1. CONFIDENTIAL FN311 INTERNET SERVICES
Page 2 of 21
SECTION A
OBJECTIVE QUESTIONS (50 MARKS)
INSTRUCTION
This section consists of FORTY (40) objective questions. Answer ALL questions in the
answer booklet.
1. The IT manager of a medium-sized business wishes to house the company-owned
web servers in a facility that offers round-the-clock controlled access, redundant
power, and high-bandwidth Internet access. Which ISP service will fulfill this
need?
CLO1
A. Application Hosting
B. Equipment Co-Location
C. Planning and provisioning
D. Web Hosting
2. Which network utility helps determine the location of network problems and
identifies routers that packets travel across?
CLO1
A. nslookup
B. netstat
C. ping
D. tracert
2. CONFIDENTIAL FN311 INTERNET SERVICES
Page 3 of 21
3. At which point do individuals and small businesses connect directly to the ISP
network to obtain Internet access?
CLO1
A. At a POP
B. At an IXP
C. At a Metro Ethernet link
D. On the ISP extranet
4. What is the basic procedure of incident management?
CLO1
A. Opening a trouble ticket
B. Using diagnostic tools to identify the problem
C. Surveying network conditions for further analysis
D. Configuring new equipment and software upgrades
5. Which ISP network support systems team will typically contact the customer once
a new circuit is ready and guide the customer in setting up passwords and other
account information?
CLO1
A. Network operations center
B. On-site installation team
C. Help desk
D. Customer service
3. CONFIDENTIAL FN311 INTERNET SERVICES
Page 4 of 21
6. The IT manager of a medium-sized business wishes to house the company-owned
web servers in a facility that offers round-the-clock controlled access, redundant
power, and high-bandwidth Internet access. Which ISP service will fulfill this
need?
CLO1
A. Web hosting
B. Planning and provisioning
C. Application hosting
D. Equipment collocation
7. What are the things included in a logical topology document?
CLO1
A. The location of cables, computers, and other peripherals
B. The wireless signal coverage area
C. The device names and Layer 3 addressing information
D. The wiring closet and access point locations
8. A network technician is assigned to perform a site visit to a customer’s location to
determine the requirements for a network upgrade. In addition to the currently
installed equipment inventory, what other information about the hosts and
networking devices should the technician obtain from the customer?
CLO1
A. The cost of the currently installed equipment
B. All product keys for site license software
C. Any planned growth anticipated in the near future
D. The memory requirements for installed application software
4. CONFIDENTIAL FN311 INTERNET SERVICES
Page 5 of 21
9. SHA Company requires a networking device that is capable of expansion to
accommodate growing network demands. What characteristic must this device
have to meet this requirement?
CLO3
A. Modular physical configuration
B. Ability to manage the device remotely
C. Ports that can be activated and deactivated
D. Ability to monitor operation and change the settings for a device
10. What does the use of redundant network components supply to a network? CLO1
A. Scalability
B. Manageability
C. Compatibility
D. Reliability
11. Which IPv4 class provides the lowest number of host addresses per network?
CLO2
A. Class A
B. Class B
C. Class C
D. Class D
5. CONFIDENTIAL FN311 INTERNET SERVICES
Page 6 of 21
12. What is the network broadcast address for a Class C address of 192.168.32.0 with
the default subnet mask?
CLO2
A. 192.168.0.255
B. 192.168.32.254
C. 192.168.32.255
D. 192.168.32.0
13. How many usable hosts are available given a Class C IP address with the default
subnet mask?
CLO2
A. 254
B. 255
C. 256
D. 510
14. How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28
subnets?
CLO2
A. 16
B. 32
C. 256
D. 1024
6. CONFIDENTIAL FN311 INTERNET SERVICES
Page 7 of 21
15. Which subnet mask would be appropriate for a Class C address used for 9 LANs,
each with 12 hosts?
