Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Nokia > SRC Certification > 4A0-100

4A0-100 Nokia Scalable IP Networks Question and Answers

Question # 4

What is the function of a Routing Table Manager (RTM)?

A.

To find the best path to the destination network and install it in the routing table - based on the metrics of the routing protocol.

B.

To provide a CLI interface that allows the operator to configure the dynamic routing protocol on the router.

C.

To choose the route with the lowest preference and install it in the routing table - based on the routing protocol preference values.

D.

To provide a CLI interface that allows the network operator to install static routes in the routing table.

Full Access
Question # 5

What type of VPN service does a VPWS provide?

A.

Layer 3 direct internet access service

B.

Layer 3 IP routed service

C.

Layer 2 point-to-point service

D.

Layer 2 multipoint service

Full Access
Question # 6

Which of the following is used for the auto completion of CLI commands in a Nokia 7750 SR?

A.

Type the first few letters of the command, then press Ctrl C.

B.

Type the first few letters of the command, then press Esc.

C.

Type the first few letters of the command, then press Tab.

D.

Type the first few letters of the command, then type ?.

Full Access
Question # 7

What type of BGP sessions does router R2 need to establish in order to reach networks 192.168.1.0/27 and 192.168.5.0/27?

A.

eBGP peering sessions with routers R1, R3 and R4

B.

iBGP peering sessions with routers R1 and R5

C.

An eBGP peering session with router R1, and iBGP peering sessions with routers R3 and R4

D.

An iBGP peering session with router R1, and an eBGP peering session with router R4

Full Access
Question # 8

What is the sequence of messages sent by a host when it attempts to ping a destination for which it has no Address Resolution Protocol (ARP) cache entry?

A.

ICMP echo request, ARP request, ARP reply, ICMP echo reply.

B.

ARP request, ARP reply, ICMP echo request, ICMP echo reply.

C.

ICMP echo request, ICMP echo reply, ARP request, ARP reply.

D.

ICMP echo request, ARP reply, ARP request, ICMP echo reply.

Full Access
Question # 9

Which of the following command lines would be found in a list of commands designed to permit only certain type of traffic from exiting router RTR-A to router RTR-B?

A.

RTR-A>config>router>if>ingress# filter ip 1

B.

RTR-B>config>router>if>ingress# filter ip 1

C.

RTR-B>config>router>if>egress# filter ip 1

D.

RTR-A>config>router>if>egress# filter ip 1

Full Access
Question # 10

What is the basic unit of framing in SONET and the bit rate for its transmission?

A.

STS-1 with a bit rate of 1.544 Mbit/s

B.

STS-1 with a bit rate of 2.048 Mbit/s

C.

STS-1 with a bit rate of 51.84 Mbit/s

D.

STS-1 with a bit rate of 155.52 Mbit/s

Full Access
Question # 11

Which of the following describes the Nokia 7750 SR Input/Output Module (IOM)?

A.

Small optical module available in a variety of formats.

B.

Contains a CPU for managing the forwarding hardware in each flexible fast path.

C.

Converts traffic from an external standard format to an internal format.

D.

Contains the CPU that runs the routing protocol software as well as the switch fabric.

Full Access
Question # 12

Which of the following is not supported on the Nokia 7450 ESS?

A.

Support for IPv6.

B.

Support for POS.

C.

Upgrade path to the Nokia 7750 SR.

D.

Support for IS-IS

Full Access
Question # 13

A Class C network is defined by a:

A.

32-bit network prefix.

B.

24-bit network prefix.

C.

16-bit network.

D.

8-bit network.

Full Access
Question # 14

Kahn solved the problem of interconnecting different networks using different protocols by pioneering a new protocol called TCP that was capable of:

A.

Secure transmission of information.

B.

Enforcing a constant packet size to avoid discards.

C.

Allowing remote logins.

D.

Providing host to host connectivity with global addressing.

