ExamGecko
Home / Cisco / 800-150 / List of questions
Ask Question

Cisco 800-150 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

[Cisco IOS Software Basics]

What is the purpose of a subnet mask?

Distinguishes the network and host segments

Distinguishes the network and host segments

Provides encryption for network traffic

Provides encryption for network traffic

Determines the next-hop router

Determines the next-hop router

Aids in route prioritization

Aids in route prioritization

Suggested answer: A
Explanation:

A subnet mask is a 32-bit number used in IP networking to divide an IP address into network and host portions. This division is crucial for routing traffic within and between networks. The subnet mask works in tandem with the IP address to identify which part of the address refers to the network and which part refers to the host. This distinction allows for efficient IP address allocation and routing.

For example, in the IP address 192.168.1.10 with a subnet mask of 255.255.255.0, the first three octets (192.168.1) represent the network portion, while the last octet (10) identifies the specific host within that network.

asked 27/05/2025
Jonny McKitrick
49 questions

Question 12

Report Export Collapse

DRAG DROP

[Device Configuration and Verification]

Drag and drop the descriptions from the left onto the corresponding IPv4 addressing modes on the right.


Cisco 800-150 image Question 12 148473 05272025071204000
Correct answer: Cisco 800-150 image answer Question 12 148473 05272025071204000
asked 27/05/2025
DIGIX srl
41 questions

Question 13

Report Export Collapse

[Cisco Equipment and Related Hardware]

Cisco 800-150 image Question 13 63883969923973182734083

Refer to the exhibit. What are two ways remote sites or branches connect to the enterprise campus network? (Choose two.)

Access layer switches

Access layer switches

WAN links

WAN links

IPsec VPN tunnels

IPsec VPN tunnels

Ad hoc Wi-Fi network

Ad hoc Wi-Fi network

LAN core switches

LAN core switches

Suggested answer: B, C
Explanation:

In enterprise networking, remote sites or branch offices connect to the central campus network using:

WAN Links: These are dedicated communication paths that connect geographically dispersed networks. WAN links can be leased lines, MPLS circuits, or other forms of long-distance connectivity that facilitate reliable data transmission between remote sites and the main campus.

IPsec VPN Tunnels: Internet Protocol Security (IPsec) VPNs provide secure, encrypted tunnels over the public internet, allowing remote sites to connect to the enterprise network securely. This method is cost-effective and widely used for connecting branch offices to the central network infrastructure.

Access layer switches (Option A) and LAN core switches (Option E) are components within a local network and do not facilitate remote connectivity. Ad hoc Wi-Fi networks (Option D) are temporary and lack the security and reliability required for enterprise-level remote connections.

===========

asked 27/05/2025
Albert Hidalgo Bassons
53 questions

Question 14

Report Export Collapse

[Cisco Equipment and Related Hardware]

When should a crossover UTP cable be used instead of a straight-through cable when connecting network devices?

To connect electrically like devices

To connect electrically like devices

To connect a PC to a wireless access point

To connect a PC to a wireless access point

To connect a switch to a router

To connect a switch to a router

To connect electrically unlike devices

To connect electrically unlike devices

Suggested answer: A
Explanation:

A crossover UTP (Unshielded Twisted Pair) cable is used to connect two similar devices directly. This includes:

Switch to switch

Router to router

PC to PC

The crossover cable reverses the transmit and receive pairs, allowing for proper communication between like devices without the need for an intermediary device.

Conversely, a straight-through cable is used to connect dissimilar devices, such as:

PC to switch

Router to switch

PC to router

This cable maintains the same wiring on both ends, suitable for connecting different types of devices.

Therefore, when connecting electrically like devices, a crossover cable is appropriate.

===========

asked 27/05/2025
David Galiata
38 questions

Question 15

Report Export Collapse

[Cisco IOS Software Basics]

How many bits are borrowed from the default host portion of the address to create subnets in a Class B network with a subnet mask 255.255.255.0?