CLO2
A. 255.255.255.0
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.252
16. What is the reason that NAT was developed?
CLO3
A. To allow users on the public Internet to access local networks
B. To provide a method for privately addressed LANs to participate in the
Internet
C. To make routing protocols operate more efficiently
D. To allow private addresses to be routed on the public Internet
17. Which port numbers are used by PAT to create unique global addresses?
CLO3
A. 1024 and above
B. 64,000 and above
C. 255 and below
D. 1023 and above
7. CONFIDENTIAL FN311 INTERNET SERVICES
Page 8 of 21
18. Static NAT works by mapping a specific inside local IP address to what other
specific address type?
CLO2
A. Inside global
B. Outside local
C. Outside global
D. Private IP address
19. What information is included in RIPv2 routing update that is not included in
RIPv1 updates?
CLO2
A. Subnet mask
B. Area identification
C. Hop count
D. Autonomous system number
20. What is the purpose of a routing protocol?
CLO1
A. It is used to build and maintain ARP tables
B. It provides a method for segmenting and reassembling data packets
C. It allows an administrator to devise an addressing scheme for the network
D. It provides a procedure for encoding and decoding data into bits for packet
forwarding
8. CONFIDENTIAL FN311 INTERNET SERVICES
Page 9 of 21
21. Which protocol is an exterior routing protocol?
CLO1
A. OSPF
B. RIP
C. BGP
D. EIGRP
22. What statement is true regarding an AS number?
CLO1
A. All routers at an ISP must be assigned the same AS number
B. ISPs require all customers to have registered AS numbers
C. Interior routing protocols require registered AS numbers
D. AS numbers are controlled and registered for Internet use
23. A Catalyst switch is used as a temporary replacement for another switch that needs
to be repaired. About a minute after the switch has started, the SYST LED on the
front of the switch transitions from blinking green to amber. What is the meaning
of the amber SYST LED?
CLO2
A. The switch has no configuration file in NVRAM.
B. The switch is functioning properly.
C. The switch has failed POST and must be sent for service.
D. The switch is in half-duplex mode.
9. CONFIDENTIAL FN311 INTERNET SERVICES
Page 10 of 21
24. What is the correct command sequence to configure a router host name to
"LAB_A"?
CLO2
A. Router> enable
Router# configure terminal
Router(config)# hostname LAB_A
B. Router> enable
Router# hostname LAB_A
C. Router> enable
Router# configure router
Router(config)# hostname LAB_A
D. Router> enable
Router(config)# host name LAB_A
25. Refer to Figure 1. Which series of commands will correctly configure the serial
interface on Router2?
CLO2
Figure 1
10. CONFIDENTIAL FN311 INTERNET SERVICES
Page 11 of 21
A. Router2(config)# interface S0/0/0
Router2(config-if)# ip address 192.168.6.11 255.255.255.252
Router2(config-if)# clock rate 64000
Router2(config-if)# no shutdown
B. Router2(config)# interface S0/0/0
Router2(config-if)# ip address 192.168.6.11 255.255.255.252
Router2(config-if)# no shutdown
C. Router2(config)# interface S0/0/0
Router2(config-if)# ip address 192.168.6.9 255.255.255.252
Router2(config-if)# clock rate 64000
Router2(config-if)# no shutdown
D. Router2(config)# interface S0/0/0
Router2(config-if)# ip address 192.168.6.9 255.255.255.252
Router2(config-if)# no shutdown
26. In which does an SDM differ from the IOS CLI? CLO3
i. SDM is used for in-band management only. The IOS CLI can be used for
in-band and out-of-band management.
ii. SDM is accessed through a Telnet application. The IOS CLI is accessed
through a web browser.
iii. SDM is available for all router platforms. The IOS CLI is available for a
limited number of Cisco devices.
iv. SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of
text-based commands.
v. SDM is used for advanced configuration tasks. The IOS CLI is preferred
for initial basic device configuration.
