the discussion between two or more people about a topic that is pre-determined
Interview
MEETING
WRITTEN TEST
SEMINAR

90. Which of the following is not a formal communication?
General Enquiry
MEETING
SEMINARS
NONE OF THE ABOVE

91. Which of the following word is 2-Syllable word
Pad
MENTION
MECHANIC       DON’T KNOW
PATHETIC

92. Find odd one out
Dread
Spread
Sad
Bread


93. Find out the Silent Alphabet in this word – Knowledge
O
D
E
K

94. The ________________ are Energetic, Optimistic, Goal Oriented and get along with his co-workers
Achievers
Helpers
Romantics
Perfectionist


95. Which of the following is a type of communication?
Verbal Communication
Non-Verbal Communication
Para verbal Communication
All the above


96. Many nineteenth-century biographers ____________________, not on real facts
rely on their imagination
relied on their imagination
have relied on their imagination
could have relied on their imagination