Which of the following is the physical infrastructure that provides interconnections between ISPs?
An Internet exchange point
A central office
A point of presence
Which of the following provides physical separation between service provider and customer responsibilities?
A provider edge router
A demarcation point
Which TCP/IP layer is responsible for path determination and end-to-end forwarding of datagrams?
The application services layer
The transport layer
The Internet protocol layer
The network interface layer
What information is part of the encapsulation done at the network interface layer?
Source and destination MAC addresses
Source and destination IP addresses
Source and destination port numbers
Source and destination email addresses
Which of the following shows a typical data packet flow when egressing an Nokia 7750 SR?
SF/CPM -> MDA -> IOM -> SFP
SF/CPM -> SFP -> IOM -> MDA
SF/CPM -> IOM -> MDA -> SFP
MDA -> IOM -> SF/CPM -> SFP
Which of the following is not a recommended usage of the compact flashes on an Nokia 7750 SR?
Using CF 1 to store debug logs.
Using CF 2 to store debug logs.
Using CF 3 to store accounting logs.
Using CF 3 to store system files.
Which of the following displays a hierarchial CLI command structure at the current context level?
Which of the following is NOT a valid log destination in an Nokia 7750 SR?
Which one of the following log-IDs is typically reserved for Network Management on an Nokia 7750 SR
Which of the following is NOT a type of Layer 2 network?
Virtual private routed network
Which of the following statements about SONET/SDH is FALSE?
SONET/SDH is a Layer-1 technology
SDH is used primarily in North America
The basic SONET frame is the STS-1.
An STS-1 frame is exactly one third of an STM-1 frame
Which Ethernet frame field is found in the Ethernet II frame header but NOT in the Ethernet 802.3 frame header?
Start Frame Delimiter
Which address type is used to send frames to all devices in a Local Area Network?
Which of the following is NOT a characteristic of a hub?
It performs signal amplification.
It replicates Ethernet frames across all ports except
the receiving port.
It inspects Layer 2 frame headers.
It operates in half-duplex mode.
After all PCs in the below network have communicated with each other, which interface will switch D populate in its MAC FDB for PC1?
What happens when a switch receives an Ethernet frame with an unknown source MAC address and a destination MAC address of ff:ff:ff:ff:ff:ff?
The destination MAC address is saved in the MAC FDB,
and the frame is discarded.
The destination MAC address is saved in the MAC
FDB, and the frame is flooded to all ports except the
The source MAC address is saved in the MAC FDB, and
the frame is discarded.
The source MAC address is saved in the MAC FDB, and the
frame is flooded to all ports except the receiving port.
An Ethernet Local Area Network (LAN) consists of the components shown in the diagram. How many broadcast and collision domains are on this LAN?
2 broadcast domains, 7 collision domains
2 broadcast domains, 9 collision domains
3 broadcast domains, 7 collision domains
3 broadcast domains, 9 collision domains
7 broadcast domains, 9 collision domains
Which of the following statements about LAG is FALSE?
It aggregates physical links between devices
It provides point-to-point redundancy between
It supports auto-negotiation on ports in the LAG
It improves performance by increasing bandwidth
Which of the following protocols is used to prevent loops in Ethernet networks?
An 8-port Ethernet switch is configured with VLAN 100 on ports 1-4, and VLAN 200 on ports 5-8. What happens when the switch receives a frame with an unknown destination address on port 1?
The switch will flood the frames on ports 1 to 4.
The switch will flood the frames on ports 2 to 4.
The switch will flood the frames on ports 5 to 8.
The switch will flood the frames on ports 2 to 8.
Which of the following statements about VLAN stacking is FALSE?
It allows a service provider to support customers that use overlapping VLAN IDs.
It increases the number of VLANs a service provider can support.
It increases the size of the VLAN ID field in the Ethernet header.
It allows a service provider to add another VLAN tag to traffic.
Which of the following is used to connect multiple broadcast domains?
Which of the following IP header fields is used to distinguish IPv4 from IPv6 traffic?
Type of Service
Which of the following is NOT a Regional Internet Registry?
Which of the following is a unicast address that is assigned to two or more devices on the same network?
Which of the following about hierarchical IPv4 addressing is FALSE?
It creates a two-level address hierarchy.
It increases the number of IP addresses available in
It supports route summarization to reduce routing
It supports subnetting to divide a network into smaller
A network has an address of 18.104.22.168 and a network mask of 255.255.254.0. How many subnetworks can be created if each subnetnetwork must have at least 25 hosts?
Which of the following is the broadcast address of the network to which host 172.16.176.135/18 belongs?
How many subnets can be created from network 22.214.171.124/22 if each subnet must support 126 hosts?
Which of the following statements about a system IP address on an Nokia 7750 SR is FALSE?
It is a loopback address.
It has a fixed prefix value of /32.
It is manually configured by an operator.
It is associated with the management port.
Which of the following is a characteristic of route aggregation?