Full Access
Question # 15

One of the tasks of the boot options file (BOF) is to:

A.

Specify authorization information to control access to the router.

B.

Define an IP address for the CPM Ethernet port.

C.

Initialize the hardware.

D.

Set the date/time for the system.

Full Access
Question # 16

If a 4-port LAG is configured with the option of 'port-threshold 2' and 'action down' what will happen if the total operational links in the LAG is 2?

A.

If dynamic-cost is enabled it will adjust the cost for routing protocols such as OSPF.

B.

If dynamic-cost is not enabled it will adjust the cost for routing protocols such as OSPF by dividing the link bandwidth by 2.

C.

The LAG will be changed to an operational state of 'down'.

D.

The LAG will function with only 2 ports. There will be no change to the routing metric.

Full Access
Question # 17

What happens immediately after an Ethernet switch receives an Ethernet frame?

A.

It records the destination MAC address and the interface on which it arrived.

B.

It records the source MAC address and the interface on which it arrived.

C.

It floods the frame out of all its interfaces except the interface on which the frame arrived.

D.

It transmits the frame out of the appropriate interface.

Full Access
Question # 18

The IANA is responsible for:

A.

Intra-city ISP traffic

B.

Allocation of the global IP address space

C.

Allocating IP addresses for residential customer traffic

D.

Allocating North American IP addresses

Full Access
Question # 19

What is the name for an organization that provides Internet services to its customers?

A.

A large corporation.

B.

An ISP.

C.

A home based business.

D.

A content provider.

Full Access
Question # 20

Which of the following is a characteristic of the IP layer?

A.

Provides an unreliable, connectionless data transmission service.

B.

Provides a mechanism for flow control.

C.

Verifies the integrity of all received datagrams.

D.

Provides services equivalent to the OSI data link layer.

Full Access
Question # 21

What characteristic of IP addressing creates a hierarchical network?

A.

All hosts on all networks must have unique host numbers.

B.

IP addresses identify a host and the network on which it resides.

C.

Clients are assigned 32-bit addresses and servers 64-bit addresses.

D.

Router, switch and host addresses are drawn from unique address classes.

Full Access
Question # 22

Which of the following is true of Ethernet half-duplex transmission?

A.

Half-duplex transmission is less efficient because the frame MTU is smaller.

B.

Half-duplex transmission is only 30-40% efficient because of collisions.

C.

Ethernet switches support half-duplex transmission only.

D.

All of the above.

Full Access
Question # 23

Public IP address spaces are distributed by which of the following organizations?

A.

Network Solutions INC

B.

IANA

C.

IETF

D.

ITU-T

E.

IEEE

Full Access
Question # 24

A 24 port Ethernet switch is configured with VLAN 100 on ports 1 - 8, VLAN 200 on ports 9 - 16 and VLAN 300 on ports 17 - 24. Which of the following describes the behavior of the switch when a broadcast frame is received on port 1?

A.

The switch will discard the broadcast frame because there is no specific destination address.

B.

The switch will flood the broadcast frame on all ports on which the switch has seen frames from attached devices

C.

The switch will flood the broadcast frame on ports 2 to 8.

D.

The switch will flood the broadcast frame on all 24 ports.

Full Access
Question # 25

What problems was Spanning Tree Protocol (STP) primarily designed to solve? (Choose two.):

A.

Providing path redundancy.

B.

Preventing loops.

C.

Handling collisions.

D.

Allowing flooding of multicast traffic.

Full Access
Question # 26

Which of the following statements is FALSE when describing a Virtual Private LAN Service?

A.

A VPLS emulates a virtual switch or bridge.

B.

The VPLS performs MAC learning on MAC addresses seen from SAPs and SDPs.

C.

When a VPLS receives a frame with an unknown MAC destination, the frame will be dropped.

D.

MAC addresses are maintained in a MAC address forwarding database (FDB).

Full Access
Question # 27

Which of the following mediums can be used in a VPWS when defining SAPs (Select three)?