11. CONFIDENTIAL FN311 INTERNET SERVICES
Page 12 of 21
A. i and ii
B. ii and iii
C. iii and v
D. i and iv
27.
Figure 2
Refer to Figure 2. Router B receives a packet with a destination address of
10.16.1.97. What will router B does?
CLO3
A. Router will drop the packet
B. Router will use the default route
C. Router will forward the packet via the route to 10.16.1.0
D. Router will forward the packet via the route to 10.16.1.64
28. What Layer 1 problem can cause a user to lose Internet connectivity?
CLO3
A. Wrong default gateway
B. Wrong MAC address
C. Loose network cable
D. Wrong subnet mask
12. CONFIDENTIAL FN311 INTERNET SERVICES
Page 13 of 21
29. A client is communicating with a server on a different segment of the network.
How does the server determine what service is being requested by the client?
CLO3
A. Applies the default service configured in directory services
B. Uses ARP to discover the appropriate service from the local router
C. Sends a request to the client asking for the appropriate service
D. Identifies the appropriate service from the destination port field
30. Choose a characteristic of network reliability?
CLO1
A. Redundant hardware provides enhanced reliability.
B. Reliability is measured based on the number of applications in use on the
network.
C. The longer the MTTR, the greater the reliability.
D. An ISP guarantees the same level of reliability to all of its customers.
31. A hacker has gained access to sensitive network files. In analyzing the attack, it is
found that the hacker gained access over a wireless segment of the network. It is
further discovered that the only security measure in place on the wireless network
is MAC Address Filtering. How is it likely that the hacker gained access to the
network?
CLO3
A. The hacker used a software tool to crack the shared hexadecimal wireless key.
B. The hacker obtained the MAC address of a permitted host, and cloned it on
his wireless laptop NIC.
C. The attacker mounted a denial of service attack to overwhelm the firewall
before penetrating the wireless LAN.
D. The hacker gained wireless access to the MAC address database and added
his own MAC address to the list of permitted addresses.
13. CONFIDENTIAL FN311 INTERNET SERVICES
Page 14 of 21
32. A small company with two offices in the same building is requesting advice in
WAN connection. Which TWO questions would give technician information to
base a recommendation?
CLO3
i. What operating system is being used?
ii. How much money has the customer budgeted to spend on the WAN
connection?
iii. What type of e-mail client software is used by the employee?
iv. Are the computers laptops or workstations?
v. Are the company web servers located in the building or at the ISP?
A. i and ii
B. ii and iii
C. ii and v
D. i and iv
33. SnS Company wants to configure a firewall to monitor all channels of
communication and allow only traffic that is part of a known connection. Which
firewall configuration should be deployed?
CLO1
A. Packet filtering
B. Proxy
C. Stateful packet inspection
D. Stateless packet inspection
14. CONFIDENTIAL FN311 INTERNET SERVICES
Page 15 of 21
34. Many backup scenarios require daily swapping of media to maintain a history of
backed up data. Data loss could occur if the tape or disk is not swapped daily.
Since swapping the tapes is a manual task, it is prone to failure. Users need to use
a notification method, such as calendar or task scheduling. What is the above
statement about?
CLO1
A. Review Backup Logs
B. Swap media
C. Perform Trial Restores
D. Perform Drive Maintenance
35. Which two characteristics of network traffic are being monitored if a network
technician configures the company firewall to operate as a packet filter?
CLO1
i. ports
ii. physical addresses
iii. packet size
iv. frame sequence number
v. protocols
A. i and ii
B. ii and iii
C. ii and v
D. i and iv
15. CONFIDENTIAL FN311 INTERNET SERVICES
Page 16 of 21
36. What does the command copy flash tftp accomplish?
CLO1
A. It copies the IOS in flash to a TFTP server.
B. It copies the startup-configuration file in flash to a TFTP server.
C. It copies the running-configuration file in flash to a TFTP server.
D. It copies the configuration register settings in flash to a TFTP server.
37. Which is the potential problem with using tape media to back up server data?
CLO1
A. Data tapes are prone to failure and must be replaced often.
B. Tape is not a cost-effective means of backing up data.
C. Data tapes are difficult to store offsite.
D. Backup logs are not available with tape backup solutions.
38. Before a technician upgrades a server, it is necessary to back up all data. Which
type of backup is necessary to ensure that all data is backed up?