3 bits

3 bits

5 bits

5 bits

3 bits

3 bits

8 bits

8 bits

Suggested answer: D
Explanation:

In a Class B network, the default subnet mask is 255.255.0.0, which allocates:

16 bits for the network portion

16 bits for the host portion

When the subnet mask is changed to 255.255.255.0, it becomes:

24 bits for the network portion

8 bits for the host portion

This indicates that 8 bits have been borrowed from the host portion to create additional subnets. Borrowing bits allows for the division of the original network into smaller sub-networks, enhancing organization and security within the network.

asked 27/05/2025
Ammar Khan
30 questions

Question 16

Report Export Collapse

[Cisco Equipment and Related Hardware]

What is the function of an access layer device?

Provides high-speed data transport between buildings or different parts of the campus

Provides high-speed data transport between buildings or different parts of the campus

Serves as the entry point for end-user devices to connect to the network

Serves as the entry point for end-user devices to connect to the network

Provides secure external access to internal network components

Provides secure external access to internal network components

Connects remote offices to the main corporate network

Connects remote offices to the main corporate network

Suggested answer: B
Explanation:

In the hierarchical network design model, the access layer is the first layer and serves as the entry point for end-user devices to connect to the network. This layer connects user devices such as PCs, IP phones, wireless access points, printers, and scanners to the network. It facilitates the initial connection between end-user devices and the network infrastructure. The access layer also enforces security policies and provides services such as VLAN membership, port security, and Quality of Service (QoS).

Options A, C, and D refer to functions typically associated with the core or distribution layers, or with WAN connectivity, rather than the access layer.

===========

asked 27/05/2025
mohamed mamdouh
47 questions

Question 17

Report Export Collapse

[Wireless Device Support]

Which term describes the physical range of radio frequency coverage provided by an access point in a wireless topology?

Service Set Identifier (SSID)

Service Set Identifier (SSID)

Basic Service Area (BSA)

Basic Service Area (BSA)

Wireless LAN (WLAN)

Wireless LAN (WLAN)

Wireless LAN Controller (WLC)

Wireless LAN Controller (WLC)

Suggested answer: B
Explanation:

In wireless networking, the Basic Service Area (BSA) refers to the physical area of radio frequency coverage provided by an access point (AP) in a Basic Service Set (BSS). The BSA defines the coverage area where wireless clients can connect to the network through the AP. The size and shape of a BSA depend on various factors, including the AP's transmit power, antenna type, and physical environment.

Option A, the Service Set Identifier (SSID), is the network name broadcast by the AP. Option C, Wireless LAN (WLAN), refers to the overall wireless network. Option D, Wireless LAN Controller (WLC), is a device that manages multiple APs in a network.

===========

asked 27/05/2025
Harshvir Bhati
44 questions

Question 18

Report Export Collapse

[Device Configuration and Verification]

Which two configuration parameters are most critical to ensure optimal performance when configuring a network port for a newly installed IP phone in an enterprise environment? (Choose two.)

VLAN assignment

VLAN assignment

Link aggregation

Link aggregation

Spanning Tree Protocol

Spanning Tree Protocol

Power over Ethernet

Power over Ethernet

QoS classification

QoS classification

Suggested answer: A, D
Explanation:

When configuring a network port for a newly installed IP phone, two critical parameters to ensure optimal performance are:

VLAN Assignment: Assigning the correct VLANs is essential for segregating voice and data traffic. Typically, a separate voice VLAN is configured to prioritize voice traffic and enhance security.

Power over Ethernet (PoE): PoE allows the switch to supply power to the IP phone over the same Ethernet cable used for data transmission. This eliminates the need for separate power supplies and simplifies installation.

While QoS classification (Option E) is important for prioritizing voice traffic, it is typically configured at a broader network level. Link aggregation (Option B) and Spanning Tree Protocol (Option C) are more relevant to network redundancy and loop prevention, respectively, and are not directly critical for the initial configuration of an IP phone port.

===

asked 27/05/2025
Paul Beugelsdijk
46 questions

Question 19

Report Export Collapse

Which deployment scenarios are Cisco 8000 Series routers primarily designed for?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

DRAG DROP

[Cisco IOS Software Basics]

Cisco 800-150 image Question 20 63883969923988807317721

Refer to the exhibit. Drag and drop the steps in the TCP/IP encapsulation process from the left onto the corresponding layer on the right.


Become a Premium Member for full access
  Unlock Premium Member
Total 99 questions
Go to page: of 10
Search

Related questions