A.

Ethernet.

B.

ATM.

C.

Frame Relay.

D.

Token Ring.

Full Access
Question # 28

In the diagram, R3 receives an LSA with the sequence number 111 from R7 and then receives another copy of the LSA with a sequence number 112 from R1. What does R3 do with the LSA from R1?

A.

R3 discards the LSA received from R1 and sends a copy of the LSA from its link state base to R1.

B.

R3 installs the LSA received from R1 in its link state database and floods a copy to its neighbors.

C.

R3 discards the LSA received from R1 and sends an ACK to R1.

D.

R3 installs the LSA received from R1 in its link state database, sends an ACK to R1 and floods a copy to its neighbors.

Full Access
Question # 29

Which of the following protocols belongs to the OSI suite of protocols? (Choose two.)

A.

OSPF

B.

BGP

C.

X.500

D.

IS-IS

E.

Ethernet

Full Access
Question # 30

Which is the public AS in the diagram?

A.

65001

B.

65003

C.

2002

D.

All of the above.

E.

None of the above.

Full Access
Question # 31

What is the purpose of TCP flow control?

A.

It restricts the sender from sending too much data when there is congestion in the network.

B.

It allows the receiver to control the rate at which the sender transmits data.

C.

It forces the sender to send only one segment at a time.

D.

It allows the receiver to drop segments without the sender having to retransmit.

Full Access
Question # 32

In the diagram, what type of BGP session is established between the routers of AS 65001 and AS 2002?

A.

IGP

B.

IBGP

C.

EBGP

D.

EGP

E.

BGP cannot be run between routers in different ASs.

Full Access
Question # 33

What does a VPLS solution look like from a customers perspective?

A.

To the customer, it appears as if all sites are directly connected by a single cable.

B.

To the customer, it appears as if all sites are connected through a single switched LAN.

C.

To the customer, it appears as if all sites are connected through a single router.

D.

To the customer, it appears as if all sites are connected through a series of private point-to-point connections.

Full Access
Question # 34

A VPWS service maintains a MAC Forwarding Database (FDB) for Ethernet SAPs.

A.

True

B.

False

Full Access
Question # 35

From the CE perspective, how does a VPLS operate?

A.

A VPLS operates as if 2 sites are directly connected by a single cable.

B.

A VPLS operates as if multiple sites are connected through a single switched LAN.

C.

A VPLS operates as if multiple sites are connected through a single router.

D.

A VPLS operates as if multiple sites are connected through a series of private point-to-point routed connections.

Full Access
Question # 36

In regards to the Nokia 7750 SR-12 router, how many of the front access card slots are dedicated for Control Processors?

A.

1

B.

2

C.

7

D.

10

Full Access
Question # 37

Which of the following are accurate statements about the PE device in a service providers MPLS network? (Select three)

A.

A PE router only connects to CE devices.

B.

A PE router only connects to P routers.

C.

A PE router connects to at least one P router.

D.

A PE router connects to at least one CE device.

E.

PE routers support many different interface types connecting to CE devices.

F.

PE routers only support Ethernet interfaces connecting to the CE.

Full Access
Question # 38

The 201.148.26.0/24 network is subnetted using a /26 mask. How many subnets and host addresses will be obtained with this mask?

A.

4 subnets, 64 hosts

B.

64 subnets, 4 hosts

C.

4 subnets, 62 hosts

D.

64 subnets, 2 hosts

E.

6 subnets, 30 hosts

Full Access
Question # 39

What problem was Spanning Tree Protocol (STP) primarily designed to solve?

A.

Inability to perform switch to switch redundancy using multiple connections at Layer 2.

B.

Missing protocol field in Ethernet II required to identify redundancy protocols at Layer 2.

C.

Missing packet sequencing in Layer 2 Ethernet required to re-order packets on arrival.

D.

Inability to forward multicast frames without a routing protocol.