CLO3
A. Daily backups
B. Differential backups
C. Full backups
D. Incremental backups
39. While downloading an IOS image from a TFTP server, an administrator sees long
strings of exclamation marks (!) output to the console. What does this mean?
CLO1
A. The transfer is working.
B. The TFTP server is not responding.
C. The IOS file is corrupt and is failing the checksum verification.
D. There is not enough space in flash to hold the image.
16. CONFIDENTIAL FN311 INTERNET SERVICES
Page 17 of 21
40. A PC is able to reach devices that are located both inside and outside the network.
However, when trying to reach an FTP server that is located on the same subnet,
the PC fails to make a connection. The administrator has several other PCs that are
located in the same subnet try a connection to the FTP server and they are
successful. Which troubleshooting tool can be used to determine the problem
between the PC and the FTP server?
CLO3
A. cable tester
B. digital multimeter
C. protocol analyzer
D. network analyzer
17. CONFIDENTIAL FN311 INTERNET SERVICES
Page 18 of 21
SECTION B
STRUCTURED QUESTIONS (50 MARKS)
INSTRUCTION:
This section consists of TWO (2) structured questions. Answer ALL questions.
QUESTION 1
The following questions are based on Figure 1.1
Figure 1.1
(a) Find the value of the broadcast id on the side of R1 (Fa0/0) and on the
side of R3 (Fa0/0) using default subnet mask of class B. CLO2
(4 marks)
(b) Explain the purpose of line 3 in the R2 routing table. CLO1
(4 marks)
(c) What is the best routing protocol used in this routing? Explain the
reason. CLO1
(3 marks)
18. CONFIDENTIAL FN311 INTERNET SERVICES
Page 19 of 21
(d) From the global configuration mode, configure the password for R1
device as below:
Console password Politeknik
vty line password Politeknik123
Enable password JTMK
Enable secret JTMK123
CLO2
(8 marks)
(e) From the configuration mode, configure the RIP version 2 on the R1
device CLO2
(6 marks)
19. CONFIDENTIAL FN311 INTERNET SERVICES
Page 20 of 21
QUESTION 2
(a) It is important that the ISP provide a reliable and scalable network to get
better services performance for their customers. Explain what is
scalability? CLO1
(3 marks)
(b) Describe the definition of Routing Information Protocol and explain the
key characteristics of RIP. CLO1
(8 marks)
(c) An Ethernet port on a router was assigned with an IP address of
172.16.112.1 / 20
i. Write the subnet mask in four dotted decimal form.
ii. What is the maximum number of hosts is allowed to support in
this subnet?
iii. Identify the network address and broadcast address for that
subnet.
iv. Identify the range of IP address available for the hosts?
CLO1
(1 mark)
CLO1
(1 mark)
CLO2
(2 marks)
CLO3
(1 mark)
20. CONFIDENTIAL FN311 INTERNET SERVICES
Page 21 of 21
(d) Based on the Figure 2.1, two (2) routers were used to enable host H1
and host H2 to communicate. Using information given in the figure and
in global configuration mode;
Figure 2.1
i. Write the command lines to give an IP address to FastEthernet 0/1
and serial interface 0/0/0 in router R1.
ii. Serial 0/0/0 is DCE, so set the clock rate of 6400 at the
appropriate port.
iii. Enable both ports so it can function properly with no shutdown
command and exit.
CLO1
(5 marks)
CLO1
(2 marks)
CLO2
(2 marks)