Cisco 800-150 Practice Test - Questions Answers, Page 2

List of questions
Question 11

[Cisco IOS Software Basics]
What is the purpose of a subnet mask?
Distinguishes the network and host segments
Provides encryption for network traffic
Determines the next-hop router
Aids in route prioritization
A subnet mask is a 32-bit number used in IP networking to divide an IP address into network and host portions. This division is crucial for routing traffic within and between networks. The subnet mask works in tandem with the IP address to identify which part of the address refers to the network and which part refers to the host. This distinction allows for efficient IP address allocation and routing.
For example, in the IP address 192.168.1.10 with a subnet mask of 255.255.255.0, the first three octets (192.168.1) represent the network portion, while the last octet (10) identifies the specific host within that network.
Question 12

DRAG DROP
[Device Configuration and Verification]
Drag and drop the descriptions from the left onto the corresponding IPv4 addressing modes on the right.
Question 13

[Cisco Equipment and Related Hardware]
Refer to the exhibit. What are two ways remote sites or branches connect to the enterprise campus network? (Choose two.)
Access layer switches
WAN links
IPsec VPN tunnels
Ad hoc Wi-Fi network
LAN core switches
In enterprise networking, remote sites or branch offices connect to the central campus network using:
WAN Links: These are dedicated communication paths that connect geographically dispersed networks. WAN links can be leased lines, MPLS circuits, or other forms of long-distance connectivity that facilitate reliable data transmission between remote sites and the main campus.
IPsec VPN Tunnels: Internet Protocol Security (IPsec) VPNs provide secure, encrypted tunnels over the public internet, allowing remote sites to connect to the enterprise network securely. This method is cost-effective and widely used for connecting branch offices to the central network infrastructure.
Access layer switches (Option A) and LAN core switches (Option E) are components within a local network and do not facilitate remote connectivity. Ad hoc Wi-Fi networks (Option D) are temporary and lack the security and reliability required for enterprise-level remote connections.
===========
Question 14

[Cisco Equipment and Related Hardware]
When should a crossover UTP cable be used instead of a straight-through cable when connecting network devices?
To connect electrically like devices
To connect a PC to a wireless access point
To connect a switch to a router
To connect electrically unlike devices
A crossover UTP (Unshielded Twisted Pair) cable is used to connect two similar devices directly. This includes:
Switch to switch
Router to router
PC to PC
The crossover cable reverses the transmit and receive pairs, allowing for proper communication between like devices without the need for an intermediary device.
Conversely, a straight-through cable is used to connect dissimilar devices, such as:
PC to switch
Router to switch
PC to router
This cable maintains the same wiring on both ends, suitable for connecting different types of devices.
Therefore, when connecting electrically like devices, a crossover cable is appropriate.
===========
Question 15

[Cisco IOS Software Basics]
How many bits are borrowed from the default host portion of the address to create subnets in a Class B network with a subnet mask 255.255.255.0?
3 bits
5 bits
3 bits
8 bits
In a Class B network, the default subnet mask is 255.255.0.0, which allocates:
16 bits for the network portion
16 bits for the host portion
When the subnet mask is changed to 255.255.255.0, it becomes:
24 bits for the network portion
8 bits for the host portion
This indicates that 8 bits have been borrowed from the host portion to create additional subnets. Borrowing bits allows for the division of the original network into smaller sub-networks, enhancing organization and security within the network.
Question 16

[Cisco Equipment and Related Hardware]
What is the function of an access layer device?
Provides high-speed data transport between buildings or different parts of the campus
Serves as the entry point for end-user devices to connect to the network
Provides secure external access to internal network components
Connects remote offices to the main corporate network
In the hierarchical network design model, the access layer is the first layer and serves as the entry point for end-user devices to connect to the network. This layer connects user devices such as PCs, IP phones, wireless access points, printers, and scanners to the network. It facilitates the initial connection between end-user devices and the network infrastructure. The access layer also enforces security policies and provides services such as VLAN membership, port security, and Quality of Service (QoS).
Options A, C, and D refer to functions typically associated with the core or distribution layers, or with WAN connectivity, rather than the access layer.
===========
Question 17

[Wireless Device Support]
Which term describes the physical range of radio frequency coverage provided by an access point in a wireless topology?
Service Set Identifier (SSID)
Basic Service Area (BSA)
Wireless LAN (WLAN)
Wireless LAN Controller (WLC)
In wireless networking, the Basic Service Area (BSA) refers to the physical area of radio frequency coverage provided by an access point (AP) in a Basic Service Set (BSS). The BSA defines the coverage area where wireless clients can connect to the network through the AP. The size and shape of a BSA depend on various factors, including the AP's transmit power, antenna type, and physical environment.
Option A, the Service Set Identifier (SSID), is the network name broadcast by the AP. Option C, Wireless LAN (WLAN), refers to the overall wireless network. Option D, Wireless LAN Controller (WLC), is a device that manages multiple APs in a network.
===========
Question 18

[Device Configuration and Verification]
Which two configuration parameters are most critical to ensure optimal performance when configuring a network port for a newly installed IP phone in an enterprise environment? (Choose two.)
VLAN assignment
Link aggregation
Spanning Tree Protocol
Power over Ethernet
QoS classification
When configuring a network port for a newly installed IP phone, two critical parameters to ensure optimal performance are:
VLAN Assignment: Assigning the correct VLANs is essential for segregating voice and data traffic. Typically, a separate voice VLAN is configured to prioritize voice traffic and enhance security.
Power over Ethernet (PoE): PoE allows the switch to supply power to the IP phone over the same Ethernet cable used for data transmission. This eliminates the need for separate power supplies and simplifies installation.
While QoS classification (Option E) is important for prioritizing voice traffic, it is typically configured at a broader network level. Link aggregation (Option B) and Spanning Tree Protocol (Option C) are more relevant to network redundancy and loop prevention, respectively, and are not directly critical for the initial configuration of an IP phone port.
===
Question 19

Which deployment scenarios are Cisco 8000 Series routers primarily designed for?
Question 20

DRAG DROP
[Cisco IOS Software Basics]
Refer to the exhibit. Drag and drop the steps in the TCP/IP encapsulation process from the left onto the corresponding layer on the right.
Question