Full Access
Question # 40

Host A receives a TCP SYN/ACK segment. What does this signify?

A.

Host A has received a request to establish a TCP session.

B.

Host A has received a request to close a TCP session

C.

A TCP session is now established to host A.

D.

The TCP session has been terminated due to a timeout.

Full Access
Question # 41

What are some of the characteristics of BGP? (Choose three.)

A.

BGP is an exterior gateway protocol.

B.

BGP routing is based on distance vector.

C.

BGP sends periodic updates to its neighbors.

D.

A router running BGP protocol needs an Autonomous system number

Full Access
Question # 42

Which of the following information can be seen within the FILE context of the SR 7x50? (Choose two.)

A.

File sizes

B.

Port statistics

C.

Log-id 100 files

D.

TiMOS image files

Full Access
Question # 43

Multiple SAPs may be defined on the same physical port and may be used for different services.

A.

True

B.

False

Full Access
Question # 44

Which of the following statements about ARP request and ARP response messages is TRUE?

A.

Both ARP request and response messages are unicast messages.

B.

Both ARP request and response messages are broadcast messages.

C.

An ARP request is a broadcast message, while an ARP response is a unicast message.

D.

An ARP request is a unicast message, while an ARP response is a broadcast message.

Full Access
Question # 45

Which of the following is a characteristic of a subnet created with a prefix length of /32?

A.

The subnet has only one address reserved for a loopback interface or the system interface.

B.

The subnet has a broadcast address.

C.

The subnet is configured for a point-to point link.

D.

The subnet is reserved for a multicast address groups.

Full Access
Question # 46

What is the purpose of a multicast address?

A.

To provide an address that refers to all devices in a network.

B.

To provide an address that refers to a specific group of devices in a network.

C.

To provide an address that refers to a group of devices with the same IP address in different Layer 2 networks.

D.

To provide an address that refers to a single device in a network.

Full Access
Question # 47

Based on the network diagram (click the Exhibit Button). Router 1 installs network D in its routing table following a dynamic routing update from Router 2. Which of the following describes the information that will be installed in the routing table?

A.

172.16.9.0/24 next-hop 10.10.10.1

B.

172.16.9.0/24 next-hop 10.10.10.2

C.

172.16.9.0.24 next-hop 10.10 10 3

D.

0.0.0.0/32 next-hop 172.16.9.1

Full Access
Question # 48

Which of the following statements about VPWS service on a Nokia 7750 SR is FALSE?

A.

VPWS is a simple point-to-point service.

B.

VPWS emulates a Layer 2 connection between two customers.

C.

VPWS does not perform MAC learning.

D.

VPWS encapsulates Layer 2 frames into IP datagrams.

Full Access
Question # 49

What must occur before a LAG becomes operational?

A.

There must be multiple ports assigned to the LAG.

B.

All ports in the LAG must be configured with the same speed and duplex settings.

C.

Auto-negotiation must be enabled on all ports in the LAG.

D.

The duplex setting on all the ports must be forced to half.

E.

Auto-negotiation must be set to limited or disabled on at least one member port.

Full Access
Question # 50

Which of the following statements about the IP forwarding process is TRUE?

A.

It uses the forwarding table to find a match for the source IP address.

B.

It uses the ARP table to find a match for the source MAC address.

C.

It uses the ARP table to find a match for the destination MAC address.

D.

It uses the forwarding table to find a match for the destination IP address.

Full Access
Question # 51

Which of the following is NOT a function of the Internet layer in the TCP/IP model?

A.

Unique network addressing scheme to identify hosts globally

B.

Orderly access to the transmission medium

C.

Routing protocols for path determination

D.

End-to-end forwarding of datagrams

Full Access
Question # 52

Which field in the TCP header is used by the receiver to indicate the number of segments it can receive?

A.

Checksum

B.

SYN

C.

Destination port

D.

Window size

E.

MTU

Full Access