It summarizes subnet addresses into classful addresses.
It maps multiple private IP addresses into one public
It divides a network into multiple subnets.
It reduces the number of route advertisements within a network.
What is the most specific aggregate prefix for the following 3 subnets?
Which of the following is NOT part of the IP forwarding process?
Perform longest match lookup for the destination IP address.
Perform MAC address learning.
Push traffic through the switch fabric.
Identify physical egress interface.
Which DHCP message is used by a client to inform a DHCP server that it accepts the assigned IP address?
What type of message is an ARP response?
A unicast message
A broadcast message
A multicast message
An anycast message
Which of the following statements about ICMP is TRUE?
ICMP is used to resolve a MAC address for a given IP address.
ICMP messages are generated by Ethernet switches.
ICMP messages are encapsulated within IP datagrams.
ICMP relies on the CSMA/CD algorithm
Which of the following about the routing table on an Nokia 7750 SR is false?
The routing table is maintained by the CPM
The routing table contains next-hop information
The routing table is used in the MPLS data plane
The routing table is used to construct a forwarding table
Which of the following protocols is NOT used to build a routing table?
Router R5 receives four route updates for the same prefix. Which of the four routes will be installed in R5’s routing table?
Routes learned from R1
Routes learned from R2
Routes learned from R3
Routes learned from R4
Route learned from router R1
Route learned from router R2
Route learned from router R3
Route learned from router R4
Which of the following about a static route in an Nokia 7750 SR is FALSE?
It is manually configured by an administrator
It is preferred over dynamic protocols by default
It changes dynamically if the topology changes
It can be used for routing within the same autonomous system
When configuring a static route on router R2, what next hop address should be used to reach a host on 192.168.1.0/27?
Which of the following about an IP filter in an Nokia 7750 SR is FALSE?
It is also known as an Access Control List (ACL).
It is applied to all interfaces by default.
It can be used to filter traffic based on IP addresses.
It can be applied to egress traffic.
Which of the following about the displayed IP filter on an Nokia 7750 SR is TRUE?
It discards traffic from network 126.96.36.199/24.
It discards traffic to network 188.8.131.52/24.
It discards all traffic except the traffic from network 184.108.40.206/24.
It discards all traffic except the traffic to network 220.127.116.11/24.
Which of the following about a router running a link state routing protocol is FALSE?
It uses an SPF algorithm to calculate the routing table.
Route updates are driven by topology changes.
It sends copies of the routing table to neighbour routers.
It has a view of the entire network topology
Which routing protocol uses hop count for path selection?
Which routing protocol is best used to provide routing between autonomous systems?
Which of the following about the OSPF routing protocol is TRUE?
It is a distance vector protocol.
It uses SPF algorithm for route selection.
It uses hop count to determine metric value.
It is used for routing between different autonomous sytems.
Which of the following is used by OSPF to identify the most up-to-date routing information?
Priority value in the Hello packet.
Age in the Link State Advertisement.
Master/slave status in the Database Description packet.
Sequence number in the Link State Advertisement
Which of the following about BGP is FALSE?
It is a link state protocol.
It uses TCP sessions to establish BGP peering.
It can be used for routing within an autonomous system.
It can be used for routing between autonomous systems.
Which of the following about autonomous systems is FALSE?
AS numbers can be assigned by RIRs.
AS numbers can be assigned by ISPs.
Private AS numbers are advertised on the Internet.
eBGP is used between different autonomous systems.
Which of the following is TRUE about a CE router that is involved in a VPN service?
It is aware of the VPN services provided by the service provider.
It resides on the service provider premises.
It connects to at least one PE router.
It connects to at least one CE router.
What is the function of a SAP?
It provides a P device with service access.
It provides a CE device with service access.
It binds the service to an MPLS service tunnel.
It binds the service to an MPLS transport tunnel.
Which of the following about the service label is FALSE?
The ingress PE device encapsulates customer data with a service label.
A service label identifies the service that data belongs to.
The egress PE device strips the service labels and forwards unlabeled packets.
A P device performs a service label swap operation.
Which device adds MPLS labels to packets that enter a service provider network?
Which of the following about VPWS is FALSE?
VPWS is a Layer 2 service.
VPWS emulates a single leased line between two locations.
Each VPWS maintains a MAC FDB.
VPWS customers do not have knowledge of the service provider network.
Which of the following about VPLS is FALSE?
VPLS is a Layer 2 service.
VPLS emulates a switched Ethernet service.
VPLS customers don’t have knowledge of the service provider network.
Each PE maintains a VRF instance for each VPLS.
Which device is the termination point of a Label Switched Path (LSP)?
What operation is performed by an iLER when it receives a packet?
It pushes a new MPLS label and forwards the packet to the next LSR.
It swaps the MPLS albel and forwards the packet to the next LSR.
It forwards the packet to the next LSR without altering the MPLS label.
It pops the MPLS label and forwards the packet to the next IP router.
Which of the following devices performs a label swap operation?